2024-03-31 10:10:06 +00:00
|
|
|
use std::{
|
|
|
|
collections::{hash_map::Entry, HashMap},
|
|
|
|
sync::Arc,
|
|
|
|
time::Duration,
|
|
|
|
};
|
2024-03-23 02:10:30 +00:00
|
|
|
|
2024-03-15 16:11:35 +00:00
|
|
|
use anyhow::{anyhow, Result};
|
2024-04-14 17:19:38 -07:00
|
|
|
use krata::launchcfg::LaunchPackedFormat;
|
2024-03-24 05:52:25 +00:00
|
|
|
use krata::v1::{
|
2024-03-15 16:11:35 +00:00
|
|
|
common::{
|
2024-03-23 02:10:30 +00:00
|
|
|
guest_image_spec::Image, Guest, GuestErrorInfo, GuestExitInfo, GuestNetworkState,
|
2024-04-16 01:53:44 -07:00
|
|
|
GuestState, GuestStatus, OciImageFormat,
|
2024-03-15 16:11:35 +00:00
|
|
|
},
|
|
|
|
control::GuestChangedEvent,
|
|
|
|
};
|
2024-04-15 10:24:14 -07:00
|
|
|
use krataoci::packer::{service::OciPackerService, OciPackedFormat};
|
2024-03-27 02:54:39 +00:00
|
|
|
use kratart::{launch::GuestLaunchRequest, GuestInfo, Runtime};
|
2024-03-23 02:10:30 +00:00
|
|
|
use log::{error, info, trace, warn};
|
2024-03-31 10:10:06 +00:00
|
|
|
use tokio::{
|
|
|
|
select,
|
|
|
|
sync::{
|
|
|
|
mpsc::{channel, Receiver, Sender},
|
2024-04-02 00:56:18 +00:00
|
|
|
Mutex, RwLock,
|
2024-03-31 10:10:06 +00:00
|
|
|
},
|
|
|
|
task::JoinHandle,
|
|
|
|
time::sleep,
|
|
|
|
};
|
2024-03-15 16:11:35 +00:00
|
|
|
use uuid::Uuid;
|
|
|
|
|
|
|
|
use crate::{
|
|
|
|
db::GuestStore,
|
|
|
|
event::{DaemonEvent, DaemonEventContext},
|
2024-04-21 21:00:32 -07:00
|
|
|
glt::GuestLookupTable,
|
2024-03-15 16:11:35 +00:00
|
|
|
};
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
const PARALLEL_LIMIT: u32 = 5;
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
enum GuestReconcilerResult {
|
|
|
|
Unchanged,
|
|
|
|
Changed { rerun: bool },
|
|
|
|
}
|
|
|
|
|
2024-03-31 10:10:06 +00:00
|
|
|
struct GuestReconcilerEntry {
|
|
|
|
task: JoinHandle<()>,
|
|
|
|
sender: Sender<()>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Drop for GuestReconcilerEntry {
|
|
|
|
fn drop(&mut self) {
|
|
|
|
self.task.abort();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Clone)]
|
2024-03-15 16:11:35 +00:00
|
|
|
pub struct GuestReconciler {
|
2024-04-21 21:00:32 -07:00
|
|
|
glt: GuestLookupTable,
|
2024-03-15 16:11:35 +00:00
|
|
|
guests: GuestStore,
|
|
|
|
events: DaemonEventContext,
|
|
|
|
runtime: Runtime,
|
2024-04-15 10:24:14 -07:00
|
|
|
packer: OciPackerService,
|
2024-03-31 10:10:06 +00:00
|
|
|
tasks: Arc<Mutex<HashMap<Uuid, GuestReconcilerEntry>>>,
|
2024-04-02 00:56:18 +00:00
|
|
|
guest_reconciler_notify: Sender<Uuid>,
|
|
|
|
reconcile_lock: Arc<RwLock<()>>,
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl GuestReconciler {
|
2024-04-02 00:56:18 +00:00
|
|
|
pub fn new(
|
2024-04-21 21:00:32 -07:00
|
|
|
glt: GuestLookupTable,
|
2024-04-02 00:56:18 +00:00
|
|
|
guests: GuestStore,
|
|
|
|
events: DaemonEventContext,
|
|
|
|
runtime: Runtime,
