Skip to content

Commit 6bdec65

Browse files
committed
SMM is not enabled when TPM is enabled in VMware source client
Related to: harvester/harvester#7984 Signed-off-by: Volker Theile <[email protected]>
1 parent 5288366 commit 6bdec65

File tree

3 files changed

+102
-22
lines changed

3 files changed

+102
-22
lines changed

pkg/source/openstack/client.go

+6-7
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ import (
2727
corev1 "k8s.io/api/core/v1"
2828
"k8s.io/apimachinery/pkg/api/resource"
2929
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
30+
"k8s.io/utils/pointer"
3031
kubevirt "kubevirt.io/api/core/v1"
3132

3233
migration "github.com/harvester/vm-import-controller/pkg/apis/migration.harvesterhci.io/v1beta1"
@@ -409,8 +410,6 @@ func (c *Client) IsPoweredOff(vm *migration.VirtualMachineImport) (bool, error)
409410
}
410411

411412
func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*kubevirt.VirtualMachine, error) {
412-
var boolFalse = false
413-
var boolTrue = true
414413
vmObj, err := c.findVM(vm.Spec.VirtualMachineName)
415414
if err != nil {
416415
return nil, fmt.Errorf("error finding VM in GenerateVirtualMachine: %v", err)
@@ -471,7 +470,7 @@ func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*ku
471470
},
472471
Features: &kubevirt.Features{
473472
ACPI: kubevirt.FeatureState{
474-
Enabled: &boolTrue,
473+
Enabled: pointer.Bool(true),
475474
},
476475
},
477476
},
@@ -524,20 +523,20 @@ func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*ku
524523
firmware := &kubevirt.Firmware{
525524
Bootloader: &kubevirt.Bootloader{
526525
EFI: &kubevirt.EFI{
527-
SecureBoot: &boolFalse,
526+
SecureBoot: pointer.Bool(false),
528527
},
529528
},
530529
}
531530
if secureboot {
532-
firmware.Bootloader.EFI.SecureBoot = &boolTrue
531+
firmware.Bootloader.EFI.SecureBoot = pointer.Bool(true)
533532
vmSpec.Template.Spec.Domain.Features.SMM = &kubevirt.FeatureState{
534-
Enabled: &boolTrue,
533+
Enabled: pointer.Bool(true),
535534
}
536535
}
537536
vmSpec.Template.Spec.Domain.Firmware = firmware
538537
if tpm {
539538
vmSpec.Template.Spec.Domain.Features.SMM = &kubevirt.FeatureState{
540-
Enabled: &boolTrue,
539+
Enabled: pointer.Bool(true),
541540
}
542541
vmSpec.Template.Spec.Domain.Devices.TPM = &kubevirt.TPMDevice{}
543542
}

pkg/source/vmware/client.go

+11-11
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ import (
2121
corev1 "k8s.io/api/core/v1"
2222
"k8s.io/apimachinery/pkg/api/resource"
2323
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
24+
"k8s.io/utils/pointer"
2425
kubevirt "kubevirt.io/api/core/v1"
2526

2627
migration "github.com/harvester/vm-import-controller/pkg/apis/migration.harvesterhci.io/v1beta1"
@@ -293,9 +294,6 @@ func (c *Client) IsPoweredOff(vm *migration.VirtualMachineImport) (bool, error)
293294
}
294295

295296
func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*kubevirt.VirtualMachine, error) {
296-
var boolFalse = false
297-
var boolTrue = true
298-
299297
vmObj, err := c.findVM(vm.Spec.Folder, vm.Spec.VirtualMachineName)
300298
if err != nil {
301299
return nil, fmt.Errorf("error quering vm in GenerateVirtualMachine: %v", err)
@@ -344,7 +342,7 @@ func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*ku
344342
},
345343
Features: &kubevirt.Features{
346344
ACPI: kubevirt.FeatureState{
347-
Enabled: &boolTrue,
345+
Enabled: pointer.Bool(true),
348346
},
349347
},
350348
},
@@ -394,27 +392,29 @@ func (c *Client) GenerateVirtualMachine(vm *migration.VirtualMachineImport) (*ku
394392
}
395393

