mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-02 03:11:12 +00:00
07a9c8bae8
https://bugzilla.redhat.com/show_bug.cgi?id=1685151
This reverts commit e4a969092b
.
Now that drivers may call virConnectOpen() on secondary drivers, it
doesn't make much sense to have autostart separated from driver
initialization callback. In fact, it creates a problem because one
driver during its initialization might try to fetch an object from
another driver but since the object is yet to be autostarted the fetch
fails. This has been observed in reality: qemu driver performs
qemuProcessReconnect() during qemu's stateInitialize phase which may
call virDomainDiskTranslateSourcePool() which connects to the storage
driver to look up the volume. But the storage driver did not autostart
its pools yet therefore volume lookup fails and the domain is killed.
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
1279 lines
35 KiB
C
1279 lines
35 KiB
C
/*
|
|
* libvirt.c: Main interfaces for the libvirt library to handle virtualization
|
|
* domains from a process running in domain 0
|
|
*
|
|
* Copyright (C) 2005-2006, 2008-2014 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include <sys/wait.h>
|
|
#include <time.h>
|
|
|
|
#include <libxml/parser.h>
|
|
#include <libxml/xpath.h>
|
|
#include "getpass.h"
|
|
|
|
#ifdef HAVE_WINSOCK2_H
|
|
# include <winsock2.h>
|
|
#endif
|
|
|
|
#ifdef WITH_CURL
|
|
# include <curl/curl.h>
|
|
#endif
|
|
|
|
#include "virerror.h"
|
|
#include "virlog.h"
|
|
#include "datatypes.h"
|
|
#include "driver.h"
|
|
|
|
#include "viruuid.h"
|
|
#include "viralloc.h"
|
|
#include "configmake.h"
|
|
#include "virconf.h"
|
|
#if WITH_GNUTLS
|
|
# include "rpc/virnettlscontext.h"
|
|
#endif
|
|
#include "vircommand.h"
|
|
#include "virfile.h"
|
|
#include "virrandom.h"
|
|
#include "viruri.h"
|
|
#include "virthread.h"
|
|
#include "virstring.h"
|
|
#include "virutil.h"
|
|
#include "virtypedparam.h"
|
|
|
|
#ifdef WITH_TEST
|
|
# include "test/test_driver.h"
|
|
#endif
|
|
#ifdef WITH_REMOTE
|
|
# include "remote/remote_driver.h"
|
|
#endif
|
|
#ifdef WITH_OPENVZ
|
|
# include "openvz/openvz_driver.h"
|
|
#endif
|
|
#ifdef WITH_VMWARE
|
|
# include "vmware/vmware_driver.h"
|
|
#endif
|
|
#ifdef WITH_PHYP
|
|
# include "phyp/phyp_driver.h"
|
|
#endif
|
|
#ifdef WITH_ESX
|
|
# include "esx/esx_driver.h"
|
|
#endif
|
|
#ifdef WITH_HYPERV
|
|
# include "hyperv/hyperv_driver.h"
|
|
#endif
|
|
#ifdef WITH_XENAPI
|
|
# include "xenapi/xenapi_driver.h"
|
|
#endif
|
|
#ifdef WITH_BHYVE
|
|
# include "bhyve/bhyve_driver.h"
|
|
#endif
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
VIR_LOG_INIT("libvirt");
|
|
|
|
/*
|
|
* TODO:
|
|
* - use lock to protect against concurrent accesses ?
|
|
* - use reference counting to guarantee coherent pointer state ?
|
|
*/
|
|
|
|
#define MAX_DRIVERS 21
|
|
|
|
static virConnectDriverPtr virConnectDriverTab[MAX_DRIVERS];
|
|
static int virConnectDriverTabCount;
|
|
static virStateDriverPtr virStateDriverTab[MAX_DRIVERS];
|
|
static int virStateDriverTabCount;
|
|
|
|
static virNetworkDriverPtr virSharedNetworkDriver;
|
|
static virInterfaceDriverPtr virSharedInterfaceDriver;
|
|
static virStorageDriverPtr virSharedStorageDriver;
|
|
static virNodeDeviceDriverPtr virSharedNodeDeviceDriver;
|
|
static virSecretDriverPtr virSharedSecretDriver;
|
|
static virNWFilterDriverPtr virSharedNWFilterDriver;
|
|
|
|
|
|
static int
|
|
virConnectAuthCallbackDefault(virConnectCredentialPtr cred,
|
|
unsigned int ncred,
|
|
void *cbdata ATTRIBUTE_UNUSED)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = 0; i < ncred; i++) {
|
|
char buf[1024];
|
|
char *bufptr = buf;
|
|
size_t len;
|
|
|
|
switch (cred[i].type) {
|
|
case VIR_CRED_EXTERNAL: {
|
|
if (STRNEQ(cred[i].challenge, "PolicyKit"))
|
|
return -1;
|
|
|
|
/*
|
|
* Ignore & carry on. Although we can't auth
|
|
* directly, the user may have authenticated
|
|
* themselves already outside context of libvirt
|
|
*/
|
|
break;
|
|
}
|
|
|
|
case VIR_CRED_USERNAME:
|
|
case VIR_CRED_AUTHNAME:
|
|
case VIR_CRED_ECHOPROMPT:
|
|
case VIR_CRED_REALM:
|
|
if (printf("%s: ", cred[i].prompt) < 0)
|
|
return -1;
|
|
if (fflush(stdout) != 0)
|
|
return -1;
|
|
|
|
if (!fgets(buf, sizeof(buf), stdin)) {
|
|
if (feof(stdin)) { /* Treat EOF as "" */
|
|
buf[0] = '\0';
|
|
break;
|
|
}
|
|
return -1;
|
|
}
|
|
len = strlen(buf);
|
|
if (len != 0 && buf[len-1] == '\n')
|
|
buf[len-1] = '\0';
|
|
break;
|
|
|
|
case VIR_CRED_PASSPHRASE:
|
|
case VIR_CRED_NOECHOPROMPT:
|
|
if (printf("%s: ", cred[i].prompt) < 0)
|
|
return -1;
|
|
if (fflush(stdout) != 0)
|
|
return -1;
|
|
|
|
bufptr = getpass("");
|
|
if (!bufptr)
|
|
return -1;
|
|
break;
|
|
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
if (cred[i].type != VIR_CRED_EXTERNAL) {
|
|
if (VIR_STRDUP(cred[i].result,
|
|
STREQ(bufptr, "") && cred[i].defresult ?
