4 # Copyright (C) 2006, 2007, 2008 Google Inc.
6 # This program is free software; you can redistribute it and/or modify
7 # it under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 2 of the License, or
9 # (at your option) any later version.
11 # This program is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 # General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with this program; if not, write to the Free Software
18 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
22 """Functions to bootstrap a new cluster.
32 from ganeti import rpc
33 from ganeti import ssh
34 from ganeti import utils
35 from ganeti import errors
36 from ganeti import config
37 from ganeti import constants
38 from ganeti import objects
39 from ganeti import ssconf
42 def _InitSSHSetup(node):
43 """Setup the SSH configuration for the cluster.
46 This generates a dsa keypair for root, adds the pub key to the
47 permitted hosts and adds the hostkey to its own known hosts.
50 node: the name of this host as a fqdn
53 priv_key, pub_key, auth_keys = ssh.GetUserFiles(constants.GANETI_RUNAS)
55 for name in priv_key, pub_key:
56 if os.path.exists(name):
57 utils.CreateBackup(name)
58 utils.RemoveFile(name)
60 result = utils.RunCmd(["ssh-keygen", "-t", "dsa",
64 raise errors.OpExecError("Could not generate ssh keypair, error %s" %
67 f = open(pub_key, 'r')
69 utils.AddAuthorizedKey(auth_keys, f.read(8192))
74 def _InitGanetiServerSetup(ss):
75 """Setup the necessary configuration for the initial node daemon.
77 This creates the nodepass file containing the shared password for
78 the cluster and also generates the SSL certificate.
81 ss: A WritableSimpleStore
84 # Create pseudo random password
85 randpass = utils.GenerateSecret()
86 # and write it into sstore
87 ss.SetKey(ss.SS_NODED_PASS, randpass)
89 result = utils.RunCmd(["openssl", "req", "-new", "-newkey", "rsa:1024",
90 "-days", str(365*5), "-nodes", "-x509",
91 "-keyout", constants.SSL_CERT_FILE,
92 "-out", constants.SSL_CERT_FILE, "-batch"])
94 raise errors.OpExecError("could not generate server ssl cert, command"
95 " %s had exitcode %s and error message %s" %
96 (result.cmd, result.exit_code, result.output))
98 os.chmod(constants.SSL_CERT_FILE, 0400)
100 result = utils.RunCmd([constants.NODE_INITD_SCRIPT, "restart"])
103 raise errors.OpExecError("Could not start the node daemon, command %s"
104 " had exitcode %s and error %s" %
105 (result.cmd, result.exit_code, result.output))
108 def InitCluster(cluster_name, hypervisor_type, mac_prefix, def_bridge,
109 master_netdev, file_storage_dir,
112 """Initialise the cluster.
115 if config.ConfigWriter.IsCluster():
116 raise errors.OpPrereqError("Cluster is already initialised")
118 if hypervisor_type == constants.HT_XEN_HVM31:
119 if not os.path.exists(constants.VNC_PASSWORD_FILE):
120 raise errors.OpPrereqError("Please prepare the cluster VNC"
122 constants.VNC_PASSWORD_FILE)
124 hostname = utils.HostInfo()
126 if hostname.ip.startswith("127."):
127 raise errors.OpPrereqError("This host's IP resolves to the private"
128 " range (%s). Please fix DNS or %s." %
129 (hostname.ip, constants.ETC_HOSTS))
131 if not utils.TcpPing(hostname.ip, constants.DEFAULT_NODED_PORT,
132 source=constants.LOCALHOST_IP_ADDRESS):
133 raise errors.OpPrereqError("Inconsistency: this host's name resolves"
134 " to %s,\nbut this ip address does not"
135 " belong to this host."
136 " Aborting." % hostname.ip)
138 clustername = utils.HostInfo(cluster_name)
140 if utils.TcpPing(clustername.ip, constants.DEFAULT_NODED_PORT,
142 raise errors.OpPrereqError("Cluster IP already active. Aborting.")