|
2024-04-15 10:24:14 -07:00
|
|
|
packer: OciPackerService,
|
2024-04-02 00:56:18 +00:00
|
|
|
guest_reconciler_notify: Sender<Uuid>,
|
|
|
|
) -> Result<Self> {
|
2024-03-15 16:11:35 +00:00
|
|
|
Ok(Self {
|
2024-04-21 21:00:32 -07:00
|
|
|
glt,
|
2024-03-15 16:11:35 +00:00
|
|
|
guests,
|
|
|
|
events,
|
|
|
|
runtime,
|
2024-04-15 10:24:14 -07:00
|
|
|
packer,
|
2024-03-31 10:10:06 +00:00
|
|
|
tasks: Arc::new(Mutex::new(HashMap::new())),
|
2024-04-02 00:56:18 +00:00
|
|
|
guest_reconciler_notify,
|
|
|
|
reconcile_lock: Arc::new(RwLock::with_max_readers((), PARALLEL_LIMIT)),
|
2024-03-15 16:11:35 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn launch(self, mut notify: Receiver<Uuid>) -> Result<JoinHandle<()>> {
|
|
|
|
Ok(tokio::task::spawn(async move {
|
2024-03-23 02:10:30 +00:00
|
|
|
if let Err(error) = self.reconcile_runtime(true).await {
|
2024-03-15 16:11:35 +00:00
|
|
|
error!("runtime reconciler failed: {}", error);
|
|
|
|
}
|
|
|
|
|
|
|
|
loop {
|
2024-03-23 02:10:30 +00:00
|
|
|
select! {
|
|
|
|
x = notify.recv() => match x {
|
|
|
|
None => {
|
|
|
|
break;
|
|
|
|
},
|
|
|
|
|
|
|
|
Some(uuid) => {
|
2024-03-31 10:10:06 +00:00
|
|
|
if let Err(error) = self.launch_task_if_needed(uuid).await {
|
|
|
|
error!("failed to start guest reconciler task {}: {}", uuid, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
let map = self.tasks.lock().await;
|
|
|
|
if let Some(entry) = map.get(&uuid) {
|
|
|
|
if let Err(error) = entry.sender.send(()).await {
|
|
|
|
error!("failed to notify guest reconciler task {}: {}", uuid, error);
|
|
|
|
}
|
2024-03-23 02:10:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2024-03-23 07:00:12 +00:00
|
|
|
_ = sleep(Duration::from_secs(5)) => {
|
2024-03-23 02:10:30 +00:00
|
|
|
if let Err(error) = self.reconcile_runtime(false).await {
|
|
|
|
error!("runtime reconciler failed: {}", error);
|
|
|
|
}
|
|
|
|
}
|
2024-03-15 16:11:35 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
2024-03-23 02:10:30 +00:00
|
|
|
pub async fn reconcile_runtime(&self, initial: bool) -> Result<()> {
|
2024-04-02 00:56:18 +00:00
|
|
|
let _permit = self.reconcile_lock.write().await;
|
2024-03-23 02:10:30 +00:00
|
|
|
trace!("reconciling runtime");
|
2024-03-15 16:11:35 +00:00
|
|
|
let runtime_guests = self.runtime.list().await?;
|
|
|
|
let stored_guests = self.guests.list().await?;
|
2024-04-21 21:00:32 -07:00
|
|
|
|
|
|
|
let non_existent_guests = runtime_guests
|
|
|
|
.iter()
|
|
|
|
.filter(|x| !stored_guests.iter().any(|g| *g.0 == x.uuid))
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
for guest in non_existent_guests {
|
|
|
|
warn!("destroying unknown runtime guest {}", guest.uuid);
|
|
|
|
if let Err(error) = self.runtime.destroy(guest.uuid).await {
|
|
|
|
error!(
|
|
|
|
"failed to destroy unknown runtime guest {}: {}",
|
|
|
|
