File: //lib/python3.9/site-packages/ansible_collections/community/vmware/plugins/modules/vmware_guest.py
# -*- coding: utf-8 -*-
# This module is also sponsored by E.T.A.I. (www.etai.fr)
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
from __future__ import absolute_import, division, print_function
__metaclass__ = type
DOCUMENTATION = r'''
---
module: vmware_guest
short_description: Manages virtual machines in vCenter
description: >
This module can be used to create new virtual machines from templates or other virtual machines,
manage power state of virtual machine such as power on, power off, suspend, shutdown, reboot, restart etc.,
modify various virtual machine components like network, disk, customization etc.,
rename a virtual machine and remove a virtual machine with associated components.
author:
- Loic Blot (@nerzhul) <[email protected]>
- Philippe Dellaert (@pdellaert) <[email protected]>
- Abhijeet Kasurde (@Akasurde) <[email protected]>
notes:
- Please make sure that the user used for M(community.vmware.vmware_guest) has the correct level of privileges.
- For example, following is the list of minimum privileges required by users to create virtual machines.
- " DataStore > Allocate Space"
- " Virtual Machine > Configuration > Add New Disk"
- " Virtual Machine > Configuration > Add or Remove Device"
- " Virtual Machine > Inventory > Create New"
- " Network > Assign Network"
- " Resource > Assign Virtual Machine to Resource Pool"
- "Module may require additional privileges as well, which may be required for gathering facts - e.g. ESXi configurations."
- Use SCSI disks instead of IDE when you want to expand online disks by specifying a SCSI controller.
- Uses SysPrep for Windows VM (depends on 'guest_id' parameter match 'win') with PyVmomi.
- In order to change the VM's parameters (e.g. number of CPUs), the VM must be powered off unless the hot-add
support is enabled and the C(state=present) must be used to apply the changes.
- "For additional information please visit Ansible VMware community wiki - U(https://github.com/ansible/community/wiki/VMware)."
options:
state:
description:
- Specify the state the virtual machine should be in.
- If C(state) is set to C(present) and virtual machine exists, ensure the virtual machine configurations conforms to task arguments.
- If C(state) is set to C(absent) and virtual machine exists, then the specified virtual machine is removed with it's associated components.
- If C(state) is set to one of the following C(poweredon), C(powered-on), C(poweredoff), C(powered-off),
C(present), C(restarted), C(suspended) and virtual machine does not exists, virtual machine is deployed with the given parameters.
- If C(state) is set to C(poweredon) or C(powered-on) and virtual machine exists with powerstate other than powered on,
then the specified virtual machine is powered on.
- If C(state) is set to C(poweredoff) or C(powered-off) and virtual machine exists with powerstate other than powered off,
then the specified virtual machine is powered off.
- If C(state) is set to C(restarted) and virtual machine exists, then the virtual machine is restarted.
- If C(state) is set to C(suspended) and virtual machine exists, then the virtual machine is set to suspended mode.
- If C(state) is set to C(shutdownguest) or C(shutdown-guest) and virtual machine exists, then the virtual machine is shutdown.
- If C(state) is set to C(rebootguest) or C(reboot-guest) and virtual machine exists, then the virtual machine is rebooted.
- Powerstate C(powered-on) and C(powered-off) is added in version 2.10.
default: present
type: str
choices: [ absent, poweredon, powered-on, poweredoff, powered-off, present, rebootguest, reboot-guest, restarted, suspended, shutdownguest, shutdown-guest]
name:
description:
- Name of the virtual machine to work with.
- Virtual machine names in vCenter are not necessarily unique, which may be problematic, see C(name_match).
- If multiple virtual machines with same name exists, then C(folder) is required parameter to
identify uniqueness of the virtual machine.
- This parameter is required, if C(state) is set to C(poweredon), C(powered-on), C(poweredoff), C(powered-off),
C(present), C(restarted), C(suspended) and virtual machine does not exists.
- This parameter is case sensitive.
type: str
name_match:
description:
- If multiple virtual machines matching the name, use the first or last found.
default: 'first'
choices: [ 'first', 'last' ]
type: str
uuid:
description:
- UUID of the virtual machine to manage if known, this is VMware's unique identifier.
- This is required if C(name) is not supplied.
- If virtual machine does not exists, then this parameter is ignored.
- Please note that a supplied UUID will be ignored on virtual machine creation, as VMware creates the UUID internally.
type: str
use_instance_uuid:
description:
- Whether to use the VMware instance UUID rather than the BIOS UUID.
default: false
type: bool
template:
description:
- Template or existing virtual machine used to create new virtual machine.
- If this value is not set, virtual machine is created without using a template.
- If the virtual machine already exists, this parameter will be ignored.
- This parameter is case sensitive.
- From version 2.8 onwards, absolute path to virtual machine or template can be used.
aliases: [ 'template_src' ]
type: str
is_template:
description:
- Flag the instance as a template.
- This will mark the given virtual machine as template.
- Note, this may need to be done in a dedicated task invocation that is not making
any other changes. For example, user cannot change the state from powered-on to
powered-off AND save as template in the same task.
- See M(community.vmware.vmware_guest) source for more details.
default: false
type: bool
folder:
description:
- Destination folder, absolute path to find an existing guest or create the new guest.
- "The folder should include the datacenter. ESXi's datacenter is ha-datacenter."
- This parameter is case sensitive.
- 'If multiple machines are found with same name, this parameter is used to identify'
- 'uniqueness of the virtual machine. Added in Ansible 2.5.'
- 'Examples:'
- ' folder: /ha-datacenter/vm'
- ' folder: ha-datacenter/vm'
- ' folder: /datacenter1/vm'
- ' folder: datacenter1/vm'
- ' folder: /datacenter1/vm/folder1'
- ' folder: datacenter1/vm/folder1'
- ' folder: /folder1/datacenter1/vm'
- ' folder: folder1/datacenter1/vm'
- ' folder: /folder1/datacenter1/vm/folder2'
type: str
hardware:
type: dict
default: {}
description:
- "Manage virtual machine's hardware attributes."
- All parameters case sensitive.
suboptions:
hotadd_cpu:
type: bool
description: Allow virtual CPUs to be added while the virtual machine is running.
hotremove_cpu:
type: bool
description: Allow virtual CPUs to be removed while the virtual machine is running.
hotadd_memory:
type: bool
description: Allow memory to be added while the virtual machine is running.
memory_mb:
type: int
description: Amount of memory in MB.
num_cpus:
type: int
description:
- Number of CPUs.
- C(num_cpus) must be a multiple of C(num_cpu_cores_per_socket).
- For example, to create a VM with 2 sockets of 4 cores, specify C(num_cpus) as 8 and C(num_cpu_cores_per_socket) as 4.
num_cpu_cores_per_socket:
type: int
description: Number of Cores Per Socket.
cpu_shares_level:
type: str
choices: [ 'low', 'normal', 'high', 'custom' ]
description:
- The allocation level of CPU resources for the virtual machine.
- Valid Values are C(low), C(normal), C(high) and C(custom).
version_added: '3.2.0'
cpu_shares:
type: int
description:
- The number of shares of CPU allocated to this virtual machine
- cpu_shares_level will automatically be set to 'custom'
version_added: '3.2.0'
vpmc_enabled:
version_added: '3.2.0'
type: bool
description: Enable virtual CPU Performance Counters.
scsi:
type: str
description:
- Valid values are C(buslogic), C(lsilogic), C(lsilogicsas) and C(paravirtual).
- C(paravirtual) is default.
choices: [ 'buslogic', 'lsilogic', 'lsilogicsas', 'paravirtual' ]
secure_boot:
type: bool
description: Whether to enable or disable (U)EFI secure boot.
memory_reservation_lock:
type: bool
description:
- If set C(true), memory resource reservation for the virtual machine.
max_connections:
type: int
description:
- Maximum number of active remote display connections for the virtual machines.
mem_limit:
type: int
description:
- The memory utilization of a virtual machine will not exceed this limit.
- Unit is MB.
mem_reservation:
type: int
description: The amount of memory resource that is guaranteed available to the virtual machine.
aliases: [ 'memory_reservation' ]
mem_shares_level:
type: str
description:
- The allocation level of memory resources for the virtual machine.
- Valid Values are C(low), C(normal), C(high) and C(custom).
choices: [ 'low', 'normal', 'high', 'custom' ]
version_added: '3.2.0'
mem_shares:
type: int
description:
- The number of shares of memory allocated to this virtual machine
- mem_shares_level will automatically be set to 'custom'
version_added: '3.2.0'
cpu_limit:
type: int
description:
- The CPU utilization of a virtual machine will not exceed this limit.
- Unit is MHz.
cpu_reservation:
type: int
description: The amount of CPU resource that is guaranteed available to the virtual machine.
version:
type: str
description:
- The Virtual machine hardware versions.
- Default is 10 (ESXi 5.5 and onwards).
- If set to C(latest), the specified virtual machine will be upgraded to the most current hardware version supported on the host.
- C(latest) is added in Ansible 2.10.
- Please check VMware documentation for correct virtual machine hardware version.
- Incorrect hardware version may lead to failure in deployment. If hardware version is already equal to the given.
boot_firmware:
type: str
description: Choose which firmware should be used to boot the virtual machine.
choices: [ 'bios', 'efi' ]
nested_virt:
type: bool
description:
- Enable nested virtualization.
virt_based_security:
type: bool
description:
- Enable Virtualization Based Security feature for Windows on ESXi 6.7 and later, from hardware version 14.
- Supported Guest OS are Windows 10 64 bit, Windows Server 2016, Windows Server 2019 and later.
- The firmware of virtual machine must be EFI and secure boot must be enabled.
- Virtualization Based Security depends on nested virtualization and Intel Virtualization Technology for Directed I/O.
- Deploy on unsupported ESXi, hardware version or firmware may lead to failure or deployed VM with unexpected configurations.
iommu:
type: bool
description: Flag to specify if I/O MMU is enabled for this virtual machine.
guest_id:
type: str
description:
- Set the guest ID.
- This parameter is case sensitive.
- C(rhel7_64Guest) for virtual machine with RHEL7 64 bit.
- C(centos64Guest) for virtual machine with CentOS 64 bit.
- C(ubuntu64Guest) for virtual machine with Ubuntu 64 bit.
- This field is required when creating a virtual machine, not required when creating from the template.
- >
Valid values are referenced here:
U(https://code.vmware.com/apis/358/doc/vim.vm.GuestOsDescriptor.GuestOsIdentifier.html)
disk:
description:
- A list of disks to add.
- This parameter is case sensitive.
- Shrinking disks is not supported.
- Removing existing disks of the virtual machine is not supported.
- 'Attributes C(controller_type), C(controller_number), C(unit_number) are used to configure multiple types of disk
controllers and disks for creating or reconfiguring virtual machine. Added in Ansible 2.10.'
type: list
default: []
elements: dict
suboptions:
size:
description:
- Disk storage size.
- Please specify storage unit like [kb, mb, gb, tb].
type: str
size_kb:
description: Disk storage size in kb.
type: int
size_mb:
description: Disk storage size in mb.
type: int
size_gb:
description: Disk storage size in gb.
type: int
size_tb:
description: Disk storage size in tb.
type: int
type:
description:
- Type of disk.
- If C(thin) specified, disk type is set to thin disk.
- If C(eagerzeroedthick) specified, disk type is set to eagerzeroedthick disk. Added Ansible 2.5.
- If not specified, disk type is inherited from the source VM or template when cloned and thick disk, no eagerzero otherwise.
type: str
choices: [ 'thin', 'thick', 'eagerzeroedthick' ]
datastore:
type: str
description:
- The name of datastore which will be used for the disk.
- If C(autoselect_datastore) is set to True, will select the less used datastore whose name contains this "disk.datastore" string.
filename:
type: str
description:
- Existing disk image to be used.
- Filename must already exist on the datastore.
- Specify filename string in C([datastore_name] path/to/file.vmdk) format. Added in Ansible 2.8.
autoselect_datastore:
type: bool
description:
- Select the less used datastore.
- C(disk.datastore) and C(disk.autoselect_datastore) will not be used if C(datastore) is specified outside this C(disk) configuration.
disk_mode:
type: str
choices: ['persistent', 'independent_persistent', 'independent_nonpersistent']
description:
- Type of disk mode.
- Added in Ansible 2.6.
- If C(persistent) specified, changes are immediately and permanently written to the virtual disk. This is default.
- If C(independent_persistent) specified, same as persistent, but not affected by snapshots.
- If C(independent_nonpersistent) specified, changes to virtual disk are made to a redo log and discarded at power off,
but not affected by snapshots.
controller_type:
type: str
choices: ['buslogic', 'lsilogic', 'lsilogicsas', 'paravirtual', 'sata', 'nvme']
description:
- Type of disk controller.
- C(nvme) controller type support starts on ESXi 6.5 with VM hardware version C(version) 13.
Set this type on not supported ESXi or VM hardware version will lead to failure in deployment.
- When set to C(sata), please make sure C(unit_number) is correct and not used by SATA CDROMs.
- If set to C(sata) type, please make sure C(controller_number) and C(unit_number) are set correctly when C(cdrom) also set to C(sata) type.
controller_number:
type: int
choices: [0, 1, 2, 3]
description:
- Disk controller bus number.
- The maximum number of same type controller is 4 per VM.
unit_number:
type: int
description:
- Disk Unit Number.
- Valid value range from 0 to 15 for SCSI controller, except 7.
- Valid value range from 0 to 14 for NVME controller.
- Valid value range from 0 to 29 for SATA controller.
- C(controller_type), C(controller_number) and C(unit_number) are required when creating or reconfiguring VMs
with multiple types of disk controllers and disks.
- When creating new VM, the first configured disk in the C(disk) list will be "Hard Disk 1".
nvdimm:
description:
- Add or remove a virtual NVDIMM device to the virtual machine.
- VM virtual hardware version must be 14 or higher on vSphere 6.7 or later.
- Verify that guest OS of the virtual machine supports PMem before adding virtual NVDIMM device.
- Verify that you have the I(Datastore.Allocate) space privilege on the virtual machine.
- Make sure that the host or the cluster on which the virtual machine resides has available PMem resources.
- To add or remove virtual NVDIMM device to the existing virtual machine, it must be in power off state.
type: dict
default: {}
suboptions:
state:
type: str
description:
- Valid value is C(present) or C(absent).
- If set to C(absent), then the NVDIMM device with specified C(label) will be removed.
choices: ['present', 'absent']
size_mb:
type: int
description: Virtual NVDIMM device size in MB.
default: 1024
label:
type: str
description:
- The label of the virtual NVDIMM device to be removed or configured, e.g., "NVDIMM 1".
- 'This parameter is required when C(state) is set to C(absent), or C(present) to reconfigure NVDIMM device
size. When add a new device, please do not set C(label).'
cdrom:
description:
- A list of CD-ROM configurations for the virtual machine. Added in version 2.9.
- Providing CD-ROM configuration as dict is deprecated and will be removed VMware collection 4.0.0.
Please use a list instead.
- 'Parameters C(controller_type), C(controller_number), C(unit_number), C(state) are added for a list of CD-ROMs
configuration support.'
- For C(ide) controller, hot-add or hot-remove CD-ROM is not supported.
type: raw
default: []
suboptions:
type:
type: str
description:
- The type of CD-ROM, valid options are C(none), C(client) or C(iso).
- With C(none) the CD-ROM will be disconnected but present.
- The default value is C(client).
iso_path:
type: str
description:
- The datastore path to the ISO file to use, in the form of C([datastore1] path/to/file.iso).
- Required if type is set C(iso).
controller_type:
type: str
description:
- Valid options are C(ide) and C(sata).
- Default value is C(ide).
- When set to C(sata), please make sure C(unit_number) is correct and not used by SATA disks.
controller_number:
type: int
description:
- For C(ide) controller, valid value is 0 or 1.
- For C(sata) controller, valid value is 0 to 3.
unit_number:
type: int
description:
- For CD-ROM device attach to C(ide) controller, valid value is 0 or 1.
- For CD-ROM device attach to C(sata) controller, valid value is 0 to 29.
- C(controller_number) and C(unit_number) are mandatory attributes.
state:
type: str
description:
- Valid value is C(present) or C(absent).
- Default is C(present).
- If set to C(absent), then the specified CD-ROM will be removed.
resource_pool:
description:
- Use the given resource pool for virtual machine operation.
- This parameter is case sensitive.
- Resource pool should be child of the selected host parent.
- When not specified I(Resources) is taken as default value.
type: str
wait_for_ip_address:
description:
- Wait until vCenter detects an IP address for the virtual machine.
- This requires vmware-tools (vmtoolsd) to properly work after creation.
