mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-01 02:41:14 +00:00
6fab37da59
Use https: links for websites that support them. The URIs which are used as namespace identifiers are left alone. Signed-off-by: Ján Tomko <jtomko@redhat.com> Reviewed-by: Erik Skultety <eskultet@redhat.com> Reviewed-by: Neal Gompa <ngompa13@gmail.com>
539 lines
16 KiB
C
539 lines
16 KiB
C
/*
|
|
* storage_backend_gluster.c: storage backend for Gluster handling
|
|
*
|
|
* Copyright (C) 2013-2018 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <glusterfs/api/glfs.h>
|
|
|
|
#include "storage_backend_gluster.h"
|
|
#include "storage_conf.h"
|
|
#include "viralloc.h"
|
|
#include "virerror.h"
|
|
#include "virlog.h"
|
|
#include "virstring.h"
|
|
#include "viruri.h"
|
|
#include "storage_util.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_STORAGE
|
|
|
|
VIR_LOG_INIT("storage.storage_backend_gluster");
|
|
|
|
struct _virStorageBackendGlusterState {
|
|
glfs_t *vol;
|
|
|
|
/* Accept the same URIs as qemu's block/gluster.c:
|
|
* gluster[+transport]://[server[:port]]/vol/[dir/]image[?socket=...] */
|
|
virURI *uri;
|
|
|
|
char *volname; /* vol from URI, no '/' */
|
|
char *dir; /* dir from URI, or "/"; always starts and ends in '/' */
|
|
};
|
|
|
|
typedef struct _virStorageBackendGlusterState virStorageBackendGlusterState;
|
|
typedef virStorageBackendGlusterState *virStorageBackendGlusterStatePtr;
|
|
|
|
static void
|
|
virStorageBackendGlusterClose(virStorageBackendGlusterStatePtr state)
|
|
{
|
|
if (!state)
|
|
return;
|
|
|
|
/* Yuck - glusterfs-api-3.4.1 appears to always return -1 for
|
|
* glfs_fini, with errno containing random data, so there's no way
|
|
* to tell if it succeeded. 3.4.2 is supposed to fix this.*/
|
|
if (state->vol && glfs_fini(state->vol) < 0)
|
|
VIR_DEBUG("shutdown of gluster volume %s failed with errno %d",
|
|
state->volname, errno);
|
|
|
|
virURIFree(state->uri);
|
|
VIR_FREE(state->volname);
|
|
VIR_FREE(state->dir);
|
|
VIR_FREE(state);
|
|
}
|
|
|
|
static virStorageBackendGlusterStatePtr
|
|
virStorageBackendGlusterOpen(virStoragePoolObjPtr pool)
|
|
{
|
|
virStorageBackendGlusterStatePtr ret = NULL;
|
|
virStoragePoolDefPtr def = virStoragePoolObjGetDef(pool);
|
|
const char *name = def->source.name;
|
|
const char *dir = def->source.dir;
|
|
bool trailing_slash = true;
|
|
|
|
/* Volume name must not contain '/'; optional path allows use of a
|
|
* subdirectory within the volume name. */
|
|
if (strchr(name, '/')) {
|
|
virReportError(VIR_ERR_XML_ERROR,
|
|
_("gluster pool name '%s' must not contain /"),
|
|
name);
|
|
return NULL;
|
|
}
|
|
if (dir) {
|
|
if (*dir != '/') {
|
|
virReportError(VIR_ERR_XML_ERROR,
|
|
_("gluster pool path '%s' must start with /"),
|
|
dir);
|
|
return NULL;
|
|
}
|
|
if (strchr(dir, '\0')[-1] != '/')
|
|
trailing_slash = false;
|
|
}
|
|
|
|
if (VIR_ALLOC(ret) < 0)
|
|
return NULL;
|
|
|
|
ret->volname = g_strdup(name);
|
|
ret->dir = g_strdup_printf("%s%s", dir ? dir : "/", trailing_slash ? "" : "/");
|
|
|
|
/* FIXME: Currently hard-coded to tcp transport; XML needs to be
|
|
* extended to allow alternate transport */
|
|
if (VIR_ALLOC(ret->uri) < 0)