guest.uuid, error
|
|
|
|
);
|
|
|
|
}
|
|
|
|
self.guests.remove(guest.uuid).await?;
|
|
|
|
}
|
|
|
|
|
2024-03-30 09:29:03 +00:00
|
|
|
for (uuid, mut stored_guest) in stored_guests {
|
2024-03-23 02:10:30 +00:00
|
|
|
let previous_guest = stored_guest.clone();
|
2024-03-15 16:11:35 +00:00
|
|
|
let runtime_guest = runtime_guests.iter().find(|x| x.uuid == uuid);
|
|
|
|
match runtime_guest {
|
|
|
|
None => {
|
|
|
|
let mut state = stored_guest.state.as_mut().cloned().unwrap_or_default();
|
|
|
|
if state.status() == GuestStatus::Started {
|
2024-03-23 07:00:12 +00:00
|
|
|
state.status = GuestStatus::Starting.into();
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
stored_guest.state = Some(state);
|
|
|
|
}
|
|
|
|
|
2024-03-23 02:10:30 +00:00
|
|
|
Some(runtime) => {
|
2024-04-21 21:00:32 -07:00
|
|
|
self.glt.associate(uuid, runtime.domid).await;
|
2024-03-15 16:11:35 +00:00
|
|
|
let mut state = stored_guest.state.as_mut().cloned().unwrap_or_default();
|
2024-03-23 02:10:30 +00:00
|
|
|
if let Some(code) = runtime.state.exit_code {
|
|
|
|
state.status = GuestStatus::Exited.into();
|
|
|
|
state.exit_info = Some(GuestExitInfo { code });
|
|
|
|
} else {
|
|
|
|
state.status = GuestStatus::Started.into();
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
2024-03-27 02:54:39 +00:00
|
|
|
state.network = Some(guestinfo_to_networkstate(runtime));
|
2024-03-23 07:00:12 +00:00
|
|
|
stored_guest.state = Some(state);
|
2024-03-23 02:10:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-30 09:29:03 +00:00
|
|
|
let changed = stored_guest != previous_guest;
|
2024-03-23 02:10:30 +00:00
|
|
|
|
|
|
|
if changed || initial {
|
2024-03-30 09:29:03 +00:00
|
|
|
self.guests.update(uuid, stored_guest).await?;
|
2024-04-02 00:56:18 +00:00
|
|
|
let _ = self.guest_reconciler_notify.try_send(uuid);
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
pub async fn reconcile(&self, uuid: Uuid) -> Result<bool> {
|
|
|
|
let _runtime_reconcile_permit = self.reconcile_lock.read().await;
|
2024-03-30 09:29:03 +00:00
|
|
|
let Some(mut guest) = self.guests.read(uuid).await? else {
|
2024-03-15 16:11:35 +00:00
|
|
|
warn!(
|
|
|
|
"notified of reconcile for guest {} but it didn't exist",
|
|
|
|
uuid
|
|
|
|
);
|
2024-04-02 00:56:18 +00:00
|
|
|
return Ok(false);
|
2024-03-15 16:11:35 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
info!("reconciling guest {}", uuid);
|
|
|
|
|
|
|
|
self.events
|
|
|
|
.send(DaemonEvent::GuestChanged(GuestChangedEvent {
|
|
|
|
guest: Some(guest.clone()),
|
|
|
|
}))?;
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
let start_status = guest.state.as_ref().map(|x| x.status()).unwrap_or_default();
|
|
|
|
let result = match start_status {
|
2024-03-30 09:29:03 +00:00
|
|
|
GuestStatus::Starting => self.start(uuid, &mut guest).await,
|
2024-04-02 00:56:18 +00:00