- "vmware-tools needs to be installed on the given virtual machine in order to work with this parameter."
default: false
type: bool
wait_for_ip_address_timeout:
description:
- Define a timeout (in seconds) for the wait_for_ip_address parameter.
default: '300'
type: int
wait_for_customization_timeout:
description:
- Define a timeout (in seconds) for the wait_for_customization parameter.
- Be careful when setting this value since the time guest customization took may differ among guest OSes.
default: '3600'
type: int
wait_for_customization:
description:
- Wait until vCenter detects all guest customizations as successfully completed.
- When enabled, the VM will automatically be powered on.
- "If vCenter does not detect guest customization start or succeed, failed events after time
C(wait_for_customization_timeout) parameter specified, warning message will be printed and task result is fail."
default: false
type: bool
state_change_timeout:
description:
- If the C(state) is set to C(shutdownguest), by default the module will return immediately after sending the shutdown signal.
- If this argument is set to a positive integer, the module will instead wait for the virtual machine to reach the poweredoff state.
- The value sets a timeout in seconds for the module to wait for the state change.
default: 0
type: int
snapshot_src:
description:
- Name of the existing snapshot to use to create a clone of a virtual machine.
- This parameter is case sensitive.
- While creating linked clone using C(linked_clone) parameter, this parameter is required.
type: str
linked_clone:
description:
- Whether to create a linked clone from the snapshot specified.
- If specified, then C(snapshot_src) is required parameter.
default: false
type: bool
force:
description:
- Ignore warnings and complete the actions.
- This parameter is useful while removing virtual machine which is powered on state.
- 'This module reflects the VMware vCenter API and UI workflow, as such, in some cases the `force` flag will
be mandatory to perform the action to ensure you are certain the action has to be taken, no matter what the consequence.
This is specifically the case for removing a powered on the virtual machine when C(state) is set to C(absent).'
default: false
type: bool
delete_from_inventory:
description:
- Whether to delete Virtual machine from inventory or delete from disk.
default: false
type: bool
datacenter:
description:
- Destination datacenter for the deploy operation.
- This parameter is case sensitive.
default: ha-datacenter
type: str
cluster:
description:
- The cluster name where the virtual machine will run.
- This is a required parameter, if C(esxi_hostname) is not set.
- C(esxi_hostname) and C(cluster) are mutually exclusive parameters.
- This parameter is case sensitive.
type: str
esxi_hostname:
description:
- The ESXi hostname where the virtual machine will run.
- This is a required parameter, if C(cluster) is not set.
- C(esxi_hostname) and C(cluster) are mutually exclusive parameters.
- This parameter is case sensitive.
type: str
advanced_settings:
description:
- Define a list of advanced settings to be added to the VMX config.
- An advanced settings object takes two fields C(key) and C(value).
- Incorrect key and values will be ignored.
elements: dict
type: list
default: []
annotation:
description:
- A note or annotation to include in the virtual machine.
type: str
aliases: [ 'notes' ]
customvalues:
description:
- Define a list of custom values to set on virtual machine.
- A custom value object takes two fields C(key) and C(value).
- Incorrect key and values will be ignored.
elements: dict
type: list
default: []
networks:
description:
- A list of networks (in the order of the NICs).
- Removing NICs is not allowed, while reconfiguring the virtual machine.
- All parameters and VMware object names are case sensitive.
- The I(type), I(ip), I(netmask), I(gateway), I(domain), I(dns_servers) options don't set to a guest when creating a blank new virtual machine.
They are set by the customization via vmware-tools.
If you want to set the value of the options to a guest, you need to clone from a template with installed OS and vmware-tools(also Perl when Linux).
type: list
default: []
elements: dict
suboptions:
name:
type: str
description:
- Name of the portgroup or distributed virtual portgroup for this interface.
- Required per entry.
- When specifying distributed virtual portgroup make sure given C(esxi_hostname) or C(cluster) is associated with it.
vlan:
type: int
description:
- VLAN number for this interface.
- Required per entry.
device_type:
type: str
description:
- Virtual network device.
- Valid value can be one of C(e1000), C(e1000e), C(pcnet32), C(vmxnet2), C(vmxnet3), C(sriov).
- C(vmxnet3) is default.
- Optional per entry.
- Used for virtual hardware.
mac:
type: str
description:
- Customize MAC address.
- Optional per entry.
- Used for virtual hardware.
dvswitch_name:
type: str
description:
- Name of the distributed vSwitch.
- Optional per entry.
- Used for virtual hardware.
type:
type: str
description:
- Type of IP assignment.
- Valid values are one of C(dhcp), C(static).
- C(dhcp) is default.
- Optional per entry.
- Used for OS customization.
ip:
type: str
description:
- Static IP address. Implies C(type=static).
- Optional per entry.
- Used for OS customization.
netmask:
type: str
description:
- Static netmask required for C(ip).
- Optional per entry.
- Used for OS customization.
gateway:
type: str
description:
- Static gateway.
- Optional per entry.
- Used for OS customization.
dns_servers:
type: str
description:
- DNS servers for this network interface (Windows).
- Optional per entry.
- Used for OS customization.
domain:
type: str
description:
- Domain name for this network interface (Windows).
- Optional per entry.
- Used for OS customization.
connected:
type: bool
description:
- Indicates whether the NIC is currently connected.
start_connected:
type: bool
description:
- Specifies whether or not to connect the device when the virtual machine starts.
customization:
description:
- Parameters for OS customization when cloning from the template or the virtual machine, or apply to the existing virtual machine directly.
- Not all operating systems are supported for customization with respective vCenter version,
please check VMware documentation for respective OS customization.
- For supported customization operating system matrix, (see U(http://partnerweb.vmware.com/programs/guestOS/guest-os-customization-matrix.pdf))
- All parameters and VMware object names are case sensitive.
- Linux based OSes requires Perl package to be installed for OS customizations.
suboptions:
existing_vm:
type: bool
description:
- If set to C(true), do OS customization on the specified virtual machine directly.
- Common for Linux and Windows customization.
dns_servers:
type: list
elements: str
description:
- List of DNS servers to configure.
- Common for Linux and Windows customization.
dns_suffix:
type: list
elements: str
description:
- List of domain suffixes, also known as DNS search path.
- Default C(domain) parameter.
- Common for Linux and Windows customization.
domain:
type: str
description:
- DNS domain name to use.
- Common for Linux and Windows customization.
hostname:
type: str
description:
- Computer hostname.
- Default is shortened C(name) parameter.
- Allowed characters are alphanumeric (uppercase and lowercase) and minus, rest of the characters are dropped as per RFC 952.
- Common for Linux and Windows customization.
timezone:
type: str
description:
- Timezone.
- See List of supported time zones for different vSphere versions in Linux/Unix.
- Common for Linux and Windows customization.
- L(Windows, https://msdn.microsoft.com/en-us/library/ms912391.aspx).
hwclockUTC:
type: bool
description:
- Specifies whether the hardware clock is in UTC or local time.
- Specific to Linux customization.
script_text:
type: str
description:
- Script to run with shebang.
- Needs to be enabled in vmware tools with vmware-toolbox-cmd config set deployPkg enable-custom-scripts true
- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-9A5093A5-C54F-4502-941B-3F9C0F573A39.html
- Specific to Linux customization.
version_added: '3.1.0'
autologon:
type: bool
description:
- Auto logon after virtual machine customization.
- Specific to Windows customization.
autologoncount:
type: int
description:
- Number of autologon after reboot.
- Specific to Windows customization.
- Ignored if C(autologon) is unset or set to C(false).
- If unset, 1 will be used.
domainadmin:
type: str
description:
- User used to join in AD domain.
- Required if C(joindomain) specified.
- Specific to Windows customization.
domainadminpassword:
type: str
description:
- Password used to join in AD domain.
- Required if C(joindomain) specified.
- Specific to Windows customization.
fullname:
type: str
description:
- Server owner name.
- Specific to Windows customization.
- If unset, "Administrator" will be used as a fall-back.
joindomain:
type: str
description:
- AD domain to join.
- Not compatible with C(joinworkgroup).
- Specific to Windows customization.
joinworkgroup:
type: str
description:
- Workgroup to join.
- Not compatible with C(joindomain).
- Specific to Windows customization.
- If unset, "WORKGROUP" will be used as a fall-back.
orgname:
type: str
description:
- Organisation name.
- Specific to Windows customization.
- If unset, "ACME" will be used as a fall-back.
password:
type: str
description:
- Local administrator password.
- If not defined, the password will be set to blank (that is, no password).
- Specific to Windows customization.
productid:
type: str
description:
- Product ID.
- Specific to Windows customization.
runonce:
type: list
elements: str
description:
- List of commands to run at first user logon.
- Specific to Windows customization.
type: dict
default: {}
vapp_properties:
description:
- A list of vApp properties.
- 'For full list of attributes and types refer to: U(https://code.vmware.com/apis/704/vsphere/vim.vApp.PropertyInfo.html)'
type: list
default: []
elements: dict
suboptions:
id:
type: str
description:
- Property ID.
- Required per entry.
value:
type: str
description:
- Property value.
type:
type: str
description:
- Value type, string type by default.
operation:
type: str
description:
- The C(remove) attribute is required only when removing properties.
customization_spec:
description:
- Unique name identifying the requested customization specification.
- This parameter is case sensitive.
- If set, then overrides C(customization) parameter values.
type: str
datastore:
description:
- Specify datastore or datastore cluster to provision virtual machine.
- This parameter takes precedence over C(disk.datastore) parameter.
- This parameter can be used to override datastore or datastore cluster setting
of the virtual machine when deployed from the template.
- Please see example for more usage.
type: str
convert:
description:
- Specify convert disk type while cloning template or virtual machine.
choices: [ 'thin', 'thick', 'eagerzeroedthick' ]
type: str
extends_documentation_fragment:
- community.vmware.vmware.documentation
'''
EXAMPLES = r'''
- name: Create a virtual machine on given ESXi hostname
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
folder: /DC1/vm/
name: test_vm_0001
state: poweredon
guest_id: centos64Guest
# This is hostname of particular ESXi server on which user wants VM to be deployed
esxi_hostname: "{{ esxi_hostname }}"
disk:
- size_gb: 10
type: thin
datastore: datastore1
hardware:
memory_mb: 512
num_cpus: 4
scsi: paravirtual
networks:
- name: VM Network
mac: aa:bb:dd:aa:00:14
ip: 10.10.10.100
netmask: 255.255.255.0
device_type: vmxnet3
wait_for_ip_address: true
wait_for_ip_address_timeout: 600
delegate_to: localhost
register: deploy_vm
- name: Create a virtual machine from a template
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
folder: /testvms
name: testvm_2
state: poweredon
template: template_el7
disk:
- size_gb: 10
type: thin
datastore: g73_datastore
# Add another disk from an existing VMDK
- filename: "[datastore1] testvms/testvm_2_1/testvm_2_1.vmdk"
hardware:
memory_mb: 512
num_cpus: 6
num_cpu_cores_per_socket: 3
scsi: paravirtual
memory_reservation_lock: true
mem_limit: 8096
mem_reservation: 4096
cpu_shares_level: "high"
mem_shares_level: "high"
cpu_limit: 8096
cpu_reservation: 4096
max_connections: 5
hotadd_cpu: true
hotremove_cpu: true
hotadd_memory: false
version: 12 # Hardware version of virtual machine
boot_firmware: "efi"
cdrom:
- controller_number: 0
unit_number: 0
state: present
type: iso
iso_path: "[datastore1] livecd.iso"
networks:
- name: VM Network
mac: aa:bb:dd:aa:00:14
wait_for_ip_address: true
delegate_to: localhost
register: deploy
- name: Clone a virtual machine from Windows template and customize
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
datacenter: datacenter1
cluster: cluster
name: testvm-2
template: template_windows
networks:
- name: VM Network
ip: 192.168.1.100
netmask: 255.255.255.0
gateway: 192.168.1.1
mac: aa:bb:dd:aa:00:14
domain: my_domain
dns_servers:
- 192.168.1.1
- 192.168.1.2
- vlan: 1234
type: dhcp
customization:
autologon: true
dns_servers:
- 192.168.1.1
- 192.168.1.2
domain: my_domain
password: new_vm_password
runonce:
- powershell.exe -ExecutionPolicy Unrestricted -File C:\Windows\Temp\ConfigureRemotingForAnsible.ps1 -ForceNewSSLCert -EnableCredSSP
delegate_to: localhost
- name: Clone a virtual machine from Linux template and customize
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
datacenter: "{{ datacenter }}"
state: present
folder: /DC1/vm
template: "{{ template }}"
name: "{{ vm_name }}"
cluster: DC1_C1
networks:
- name: VM Network
ip: 192.168.10.11
netmask: 255.255.255.0
wait_for_ip_address: true
customization:
domain: "{{ guest_domain }}"
dns_servers:
- 8.9.9.9
- 7.8.8.9
dns_suffix:
- example.com
- example2.com
script_text: |
#!/bin/bash
touch /tmp/touch-from-playbook
delegate_to: localhost
- name: Rename a virtual machine (requires the virtual machine's uuid)
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
uuid: "{{ vm_uuid }}"
name: new_name
state: present
delegate_to: localhost
- name: Remove a virtual machine by uuid
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
uuid: "{{ vm_uuid }}"
state: absent
delegate_to: localhost
- name: Remove a virtual machine from inventory
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
name: vm_name
delete_from_inventory: true
state: absent
delegate_to: localhost
- name: Manipulate vApp properties
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
name: vm_name
state: present
vapp_properties:
- id: remoteIP
category: Backup
label: Backup server IP
type: string
value: 10.10.10.1
- id: old_property
operation: remove
delegate_to: localhost
- name: Set powerstate of a virtual machine to poweroff by using UUID
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
uuid: "{{ vm_uuid }}"
state: poweredoff
delegate_to: localhost
- name: Deploy a virtual machine in a datastore different from the datastore of the template
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
name: "{{ vm_name }}"
state: present
template: "{{ template_name }}"
# Here datastore can be different which holds template
datastore: "{{ virtual_machine_datastore }}"
hardware:
memory_mb: 512
num_cpus: 2
scsi: paravirtual
delegate_to: localhost
- name: Create a diskless VM
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
datacenter: "{{ dc1 }}"
state: poweredoff
cluster: "{{ ccr1 }}"
name: diskless_vm
folder: /Asia-Datacenter1/vm
guest_id: centos64Guest
datastore: "{{ ds1 }}"
hardware:
memory_mb: 1024
num_cpus: 2
num_cpu_cores_per_socket: 1
- name: Create a VM with multiple disks of different disk controller types
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
folder: /DC1/vm/
name: test_vm_multi_disks
state: poweredoff
guest_id: centos64Guest
datastore: datastore1
disk:
- size_gb: 10
controller_type: 'nvme'
controller_number: 0
unit_number: 0
- size_gb: 10
controller_type: 'paravirtual'
controller_number: 0
unit_number: 1
- size_gb: 10
controller_type: 'sata'
controller_number: 0
unit_number: 2
hardware:
memory_mb: 512
num_cpus: 4
version: 14
networks:
- name: VM Network
device_type: vmxnet3