|
|
cred[i].defresult : bufptr) < 0)
|
|
return -1;
|
|
cred[i].resultlen = strlen(cred[i].result);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Don't typically want VIR_CRED_USERNAME. It enables you to authenticate
|
|
* as one user, and act as another. It just results in annoying
|
|
* prompts for the username twice & is very rarely what you want
|
|
*/
|
|
static int virConnectCredTypeDefault[] = {
|
|
VIR_CRED_AUTHNAME,
|
|
VIR_CRED_ECHOPROMPT,
|
|
VIR_CRED_REALM,
|
|
VIR_CRED_PASSPHRASE,
|
|
VIR_CRED_NOECHOPROMPT,
|
|
VIR_CRED_EXTERNAL,
|
|
};
|
|
|
|
static virConnectAuth virConnectAuthDefault = {
|
|
virConnectCredTypeDefault,
|
|
sizeof(virConnectCredTypeDefault)/sizeof(int),
|
|
virConnectAuthCallbackDefault,
|
|
NULL,
|
|
};
|
|
|
|
/*
|
|
* virConnectAuthPtrDefault
|
|
*
|
|
* A default implementation of the authentication callbacks. This
|
|
* implementation is suitable for command line based tools. It will
|
|
* prompt for username, passwords, realm and one time keys as needed.
|
|
* It will print on STDOUT, and read from STDIN. If this is not
|
|
* suitable for the application's needs an alternative implementation
|
|
* should be provided.
|
|
*/
|
|
virConnectAuthPtr virConnectAuthPtrDefault = &virConnectAuthDefault;
|
|
|
|
#if HAVE_WINSOCK2_H
|
|
static int
|
|
virWinsockInit(void)
|
|
{
|
|
WORD winsock_version, err;
|
|
WSADATA winsock_data;
|
|
|
|
/* http://msdn2.microsoft.com/en-us/library/ms742213.aspx */
|
|
winsock_version = MAKEWORD(2, 2);
|
|
err = WSAStartup(winsock_version, &winsock_data);
|
|
return err == 0 ? 0 : -1;
|
|
}
|
|
#endif
|
|
|
|
|
|
static bool virGlobalError;
|
|
static virOnceControl virGlobalOnce = VIR_ONCE_CONTROL_INITIALIZER;
|
|
|
|
static void
|
|
virGlobalInit(void)
|
|
{
|
|
/* It would be nice if we could trace the use of this call, to
|
|
* help diagnose in log files if a user calls something other than
|
|
* virConnectOpen first. But we can't rely on VIR_DEBUG working
|
|
* until after initialization is complete, and since this is
|
|
* one-shot, we never get here again. */
|
|
if (virThreadInitialize() < 0 ||
|
|
virErrorInitialize() < 0)
|
|
goto error;
|
|
|
|
#ifndef LIBVIRT_SETUID_RPC_CLIENT
|
|
if (virIsSUID()) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("libvirt.so is not safe to use from setuid programs"));
|
|
goto error;
|
|
}
|
|
#endif
|
|
|
|
virLogSetFromEnv();
|
|
|
|
#ifdef WITH_GNUTLS
|
|
virNetTLSInit();
|
|
#endif
|
|
|
|
#if WITH_CURL
|
|
curl_global_init(CURL_GLOBAL_DEFAULT);
|
|
#endif
|
|
|
|
VIR_DEBUG("register drivers");
|
|
|
|
#if HAVE_WINSOCK2_H
|
|
if (virWinsockInit() == -1)
|
|
goto error;
|
|
#endif
|
|
|
|
#ifdef HAVE_LIBINTL_H
|
|
if (!bindtextdomain(PACKAGE, LOCALEDIR))
|
|
goto error;
|
|
#endif /* HAVE_LIBINTL_H */
|
|
|
|
/*
|
|
* Note we must avoid everything except 'remote' driver
|
|
* for virt-login-shell usage
|
|
*/
|
|
#ifndef LIBVIRT_SETUID_RPC_CLIENT
|
|
/*
|
|
* Note that the order is important: the first ones have a higher
|
|
* priority when calling virConnectOpen.
