4 # Copyright (C) 2006, 2007, 2010, 2011, 2012 Google Inc.
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 # General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
22 """Ganeti node daemon"""
24 # pylint: disable=C0103,W0142
26 # C0103: Functions in this module need to have a given name structure,
27 # and the name of the daemon doesn't match
29 # W0142: Used * or ** magic, since we do use it extensively in this
38 from optparse import OptionParser
40 from ganeti import backend
41 from ganeti import constants
42 from ganeti import objects
43 from ganeti import errors
44 from ganeti import jstore
45 from ganeti import daemon
46 from ganeti import http
47 from ganeti import utils
48 from ganeti.storage import container
49 from ganeti import serializer
50 from ganeti import netutils
51 from ganeti import pathutils
52 from ganeti import ssconf
54 import ganeti.http.server # pylint: disable=W0611
60 def _extendReasonTrail(trail, source, reason=""):
61 """Extend the reason trail with noded information
63 The trail is extended by appending the name of the noded functionality
65 assert trail is not None
66 trail_source = "%s:%s" % (constants.OPCODE_REASON_SRC_NODED, source)
67 trail.append((trail_source, reason, utils.EpochNano()))
70 def _PrepareQueueLock():
71 """Try to prepare the queue lock.
73 @return: None for success, otherwise an exception object
76 global queue_lock # pylint: disable=W0603
78 if queue_lock is not None:
83 queue_lock = jstore.InitAndVerifyQueue(must_lock=False)
85 except EnvironmentError, err:
89 def _RequireJobQueueLock(fn):
90 """Decorator for job queue manipulating functions.
93 QUEUE_LOCK_TIMEOUT = 10
95 def wrapper(*args, **kwargs):
96 # Locking in exclusive, blocking mode because there could be several
97 # children running at the same time. Waiting up to 10 seconds.
98 if _PrepareQueueLock() is not None:
99 raise errors.JobQueueError("Job queue failed initialization,"
100 " cannot update jobs")
101 queue_lock.Exclusive(blocking=True, timeout=QUEUE_LOCK_TIMEOUT)
103 return fn(*args, **kwargs)
110 def _DecodeImportExportIO(ieio, ieioargs):
111 """Decodes import/export I/O information.
114 if ieio == constants.IEIO_RAW_DISK:
115 assert len(ieioargs) == 1
116 return (objects.Disk.FromDict(ieioargs[0]), )
118 if ieio == constants.IEIO_SCRIPT:
119 assert len(ieioargs) == 2
120 return (objects.Disk.FromDict(ieioargs[0]), ieioargs[1])
125 def _DefaultAlternative(value, default):
126 """Returns value or, if evaluating to False, a default value.
128 Returns the given value, unless it evaluates to False. In the latter case the
129 default value is returned.
131 @param value: Value to return if it doesn't evaluate to False
132 @param default: Default value
133 @return: Given value or the default
142 class MlockallRequestExecutor(http.server.HttpServerRequestExecutor):
143 """Subclass ensuring request handlers are locked in RAM.
146 def __init__(self, *args, **kwargs):
149 http.server.HttpServerRequestExecutor.__init__(self, *args, **kwargs)
152 class NodeRequestHandler(http.server.HttpServerHandler):
153 """The server implementation.
155 This class holds all methods exposed over the RPC interface.
158 # too many public methods, and unused args - all methods get params
160 # pylint: disable=R0904,W0613
162 http.server.HttpServerHandler.__init__(self)
163 self.noded_pid = os.getpid()
165 def HandleRequest(self, req):
169 if req.request_method.upper() != http.HTTP_POST:
170 raise http.HttpBadRequest("Only the POST method is supported")
172 path = req.request_path
173 if path.startswith("/"):
176 method = getattr(self, "perspective_%s" % path, None)
178 raise http.HttpNotFound()
181 result = (True, method(serializer.LoadJson(req.request_body)))
183 except backend.RPCFail, err:
184 # our custom failure exception; str(err) works fine if the
185 # exception was constructed with a single argument, and in
186 # this case, err.message == err.args[0] == str(err)
187 result = (False, str(err))
188 except errors.QuitGanetiException, err:
189 # Tell parent to quit
190 logging.info("Shutting down the node daemon, arguments: %s",
192 os.kill(self.noded_pid, signal.SIGTERM)
193 # And return the error's arguments, which must be already in
194 # correct tuple format
196 except Exception, err:
197 logging.exception("Error in RPC call")
198 result = (False, "Error while executing backend function: %s" % str(err))
200 return serializer.DumpJson(result)
202 # the new block devices --------------------------
205 def perspective_blockdev_create(params):
206 """Create a block device.