|
|
|
GuestStatus::Exited => self.exited(&mut guest).await,
|
|
|
|
GuestStatus::Destroying => self.destroy(uuid, &mut guest).await,
|
|
|
|
_ => Ok(GuestReconcilerResult::Unchanged),
|
2024-03-15 16:11:35 +00:00
|
|
|
};
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
let result = match result {
|
|
|
|
Ok(result) => result,
|
2024-03-15 16:11:35 +00:00
|
|
|
Err(error) => {
|
|
|
|
guest.state = Some(guest.state.as_mut().cloned().unwrap_or_default());
|
2024-03-23 07:00:12 +00:00
|
|
|
guest.state.as_mut().unwrap().status = GuestStatus::Failed.into();
|
2024-03-15 16:11:35 +00:00
|
|
|
guest.state.as_mut().unwrap().error_info = Some(GuestErrorInfo {
|
|
|
|
message: error.to_string(),
|
|
|
|
});
|
2024-03-31 01:44:28 +00:00
|
|
|
warn!("failed to start guest {}: {}", guest.id, error);
|
2024-04-02 00:56:18 +00:00
|
|
|
GuestReconcilerResult::Changed { rerun: false }
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
info!("reconciled guest {}", uuid);
|
|
|
|
|
2024-03-23 07:00:12 +00:00
|
|
|
let status = guest.state.as_ref().map(|x| x.status()).unwrap_or_default();
|
2024-04-02 00:56:18 +00:00
|
|
|
let destroyed = status == GuestStatus::Destroyed;
|
2024-03-15 16:11:35 +00:00
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
let rerun = if let GuestReconcilerResult::Changed { rerun } = result {
|
2024-03-15 16:11:35 +00:00
|
|
|
let event = DaemonEvent::GuestChanged(GuestChangedEvent {
|
|
|
|
guest: Some(guest.clone()),
|
|
|
|
});
|
|
|
|
|
|
|
|
if destroyed {
|
|
|
|
self.guests.remove(uuid).await?;
|
2024-03-31 10:10:06 +00:00
|
|
|
let mut map = self.tasks.lock().await;
|
|
|
|
map.remove(&uuid);
|
2024-03-15 16:11:35 +00:00
|
|
|
} else {
|
2024-03-30 09:29:03 +00:00
|
|
|
self.guests.update(uuid, guest.clone()).await?;
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
self.events.send(event)?;
|
2024-04-02 00:56:18 +00:00
|
|
|
rerun
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
};
|
2024-03-15 16:11:35 +00:00
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
Ok(rerun)
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
async fn start(&self, uuid: Uuid, guest: &mut Guest) -> Result<GuestReconcilerResult> {
|
2024-03-15 16:11:35 +00:00
|
|
|
let Some(ref spec) = guest.spec else {
|
|
|
|
return Err(anyhow!("guest spec not specified"));
|
|
|
|
};
|
|
|
|
|
|
|
|
let Some(ref image) = spec.image else {
|
|
|
|
return Err(anyhow!("image spec not provided"));
|
|
|
|
};
|
|
|
|
let oci = match image.image {
|
|
|
|
Some(Image::Oci(ref oci)) => oci,
|
|
|
|
None => {
|
|
|
|
return Err(anyhow!("oci spec not specified"));
|
|
|
|
}
|
|
|
|
};
|
2024-03-27 02:54:39 +00:00
|
|
|
let task = spec.task.as_ref().cloned().unwrap_or_default();
|
|
|
|
|
2024-04-15 10:24:14 -07:00
|
|
|
let image = self
|
|
|
|
.packer
|
|
|
|
.recall(
|
|
|
|
&oci.digest,
|
|