|
|
*/
|
|
# ifdef WITH_TEST
|
|
if (testRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_OPENVZ
|
|
if (openvzRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_VMWARE
|
|
if (vmwareRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_PHYP
|
|
if (phypRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_ESX
|
|
if (esxRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_HYPERV
|
|
if (hypervRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
# ifdef WITH_XENAPI
|
|
if (xenapiRegister() == -1)
|
|
goto error;
|
|
# endif
|
|
#endif
|
|
#ifdef WITH_REMOTE
|
|
if (remoteRegister() == -1)
|
|
goto error;
|
|
#endif
|
|
|
|
return;
|
|
|
|
error:
|
|
virGlobalError = true;
|
|
}
|
|
|
|
|
|
/**
|
|
* virInitialize:
|
|
*
|
|
* Initialize the library.
|
|
*
|
|
* This method is invoked automatically by any of the virConnectOpen() API
|
|
* calls, and by virGetVersion(). Since release 1.0.0, there is no need to
|
|
* call this method even in a multithreaded application, since
|
|
* initialization is performed in a thread safe manner; but applications
|
|
* using an older version of the library should manually call this before
|
|
* setting up competing threads that attempt virConnectOpen in parallel.
|
|
*
|
|
* The only other time it would be necessary to call virInitialize is if the
|
|
* application did not invoke virConnectOpen as its first API call, such
|
|
* as when calling virEventRegisterImpl() before setting up connections,
|
|
* or when using virSetErrorFunc() to alter error reporting of the first
|
|
* connection attempt.
|
|
*
|
|
* Returns 0 in case of success, -1 in case of error
|
|
*/
|
|
int
|
|
virInitialize(void)
|
|
{
|
|
if (virOnce(&virGlobalOnce, virGlobalInit) < 0)
|
|
return -1;
|
|
|
|
if (virGlobalError)
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
|
|
#ifdef WIN32
|
|
BOOL WINAPI
|
|
DllMain(HINSTANCE instance, DWORD reason, LPVOID ignore);
|
|
|
|
BOOL WINAPI
|
|
DllMain(HINSTANCE instance ATTRIBUTE_UNUSED,
|
|
DWORD reason,
|
|
LPVOID ignore ATTRIBUTE_UNUSED)
|
|
{
|
|
switch (reason) {
|
|
case DLL_PROCESS_ATTACH:
|
|
virInitialize();
|
|
break;
|
|
|
|
case DLL_THREAD_ATTACH:
|
|
/* Nothing todo in libvirt yet */
|
|
break;
|
|
|
|
case DLL_THREAD_DETACH:
|
|
/* Release per-thread local data */
|
|
virThreadOnExit();
|
|
break;
|
|
|
|
case DLL_PROCESS_DETACH:
|
|
/* Don't bother releasing per-thread data
|
|
since (hopefully) windows cleans up
|
|
everything on process exit */
|
|
break;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
#endif
|
|
|
|
|
|
/**
|
|
* virSetSharedNetworkDriver:
|
|
* @driver: pointer to a network driver block
|
|
*
|
|
* Register a network virtualization driver
|
|
*
|
|
* Returns 0 on success, or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedNetworkDriver(virNetworkDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedNetworkDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A network driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as network driver", driver->name);
|
|
|
|
virSharedNetworkDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virSetSharedInterfaceDriver:
|
|
* @driver: pointer to an interface driver block
|
|
*
|
|
* Register an interface virtualization driver
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedInterfaceDriver(virInterfaceDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedInterfaceDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A interface driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as interface driver", driver->name);
|
|
|
|
virSharedInterfaceDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virSetSharedStorageDriver:
|
|
* @driver: pointer to a storage driver block
|
|
*
|
|
* Register a storage virtualization driver
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedStorageDriver(virStorageDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedStorageDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A storage driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as storage driver", driver->name);
|
|
|
|
virSharedStorageDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virSetSharedNodeDeviceDriver:
|
|
* @driver: pointer to a device monitor block
|
|
*
|
|
* Register a device monitor
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedNodeDeviceDriver(virNodeDeviceDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedNodeDeviceDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A node device driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as device driver", driver->name);
|
|
|
|
virSharedNodeDeviceDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virSetSharedSecretDriver:
|
|
* @driver: pointer to a secret driver block
|
|
*
|
|
* Register a secret driver
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedSecretDriver(virSecretDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedSecretDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A secret driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as secret driver", driver->name);