delegate_to: localhost
register: deploy_vm
- name: Create a VM with NVDIMM device
community.vmware.vmware_guest:
hostname: "{{ vcenter_hostname }}"
username: "{{ vcenter_username }}"
password: "{{ vcenter_password }}"
folder: /DC1/vm/
name: test_vm_nvdimm
state: poweredoff
guest_id: centos7_64Guest
datastore: datastore1
hardware:
memory_mb: 512
num_cpus: 4
version: 14
networks:
- name: VM Network
device_type: vmxnet3
nvdimm:
state: present
size_mb: 2048
delegate_to: localhost
register: deploy_vm
'''
RETURN = r'''
instance:
description: metadata about the new virtual machine
returned: always
type: dict
sample: None
'''
import re
import time
import string
HAS_PYVMOMI = False
try:
from pyVmomi import vim, vmodl
HAS_PYVMOMI = True
except ImportError:
pass
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.common.network import is_mac
from ansible.module_utils._text import to_text, to_native
from ansible_collections.community.vmware.plugins.module_utils.vmware import (
find_obj,
gather_vm_facts,
get_all_objs,
compile_folder_path_for_object,
serialize_spec,
vmware_argument_spec,
set_vm_power_state,
PyVmomi,
find_dvs_by_name,
find_dvspg_by_name,
wait_for_vm_ip,
quote_obj_name,
)
from ansible_collections.community.vmware.plugins.module_utils.vm_device_helper import PyVmomiDeviceHelper
from ansible_collections.community.vmware.plugins.module_utils.vmware_spbm import SPBM
class PyVmomiCache(object):
""" This class caches references to objects which are requested multiples times but not modified """
def __init__(self, content, dc_name=None):
self.content = content
self.dc_name = dc_name
self.networks = {}
self.clusters = {}
self.esx_hosts = {}
self.parent_datacenters = {}
def find_obj(self, content, types, name, confine_to_datacenter=True):
""" Wrapper around find_obj to set datacenter context """
result = find_obj(content, types, name)
if result and confine_to_datacenter:
if to_text(self.get_parent_datacenter(result).name) != to_text(self.dc_name):
result = None
objects = self.get_all_objs(content, types, confine_to_datacenter=True)
for obj in objects:
if name is None or to_text(obj.name) == to_text(name):
return obj
return result
def get_all_objs(self, content, types, confine_to_datacenter=True):
""" Wrapper around get_all_objs to set datacenter context """
objects = get_all_objs(content, types)
if confine_to_datacenter:
if hasattr(objects, 'items'):
# resource pools come back as a dictionary
# make a copy
for k, v in tuple(objects.items()):
parent_dc = self.get_parent_datacenter(k)
if parent_dc.name != self.dc_name:
del objects[k]
else:
# everything else should be a list
objects = [x for x in objects if self.get_parent_datacenter(x).name == self.dc_name]
return objects
def get_network(self, network):
network = quote_obj_name(network)
if network not in self.networks:
self.networks[network] = self.find_obj(self.content, [vim.Network], network)
return self.networks[network]
def get_cluster(self, cluster):
if cluster not in self.clusters:
self.clusters[cluster] = self.find_obj(self.content, [vim.ClusterComputeResource], cluster)
return self.clusters[cluster]
def get_esx_host(self, host):
if host not in self.esx_hosts:
self.esx_hosts[host] = self.find_obj(self.content, [vim.HostSystem], host)
return self.esx_hosts[host]
def get_parent_datacenter(self, obj):
""" Walk the parent tree to find the objects datacenter """
if isinstance(obj, vim.Datacenter):
return obj
if obj in self.parent_datacenters:
return self.parent_datacenters[obj]
datacenter = None
while True:
if not hasattr(obj, 'parent'):
break
obj = obj.parent
if isinstance(obj, vim.Datacenter):
datacenter = obj
break
self.parent_datacenters[obj] = datacenter
return datacenter
class PyVmomiHelper(PyVmomi):
def __init__(self, module):
super(PyVmomiHelper, self).__init__(module)
self.device_helper = PyVmomiDeviceHelper(self.module)
self.configspec = None
self.relospec = None
self.change_detected = False # a change was detected and needs to be applied through reconfiguration
self.change_applied = False # a change was applied meaning at least one task succeeded
self.tracked_changes = {} # dict of changes made or would-be-made in check mode, updated when change_applied is set
self.customspec = None
self.cache = PyVmomiCache(self.content, dc_name=self.params['datacenter'])
def gather_facts(self, vm):
return gather_vm_facts(self.content, vm)
def remove_vm(self, vm, delete_from_inventory=False):
# https://www.vmware.com/support/developer/converter-sdk/conv60_apireference/vim.ManagedEntity.html#destroy
if vm.summary.runtime.powerState.lower() == 'poweredon':
self.module.fail_json(msg="Virtual machine %s found in 'powered on' state, "
"please use 'force' parameter to remove or poweroff VM "
"and try removing VM again." % vm.name)
# Delete VM from Inventory
if delete_from_inventory:
try:
vm.UnregisterVM()
except (vim.fault.TaskInProgress,
vmodl.RuntimeFault) as e:
return {'changed': self.change_applied, 'failed': True, 'msg': e.msg, 'op': 'UnregisterVM'}
self.change_applied = True
return {'changed': self.change_applied, 'failed': False}
# Delete VM from Disk
task = vm.Destroy()
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'destroy'}
else:
return {'changed': self.change_applied, 'failed': False}
def configure_guestid(self, vm_obj, vm_creation=False):
# guest_id is not required when using templates
if self.params['template']:
return
# guest_id is only mandatory on VM creation
if vm_creation and self.params['guest_id'] is None:
self.module.fail_json(msg="guest_id attribute is mandatory for VM creation")
if self.params['guest_id'] and \
(vm_obj is None or self.params['guest_id'].lower() != vm_obj.summary.config.guestId.lower()):
self.change_detected = True
self.configspec.guestId = self.params['guest_id']
def configure_resource_alloc_info(self, vm_obj):
"""
Function to configure resource allocation information about virtual machine
:param vm_obj: VM object in case of reconfigure, None in case of deploy
:return: None
"""
rai_change_detected = False
memory_allocation = vim.ResourceAllocationInfo()
cpu_allocation = vim.ResourceAllocationInfo()
memory_shares_info = vim.SharesInfo()
cpu_shares_info = vim.SharesInfo()
mem_shares_level = self.params['hardware']['mem_shares_level']
if mem_shares_level is not None:
memory_shares_info.level = mem_shares_level
memory_allocation.shares = memory_shares_info
if vm_obj is None or \
memory_allocation.shares.level != vm_obj.config.memoryAllocation.shares.level:
rai_change_detected = True
cpu_shares_level = self.params['hardware']['cpu_shares_level']
if cpu_shares_level is not None:
cpu_shares_info.level = cpu_shares_level
cpu_allocation.shares = cpu_shares_info
if vm_obj is None or \
cpu_allocation.shares.level != vm_obj.config.cpuAllocation.shares.level:
rai_change_detected = True
mem_shares = self.params['hardware']['mem_shares']
if mem_shares is not None:
memory_shares_info.level = 'custom'
memory_shares_info.shares = mem_shares
memory_allocation.shares = memory_shares_info
if vm_obj is None or \
memory_allocation.shares != vm_obj.config.memoryAllocation.shares:
rai_change_detected = True
cpu_shares = self.params['hardware']['cpu_shares']
if cpu_shares is not None:
cpu_shares_info.level = 'custom'
cpu_shares_info.shares = cpu_shares
cpu_allocation.shares = cpu_shares_info
if vm_obj is None or \
cpu_allocation.shares != vm_obj.config.cpuAllocation.shares:
rai_change_detected = True
mem_limit = self.params['hardware']['mem_limit']
if mem_limit is not None:
memory_allocation.limit = mem_limit
if vm_obj is None or \
memory_allocation.limit != vm_obj.config.memoryAllocation.limit:
rai_change_detected = True
mem_reservation = self.params['hardware']['mem_reservation']
if mem_reservation is not None:
memory_allocation.reservation = mem_reservation
if vm_obj is None or \
memory_allocation.reservation != vm_obj.config.memoryAllocation.reservation:
rai_change_detected = True
cpu_limit = self.params['hardware']['cpu_limit']
if cpu_limit is not None:
cpu_allocation.limit = cpu_limit
if vm_obj is None or \
cpu_allocation.limit != vm_obj.config.cpuAllocation.limit:
rai_change_detected = True
cpu_reservation = self.params['hardware']['cpu_reservation']
if cpu_reservation is not None:
cpu_allocation.reservation = cpu_reservation
if vm_obj is None or \
cpu_allocation.reservation != vm_obj.config.cpuAllocation.reservation:
rai_change_detected = True
if rai_change_detected:
self.configspec.memoryAllocation = memory_allocation
self.configspec.cpuAllocation = cpu_allocation
self.change_detected = True
def configure_cpu_and_memory(self, vm_obj, vm_creation=False):
# set cpu/memory/etc
num_cpus = self.params['hardware']['num_cpus']
if num_cpus is not None:
# check VM power state and cpu hot-add/hot-remove state before re-config VM
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and not self.module.check_mode:
if not vm_obj.config.cpuHotRemoveEnabled and num_cpus < vm_obj.config.hardware.numCPU:
self.module.fail_json(msg="Configured cpu number is less than the cpu number of the VM, "
"cpuHotRemove is not enabled")
if not vm_obj.config.cpuHotAddEnabled and num_cpus > vm_obj.config.hardware.numCPU:
self.module.fail_json(msg="Configured cpu number is more than the cpu number of the VM, "
"cpuHotAdd is not enabled")
num_cpu_cores_per_socket = self.params['hardware']['num_cpu_cores_per_socket']
if num_cpu_cores_per_socket is not None:
if num_cpus % num_cpu_cores_per_socket != 0:
self.module.fail_json(msg="hardware.num_cpus attribute should be a multiple "
"of hardware.num_cpu_cores_per_socket")
if vm_obj is None or num_cpu_cores_per_socket != vm_obj.config.hardware.numCoresPerSocket:
self.change_detected = True
self.configspec.numCoresPerSocket = num_cpu_cores_per_socket
if vm_obj is None or num_cpus != vm_obj.config.hardware.numCPU:
self.change_detected = True
self.configspec.numCPUs = num_cpus
# num_cpu is mandatory for VM creation
elif vm_creation and not self.params['template']:
self.module.fail_json(msg="hardware.num_cpus attribute is mandatory for VM creation")
memory_mb = self.params['hardware']['memory_mb']
if memory_mb is not None:
# check VM power state and memory hotadd state before re-config VM
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn:
if vm_obj.config.memoryHotAddEnabled and memory_mb < vm_obj.config.hardware.memoryMB:
self.module.fail_json(msg="Configured memory is less than memory size of the VM, "
"operation is not supported")
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
elif not vm_obj.config.memoryHotAddEnabled and memory_mb != vm_obj.config.hardware.memoryMB and not self.module.check_mode:
self.module.fail_json(msg="memoryHotAdd is not enabled")
if vm_obj is None or memory_mb != vm_obj.config.hardware.memoryMB:
self.change_detected = True
self.configspec.memoryMB = memory_mb
# memory_mb is mandatory for VM creation
elif vm_creation and not self.params['template']:
self.module.fail_json(msg="hardware.memory_mb attribute is mandatory for VM creation")
hotadd_memory = self.params['hardware']['hotadd_memory']
if hotadd_memory is not None:
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and \
vm_obj.config.memoryHotAddEnabled != hotadd_memory and not self.module.check_mode:
self.module.fail_json(msg="Configure hotadd memory operation is not supported when VM is power on")
if vm_obj is None or hotadd_memory != vm_obj.config.memoryHotAddEnabled:
self.change_detected = True
self.configspec.memoryHotAddEnabled = hotadd_memory
hotadd_cpu = self.params['hardware']['hotadd_cpu']
if hotadd_cpu is not None:
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and \
vm_obj.config.cpuHotAddEnabled != hotadd_cpu and not self.module.check_mode:
self.module.fail_json(msg="Configure hotadd cpu operation is not supported when VM is power on")
if vm_obj is None or hotadd_cpu != vm_obj.config.cpuHotAddEnabled:
self.change_detected = True
self.configspec.cpuHotAddEnabled = hotadd_cpu
hotremove_cpu = self.params['hardware']['hotremove_cpu']
if hotremove_cpu is not None:
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and \
vm_obj.config.cpuHotRemoveEnabled != hotremove_cpu and not self.module.check_mode:
self.module.fail_json(msg="Configure hotremove cpu operation is not supported when VM is power on")
if vm_obj is None or hotremove_cpu != vm_obj.config.cpuHotRemoveEnabled:
self.change_detected = True
self.configspec.cpuHotRemoveEnabled = hotremove_cpu
memory_reservation_lock = self.params['hardware']['memory_reservation_lock']
if memory_reservation_lock is not None:
if vm_obj is None or memory_reservation_lock != vm_obj.config.memoryReservationLockedToMax:
self.change_detected = True
self.configspec.memoryReservationLockedToMax = memory_reservation_lock
vpmc_enabled = self.params['hardware']['vpmc_enabled']
if vpmc_enabled is not None:
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and \
vm_obj.config.vPMCEnabled != vpmc_enabled and not self.module.check_mode:
self.module.fail_json(msg="Configure vPMC cpu operation is not supported when VM is power on")
if vm_obj is None or vpmc_enabled != vm_obj.config.vPMCEnabled:
self.change_detected = True
self.configspec.vPMCEnabled = vpmc_enabled
boot_firmware = self.params['hardware']['boot_firmware']
if boot_firmware is not None:
# boot firmware re-config can cause boot issue
if vm_obj is not None:
return
self.configspec.firmware = boot_firmware
self.change_detected = True
def sanitize_cdrom_params(self):
cdrom_specs = []
expected_cdrom_spec = self.params.get('cdrom')
if expected_cdrom_spec:
for cdrom_spec in expected_cdrom_spec:
# set CDROM controller type is 'ide' by default
cdrom_spec['controller_type'] = cdrom_spec.get('controller_type', 'ide').lower()
if cdrom_spec['controller_type'] not in ['ide', 'sata']:
self.module.fail_json(msg="Invalid cdrom.controller_type: %s, valid value is 'ide' or 'sata'."
% cdrom_spec['controller_type'])
# set CDROM state is 'present' by default
cdrom_spec['state'] = cdrom_spec.get('state', 'present').lower()
if cdrom_spec['state'] not in ['present', 'absent']:
self.module.fail_json(msg="Invalid cdrom.state: %s, valid value is 'present', 'absent'."
% cdrom_spec['state'])
if cdrom_spec['state'] == 'present':
# set CDROM type is 'client' by default
cdrom_spec['type'] = cdrom_spec.get('type', 'client').lower()
if cdrom_spec['type'] not in ['none', 'client', 'iso']:
self.module.fail_json(msg="Invalid cdrom.type: %s, valid value is 'none', 'client' or 'iso'."
% cdrom_spec.get('type'))
if cdrom_spec['type'] == 'iso' and not cdrom_spec.get('iso_path'):
self.module.fail_json(msg="cdrom.iso_path is mandatory when cdrom.type is set to iso.")
if 'controller_number' not in cdrom_spec or 'unit_number' not in cdrom_spec:
self.module.fail_json(msg="'cdrom.controller_number' and 'cdrom.unit_number' are required"
" parameters when configure CDROM list.")
try:
cdrom_ctl_num = int(cdrom_spec.get('controller_number'))
cdrom_ctl_unit_num = int(cdrom_spec.get('unit_number'))
except ValueError:
self.module.fail_json(msg="'cdrom.controller_number' and 'cdrom.unit_number' attributes should be "
"integer values.")
if cdrom_spec['controller_type'] == 'ide' and (cdrom_ctl_num not in [0, 1] or cdrom_ctl_unit_num not in [0, 1]):
self.module.fail_json(msg="Invalid cdrom.controller_number: %s or cdrom.unit_number: %s, valid"
" values are 0 or 1 for IDE controller."
% (cdrom_spec.get('controller_number'), cdrom_spec.get('unit_number')))
if cdrom_spec['controller_type'] == 'sata' and (cdrom_ctl_num not in range(0, 4) or cdrom_ctl_unit_num not in range(0, 30)):
self.module.fail_json(msg="Invalid cdrom.controller_number: %s or cdrom.unit_number: %s,"
" valid controller_number value is 0-3, valid unit_number is 0-29"
" for SATA controller." % (cdrom_spec.get('controller_number'),
cdrom_spec.get('unit_number')))
cdrom_spec['controller_number'] = cdrom_ctl_num
cdrom_spec['unit_number'] = cdrom_ctl_unit_num
ctl_exist = False
for exist_spec in cdrom_specs:
if exist_spec.get('ctl_num') == cdrom_spec['controller_number'] and \
exist_spec.get('ctl_type') == cdrom_spec['controller_type']:
for cdrom_same_ctl in exist_spec['cdroms']:
if cdrom_same_ctl['unit_number'] == cdrom_spec['unit_number']:
self.module.fail_json(msg="Duplicate cdrom.controller_type: %s, cdrom.controller_number: %s,"
"cdrom.unit_number: %s parameters specified."