145 if not utils.IsValidIP(secondary_ip):
146 raise errors.OpPrereqError("Invalid secondary ip given")
147 if (secondary_ip != hostname.ip and
148 (not utils.TcpPing(secondary_ip, constants.DEFAULT_NODED_PORT,
149 source=constants.LOCALHOST_IP_ADDRESS))):
150 raise errors.OpPrereqError("You gave %s as secondary IP,"
151 " but it does not belong to this host." %
154 secondary_ip = hostname.ip
156 if vg_name is not None:
157 # Check if volume group is valid
158 vgstatus = utils.CheckVolumeGroupSize(utils.ListVolumeGroups(), vg_name,
159 constants.MIN_VG_SIZE)
161 raise errors.OpPrereqError("Error: %s\nspecify --no-lvm-storage if"
162 " you are not using lvm" % vgstatus)
164 file_storage_dir = os.path.normpath(file_storage_dir)
166 if not os.path.isabs(file_storage_dir):
167 raise errors.OpPrereqError("The file storage directory you passed is"
168 " not an absolute path.")
170 if not os.path.exists(file_storage_dir):
172 os.makedirs(file_storage_dir, 0750)
174 raise errors.OpPrereqError("Cannot create file storage directory"
176 (file_storage_dir, err))
178 if not os.path.isdir(file_storage_dir):
179 raise errors.OpPrereqError("The file storage directory '%s' is not"
180 " a directory." % file_storage_dir)
182 if not re.match("^[0-9a-z]{2}:[0-9a-z]{2}:[0-9a-z]{2}$", mac_prefix):
183 raise errors.OpPrereqError("Invalid mac prefix given '%s'" % mac_prefix)
185 if hypervisor_type not in constants.HYPER_TYPES:
186 raise errors.OpPrereqError("Invalid hypervisor type given '%s'" %
189 result = utils.RunCmd(["ip", "link", "show", "dev", master_netdev])
191 raise errors.OpPrereqError("Invalid master netdev given (%s): '%s'" %
193 result.output.strip()))
195 if not (os.path.isfile(constants.NODE_INITD_SCRIPT) and
196 os.access(constants.NODE_INITD_SCRIPT, os.X_OK)):
197 raise errors.OpPrereqError("Init.d script '%s' missing or not"
198 " executable." % constants.NODE_INITD_SCRIPT)
200 # set up the simple store
201 ss = ssconf.WritableSimpleStore()
202 ss.SetKey(ss.SS_HYPERVISOR, hypervisor_type)
203 ss.SetKey(ss.SS_MASTER_NODE, hostname.name)
204 ss.SetKey(ss.SS_MASTER_IP, clustername.ip)
205 ss.SetKey(ss.SS_MASTER_NETDEV, master_netdev)
206 ss.SetKey(ss.SS_CLUSTER_NAME, clustername.name)
207 ss.SetKey(ss.SS_FILE_STORAGE_DIR, file_storage_dir)
208 ss.SetKey(ss.SS_CONFIG_VERSION, constants.CONFIG_VERSION)
210 # set up the inter-node password and certificate
211 _InitGanetiServerSetup(ss)
213 # set up ssh config and /etc/hosts
214 f = open(constants.SSH_HOST_RSA_PUB, 'r')
219 sshkey = sshline.split(" ")[1]
221 utils.AddHostToEtcHosts(hostname.name)
222 _InitSSHSetup(hostname.name)
224 # init of cluster config file
225 cluster_config = objects.Cluster(
227 rsahostkeypub=sshkey,
228 highest_used_port=(constants.FIRST_DRBD_PORT - 1),
229 mac_prefix=mac_prefix,
230 volume_group_name=vg_name,
231 default_bridge=def_bridge,
232 tcpudp_port_pool=set(),
234 master_node_config = objects.Node(name=hostname.name,
235 primary_ip=hostname.ip,
236 secondary_ip=secondary_ip)
237 cfg = config.ConfigWriter()
238 cfg.InitConfig(cluster_config, master_node_config)
240 ssh.WriteKnownHostsFile(cfg, ss, constants.SSH_KNOWN_HOSTS_FILE)
242 # start the master ip
243 # TODO: Review rpc call from bootstrap
244 rpc.call_node_start_master(hostname.name, True)
247 def FinalizeClusterDestroy(master):
248 """Execute the last steps of cluster destroy
250 This function shuts down all the daemons, completing the destroy
251 begun in cmdlib.LUDestroyOpcode.