|
|
|
|
virSharedSecretDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virSetSharedNWFilterDriver:
|
|
* @driver: pointer to a network filter driver block
|
|
*
|
|
* Register a network filter virtualization driver
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virSetSharedNWFilterDriver(virNWFilterDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virSharedNWFilterDriver) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("A network filter driver is already registered"));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as network filter driver", driver->name);
|
|
|
|
virSharedNWFilterDriver = driver;
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virRegisterConnectDriver:
|
|
* @driver: pointer to a driver block
|
|
* @setSharedDrivers: populate shared drivers
|
|
*
|
|
* Register a virtualization driver, optionally filling in
|
|
* any empty pointers for shared secondary drivers
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virRegisterConnectDriver(virConnectDriverPtr driver,
|
|
bool setSharedDrivers)
|
|
{
|
|
VIR_DEBUG("driver=%p name=%s", driver,
|
|
driver ? NULLSTR(driver->hypervisorDriver->name) : "(null)");
|
|
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
if (virConnectDriverTabCount >= MAX_DRIVERS) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Too many drivers, cannot register %s"),
|
|
driver->hypervisorDriver->name);
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("registering %s as driver %d",
|
|
driver->hypervisorDriver->name, virConnectDriverTabCount);
|
|
|
|
if (setSharedDrivers) {
|
|
if (driver->interfaceDriver == NULL)
|
|
driver->interfaceDriver = virSharedInterfaceDriver;
|
|
if (driver->networkDriver == NULL)
|
|
driver->networkDriver = virSharedNetworkDriver;
|
|
if (driver->nodeDeviceDriver == NULL)
|
|
driver->nodeDeviceDriver = virSharedNodeDeviceDriver;
|
|
if (driver->nwfilterDriver == NULL)
|
|
driver->nwfilterDriver = virSharedNWFilterDriver;
|
|
if (driver->secretDriver == NULL)
|
|
driver->secretDriver = virSharedSecretDriver;
|
|
if (driver->storageDriver == NULL)
|
|
driver->storageDriver = virSharedStorageDriver;
|
|
}
|
|
|
|
virConnectDriverTab[virConnectDriverTabCount] = driver;
|
|
return virConnectDriverTabCount++;
|
|
}
|
|
|
|
|
|
/**
|
|
* virRegisterStateDriver:
|
|
* @driver: pointer to a driver block
|
|
*
|
|
* Register a virtualization driver
|
|
*
|
|
* Returns the driver priority or -1 in case of error.
|
|
*/
|
|
int
|
|
virRegisterStateDriver(virStateDriverPtr driver)
|
|
{
|
|
virCheckNonNullArgReturn(driver, -1);
|
|
|
|
if (virStateDriverTabCount >= MAX_DRIVERS) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Too many drivers, cannot register %s"),
|
|
driver->name);
|
|
return -1;
|
|
}
|
|
|
|
virStateDriverTab[virStateDriverTabCount] = driver;
|
|
return virStateDriverTabCount++;
|
|
}
|
|
|
|
|
|
/**
|
|
* virStateInitialize:
|
|
* @privileged: set to true if running with root privilege, false otherwise
|
|
* @callback: callback to invoke to inhibit shutdown of the daemon
|
|
* @opaque: data to pass to @callback
|
|
*
|
|
* Initialize all virtualization drivers.
|
|
*
|
|
* Returns 0 if all succeed, -1 upon any failure.
|
|
*/
|
|
int
|
|
virStateInitialize(bool privileged,
|
|
virStateInhibitCallback callback,
|
|
void *opaque)
|
|
{
|
|
size_t i;
|
|
|
|
if (virInitialize() < 0)
|
|
return -1;
|
|
|
|
for (i = 0; i < virStateDriverTabCount; i++) {
|
|
if (virStateDriverTab[i]->stateInitialize) {
|
|
VIR_DEBUG("Running global init for %s state driver",
|
|
virStateDriverTab[i]->name);
|
|
if (virStateDriverTab[i]->stateInitialize(privileged,
|
|
callback,
|
|
opaque) < 0) {
|
|
VIR_ERROR(_("Initialization of %s state driver failed: %s"),
|
|
virStateDriverTab[i]->name,
|
|
virGetLastErrorMessage());
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* virStateCleanup:
|
|
*
|
|
* Run each virtualization driver's cleanup method.
|
|
*
|
|
* Returns 0 if all succeed, -1 upon any failure.
|
|
*/
|
|
int
|
|
virStateCleanup(void)
|
|
{
|
|
int r;
|
|
int ret = 0;
|
|
|
|
for (r = virStateDriverTabCount - 1; r >= 0; r--) {
|
|
if (virStateDriverTab[r]->stateCleanup &&
|
|
virStateDriverTab[r]->stateCleanup() < 0)
|
|
ret = -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virStateReload:
|
|
*
|
|
* Run each virtualization driver's reload method.
|
|
*
|
|
* Returns 0 if all succeed, -1 upon any failure.
|
|
*/
|
|
int
|
|
virStateReload(void)
|
|
{
|
|
size_t i;
|
|
int ret = 0;
|
|
|
|
for (i = 0; i < virStateDriverTabCount; i++) {
|
|
if (virStateDriverTab[i]->stateReload &&
|
|
virStateDriverTab[i]->stateReload() < 0)
|
|
ret = -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virStateStop:
|
|
*
|
|
* Run each virtualization driver's "stop" method.
