1
0
mirror of https://github.com/lxc/incus.git synced 2026-02-05 09:46:19 +01:00
Files
incus/cmd/incus-agent/main_agent.go
Mujib Ahasan 6fc75dc1e3 incus-agent: Add feature checks
Signed-off-by: Mujib Ahasan <ahasanmujib8@gmail.com>
2025-12-19 03:04:28 -05:00

293 lines
7.3 KiB
Go

package main
import (
"context"
"encoding/json"
"fmt"
"io"
"net/http"
"os"
"os/signal"
"slices"
"sync"
"time"
"github.com/spf13/cobra"
"github.com/lxc/incus/v6/internal/server/instance/instancetype"
"github.com/lxc/incus/v6/shared/logger"
"github.com/lxc/incus/v6/shared/subprocess"
"github.com/lxc/incus/v6/shared/util"
)
var (
servers = make(map[string]*http.Server, 2)
errChan = make(chan error)
)
type cmdAgent struct {
global *cmdGlobal
}
func (c *cmdAgent) Command() *cobra.Command {
cmd := &cobra.Command{}
cmd.Use = "incus-agent [--debug]"
cmd.Short = "Incus virtual machine agent"
cmd.Long = `Description:
Incus virtual machine agent
This daemon is to be run inside virtual machines managed by Incus.
It will normally be started through init scripts present or injected
into the virtual machine.
`
cmd.RunE = c.Run
return cmd
}
func (c *cmdAgent) Run(cmd *cobra.Command, args []string) error {
if c.global.flagService {
return runService("Incus-Agent", c)
}
// Setup logger.
err := logger.InitLogger("", "", c.global.flagLogVerbose, c.global.flagLogDebug, nil)
if err != nil {
return fmt.Errorf("could not initialize logger: %w", err)
}
logger.Info("Starting")
defer logger.Info("Stopped")
// Apply the templated files.
files, err := templatesApply("files/")
if err != nil {
return err
}
// Sync the hostname.
if util.PathExists("/proc/sys/kernel/hostname") && slices.Contains(files, "/etc/hostname") {
// Open the two files.
src, err := os.Open("/etc/hostname")
if err != nil {
return err
}
dst, err := os.Create("/proc/sys/kernel/hostname")
if err != nil {
return err
}
// Copy the data.
_, err = io.Copy(dst, src)
if err != nil {
return err
}
// Close the files.
_ = src.Close()
err = dst.Close()
if err != nil {
return err
}
}
// Run cloud-init.
if util.PathExists("/etc/cloud") && slices.Contains(files, "/var/lib/cloud/seed/nocloud-net/meta-data") {
logger.Info("Seeding cloud-init")
cloudInitPath := "/run/cloud-init"
if util.PathExists(cloudInitPath) {
logger.Info(fmt.Sprintf("Removing %q", cloudInitPath))
err = os.RemoveAll(cloudInitPath)
if err != nil {
return err
}
}
logger.Info("Rebooting")
_, _ = subprocess.RunCommand("reboot")
// Wait up to 5min for the reboot to actually happen, if it doesn't, then move on to allowing connections.
time.Sleep(300 * time.Second)
}
osReconfigureNetworkInterfaces()
// Load the kernel driver.
err = osLoadModules()
if err != nil {
return err
}
d := newDaemon(c.global.flagLogDebug, c.global.flagLogVerbose, c.global.flagSecretsLocation)
// Load the agent configuration.
err = loadAgentConfig(d)
if err != nil {
return err
}
// Mount shares from host.
if d.Features == nil || d.Features["mounts"] {
c.mountHostShares()
}
// Start the server.
err = startHTTPServer(d, c.global.flagLogDebug)
if err != nil {
return fmt.Errorf("Failed to start HTTP server: %w", err)
}
// Check whether we should start the DevIncus server in the early setup. This way, /dev/incus/sock
// will be available for any systemd services starting after the agent.
if util.PathExists("agent.conf") {
f, err := os.Open("agent.conf")
if err != nil {
return err
}
err = setConnectionInfo(d, f)
if err != nil {
_ = f.Close()
return err
}
_ = f.Close()
if d.DevIncusEnabled {
err = startDevIncusServer(d)
if err != nil {
return err
}
}
}
// Create a cancellation context.
ctx, cancelFunc := context.WithCancel(context.Background())
// Start status notifier in background.
cancelStatusNotifier := c.startStatusNotifier(ctx, d.chConnected)
// Done with early setup, tell systemd to continue boot.