|
|
match oci.format() {
|
2024-04-16 01:53:44 -07:00
|
|
|
OciImageFormat::Unknown => OciPackedFormat::Squashfs,
|
|
|
|
OciImageFormat::Squashfs => OciPackedFormat::Squashfs,
|
|
|
|
OciImageFormat::Erofs => OciPackedFormat::Erofs,
|
|
|
|
OciImageFormat::Tar => {
|
|
|
|
return Err(anyhow!("tar image format is not supported for guests"));
|
|
|
|
}
|
2024-04-15 10:24:14 -07:00
|
|
|
},
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let Some(image) = image else {
|
|
|
|
return Err(anyhow!(
|
|
|
|
"image {} in the requested format did not exist",
|
|
|
|
oci.digest
|
|
|
|
));
|
|
|
|
};
|
|
|
|
|
2024-03-15 16:11:35 +00:00
|
|
|
let info = self
|
|
|
|
.runtime
|
|
|
|
.launch(GuestLaunchRequest {
|
2024-04-14 17:19:38 -07:00
|
|
|
format: LaunchPackedFormat::Squashfs,
|
2024-03-15 16:11:35 +00:00
|
|
|
uuid: Some(uuid),
|
|
|
|
name: if spec.name.is_empty() {
|
|
|
|
None
|
|
|
|
} else {
|
2024-04-15 10:24:14 -07:00
|
|
|
Some(spec.name.clone())
|
2024-03-15 16:11:35 +00:00
|
|
|
},
|
2024-04-15 10:24:14 -07:00
|
|
|
image,
|
2024-03-15 16:11:35 +00:00
|
|
|
vcpus: spec.vcpus,
|
|
|
|
mem: spec.mem,
|
2024-03-27 02:54:39 +00:00
|
|
|
env: task
|
|
|
|
.environment
|
2024-03-24 05:25:48 +00:00
|
|
|
.iter()
|
|
|
|
.map(|x| (x.key.clone(), x.value.clone()))
|
|
|
|
.collect::<HashMap<_, _>>(),
|
2024-03-27 02:54:39 +00:00
|
|
|
run: empty_vec_optional(task.command.clone()),
|
2024-03-15 16:11:35 +00:00
|
|
|
debug: false,
|
|
|
|
})
|
|
|
|
.await?;
|
2024-04-21 21:00:32 -07:00
|
|
|
self.glt.associate(uuid, info.domid).await;
|
2024-03-15 16:11:35 +00:00
|
|
|
info!("started guest {}", uuid);
|
|
|
|
guest.state = Some(GuestState {
|
|
|
|
status: GuestStatus::Started.into(),
|
2024-03-27 02:54:39 +00:00
|
|
|
network: Some(guestinfo_to_networkstate(&info)),
|
2024-03-15 16:11:35 +00:00
|
|
|
exit_info: None,
|
|
|
|
error_info: None,
|
2024-04-21 21:00:32 -07:00
|
|
|
host: self.glt.host_uuid().to_string(),
|
2024-03-27 02:54:39 +00:00
|
|
|
domid: info.domid,
|
2024-03-15 16:11:35 +00:00
|
|
|
});
|
2024-04-02 00:56:18 +00:00
|
|
|
Ok(GuestReconcilerResult::Changed { rerun: false })
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
async fn exited(&self, guest: &mut Guest) -> Result<GuestReconcilerResult> {
|
|
|
|
if let Some(ref mut state) = guest.state {
|
|
|
|
state.set_status(GuestStatus::Destroying);
|
|
|
|
Ok(GuestReconcilerResult::Changed { rerun: true })
|
|
|
|
} else {
|
|
|
|
Ok(GuestReconcilerResult::Unchanged)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn destroy(&self, uuid: Uuid, guest: &mut Guest) -> Result<GuestReconcilerResult> {
|
2024-03-22 23:59:02 +00:00
|
|
|
if let Err(error) = self.runtime.destroy(uuid).await {
|
2024-03-23 07:00:12 +00:00
|
|
|
trace!("failed to destroy runtime guest {}: {}", uuid, error);
|
2024-03-22 23:59:02 +00:00
|
|
|