|
|
*
|
|
* Returns 0 if successful, -1 on failure
|
|
*/
|
|
int
|
|
virStateStop(void)
|
|
{
|
|
size_t i;
|
|
int ret = 0;
|
|
|
|
for (i = 0; i < virStateDriverTabCount; i++) {
|
|
if (virStateDriverTab[i]->stateStop &&
|
|
virStateDriverTab[i]->stateStop())
|
|
ret = 1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virGetVersion:
|
|
* @libVer: return value for the library version (OUT)
|
|
* @type: ignored; pass NULL
|
|
* @typeVer: pass NULL; for historical purposes duplicates @libVer if
|
|
* non-NULL
|
|
*
|
|
* Provides version information. @libVer is the version of the
|
|
* library and will always be set unless an error occurs, in which case
|
|
* an error code will be returned. @typeVer exists for historical
|
|
* compatibility; if it is not NULL it will duplicate @libVer (it was
|
|
* originally intended to return hypervisor information based on @type,
|
|
* but due to the design of remote clients this is not reliable). To
|
|
* get the version of the running hypervisor use the virConnectGetVersion()
|
|
* function instead. To get the libvirt library version used by a
|
|
* connection use the virConnectGetLibVersion() instead.
|
|
*
|
|
* This function includes a call to virInitialize() when necessary.
|
|
*
|
|
* Returns -1 in case of failure, 0 otherwise, and values for @libVer and
|
|
* @typeVer have the format major * 1,000,000 + minor * 1,000 + release.
|
|
*/
|
|
int
|
|
virGetVersion(unsigned long *libVer, const char *type ATTRIBUTE_UNUSED,
|
|
unsigned long *typeVer)
|
|
{
|
|
if (virInitialize() < 0)
|
|
goto error;
|
|
VIR_DEBUG("libVir=%p, type=%s, typeVer=%p", libVer, type, typeVer);
|
|
|
|
virResetLastError();
|
|
if (libVer == NULL)
|
|
goto error;
|
|
*libVer = LIBVIR_VERSION_NUMBER;
|
|
|
|
if (typeVer != NULL)
|
|
*typeVer = LIBVIR_VERSION_NUMBER;
|
|
|
|
return 0;
|
|
|
|
error:
|
|
virDispatchError(NULL);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int
|
|
virConnectGetDefaultURI(virConfPtr conf,
|
|
char **name)
|
|
{
|
|
int ret = -1;
|
|
const char *defname = virGetEnvBlockSUID("LIBVIRT_DEFAULT_URI");
|
|
if (defname && *defname) {
|
|
VIR_DEBUG("Using LIBVIRT_DEFAULT_URI '%s'", defname);
|
|
if (VIR_STRDUP(*name, defname) < 0)
|
|
goto cleanup;
|
|
} else {
|
|
if (virConfGetValueString(conf, "uri_default", name) < 0)
|
|
goto cleanup;
|
|
|
|
if (*name)
|
|
VIR_DEBUG("Using config file uri '%s'", *name);
|
|
}
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
return ret;
|
|
}
|
|
|
|
|
|
/*
|
|
* Check to see if an invalid URI like qemu://system (missing /) was passed,
|
|
* offer the suggested fix.
|
|
*/
|
|
static int
|
|
virConnectCheckURIMissingSlash(const char *uristr, virURIPtr uri)
|
|
{
|
|
if (!uri->path || !uri->server)
|
|
return 0;
|
|
|
|
/* To avoid false positives, only check drivers that mandate
|
|
a path component in the URI, like /system or /session */
|
|
if (STRNEQ(uri->scheme, "qemu") &&
|
|
STRNEQ(uri->scheme, "vbox") &&
|
|
STRNEQ(uri->scheme, "vz"))
|
|
return 0;
|
|
|
|
if (STREQ(uri->server, "session") ||
|
|
STREQ(uri->server, "system")) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("invalid URI %s (maybe you want %s:///%s)"),
|
|
uristr, uri->scheme, uri->server);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static virConnectPtr
|
|
virConnectOpenInternal(const char *name,
|
|
virConnectAuthPtr auth,
|
|
unsigned int flags)
|
|
{
|
|
size_t i;
|
|
int res;
|
|
virConnectPtr ret;
|
|
virConfPtr conf = NULL;
|
|
char *uristr = NULL;
|
|
|
|
ret = virGetConnect();
|
|
if (ret == NULL)
|
|
return NULL;
|
|
|
|
if (virConfLoadConfig(&conf, "libvirt.conf") < 0)
|
|
goto failed;
|
|
|
|
if (name && name[0] == '\0')
|
|
name = NULL;
|
|
|
|
if (!name && virIsSUID()) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("An explicit URI must be provided when setuid"));
|
|
goto failed;
|
|
}
|
|
|
|
/* Convert xen -> xen:///system for back compat */
|
|
if (name && STRCASEEQ(name, "xen"))
|
|
name = "xen:///system";
|
|
|
|
/* Convert xen:// -> xen:///system because xmlParseURI cannot parse the
|
|
* former. This allows URIs such as xen://localhost to work.
|
|
*/
|
|
if (name && STREQ(name, "xen://"))
|
|
name = "xen:///system";
|
|
|
|
/*
|
|
* If no URI is passed, then check for an environment string if not
|
|
* available probe the compiled in drivers to find a default hypervisor
|
|
* if detectable.