209 (bdev_s, size, owner, on_primary, info, excl_stor) = params
210 bdev = objects.Disk.FromDict(bdev_s)
212 raise ValueError("can't unserialize data!")
213 return backend.BlockdevCreate(bdev, size, owner, on_primary, info,
217 def perspective_blockdev_pause_resume_sync(params):
218 """Pause/resume sync of a block device.
221 disks_s, pause = params
222 disks = [objects.Disk.FromDict(bdev_s) for bdev_s in disks_s]
223 return backend.BlockdevPauseResumeSync(disks, pause)
226 def perspective_blockdev_wipe(params):
227 """Wipe a block device.
230 bdev_s, offset, size = params
231 bdev = objects.Disk.FromDict(bdev_s)
232 return backend.BlockdevWipe(bdev, offset, size)
235 def perspective_blockdev_remove(params):
236 """Remove a block device.
240 bdev = objects.Disk.FromDict(bdev_s)
241 return backend.BlockdevRemove(bdev)
244 def perspective_blockdev_rename(params):
245 """Remove a block device.
248 devlist = [(objects.Disk.FromDict(ds), uid) for ds, uid in params[0]]
249 return backend.BlockdevRename(devlist)
252 def perspective_blockdev_assemble(params):
253 """Assemble a block device.
256 bdev_s, owner, on_primary, idx = params
257 bdev = objects.Disk.FromDict(bdev_s)
259 raise ValueError("can't unserialize data!")
260 return backend.BlockdevAssemble(bdev, owner, on_primary, idx)
263 def perspective_blockdev_shutdown(params):
264 """Shutdown a block device.
268 bdev = objects.Disk.FromDict(bdev_s)
270 raise ValueError("can't unserialize data!")
271 return backend.BlockdevShutdown(bdev)
274 def perspective_blockdev_addchildren(params):
275 """Add a child to a mirror device.
277 Note: this is only valid for mirror devices. It's the caller's duty
278 to send a correct disk, otherwise we raise an error.
281 bdev_s, ndev_s = params
282 bdev = objects.Disk.FromDict(bdev_s)
283 ndevs = [objects.Disk.FromDict(disk_s) for disk_s in ndev_s]
284 if bdev is None or ndevs.count(None) > 0:
285 raise ValueError("can't unserialize data!")
286 return backend.BlockdevAddchildren(bdev, ndevs)
289 def perspective_blockdev_removechildren(params):
290 """Remove a child from a mirror device.
292 This is only valid for mirror devices, of course. It's the callers
293 duty to send a correct disk, otherwise we raise an error.
296 bdev_s, ndev_s = params
297 bdev = objects.Disk.FromDict(bdev_s)
298 ndevs = [objects.Disk.FromDict(disk_s) for disk_s in ndev_s]
299 if bdev is None or ndevs.count(None) > 0:
300 raise ValueError("can't unserialize data!")
301 return backend.BlockdevRemovechildren(bdev, ndevs)
304 def perspective_blockdev_getmirrorstatus(params):
305 """Return the mirror status for a list of disks.
308 disks = [objects.Disk.FromDict(dsk_s)
309 for dsk_s in params[0]]
310 return [status.ToDict()
311 for status in backend.BlockdevGetmirrorstatus(disks)]
314 def perspective_blockdev_getmirrorstatus_multi(params):
315 """Return the mirror status for a list of disks.
318 (node_disks, ) = params
320 disks = [objects.Disk.FromDict(dsk_s) for dsk_s in node_disks]
324 for (success, status) in backend.BlockdevGetmirrorstatusMulti(disks):
326 result.append((success, status.ToDict()))
328 result.append((success, status))
333 def perspective_blockdev_find(params):
334 """Expose the FindBlockDevice functionality for a disk.
