debian-forge-composer/vendor/github.com/vmware/govmomi/session/cache/session.go
Achilleas Koutsou 3fd7092db5 go.mod: update osbuild/images to v0.156.0
tag v0.155.0
Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com>

Changes with 0.155.0

----------------
  * Fedora 43: add shadow-utils when LockRoot is enabled, update cloud-init service name (osbuild/images#1618)
    * Author: Achilleas Koutsou, Reviewers: Gianluca Zuccarelli, Michael Vogt
  * Update osbuild dependency commit ID to latest (osbuild/images#1609)
    * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger, Tomáš Hozza
  * Update snapshots to 20250626 (osbuild/images#1623)
    * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger
  * distro/rhel9: xz compress azure-cvm image type [HMS-8587] (osbuild/images#1620)
    * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza
  * distro/rhel: introduce new image type: Azure SAP Apps [HMS-8738] (osbuild/images#1612)
    * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza
  * distro/rhel: move ansible-core to sap_extras_pkgset (osbuild/images#1624)
    * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Tomáš Hozza
  * github/create-tag: allow passing the version when run manually (osbuild/images#1621)
    * Author: Achilleas Koutsou, Reviewers: Lukáš Zapletal, Tomáš Hozza
  * rhel9: move image-config into pure YAML (HMS-8593) (osbuild/images#1616)
    * Author: Michael Vogt, Reviewers: Achilleas Koutsou, Simon de Vlieger
  * test: split manifest checksums into separate files (osbuild/images#1625)
    * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza

— Somewhere on the Internet, 2025-06-30

---

tag v0.156.0
Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com>

Changes with 0.156.0

----------------
  * Many: delete repositories for EOL distributions (HMS-7044) (osbuild/images#1607)
    * Author: Tomáš Hozza, Reviewers: Michael Vogt, Simon de Vlieger
  * RHSM/facts: add 'image-builder CLI' API type (osbuild/images#1640)
    * Author: Tomáš Hozza, Reviewers: Brian C. Lane, Simon de Vlieger
  * Update dependencies 2025-06-29 (osbuild/images#1628)
    * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza
  * Update osbuild dependency commit ID to latest (osbuild/images#1627)
    * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza
  * [RFC] image: drop `InstallWeakDeps` from image.DiskImage (osbuild/images#1642)
    * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger, Tomáš Hozza
  * build(deps): bump the go-deps group across 1 directory with 3 updates (osbuild/images#1632)
    * Author: dependabot[bot], Reviewers: SchutzBot, Tomáš Hozza
  * distro/rhel10: xz compress azure-cvm image type (osbuild/images#1638)
    * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Simon de Vlieger
  * distro: cleanup/refactor distro/{defs,generic} (HMS-8744) (osbuild/images#1570)
    * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza
  * distro: remove some hardcoded values from generic/images.go (osbuild/images#1636)
    * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza
  * distro: small tweaks for the YAML based imagetypes (osbuild/images#1622)
    * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger
  * fedora/wsl: packages and locale (osbuild/images#1635)
    * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza
  * image/many: make compression more generic (osbuild/images#1634)
    * Author: Simon de Vlieger, Reviewers: Brian C. Lane, Michael Vogt
  * manifest: handle content template name with spaces (osbuild/images#1641)
    * Author: Bryttanie, Reviewers: Brian C. Lane, Michael Vogt, Tomáš Hozza
  * many: implement gzip (osbuild/images#1633)
    * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza
  * rhel/azure: set GRUB_TERMINAL based on architecture [RHEL-91383] (osbuild/images#1626)
    * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza

