tag v0.155.0 Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com> Changes with 0.155.0 ---------------- * Fedora 43: add shadow-utils when LockRoot is enabled, update cloud-init service name (osbuild/images#1618) * Author: Achilleas Koutsou, Reviewers: Gianluca Zuccarelli, Michael Vogt * Update osbuild dependency commit ID to latest (osbuild/images#1609) * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger, Tomáš Hozza * Update snapshots to 20250626 (osbuild/images#1623) * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger * distro/rhel9: xz compress azure-cvm image type [HMS-8587] (osbuild/images#1620) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza * distro/rhel: introduce new image type: Azure SAP Apps [HMS-8738] (osbuild/images#1612) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza * distro/rhel: move ansible-core to sap_extras_pkgset (osbuild/images#1624) * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Tomáš Hozza * github/create-tag: allow passing the version when run manually (osbuild/images#1621) * Author: Achilleas Koutsou, Reviewers: Lukáš Zapletal, Tomáš Hozza * rhel9: move image-config into pure YAML (HMS-8593) (osbuild/images#1616) * Author: Michael Vogt, Reviewers: Achilleas Koutsou, Simon de Vlieger * test: split manifest checksums into separate files (osbuild/images#1625) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza — Somewhere on the Internet, 2025-06-30 --- tag v0.156.0 Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com> Changes with 0.156.0 ---------------- * Many: delete repositories for EOL distributions (HMS-7044) (osbuild/images#1607) * Author: Tomáš Hozza, Reviewers: Michael Vogt, Simon de Vlieger * RHSM/facts: add 'image-builder CLI' API type (osbuild/images#1640) * Author: Tomáš Hozza, Reviewers: Brian C. Lane, Simon de Vlieger * Update dependencies 2025-06-29 (osbuild/images#1628) * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza * Update osbuild dependency commit ID to latest (osbuild/images#1627) * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza * [RFC] image: drop `InstallWeakDeps` from image.DiskImage (osbuild/images#1642) * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger, Tomáš Hozza * build(deps): bump the go-deps group across 1 directory with 3 updates (osbuild/images#1632) * Author: dependabot[bot], Reviewers: SchutzBot, Tomáš Hozza * distro/rhel10: xz compress azure-cvm image type (osbuild/images#1638) * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Simon de Vlieger * distro: cleanup/refactor distro/{defs,generic} (HMS-8744) (osbuild/images#1570) * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza * distro: remove some hardcoded values from generic/images.go (osbuild/images#1636) * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza * distro: small tweaks for the YAML based imagetypes (osbuild/images#1622) * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger * fedora/wsl: packages and locale (osbuild/images#1635) * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza * image/many: make compression more generic (osbuild/images#1634) * Author: Simon de Vlieger, Reviewers: Brian C. Lane, Michael Vogt * manifest: handle content template name with spaces (osbuild/images#1641) * Author: Bryttanie, Reviewers: Brian C. Lane, Michael Vogt, Tomáš Hozza * many: implement gzip (osbuild/images#1633) * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza * rhel/azure: set GRUB_TERMINAL based on architecture [RHEL-91383] (osbuild/images#1626) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza — Somewhere on the Internet, 2025-07-07 ---
171 lines
4 KiB
Go
171 lines
4 KiB
Go
// © Broadcom. All Rights Reserved.
|
|
// The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package vmdk
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/vmware/govmomi/object"
|
|
"github.com/vmware/govmomi/vim25"
|
|
"github.com/vmware/govmomi/vim25/mo"
|
|
"github.com/vmware/govmomi/vim25/types"
|
|
)
|
|
|
|
type VirtualDiskCryptoKey struct {
|
|
KeyID string
|
|
ProviderID string
|
|
}
|
|
|
|
type VirtualDiskInfo struct {
|
|
CapacityInBytes int64
|
|
DeviceKey int32
|
|
FileName string
|
|
Size int64
|
|
UniqueSize int64
|
|
CryptoKey VirtualDiskCryptoKey
|
|
}
|
|
|
|
// GetVirtualDiskInfoByUUID returns information about a virtual disk identified
|
|
// by the provided UUID. This method is valid for the following backing types:
|
|
//
|
|
// - VirtualDiskFlatVer2BackingInfo
|
|
// - VirtualDiskSeSparseBackingInfo
|
|
// - VirtualDiskRawDiskMappingVer1BackingInfo
|
|
// - VirtualDiskSparseVer2BackingInfo
|
|
// - VirtualDiskRawDiskVer2BackingInfo
|
|
//
|
|
// These are the only backing types that have a UUID property for comparing the
|
|
// provided value.