336 This will try to find but not activate a disk.
339 disk = objects.Disk.FromDict(params[0])
341 result = backend.BlockdevFind(disk)
345 return result.ToDict()
348 def perspective_blockdev_snapshot(params):
349 """Create a snapshot device.
351 Note that this is only valid for LVM disks, if we get passed
352 something else we raise an exception. The snapshot device can be
353 remove by calling the generic block device remove call.
356 cfbd = objects.Disk.FromDict(params[0])
357 return backend.BlockdevSnapshot(cfbd)
360 def perspective_blockdev_grow(params):
361 """Grow a stack of devices.
365 raise ValueError("Received only %s parameters in blockdev_grow,"
366 " old master?" % len(params))
367 cfbd = objects.Disk.FromDict(params[0])
370 backingstore = params[3]
371 excl_stor = params[4]
372 return backend.BlockdevGrow(cfbd, amount, dryrun, backingstore, excl_stor)
375 def perspective_blockdev_close(params):
376 """Closes the given block devices.
379 disks = [objects.Disk.FromDict(cf) for cf in params[1]]
380 return backend.BlockdevClose(params[0], disks)
383 def perspective_blockdev_getdimensions(params):
384 """Compute the sizes of the given block devices.
387 disks = [objects.Disk.FromDict(cf) for cf in params[0]]
388 return backend.BlockdevGetdimensions(disks)
391 def perspective_blockdev_export(params):
392 """Compute the sizes of the given block devices.
395 disk = objects.Disk.FromDict(params[0])
396 dest_node, dest_path, cluster_name = params[1:]
397 return backend.BlockdevExport(disk, dest_node, dest_path, cluster_name)
400 def perspective_blockdev_setinfo(params):
401 """Sets metadata information on the given block device.
404 (disk, info) = params
405 disk = objects.Disk.FromDict(disk)
406 return backend.BlockdevSetInfo(disk, info)
408 # blockdev/drbd specific methods ----------
411 def perspective_drbd_disconnect_net(params):
412 """Disconnects the network connection of drbd disks.
414 Note that this is only valid for drbd disks, so the members of the
415 disk list must all be drbd devices.
418 nodes_ip, disks, target_node_uuid = params
419 disks = [objects.Disk.FromDict(cf) for cf in disks]
420 return backend.DrbdDisconnectNet(target_node_uuid, nodes_ip, disks)
423 def perspective_drbd_attach_net(params):
424 """Attaches the network connection of drbd disks.
426 Note that this is only valid for drbd disks, so the members of the
427 disk list must all be drbd devices.
430 nodes_ip, disks, instance_name, multimaster, target_node_uuid = params
431 disks = [objects.Disk.FromDict(cf) for cf in disks]
432 return backend.DrbdAttachNet(target_node_uuid, nodes_ip, disks,
433 instance_name, multimaster)
436 def perspective_drbd_wait_sync(params):
437 """Wait until DRBD disks are synched.
439 Note that this is only valid for drbd disks, so the members of the
440 disk list must all be drbd devices.
443 nodes_ip, disks, target_node_uuid = params
444 disks = [objects.Disk.FromDict(cf) for cf in disks]
445 return backend.DrbdWaitSync(target_node_uuid, nodes_ip, disks)
448 def perspective_drbd_needs_activation(params):
449 """Checks if the drbd devices need activation
451 Note that this is only valid for drbd disks, so the members of the
452 disk list must all be drbd devices.
455 nodes_ip, disks, target_node_uuid = params
456 disks = [objects.Disk.FromDict(cf) for cf in disks]
457 return backend.DrbdNeedsActivation(target_node_uuid, nodes_ip, disks)
460 def perspective_drbd_helper(params):
461 """Query drbd helper.
464 return backend.GetDrbdUsermodeHelper()
466 # export/import --------------------------
469 def perspective_finalize_export(params):
470 """Expose the finalize export functionality.