— Somewhere on the Internet, 2025-07-07

---
2025-07-14 13:13:20 +02:00

351 lines
8.7 KiB
Go

// © Broadcom. All Rights Reserved.
// The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
// SPDX-License-Identifier: Apache-2.0
package cache
import (
"context"
"crypto/sha256"
"encoding/json"
"fmt"
"net/url"
"os"
"os/user"
"path/filepath"
"github.com/vmware/govmomi/fault"
"github.com/vmware/govmomi/session"
"github.com/vmware/govmomi/vapi/rest"
"github.com/vmware/govmomi/vim25"
"github.com/vmware/govmomi/vim25/soap"
"github.com/vmware/govmomi/vim25/types"
)
// Client interface to support client session caching
type Client interface {
json.Marshaler
json.Unmarshaler
Valid() bool
Path() string
}
// Session provides methods to cache authenticated vim25.Client and rest.Client sessions.
// Use of session cache avoids the expense of creating and deleting vSphere sessions.
// It also helps avoid the problem of "leaking sessions", as Session.Login will only
// create a new authenticated session if the cached session does not exist or is invalid.
// By default, username/password authentication is used to create new sessions.
// The Session.Login{SOAP,REST} fields can be set to use other methods,
// such as SAML token authentication (see govc session.login for example).
//
// When Reauth is set to true, Login skips loading file cache and performs username/password
// authentication, which is helpful in the case that the password in URL is different than
// previously cached session. Comparing to `Passthrough`, the file cache will be updated after
// authentication is done.
type Session struct {
URL *url.URL // URL of a vCenter or ESXi instance
DirSOAP string // DirSOAP cache directory. Defaults to "$HOME/.govmomi/sessions"
DirREST string // DirREST cache directory. Defaults to "$HOME/.govmomi/rest_sessions"
Insecure bool // Insecure param for soap.NewClient (tls.Config.InsecureSkipVerify)
Passthrough bool // Passthrough disables caching when set to true
Reauth bool // Reauth skips loading of cached sessions when set to true
LoginSOAP func(context.Context, *vim25.Client) error // LoginSOAP defaults to session.Manager.Login()
LoginREST func(context.Context, *rest.Client) error // LoginREST defaults to rest.Client.Login()
}
var (
home = os.Getenv("GOVMOMI_HOME")
)
func init() {
if home == "" {
dir, err := os.UserHomeDir()
if err != nil {
dir = os.Getenv("HOME")
}
home = filepath.Join(dir, ".govmomi")
}
}
// Endpoint returns a copy of the Session.URL with Password, Query and Fragment removed.
func (s *Session) Endpoint() *url.URL {
if s.URL == nil {
return nil
}
p := &url.URL{
Scheme: s.URL.Scheme,
Host: s.URL.Host,
Path: s.URL.Path,
}
if u := s.URL.User; u != nil {
p.User = url.User(u.Username()) // Remove password
}
return p
}
// key is a digest of the URL scheme + username + host + Client.Path()
func (s *Session) key(path string) string {
p := s.Endpoint()
p.Path = path
// Key session file off of full URI and insecure setting.
// Hash key to get a predictable, canonical format.
key := fmt.Sprintf("%s#insecure=%t", p.String(), s.Insecure)
return fmt.Sprintf("%064x", sha256.Sum256([]byte(key)))
}
func (s *Session) file(p string) string {
dir := ""
switch p {
case rest.Path:
dir = s.DirREST
if dir == "" {
dir = filepath.Join(home, "rest_sessions")
}
default:
dir = s.DirSOAP
if dir == "" {
dir = filepath.Join(home, "sessions")
}
}
return filepath.Join(dir, s.key(p))
}
// Save a Client in the file cache.
// Session will not be saved if Session.Passthrough is true.
func (s *Session) Save(c Client) error {
if s.Passthrough {
return nil
}
p := s.file(c.Path())
err := os.MkdirAll(filepath.Dir(p), 0700)
if err != nil {
return err
}
f, err := os.OpenFile(p, os.O_CREATE|os.O_WRONLY, 0600)
if err != nil {
return err
}
err = json.NewEncoder(f).Encode(c)
if err != nil {
_ = f.Close()
return err
}
return f.Close()
}
func (s *Session) get(c Client) (bool, error) {
f, err := os.Open(s.file(c.Path()))
if err != nil {
if os.IsNotExist(err) {
return false, nil
}
return false, err
}
dec := json.NewDecoder(f)
err = dec.Decode(c)
if err != nil {
_ = f.Close()
return false, err
}
return c.Valid(), f.Close()
}
func localTicket(ctx context.Context, m *session.Manager) (*url.Userinfo, error) {
name := os.Getenv("USER")
