4 # Copyright (C) 2007, 2008, 2009, 2010, 2011, 2012, 2013 Google Inc.
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 # General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
22 """Tool to upgrade the configuration file.
24 This code handles only the types supported by simplejson. As an
25 example, 'set' is a 'list'.
36 from cStringIO import StringIO
38 from ganeti import constants
39 from ganeti import serializer
40 from ganeti import utils
41 from ganeti import cli
42 from ganeti import bootstrap
43 from ganeti import config
44 from ganeti import netutils
45 from ganeti import pathutils
52 #: Target major version we will upgrade to
54 #: Target minor version we will upgrade to
56 #: Target major version for downgrade
58 #: Target minor version for downgrade
62 class Error(Exception):
63 """Generic exception"""
68 """Configures the logging module.
71 formatter = logging.Formatter("%(asctime)s: %(message)s")
73 stderr_handler = logging.StreamHandler()
74 stderr_handler.setFormatter(formatter)
76 stderr_handler.setLevel(logging.NOTSET)
78 stderr_handler.setLevel(logging.INFO)
80 stderr_handler.setLevel(logging.WARNING)
82 root_logger = logging.getLogger("")
83 root_logger.setLevel(logging.NOTSET)
84 root_logger.addHandler(stderr_handler)
87 def CheckHostname(path):
88 """Ensures hostname matches ssconf value.
90 @param path: Path to ssconf file
93 ssconf_master_node = utils.ReadOneLineFile(path)
94 hostname = netutils.GetHostname().name
96 if ssconf_master_node == hostname:
99 logging.warning("Warning: ssconf says master node is '%s', but this"
100 " machine's name is '%s'; this tool must be run on"
101 " the master node", ssconf_master_node, hostname)
105 def _FillIPolicySpecs(default_ipolicy, ipolicy):
106 if "minmax" in ipolicy:
107 for (key, spec) in ipolicy["minmax"][0].items():
108 for (par, val) in default_ipolicy["minmax"][0][key].items():
113 def UpgradeIPolicy(ipolicy, default_ipolicy, isgroup):
114 minmax_keys = ["min", "max"]
115 if any((k in ipolicy) for k in minmax_keys):
117 for key in minmax_keys:
120 minmax[key] = ipolicy[key]
123 ipolicy["minmax"] = [minmax]
124 if isgroup and "std" in ipolicy:
126 _FillIPolicySpecs(default_ipolicy, ipolicy)
129 def UpgradeNetworks(config_data):
130 networks = config_data.get("networks", None)
132 config_data["networks"] = {}
135 def UpgradeCluster(config_data):
136 cluster = config_data.get("cluster", None)
138 raise Error("Cannot find cluster")
139 ipolicy = cluster.setdefault("ipolicy", None)
141 UpgradeIPolicy(ipolicy, constants.IPOLICY_DEFAULTS, False)
144 def UpgradeGroups(config_data):
145 cl_ipolicy = config_data["cluster"].get("ipolicy")
146 for group in config_data["nodegroups"].values():
147 networks = group.get("networks", None)
149 group["networks"] = {}
150 ipolicy = group.get("ipolicy", None)
152 if cl_ipolicy is None:
153 raise Error("A group defines an instance policy but there is no"
154 " instance policy at cluster level")
155 UpgradeIPolicy(ipolicy, cl_ipolicy, True)
158 def UpgradeInstances(config_data):
159 network2uuid = dict((n["name"], n["uuid"])
160 for n in config_data["networks"].values())
161 if "instances" not in config_data:
162 raise Error("Can't find the 'instances' key in the configuration!")
164 for instance, iobj in config_data["instances"].items():
165 for nic in iobj["nics"]:
166 name = nic.get("network", None)
168 uuid = network2uuid.get(name, None)
170 print("NIC with network name %s found."