% (cdrom_spec['controller_type'], cdrom_spec['controller_number'], cdrom_spec['unit_number']))
ctl_exist = True
exist_spec['cdroms'].append(cdrom_spec)
break
if not ctl_exist:
cdrom_specs.append({'ctl_num': cdrom_spec['controller_number'],
'ctl_type': cdrom_spec['controller_type'], 'cdroms': [cdrom_spec]})
return cdrom_specs
def configure_cdrom(self, vm_obj):
# Configure the VM CD-ROM
if self.params.get('cdrom'):
if vm_obj and vm_obj.config.template:
# Changing CD-ROM settings on a template is not supported
return
if isinstance(self.params.get('cdrom'), dict):
self.configure_cdrom_dict(vm_obj)
elif isinstance(self.params.get('cdrom'), list):
self.configure_cdrom_list(vm_obj)
def configure_cdrom_dict(self, vm_obj):
self.module.deprecate(
msg="Specifying CD-ROM configuration as dict is deprecated, Please use list to specify CD-ROM configuration.",
version="4.0.0",
collection_name="community.vmware"
)
if self.params["cdrom"].get('type') not in ['none', 'client', 'iso']:
self.module.fail_json(msg="cdrom.type is mandatory. Options are 'none', 'client', and 'iso'.")
if self.params["cdrom"]['type'] == 'iso' and not self.params["cdrom"].get('iso_path'):
self.module.fail_json(msg="cdrom.iso_path is mandatory when cdrom.type is set to iso.")
cdrom_spec = None
cdrom_devices = self.get_vm_cdrom_devices(vm=vm_obj)
iso_path = self.params["cdrom"].get("iso_path")
if len(cdrom_devices) == 0:
# Creating new CD-ROM
ide_devices = self.get_vm_ide_devices(vm=vm_obj)
if len(ide_devices) == 0:
# Creating new IDE device
ide_ctl = self.device_helper.create_ide_controller()
ide_device = ide_ctl.device
self.change_detected = True
self.configspec.deviceChange.append(ide_ctl)
else:
ide_device = ide_devices[0]
if len(ide_device.device) > 3:
self.module.fail_json(msg="hardware.cdrom specified for a VM or template which already has 4"
" IDE devices of which none are a cdrom")
cdrom_spec = self.device_helper.create_cdrom(ctl_device=ide_device, cdrom_type=self.params["cdrom"]["type"],
iso_path=iso_path)
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn:
cdrom_spec.device.connectable.connected = (self.params["cdrom"]["type"] != "none")
elif not self.device_helper.is_equal_cdrom(vm_obj=vm_obj, cdrom_device=cdrom_devices[0],
cdrom_type=self.params["cdrom"]["type"], iso_path=iso_path):
self.device_helper.update_cdrom_config(vm_obj, self.params["cdrom"], cdrom_devices[0], iso_path=iso_path)
cdrom_spec = vim.vm.device.VirtualDeviceSpec()
cdrom_spec.operation = vim.vm.device.VirtualDeviceSpec.Operation.edit
cdrom_spec.device = cdrom_devices[0]
if cdrom_spec:
self.change_detected = True
self.configspec.deviceChange.append(cdrom_spec)
def configure_cdrom_list(self, vm_obj):
configured_cdroms = self.sanitize_cdrom_params()
# get existing CDROM devices
cdrom_devices = self.get_vm_cdrom_devices(vm=vm_obj)
# get existing IDE and SATA controllers
ide_devices = self.get_vm_ide_devices(vm=vm_obj)
sata_devices = self.get_vm_sata_devices(vm=vm_obj)
for expected_cdrom_spec in configured_cdroms:
ctl_device = None
if expected_cdrom_spec['ctl_type'] == 'ide' and ide_devices:
for device in ide_devices:
if device.busNumber == expected_cdrom_spec['ctl_num']:
ctl_device = device
break
if expected_cdrom_spec['ctl_type'] == 'sata' and sata_devices:
for device in sata_devices:
if device.busNumber == expected_cdrom_spec['ctl_num']:
ctl_device = device
break
# if not find create new ide or sata controller
if not ctl_device:
if expected_cdrom_spec['ctl_type'] == 'ide':
ide_ctl = self.device_helper.create_ide_controller(bus_number=expected_cdrom_spec['ctl_num'])
ctl_device = ide_ctl.device
self.change_detected = True
self.configspec.deviceChange.append(ide_ctl)
if expected_cdrom_spec['ctl_type'] == 'sata':
sata_ctl = self.device_helper.create_sata_controller(bus_number=expected_cdrom_spec['ctl_num'])
ctl_device = sata_ctl.device
self.change_detected = True
self.configspec.deviceChange.append(sata_ctl)
for cdrom in expected_cdrom_spec['cdroms']:
cdrom_device = None
iso_path = cdrom.get('iso_path')
unit_number = cdrom.get('unit_number')
for target_cdrom in cdrom_devices:
if target_cdrom.controllerKey == ctl_device.key and target_cdrom.unitNumber == unit_number:
cdrom_device = target_cdrom
break
# create new CD-ROM
if not cdrom_device and cdrom.get('state') != 'absent':
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState == vim.VirtualMachinePowerState.poweredOn and \
isinstance(ctl_device, vim.vm.device.VirtualIDEController) and not self.module.check_mode:
self.module.fail_json(msg='CD-ROM attach to IDE controller not support hot-add.')
if len(ctl_device.device) == 2 and isinstance(ctl_device, vim.vm.device.VirtualIDEController):
self.module.fail_json(msg='Maximum number of CD-ROMs attached to IDE controller is 2.')
if len(ctl_device.device) == 30 and isinstance(ctl_device, vim.vm.device.VirtualAHCIController):
self.module.fail_json(msg='Maximum number of CD-ROMs attached to SATA controller is 30.')
cdrom_spec = self.device_helper.create_cdrom(ctl_device=ctl_device, cdrom_type=cdrom['type'],
iso_path=iso_path, unit_number=unit_number)
self.change_detected = True
self.configspec.deviceChange.append(cdrom_spec)
# re-configure CD-ROM
elif cdrom_device and cdrom.get('state') != 'absent' and \
not self.device_helper.is_equal_cdrom(vm_obj=vm_obj, cdrom_device=cdrom_device,
cdrom_type=cdrom['type'], iso_path=iso_path):
self.device_helper.update_cdrom_config(vm_obj, cdrom, cdrom_device, iso_path=iso_path)
cdrom_spec = vim.vm.device.VirtualDeviceSpec()
cdrom_spec.operation = vim.vm.device.VirtualDeviceSpec.Operation.edit
cdrom_spec.device = cdrom_device
self.change_detected = True
self.configspec.deviceChange.append(cdrom_spec)
# delete CD-ROM
elif cdrom_device and cdrom.get('state') == 'absent':
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj and vm_obj.runtime.powerState != vim.VirtualMachinePowerState.poweredOff and \
isinstance(ctl_device, vim.vm.device.VirtualIDEController) and not self.module.check_mode:
self.module.fail_json(msg='CD-ROM attach to IDE controller not support hot-remove.')
cdrom_spec = self.device_helper.remove_cdrom(cdrom_device)
self.change_detected = True
self.configspec.deviceChange.append(cdrom_spec)
def configure_hardware_params(self, vm_obj):
"""
Function to configure hardware related configuration of virtual machine
Args:
vm_obj: virtual machine object
"""
max_connections = self.params['hardware']['max_connections']
if max_connections is not None:
if vm_obj is None or max_connections != vm_obj.config.maxMksConnections:
self.change_detected = True
self.configspec.maxMksConnections = max_connections
nested_virt = self.params['hardware']['nested_virt']
if nested_virt is not None:
if vm_obj is None or nested_virt != bool(vm_obj.config.nestedHVEnabled):
self.change_detected = True
self.configspec.nestedHVEnabled = nested_virt
temp_version = self.params['hardware']['version']
if temp_version is not None:
new_version = None
if temp_version.lower() == 'latest':
# Check is to make sure vm_obj is not of type template
if vm_obj and not vm_obj.config.template:
config_option_descriptors = vm_obj.environmentBrowser.QueryConfigOptionDescriptor()
available_hw_versions = [int(option_desc.key.split("-")[1]) for option_desc in config_option_descriptors if option_desc.upgradeSupported]
temp_version = max(available_hw_versions)
else:
try:
temp_version = int(temp_version)
except ValueError:
self.module.fail_json(msg="Failed to set hardware.version '%s' value as valid"
" values are either 'latest' or a number."
" Please check VMware documentation for valid VM hardware versions." % temp_version)
if isinstance(temp_version, int):
# Hardware version is denoted as "vmx-10"
new_version = "vmx-%02d" % temp_version
if vm_obj is None:
self.change_detected = True
self.configspec.version = new_version
# Check is to make sure vm_obj is not of type template
elif not vm_obj.config.template:
# VM exists and we need to update the hardware version
current_version = vm_obj.config.version
# Hardware version is denoted as "vmx-10"
version_digit = int(current_version.split("-", 1)[-1])
if temp_version < version_digit:
self.module.fail_json(msg="Current hardware version '%d' which is greater than the specified"
" version '%d'. Downgrading hardware version is"
" not supported. Please specify version greater"
" than the current version." % (version_digit,
temp_version))
elif temp_version > version_digit:
self.change_detected = True
self.tracked_changes['hardware.version'] = temp_version
self.configspec.version = new_version
# Only perform the upgrade if not in check mode.
if not self.module.check_mode:
task = vm_obj.UpgradeVM_Task(new_version)
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'upgrade'}
self.change_applied = True
secure_boot = self.params['hardware']['secure_boot']
if secure_boot is not None:
if vm_obj is None or secure_boot != vm_obj.config.bootOptions.efiSecureBootEnabled:
self.change_detected = True
self.configspec.bootOptions = vim.vm.BootOptions()
self.configspec.bootOptions.efiSecureBootEnabled = secure_boot
iommu = self.params['hardware']['iommu']
if iommu is not None:
if vm_obj is None or iommu != vm_obj.config.flags.vvtdEnabled:
self.change_detected = True
if self.configspec.flags is None:
self.configspec.flags = vim.vm.FlagInfo()
self.configspec.flags.vvtdEnabled = iommu
virt_based_security = self.params['hardware']['virt_based_security']
if virt_based_security is not None:
if vm_obj is None or virt_based_security != self.configspec.flags.vbsEnabled:
self.change_detected = True
if self.configspec.flags is None:
self.configspec.flags = vim.vm.FlagInfo()
self.configspec.flags.vbsEnabled = virt_based_security
def get_device_by_type(self, vm=None, type=None):
device_list = []
if vm is None or type is None:
return device_list
for device in vm.config.hardware.device:
if isinstance(device, type):
device_list.append(device)
return device_list
def get_vm_cdrom_devices(self, vm=None):
return self.get_device_by_type(vm=vm, type=vim.vm.device.VirtualCdrom)
def get_vm_ide_devices(self, vm=None):
return self.get_device_by_type(vm=vm, type=vim.vm.device.VirtualIDEController)
def get_vm_sata_devices(self, vm=None):
return self.get_device_by_type(vm=vm, type=vim.vm.device.VirtualAHCIController)
def get_vm_nvdimm_ctl_device(self, vm=None):
return self.get_device_by_type(vm=vm, type=vim.vm.device.VirtualNVDIMMController)
def get_vm_nvdimm_devices(self, vm=None):
return self.get_device_by_type(vm=vm, type=vim.vm.device.VirtualNVDIMM)
def configure_nvdimm(self, vm_obj):
"""
Manage virtual NVDIMM device to the virtual machine
Args:
vm_obj: virtual machine object
"""
if self.params['nvdimm']['state']:
# Label is required when remove device
if self.params['nvdimm']['state'] == 'absent' and not self.params['nvdimm']['label']:
self.module.fail_json(msg="Please specify the label of virtual NVDIMM device using 'label' parameter"
" when state is set to 'absent'.")
# Reconfigure device requires VM in power off state
if vm_obj and not vm_obj.config.template:
# Allow VM to be powered on during this check when in check mode, when no changes will actually be made
if vm_obj.runtime.powerState != vim.VirtualMachinePowerState.poweredOff and not self.module.check_mode:
self.module.fail_json(msg="VM is not in power off state, can not do virtual NVDIMM configuration.")
nvdimm_ctl_exists = False
if vm_obj and not vm_obj.config.template:
# Get existing NVDIMM controller
nvdimm_ctl = self.get_vm_nvdimm_ctl_device(vm=vm_obj)
if len(nvdimm_ctl) != 0:
nvdimm_ctl_exists = True
nvdimm_ctl_key = nvdimm_ctl[0].key
if self.params['nvdimm']['label'] is not None:
nvdimm_devices = self.get_vm_nvdimm_devices(vm=vm_obj)
if len(nvdimm_devices) != 0:
existing_nvdimm_dev = self.device_helper.find_nvdimm_by_label(
nvdimm_label=self.params['nvdimm']['label'],
nvdimm_devices=nvdimm_devices
)
if existing_nvdimm_dev is not None:
if self.params['nvdimm']['state'] == 'absent':
nvdimm_remove_spec = self.device_helper.remove_nvdimm(
nvdimm_device=existing_nvdimm_dev
)
self.change_detected = True
self.configspec.deviceChange.append(nvdimm_remove_spec)
else:
if existing_nvdimm_dev.capacityInMB < self.params['nvdimm']['size_mb']:
nvdimm_config_spec = self.device_helper.update_nvdimm_config(
nvdimm_device=existing_nvdimm_dev,
nvdimm_size=self.params['nvdimm']['size_mb']
)
self.change_detected = True
self.configspec.deviceChange.append(nvdimm_config_spec)
elif existing_nvdimm_dev.capacityInMB > self.params['nvdimm']['size_mb']:
self.module.fail_json(msg="Can not change NVDIMM device size to %s MB, which is"
" smaller than the current size %s MB."
% (self.params['nvdimm']['size_mb'],
existing_nvdimm_dev.capacityInMB))
# New VM or existing VM without label specified, add new NVDIMM device
if vm_obj is None or (vm_obj and not vm_obj.config.template and self.params['nvdimm']['label'] is None):
if self.params['nvdimm']['state'] == 'present':
vc_pmem_profile_id = None
# Get default PMem storage policy when host is vCenter
if self.is_vcenter():
storage_profile_name = "Host-local PMem Default Storage Policy"
spbm = SPBM(self.module)
pmem_profile = spbm.find_storage_profile_by_name(profile_name=storage_profile_name)
if pmem_profile is None:
self.module.fail_json(msg="Can not find PMem storage policy with name '%s'." % storage_profile_name)
vc_pmem_profile_id = pmem_profile.profileId.uniqueId
if not nvdimm_ctl_exists:
nvdimm_ctl_spec = self.device_helper.create_nvdimm_controller()
self.configspec.deviceChange.append(nvdimm_ctl_spec)
nvdimm_ctl_key = nvdimm_ctl_spec.device.key
nvdimm_dev_spec = self.device_helper.create_nvdimm_device(
nvdimm_ctl_dev_key=nvdimm_ctl_key,
pmem_profile_id=vc_pmem_profile_id,
nvdimm_dev_size_mb=self.params['nvdimm']['size_mb']
)
self.change_detected = True
self.configspec.deviceChange.append(nvdimm_dev_spec)
def get_vm_network_interfaces(self, vm=None):
device_list = []
if vm is None:
return device_list
for device in vm.config.hardware.device:
for device_type in self.device_helper.nic_device_type.values():
if isinstance(device, device_type):
device_list.append(device)
return device_list
def sanitize_network_params(self):
"""
Sanitize user provided network provided params
Returns: A sanitized list of network params, else fails
"""
network_devices = list()
# Clean up user data here
for network in self.params['networks']:
if 'name' not in network and 'vlan' not in network:
self.module.fail_json(msg="Please specify at least a network name or"
" a VLAN name under VM network list.")
if 'name' in network and self.cache.get_network(network['name']) is None:
self.module.fail_json(msg="Network '%(name)s' does not exist." % network)
elif 'vlan' in network:
dvps = self.cache.get_all_objs(self.content, [vim.dvs.DistributedVirtualPortgroup])
for dvp in dvps:
if hasattr(dvp.config.defaultPortConfig, 'vlan') and \
isinstance(dvp.config.defaultPortConfig.vlan.vlanId, int) and \
str(dvp.config.defaultPortConfig.vlan.vlanId) == str(network['vlan']):
network['name'] = dvp.config.name
break
if 'dvswitch_name' in network and \
dvp.config.distributedVirtualSwitch.name == network['dvswitch_name'] and \
dvp.config.name == network['vlan']:
network['name'] = dvp.config.name
break
if dvp.config.name == network['vlan']:
network['name'] = dvp.config.name
break
else:
self.module.fail_json(msg="VLAN '%(vlan)s' does not exist." % network)
if 'type' in network:
if network['type'] not in ['dhcp', 'static']:
self.module.fail_json(msg="Network type '%(type)s' is not a valid parameter."
" Valid parameters are ['dhcp', 'static']." % network)
if network['type'] != 'static' and ('ip' in network or 'netmask' in network):
self.module.fail_json(msg='Static IP information provided for network "%(name)s",'
' but "type" is set to "%(type)s".' % network)
else:
# Type is optional parameter, if user provided IP or Subnet assume
# network type as 'static'
if 'ip' in network or 'netmask' in network:
network['type'] = 'static'
else:
# User wants network type as 'dhcp'
network['type'] = 'dhcp'
if network.get('type') == 'static':
if 'ip' in network and 'netmask' not in network:
self.module.fail_json(msg="'netmask' is required if 'ip' is"
" specified under VM network list.")
if 'ip' not in network and 'netmask' in network:
self.module.fail_json(msg="'ip' is required if 'netmask' is"
" specified under VM network list.")
if 'device_type' in network and network['device_type'] not in self.device_helper.nic_device_type.keys():
self.module.fail_json(msg="Device type specified '%s' is not valid. Please specify correct device type"
" from ['%s']." % (network['device_type'],
"', '".join(self.device_helper.nic_device_type.keys())))
if 'mac' in network and not is_mac(network['mac']):
self.module.fail_json(msg="Device MAC address '%s' is invalid."