396394
// setup bios/efi, secureboot and tpm settings
397-
398395
if o.Config.Firmware == "efi" {
399396
firmware := &kubevirt.Firmware{
400397
Bootloader: &kubevirt.Bootloader{
401398
EFI: &kubevirt.EFI{
402-
SecureBoot: &boolFalse,
399+
SecureBoot: pointer.Bool(false),
403400
},
404401
},
405402
}
406-
if *o.Config.BootOptions.EfiSecureBootEnabled {
407-
firmware.Bootloader.EFI.SecureBoot = &boolTrue
403+
if pointer.BoolDeref(o.Config.BootOptions.EfiSecureBootEnabled, false) {
404+
firmware.Bootloader.EFI.SecureBoot = pointer.Bool(true)
408405
vmSpec.Template.Spec.Domain.Features.SMM = &kubevirt.FeatureState{
409-
Enabled: &boolTrue,
406+
Enabled: pointer.Bool(true),
410407
}
411408
}
412409
vmSpec.Template.Spec.Domain.Firmware = firmware
413-
if *o.Summary.Config.TpmPresent {
414-
410+
if pointer.BoolDeref(o.Summary.Config.TpmPresent, false) {
411+
vmSpec.Template.Spec.Domain.Features.SMM = &kubevirt.FeatureState{
412+
Enabled: pointer.Bool(true),
413+
}
415414
vmSpec.Template.Spec.Domain.Devices.TPM = &kubevirt.TPMDevice{}
416415
}
417416
}
417+
418418
vmSpec.Template.Spec.Networks = networkConfig
419419
vmSpec.Template.Spec.Domain.Devices.Interfaces = interfaces
420420
newVM.Spec = vmSpec

pkg/source/vmware/client_test.go

+85-4
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,12 @@ import (
1010

1111
"github.com/ory/dockertest/v3"
1212
"github.com/stretchr/testify/require"
13+
"github.com/vmware/govmomi/find"
1314
"github.com/vmware/govmomi/vim25/mo"
15+
"github.com/vmware/govmomi/vim25/types"
1416
corev1 "k8s.io/api/core/v1"
1517
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
18+
"k8s.io/utils/pointer"
1619

1720
migration "github.com/harvester/vm-import-controller/pkg/apis/migration.harvesterhci.io/v1beta1"
1821
"github.com/harvester/vm-import-controller/pkg/server"
@@ -27,10 +30,11 @@ func TestMain(t *testing.M) {
2730
log.Fatalf("error connecting to dockerd: %v", err)
2831
}
2932

33+
// https://hub.docker.com/r/vmware/vcsim
3034
runOpts := &dockertest.RunOptions{
3135
Name: "vcsim",
3236
Repository: "vmware/vcsim",
33-
Tag: "v0.29.0",
37+
Tag: "v0.49.0",
3438
}
3539

3640
vcsimMock, err := pool.RunWithOptions(runOpts)
@@ -202,7 +206,7 @@ func Test_ExportVirtualMachine(t *testing.T) {
202206
}
203207

204208
err = c.ExportVirtualMachine(vm)
205-
assert.NoError(err, "expected no error during vm export")
209+
assert.NoError(err, "expected no error during VM export")
206210
t.Log(vm.Status)
207211
}
208212

@@ -247,14 +251,91 @@ func Test_GenerateVirtualMachine(t *testing.T) {
247251
}
248252

249253
newVM, err := c.GenerateVirtualMachine(vm)
250-
assert.NoError(err, "expected no error during vm export")
254+
assert.NoError(err, "expected no error during VM CR generation")
251255
assert.Len(newVM.Spec.Template.Spec.Networks, 1, "should have found the default pod network")
252256
assert.Len(newVM.Spec.Template.Spec.Domain.Devices.Interfaces, 1, "should have found a network map")
253257
assert.Equal(newVM.Spec.Template.Spec.Domain.Memory.Guest.String(), "32M", "expected VM to have 32M memory")
254258
assert.NotEmpty(newVM.Spec.Template.Spec.Domain.Resources.Limits, "expect to find resource requests to be present")
255259