473 instance = objects.Instance.FromDict(params[0])
476 for disk in params[1]:
477 if isinstance(disk, bool):
478 snap_disks.append(disk)
480 snap_disks.append(objects.Disk.FromDict(disk))
482 return backend.FinalizeExport(instance, snap_disks)
485 def perspective_export_info(params):
486 """Query information about an existing export on this node.
488 The given path may not contain an export, in which case we return
493 return backend.ExportInfo(path)
496 def perspective_export_list(params):
497 """List the available exports on this node.
499 Note that as opposed to export_info, which may query data about an
500 export in any path, this only queries the standard Ganeti path
501 (pathutils.EXPORT_DIR).
504 return backend.ListExports()
507 def perspective_export_remove(params):
512 return backend.RemoveExport(export)
514 # block device ---------------------
516 def perspective_bdev_sizes(params):
517 """Query the list of block devices
521 return backend.GetBlockDevSizes(devices)
523 # volume --------------------------
526 def perspective_lv_list(params):
527 """Query the list of logical volumes in a given volume group.
531 return backend.GetVolumeList(vgname)
534 def perspective_vg_list(params):
535 """Query the list of volume groups.
538 return backend.ListVolumeGroups()
540 # Storage --------------------------
543 def perspective_storage_list(params):
544 """Get list of storage units.
547 (su_name, su_args, name, fields) = params
548 return container.GetStorage(su_name, *su_args).List(name, fields)
551 def perspective_storage_modify(params):
552 """Modify a storage unit.
555 (su_name, su_args, name, changes) = params
556 return container.GetStorage(su_name, *su_args).Modify(name, changes)
559 def perspective_storage_execute(params):
560 """Execute an operation on a storage unit.
563 (su_name, su_args, name, op) = params
564 return container.GetStorage(su_name, *su_args).Execute(name, op)
566 # bridge --------------------------
569 def perspective_bridges_exist(params):
570 """Check if all bridges given exist on this node.
573 bridges_list = params[0]
574 return backend.BridgesExist(bridges_list)
576 # instance --------------------------
579 def perspective_instance_os_add(params):
580 """Install an OS on a given instance.
584 inst = objects.Instance.FromDict(inst_s)
585 reinstall = params[1]
587 return backend.InstanceOsAdd(inst, reinstall, debug)
590 def perspective_instance_run_rename(params):
591 """Runs the OS rename script for an instance.
594 inst_s, old_name, debug = params
595 inst = objects.Instance.FromDict(inst_s)
596 return backend.RunRenameInstance(inst, old_name, debug)
599 def perspective_instance_shutdown(params):
600 """Shutdown an instance.
603 instance = objects.Instance.FromDict(params[0])
606 _extendReasonTrail(trail, "shutdown")
607 return backend.InstanceShutdown(instance, timeout, trail)
610 def perspective_instance_start(params):
611 """Start an instance.
614 (instance_name, startup_paused, trail) = params
615 instance = objects.Instance.FromDict(instance_name)
616 _extendReasonTrail(trail, "start")
617 return backend.StartInstance(instance, startup_paused, trail)
620 def perspective_migration_info(params):
621 """Gather information about an instance to be migrated.
624 instance = objects.Instance.FromDict(params[0])
625 return backend.MigrationInfo(instance)
628 def perspective_accept_instance(params):
629 """Prepare the node to accept an instance.
632 instance, info, target = params
633 instance = objects.Instance.FromDict(instance)
634 return backend.AcceptInstance(instance, info, target)
637 def perspective_instance_finalize_migration_dst(params):
638 """Finalize the instance migration on the destination node.
641 instance, info, success = params
642 instance = objects.Instance.FromDict(instance)
643 return backend.FinalizeMigrationDst(instance, info, success)
646 def perspective_instance_migrate(params):
647 """Migrates an instance.
650 cluster_name, instance, target, live = params
651 instance = objects.Instance.FromDict(instance)
652 return backend.MigrateInstance(cluster_name, instance, target, live)
655 def perspective_instance_finalize_migration_src(params):
656 """Finalize the instance migration on the source node.