" Please provide correct MAC address." % network['mac'])
network_devices.append(network)
return network_devices
def configure_network(self, vm_obj):
# Ignore empty networks, this permits to keep networks when deploying a template/cloning a VM
if not self.params['networks']:
return
network_devices = self.sanitize_network_params()
# List current device for Clone or Idempotency
current_net_devices = self.get_vm_network_interfaces(vm=vm_obj)
if len(network_devices) < len(current_net_devices):
self.module.fail_json(msg="Given network device list is lesser than current VM device list (%d < %d). "
"Removing interfaces is not allowed"
% (len(network_devices), len(current_net_devices)))
for key in range(0, len(network_devices)):
nic_change_detected = False
network_name = network_devices[key]['name']
if key < len(current_net_devices) and (vm_obj or self.params['template']):
# We are editing existing network devices, this is either when
# are cloning from VM or Template
nic = vim.vm.device.VirtualDeviceSpec()
nic.operation = vim.vm.device.VirtualDeviceSpec.Operation.edit
nic.device = current_net_devices[key]
if "wake_on_lan" in network_devices[key] and \
nic.device.wakeOnLanEnabled != network_devices[key].get("wake_on_lan"):
nic.device.wakeOnLanEnabled = network_devices[key].get("wake_on_lan")
nic_change_detected = True
if "start_connected" in network_devices[key] and \
nic.device.connectable.startConnected != network_devices[key].get("start_connected"):
nic.device.connectable.startConnected = network_devices[key].get("start_connected")
nic_change_detected = True
if "connected" in network_devices[key] and \
nic.device.connectable.connected != network_devices[key].get("connected"):
nic.device.connectable.connected = network_devices[key].get("connected")
nic_change_detected = True
if "allow_guest_control" in network_devices[key] and \
nic.device.connectable.allowGuestControl != network_devices[key].get("allow_guest_control"):
nic.device.connectable.allowGuestControl = network_devices[key].get("allow_guest_control")
nic_change_detected = True
if nic.device.deviceInfo.summary != network_name:
nic.device.deviceInfo.summary = network_name
nic_change_detected = True
if 'device_type' in network_devices[key]:
device = self.device_helper.nic_device_type.get(network_devices[key]['device_type'])
if not isinstance(nic.device, device):
self.module.fail_json(msg="Changing the device type is not possible when interface is already"
" present. The failing device type is %s"
% network_devices[key]['device_type'])
# Changing mac address has no effect when editing interface
if 'mac' in network_devices[key] and nic.device.macAddress != current_net_devices[key].macAddress:
self.module.fail_json(msg="Changing MAC address has not effect when interface is already present. "
"The failing new MAC address is %s" % nic.device.macAddress)
else:
# Default device type is vmxnet3, VMware best practice
device_type = network_devices[key].get('device_type', 'vmxnet3')
nic = self.device_helper.create_nic(device_type,
'Network Adapter %s' % (key + 1),
network_devices[key])
nic.operation = vim.vm.device.VirtualDeviceSpec.Operation.add
nic_change_detected = True
net_obj = self.cache.get_network(network_name)
if hasattr(net_obj, 'portKeys'):
# VDS switch
pg_obj = None
if 'dvswitch_name' in network_devices[key]:
dvs_name = network_devices[key]['dvswitch_name']
dvs_obj = find_dvs_by_name(self.content, dvs_name)
if dvs_obj is None:
self.module.fail_json(msg="Unable to find distributed virtual switch %s" % dvs_name)
pg_obj = find_dvspg_by_name(dvs_obj, network_name)
if pg_obj is None:
self.module.fail_json(msg="Unable to find distributed port group %s" % network_name)
else:
pg_obj = self.cache.find_obj(self.content, [vim.dvs.DistributedVirtualPortgroup], network_name)
# TODO: (akasurde) There is no way to find association between resource pool and distributed virtual portgroup
# For now, check if we are able to find distributed virtual switch
if not pg_obj.config.distributedVirtualSwitch:
self.module.fail_json(
msg="Failed to find distributed virtual switch which is associated with"
" distributed virtual portgroup '%s'. Make sure hostsystem is associated with"
" the given distributed virtual portgroup. Also, check if user has correct"
" permission to access distributed virtual switch in the given portgroup."
% pg_obj.name
)
if nic.device.backing and (
not hasattr(nic.device.backing, "port")
or (
nic.device.backing.port.portgroupKey != pg_obj.key
or nic.device.backing.port.switchUuid
!= pg_obj.config.distributedVirtualSwitch.uuid
)
):
nic_change_detected = True
dvs_port_connection = vim.dvs.PortConnection()
dvs_port_connection.portgroupKey = pg_obj.key
# If user specifies distributed port group without associating to the hostsystem on which
# virtual machine is going to be deployed then we get error. We can infer that there is no
# association between given distributed port group and host system.
host_system = self.params.get('esxi_hostname')
if host_system and host_system not in [host.config.host.name for host in pg_obj.config.distributedVirtualSwitch.config.host]:
self.module.fail_json(msg="It seems that host system '%s' is not associated with distributed"
" virtual portgroup '%s'. Please make sure host system is associated"
" with given distributed virtual portgroup" % (host_system, pg_obj.name))
dvs_port_connection.switchUuid = pg_obj.config.distributedVirtualSwitch.uuid
nic.device.backing = vim.vm.device.VirtualEthernetCard.DistributedVirtualPortBackingInfo()
nic.device.backing.port = dvs_port_connection
elif isinstance(net_obj, vim.OpaqueNetwork):
# NSX-T Logical Switch
nic.device.backing = vim.vm.device.VirtualEthernetCard.OpaqueNetworkBackingInfo()
network_id = net_obj.summary.opaqueNetworkId
nic.device.backing.opaqueNetworkType = 'nsx.LogicalSwitch'
nic.device.backing.opaqueNetworkId = network_id
nic.device.deviceInfo.summary = 'nsx.LogicalSwitch: %s' % network_id
nic_change_detected = True
else:
# vSwitch
if not isinstance(nic.device.backing, vim.vm.device.VirtualEthernetCard.NetworkBackingInfo):
nic.device.backing = vim.vm.device.VirtualEthernetCard.NetworkBackingInfo()
nic_change_detected = True
if nic.device.backing.network != net_obj:
nic.device.backing.network = net_obj
nic_change_detected = True
if nic.device.backing.deviceName != network_name:
nic.device.backing.deviceName = network_name
nic_change_detected = True
if nic_change_detected:
# Change to fix the issue found while configuring opaque network
# VMs cloned from a template with opaque network will get disconnected
# Replacing deprecated config parameter with relocation Spec
if isinstance(net_obj, vim.OpaqueNetwork):
self.relospec.deviceChange.append(nic)
else:
self.configspec.deviceChange.append(nic)
self.change_detected = True
def set_vapp_properties(self, property_spec):
# Sets the values in property_info
property_info = vim.vApp.PropertyInfo()
property_info.classId = property_spec.get('classId')
property_info.instanceId = property_spec.get('instanceId')
property_info.id = property_spec.get('id')
property_info.category = property_spec.get('category')
property_info.label = property_spec.get('label')
property_info.type = property_spec.get('type', 'string')
property_info.userConfigurable = property_spec.get('userConfigurable', True)
property_info.defaultValue = property_spec.get('defaultValue')
property_info.value = property_spec.get('value', '')
property_info.description = property_spec.get('description')
return property_info
def configure_vapp_properties(self, vm_obj):
if not self.params['vapp_properties']:
return
for x in self.params['vapp_properties']:
if not x.get('id'):
self.module.fail_json(msg="id is required to set vApp property")
new_vmconfig_spec = vim.vApp.VmConfigSpec()
if vm_obj:
# VM exists
orig_spec = vm_obj.config.vAppConfig
vapp_properties_current = dict((x.id, x) for x in orig_spec.property)
vapp_properties_to_change = dict((x['id'], x) for x in self.params['vapp_properties'])
# each property must have a unique key
# init key counter with max value + 1
all_keys = [x.key for x in orig_spec.property]
new_property_index = max(all_keys) + 1 if all_keys else 0
for property_id, property_spec in vapp_properties_to_change.items():
is_property_changed = False
new_vapp_property_spec = vim.vApp.PropertySpec()
if property_id in vapp_properties_current:
if property_spec.get('operation') == 'remove':
new_vapp_property_spec.operation = 'remove'
new_vapp_property_spec.removeKey = vapp_properties_current[property_id].key
is_property_changed = True
else:
# this is 'edit' branch
new_vapp_property_spec.operation = 'edit'
new_vapp_property_spec.info = vapp_properties_current[property_id]
try:
for property_name, property_value in property_spec.items():
if property_name == 'operation':
# operation is not an info object property
# if set to anything other than 'remove' we don't fail
continue
# Updating attributes only if needed
if getattr(new_vapp_property_spec.info, property_name) != property_value:
setattr(new_vapp_property_spec.info, property_name, property_value)
is_property_changed = True
except Exception as e:
msg = "Failed to set vApp property field='%s' and value='%s'. Error: %s" % (property_name, property_value, to_text(e))
self.module.fail_json(msg=msg)
else:
if property_spec.get('operation') == 'remove':
# attempt to delete non-existent property
continue
# this is add new property branch
new_vapp_property_spec.operation = 'add'
# Configure the values in property_value
property_info = self.set_vapp_properties(property_spec)
new_vapp_property_spec.info = property_info
new_vapp_property_spec.info.key = new_property_index
new_property_index += 1
is_property_changed = True
if is_property_changed:
new_vmconfig_spec.property.append(new_vapp_property_spec)
else:
# New VM
all_keys = [x.key for x in new_vmconfig_spec.property]
new_property_index = max(all_keys) + 1 if all_keys else 0
vapp_properties_to_change = dict((x['id'], x) for x in self.params['vapp_properties'])
is_property_changed = False
for property_id, property_spec in vapp_properties_to_change.items():
new_vapp_property_spec = vim.vApp.PropertySpec()
# this is add new property branch
new_vapp_property_spec.operation = 'add'
# Configure the values in property_value
property_info = self.set_vapp_properties(property_spec)
new_vapp_property_spec.info = property_info
new_vapp_property_spec.info.key = new_property_index
new_property_index += 1
is_property_changed = True
if is_property_changed:
new_vmconfig_spec.property.append(new_vapp_property_spec)
if new_vmconfig_spec.property:
self.configspec.vAppConfig = new_vmconfig_spec
self.change_detected = True
def customize_advanced_settings(self, vm_obj, config_spec):
if not self.params['advanced_settings']:
return
vm_custom_spec = config_spec
vm_custom_spec.extraConfig = []
changed = False
facts = self.gather_facts(vm_obj)
for kv in self.params['advanced_settings']:
if 'key' not in kv or 'value' not in kv:
self.module.exit_json(msg="advanced_settings items required both 'key' and 'value' fields.")
# If kv is not kv fetched from facts, change it
if isinstance(kv['value'], (bool, int)):
specifiedvalue = str(kv['value']).upper()
comparisonvalue = facts['advanced_settings'].get(kv['key'], '').upper()
else:
specifiedvalue = kv['value']
comparisonvalue = facts['advanced_settings'].get(kv['key'], '')
if (kv['key'] not in facts['advanced_settings'] and kv['value'] != '') or comparisonvalue != specifiedvalue:
option = vim.option.OptionValue()
option.key = kv['key']
option.value = specifiedvalue
vm_custom_spec.extraConfig.append(option)
changed = True
if changed:
self.change_detected = True
def customize_customvalues(self, vm_obj):
if not self.params['customvalues']:
return
if not self.is_vcenter():
self.module.warn("Currently connected to ESXi. "
"customvalues are a vCenter feature, this parameter will be ignored.")
return
facts = self.gather_facts(vm_obj)
for kv in self.params['customvalues']:
if 'key' not in kv or 'value' not in kv:
self.module.exit_json(msg="customvalues items required both 'key' and 'value' fields.")
key_id = None
for field in self.content.customFieldsManager.field:
if field.name == kv['key']:
key_id = field.key
break
if not key_id:
self.module.fail_json(msg="Unable to find custom value key %s" % kv['key'])
# If kv is not kv fetched from facts, change it
if kv['key'] not in facts['customvalues'] or facts['customvalues'][kv['key']] != kv['value']:
self.content.customFieldsManager.SetField(entity=vm_obj, key=key_id, value=kv['value'])
self.change_detected = True
def customize_vm(self, vm_obj):
# User specified customization specification
custom_spec_name = self.params.get('customization_spec')
if custom_spec_name:
cc_mgr = self.content.customizationSpecManager
if cc_mgr.DoesCustomizationSpecExist(name=custom_spec_name):
temp_spec = cc_mgr.GetCustomizationSpec(name=custom_spec_name)
self.customspec = temp_spec.spec
return
self.module.fail_json(msg="Unable to find customization specification"
" '%s' in given configuration." % custom_spec_name)
# Network settings
adaptermaps = []
for network in self.params['networks']:
guest_map = vim.vm.customization.AdapterMapping()
guest_map.adapter = vim.vm.customization.IPSettings()
if 'ip' in network and 'netmask' in network:
guest_map.adapter.ip = vim.vm.customization.FixedIp()
guest_map.adapter.ip.ipAddress = str(network['ip'])
guest_map.adapter.subnetMask = str(network['netmask'])
elif 'type' in network and network['type'] == 'dhcp':
guest_map.adapter.ip = vim.vm.customization.DhcpIpGenerator()
if 'gateway' in network:
guest_map.adapter.gateway = network['gateway']
# On Windows, DNS domain and DNS servers can be set by network interface
# https://pubs.vmware.com/vi3/sdk/ReferenceGuide/vim.vm.customization.IPSettings.html
if 'domain' in network:
guest_map.adapter.dnsDomain = network['domain']
elif self.params['customization']['domain'] is not None:
guest_map.adapter.dnsDomain = self.params['customization']['domain']
if 'dns_servers' in network:
guest_map.adapter.dnsServerList = network['dns_servers']
elif self.params['customization']['dns_servers'] is not None:
guest_map.adapter.dnsServerList = self.params['customization']['dns_servers']
adaptermaps.append(guest_map)
# Global DNS settings
globalip = vim.vm.customization.GlobalIPSettings()
if self.params['customization']['dns_servers'] is not None:
globalip.dnsServerList = self.params['customization']['dns_servers']
# TODO: Maybe list the different domains from the interfaces here by default ?
dns_suffixes = []
dns_suffix = self.params['customization']['dns_suffix']
if dns_suffix:
if isinstance(dns_suffix, list):
dns_suffixes += dns_suffix
else:
dns_suffixes.append(dns_suffix)
globalip.dnsSuffixList = dns_suffixes
if self.params['customization']['domain'] is not None:
dns_suffixes.insert(0, self.params['customization']['domain'])
globalip.dnsSuffixList = dns_suffixes
if self.params['guest_id'] is not None:
guest_id = self.params['guest_id']
else:
guest_id = vm_obj.summary.config.guestId
# For windows guest OS, use SysPrep
# https://pubs.vmware.com/vi3/sdk/ReferenceGuide/vim.vm.customization.Sysprep.html#field_detail
if 'win' in guest_id:
ident = vim.vm.customization.Sysprep()
ident.userData = vim.vm.customization.UserData()
# Setting hostName, orgName and fullName is mandatory, so we set some default when missing
ident.userData.computerName = vim.vm.customization.FixedName()
# computer name will be truncated to 15 characters if using VM name
default_name = ""
if 'name' in self.params and self.params['name']:
default_name = self.params['name'].replace(' ', '')
elif vm_obj:
default_name = vm_obj.name.replace(' ', '')
punctuation = string.punctuation.replace('-', '')
default_name = ''.join([c for c in default_name if c not in punctuation])
if self.params['customization']['hostname'] is not None:
ident.userData.computerName.name = self.params['customization']['hostname'][0:15]
else:
ident.userData.computerName.name = default_name[0:15]
ident.userData.fullName = str(self.params['customization'].get('fullname', 'Administrator'))
ident.userData.orgName = str(self.params['customization'].get('orgname', 'ACME'))
if self.params['customization']['productid'] is not None:
ident.userData.productId = str(self.params['customization']['productid'])
ident.guiUnattended = vim.vm.customization.GuiUnattended()
if self.params['customization']['autologon'] is not None:
ident.guiUnattended.autoLogon = self.params['customization']['autologon']
ident.guiUnattended.autoLogonCount = self.params['customization'].get('autologoncount', 1)
if self.params['customization']['timezone'] is not None:
# Check if timezone value is a int before proceeding.
ident.guiUnattended.timeZone = self.device_helper.integer_value(
self.params['customization']['timezone'],
'customization.timezone')
ident.identification = vim.vm.customization.Identification()
if self.params['customization']['password'] is None or self.params['customization']['password'] == '':
ident.guiUnattended.password = None
else:
ident.guiUnattended.password = vim.vm.customization.Password()
ident.guiUnattended.password.value = str(self.params['customization']['password'])
ident.guiUnattended.password.plainText = True
if self.params['customization']['joindomain'] is not None:
if self.params['customization']['domainadmin'] is None or self.params['customization']['domainadminpassword'] is None:
self.module.fail_json(msg="'domainadmin' and 'domainadminpassword' entries are mandatory in 'customization' section to use "
"joindomain feature")
ident.identification.domainAdmin = self.params['customization']['domainadmin']
ident.identification.joinDomain = self.params['customization']['joindomain']
ident.identification.domainAdminPassword = vim.vm.customization.Password()
ident.identification.domainAdminPassword.value = self.params['customization']['domainadminpassword']
ident.identification.domainAdminPassword.plainText = True
elif self.params['customization']['joinworkgroup'] is not None:
ident.identification.joinWorkgroup = self.params['customization']['joinworkgroup']
if self.params['customization']['runonce'] is not None:
ident.guiRunOnce = vim.vm.customization.GuiRunOnce()
ident.guiRunOnce.commandList = self.params['customization']['runonce']
else:
