4 # Copyright (C) 2007, 2008, 2009, 2010, 2011, 2012, 2013 Google Inc.
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 # General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
22 """Tool to upgrade the configuration file.
24 This code handles only the types supported by simplejson. As an
25 example, 'set' is a 'list'.
36 from cStringIO import StringIO
38 from ganeti import constants
39 from ganeti import serializer
40 from ganeti import utils
41 from ganeti import cli
42 from ganeti import bootstrap
43 from ganeti import config
44 from ganeti import netutils
45 from ganeti import pathutils
52 #: Target major version we will upgrade to
54 #: Target minor version we will upgrade to
56 #: Target major version for downgrade
58 #: Target minor version for downgrade
62 class Error(Exception):
63 """Generic exception"""
68 """Configures the logging module.
71 formatter = logging.Formatter("%(asctime)s: %(message)s")
73 stderr_handler = logging.StreamHandler()
74 stderr_handler.setFormatter(formatter)
76 stderr_handler.setLevel(logging.NOTSET)
78 stderr_handler.setLevel(logging.INFO)
80 stderr_handler.setLevel(logging.WARNING)
82 root_logger = logging.getLogger("")
83 root_logger.setLevel(logging.NOTSET)
84 root_logger.addHandler(stderr_handler)
87 def CheckHostname(path):
88 """Ensures hostname matches ssconf value.
90 @param path: Path to ssconf file
93 ssconf_master_node = utils.ReadOneLineFile(path)
94 hostname = netutils.GetHostname().name
96 if ssconf_master_node == hostname:
99 logging.warning("Warning: ssconf says master node is '%s', but this"
100 " machine's name is '%s'; this tool must be run on"
101 " the master node", ssconf_master_node, hostname)
105 def _FillIPolicySpecs(default_ipolicy, ipolicy):
106 if "minmax" in ipolicy:
107 for (key, spec) in ipolicy["minmax"][0].items():
108 for (par, val) in default_ipolicy["minmax"][0][key].items():
113 def UpgradeIPolicy(ipolicy, default_ipolicy, isgroup):
114 minmax_keys = ["min", "max"]
115 if any((k in ipolicy) for k in minmax_keys):
117 for key in minmax_keys:
120 minmax[key] = ipolicy[key]
123 ipolicy["minmax"] = [minmax]
124 if isgroup and "std" in ipolicy:
126 _FillIPolicySpecs(default_ipolicy, ipolicy)
129 def UpgradeNetworks(config_data):
130 networks = config_data.get("networks", None)
132 config_data["networks"] = {}
135 def UpgradeCluster(config_data):
136 cluster = config_data.get("cluster", None)
138 raise Error("Cannot find cluster")
139 ipolicy = cluster.setdefault("ipolicy", None)
141 UpgradeIPolicy(ipolicy, constants.IPOLICY_DEFAULTS, False)
144 def UpgradeGroups(config_data):
145 cl_ipolicy = config_data["cluster"].get("ipolicy")
146 for group in config_data["nodegroups"].values():
147 networks = group.get("networks", None)
149 group["networks"] = {}
150 ipolicy = group.get("ipolicy", None)
152 if cl_ipolicy is None:
153 raise Error("A group defines an instance policy but there is no"
154 " instance policy at cluster level")
155 UpgradeIPolicy(ipolicy, cl_ipolicy, True)
158 def UpgradeInstances(config_data):
159 network2uuid = dict((n["name"], n["uuid"])
160 for n in config_data["networks"].values())
161 if "instances" not in config_data:
162 raise Error("Can't find the 'instances' key in the configuration!")
164 for instance, iobj in config_data["instances"].items():
165 for nic in iobj["nics"]:
166 name = nic.get("network", None)
168 uuid = network2uuid.get(name, None)
170 print("NIC with network name %s found."