659 instance, success, live = params
660 instance = objects.Instance.FromDict(instance)
661 return backend.FinalizeMigrationSource(instance, success, live)
664 def perspective_instance_get_migration_status(params):
665 """Reports migration status.
668 instance = objects.Instance.FromDict(params[0])
669 return backend.GetMigrationStatus(instance).ToDict()
672 def perspective_instance_reboot(params):
673 """Reboot an instance.
676 instance = objects.Instance.FromDict(params[0])
677 reboot_type = params[1]
678 shutdown_timeout = params[2]
680 _extendReasonTrail(trail, "reboot")
681 return backend.InstanceReboot(instance, reboot_type, shutdown_timeout,
685 def perspective_instance_balloon_memory(params):
686 """Modify instance runtime memory.
689 instance_dict, memory = params
690 instance = objects.Instance.FromDict(instance_dict)
691 return backend.InstanceBalloonMemory(instance, memory)
694 def perspective_instance_info(params):
695 """Query instance information.
698 (instance_name, hypervisor_name, hvparams) = params
699 return backend.GetInstanceInfo(instance_name, hypervisor_name, hvparams)
702 def perspective_instance_migratable(params):
703 """Query whether the specified instance can be migrated.
706 instance = objects.Instance.FromDict(params[0])
707 return backend.GetInstanceMigratable(instance)
710 def perspective_all_instances_info(params):
711 """Query information about all instances.
714 (hypervisor_list, all_hvparams) = params
715 return backend.GetAllInstancesInfo(hypervisor_list, all_hvparams)
718 def perspective_instance_list(params):
719 """Query the list of running instances.
722 (hypervisor_list, hvparams) = params
723 return backend.GetInstanceList(hypervisor_list, hvparams)
725 # node --------------------------
728 def perspective_node_has_ip_address(params):
729 """Checks if a node has the given ip address.
732 return netutils.IPAddress.Own(params[0])
735 def perspective_node_info(params):
736 """Query node information.
739 (storage_units, hv_specs) = params
740 return backend.GetNodeInfo(storage_units, hv_specs)
743 def perspective_etc_hosts_modify(params):
744 """Modify a node entry in /etc/hosts.
747 backend.EtcHostsModify(params[0], params[1], params[2])
752 def perspective_node_verify(params):
753 """Run a verify sequence on this node.
756 (what, cluster_name, hvparams) = params
757 return backend.VerifyNode(what, cluster_name, hvparams)
760 def perspective_node_verify_light(cls, params):
761 """Run a light verify sequence on this node.
764 # So far it's the same as the normal node_verify
765 return cls.perspective_node_verify(params)
768 def perspective_node_start_master_daemons(params):
769 """Start the master daemons on this node.
772 return backend.StartMasterDaemons(params[0])
775 def perspective_node_activate_master_ip(params):
776 """Activate the master IP on this node.
779 master_params = objects.MasterNetworkParameters.FromDict(params[0])
780 return backend.ActivateMasterIp(master_params, params[1])
783 def perspective_node_deactivate_master_ip(params):
784 """Deactivate the master IP on this node.
787 master_params = objects.MasterNetworkParameters.FromDict(params[0])
788 return backend.DeactivateMasterIp(master_params, params[1])
791 def perspective_node_stop_master(params):
792 """Stops master daemons on this node.
795 return backend.StopMasterDaemons()
798 def perspective_node_change_master_netmask(params):
799 """Change the master IP netmask.
802 return backend.ChangeMasterNetmask(params[0], params[1], params[2],
806 def perspective_node_leave_cluster(params):
807 """Cleanup after leaving a cluster.
810 return backend.LeaveCluster(params[0])
813 def perspective_node_volumes(params):
814 """Query the list of all logical volume groups.
817 return backend.NodeVolumes()
820 def perspective_node_demote_from_mc(params):
821 """Demote a node from the master candidate role.
824 return backend.DemoteFromMC()
827 def perspective_node_powercycle(params):
828 """Tries to powercycle the nod.
831 (hypervisor_type, hvparams) = params
832 return backend.PowercycleNode(hypervisor_type, hvparams)
834 # cluster --------------------------
837 def perspective_version(params):
838 """Query version information.