# FIXME: We have no clue whether this non-Windows OS is actually Linux, hence it might fail!
# For Linux guest OS, use LinuxPrep
# https://pubs.vmware.com/vi3/sdk/ReferenceGuide/vim.vm.customization.LinuxPrep.html
ident = vim.vm.customization.LinuxPrep()
# TODO: Maybe add domain from interface if missing ?
if self.params['customization']['domain'] is not None:
ident.domain = self.params['customization']['domain']
ident.hostName = vim.vm.customization.FixedName()
default_name = ""
if 'name' in self.params and self.params['name']:
default_name = self.params['name']
elif vm_obj:
default_name = vm_obj.name
if self.params['customization']['hostname'] is not None:
hostname = self.params['customization']['hostname'].split('.')[0]
else:
hostname = default_name.split('.')[0]
# Remove all characters except alphanumeric and minus which is allowed by RFC 952
valid_hostname = re.sub(r"[^a-zA-Z0-9\-]", "", hostname)
ident.hostName.name = valid_hostname
# List of supported time zones for different vSphere versions in Linux/Unix systems
# https://kb.vmware.com/s/article/2145518
if self.params['customization']['timezone'] is not None:
ident.timeZone = self.params['customization']['timezone']
if self.params['customization']['hwclockUTC'] is not None:
ident.hwClockUTC = self.params['customization']['hwclockUTC']
if self.params['customization']['script_text'] is not None:
ident.scriptText = self.params['customization']['script_text']
self.customspec = vim.vm.customization.Specification()
self.customspec.nicSettingMap = adaptermaps
self.customspec.globalIPSettings = globalip
self.customspec.identity = ident
def get_vm_scsi_controllers(self, vm_obj):
# If vm_obj doesn't exist there is no SCSI controller to find
scsi_ctls = []
if vm_obj is None:
return None
for device in vm_obj.config.hardware.device:
if self.device_helper.is_scsi_controller(device):
scsi_ctl = vim.vm.device.VirtualDeviceSpec()
scsi_ctl.device = device
scsi_ctls.append(scsi_ctl)
return scsi_ctls
def get_configured_disk_size(self, expected_disk_spec):
# what size is it?
if [x for x in expected_disk_spec.keys() if (x.startswith('size_') or x == 'size') and expected_disk_spec[x]]:
# size, size_tb, size_gb, size_mb, size_kb
if expected_disk_spec['size']:
size_regex = re.compile(r'(\d+(?:\.\d+)?)([tgmkTGMK][bB])')
disk_size_m = size_regex.match(expected_disk_spec['size'])
try:
if disk_size_m:
expected = disk_size_m.group(1)
unit = disk_size_m.group(2)
else:
raise ValueError
if re.match(r'\d+\.\d+', expected):
# We found float value in string, let's typecast it
expected = float(expected)
else:
# We found int value in string, let's typecast it
expected = int(expected)
if not expected or not unit:
raise ValueError
except (TypeError, ValueError, NameError):
# Common failure
self.module.fail_json(msg="Failed to parse disk size please review value"
" provided using documentation.")
else:
param = [x for x in expected_disk_spec.keys() if x.startswith('size_') and expected_disk_spec[x]][0]
unit = param.split('_')[-1]
expected = expected_disk_spec[param]
disk_units = dict(tb=3, gb=2, mb=1, kb=0)
if unit in disk_units:
unit = unit.lower()
return expected * (1024 ** disk_units[unit])
else:
self.module.fail_json(msg="%s is not a supported unit for disk size."
" Supported units are ['%s']." % (unit,
"', '".join(disk_units.keys())))
# No size found but disk, fail
self.module.fail_json(
msg="No size, size_kb, size_mb, size_gb or size_tb defined in disk configuration")
def add_existing_vmdk(self, vm_obj, expected_disk_spec, diskspec, scsi_ctl):
"""
Adds vmdk file described by expected_disk_spec['filename'], retrieves the file
information and adds the correct spec to self.configspec.deviceChange.
"""
filename = expected_disk_spec['filename']
# If this is a new disk, or the disk file names are different
if (vm_obj and diskspec.device.backing.fileName != filename) or vm_obj is None:
diskspec.device.backing.fileName = filename
diskspec.device.key = -1
self.change_detected = True
self.configspec.deviceChange.append(diskspec)
def sanitize_disk_parameters(self, vm_obj):
"""
Sanitize user provided disk parameters to configure multiple types of disk controllers and attached disks
Returns: A sanitized dict of disk params, else fails
e.g., [{'type': 'nvme', 'num': 1, 'disk': []}, {}, {}, {}]}
"""
controllers = []
for disk_spec in self.params.get('disk'):
if disk_spec['controller_type'] is None or disk_spec['controller_number'] is None or disk_spec['unit_number'] is None:
self.module.fail_json(msg="'disk.controller_type', 'disk.controller_number' and 'disk.unit_number' are"
" mandatory parameters when configure multiple disk controllers and disks.")
ctl_num = disk_spec['controller_number']
ctl_unit_num = disk_spec['unit_number']
disk_spec['unit_number'] = ctl_unit_num
ctl_type = disk_spec['controller_type']
if len(controllers) != 0:
ctl_exist = False
for ctl in controllers:
if ctl['type'] in self.device_helper.scsi_device_type.keys() and ctl_type in self.device_helper.scsi_device_type.keys():
if ctl['type'] != ctl_type and ctl['num'] == ctl_num:
self.module.fail_json(msg="Specified SCSI controller '%s' and '%s' have the same bus number"
": '%s'" % (ctl['type'], ctl_type, ctl_num))
if ctl['type'] == ctl_type and ctl['num'] == ctl_num:
for i in range(0, len(ctl['disk'])):
if disk_spec['unit_number'] == ctl['disk'][i]['unit_number']:
self.module.fail_json(msg="Specified the same 'controller_type, controller_number, "
"unit_number in disk configuration '%s:%s'" % (ctl_type, ctl_num))
ctl['disk'].append(disk_spec)
ctl_exist = True
break
if not ctl_exist:
controllers.append({'type': ctl_type, 'num': ctl_num, 'disk': [disk_spec]})
else:
controllers.append({'type': ctl_type, 'num': ctl_num, 'disk': [disk_spec]})
return controllers
def set_disk_parameters(self, disk_spec, expected_disk_spec, reconfigure=False):
disk_modified = False
if expected_disk_spec['disk_mode']:
disk_mode = expected_disk_spec.get('disk_mode')
if reconfigure:
if disk_spec.device.backing.diskMode != disk_mode:
disk_spec.device.backing.diskMode = disk_mode
disk_modified = True
else:
disk_spec.device.backing.diskMode = disk_mode
# default is persistent for new deployed VM
elif not reconfigure:
disk_spec.device.backing.diskMode = "persistent"
if not reconfigure:
disk_type = expected_disk_spec.get('type', 'thin')
if disk_type == 'thin':
disk_spec.device.backing.thinProvisioned = True
elif disk_type == 'eagerzeroedthick':
disk_spec.device.backing.eagerlyScrub = True
kb = self.get_configured_disk_size(expected_disk_spec)
if reconfigure:
if disk_spec.device.capacityInKB > kb:
self.module.fail_json(msg="Given disk size is smaller than found (%d < %d)."
"Reducing disks is not allowed." % (kb, disk_spec.device.capacityInKB))
if disk_spec.device.capacityInKB != kb:
disk_spec.device.capacityInKB = kb
disk_modified = True
else:
disk_spec.device.capacityInKB = kb
disk_modified = True
return disk_modified
def configure_multiple_controllers_disks(self, vm_obj):
ctls = self.sanitize_disk_parameters(vm_obj)
if len(ctls) == 0:
return
for ctl in ctls:
# get existing specified disk controller and attached disks
disk_ctl, disk_list = self.device_helper.get_controller_disks(vm_obj, ctl['type'], ctl['num'])
if disk_ctl is None:
# check if scsi controller key already used
if ctl['type'] in self.device_helper.scsi_device_type.keys() and vm_obj is not None:
scsi_ctls = self.get_vm_scsi_controllers(vm_obj)
if scsi_ctls:
for scsi_ctl in scsi_ctls:
if scsi_ctl.device.busNumber == ctl['num']:
self.module.fail_json(msg="Specified SCSI controller number '%s' is already used"
" by: %s" % (ctl['num'], scsi_ctl))
# create new disk controller if not exist
disk_ctl_spec = self.device_helper.create_disk_controller(ctl['type'], ctl['num'])
self.change_detected = True
self.configspec.deviceChange.append(disk_ctl_spec)
else:
disk_ctl_spec = vim.vm.device.VirtualDeviceSpec()
disk_ctl_spec.device = disk_ctl
for j in range(0, len(ctl['disk'])):
hard_disk = None
hard_disk_spec = None
hard_disk_exist = False
disk_modified_for_spec = False
disk_modified_for_disk = False
disk_unit_number = ctl['disk'][j]['unit_number']
# from attached disk list find the specified one
if len(disk_list) != 0:
for disk in disk_list:
if disk.unitNumber == disk_unit_number:
hard_disk = disk
hard_disk_exist = True
break
# if find the disk do reconfigure
if hard_disk_exist:
hard_disk_spec = vim.vm.device.VirtualDeviceSpec()
hard_disk_spec.operation = vim.vm.device.VirtualDeviceSpec.Operation.edit
hard_disk_spec.device = hard_disk
disk_modified_for_spec = self.set_disk_parameters(hard_disk_spec, ctl['disk'][j], reconfigure=True)
# if no disk or the specified one not exist do create new disk
if len(disk_list) == 0 or not hard_disk_exist:
hard_disk = self.device_helper.create_hard_disk(disk_ctl_spec, disk_unit_number)
hard_disk.fileOperation = vim.vm.device.VirtualDeviceSpec.FileOperation.create
disk_modified_for_disk = self.set_disk_parameters(hard_disk, ctl['disk'][j])
# Only update the configspec that will be applied in reconfigure_vm if something actually changed
if disk_modified_for_spec:
self.change_detected = True
self.configspec.deviceChange.append(hard_disk_spec)
if disk_modified_for_disk:
self.change_detected = True
self.configspec.deviceChange.append(hard_disk)
def configure_disks(self, vm_obj):
# Ignore empty disk list, this permits to keep disks when deploying a template/cloning a VM
if not self.params['disk']:
return
# if one of 'controller_type', 'controller_number', 'unit_number' parameters set in one of disks' configuration
# will call configure_multiple_controllers_disks() function
# do not support mixed old scsi disks configuration and new multiple controller types of disks configuration
configure_multiple_ctl = False
for disk_spec in self.params.get('disk'):
if disk_spec['controller_type'] or disk_spec['controller_number'] or disk_spec['unit_number']:
configure_multiple_ctl = True
break
if configure_multiple_ctl:
self.configure_multiple_controllers_disks(vm_obj)
return
# do single controller type disks configuration
scsi_ctls = self.get_vm_scsi_controllers(vm_obj)
# Create scsi controller only if we are deploying a new VM, not a template or reconfiguring
if vm_obj is None or not scsi_ctls:
scsi_ctl = self.device_helper.create_scsi_controller(self.get_scsi_type(), 0)
self.change_detected = True
self.configspec.deviceChange.append(scsi_ctl)
else:
scsi_ctl = scsi_ctls[0]
disks = [x for x in vm_obj.config.hardware.device if isinstance(x, vim.vm.device.VirtualDisk)] \
if vm_obj is not None else None
if disks is not None and self.params.get('disk') and len(self.params.get('disk')) < len(disks):
self.module.fail_json(msg="Provided disks configuration has less disks than "
"the target object (%d vs %d)" % (len(self.params.get('disk')), len(disks)))
disk_index = 0
for expected_disk_spec in self.params.get('disk'):
disk_modified = False
# If we are manipulating and existing objects which has disks and disk_index is in disks
if vm_obj is not None and disks is not None and disk_index < len(disks):
diskspec = vim.vm.device.VirtualDeviceSpec()
# set the operation to edit so that it knows to keep other settings
diskspec.operation = vim.vm.device.VirtualDeviceSpec.Operation.edit
diskspec.device = disks[disk_index]
else:
diskspec = self.device_helper.create_hard_disk(scsi_ctl, disk_index)
disk_modified = True
# increment index for next disk search
disk_index += 1
# index 7 is reserved to SCSI controller
if disk_index == 7:
disk_index += 1
if expected_disk_spec['disk_mode']:
disk_mode = expected_disk_spec.get('disk_mode', 'persistent')
if (vm_obj and diskspec.device.backing.diskMode != disk_mode) or (vm_obj is None):
diskspec.device.backing.diskMode = disk_mode
disk_modified = True
else:
diskspec.device.backing.diskMode = "persistent"
# is it thin?
if expected_disk_spec['type']:
disk_type = expected_disk_spec.get('type', '').lower()
if disk_type == 'thin':
diskspec.device.backing.thinProvisioned = True
elif disk_type == 'eagerzeroedthick':
diskspec.device.backing.eagerlyScrub = True
if expected_disk_spec['filename']:
self.add_existing_vmdk(vm_obj, expected_disk_spec, diskspec, scsi_ctl)
continue
if vm_obj is None or self.params['template']:
# We are creating new VM or from Template
# Only create virtual device if not backed by vmdk in original template
if diskspec.device.backing.fileName == '':
diskspec.fileOperation = vim.vm.device.VirtualDeviceSpec.FileOperation.create
# which datastore?
if expected_disk_spec.get('datastore'):
# TODO: This is already handled by the relocation spec,
# but it needs to eventually be handled for all the
# other disks defined
pass
kb = self.get_configured_disk_size(expected_disk_spec)
# VMware doesn't allow to reduce disk sizes
if kb < diskspec.device.capacityInKB:
self.module.fail_json(
msg="Given disk size is smaller than found (%d < %d). Reducing disks is not allowed." %
(kb, diskspec.device.capacityInKB))
if kb != diskspec.device.capacityInKB or disk_modified:
diskspec.device.capacityInKB = kb
self.configspec.deviceChange.append(diskspec)
self.change_detected = True
def select_host(self):
hostsystem = self.cache.get_esx_host(self.params['esxi_hostname'])
if not hostsystem:
self.module.fail_json(msg='Failed to find ESX host "%(esxi_hostname)s"' % self.params)
if hostsystem.runtime.connectionState != 'connected' or hostsystem.runtime.inMaintenanceMode:
self.module.fail_json(msg='ESXi "%(esxi_hostname)s" is in invalid state or in maintenance mode.' % self.params)
return hostsystem
def autoselect_datastore(self):
datastore = None
datastores = self.cache.get_all_objs(self.content, [vim.Datastore])
if datastores is None or len(datastores) == 0:
self.module.fail_json(msg="Unable to find a datastore list when autoselecting")
datastore_freespace = 0
for ds in datastores:
if not self.is_datastore_valid(datastore_obj=ds):
continue
if ds.summary.freeSpace > datastore_freespace:
datastore = ds
datastore_freespace = ds.summary.freeSpace
return datastore
def select_datastore(self, vm_obj=None):
datastore = None
datastore_name = None
if self.params['disk']:
# TODO: really use the datastore for newly created disks
if self.params['disk'][0]['autoselect_datastore']:
datastores = []
if self.params['cluster']:
cluster = self.find_cluster_by_name(self.params['cluster'], self.content)
for host in cluster.host:
for mi in host.configManager.storageSystem.fileSystemVolumeInfo.mountInfo:
if mi.volume.type == "VMFS":
datastores.append(self.cache.find_obj(self.content, [vim.Datastore], mi.volume.name))
elif self.params['esxi_hostname']:
host = self.find_hostsystem_by_name(self.params['esxi_hostname'])
for mi in host.configManager.storageSystem.fileSystemVolumeInfo.mountInfo:
if mi.volume.type == "VMFS":
datastores.append(self.cache.find_obj(self.content, [vim.Datastore], mi.volume.name))
else:
datastores = self.cache.get_all_objs(self.content, [vim.Datastore])
datastores = [x for x in datastores if self.cache.get_parent_datacenter(x).name == self.params['datacenter']]
datastore_freespace = 0
for ds in datastores:
if not self.is_datastore_valid(datastore_obj=ds):
continue
if (ds.summary.freeSpace > datastore_freespace) or (ds.summary.freeSpace == datastore_freespace and not datastore):
# If datastore field is provided, filter destination datastores
if self.params['disk'][0]['datastore'] and ds.name.find(self.params['disk'][0]['datastore']) < 0:
continue
datastore = ds
datastore_name = datastore.name
datastore_freespace = ds.summary.freeSpace
elif self.params['disk'][0]['datastore']:
datastore_name = self.params['disk'][0]['datastore']
# Check if user has provided datastore cluster first
datastore_cluster = self.cache.find_obj(self.content, [vim.StoragePod], datastore_name)
if datastore_cluster:
# If user specified datastore cluster so get recommended datastore
datastore_name = self.get_recommended_datastore(datastore_cluster_obj=datastore_cluster)
# Check if get_recommended_datastore or user specified datastore exists or not
datastore = self.cache.find_obj(self.content, [vim.Datastore], datastore_name)
else:
self.module.fail_json(msg="Either datastore or autoselect_datastore should be provided to select datastore")
if not datastore and self.params['template']:
# use the template's existing DS
disks = [x for x in vm_obj.config.hardware.device if isinstance(x, vim.vm.device.VirtualDisk)]
if disks:
datastore = disks[0].backing.datastore
datastore_name = datastore.name
# validation
if datastore:
dc = self.cache.get_parent_datacenter(datastore)
if dc.name != self.params['datacenter']:
datastore = self.autoselect_datastore()
datastore_name = datastore.name
if not datastore:
if len(self.params['disk']) != 0 or self.params['template'] is None:
self.module.fail_json(msg="Unable to find the datastore with given parameters."