// Allows a service that needs a file that's generated by the agent to be able to declare After=incus-agent
// and know the file will have been created by the time the service is started.
if os.Getenv("NOTIFY_SOCKET") != "" {
_, err := subprocess.RunCommand("systemd-notify", "READY=1")
if err != nil {
cancelStatusNotifier() // Ensure STOPPED status is written to QEMU status ringbuffer.
cancelFunc()
return fmt.Errorf("Failed to notify systemd of readiness: %w", err)
}
}
// Cancel context on shutdown signal.
chSignal := make(chan os.Signal, 1)
signal.Notify(chSignal, osShutdownSignal)
select {
case <-chSignal:
case err := <-errChan:
cancelStatusNotifier() // Ensure STOPPED status is written to QEMU status ringbuffer.
cancelFunc()
return err
}
cancelStatusNotifier() // Ensure STOPPED status is written to QEMU status ringbuffer.
cancelFunc()
return nil
}
// startStatusNotifier sends status of agent to vserial ring buffer every 10s or when context is done.
// Returns a function that can be used to update the running status to STOPPED in the ring buffer.
func (c *cmdAgent) startStatusNotifier(ctx context.Context, chConnected <-chan struct{}) context.CancelFunc {
// Write initial started status.
_ = c.writeStatus("STARTED")
wg := sync.WaitGroup{}
exitCtx, exit := context.WithCancel(ctx) // Allows manual synchronous cancellation via cancel function.
cancel := func() {
exit() // Signal for the go routine to end.
wg.Wait() // Wait for the go routine to actually finish.
}
wg.Add(1)
go func() {
defer wg.Done() // Signal to cancel function that we are done.
ticker := time.NewTicker(time.Duration(time.Second) * 5)
defer ticker.Stop()
for {
select {
case <-chConnected:
_ = c.writeStatus("CONNECTED") // Indicate we were able to connect.
case <-ticker.C:
_ = c.writeStatus("STARTED") // Re-populate status periodically in case the daemon restarts.
case <-exitCtx.Done():
_ = c.writeStatus("STOPPED") // Indicate we are stopping and exit go routine.
return
}
}
}()
return cancel
}
// writeStatus writes a status code to the vserial ring buffer used to detect agent status on host.
func (c *cmdAgent) writeStatus(status string) error {
if util.PathExists("/dev/virtio-ports/org.linuxcontainers.incus") {
vSerial, err := os.OpenFile("/dev/virtio-ports/org.linuxcontainers.incus", os.O_RDWR, 0o600)
if err != nil {
return err
}
defer vSerial.Close()
_, err = vSerial.Write(fmt.Appendf(nil, "%s\n", status))
if err != nil {
return err
}
}
return nil
}
// mountHostShares reads the agent-mounts.json file from config share and mounts the shares requested.
func (c *cmdAgent) mountHostShares() {
agentMountsFile := "./agent-mounts.json"
if !util.PathExists(agentMountsFile) {
return
}
b, err := os.ReadFile(agentMountsFile)
if err != nil {
logger.Errorf("Failed to load agent mounts file %q: %v", agentMountsFile, err)
}
var agentMounts []instancetype.VMAgentMount
err = json.Unmarshal(b, &agentMounts)
if err != nil {
logger.Errorf("Failed to parse agent mounts file %q: %v", agentMountsFile, err)
return
}
for _, mount := range agentMounts {
if !slices.Contains([]string{"9p", "virtiofs"}, mount.FSType) {
logger.Infof("Unsupported mount fstype %q", mount.FSType)
continue
}
err = osMountShared(mount.Source, mount.Target, mount.FSType, mount.Options)
if err != nil {
logger.Infof("Failed to mount %q (Type: %q, Options: %v) to %q: %v", mount.Source, "virtiofs", mount.Options, mount.Target, err)
continue
}
logger.Infof("Mounted %q (Type: %q, Options: %v) to %q", mount.Source, mount.FSType, mount.Options, mount.Target)
}
}