|
|
goto error;
|
|
ret->uri->scheme = g_strdup("gluster");
|
|
ret->uri->server = g_strdup(def->source.hosts[0].name);
|
|
ret->uri->path = g_strdup_printf("/%s%s", ret->volname, ret->dir);
|
|
ret->uri->port = def->source.hosts[0].port;
|
|
|
|
/* Actually connect to glfs */
|
|
if (!(ret->vol = glfs_new(ret->volname))) {
|
|
virReportOOMError();
|
|
goto error;
|
|
}
|
|
|
|
if (glfs_set_volfile_server(ret->vol, "tcp",
|
|
ret->uri->server, ret->uri->port) < 0 ||
|
|
glfs_init(ret->vol) < 0) {
|
|
g_autofree char *uri = NULL;
|
|
uri = virURIFormat(ret->uri);
|
|
virReportSystemError(errno, _("failed to connect to %s"), NULLSTR(uri));
|
|
goto error;
|
|
}
|
|
|
|
if (glfs_chdir(ret->vol, ret->dir) < 0) {
|
|
virReportSystemError(errno,
|
|
_("failed to change to directory '%s' in '%s'"),
|
|
ret->dir, ret->volname);
|
|
goto error;
|
|
}
|
|
|
|
return ret;
|
|
|
|
error:
|
|
virStorageBackendGlusterClose(ret);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static ssize_t
|
|
virStorageBackendGlusterRead(glfs_fd_t *fd,
|
|
const char *name,
|
|
size_t len,
|
|
char **buf)
|
|
{
|
|
char *s;
|
|
size_t nread = 0;
|
|
|
|
if (VIR_ALLOC_N(*buf, len) < 0)
|
|
return -1;
|
|
|
|
s = *buf;
|
|
while (len) {
|
|
ssize_t r = glfs_read(fd, s, len, 0);
|
|
if (r < 0 && errno == EINTR)
|
|
continue;
|
|
if (r < 0) {
|
|
VIR_FREE(*buf);
|
|
virReportSystemError(errno, _("unable to read '%s'"), name);
|
|
return r;
|
|
}
|
|
if (r == 0)
|
|
return nread;
|
|
s += r;
|
|
len -= r;
|
|
nread += r;
|
|
}
|
|
return nread;
|
|
}
|
|
|
|
|
|
static int
|
|
virStorageBackendGlusterSetMetadata(virStorageBackendGlusterStatePtr state,
|
|
virStorageVolDefPtr vol,
|
|
const char *name)
|
|
{
|
|
char *tmp;
|
|
g_autofree char *path = NULL;
|
|
|
|
VIR_FREE(vol->key);
|
|
VIR_FREE(vol->target.path);
|
|
|
|
vol->type = VIR_STORAGE_VOL_NETWORK;
|
|
vol->target.format = VIR_STORAGE_FILE_RAW;
|
|
|
|
if (name) {
|
|
VIR_FREE(vol->name);
|
|
vol->name = g_strdup(name);
|
|
}
|
|
|
|
path = g_strdup_printf("%s%s%s", state->volname, state->dir, vol->name);
|
|
|
|
tmp = state->uri->path;
|
|
state->uri->path = g_strdup_printf("/%s", path);
|
|
if (!(vol->target.path = virURIFormat(state->uri))) {
|
|
VIR_FREE(state->uri->path);
|
|
state->uri->path = tmp;
|
|
return -1;
|
|
}
|
|
VIR_FREE(state->uri->path);
|
|
state->uri->path = tmp;
|
|
|
|
/* the path is unique enough to serve as a volume key */
|
|
vol->key = g_strdup(vol->target.path);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Populate *volptr for the given name and stat information, or leave
|
|
* it NULL if the entry should be skipped (such as "."). Return 0 on
|
|
* success, -1 on failure. */
|
|
static int
|
|
virStorageBackendGlusterRefreshVol(virStorageBackendGlusterStatePtr state,
|
|
const char *name,
|
|
struct stat *st,
|
|
virStorageVolDefPtr *volptr)
|
|
{
|
|
int ret = -1;
|
|
glfs_fd_t *fd = NULL;
|
|
ssize_t len;
|
|
g_autoptr(virStorageVolDef) vol = NULL;
|
|
g_autoptr(virStorageSource) meta = NULL;
|
|
g_autofree char *header = NULL;
|
|
|
|
*volptr = NULL;
|
|
|
|
/* Silently skip '.' and '..'. */
|
|
if (STREQ(name, ".") || STREQ(name, ".."))