" This could mean, %s is a non-existent virtual machine and module tried to"
" deploy it as new virtual machine with no disk. Please specify disks parameter"
" or specify template to clone from." % self.params['name'])
self.module.fail_json(msg="Failed to find a matching datastore")
return datastore, datastore_name
def obj_has_parent(self, obj, parent):
if obj is None and parent is None:
raise AssertionError()
current_parent = obj
while True:
if current_parent.name == parent.name:
return True
# Check if we have reached till root folder
moid = current_parent._moId
if moid in ['group-d1', 'ha-folder-root']:
return False
current_parent = current_parent.parent
if current_parent is None:
return False
def get_scsi_type(self):
disk_controller_type = self.params['hardware']['scsi']
if disk_controller_type is not None:
return disk_controller_type
return "paravirtual"
def find_folder(self, searchpath):
""" Walk inventory objects one position of the searchpath at a time """
# split the searchpath so we can iterate through it
paths = [x.replace('/', '') for x in searchpath.split('/')]
paths_total = len(paths) - 1
position = 0
# recursive walk while looking for next element in searchpath
root = self.content.rootFolder
while root and position <= paths_total:
change = False
if hasattr(root, 'childEntity'):
for child in root.childEntity:
if child.name == paths[position]:
root = child
position += 1
change = True
break
elif isinstance(root, vim.Datacenter):
if hasattr(root, 'vmFolder'):
if root.vmFolder.name == paths[position]:
root = root.vmFolder
position += 1
change = True
else:
root = None
if not change:
root = None
return root
def get_resource_pool(self, cluster=None, host=None, resource_pool=None):
""" Get a resource pool, filter on cluster, esxi_hostname or resource_pool if given """
cluster_name = cluster or self.params.get('cluster', None)
host_name = host or self.params.get('esxi_hostname', None)
resource_pool_name = resource_pool or self.params.get('resource_pool', None)
# get the datacenter object
datacenter = find_obj(self.content, [vim.Datacenter], self.params['datacenter'])
if not datacenter:
self.module.fail_json(msg='Unable to find datacenter "%s"' % self.params['datacenter'])
# if cluster is given, get the cluster object
if cluster_name:
cluster = find_obj(self.content, [vim.ComputeResource], cluster_name, folder=datacenter)
if not cluster:
self.module.fail_json(msg='Unable to find cluster "%s"' % cluster_name)
# if host is given, get the cluster object using the host
elif host_name:
host = find_obj(self.content, [vim.HostSystem], host_name, folder=datacenter)
if not host:
self.module.fail_json(msg='Unable to find host "%s"' % host_name)
cluster = host.parent
else:
cluster = None
# get resource pools limiting search to cluster or datacenter
resource_pool = find_obj(self.content, [vim.ResourcePool], resource_pool_name, folder=cluster or datacenter)
if not resource_pool:
if resource_pool_name:
self.module.fail_json(msg='Unable to find resource_pool "%s"' % resource_pool_name)
else:
self.module.fail_json(msg='Unable to find resource pool, need esxi_hostname, resource_pool, or cluster')
return resource_pool
def deploy_vm(self):
# https://github.com/vmware/pyvmomi-community-samples/blob/master/samples/clone_vm.py
# https://www.vmware.com/support/developer/vc-sdk/visdk25pubs/ReferenceGuide/vim.vm.CloneSpec.html
# https://www.vmware.com/support/developer/vc-sdk/visdk25pubs/ReferenceGuide/vim.vm.ConfigSpec.html
# https://www.vmware.com/support/developer/vc-sdk/visdk41pubs/ApiReference/vim.vm.RelocateSpec.html
# FIXME:
# - static IPs
self.folder = self.params.get('folder', None)
if self.folder is None:
self.module.fail_json(msg="Folder is required parameter while deploying new virtual machine")
# Prepend / if it was missing from the folder path, also strip trailing slashes
if not self.folder.startswith('/'):
self.folder = '/%(folder)s' % self.params
self.folder = self.folder.rstrip('/')
datacenter = self.cache.find_obj(self.content, [vim.Datacenter], self.params['datacenter'])
if datacenter is None:
self.module.fail_json(msg='No datacenter named %(datacenter)s was found' % self.params)
dcpath = compile_folder_path_for_object(datacenter)
# Nested folder does not have trailing /
if not dcpath.endswith('/'):
dcpath += '/'
# Check for full path first in case it was already supplied
if self.folder.startswith(
dcpath + self.params["datacenter"] + "/vm"
) or self.folder.startswith(dcpath + "/" + self.params["datacenter"] + "/vm"):
fullpath = self.folder
elif self.folder.startswith("/vm/") or self.folder == "/vm":
fullpath = "%s%s%s" % (dcpath, self.params["datacenter"], self.folder)
elif self.folder.startswith("/"):
fullpath = "%s%s/vm%s" % (dcpath, self.params["datacenter"], self.folder)
else:
fullpath = "%s%s/vm/%s" % (dcpath, self.params["datacenter"], self.folder)
f_obj = self.content.searchIndex.FindByInventoryPath(fullpath)
# abort if no strategy was successful
if f_obj is None:
# Add some debugging values in failure.
details = {
'datacenter': datacenter.name,
'datacenter_path': dcpath,
'folder': self.folder,
'full_search_path': fullpath,
}
self.module.fail_json(msg='No folder %s matched in the search path : %s' % (self.folder, fullpath),
details=details)
destfolder = f_obj
if self.params['template']:
vm_obj = self.get_vm_or_template(template_name=self.params['template'])
if vm_obj is None:
self.module.fail_json(msg="Could not find a template named %(template)s" % self.params)
else:
vm_obj = None
# always get a resource_pool
resource_pool = self.get_resource_pool()
# set the destination datastore for VM & disks
if self.params['datastore']:
# Give precedence to datastore value provided by user
# User may want to deploy VM to specific datastore.
datastore_name = self.params['datastore']
# Check if user has provided datastore cluster first
datastore_cluster = self.cache.find_obj(self.content, [vim.StoragePod], datastore_name)
if datastore_cluster:
# If user specified datastore cluster so get recommended datastore
datastore_name = self.get_recommended_datastore(datastore_cluster_obj=datastore_cluster)
# Check if get_recommended_datastore or user specified datastore exists or not
datastore = self.cache.find_obj(self.content, [vim.Datastore], datastore_name)
else:
(datastore, datastore_name) = self.select_datastore(vm_obj)
self.configspec = vim.vm.ConfigSpec()
self.configspec.deviceChange = []
# create the relocation spec
self.relospec = vim.vm.RelocateSpec()
self.relospec.deviceChange = []
self.configure_guestid(vm_obj=vm_obj, vm_creation=True)
self.configure_cpu_and_memory(vm_obj=vm_obj, vm_creation=True)
self.configure_hardware_params(vm_obj=vm_obj)
self.configure_resource_alloc_info(vm_obj=vm_obj)
self.configure_vapp_properties(vm_obj=vm_obj)
self.configure_disks(vm_obj=vm_obj)
self.configure_network(vm_obj=vm_obj)
self.configure_cdrom(vm_obj=vm_obj)
self.configure_nvdimm(vm_obj=vm_obj)
# Find if we need network customizations (find keys in dictionary that requires customizations)
network_changes = False
for nw in self.params['networks']:
for key in nw:
# We don't need customizations for these keys
if key == 'type' and nw['type'] == 'dhcp':
network_changes = True
break
if key not in ('device_type', 'mac', 'name', 'vlan', 'type', 'start_connected', 'dvswitch_name'):
network_changes = True
break
if any(v is not None for v in self.params['customization'].values()) or network_changes or self.params.get('customization_spec') is not None:
self.customize_vm(vm_obj=vm_obj)
clonespec = None
clone_method = None
try:
if self.params['template']:
# Only select specific host when ESXi hostname is provided
if self.params['esxi_hostname']:
self.relospec.host = self.select_host()
self.relospec.datastore = datastore
# Convert disk present in template if is set
if self.params['convert']:
for device in vm_obj.config.hardware.device:
if isinstance(device, vim.vm.device.VirtualDisk):
disk_locator = vim.vm.RelocateSpec.DiskLocator()
disk_locator.diskBackingInfo = vim.vm.device.VirtualDisk.FlatVer2BackingInfo()
if self.params['convert'] == 'thin':
disk_locator.diskBackingInfo.thinProvisioned = True
if self.params['convert'] == 'eagerzeroedthick':
disk_locator.diskBackingInfo.eagerlyScrub = True
if self.params['convert'] == 'thick':
disk_locator.diskBackingInfo.diskMode = "persistent"
disk_locator.diskId = device.key
disk_locator.datastore = datastore
self.relospec.disk.append(disk_locator)
# https://www.vmware.com/support/developer/vc-sdk/visdk41pubs/ApiReference/vim.vm.RelocateSpec.html
# > pool: For a clone operation from a template to a virtual machine, this argument is required.
self.relospec.pool = resource_pool
linked_clone = self.params.get('linked_clone')
snapshot_src = self.params.get('snapshot_src', None)
if linked_clone:
if snapshot_src is not None:
self.relospec.diskMoveType = vim.vm.RelocateSpec.DiskMoveOptions.createNewChildDiskBacking
else:
self.module.fail_json(msg="Parameter 'linked_src' and 'snapshot_src' are"
" required together for linked clone operation.")
clonespec = vim.vm.CloneSpec(template=self.params['is_template'], location=self.relospec)
if self.customspec:
clonespec.customization = self.customspec
if snapshot_src is not None:
if vm_obj.snapshot is None:
self.module.fail_json(msg="No snapshots present for virtual machine or template [%(template)s]" % self.params)
snapshot = self.get_snapshots_by_name_recursively(snapshots=vm_obj.snapshot.rootSnapshotList,
snapname=snapshot_src)
if len(snapshot) != 1:
self.module.fail_json(msg='virtual machine "%(template)s" does not contain'
' snapshot named "%(snapshot_src)s"' % self.params)
clonespec.snapshot = snapshot[0].snapshot
clonespec.config = self.configspec
clone_method = 'Clone'
try:
task = vm_obj.Clone(folder=destfolder, name=self.params['name'], spec=clonespec)
except vim.fault.NoPermission as e:
self.module.fail_json(msg="Failed to clone virtual machine %s to folder %s "
"due to permission issue: %s" % (self.params['name'],
destfolder,
to_native(e.msg)))
self.change_detected = True
else:
# ConfigSpec require name for VM creation
self.configspec.name = self.params['name']
self.configspec.files = vim.vm.FileInfo(logDirectory=None,
snapshotDirectory=None,
suspendDirectory=None,
vmPathName="[" + datastore_name + "]")
esx_host = None
# Only select specific host when ESXi hostname is provided
if self.params['esxi_hostname']:
esx_host = self.select_host()
clone_method = 'CreateVM_Task'
try:
task = destfolder.CreateVM_Task(config=self.configspec, pool=resource_pool, host=esx_host)
except vmodl.fault.InvalidRequest as e:
self.module.fail_json(msg="Failed to create virtual machine due to invalid configuration "
"parameter %s" % to_native(e.msg))
except vim.fault.RestrictedVersion as e:
self.module.fail_json(msg="Failed to create virtual machine due to "
"product versioning restrictions: %s" % to_native(e.msg))
self.change_detected = True
self.wait_for_task(task)
except TypeError as e:
self.module.fail_json(msg="TypeError was returned, please ensure to give correct inputs. %s" % to_text(e))
if task.info.state == 'error':
# https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2021361
# https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2173
# provide these to the user for debugging
clonespec_json = serialize_spec(clonespec)
configspec_json = serialize_spec(self.configspec)
kwargs = {
'changed': self.change_applied,
'failed': True,
'msg': task.info.error.msg,
'clonespec': clonespec_json,
'configspec': configspec_json,
'clone_method': clone_method
}
return kwargs
else:
# set annotation
vm = task.info.result
if self.params['annotation']:
annotation_spec = vim.vm.ConfigSpec()
annotation_spec.annotation = str(self.params['annotation'])
task = vm.ReconfigVM_Task(annotation_spec)
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'annotation'}
if self.params['advanced_settings']:
vm_custom_spec = vim.vm.ConfigSpec()
self.customize_advanced_settings(vm_obj=vm, config_spec=vm_custom_spec)
task = vm.ReconfigVM_Task(vm_custom_spec)
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'advanced_settings'}
if self.params['customvalues']:
self.customize_customvalues(vm_obj=vm)
if self.params['wait_for_ip_address'] or self.params['wait_for_customization'] or self.params['state'] in ['poweredon', 'powered-on', 'restarted']:
set_vm_power_state(self.content, vm, 'poweredon', force=False)
if self.params['wait_for_ip_address']:
wait_for_vm_ip(self.content, vm, self.params['wait_for_ip_address_timeout'])
if self.params['wait_for_customization']:
is_customization_ok = self.wait_for_customization(vm=vm, timeout=self.params['wait_for_customization_timeout'])
if not is_customization_ok:
vm_facts = self.gather_facts(vm)
return {'changed': self.change_applied, 'failed': True,
'msg': 'Customization failed. For detailed information see warnings',
'instance': vm_facts, 'op': 'customization'}
vm_facts = self.gather_facts(vm)
return {'changed': self.change_applied, 'failed': False, 'instance': vm_facts}
def get_snapshots_by_name_recursively(self, snapshots, snapname):
snap_obj = []
for snapshot in snapshots:
if snapshot.name == snapname:
snap_obj.append(snapshot)
else:
snap_obj = snap_obj + self.get_snapshots_by_name_recursively(snapshot.childSnapshotList, snapname)
return snap_obj
def reconfigure_vm(self):
self.configspec = vim.vm.ConfigSpec()
self.configspec.deviceChange = []
# create the relocation spec
self.relospec = vim.vm.RelocateSpec()
self.relospec.deviceChange = []
self.configure_guestid(vm_obj=self.current_vm_obj)
self.configure_cpu_and_memory(vm_obj=self.current_vm_obj)
self.configure_hardware_params(vm_obj=self.current_vm_obj)
self.configure_disks(vm_obj=self.current_vm_obj)
self.configure_network(vm_obj=self.current_vm_obj)
self.configure_cdrom(vm_obj=self.current_vm_obj)
self.configure_nvdimm(vm_obj=self.current_vm_obj)
self.customize_advanced_settings(vm_obj=self.current_vm_obj, config_spec=self.configspec)
self.customize_customvalues(vm_obj=self.current_vm_obj)
self.configure_resource_alloc_info(vm_obj=self.current_vm_obj)
self.configure_vapp_properties(vm_obj=self.current_vm_obj)
if self.params['annotation'] and self.current_vm_obj.config.annotation != self.params['annotation']:
self.configspec.annotation = str(self.params['annotation'])
self.change_detected = True
if self.params['resource_pool']:
self.relospec.pool = self.get_resource_pool()
if self.relospec.pool != self.current_vm_obj.resourcePool:
self.tracked_changes['resourcePool'] = str(self.relospec.pool)
if self.module.check_mode:
self.change_applied = True
else:
task = self.current_vm_obj.RelocateVM_Task(spec=self.relospec)
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'relocate'}
# Only send VMware task if we see a modification
if self.change_detected:
self.tracked_changes['configspec'] = str(self.configspec)
if self.module.check_mode:
self.change_applied = True
else:
task = None
try:
task = self.current_vm_obj.ReconfigVM_Task(spec=self.configspec)
except vim.fault.RestrictedVersion as e:
self.module.fail_json(msg="Failed to reconfigure virtual machine due to"
" product versioning restrictions: %s" % to_native(e.msg))
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'reconfig'}
# Rename VM
if self.params['uuid'] and self.params['name'] and self.params['name'] != self.current_vm_obj.config.name:
self.tracked_changes['name'] = self.params['name']
if self.module.check_mode:
self.change_applied = True
else:
task = self.current_vm_obj.Rename_Task(self.params['name'])
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'rename'}
# Mark VM as Template
if self.params['is_template'] and not self.current_vm_obj.config.template:
try:
if not self.module.check_mode:
self.current_vm_obj.MarkAsTemplate()
self.change_applied = True
self.tracked_changes['MarkAsTemplate'] = True
except vmodl.fault.NotSupported as e:
self.module.fail_json(msg="Failed to mark virtual machine [%s] "
"as template: %s" % (self.params['name'], e.msg))
# Mark Template as VM
elif not self.params['is_template'] and self.current_vm_obj.config.template:
resource_pool = self.get_resource_pool()
kwargs = dict(pool=resource_pool)
if self.params.get('esxi_hostname', None):
host_system_obj = self.select_host()
kwargs.update(host=host_system_obj)
try:
if not self.module.check_mode:
self.current_vm_obj.MarkAsVirtualMachine(**kwargs)
self.change_applied = True
self.tracked_changes['MarkAsVirtualMachine'] = True
except vim.fault.InvalidState as invalid_state:
self.module.fail_json(msg="Virtual machine is not marked"
" as template : %s" % to_native(invalid_state.msg))
except vim.fault.InvalidDatastore as invalid_ds:
self.module.fail_json(msg="Converting template to virtual machine"
" operation cannot be performed on the"
" target datastores: %s" % to_native(invalid_ds.msg))
except vim.fault.CannotAccessVmComponent as cannot_access:
self.module.fail_json(msg="Failed to convert template to virtual machine"
" as operation unable access virtual machine"
" component: %s" % to_native(cannot_access.msg))
except vmodl.fault.InvalidArgument as invalid_argument:
self.module.fail_json(msg="Failed to convert template to virtual machine"
" due to : %s" % to_native(invalid_argument.msg))
except Exception as generic_exc:
self.module.fail_json(msg="Failed to convert template to virtual machine"
" due to generic error : %s" % to_native(generic_exc))
# add customize existing VM after VM re-configure
if self.params['customization']['existing_vm']:
if self.current_vm_obj.config.template:
self.module.fail_json(msg="VM is template, not support guest OS customization.")