}
|
|
|
|
|
2024-04-21 21:00:32 -07:00
|
|
|
let domid = guest.state.as_ref().map(|x| x.domid);
|
|
|
|
|
|
|
|
if let Some(domid) = domid {
|
|
|
|
self.glt.remove(uuid, domid).await;
|
|
|
|
}
|
|
|
|
|
2024-03-15 16:11:35 +00:00
|
|
|
info!("destroyed guest {}", uuid);
|
|
|
|
guest.state = Some(GuestState {
|
|
|
|
status: GuestStatus::Destroyed.into(),
|
2024-03-23 07:00:12 +00:00
|
|
|
network: None,
|
2024-03-15 16:11:35 +00:00
|
|
|
exit_info: None,
|
|
|
|
error_info: None,
|
2024-04-21 21:00:32 -07:00
|
|
|
host: self.glt.host_uuid().to_string(),
|
|
|
|
domid: domid.unwrap_or(u32::MAX),
|
2024-03-15 16:11:35 +00:00
|
|
|
});
|
2024-04-02 00:56:18 +00:00
|
|
|
Ok(GuestReconcilerResult::Changed { rerun: false })
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
2024-03-31 10:10:06 +00:00
|
|
|
|
|
|
|
async fn launch_task_if_needed(&self, uuid: Uuid) -> Result<()> {
|
|
|
|
let mut map = self.tasks.lock().await;
|
|
|
|
match map.entry(uuid) {
|
|
|
|
Entry::Occupied(_) => {}
|
|
|
|
Entry::Vacant(entry) => {
|
|
|
|
entry.insert(self.launch_task(uuid).await?);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn launch_task(&self, uuid: Uuid) -> Result<GuestReconcilerEntry> {
|
|
|
|
let this = self.clone();
|
|
|
|
let (sender, mut receiver) = channel(10);
|
|
|
|
let task = tokio::task::spawn(async move {
|
2024-04-02 00:56:18 +00:00
|
|
|
'notify_loop: loop {
|
|
|
|
if receiver.recv().await.is_none() {
|
|
|
|
break 'notify_loop;
|
|
|
|
}
|
|
|
|
|
|
|
|
'rerun_loop: loop {
|
|
|
|
let rerun = match this.reconcile(uuid).await {
|
|
|
|
Ok(rerun) => rerun,
|
|
|
|
Err(error) => {
|
|
|
|
error!("failed to reconcile guest {}: {}", uuid, error);
|
|
|
|
false
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if rerun {
|
|
|
|
continue 'rerun_loop;
|
|
|
|
}
|
|
|
|
break 'rerun_loop;
|
2024-03-31 10:10:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
Ok(GuestReconcilerEntry { task, sender })
|
|
|
|
}
|
2024-03-15 16:11:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn empty_vec_optional<T>(value: Vec<T>) -> Option<Vec<T>> {
|
|
|
|
if value.is_empty() {
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some(value)
|
|
|
|
}
|
|
|
|
}
|
2024-03-27 02:54:39 +00:00
|
|
|
|
|
|
|
fn guestinfo_to_networkstate(info: &GuestInfo) -> GuestNetworkState {
|
|
|
|
GuestNetworkState {
|
|
|
|
guest_ipv4: info.guest_ipv4.map(|x| x.to_string()).unwrap_or_default(),
|
|
|
|
guest_ipv6: info.guest_ipv6.map(|x| x.to_string()).unwrap_or_default(),
|
|
|
|
guest_mac: info.guest_mac.as_ref().cloned().unwrap_or_default(),
|
|
|
|
gateway_ipv4: info.gateway_ipv4.map(|x| x.to_string()).unwrap_or_default(),
|
|
|
|
gateway_ipv6: info.gateway_ipv6.map(|x| x.to_string()).unwrap_or_default(),
|
|
|
|
gateway_mac: info.gateway_mac.as_ref().cloned().unwrap_or_default(),
|
|
|
|
}
|
|
|
|
}
|