|
|
return 0;
|
|
|
|
/* Follow symlinks; silently skip broken links and loops. */
|
|
if (S_ISLNK(st->st_mode) && glfs_stat(state->vol, name, st) < 0) {
|
|
if (errno == ENOENT || errno == ELOOP) {
|
|
VIR_WARN("ignoring dangling symlink '%s'", name);
|
|
ret = 0;
|
|
} else {
|
|
virReportSystemError(errno, _("cannot stat '%s'"), name);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
if (VIR_ALLOC(vol) < 0)
|
|
goto cleanup;
|
|
|
|
if (virStorageBackendUpdateVolTargetInfoFD(&vol->target, -1, st) < 0)
|
|
goto cleanup;
|
|
|
|
if (virStorageBackendGlusterSetMetadata(state, vol, name) < 0)
|
|
goto cleanup;
|
|
|
|
if (S_ISDIR(st->st_mode)) {
|
|
vol->type = VIR_STORAGE_VOL_NETDIR;
|
|
vol->target.format = VIR_STORAGE_FILE_DIR;
|
|
*volptr = g_steal_pointer(&vol);
|
|
ret = 0;
|
|
goto cleanup;
|
|
}
|
|
|
|
/* No need to worry about O_NONBLOCK - gluster doesn't allow creation
|
|
* of fifos, so there's nothing it would protect us from. */
|
|
if (!(fd = glfs_open(state->vol, name, O_RDONLY | O_NOCTTY))) {
|
|
/* A dangling symlink now implies a TOCTTOU race; report it. */
|
|
virReportSystemError(errno, _("cannot open volume '%s'"), name);
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((len = virStorageBackendGlusterRead(fd, name, VIR_STORAGE_MAX_HEADER,
|
|
&header)) < 0)
|
|
goto cleanup;
|
|
|
|
if (!(meta = virStorageFileGetMetadataFromBuf(name, header, len,
|
|
VIR_STORAGE_FILE_AUTO)))
|
|
goto cleanup;
|
|
|
|
if (meta->backingStoreRaw) {
|
|
if (!(vol->target.backingStore = virStorageSourceNew()))
|
|
goto cleanup;
|
|
|
|
vol->target.backingStore->type = VIR_STORAGE_TYPE_NETWORK;
|
|
|
|
vol->target.backingStore->path = g_steal_pointer(&meta->backingStoreRaw);
|
|
vol->target.backingStore->format = meta->backingStoreRawFormat;
|
|
|
|
if (vol->target.backingStore->format < 0)
|
|
vol->target.backingStore->format = VIR_STORAGE_FILE_RAW;
|
|
}
|
|
|
|
vol->target.format = meta->format;
|
|
if (meta->capacity)
|
|
vol->target.capacity = meta->capacity;
|
|
if (meta->encryption) {
|
|
vol->target.encryption = meta->encryption;
|
|
meta->encryption = NULL;
|
|
}
|
|
vol->target.features = meta->features;
|
|
meta->features = NULL;
|
|
vol->target.compat = meta->compat;
|
|
meta->compat = NULL;
|
|
|
|
*volptr = g_steal_pointer(&vol);
|
|
ret = 0;
|
|
cleanup:
|
|
if (fd)
|
|
glfs_close(fd);
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
virStorageBackendGlusterRefreshPool(virStoragePoolObjPtr pool)
|
|
{
|
|
int ret = -1;
|
|
virStoragePoolDefPtr def = virStoragePoolObjGetDef(pool);
|
|
virStorageBackendGlusterStatePtr state = NULL;
|
|
struct {
|
|
struct dirent ent;
|
|
/* See comment below about readdir_r needing padding */
|
|
char padding[MAX(1, 256 - (int)(sizeof(struct dirent)
|
|
- offsetof(struct dirent, d_name)))];
|
|
} de;
|
|
struct dirent *ent;
|
|
glfs_fd_t *dir = NULL;
|
|
struct stat st;
|
|
struct statvfs sb;
|
|
|
|
if (!(state = virStorageBackendGlusterOpen(pool)))