u, err := user.Current()
if err == nil {
name = u.Username
}
ticket, err := m.AcquireLocalTicket(ctx, name)
if err != nil {
return nil, err
}
password, err := os.ReadFile(ticket.PasswordFilePath)
if err != nil {
return nil, err
}
return url.UserPassword(ticket.UserName, string(password)), nil
}
func (s *Session) loginSOAP(ctx context.Context, c *vim25.Client) error {
m := session.NewManager(c)
u := s.URL.User
name := u.Username()
if name == "" && !c.IsVC() {
// If no username is provided, try to acquire a local ticket.
// When invoked remotely, ESX returns an InvalidRequestFault.
// So, rather than return an error here, fallthrough to Login() with the original User to
// to avoid what would be a confusing error message.
luser, lerr := localTicket(ctx, m)
if lerr == nil {
// We are running directly on an ESX or Workstation host and can use the ticket with Login()
u = luser
name = u.Username()
}
}
if name == "" {
// ServiceContent does not require authentication
return nil
}
return m.Login(ctx, u)
}
func (s *Session) loginREST(ctx context.Context, c *rest.Client) error {
return c.Login(ctx, s.URL.User)
}
func soapSessionValid(ctx context.Context, client *vim25.Client) (bool, error) {
m := session.NewManager(client)
u, err := m.UserSession(ctx)
if err != nil {
if fault.Is(err, &types.ManagedObjectNotFound{}) {
// If the PropertyCollector is not found, the saved session for this URL is not valid
return false, nil
}
return false, err
}
return u != nil, nil
}
func restSessionValid(ctx context.Context, client *rest.Client) (bool, error) {
s, err := client.Session(ctx)
if err != nil {
return false, err
}
return s != nil, nil
}
// Load a Client from the file cache.
// Returns false if no cache exists or is invalid.
// An error is returned if the file cannot be opened or is not json encoded.
// After loading the Client from the file:
// Returns true if the session is still valid, false otherwise indicating the client requires authentication.
// An error is returned if the session ID cannot be validated.
// Returns false if Session.Passthrough is true.
func (s *Session) Load(ctx context.Context, c Client, config func(*soap.Client) error) (bool, error) {
if s.Passthrough || s.Reauth {
return false, nil
}
ok, err := s.get(c)
if err != nil {
return false, err
}
if !ok {
return false, nil
}
switch client := c.(type) {
case *vim25.Client:
if config != nil {
if err := config(client.Client); err != nil {
return false, err
}
}
return soapSessionValid(ctx, client)
case *rest.Client:
if config != nil {
if err := config(client.Client); err != nil {
return false, err
}
}
return restSessionValid(ctx, client)
default:
panic(fmt.Sprintf("unsupported client type=%T", client))
}
}
// Login returns a cached session via Load() if valid.
// Otherwise, creates a new authenticated session and saves to the cache.
// The config func can be used to apply soap.Client configuration, such as TLS settings.
// When Session.Passthrough is true, Login will always create a new session.
func (s *Session) Login(ctx context.Context, c Client, config func(*soap.Client) error) error {
ok, err := s.Load(ctx, c, config)
if err != nil {
return err
}
if ok {
return nil
}
sc := soap.NewClient(s.URL, s.Insecure)
if config != nil {
err = config(sc)
if err != nil {
return err
}
}
switch client := c.(type) {
case *vim25.Client:
vc, err := vim25.NewClient(ctx, sc)
if err != nil {
return err
}
login := s.loginSOAP
if s.LoginSOAP != nil {
login = s.LoginSOAP
}
if err = login(ctx, vc); err != nil {
return err
}
*client = *vc
c = client
case *rest.Client:
client.Client = sc.NewServiceClient(rest.Path, "")
login := s.loginREST
if s.LoginREST != nil {
login = s.LoginREST
}
if err = login(ctx, client); err != nil {
return err
}
c = client
default:
panic(fmt.Sprintf("unsupported client type=%T", client))
}
return s.Save(c)
}
// Login calls the Logout method for the given Client if Session.Passthrough is true.
// Otherwise returns nil.
func (s *Session) Logout(ctx context.Context, c Client) error {
if s.Passthrough {
switch client := c.(type) {
case *vim25.Client:
return session.NewManager(client).Logout(ctx)
case *rest.Client:
return client.Logout(ctx)
default:
panic(fmt.Sprintf("unsupported client type=%T", client))
}
}
return nil
}