171 " Substituting with uuid %s." % (name, uuid))
172 nic["network"] = uuid
174 if "disks" not in iobj:
175 raise Error("Instance '%s' doesn't have a disks entry?!" % instance)
176 disks = iobj["disks"]
177 for idx, dobj in enumerate(disks):
178 expected = "disk/%s" % idx
179 current = dobj.get("iv_name", "")
180 if current != expected:
181 logging.warning("Updating iv_name for instance %s/disk %s"
182 " from '%s' to '%s'",
183 instance, idx, current, expected)
184 dobj["iv_name"] = expected
187 def UpgradeRapiUsers():
188 if (os.path.isfile(options.RAPI_USERS_FILE_PRE24) and
189 not os.path.islink(options.RAPI_USERS_FILE_PRE24)):
190 if os.path.exists(options.RAPI_USERS_FILE):
191 raise Error("Found pre-2.4 RAPI users file at %s, but another file"
192 " already exists at %s" %
193 (options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE))
194 logging.info("Found pre-2.4 RAPI users file at %s, renaming to %s",
195 options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE)
196 if not options.dry_run:
197 utils.RenameFile(options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE,
198 mkdir=True, mkdir_mode=0750)
200 # Create a symlink for RAPI users file
201 if (not (os.path.islink(options.RAPI_USERS_FILE_PRE24) or
202 os.path.isfile(options.RAPI_USERS_FILE_PRE24)) and
203 os.path.isfile(options.RAPI_USERS_FILE)):
204 logging.info("Creating symlink from %s to %s",
205 options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE)
206 if not options.dry_run:
207 os.symlink(options.RAPI_USERS_FILE, options.RAPI_USERS_FILE_PRE24)
210 def UpgradeWatcher():
211 # Remove old watcher state file if it exists
212 if os.path.exists(options.WATCHER_STATEFILE):
213 logging.info("Removing watcher state file %s", options.WATCHER_STATEFILE)
214 if not options.dry_run:
215 utils.RemoveFile(options.WATCHER_STATEFILE)
218 def UpgradeFileStoragePaths(config_data):
219 # Write file storage paths
220 if not os.path.exists(options.FILE_STORAGE_PATHS_FILE):
221 cluster = config_data["cluster"]
222 file_storage_dir = cluster.get("file_storage_dir")
223 shared_file_storage_dir = cluster.get("shared_file_storage_dir")
226 logging.info("Ganeti 2.7 and later only allow whitelisted directories"
227 " for file storage; writing existing configuration values"
229 options.FILE_STORAGE_PATHS_FILE)
232 logging.info("File storage directory: %s", file_storage_dir)
233 if shared_file_storage_dir:
234 logging.info("Shared file storage directory: %s",
235 shared_file_storage_dir)
238 buf.write("# List automatically generated from configuration by\n")
239 buf.write("# cfgupgrade at %s\n" % time.asctime())
241 buf.write("%s\n" % file_storage_dir)
242 if shared_file_storage_dir:
243 buf.write("%s\n" % shared_file_storage_dir)
244 utils.WriteFile(file_name=options.FILE_STORAGE_PATHS_FILE,
247 dry_run=options.dry_run,
251 def UpgradeAll(config_data):
252 config_data["version"] = constants.BuildVersion(TARGET_MAJOR,
256 UpgradeFileStoragePaths(config_data)
257 UpgradeNetworks(config_data)
258 UpgradeCluster(config_data)
259 UpgradeGroups(config_data)
260 UpgradeInstances(config_data)
263 def DowngradeIPolicy(ipolicy, owner):
264 # Downgrade IPolicy to 2.7 (stable)
265 minmax_keys = ["min", "max"]
266 specs_is_split = any((k in ipolicy) for k in minmax_keys)
267 if not specs_is_split:
268 if "minmax" in ipolicy:
269 if type(ipolicy["minmax"]) is not list:
270 raise Error("Invalid minmax type in %s ipolicy: %s" %
271 (owner, type(ipolicy["minmax"])))
272 if len(ipolicy["minmax"]) > 1:
273 logging.warning("Discarding some limit specs values from %s policy",
275 minmax = ipolicy["minmax"][0]
276 del ipolicy["minmax"]
279 for key in minmax_keys:
280 spec = minmax.get(key, {})
282 if "std" not in ipolicy:
286 def DowngradeGroups(config_data):
287 for group in config_data["nodegroups"].values():
288 ipolicy = group.get("ipolicy", None)
289 if ipolicy is not None:
290 DowngradeIPolicy(ipolicy, "group \"%s\"" % group.get("name"))
293 def DowngradeEnabledTemplates(cluster):
294 # Remove enabled disk templates to downgrade to 2.7
295 edt_key = "enabled_disk_templates"
296 if edt_key in cluster:
297 logging.warning("Removing cluster's enabled disk templates; value = %s",
298 utils.CommaJoin(cluster[edt_key]))
302 def DowngradeCluster(config_data):
303 cluster = config_data.get("cluster", None)
305 raise Error("Cannot find cluster")
306 DowngradeEnabledTemplates(cluster)
307 ipolicy = cluster.get("ipolicy", None)
309 DowngradeIPolicy(ipolicy, "cluster")
312 def DowngradeDisk(disk):
315 if "children" in disk:
316 for child_disk in disk["children"]:
317 DowngradeDisk(child_disk)
320 def DowngradeInstances(config_data):
321 if "instances" not in config_data:
322 raise Error("Can't find the 'instances' key in the configuration!")