|
|
*/
|
|
if (name) {
|
|
if (VIR_STRDUP(uristr, name) < 0)
|
|
goto failed;
|
|
} else {
|
|
if (virConnectGetDefaultURI(conf, &uristr) < 0)
|
|
goto failed;
|
|
|
|
if (uristr == NULL) {
|
|
VIR_DEBUG("Trying to probe for default URI");
|
|
for (i = 0; i < virConnectDriverTabCount && uristr == NULL; i++) {
|
|
if (virConnectDriverTab[i]->hypervisorDriver->connectURIProbe) {
|
|
if (virConnectDriverTab[i]->hypervisorDriver->connectURIProbe(&uristr) < 0)
|
|
goto failed;
|
|
VIR_DEBUG("%s driver URI probe returned '%s'",
|
|
virConnectDriverTab[i]->hypervisorDriver->name,
|
|
NULLSTR_EMPTY(uristr));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (uristr) {
|
|
char *alias = NULL;
|
|
|
|
if (!(flags & VIR_CONNECT_NO_ALIASES) &&
|
|
virURIResolveAlias(conf, uristr, &alias) < 0)
|
|
goto failed;
|
|
|
|
if (alias) {
|
|
VIR_FREE(uristr);
|
|
uristr = alias;
|
|
}
|
|
|
|
if (!(ret->uri = virURIParse(uristr))) {
|
|
VIR_FREE(alias);
|
|
goto failed;
|
|
}
|
|
|
|
/* Avoid need for drivers to worry about NULLs, as
|
|
* no one needs to distinguish "" vs NULL */
|
|
if (ret->uri->path == NULL &&
|
|
VIR_STRDUP(ret->uri->path, "") < 0)
|
|
goto failed;
|
|
|
|
VIR_DEBUG("Split \"%s\" to URI components:\n"
|
|
" scheme %s\n"
|
|
" server %s\n"
|
|
" user %s\n"
|
|
" port %d\n"
|
|
" path %s",
|
|
uristr,
|
|
NULLSTR(ret->uri->scheme), NULLSTR(ret->uri->server),
|
|
NULLSTR(ret->uri->user), ret->uri->port,
|
|
ret->uri->path);
|
|
|
|
if (ret->uri->scheme == NULL) {
|
|
virReportError(VIR_ERR_NO_CONNECT,
|
|
_("URI '%s' does not include a driver name"),
|
|
name);
|
|
goto failed;
|
|
}
|
|
|
|
if (virConnectCheckURIMissingSlash(uristr,
|
|
ret->uri) < 0) {
|
|
goto failed;
|
|
}
|
|
} else {
|
|
VIR_DEBUG("no name, allowing driver auto-select");
|
|
}
|
|
|
|
/* Cleansing flags */
|
|
ret->flags = flags & VIR_CONNECT_RO;
|
|
|
|
for (i = 0; i < virConnectDriverTabCount; i++) {
|
|
/* We're going to probe the remote driver next. So we have already
|
|
* probed all other client-side-only driver before, but none of them
|
|
* accepted the URI.
|
|
* If the scheme corresponds to a known but disabled client-side-only
|
|
* driver then report a useful error, instead of a cryptic one about
|
|
* not being able to connect to libvirtd or not being able to find
|
|
* certificates. */
|
|
if (STREQ(virConnectDriverTab[i]->hypervisorDriver->name, "remote") &&
|
|
ret->uri != NULL &&
|
|
(
|
|
#ifndef WITH_PHYP
|
|
STRCASEEQ(ret->uri->scheme, "phyp") ||
|
|
#endif
|
|
#ifndef WITH_ESX
|
|
STRCASEEQ(ret->uri->scheme, "vpx") ||
|
|
STRCASEEQ(ret->uri->scheme, "esx") ||
|
|
STRCASEEQ(ret->uri->scheme, "gsx") ||
|
|
#endif
|
|
#ifndef WITH_HYPERV
|
|
STRCASEEQ(ret->uri->scheme, "hyperv") ||
|
|
#endif
|
|
#ifndef WITH_XENAPI
|
|
STRCASEEQ(ret->uri->scheme, "xenapi") ||
|
|
#endif
|
|
#ifndef WITH_VZ
|
|
STRCASEEQ(ret->uri->scheme, "parallels") ||
|
|
#endif
|
|
false)) {
|
|
virReportErrorHelper(VIR_FROM_NONE, VIR_ERR_CONFIG_UNSUPPORTED,
|
|
__FILE__, __FUNCTION__, __LINE__,
|
|
_("libvirt was built without the '%s' driver"),
|
|
ret->uri->scheme);
|
|
goto failed;
|
|
}
|
|
|
|
VIR_DEBUG("trying driver %zu (%s) ...",
|
|
i, virConnectDriverTab[i]->hypervisorDriver->name);
|
|
|
|
if (virConnectDriverTab[i]->localOnly && ret->uri && ret->uri->server) {
|
|
VIR_DEBUG("Server present, skipping local only driver");
|
|
continue;
|
|
}
|
|
|
|
/* Filter drivers based on declared URI schemes */
|
|
if (virConnectDriverTab[i]->uriSchemes) {
|
|
bool matchScheme = false;
|
|
size_t s;
|
|
if (!ret->uri) {
|
|
VIR_DEBUG("No URI, skipping driver with URI whitelist");
|
|
continue;
|
|
}
|
|
VIR_DEBUG("Checking for supported URI schemes");
|
|
for (s = 0; virConnectDriverTab[i]->uriSchemes[s] != NULL; s++) {
|
|
if (STREQ(ret->uri->scheme, virConnectDriverTab[i]->uriSchemes[s])) {
|
|
VIR_DEBUG("Matched URI scheme '%s'", ret->uri->scheme);
|
|
