tag v0.155.0 Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com> Changes with 0.155.0 ---------------- * Fedora 43: add shadow-utils when LockRoot is enabled, update cloud-init service name (osbuild/images#1618) * Author: Achilleas Koutsou, Reviewers: Gianluca Zuccarelli, Michael Vogt * Update osbuild dependency commit ID to latest (osbuild/images#1609) * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger, Tomáš Hozza * Update snapshots to 20250626 (osbuild/images#1623) * Author: SchutzBot, Reviewers: Achilleas Koutsou, Simon de Vlieger * distro/rhel9: xz compress azure-cvm image type [HMS-8587] (osbuild/images#1620) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza * distro/rhel: introduce new image type: Azure SAP Apps [HMS-8738] (osbuild/images#1612) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza * distro/rhel: move ansible-core to sap_extras_pkgset (osbuild/images#1624) * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Tomáš Hozza * github/create-tag: allow passing the version when run manually (osbuild/images#1621) * Author: Achilleas Koutsou, Reviewers: Lukáš Zapletal, Tomáš Hozza * rhel9: move image-config into pure YAML (HMS-8593) (osbuild/images#1616) * Author: Michael Vogt, Reviewers: Achilleas Koutsou, Simon de Vlieger * test: split manifest checksums into separate files (osbuild/images#1625) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza — Somewhere on the Internet, 2025-06-30 --- tag v0.156.0 Tagger: imagebuilder-bot <imagebuilder-bots+imagebuilder-bot@redhat.com> Changes with 0.156.0 ---------------- * Many: delete repositories for EOL distributions (HMS-7044) (osbuild/images#1607) * Author: Tomáš Hozza, Reviewers: Michael Vogt, Simon de Vlieger * RHSM/facts: add 'image-builder CLI' API type (osbuild/images#1640) * Author: Tomáš Hozza, Reviewers: Brian C. Lane, Simon de Vlieger * Update dependencies 2025-06-29 (osbuild/images#1628) * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza * Update osbuild dependency commit ID to latest (osbuild/images#1627) * Author: SchutzBot, Reviewers: Simon de Vlieger, Tomáš Hozza * [RFC] image: drop `InstallWeakDeps` from image.DiskImage (osbuild/images#1642) * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger, Tomáš Hozza * build(deps): bump the go-deps group across 1 directory with 3 updates (osbuild/images#1632) * Author: dependabot[bot], Reviewers: SchutzBot, Tomáš Hozza * distro/rhel10: xz compress azure-cvm image type (osbuild/images#1638) * Author: Achilleas Koutsou, Reviewers: Brian C. Lane, Simon de Vlieger * distro: cleanup/refactor distro/{defs,generic} (HMS-8744) (osbuild/images#1570) * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza * distro: remove some hardcoded values from generic/images.go (osbuild/images#1636) * Author: Michael Vogt, Reviewers: Simon de Vlieger, Tomáš Hozza * distro: small tweaks for the YAML based imagetypes (osbuild/images#1622) * Author: Michael Vogt, Reviewers: Brian C. Lane, Simon de Vlieger * fedora/wsl: packages and locale (osbuild/images#1635) * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza * image/many: make compression more generic (osbuild/images#1634) * Author: Simon de Vlieger, Reviewers: Brian C. Lane, Michael Vogt * manifest: handle content template name with spaces (osbuild/images#1641) * Author: Bryttanie, Reviewers: Brian C. Lane, Michael Vogt, Tomáš Hozza * many: implement gzip (osbuild/images#1633) * Author: Simon de Vlieger, Reviewers: Michael Vogt, Tomáš Hozza * rhel/azure: set GRUB_TERMINAL based on architecture [RHEL-91383] (osbuild/images#1626) * Author: Achilleas Koutsou, Reviewers: Simon de Vlieger, Tomáš Hozza — Somewhere on the Internet, 2025-07-07 ---
351 lines
8.7 KiB
Go
351 lines
8.7 KiB
Go
// © Broadcom. All Rights Reserved.