171 " Substituting with uuid %s." % (name, uuid))
172 nic["network"] = uuid
174 if "disks" not in iobj:
175 raise Error("Instance '%s' doesn't have a disks entry?!" % instance)
176 disks = iobj["disks"]
177 for idx, dobj in enumerate(disks):
178 expected = "disk/%s" % idx
179 current = dobj.get("iv_name", "")
180 if current != expected:
181 logging.warning("Updating iv_name for instance %s/disk %s"
182 " from '%s' to '%s'",
183 instance, idx, current, expected)
184 dobj["iv_name"] = expected
187 def UpgradeRapiUsers():
188 if (os.path.isfile(options.RAPI_USERS_FILE_PRE24) and
189 not os.path.islink(options.RAPI_USERS_FILE_PRE24)):
190 if os.path.exists(options.RAPI_USERS_FILE):
191 raise Error("Found pre-2.4 RAPI users file at %s, but another file"
192 " already exists at %s" %
193 (options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE))
194 logging.info("Found pre-2.4 RAPI users file at %s, renaming to %s",
195 options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE)
196 if not options.dry_run:
197 utils.RenameFile(options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE,
198 mkdir=True, mkdir_mode=0750)
200 # Create a symlink for RAPI users file
201 if (not (os.path.islink(options.RAPI_USERS_FILE_PRE24) or
202 os.path.isfile(options.RAPI_USERS_FILE_PRE24)) and
203 os.path.isfile(options.RAPI_USERS_FILE)):
204 logging.info("Creating symlink from %s to %s",
205 options.RAPI_USERS_FILE_PRE24, options.RAPI_USERS_FILE)
206 if not options.dry_run:
207 os.symlink(options.RAPI_USERS_FILE, options.RAPI_USERS_FILE_PRE24)
210 def UpgradeWatcher():
211 # Remove old watcher state file if it exists
212 if os.path.exists(options.WATCHER_STATEFILE):
213 logging.info("Removing watcher state file %s", options.WATCHER_STATEFILE)
214 if not options.dry_run:
215 utils.RemoveFile(options.WATCHER_STATEFILE)
218 def UpgradeFileStoragePaths(config_data):
219 # Write file storage paths
220 if not os.path.exists(options.FILE_STORAGE_PATHS_FILE):
221 cluster = config_data["cluster"]
222 file_storage_dir = cluster.get("file_storage_dir")
223 shared_file_storage_dir = cluster.get("shared_file_storage_dir")
226 logging.info("Ganeti 2.7 and later only allow whitelisted directories"
227 " for file storage; writing existing configuration values"
229 options.FILE_STORAGE_PATHS_FILE)
232 logging.info("File storage directory: %s", file_storage_dir)
233 if shared_file_storage_dir:
234 logging.info("Shared file storage directory: %s",
235 shared_file_storage_dir)
238 buf.write("# List automatically generated from configuration by\n")
239 buf.write("# cfgupgrade at %s\n" % time.asctime())
241 buf.write("%s\n" % file_storage_dir)
242 if shared_file_storage_dir:
243 buf.write("%s\n" % shared_file_storage_dir)
244 utils.WriteFile(file_name=options.FILE_STORAGE_PATHS_FILE,
247 dry_run=options.dry_run,
251 def UpgradeAll(config_data):
252 config_data["version"] = constants.BuildVersion(TARGET_MAJOR,
256 UpgradeFileStoragePaths(config_data)
257 UpgradeNetworks(config_data)
258 UpgradeCluster(config_data)
259 UpgradeGroups(config_data)
260 UpgradeInstances(config_data)
263 def DowngradeIPolicy(ipolicy, owner):
264 # Downgrade IPolicy to 2.7 (stable)
265 minmax_keys = ["min", "max"]
266 specs_is_split = any((k in ipolicy) for k in minmax_keys)
267 if not specs_is_split:
268 if "minmax" in ipolicy:
269 if type(ipolicy["minmax"]) is not list:
270 raise Error("Invalid minmax type in %s ipolicy: %s" %
271 (owner, type(ipolicy["minmax"])))
272 if len(ipolicy["minmax"]) > 1:
273 logging.warning("Discarding some limit specs values from %s policy",
275 minmax = ipolicy["minmax"][0]
276 del ipolicy["minmax"]
279 for key in minmax_keys:
280 spec = minmax.get(key, {})
282 if "std" not in ipolicy:
286 def DowngradeGroups(config_data):
287 for group in config_data["nodegroups"].values():
288 ipolicy = group.get("ipolicy", None)
289 if ipolicy is not None:
290 DowngradeIPolicy(ipolicy, "group \"%s\"" % group.get("name"))
293 def DowngradeEnabledTemplates(cluster):
294 # Remove enabled disk templates to downgrade to 2.7
295 edt_key = "enabled_disk_templates"
296 if edt_key in cluster:
297 logging.warning("Removing cluster's enabled disk templates; value = %s",
298 utils.CommaJoin(cluster[edt_key]))
302 def DowngradeCluster(config_data):
303 cluster = config_data.get("cluster", None)
305 raise Error("Cannot find cluster")
306 DowngradeEnabledTemplates(cluster)
307 ipolicy = cluster.get("ipolicy", None)
309 DowngradeIPolicy(ipolicy, "cluster")
312 def DowngradeInstances(config_data):
313 if "instances" not in config_data:
314 raise Error("Can't find the 'instances' key in the configuration!")