841 return constants.PROTOCOL_VERSION
844 def perspective_upload_file(params):
847 Note that the backend implementation imposes strict rules on which
851 return backend.UploadFile(*(params[0]))
854 def perspective_master_info(params):
855 """Query master information.
858 return backend.GetMasterInfo()
861 def perspective_run_oob(params):
865 output = backend.RunOob(params[0], params[1], params[2], params[3])
867 result = serializer.LoadJson(output)
873 def perspective_restricted_command(params):
874 """Runs a restricted command.
879 return backend.RunRestrictedCmd(cmd)
882 def perspective_write_ssconf_files(params):
883 """Write ssconf files.
887 return ssconf.WriteSsconfFiles(values)
890 def perspective_get_watcher_pause(params):
891 """Get watcher pause end.
894 return utils.ReadWatcherPauseFile(pathutils.WATCHER_PAUSEFILE)
897 def perspective_set_watcher_pause(params):
898 """Set watcher pause.
902 return backend.SetWatcherPause(until)
904 # os -----------------------
907 def perspective_os_diagnose(params):
908 """Query detailed information about existing OSes.
911 return backend.DiagnoseOS()
914 def perspective_os_get(params):
915 """Query information about a given OS.
919 os_obj = backend.OSFromDisk(name)
920 return os_obj.ToDict()
923 def perspective_os_validate(params):
924 """Run a given OS' validation routine.
927 required, name, checks, params = params
928 return backend.ValidateOS(required, name, checks, params)
930 # extstorage -----------------------
933 def perspective_extstorage_diagnose(params):
934 """Query detailed information about existing extstorage providers.
937 return backend.DiagnoseExtStorage()
939 # hooks -----------------------
942 def perspective_hooks_runner(params):
946 hpath, phase, env = params
947 hr = backend.HooksRunner()
948 return hr.RunHooks(hpath, phase, env)
950 # iallocator -----------------
953 def perspective_iallocator_runner(params):
954 """Run an iallocator script.
958 iar = backend.IAllocatorRunner()
959 return iar.Run(name, idata)
961 # test -----------------------
964 def perspective_test_delay(params):
969 status, rval = utils.TestDelay(duration)
971 raise backend.RPCFail(rval)
974 # file storage ---------------
977 def perspective_file_storage_dir_create(params):
978 """Create the file storage directory.
981 file_storage_dir = params[0]
982 return backend.CreateFileStorageDir(file_storage_dir)
985 def perspective_file_storage_dir_remove(params):
986 """Remove the file storage directory.
989 file_storage_dir = params[0]
990 return backend.RemoveFileStorageDir(file_storage_dir)
993 def perspective_file_storage_dir_rename(params):
994 """Rename the file storage directory.
997 old_file_storage_dir = params[0]
998 new_file_storage_dir = params[1]
999 return backend.RenameFileStorageDir(old_file_storage_dir,
1000 new_file_storage_dir)
1002 # jobs ------------------------
1005 @_RequireJobQueueLock
1006 def perspective_jobqueue_update(params):
1007 """Update job queue.
1010 (file_name, content) = params
1011 return backend.JobQueueUpdate(file_name, content)
1014 @_RequireJobQueueLock
1015 def perspective_jobqueue_purge(params):
1019 return backend.JobQueuePurge()
1022 @_RequireJobQueueLock
1023 def perspective_jobqueue_rename(params):
1024 """Rename a job queue file.
1027 # TODO: What if a file fails to rename?
1028 return [backend.JobQueueRename(old, new) for old, new in params[0]]
1031 @_RequireJobQueueLock
1032 def perspective_jobqueue_set_drain_flag(params):
1033 """Set job queue's drain flag.
1038 return jstore.SetDrainFlag(flag)
1040 # hypervisor ---------------
1043 def perspective_hypervisor_validate_params(params):
1044 """Validate the hypervisor parameters.
1047 (hvname, hvparams) = params
1048 return backend.ValidateHVParams(hvname, hvparams)
1053 def perspective_x509_cert_create(params):
1054 """Creates a new X509 certificate for SSL/TLS.