|
|
// The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package cache
|
|
|
|
import (
|
|
"context"
|
|
"crypto/sha256"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/url"
|
|
"os"
|
|
"os/user"
|
|
"path/filepath"
|
|
|
|
"github.com/vmware/govmomi/fault"
|
|
"github.com/vmware/govmomi/session"
|
|
"github.com/vmware/govmomi/vapi/rest"
|
|
"github.com/vmware/govmomi/vim25"
|
|
"github.com/vmware/govmomi/vim25/soap"
|
|
"github.com/vmware/govmomi/vim25/types"
|
|
)
|
|
|
|
// Client interface to support client session caching
|
|
type Client interface {
|
|
json.Marshaler
|
|
json.Unmarshaler
|
|
|
|
Valid() bool
|
|
Path() string
|
|
}
|
|
|
|
// Session provides methods to cache authenticated vim25.Client and rest.Client sessions.
|
|
// Use of session cache avoids the expense of creating and deleting vSphere sessions.
|
|
// It also helps avoid the problem of "leaking sessions", as Session.Login will only
|
|
// create a new authenticated session if the cached session does not exist or is invalid.
|
|
// By default, username/password authentication is used to create new sessions.
|
|
// The Session.Login{SOAP,REST} fields can be set to use other methods,
|
|
// such as SAML token authentication (see govc session.login for example).
|
|
//
|
|
// When Reauth is set to true, Login skips loading file cache and performs username/password
|
|
// authentication, which is helpful in the case that the password in URL is different than
|
|
// previously cached session. Comparing to `Passthrough`, the file cache will be updated after
|
|
// authentication is done.
|
|
type Session struct {
|
|
URL *url.URL // URL of a vCenter or ESXi instance
|
|
DirSOAP string // DirSOAP cache directory. Defaults to "$HOME/.govmomi/sessions"
|
|
DirREST string // DirREST cache directory. Defaults to "$HOME/.govmomi/rest_sessions"
|
|
Insecure bool // Insecure param for soap.NewClient (tls.Config.InsecureSkipVerify)
|
|
Passthrough bool // Passthrough disables caching when set to true
|
|
Reauth bool // Reauth skips loading of cached sessions when set to true
|
|
|
|
LoginSOAP func(context.Context, *vim25.Client) error // LoginSOAP defaults to session.Manager.Login()
|
|
LoginREST func(context.Context, *rest.Client) error // LoginREST defaults to rest.Client.Login()
|
|
}
|
|
|
|
var (
|
|
home = os.Getenv("GOVMOMI_HOME")
|
|
)
|
|
|
|
func init() {
|
|
if home == "" {
|
|
dir, err := os.UserHomeDir()
|
|
if err != nil {
|
|
dir = os.Getenv("HOME")
|
|
}
|
|
home = filepath.Join(dir, ".govmomi")
|
|
}
|
|
}
|
|
|
|
// Endpoint returns a copy of the Session.URL with Password, Query and Fragment removed.
|
|
func (s *Session) Endpoint() *url.URL {
|
|
if s.URL == nil {
|
|
return nil
|
|
}
|
|
p := &url.URL{
|
|
Scheme: s.URL.Scheme,
|
|
Host: s.URL.Host,
|
|
Path: s.URL.Path,
|
|
}
|
|
if u := s.URL.User; u != nil {
|
|
p.User = url.User(u.Username()) // Remove password
|
|
}
|
|
return p
|
|
}
|
|
|
|
// key is a digest of the URL scheme + username + host + Client.Path()
|
|
func (s *Session) key(path string) string {
|
|
p := s.Endpoint()
|
|
p.Path = path
|
|
|
|
// Key session file off of full URI and insecure setting.
|
|
// Hash key to get a predictable, canonical format.