316 for _, iobj in config_data["instances"].items():
317 if "disks_active" in iobj:
318 del iobj["disks_active"]
321 def DowngradeAll(config_data):
322 # Any code specific to a particular version should be labeled that way, so
323 # it can be removed when updating to the next version.
324 DowngradeCluster(config_data)
325 DowngradeGroups(config_data)
326 DowngradeInstances(config_data)
333 global options, args # pylint: disable=W0603
336 parser = optparse.OptionParser(usage="%prog [--debug|--verbose] [--force]")
337 parser.add_option("--dry-run", dest="dry_run",
339 help="Try to do the conversion, but don't write"
341 parser.add_option(cli.FORCE_OPT)
342 parser.add_option(cli.DEBUG_OPT)
343 parser.add_option(cli.VERBOSE_OPT)
344 parser.add_option("--ignore-hostname", dest="ignore_hostname",
345 action="store_true", default=False,
346 help="Don't abort if hostname doesn't match")
347 parser.add_option("--path", help="Convert configuration in this"
348 " directory instead of '%s'" % pathutils.DATA_DIR,
349 default=pathutils.DATA_DIR, dest="data_dir")
350 parser.add_option("--confdir",
351 help=("Use this directory instead of '%s'" %
353 default=pathutils.CONF_DIR, dest="conf_dir")
354 parser.add_option("--no-verify",
355 help="Do not verify configuration after upgrade",
356 action="store_true", dest="no_verify", default=False)
357 parser.add_option("--downgrade",
358 help="Downgrade to the previous stable version",
359 action="store_true", dest="downgrade", default=False)
360 (options, args) = parser.parse_args()
362 # We need to keep filenames locally because they might be renamed between
364 options.data_dir = os.path.abspath(options.data_dir)
365 options.CONFIG_DATA_PATH = options.data_dir + "/config.data"
366 options.SERVER_PEM_PATH = options.data_dir + "/server.pem"
367 options.KNOWN_HOSTS_PATH = options.data_dir + "/known_hosts"
368 options.RAPI_CERT_FILE = options.data_dir + "/rapi.pem"
369 options.SPICE_CERT_FILE = options.data_dir + "/spice.pem"
370 options.SPICE_CACERT_FILE = options.data_dir + "/spice-ca.pem"
371 options.RAPI_USERS_FILE = options.data_dir + "/rapi/users"
372 options.RAPI_USERS_FILE_PRE24 = options.data_dir + "/rapi_users"
373 options.CONFD_HMAC_KEY = options.data_dir + "/hmac.key"
374 options.CDS_FILE = options.data_dir + "/cluster-domain-secret"
375 options.SSCONF_MASTER_NODE = options.data_dir + "/ssconf_master_node"
376 options.WATCHER_STATEFILE = options.data_dir + "/watcher.data"
377 options.FILE_STORAGE_PATHS_FILE = options.conf_dir + "/file-storage-paths"
383 raise Error("No arguments expected")
384 if options.downgrade and not options.no_verify:
385 options.no_verify = True
388 if not (CheckHostname(options.SSCONF_MASTER_NODE) or options.ignore_hostname):
389 logging.error("Aborting due to hostname mismatch")
390 sys.exit(constants.EXIT_FAILURE)
392 if not options.force:
393 if options.downgrade:
394 usertext = ("The configuration is going to be DOWNGRADED to version %s.%s"
395 " Some configuration data might be removed if they don't fit"
396 " in the old format. Please make sure you have read the"
397 " upgrade notes (available in the UPGRADE file and included"
398 " in other documentation formats) to understand what they"
399 " are. Continue with *DOWNGRADING* the configuration?" %
400 (DOWNGRADE_MAJOR, DOWNGRADE_MINOR))
402 usertext = ("Please make sure you have read the upgrade notes for"
403 " Ganeti %s (available in the UPGRADE file and included"
404 " in other documentation formats). Continue with upgrading"