254 if not rpc.call_node_stop_master(master, True):
255 logging.warning("Could not disable the master role")
256 if not rpc.call_node_leave_cluster(master):
257 logging.warning("Could not shutdown the node daemon and cleanup the node")
260 def SetupNodeDaemon(node, ssh_key_check):
261 """Add a node to the cluster.
263 This function must be called before the actual opcode, and will ssh
264 to the remote node, copy the needed files, and start ganeti-noded,
265 allowing the master to do the rest via normal rpc calls.
268 node: fully qualified domain name for the new node
271 ss = ssconf.SimpleStore()
272 sshrunner = ssh.SshRunner(ss)
273 gntpass = ss.GetNodeDaemonPassword()
274 if not re.match('^[a-zA-Z0-9.]{1,64}$', gntpass):
275 raise errors.OpExecError("ganeti password corruption detected")
276 f = open(constants.SSL_CERT_FILE)
278 gntpem = f.read(8192)
281 # in the base64 pem encoding, neither '!' nor '.' are valid chars,
282 # so we use this to detect an invalid certificate; as long as the
283 # cert doesn't contain this, the here-document will be correctly
284 # parsed by the shell sequence below
285 if re.search('^!EOF\.', gntpem, re.MULTILINE):
286 raise errors.OpExecError("invalid PEM encoding in the SSL certificate")
287 if not gntpem.endswith("\n"):
288 raise errors.OpExecError("PEM must end with newline")
290 # set up inter-node password and certificate and restarts the node daemon
291 # and then connect with ssh to set password and start ganeti-noded
292 # note that all the below variables are sanitized at this point,
293 # either by being constants or by the checks above
294 mycommand = ("umask 077 && "
295 "echo '%s' > '%s' && "
296 "cat > '%s' << '!EOF.' && \n"
297 "%s!EOF.\n%s restart" %
298 (gntpass, ss.KeyToFilename(ss.SS_NODED_PASS),
299 constants.SSL_CERT_FILE, gntpem,
300 constants.NODE_INITD_SCRIPT))
302 result = sshrunner.Run(node, 'root', mycommand, batch=False,
303 ask_key=ssh_key_check,
304 use_cluster_key=False,
305 strict_host_check=ssh_key_check)
307 raise errors.OpExecError("Remote command on node %s, error: %s,"
309 (node, result.fail_reason, result.output))
314 def MasterFailover():
315 """Failover the master node.
317 This checks that we are not already the master, and will cause the
318 current master to cease being master, and the non-master to become
322 ss = ssconf.WritableSimpleStore()
324 new_master = utils.HostInfo().name
325 old_master = ss.GetMasterNode()
327 if old_master == new_master:
328 raise errors.OpPrereqError("This commands must be run on the node"
329 " where you want the new master to be."
330 " %s is already the master" %
336 logging.info("setting master to %s, old master: %s", new_master, old_master)
338 if not rpc.call_node_stop_master(old_master, True):
339 logging.error("could disable the master role on the old master"
340 " %s, please disable manually", old_master)
342 ss.SetKey(ss.SS_MASTER_NODE, new_master)
344 cfg = config.ConfigWriter()
346 if not rpc.call_upload_file(cfg.GetNodeList(),
347 ss.KeyToFilename(ss.SS_MASTER_NODE)):
348 logging.error("could not distribute the new simple store master file"
349 " to the other nodes, please check.")
351 if not rpc.call_node_start_master(new_master, True):
352 logging.error("could not start the master role on the new master"
353 " %s, please check", new_master)