|
|
key := fmt.Sprintf("%s#insecure=%t", p.String(), s.Insecure)
|
|
return fmt.Sprintf("%064x", sha256.Sum256([]byte(key)))
|
|
}
|
|
|
|
func (s *Session) file(p string) string {
|
|
dir := ""
|
|
|
|
switch p {
|
|
case rest.Path:
|
|
dir = s.DirREST
|
|
if dir == "" {
|
|
dir = filepath.Join(home, "rest_sessions")
|
|
}
|
|
default:
|
|
dir = s.DirSOAP
|
|
if dir == "" {
|
|
dir = filepath.Join(home, "sessions")
|
|
}
|
|
}
|
|
|
|
return filepath.Join(dir, s.key(p))
|
|
}
|
|
|
|
// Save a Client in the file cache.
|
|
// Session will not be saved if Session.Passthrough is true.
|
|
func (s *Session) Save(c Client) error {
|
|
if s.Passthrough {
|
|
return nil
|
|
}
|
|
|
|
p := s.file(c.Path())
|
|
|
|
err := os.MkdirAll(filepath.Dir(p), 0700)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
f, err := os.OpenFile(p, os.O_CREATE|os.O_WRONLY, 0600)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = json.NewEncoder(f).Encode(c)
|
|
if err != nil {
|
|
_ = f.Close()
|
|
return err
|
|
}
|
|
|
|
return f.Close()
|
|
}
|
|
|
|
func (s *Session) get(c Client) (bool, error) {
|
|
f, err := os.Open(s.file(c.Path()))
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
return false, nil
|
|
}
|
|
|
|
return false, err
|
|
}
|
|
|
|
dec := json.NewDecoder(f)
|
|
err = dec.Decode(c)
|
|
if err != nil {
|
|
_ = f.Close()
|
|
return false, err
|
|
}
|
|
|
|
return c.Valid(), f.Close()
|
|
}
|
|
|
|
func localTicket(ctx context.Context, m *session.Manager) (*url.Userinfo, error) {
|
|
name := os.Getenv("USER")
|
|
u, err := user.Current()
|
|
if err == nil {
|
|
name = u.Username
|
|
}
|
|
|
|
ticket, err := m.AcquireLocalTicket(ctx, name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
password, err := os.ReadFile(ticket.PasswordFilePath)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return url.UserPassword(ticket.UserName, string(password)), nil
|
|
}
|
|
|
|
func (s *Session) loginSOAP(ctx context.Context, c *vim25.Client) error {
|
|
m := session.NewManager(c)
|
|
u := s.URL.User
|
|
name := u.Username()
|
|
|
|
if name == "" && !c.IsVC() {
|
|
// If no username is provided, try to acquire a local ticket.
|
|
// When invoked remotely, ESX returns an InvalidRequestFault.
|
|
// So, rather than return an error here, fallthrough to Login() with the original User to
|
|
// to avoid what would be a confusing error message.
|
|
luser, lerr := localTicket(ctx, m)
|
|
if lerr == nil {
|
|
// We are running directly on an ESX or Workstation host and can use the ticket with Login()
|
|
u = luser
|
|
name = u.Username()
|
|
}
|
|
}
|
|
if name == "" {
|
|
// ServiceContent does not require authentication
|
|
return nil
|
|
}
|
|
|
|
return m.Login(ctx, u)
|
|
}
|
|
|
|
func (s *Session) loginREST(ctx context.Context, c *rest.Client) error {
|
|
return c.Login(ctx, s.URL.User)
|
|
}
|
|
|
|
func soapSessionValid(ctx context.Context, client *vim25.Client) (bool, error) {
|
|
m := session.NewManager(client)
|
|
u, err := m.UserSession(ctx)
|
|
if err != nil {
|
|
if fault.Is(err, &types.ManagedObjectNotFound{}) {
|
|
// If the PropertyCollector is not found, the saved session for this URL is not valid
|
|
return false, nil
|
|
}
|
|
|
|
return false, err
|
|
}
|
|
|
|
return u != nil, nil
|
|
}
|
|
|
|
func restSessionValid(ctx context.Context, client *rest.Client) (bool, error) {
|
|
s, err := client.Session(ctx)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
return s != nil, nil
|
|
}
|
|
|
|
// Load a Client from the file cache.