if self.current_vm_obj.runtime.powerState != vim.VirtualMachinePowerState.poweredOff and not self.module.check_mode:
self.module.fail_json(msg="VM is not in poweroff state, can not do guest OS customization.")
# TODO not sure if it is possible to query the current customspec to compare against the one being provided to check in check mode.
# Maybe by breaking down the individual fields and querying, but it needs more research.
# For now, assume changed...
self.tracked_changes['customization'] = True
if self.module.check_mode:
self.change_applied = True
else:
cus_result = self.customize_exist_vm()
if cus_result['failed']:
return cus_result
vm_facts = self.gather_facts(self.current_vm_obj)
return {'changed': self.change_applied, 'failed': False, 'instance': vm_facts, 'changes': self.tracked_changes}
def customize_exist_vm(self):
task = None
# Find if we need network customizations (find keys in dictionary that requires customizations)
network_changes = False
for nw in self.params['networks']:
for key in nw:
# We don't need customizations for these keys
if key not in ('device_type', 'mac', 'name', 'vlan', 'type', 'start_connected', 'dvswitch_name'):
network_changes = True
break
if any(v is not None for v in self.params['customization'].values()) or network_changes or self.params.get('customization_spec'):
self.customize_vm(vm_obj=self.current_vm_obj)
try:
task = self.current_vm_obj.CustomizeVM_Task(self.customspec)
except vim.fault.CustomizationFault as e:
self.module.fail_json(msg="Failed to customization virtual machine due to CustomizationFault: %s" % to_native(e.msg))
except vim.fault.RuntimeFault as e:
self.module.fail_json(msg="failed to customization virtual machine due to RuntimeFault: %s" % to_native(e.msg))
except Exception as e:
self.module.fail_json(msg="failed to customization virtual machine due to fault: %s" % to_native(e.msg))
self.wait_for_task(task)
if task.info.state == 'error':
return {'changed': self.change_applied, 'failed': True, 'msg': task.info.error.msg, 'op': 'customize_exist'}
if self.params['wait_for_customization']:
set_vm_power_state(self.content, self.current_vm_obj, 'poweredon', force=False)
is_customization_ok = self.wait_for_customization(vm=self.current_vm_obj, timeout=self.params['wait_for_customization_timeout'])
if not is_customization_ok:
return {'changed': self.change_applied, 'failed': True,
'msg': 'Customization failed. For detailed information see warnings',
'op': 'wait_for_customize_exist'}
return {'changed': self.change_applied, 'failed': False}
def wait_for_task(self, task, poll_interval=1):
"""
Wait for a VMware task to complete. Terminal states are 'error' and 'success'.
Inputs:
- task: the task to wait for
- poll_interval: polling interval to check the task, in seconds
Modifies:
- self.change_applied
"""
# https://www.vmware.com/support/developer/vc-sdk/visdk25pubs/ReferenceGuide/vim.Task.html
# https://www.vmware.com/support/developer/vc-sdk/visdk25pubs/ReferenceGuide/vim.TaskInfo.html
# https://github.com/virtdevninja/pyvmomi-community-samples/blob/master/samples/tools/tasks.py
while task.info.state not in ['error', 'success']:
time.sleep(poll_interval)
self.change_applied = self.change_applied or task.info.state == 'success'
def get_vm_events(self, vm, eventTypeIdList):
byEntity = vim.event.EventFilterSpec.ByEntity(entity=vm, recursion="self")
filterSpec = vim.event.EventFilterSpec(entity=byEntity, eventTypeId=eventTypeIdList)
eventManager = self.content.eventManager
return eventManager.QueryEvent(filterSpec)
def wait_for_customization(self, vm, timeout=3600, sleep=10):
poll = int(timeout // sleep)
thispoll = 0
while thispoll <= poll:
eventStarted = self.get_vm_events(vm, ['CustomizationStartedEvent'])
if len(eventStarted):
thispoll = 0
while thispoll <= poll:
eventsFinishedResult = self.get_vm_events(vm, ['CustomizationSucceeded', 'CustomizationFailed'])
if len(eventsFinishedResult):
if not isinstance(eventsFinishedResult[0], vim.event.CustomizationSucceeded):
self.module.warn("Customization failed with error {%s}:{%s}"
% (eventsFinishedResult[0]._wsdlName, eventsFinishedResult[0].fullFormattedMessage))
return False
else:
return True
else:
time.sleep(sleep)
thispoll += 1
if len(eventsFinishedResult) == 0:
self.module.warn('Waiting for customization result event timed out.')
return False
else:
time.sleep(sleep)
thispoll += 1
if len(eventStarted):
self.module.warn('Waiting for customization result event timed out.')
else:
self.module.warn('Waiting for customization start event timed out.')
return False
def main():
argument_spec = vmware_argument_spec()
argument_spec.update(
state=dict(type='str', default='present',
choices=['absent', 'poweredoff', 'powered-off',
'poweredon', 'powered-on', 'present',
'rebootguest', 'reboot-guest', 'restarted',
'shutdownguest', 'shutdown-guest', 'suspended']),
template=dict(type='str', aliases=['template_src']),
is_template=dict(type='bool', default=False),
annotation=dict(type='str', aliases=['notes']),
customvalues=dict(type='list', default=[], elements='dict'),
advanced_settings=dict(type='list', default=[], elements='dict'),
name=dict(type='str'),
name_match=dict(type='str', choices=['first', 'last'], default='first'),
uuid=dict(type='str'),
use_instance_uuid=dict(type='bool', default=False),
folder=dict(type='str'),
guest_id=dict(type='str'),
disk=dict(
type='list',
default=[],
elements='dict',
options=dict(
autoselect_datastore=dict(type='bool'),
controller_number=dict(type='int', choices=[0, 1, 2, 3]),
controller_type=dict(type='str', choices=['buslogic', 'lsilogic', 'paravirtual', 'lsilogicsas', 'sata', 'nvme']),
datastore=dict(type='str'),
disk_mode=dict(type='str', choices=['persistent', 'independent_persistent', 'independent_nonpersistent']),
filename=dict(type='str'),
size=dict(type='str'),
size_gb=dict(type='int'),
size_kb=dict(type='int'),
size_mb=dict(type='int'),
size_tb=dict(type='int'),
type=dict(type='str', choices=['thin', 'eagerzeroedthick', 'thick']),
unit_number=dict(type='int'),
)
),
nvdimm=dict(
type='dict',
default={},
options=dict(
state=dict(type='str', choices=['present', 'absent']),
label=dict(type='str'),
size_mb=dict(type='int', default=1024),
)
),
cdrom=dict(type='raw', default=[]),
hardware=dict(
type='dict',
default={},
options=dict(
boot_firmware=dict(type='str', choices=['bios', 'efi']),
cpu_limit=dict(type='int'),
cpu_reservation=dict(type='int'),
hotadd_cpu=dict(type='bool'),
hotadd_memory=dict(type='bool'),
hotremove_cpu=dict(type='bool'),
vpmc_enabled=dict(type='bool'),
max_connections=dict(type='int'),
mem_limit=dict(type='int'),
cpu_shares_level=dict(type='str', choices=['low', 'normal', 'high', 'custom']),
mem_shares_level=dict(type='str', choices=['low', 'normal', 'high', 'custom']),
cpu_shares=dict(type='int'),
mem_shares=dict(type='int'),
mem_reservation=dict(type='int', aliases=['memory_reservation']),
memory_mb=dict(type='int'),
memory_reservation_lock=dict(type='bool'),
nested_virt=dict(type='bool'),
num_cpu_cores_per_socket=dict(type='int'),
num_cpus=dict(type='int'),
scsi=dict(type='str', choices=['buslogic', 'lsilogic', 'lsilogicsas', 'paravirtual']),
secure_boot=dict(type='bool'),
version=dict(type='str'),
virt_based_security=dict(type='bool'),
iommu=dict(type='bool')
)),
force=dict(type='bool', default=False),
datacenter=dict(type='str', default='ha-datacenter'),
esxi_hostname=dict(type='str'),
cluster=dict(type='str'),
wait_for_ip_address=dict(type='bool', default=False),
wait_for_ip_address_timeout=dict(type='int', default=300),
state_change_timeout=dict(type='int', default=0),
snapshot_src=dict(type='str'),
linked_clone=dict(type='bool', default=False),
networks=dict(type='list', default=[], elements='dict'),
resource_pool=dict(type='str'),
customization=dict(
type='dict',
default={},
options=dict(
autologon=dict(type='bool'),
autologoncount=dict(type='int'),
dns_servers=dict(type='list', elements='str'),
dns_suffix=dict(type='list', elements='str'),
domain=dict(type='str'),
domainadmin=dict(type='str'),
domainadminpassword=dict(type='str', no_log=True),
existing_vm=dict(type='bool'),
fullname=dict(type='str'),
hostname=dict(type='str'),
hwclockUTC=dict(type='bool'),
joindomain=dict(type='str'),
joinworkgroup=dict(type='str'),
orgname=dict(type='str'),
password=dict(type='str', no_log=True),
productid=dict(type='str'),
runonce=dict(type='list', elements='str'),
script_text=dict(type='str'),
timezone=dict(type='str')
)),
customization_spec=dict(type='str', default=None),
wait_for_customization=dict(type='bool', default=False),
wait_for_customization_timeout=dict(type='int', default=3600),
vapp_properties=dict(type='list', default=[], elements='dict'),
datastore=dict(type='str'),
convert=dict(type='str', choices=['thin', 'thick', 'eagerzeroedthick']),
delete_from_inventory=dict(type='bool', default=False),
)
module = AnsibleModule(argument_spec=argument_spec,
supports_check_mode=True,
mutually_exclusive=[
['cluster', 'esxi_hostname'],
],
required_one_of=[
['name', 'uuid'],
],
)
result = {'failed': False, 'changed': False}
pyv = PyVmomiHelper(module)
# Check requirements for virtualization based security
if pyv.params['hardware']['virt_based_security']:
if not pyv.params['hardware']['nested_virt']:
pyv.module.fail_json(msg="Virtualization based security requires nested virtualization. Please enable nested_virt.")
if not pyv.params['hardware']['secure_boot']:
pyv.module.fail_json(msg="Virtualization based security requires (U)EFI secure boot. Please enable secure_boot.")
if not pyv.params['hardware']['iommu']:
pyv.module.fail_json(msg="Virtualization based security requires I/O MMU. Please enable iommu.")
# Check if the VM exists before continuing
vm = pyv.get_vm()
# VM already exists
if vm:
if module.params['state'] == 'absent':
# destroy it
if module.check_mode:
result.update(
vm_name=vm.name,
changed=True,
current_powerstate=vm.summary.runtime.powerState.lower(),
desired_operation='remove_vm',
)
module.exit_json(**result)
if module.params['force']:
# has to be poweredoff first
set_vm_power_state(pyv.content, vm, 'poweredoff', module.params['force'])
result = pyv.remove_vm(vm, module.params['delete_from_inventory'])
elif module.params['state'] == 'present':
# Note that check_mode is handled inside reconfigure_vm
result = pyv.reconfigure_vm()
elif module.params['state'] in ['poweredon', 'powered-on', 'poweredoff',
'powered-off', 'restarted', 'suspended',
'shutdownguest', 'shutdown-guest',
'rebootguest', 'reboot-guest']:
if module.check_mode:
# Identify if the power state would have changed if not in check mode
current_powerstate = vm.summary.runtime.powerState.lower()
powerstate_will_change = False
if ((current_powerstate == 'poweredon' and module.params['state'] not in ['poweredon', 'powered-on'])
or (current_powerstate == 'poweredoff' and module.params['state']
not in ['poweredoff', 'powered-off', 'shutdownguest', 'shutdown-guest'])
or (current_powerstate == 'suspended' and module.params['state'] != 'suspended')):
powerstate_will_change = True
result.update(
vm_name=vm.name,
changed=powerstate_will_change,
current_powerstate=current_powerstate,
desired_operation='set_vm_power_state',
)
module.exit_json(**result)
# set powerstate
tmp_result = set_vm_power_state(pyv.content, vm, module.params['state'], module.params['force'], module.params['state_change_timeout'])
if tmp_result['changed']:
result["changed"] = True
if module.params['state'] in ['poweredon', 'powered-on', 'restarted', 'rebootguest', 'reboot-guest'] and module.params['wait_for_ip_address']:
wait_result = wait_for_vm_ip(pyv.content, vm, module.params['wait_for_ip_address_timeout'])
if not wait_result:
module.fail_json(msg='Waiting for IP address timed out')
tmp_result['instance'] = wait_result
if not tmp_result["failed"]:
result["failed"] = False
result['instance'] = tmp_result['instance']
if tmp_result["failed"]:
result["failed"] = True
result["msg"] = tmp_result["msg"]
else:
# This should not happen
raise AssertionError()
# VM doesn't exist
else:
if module.params['state'] in ['poweredon', 'powered-on', 'poweredoff', 'powered-off',
'present', 'restarted', 'suspended']:
if module.check_mode:
result.update(
changed=True,
desired_operation='deploy_vm',
)
module.exit_json(**result)
result = pyv.deploy_vm()
if result['failed']:
module.fail_json(msg='Failed to create a virtual machine : %s' % result['msg'])
if result['failed']:
module.fail_json(**result)
else:
module.exit_json(**result)
if __name__ == '__main__':
main()