Statistics
| Branch: | Tag: | Revision:

root / lib / cmdlib.py @ b6135bbc

History | View | Annotate | Download (403 kB)

1
#
2
#
3

    
4
# Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Google Inc.
5
#
6
# This program is free software; you can redistribute it and/or modify
7
# it under the terms of the GNU General Public License as published by
8
# the Free Software Foundation; either version 2 of the License, or
9
# (at your option) any later version.
10
#
11
# This program is distributed in the hope that it will be useful, but
12
# WITHOUT ANY WARRANTY; without even the implied warranty of
13
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
# General Public License for more details.
15
#
16
# You should have received a copy of the GNU General Public License
17
# along with this program; if not, write to the Free Software
18
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
# 02110-1301, USA.
20

    
21

    
22
"""Module implementing the master-side code."""
23

    
24
# pylint: disable-msg=W0201,C0302
25

    
26
# W0201 since most LU attributes are defined in CheckPrereq or similar
27
# functions
28

    
29
# C0302: since we have waaaay to many lines in this module
30

    
31
import os
32
import os.path
33
import time
34
import re
35
import platform
36
import logging
37
import copy
38
import OpenSSL
39
import socket
40
import tempfile
41
import shutil
42
import itertools
43

    
44
from ganeti import ssh
45
from ganeti import utils
46
from ganeti import errors
47
from ganeti import hypervisor
48
from ganeti import locking
49
from ganeti import constants
50
from ganeti import objects
51
from ganeti import serializer
52
from ganeti import ssconf
53
from ganeti import uidpool
54
from ganeti import compat
55
from ganeti import masterd
56
from ganeti import netutils
57
from ganeti import query
58
from ganeti import qlang
59
from ganeti import opcodes
60

    
61
import ganeti.masterd.instance # pylint: disable-msg=W0611
62

    
63

    
64
def _SupportsOob(cfg, node):
65
  """Tells if node supports OOB.
66

67
  @type cfg: L{config.ConfigWriter}
68
  @param cfg: The cluster configuration
69
  @type node: L{objects.Node}
70
  @param node: The node
71
  @return: The OOB script if supported or an empty string otherwise
72

73
  """
74
  return cfg.GetNdParams(node)[constants.ND_OOB_PROGRAM]
75

    
76

    
77
# End types
78
class LogicalUnit(object):
79
  """Logical Unit base class.
80

81
  Subclasses must follow these rules:
82
    - implement ExpandNames
83
    - implement CheckPrereq (except when tasklets are used)
84
    - implement Exec (except when tasklets are used)
85
    - implement BuildHooksEnv
86
    - redefine HPATH and HTYPE
87
    - optionally redefine their run requirements:
88
        REQ_BGL: the LU needs to hold the Big Ganeti Lock exclusively
89

90
  Note that all commands require root permissions.
91

92
  @ivar dry_run_result: the value (if any) that will be returned to the caller
93
      in dry-run mode (signalled by opcode dry_run parameter)
94

95
  """
96
  HPATH = None
97
  HTYPE = None
98
  REQ_BGL = True
99

    
100
  def __init__(self, processor, op, context, rpc):
101
    """Constructor for LogicalUnit.
102

103
    This needs to be overridden in derived classes in order to check op
104
    validity.
105

106
    """
107
    self.proc = processor
108
    self.op = op
109
    self.cfg = context.cfg
110
    self.context = context
111
    self.rpc = rpc
112
    # Dicts used to declare locking needs to mcpu
113
    self.needed_locks = None
114
    self.acquired_locks = {}
115
    self.share_locks = dict.fromkeys(locking.LEVELS, 0)
116
    self.add_locks = {}
117
    self.remove_locks = {}
118
    # Used to force good behavior when calling helper functions
119
    self.recalculate_locks = {}
120
    self.__ssh = None
121
    # logging
122
    self.Log = processor.Log # pylint: disable-msg=C0103
123
    self.LogWarning = processor.LogWarning # pylint: disable-msg=C0103
124
    self.LogInfo = processor.LogInfo # pylint: disable-msg=C0103
125
    self.LogStep = processor.LogStep # pylint: disable-msg=C0103
126
    # support for dry-run
127
    self.dry_run_result = None
128
    # support for generic debug attribute
129
    if (not hasattr(self.op, "debug_level") or
130
        not isinstance(self.op.debug_level, int)):
131
      self.op.debug_level = 0
132