|
|
goto cleanup;
|
|
|
|
/* Why oh why did glfs 3.4 decide to expose only readdir_r rather
|
|
* than readdir? POSIX admits that readdir_r is inherently a
|
|
* flawed design, because systems are not required to define
|
|
* NAME_MAX: https://austingroupbugs.net/view.php?id=696
|
|
* https://womble.decadent.org.uk/readdir_r-advisory.html
|
|
*
|
|
* Fortunately, gluster appears to limit its underlying bricks to
|
|
* only use file systems such as XFS that have a NAME_MAX of 255;
|
|
* so we are currently guaranteed that if we provide 256 bytes of
|
|
* tail padding, then we should have enough space to avoid buffer
|
|
* overflow no matter whether the OS used d_name[], d_name[1], or
|
|
* d_name[256] in its 'struct dirent'.
|
|
* https://lists.gnu.org/archive/html/gluster-devel/2013-10/msg00083.html
|
|
*/
|
|
|
|
if (!(dir = glfs_opendir(state->vol, state->dir))) {
|
|
virReportSystemError(errno, _("cannot open path '%s' in '%s'"),
|
|
state->dir, state->volname);
|
|
goto cleanup;
|
|
}
|
|
while (!(errno = glfs_readdirplus_r(dir, &st, &de.ent, &ent)) && ent) {
|
|
virStorageVolDefPtr vol;
|
|
int okay = virStorageBackendGlusterRefreshVol(state,
|
|
ent->d_name, &st,
|
|
&vol);
|
|
|
|
if (okay < 0)
|
|
goto cleanup;
|
|
if (vol && virStoragePoolObjAddVol(pool, vol) < 0)
|
|
goto cleanup;
|
|
}
|
|
if (errno) {
|
|
virReportSystemError(errno, _("failed to read directory '%s' in '%s'"),
|
|
state->dir, state->volname);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (glfs_statvfs(state->vol, state->dir, &sb) < 0) {
|
|
virReportSystemError(errno, _("cannot statvfs path '%s' in '%s'"),
|
|
state->dir, state->volname);
|
|
goto cleanup;
|
|
}
|
|
|
|
def->capacity = ((unsigned long long)sb.f_frsize *
|
|
(unsigned long long)sb.f_blocks);
|
|
def->available = ((unsigned long long)sb.f_bfree *
|
|
(unsigned long long)sb.f_frsize);
|
|
def->allocation = def->capacity - def->available;
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
if (dir)
|
|
glfs_closedir(dir);
|
|
virStorageBackendGlusterClose(state);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
virStorageBackendGlusterVolDelete(virStoragePoolObjPtr pool,
|
|
virStorageVolDefPtr vol,
|
|
unsigned int flags)
|
|
{
|
|
virStorageBackendGlusterStatePtr state = NULL;
|
|
int ret = -1;
|
|
|
|
virCheckFlags(0, -1);
|
|
|
|
switch ((virStorageVolType)vol->type) {
|
|
case VIR_STORAGE_VOL_FILE:
|
|
case VIR_STORAGE_VOL_DIR:
|
|
case VIR_STORAGE_VOL_BLOCK:
|
|
case VIR_STORAGE_VOL_PLOOP:
|
|
case VIR_STORAGE_VOL_LAST:
|
|
virReportError(VIR_ERR_NO_SUPPORT,
|
|
_("removing of '%s' volumes is not supported "
|
|
"by the gluster backend: %s"),
|
|
virStorageVolTypeToString(vol->type),
|
|
vol->target.path);
|
|
goto cleanup;
|
|
break;
|
|
|
|
case VIR_STORAGE_VOL_NETWORK:
|
|
if (!(state = virStorageBackendGlusterOpen(pool)))
|
|
goto cleanup;
|
|
|
|
if (glfs_unlink(state->vol, vol->name) < 0) {
|
|