405 " configuration?" % constants.RELEASE_VERSION)
406 if not cli.AskUser(usertext):
407 sys.exit(constants.EXIT_FAILURE)
409 # Check whether it's a Ganeti configuration directory
410 if not (os.path.isfile(options.CONFIG_DATA_PATH) and
411 os.path.isfile(options.SERVER_PEM_PATH) and
412 os.path.isfile(options.KNOWN_HOSTS_PATH)):
413 raise Error(("%s does not seem to be a Ganeti configuration"
414 " directory") % options.data_dir)
416 if not os.path.isdir(options.conf_dir):
417 raise Error("Not a directory: %s" % options.conf_dir)
419 config_data = serializer.LoadJson(utils.ReadFile(options.CONFIG_DATA_PATH))
422 config_version = config_data["version"]
424 raise Error("Unable to determine configuration version")
426 (config_major, config_minor, config_revision) = \
427 constants.SplitVersion(config_version)
429 logging.info("Found configuration version %s (%d.%d.%d)",
430 config_version, config_major, config_minor, config_revision)
432 if "config_version" in config_data["cluster"]:
433 raise Error("Inconsistent configuration: found config_version in"
434 " configuration file")
436 # Downgrade to the previous stable version
437 if options.downgrade:
438 if config_major != TARGET_MAJOR or config_minor != TARGET_MINOR:
439 raise Error("Downgrade supported only from the latest version (%s.%s),"
440 " found %s (%s.%s.%s) instead" %
441 (TARGET_MAJOR, TARGET_MINOR, config_version, config_major,
442 config_minor, config_revision))
443 DowngradeAll(config_data)
445 # Upgrade from 2.{0..7} to 2.7
446 elif config_major == 2 and config_minor in range(0, 8):
447 if config_revision != 0:
448 logging.warning("Config revision is %s, not 0", config_revision)
449 UpgradeAll(config_data)
451 elif config_major == TARGET_MAJOR and config_minor == TARGET_MINOR:
452 logging.info("No changes necessary")
455 raise Error("Configuration version %d.%d.%d not supported by this tool" %
456 (config_major, config_minor, config_revision))
459 logging.info("Writing configuration file to %s", options.CONFIG_DATA_PATH)
460 utils.WriteFile(file_name=options.CONFIG_DATA_PATH,
461 data=serializer.DumpJson(config_data),
463 dry_run=options.dry_run,
466 if not options.dry_run:
467 bootstrap.GenerateClusterCrypto(
468 False, False, False, False, False,
469 nodecert_file=options.SERVER_PEM_PATH,
470 rapicert_file=options.RAPI_CERT_FILE,
471 spicecert_file=options.SPICE_CERT_FILE,
472 spicecacert_file=options.SPICE_CACERT_FILE,
473 hmackey_file=options.CONFD_HMAC_KEY,
474 cds_file=options.CDS_FILE)
477 logging.critical("Writing configuration failed. It is probably in an"
478 " inconsistent state and needs manual intervention.")
481 # test loading the config file
483 if not (options.dry_run or options.no_verify):
484 logging.info("Testing the new config file...")
485 cfg = config.ConfigWriter(cfg_file=options.CONFIG_DATA_PATH,
486 accept_foreign=options.ignore_hostname,
488 # if we reached this, it's all fine
489 vrfy = cfg.VerifyConfig()
491 logging.error("Errors after conversion:")
493 logging.error(" - %s", item)
496 logging.info("File loaded successfully after upgrading")
499 if options.downgrade:
500 action = "downgraded"
501 out_ver = "%s.%s" % (DOWNGRADE_MAJOR, DOWNGRADE_MINOR)
504 out_ver = constants.RELEASE_VERSION
506 cli.ToStderr("Configuration successfully %s to version %s.",
509 cli.ToStderr("Configuration %s to version %s, but there are errors."
510 "\nPlease review the file.", action, out_ver)
513 if __name__ == "__main__":