1057 (validity, ) = params
1058 return backend.CreateX509Certificate(validity)
1061 def perspective_x509_cert_remove(params):
1062 """Removes a X509 certificate.
1066 return backend.RemoveX509Certificate(name)
1071 def perspective_import_start(params):
1072 """Starts an import daemon.
1075 (opts_s, instance, component, (dest, dest_args)) = params
1077 opts = objects.ImportExportOptions.FromDict(opts_s)
1079 return backend.StartImportExportDaemon(constants.IEM_IMPORT, opts,
1081 objects.Instance.FromDict(instance),
1083 _DecodeImportExportIO(dest,
1087 def perspective_export_start(params):
1088 """Starts an export daemon.
1091 (opts_s, host, port, instance, component, (source, source_args)) = params
1093 opts = objects.ImportExportOptions.FromDict(opts_s)
1095 return backend.StartImportExportDaemon(constants.IEM_EXPORT, opts,
1097 objects.Instance.FromDict(instance),
1099 _DecodeImportExportIO(source,
1103 def perspective_impexp_status(params):
1104 """Retrieves the status of an import or export daemon.
1107 return backend.GetImportExportStatus(params[0])
1110 def perspective_impexp_abort(params):
1111 """Aborts an import or export.
1114 return backend.AbortImportExport(params[0])
1117 def perspective_impexp_cleanup(params):
1118 """Cleans up after an import or export.
1121 return backend.CleanupImportExport(params[0])
1124 def CheckNoded(_, args):
1125 """Initial checks whether to run or exit with a failure.
1128 if args: # noded doesn't take any arguments
1129 print >> sys.stderr, ("Usage: %s [-f] [-d] [-p port] [-b ADDRESS]" %
1131 sys.exit(constants.EXIT_FAILURE)
1133 codecs.lookup("string-escape")
1135 print >> sys.stderr, ("Can't load the string-escape code which is part"
1136 " of the Python installation. Is your installation"
1137 " complete/correct? Aborting.")
1138 sys.exit(constants.EXIT_FAILURE)
1141 def PrepNoded(options, _):
1142 """Preparation node daemon function, executed with the PID file held.
1146 request_executor_class = MlockallRequestExecutor
1149 except errors.NoCtypesError:
1150 logging.warning("Cannot set memory lock, ctypes module not found")
1151 request_executor_class = http.server.HttpServerRequestExecutor
1153 request_executor_class = http.server.HttpServerRequestExecutor
1155 # Read SSL certificate
1157 ssl_params = http.HttpSslParams(ssl_key_path=options.ssl_key,
1158 ssl_cert_path=options.ssl_cert)
1162 err = _PrepareQueueLock()
1164 # this might be some kind of file-system/permission error; while
1165 # this breaks the job queue functionality, we shouldn't prevent
1166 # startup of the whole node daemon because of this
1167 logging.critical("Can't init/verify the queue, proceeding anyway: %s", err)
1169 handler = NodeRequestHandler()
1171 mainloop = daemon.Mainloop()
1173 http.server.HttpServer(mainloop, options.bind_address, options.port,
1174 handler, ssl_params=ssl_params, ssl_verify_peer=True,
1175 request_executor_class=request_executor_class)
1178 return (mainloop, server)
1181 def ExecNoded(options, args, prep_data): # pylint: disable=W0613
1182 """Main node daemon function, executed with the PID file held.
1185 (mainloop, server) = prep_data
1193 """Main function for the node daemon.
1196 parser = OptionParser(description="Ganeti node daemon",
1197 usage="%prog [-f] [-d] [-p port] [-b ADDRESS]\
1199 version="%%prog (ganeti) %s" %
1200 constants.RELEASE_VERSION)
1201 parser.add_option("--no-mlock", dest="mlock",
1202 help="Do not mlock the node memory in ram",
1203 default=True, action="store_false")
1205 daemon.GenericMain(constants.NODED, parser, CheckNoded, PrepNoded, ExecNoded,
1206 default_ssl_cert=pathutils.NODED_CERT_FILE,
1207 default_ssl_key=pathutils.NODED_CERT_FILE,
1208 console_logging=True)