mirror of
https://github.com/xcp-ng/xenadmin.git
synced 2024-12-23 00:46:03 +01:00
7c0bc50b4a
Inc. Signed-off-by: Gabor Apati-Nagy<gabor.apati-nagy@citrix.com>
131 lines
5.5 KiB
C#
131 lines
5.5 KiB
C#
/* Copyright (c) Citrix Systems, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms,
|
|
* with or without modification, are permitted provided
|
|
* that the following conditions are met:
|
|
*
|
|
* * Redistributions of source code must retain the above
|
|
* copyright notice, this list of conditions and the
|
|
* following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above
|
|
* copyright notice, this list of conditions and the
|
|
* following disclaimer in the documentation and/or other
|
|
* materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
|
|
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
|
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
|
|
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Net;
|
|
using XenAdmin.Model;
|
|
using XenAPI;
|
|
|
|
namespace XenAdmin.Actions
|
|
{
|
|
public class SaveHealthCheckSettingsAction : PureAsyncAction
|
|
{
|
|
private static readonly log4net.ILog log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
|
|
|
|
private readonly Pool pool;
|
|
HealthCheckSettings healthCheckSettings;
|
|
private string authenticationToken;
|
|
private string diagnosticToken;
|
|
private string username;
|
|
private string password;
|
|
|
|
public SaveHealthCheckSettingsAction(Pool pool, HealthCheckSettings healthCheckSettings, string authenticationToken, string diagnosticToken, string userName, string passWord, bool suppressHistory)
|
|
: base(pool.Connection, Messages.ACTION_SAVE_HEALTHCHECK_SETTINGS, string.Format(Messages.ACTION_SAVING_HEALTHCHECK_SETTINGS, pool.Name), suppressHistory)
|
|
{
|
|
this.pool = pool;
|
|
this.healthCheckSettings = healthCheckSettings;
|
|
this.authenticationToken = authenticationToken;
|
|
this.diagnosticToken = diagnosticToken;
|
|
this.username = healthCheckSettings.Status == HealthCheckStatus.Enabled ? userName : null;
|
|
this.password = healthCheckSettings.Status == HealthCheckStatus.Enabled ? passWord : null;
|
|
}
|
|
|
|
protected override void Run()
|
|
{
|
|
Dictionary<string, string> newConfig = healthCheckSettings.ToDictionary(pool.health_check_config);
|
|
if (!string.IsNullOrEmpty(authenticationToken))
|
|
{
|
|
log.Info("Saving upload token as xapi secret");
|
|
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_TOKEN_SECRET, authenticationToken);
|
|
}
|
|
if (!string.IsNullOrEmpty(diagnosticToken))
|
|
{
|
|
log.Info("Saving diagnostic token as xapi secret");
|
|
SetSecretInfo(Session, newConfig, HealthCheckSettings.DIAGNOSTIC_TOKEN_SECRET, diagnosticToken);
|
|
}
|
|
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_CREDENTIAL_USER_SECRET, username);
|
|
SetSecretInfo(Session, newConfig, HealthCheckSettings.UPLOAD_CREDENTIAL_PASSWORD_SECRET, password);
|
|
Pool.set_health_check_config(Session, pool.opaque_ref, newConfig);
|
|
}
|
|
|
|
public static void SetSecretInfo(Session session, Dictionary<string, string> config, string infoKey, string infoValue)
|
|
{
|
|
if (string.IsNullOrEmpty(infoKey))
|
|
return;
|
|
|
|
if (infoValue == null)
|
|
{
|
|
if (config.ContainsKey(infoKey))
|
|
{
|
|
TryToDestroySecret(session, config[infoKey]);
|
|
config.Remove(infoKey);
|
|
}
|
|
}
|
|
else if (config.ContainsKey(infoKey))
|
|
{
|
|
try
|
|
{
|
|
string secretRef = Secret.get_by_uuid(session, config[infoKey]);
|
|
Secret.set_value(session, secretRef, infoValue);
|
|
}
|
|
catch (Failure)
|
|
{
|
|
config[infoKey] = Secret.CreateSecret(session, infoValue);
|
|
}
|
|
catch (WebException)
|
|
{
|
|
config[infoKey] = Secret.CreateSecret(session, infoValue);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
config[infoKey] = Secret.CreateSecret(session, infoValue);
|
|
}
|
|
}
|
|
|
|
private static void TryToDestroySecret(Session session, string secret_uuid)
|
|
{
|
|
try
|
|
{
|
|
var secret = Secret.get_by_uuid(session, secret_uuid);
|
|
Secret.destroy(session, secret.opaque_ref);
|
|
log.DebugFormat("Successfully destroyed secret {0}", secret_uuid);
|
|
}
|
|
catch (Exception exn)
|
|
{
|
|
log.Error(string.Format("Failed to destroy secret {0}", secret_uuid), exn);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|