324 for _, iobj in config_data["instances"].items():
325 if "disks_active" in iobj:
326 del iobj["disks_active"]
328 # Remove the NICs UUIDs
329 for nic in iobj["nics"]:
333 # Downgrade the disks
334 for disk in iobj["disks"]:
338 def DowngradeAll(config_data):
339 # Any code specific to a particular version should be labeled that way, so
340 # it can be removed when updating to the next version.
341 config_data["version"] = constants.BuildVersion(DOWNGRADE_MAJOR,
343 DowngradeCluster(config_data)
344 DowngradeGroups(config_data)
345 DowngradeInstances(config_data)
352 global options, args # pylint: disable=W0603
355 parser = optparse.OptionParser(usage="%prog [--debug|--verbose] [--force]")
356 parser.add_option("--dry-run", dest="dry_run",
358 help="Try to do the conversion, but don't write"
360 parser.add_option(cli.FORCE_OPT)
361 parser.add_option(cli.DEBUG_OPT)
362 parser.add_option(cli.VERBOSE_OPT)
363 parser.add_option("--ignore-hostname", dest="ignore_hostname",
364 action="store_true", default=False,
365 help="Don't abort if hostname doesn't match")
366 parser.add_option("--path", help="Convert configuration in this"
367 " directory instead of '%s'" % pathutils.DATA_DIR,
368 default=pathutils.DATA_DIR, dest="data_dir")
369 parser.add_option("--confdir",
370 help=("Use this directory instead of '%s'" %
372 default=pathutils.CONF_DIR, dest="conf_dir")
373 parser.add_option("--no-verify",
374 help="Do not verify configuration after upgrade",
375 action="store_true", dest="no_verify", default=False)
376 parser.add_option("--downgrade",
377 help="Downgrade to the previous stable version",
378 action="store_true", dest="downgrade", default=False)
379 (options, args) = parser.parse_args()
381 # We need to keep filenames locally because they might be renamed between
383 options.data_dir = os.path.abspath(options.data_dir)
384 options.CONFIG_DATA_PATH = options.data_dir + "/config.data"
385 options.SERVER_PEM_PATH = options.data_dir + "/server.pem"
386 options.KNOWN_HOSTS_PATH = options.data_dir + "/known_hosts"
387 options.RAPI_CERT_FILE = options.data_dir + "/rapi.pem"
388 options.SPICE_CERT_FILE = options.data_dir + "/spice.pem"
389 options.SPICE_CACERT_FILE = options.data_dir + "/spice-ca.pem"
390 options.RAPI_USERS_FILE = options.data_dir + "/rapi/users"
391 options.RAPI_USERS_FILE_PRE24 = options.data_dir + "/rapi_users"
392 options.CONFD_HMAC_KEY = options.data_dir + "/hmac.key"
393 options.CDS_FILE = options.data_dir + "/cluster-domain-secret"
394 options.SSCONF_MASTER_NODE = options.data_dir + "/ssconf_master_node"
395 options.WATCHER_STATEFILE = options.data_dir + "/watcher.data"
396 options.FILE_STORAGE_PATHS_FILE = options.conf_dir + "/file-storage-paths"
402 raise Error("No arguments expected")
403 if options.downgrade and not options.no_verify:
404 options.no_verify = True
407 if not (CheckHostname(options.SSCONF_MASTER_NODE) or options.ignore_hostname):
408 logging.error("Aborting due to hostname mismatch")
409 sys.exit(constants.EXIT_FAILURE)
411 if not options.force:
412 if options.downgrade:
413 usertext = ("The configuration is going to be DOWNGRADED to version %s.%s"
414 " Some configuration data might be removed if they don't fit"
415 " in the old format. Please make sure you have read the"
416 " upgrade notes (available in the UPGRADE file and included"
417 " in other documentation formats) to understand what they"
418 " are. Continue with *DOWNGRADING* the configuration?" %
419 (DOWNGRADE_MAJOR, DOWNGRADE_MINOR))
421 usertext = ("Please make sure you have read the upgrade notes for"
422 " Ganeti %s (available in the UPGRADE file and included"