if (errno != ENOENT) {
|
|
virReportSystemError(errno,
|
|
_("cannot remove gluster volume file '%s'"),
|
|
vol->target.path);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case VIR_STORAGE_VOL_NETDIR:
|
|
if (!(state = virStorageBackendGlusterOpen(pool)))
|
|
goto cleanup;
|
|
|
|
if (glfs_rmdir(state->vol, vol->target.path) < 0) {
|
|
if (errno != ENOENT) {
|
|
virReportSystemError(errno,
|
|
_("cannot remove gluster volume dir '%s'"),
|
|
vol->target.path);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virStorageBackendGlusterClose(state);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static char *
|
|
virStorageBackendGlusterFindPoolSources(const char *srcSpec,
|
|
unsigned int flags)
|
|
{
|
|
virStoragePoolSourceList list = { .type = VIR_STORAGE_POOL_GLUSTER,
|
|
.nsources = 0,
|
|
.sources = NULL
|
|
};
|
|
char *ret = NULL;
|
|
int rc;
|
|
size_t i;
|
|
g_autoptr(virStoragePoolSource) source = NULL;
|
|
|
|
virCheckFlags(0, NULL);
|
|
|
|
if (!srcSpec) {
|
|
virReportError(VIR_ERR_INVALID_ARG, "%s",
|
|
_("hostname must be specified for gluster sources"));
|
|
return NULL;
|
|
}
|
|
|
|
if (!(source = virStoragePoolDefParseSourceString(srcSpec,
|
|
VIR_STORAGE_POOL_GLUSTER)))
|
|
return NULL;
|
|
|
|
if (source->nhost != 1) {
|
|
virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
|
|
_("Expected exactly 1 host for the storage pool"));
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((rc = virStorageBackendFindGlusterPoolSources(source->hosts[0].name,
|
|
VIR_STORAGE_POOL_GLUSTER,
|
|
&list, true)) < 0)
|
|
goto cleanup;
|
|
|
|
if (rc == 0) {
|
|
virReportError(VIR_ERR_OPERATION_FAILED,
|
|
_("no storage pools were found on host '%s'"),
|
|
source->hosts[0].name);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (!(ret = virStoragePoolSourceListFormat(&list)))
|
|
goto cleanup;
|
|
|
|
cleanup:
|
|
for (i = 0; i < list.nsources; i++)
|
|
virStoragePoolSourceClear(&list.sources[i]);
|
|
VIR_FREE(list.sources);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int
|
|
virStorageBackendGlusterCheckPool(virStoragePoolObjPtr pool,
|
|
bool *active)
|
|
{
|
|
/* Return previous state remembered by the status XML. If the pool is not
|
|
* available we will fail to refresh it and end up in the same situation.
|
|
* This will save one attempt to open the connection to the remote server */
|
|
*active = virStoragePoolObjIsActive(pool);
|
|
return 0;
|
|
}
|
|
|
|
|
|
virStorageBackend virStorageBackendGluster = {
|
|
.type = VIR_STORAGE_POOL_GLUSTER,
|
|
|
|
.checkPool = virStorageBackendGlusterCheckPool,
|
|
.refreshPool = virStorageBackendGlusterRefreshPool,
|
|
.findPoolSources = virStorageBackendGlusterFindPoolSources,
|
|
|
|
.deleteVol = virStorageBackendGlusterVolDelete,
|
|
};
|
|
|
|
|
|
int
|
|
virStorageBackendGlusterRegister(void)
|
|
{
|
|
if (virStorageBackendRegister(&virStorageBackendGluster) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|