|
|
func GetVirtualDiskInfoByUUID(
|
|
ctx context.Context,
|
|
client *vim25.Client,
|
|
mo mo.VirtualMachine,
|
|
fetchProperties bool,
|
|
diskUUID string) (VirtualDiskInfo, error) {
|
|
|
|
if diskUUID == "" {
|
|
return VirtualDiskInfo{}, fmt.Errorf("diskUUID is empty")
|
|
}
|
|
|
|
switch {
|
|
case fetchProperties,
|
|
mo.Config == nil,
|
|
mo.Config.Hardware.Device == nil,
|
|
mo.LayoutEx == nil,
|
|
mo.LayoutEx.Disk == nil,
|
|
mo.LayoutEx.File == nil:
|
|
|
|
if ctx == nil {
|
|
return VirtualDiskInfo{}, fmt.Errorf("ctx is nil")
|
|
}
|
|
if client == nil {
|
|
return VirtualDiskInfo{}, fmt.Errorf("client is nil")
|
|
}
|
|
|
|
obj := object.NewVirtualMachine(client, mo.Self)
|
|
|
|
if err := obj.Properties(
|
|
ctx,
|
|
mo.Self,
|
|
[]string{"config", "layoutEx"},
|
|
&mo); err != nil {
|
|
|
|
return VirtualDiskInfo{},
|
|
fmt.Errorf("failed to retrieve properties: %w", err)
|
|
}
|
|
}
|
|
|
|
// Find the disk by UUID by inspecting all of the disk backing types that
|
|
// can have an associated UUID.
|
|
var (
|
|
disk *types.VirtualDisk
|
|
fileName string
|
|
cryptoKey *types.CryptoKeyId
|
|
)
|
|
for i := range mo.Config.Hardware.Device {
|
|
switch tvd := mo.Config.Hardware.Device[i].(type) {
|
|
case *types.VirtualDisk:
|
|
switch tb := tvd.Backing.(type) {
|
|
case *types.VirtualDiskFlatVer2BackingInfo:
|
|
if tb.Uuid == diskUUID {
|
|
disk = tvd
|
|
fileName = tb.FileName
|
|
cryptoKey = tb.KeyId
|
|
}
|
|
case *types.VirtualDiskSeSparseBackingInfo:
|
|
if tb.Uuid == diskUUID {
|
|
disk = tvd
|
|
fileName = tb.FileName
|
|
cryptoKey = tb.KeyId
|
|
}
|
|
case *types.VirtualDiskRawDiskMappingVer1BackingInfo:
|
|
if tb.Uuid == diskUUID {
|
|
disk = tvd
|
|
fileName = tb.FileName
|
|
}
|
|
case *types.VirtualDiskSparseVer2BackingInfo:
|
|
if tb.Uuid == diskUUID {
|
|
disk = tvd
|
|
fileName = tb.FileName
|
|
cryptoKey = tb.KeyId
|
|
}
|
|
case *types.VirtualDiskRawDiskVer2BackingInfo:
|
|
if tb.Uuid == diskUUID {
|
|
disk = tvd
|
|
fileName = tb.DescriptorFileName
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if disk == nil {
|
|
return VirtualDiskInfo{},
|
|
fmt.Errorf("disk not found with uuid %q", diskUUID)
|
|
}
|
|
|
|
// Build a lookup table for determining if file key belongs to this disk
|
|
// chain.
|
|
diskFileKeys := map[int32]struct{}{}
|
|
for i := range mo.LayoutEx.Disk {
|
|
if d := mo.LayoutEx.Disk[i]; d.Key == disk.Key {
|
|
for j := range d.Chain {
|
|
for k := range d.Chain[j].FileKey {
|
|
diskFileKeys[d.Chain[j].FileKey[k]] = struct{}{}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Sum the disk's total size and unique size.
|
|
var (
|
|
size int64
|
|
uniqueSize int64
|
|
)
|
|
for i := range mo.LayoutEx.File {
|
|
f := mo.LayoutEx.File[i]
|
|
if _, ok := diskFileKeys[f.Key]; ok {
|
|
size += f.Size
|
|
uniqueSize += f.UniqueSize
|
|
}
|
|
}
|
|
|
|
di := VirtualDiskInfo{
|
|
CapacityInBytes: disk.CapacityInBytes,
|
|
DeviceKey: disk.Key,
|
|
FileName: fileName,
|
|
Size: size,
|
|
UniqueSize: uniqueSize,
|
|
}
|
|
|
|
if ck := cryptoKey; ck != nil {
|
|
di.CryptoKey.KeyID = ck.KeyId
|
|
if pid := ck.ProviderId; pid != nil {
|
|
di.CryptoKey.ProviderID = pid.Id
|
|
}
|
|
}
|
|
|
|
return di, nil
|
|
}
|