423 " in other documentation formats). Continue with upgrading"
424 " configuration?" % constants.RELEASE_VERSION)
425 if not cli.AskUser(usertext):
426 sys.exit(constants.EXIT_FAILURE)
428 # Check whether it's a Ganeti configuration directory
429 if not (os.path.isfile(options.CONFIG_DATA_PATH) and
430 os.path.isfile(options.SERVER_PEM_PATH) and
431 os.path.isfile(options.KNOWN_HOSTS_PATH)):
432 raise Error(("%s does not seem to be a Ganeti configuration"
433 " directory") % options.data_dir)
435 if not os.path.isdir(options.conf_dir):
436 raise Error("Not a directory: %s" % options.conf_dir)
438 config_data = serializer.LoadJson(utils.ReadFile(options.CONFIG_DATA_PATH))
441 config_version = config_data["version"]
443 raise Error("Unable to determine configuration version")
445 (config_major, config_minor, config_revision) = \
446 constants.SplitVersion(config_version)
448 logging.info("Found configuration version %s (%d.%d.%d)",
449 config_version, config_major, config_minor, config_revision)
451 if "config_version" in config_data["cluster"]:
452 raise Error("Inconsistent configuration: found config_version in"
453 " configuration file")
455 # Downgrade to the previous stable version
456 if options.downgrade:
457 if not ((config_major == TARGET_MAJOR and config_minor == TARGET_MINOR) or
458 (config_major == DOWNGRADE_MAJOR and
459 config_minor == DOWNGRADE_MINOR)):
460 raise Error("Downgrade supported only from the latest version (%s.%s),"
461 " found %s (%s.%s.%s) instead" %
462 (TARGET_MAJOR, TARGET_MINOR, config_version, config_major,
463 config_minor, config_revision))
464 DowngradeAll(config_data)
466 # Upgrade from 2.{0..7} to 2.8
467 elif config_major == 2 and config_minor in range(0, 9):
468 if config_revision != 0:
469 logging.warning("Config revision is %s, not 0", config_revision)
470 UpgradeAll(config_data)
472 elif config_major == TARGET_MAJOR and config_minor == TARGET_MINOR:
473 logging.info("No changes necessary")
476 raise Error("Configuration version %d.%d.%d not supported by this tool" %
477 (config_major, config_minor, config_revision))
480 logging.info("Writing configuration file to %s", options.CONFIG_DATA_PATH)
481 utils.WriteFile(file_name=options.CONFIG_DATA_PATH,
482 data=serializer.DumpJson(config_data),
484 dry_run=options.dry_run,
487 if not options.dry_run:
488 bootstrap.GenerateClusterCrypto(
489 False, False, False, False, False,
490 nodecert_file=options.SERVER_PEM_PATH,
491 rapicert_file=options.RAPI_CERT_FILE,
492 spicecert_file=options.SPICE_CERT_FILE,
493 spicecacert_file=options.SPICE_CACERT_FILE,
494 hmackey_file=options.CONFD_HMAC_KEY,
495 cds_file=options.CDS_FILE)
498 logging.critical("Writing configuration failed. It is probably in an"
499 " inconsistent state and needs manual intervention.")
502 # test loading the config file
504 if not (options.dry_run or options.no_verify):
505 logging.info("Testing the new config file...")
506 cfg = config.ConfigWriter(cfg_file=options.CONFIG_DATA_PATH,
507 accept_foreign=options.ignore_hostname,
509 # if we reached this, it's all fine
510 vrfy = cfg.VerifyConfig()
512 logging.error("Errors after conversion:")
514 logging.error(" - %s", item)
517 logging.info("File loaded successfully after upgrading")
520 if options.downgrade:
521 action = "downgraded"
522 out_ver = "%s.%s" % (DOWNGRADE_MAJOR, DOWNGRADE_MINOR)
525 out_ver = constants.RELEASE_VERSION
527 cli.ToStderr("Configuration successfully %s to version %s.",
530 cli.ToStderr("Configuration %s to version %s, but there are errors."
531 "\nPlease review the file.", action, out_ver)
534 if __name__ == "__main__":