matchScheme = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!matchScheme) {
|
|
VIR_DEBUG("No matching URI scheme");
|
|
continue;
|
|
}
|
|
} else {
|
|
VIR_DEBUG("Matching any URI scheme for '%s'", ret->uri ? ret->uri->scheme : "");
|
|
}
|
|
|
|
/* before starting the new connection, check if the driver only works
|
|
* with a server, and so return an error if the server is missing */
|
|
if (virConnectDriverTab[i]->remoteOnly && ret->uri && !ret->uri->server) {
|
|
virReportError(VIR_ERR_INVALID_ARG, "%s", _("URI is missing the server part"));
|
|
goto failed;
|
|
}
|
|
|
|
ret->driver = virConnectDriverTab[i]->hypervisorDriver;
|
|
ret->interfaceDriver = virConnectDriverTab[i]->interfaceDriver;
|
|
ret->networkDriver = virConnectDriverTab[i]->networkDriver;
|
|
ret->nodeDeviceDriver = virConnectDriverTab[i]->nodeDeviceDriver;
|
|
ret->nwfilterDriver = virConnectDriverTab[i]->nwfilterDriver;
|
|
ret->secretDriver = virConnectDriverTab[i]->secretDriver;
|
|
ret->storageDriver = virConnectDriverTab[i]->storageDriver;
|
|
|
|
res = virConnectDriverTab[i]->hypervisorDriver->connectOpen(ret, auth, conf, flags);
|
|
VIR_DEBUG("driver %zu %s returned %s",
|
|
i, virConnectDriverTab[i]->hypervisorDriver->name,
|
|
res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
|
|
(res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
|
|
(res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));
|
|
|
|
if (res == VIR_DRV_OPEN_SUCCESS) {
|
|
break;
|
|
} else {
|
|
ret->driver = NULL;
|
|
ret->interfaceDriver = NULL;
|
|
ret->networkDriver = NULL;
|
|
ret->nodeDeviceDriver = NULL;
|
|
ret->nwfilterDriver = NULL;
|
|
ret->secretDriver = NULL;
|
|
ret->storageDriver = NULL;
|
|
|
|
if (res == VIR_DRV_OPEN_ERROR)
|
|
goto failed;
|
|
}
|
|
}
|
|
|
|
if (!ret->driver) {
|
|
/* If we reach here, then all drivers declined the connection. */
|
|
virReportError(VIR_ERR_NO_CONNECT, "%s", NULLSTR(name));
|
|
goto failed;
|
|
}
|
|
|
|
virConfFree(conf);
|
|
VIR_FREE(uristr);
|
|
|
|
return ret;
|
|
|
|
failed:
|
|
VIR_FREE(uristr);
|
|
virConfFree(conf);
|
|
virObjectUnref(ret);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/**
|
|
* virConnectOpen:
|
|
* @name: (optional) URI of the hypervisor
|
|
*
|
|
* This function should be called first to get a connection to the
|
|
* Hypervisor and xen store
|
|
*
|
|
* If @name is NULL, if the LIBVIRT_DEFAULT_URI environment variable is set,
|
|
* then it will be used. Otherwise if the client configuration file
|
|
* has the "uri_default" parameter set, then it will be used. Finally
|
|
* probing will be done to determine a suitable default driver to activate.
|
|
* This involves trying each hypervisor in turn until one successfully opens.
|
|
*
|
|
* If connecting to an unprivileged hypervisor driver which requires
|
|
* the libvirtd daemon to be active, it will automatically be launched
|
|
* if not already running. This can be prevented by setting the
|
|
* environment variable LIBVIRT_AUTOSTART=0
|
|
*
|
|
* URIs are documented at https://libvirt.org/uri.html
|
|
*
|
|
* virConnectClose should be used to release the resources after the connection
|
|
* is no longer needed.
|
|
*
|
|
* Returns a pointer to the hypervisor connection or NULL in case of error
|
|
*/
|
|
virConnectPtr
|
|
virConnectOpen(const char *name)
|
|
{
|
|
virConnectPtr ret = NULL;
|
|
|
|
if (virInitialize() < 0)
|
|
goto error;
|
|
|
|
VIR_DEBUG("name=%s", NULLSTR(name));
|
|
virResetLastError();
|
|
ret = virConnectOpenInternal(name, NULL, 0);
|
|
if (!ret)
|
|
goto error;
|
|
return ret;
|
|
|
|
error:
|
|
virDispatchError(NULL);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/**
|
|
* virConnectOpenReadOnly:
|
|
* @name: (optional) URI of the hypervisor
|
|
*
|
|
* This function should be called first to get a restricted connection to the
|
|
* library functionalities. The set of APIs usable are then restricted
|
|
* on the available methods to control the domains.