|
|
// Returns false if no cache exists or is invalid.
|
|
// An error is returned if the file cannot be opened or is not json encoded.
|
|
// After loading the Client from the file:
|
|
// Returns true if the session is still valid, false otherwise indicating the client requires authentication.
|
|
// An error is returned if the session ID cannot be validated.
|
|
// Returns false if Session.Passthrough is true.
|
|
func (s *Session) Load(ctx context.Context, c Client, config func(*soap.Client) error) (bool, error) {
|
|
if s.Passthrough || s.Reauth {
|
|
return false, nil
|
|
}
|
|
|
|
ok, err := s.get(c)
|
|
if err != nil {
|
|
return false, err
|
|
|
|
}
|
|
if !ok {
|
|
return false, nil
|
|
}
|
|
|
|
switch client := c.(type) {
|
|
case *vim25.Client:
|
|
if config != nil {
|
|
if err := config(client.Client); err != nil {
|
|
return false, err
|
|
}
|
|
}
|
|
return soapSessionValid(ctx, client)
|
|
case *rest.Client:
|
|
if config != nil {
|
|
if err := config(client.Client); err != nil {
|
|
return false, err
|
|
}
|
|
}
|
|
return restSessionValid(ctx, client)
|
|
default:
|
|
panic(fmt.Sprintf("unsupported client type=%T", client))
|
|
}
|
|
}
|
|
|
|
// Login returns a cached session via Load() if valid.
|
|
// Otherwise, creates a new authenticated session and saves to the cache.
|
|
// The config func can be used to apply soap.Client configuration, such as TLS settings.
|
|
// When Session.Passthrough is true, Login will always create a new session.
|
|
func (s *Session) Login(ctx context.Context, c Client, config func(*soap.Client) error) error {
|
|
ok, err := s.Load(ctx, c, config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if ok {
|
|
return nil
|
|
}
|
|
|
|
sc := soap.NewClient(s.URL, s.Insecure)
|
|
|
|
if config != nil {
|
|
err = config(sc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
switch client := c.(type) {
|
|
case *vim25.Client:
|
|
vc, err := vim25.NewClient(ctx, sc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
login := s.loginSOAP
|
|
if s.LoginSOAP != nil {
|
|
login = s.LoginSOAP
|
|
}
|
|
if err = login(ctx, vc); err != nil {
|
|
return err
|
|
}
|
|
|
|
*client = *vc
|
|
c = client
|
|
case *rest.Client:
|
|
client.Client = sc.NewServiceClient(rest.Path, "")
|
|
|
|
login := s.loginREST
|
|
if s.LoginREST != nil {
|
|
login = s.LoginREST
|
|
}
|
|
if err = login(ctx, client); err != nil {
|
|
return err
|
|
}
|
|
|
|
c = client
|
|
default:
|
|
panic(fmt.Sprintf("unsupported client type=%T", client))
|
|
}
|
|
|
|
return s.Save(c)
|
|
}
|
|
|
|
// Login calls the Logout method for the given Client if Session.Passthrough is true.
|
|
// Otherwise returns nil.
|
|
func (s *Session) Logout(ctx context.Context, c Client) error {
|
|
if s.Passthrough {
|
|
switch client := c.(type) {
|
|
case *vim25.Client:
|
|
return session.NewManager(client).Logout(ctx)
|
|
case *rest.Client:
|
|
return client.Logout(ctx)
|
|
default:
|
|
panic(fmt.Sprintf("unsupported client type=%T", client))
|
|
}
|
|
}
|
|
return nil
|
|
}
|