- Replace reflink rootfs copy with device-mapper snapshots (shared read-only loop device per base template, per-sandbox sparse CoW file) - Add devicemapper package with create/restore/remove/flatten operations and refcounted LoopRegistry for base image loop devices - Fix pause ordering: destroy VM before removing dm-snapshot to avoid "device busy" error (FC must release the dm device first) - Add test UI at GET /test for sandbox lifecycle management (create, pause, resume, destroy, exec, snapshot create/list/delete) - Fix DirSize to report actual disk usage (stat.Blocks * 512) instead of apparent size, so sparse CoW files report correctly - Add timing logs to pause flow for performance diagnostics - Fix all lint errors across api, network, vm, uffd, and sandbox packages - Remove obsolete internal/filesystem package (replaced by devicemapper) - Update CLAUDE.md with device-mapper architecture documentation
123 lines
3.2 KiB
Go
123 lines
3.2 KiB
Go
package vm
|
|
|
|
import "fmt"
|
|
|
|
// VMConfig holds the configuration for creating a Firecracker microVM.
|
|
type VMConfig struct {
|
|
// SandboxID is the unique identifier for this sandbox (e.g., "sb-a1b2c3d4").
|
|
SandboxID string
|
|
|
|
// KernelPath is the path to the uncompressed Linux kernel (vmlinux).
|
|
KernelPath string
|
|
|
|
// RootfsPath is the path to the rootfs block device for this sandbox.
|
|
// Typically a dm-snapshot device (e.g., /dev/mapper/wrenn-sb-a1b2c3d4).
|
|
RootfsPath string
|
|
|
|
// VCPUs is the number of virtual CPUs to allocate (default: 1).
|
|
VCPUs int
|
|
|
|
// MemoryMB is the amount of RAM in megabytes (default: 512).
|
|
MemoryMB int
|
|
|
|
// NetworkNamespace is the name of the network namespace to launch
|
|
// Firecracker inside (e.g., "ns-1"). The namespace must already exist
|
|
// with a TAP device configured.
|
|
NetworkNamespace string
|
|
|
|
// TapDevice is the name of the TAP device inside the network namespace
|
|
// that Firecracker will attach to (e.g., "tap0").
|
|
TapDevice string
|
|
|
|
// TapMAC is the MAC address for the TAP device.
|
|
TapMAC string
|
|
|
|
// GuestIP is the IP address assigned to the guest VM (e.g., "169.254.0.21").
|
|
GuestIP string
|
|
|
|
// GatewayIP is the gateway IP (the TAP device's IP, e.g., "169.254.0.22").
|
|
GatewayIP string
|
|
|
|
// NetMask is the subnet mask for the guest network (e.g., "255.255.255.252").
|
|
NetMask string
|
|
|
|
// FirecrackerBin is the path to the firecracker binary.
|
|
FirecrackerBin string
|
|
|
|
// SocketPath is the path for the Firecracker API Unix socket.
|
|
SocketPath string
|
|
|
|
// SandboxDir is the tmpfs mount point for per-sandbox files inside the
|
|
// mount namespace (e.g., "/fc-vm").
|
|
SandboxDir string
|
|
|
|
// InitPath is the path to the init process inside the guest.
|
|
// Defaults to "/sbin/init" if empty.
|
|
InitPath string
|
|
}
|
|
|
|
func (c *VMConfig) applyDefaults() {
|
|
if c.VCPUs == 0 {
|
|
c.VCPUs = 1
|
|
}
|
|
if c.MemoryMB == 0 {
|
|
c.MemoryMB = 512
|
|
}
|
|
if c.FirecrackerBin == "" {
|
|
c.FirecrackerBin = "/usr/local/bin/firecracker"
|
|
}
|
|
if c.SocketPath == "" {
|
|
c.SocketPath = fmt.Sprintf("/tmp/fc-%s.sock", c.SandboxID)
|
|
}
|
|
if c.SandboxDir == "" {
|
|
c.SandboxDir = "/tmp/fc-vm"
|
|
}
|
|
if c.TapDevice == "" {
|
|
c.TapDevice = "tap0"
|
|
}
|
|
if c.TapMAC == "" {
|
|
c.TapMAC = "02:FC:00:00:00:05"
|
|
}
|
|
if c.InitPath == "" {
|
|
c.InitPath = "/usr/local/bin/wrenn-init"
|
|
}
|
|
}
|
|
|
|
// kernelArgs builds the kernel command line for the VM.
|
|
func (c *VMConfig) kernelArgs() string {
|
|
// ip= format: <client-ip>::<gw-ip>:<netmask>:<hostname>:<iface>:<autoconf>
|
|
ipArg := fmt.Sprintf("ip=%s::%s:%s:sandbox:eth0:off",
|
|
c.GuestIP, c.GatewayIP, c.NetMask,
|
|
)
|
|
|
|
return fmt.Sprintf(
|
|
"console=ttyS0 reboot=k panic=1 pci=off quiet loglevel=1 init=%s %s",
|
|
c.InitPath, ipArg,
|
|
)
|
|
}
|
|
|
|
func (c *VMConfig) validate() error {
|
|
if c.SandboxID == "" {
|
|
return fmt.Errorf("SandboxID is required")
|
|
}
|
|
if c.KernelPath == "" {
|
|
return fmt.Errorf("KernelPath is required")
|
|
}
|
|
if c.RootfsPath == "" {
|
|
return fmt.Errorf("RootfsPath is required")
|
|
}
|
|
if c.NetworkNamespace == "" {
|
|
return fmt.Errorf("NetworkNamespace is required")
|
|
}
|
|
if c.GuestIP == "" {
|
|
return fmt.Errorf("GuestIP is required")
|
|
}
|
|
if c.GatewayIP == "" {
|
|
return fmt.Errorf("GatewayIP is required")
|
|
}
|
|
if c.NetMask == "" {
|
|
return fmt.Errorf("NetMask is required")
|
|
}
|
|
return nil
|
|
}
|