|
|
*
|
|
* See virConnectOpen for notes about environment variables which can
|
|
* have an effect on opening drivers and freeing the connection resources
|
|
*
|
|
* URIs are documented at https://libvirt.org/uri.html
|
|
*
|
|
* Returns a pointer to the hypervisor connection or NULL in case of error
|
|
*/
|
|
virConnectPtr
|
|
virConnectOpenReadOnly(const char *name)
|
|
{
|
|
virConnectPtr ret = NULL;
|
|
|
|
if (virInitialize() < 0)
|
|
goto error;
|
|
|
|
VIR_DEBUG("name=%s", NULLSTR(name));
|
|
virResetLastError();
|
|
ret = virConnectOpenInternal(name, NULL, VIR_CONNECT_RO);
|
|
if (!ret)
|
|
goto error;
|
|
return ret;
|
|
|
|
error:
|
|
virDispatchError(NULL);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/**
|
|
* virConnectOpenAuth:
|
|
* @name: (optional) URI of the hypervisor
|
|
* @auth: Authenticate callback parameters
|
|
* @flags: bitwise-OR of virConnectFlags
|
|
*
|
|
* This function should be called first to get a connection to the
|
|
* Hypervisor. If necessary, authentication will be performed fetching
|
|
* credentials via the callback
|
|
*
|
|
* See virConnectOpen for notes about environment variables which can
|
|
* have an effect on opening drivers and freeing the connection resources
|
|
*
|
|
* URIs are documented at https://libvirt.org/uri.html
|
|
*
|
|
* Returns a pointer to the hypervisor connection or NULL in case of error
|
|
*/
|
|
virConnectPtr
|
|
virConnectOpenAuth(const char *name,
|
|
virConnectAuthPtr auth,
|
|
unsigned int flags)
|
|
{
|
|
virConnectPtr ret = NULL;
|
|
|
|
if (virInitialize() < 0)
|
|
goto error;
|
|
|
|
VIR_DEBUG("name=%s, auth=%p, flags=0x%x", NULLSTR(name), auth, flags);
|
|
virResetLastError();
|
|
ret = virConnectOpenInternal(name, auth, flags);
|
|
if (!ret)
|
|
goto error;
|
|
return ret;
|
|
|
|
error:
|
|
virDispatchError(NULL);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
* virConnectClose:
|
|
* @conn: pointer to the hypervisor connection
|
|
*
|
|
* This function closes the connection to the Hypervisor. This should
|
|
* not be called if further interaction with the Hypervisor are needed
|
|
* especially if there is running domain which need further monitoring by
|
|
* the application.
|
|
*
|
|
* Connections are reference counted; the count is explicitly
|
|
* increased by the initial open (virConnectOpen, virConnectOpenAuth,
|
|
* and the like) as well as virConnectRef; it is also temporarily
|
|
* increased by other API that depend on the connection remaining
|
|
* alive. The open and every virConnectRef call should have a
|
|
* matching virConnectClose, and all other references will be released
|
|
* after the corresponding operation completes.
|
|
*
|
|
* Returns a positive number if at least 1 reference remains on
|
|
* success. The returned value should not be assumed to be the total
|
|
* reference count. A return of 0 implies no references remain and
|
|
* the connection is closed and memory has been freed. A return of -1
|
|
* implies a failure.
|
|
*
|
|
* It is possible for the last virConnectClose to return a positive
|
|
* value if some other object still has a temporary reference to the
|
|
* connection, but the application should not try to further use a
|
|
* connection after the virConnectClose that matches the initial open.
|
|
*/
|
|
int
|
|
virConnectClose(virConnectPtr conn)
|
|
{
|
|
VIR_DEBUG("conn=%p", conn);
|
|
|
|
virResetLastError();
|
|
|
|
virCheckConnectReturn(conn, -1);
|
|
|
|
if (!virObjectUnref(conn))
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
|
|
/* Helper function called to validate incoming client array on any
|
|
* interface that sets typed parameters in the hypervisor. */
|
|
int
|
|
virTypedParameterValidateSet(virConnectPtr conn,
|
|
virTypedParameterPtr params,
|
|
int nparams)
|
|
{
|
|
bool string_okay;
|
|
size_t i;
|
|
|
|
string_okay = VIR_DRV_SUPPORTS_FEATURE(conn->driver,
|
|
conn,
|
|
VIR_DRV_FEATURE_TYPED_PARAM_STRING);
|
|
for (i = 0; i < nparams; i++) {
|
|
if (strnlen(params[i].field, VIR_TYPED_PARAM_FIELD_LENGTH) ==
|
|
VIR_TYPED_PARAM_FIELD_LENGTH) {
|
|
virReportInvalidArg(params,
|
|
_("string parameter name '%.*s' too long"),
|
|
VIR_TYPED_PARAM_FIELD_LENGTH,
|
|
params[i].field);
|
|
return -1;
|
|
}
|
|
if (params[i].type == VIR_TYPED_PARAM_STRING) {
|
|
if (string_okay) {
|
|
if (!params[i].value.s) {
|
|
virReportInvalidArg(params,
|
|
_("NULL string parameter '%s'"),
|
|
params[i].field);
|
|
return -1;
|
|
}
|
|
} else {
|
|
virReportInvalidArg(params,
|
|
_("string parameter '%s' unsupported"),
|
|
params[i].field);
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|