256260
}
257261

262+
func Test_GenerateVirtualMachine_secureboot(t *testing.T) {
263+
assert := require.New(t)
264+
ctx := context.TODO()
265+
endpoint := fmt.Sprintf("https://localhost:%s/sdk", vcsimPort)
266+
secret := &corev1.Secret{
267+
ObjectMeta: metav1.ObjectMeta{
268+
Name: "test",
269+
Namespace: "default",
270+
},
271+
Data: map[string][]byte{
272+
"username": []byte("user"),
273+
"password": []byte("pass"),
274+
},
275+
}
276+
vm := &migration.VirtualMachineImport{
277+
ObjectMeta: metav1.ObjectMeta{
278+
Name: "demo",
279+
Namespace: "default",
280+
},
281+
Spec: migration.VirtualMachineImportSpec{
282+
SourceCluster: corev1.ObjectReference{},
283+
VirtualMachineName: "test01",
284+
Mapping: []migration.NetworkMapping{
285+
{
286+
SourceNetwork: "DVSwitch: fea97929-4b2d-5972-b146-930c6d0b4014",
287+
DestinationNetwork: "default/vlan",
288+
},
289+
},
290+
},
291+
}
292+
293+
c, err := NewClient(ctx, endpoint, "DC0", secret)
294+
assert.NoError(err, "expected no error during creation of client")
295+
err = c.Verify()
296+
assert.NoError(err, "expected no error during verification of client")
297+
298+
// https://github.com/vmware/govmomi/blob/main/vcsim/README.md#default-vcenter-inventory
299+
f := find.NewFinder(c.Client.Client, true)
300+
301+
dc, err := f.Datacenter(ctx, c.dc)
302+
assert.NoError(err, "expected no error during datacenter lookup")
303+
304+
f.SetDatacenter(dc)
305+
306+
ds, err := f.DefaultDatastore(ctx)
307+
assert.NoError(err, "expected no error during datastore lookup")
308+
309+
pool, err := f.ResourcePool(ctx, "DC0_H0/Resources")
310+
assert.NoError(err, "expected no error during resource pool lookup")
311+
312+
folder, err := dc.Folders(ctx)
313+
assert.NoError(err, "expected no error during folder lookup")
314+
315+
vmConfigSpec := types.VirtualMachineConfigSpec{
316+
Name: vm.Spec.VirtualMachineName,
317+
GuestId: string(types.VirtualMachineGuestOsIdentifierOtherGuest64),
318+
Firmware: string(types.GuestOsDescriptorFirmwareTypeEfi),
319+
BootOptions: &types.VirtualMachineBootOptions{
320+
EfiSecureBootEnabled: pointer.Bool(true),
321+
},
322+
Files: &types.VirtualMachineFileInfo{
323+
VmPathName: fmt.Sprintf("[%s] %s", ds.Name(), vm.Spec.VirtualMachineName),
324+
},
325+
}
326+
327+
task, err := folder.VmFolder.CreateVM(ctx, vmConfigSpec, pool, nil)
328+
assert.NoError(err, "expected no error when creating VM")
329+
330+
_, err = task.WaitForResult(ctx, nil)
331+
assert.NoError(err, "expected no error when waiting for task to complete: %v")
332+
333+
newVM, err := c.GenerateVirtualMachine(vm)
334+
assert.NoError(err, "expected no error during VM CR generation")
335+
assert.True(*newVM.Spec.Template.Spec.Domain.Firmware.Bootloader.EFI.SecureBoot, "expected VM to have secure boot enabled")
336+
assert.True(*newVM.Spec.Template.Spec.Domain.Features.SMM.Enabled, "expected VM to have SMM enabled")
337+
}
338+
258339
func Test_identifyNetworkCards(t *testing.T) {
259340
ctx := context.TODO()
260341
endpoint := fmt.Sprintf("https://localhost:%s/sdk", vcsimPort)
@@ -277,7 +358,7 @@ func Test_identifyNetworkCards(t *testing.T) {
277358
assert.NoError(err, "expected no error during verification of client")
278359

279360
vmObj, err := c.findVM("", "DC0_H0_VM0")
280-
assert.NoError(err, "expected no error during vm lookup")
361+
assert.NoError(err, "expected no error during VM lookup")
281362

282363
var o mo.VirtualMachine
283364

0 commit comments

Comments
 (0)