    
133
    # Tasklets
134
    self.tasklets = None
135

    
136
    # Validate opcode parameters and set defaults
137
    self.op.Validate(True)
138

    
139
    self.CheckArguments()
140

    
141
  def __GetSSH(self):
142
    """Returns the SshRunner object
143

144
    """
145
    if not self.__ssh:
146
      self.__ssh = ssh.SshRunner(self.cfg.GetClusterName())
147
    return self.__ssh
148

    
149
  ssh = property(fget=__GetSSH)
150

    
151
  def CheckArguments(self):
152
    """Check syntactic validity for the opcode arguments.
153

154
    This method is for doing a simple syntactic check and ensure
155
    validity of opcode parameters, without any cluster-related
156
    checks. While the same can be accomplished in ExpandNames and/or
157
    CheckPrereq, doing these separate is better because:
158

159
      - ExpandNames is left as as purely a lock-related function
160
      - CheckPrereq is run after we have acquired locks (and possible
161
        waited for them)
162

163
    The function is allowed to change the self.op attribute so that
164
    later methods can no longer worry about missing parameters.
165

166
    """
167
    pass
168

    
169
  def ExpandNames(self):
170
    """Expand names for this LU.
171

172
    This method is called before starting to execute the opcode, and it should
173
    update all the parameters of the opcode to their canonical form (e.g. a
174
    short node name must be fully expanded after this method has successfully
175
    completed). This way locking, hooks, logging, etc. can work correctly.
176

177
    LUs which implement this method must also populate the self.needed_locks
178
    member, as a dict with lock levels as keys, and a list of needed lock names
179
    as values. Rules:
180

181
      - use an empty dict if you don't need any lock
182
      - if you don't need any lock at a particular level omit that level
183
      - don't put anything for the BGL level
184
      - if you want all locks at a level use locking.ALL_SET as a value
185

186
    If you need to share locks (rather than acquire them exclusively) at one
187
    level you can modify self.share_locks, setting a true value (usually 1) for
188
    that level. By default locks are not shared.
189

190
    This function can also define a list of tasklets, which then will be
191
    executed in order instead of the usual LU-level CheckPrereq and Exec
192
    functions, if those are not defined by the LU.
193

194
    Examples::
195

196
      # Acquire all nodes and one instance
197
      self.needed_locks = {
198
        locking.LEVEL_NODE: locking.ALL_SET,
199
        locking.LEVEL_INSTANCE: ['instance1.example.com'],
200
      }
201
      # Acquire just two nodes
202
      self.needed_locks = {
203
        locking.LEVEL_NODE: ['node1.example.com', 'node2.example.com'],
204
      }
205
      # Acquire no locks
206
      self.needed_locks = {} # No, you can't leave it to the default value None
207

208
    """
209
    # The implementation of this method is mandatory only if the new LU is
210
    # concurrent, so that old LUs don't need to be changed all at the same
211
    # time.
212
    if self.REQ_BGL:
213
      self.needed_locks = {} # Exclusive LUs don't need locks.
214
    else:
215
      raise NotImplementedError
216

    
217
  def DeclareLocks(self, level):
218
    """Declare LU locking needs for a level
219

220
    While most LUs can just declare their locking needs at ExpandNames time,
221
    sometimes there's the need to calculate some locks after having acquired
222
    the ones before. This function is called just before acquiring locks at a
223
    particular level, but after acquiring the ones at lower levels, and permits
224
    such calculations. It can be used to modify self.needed_locks, and by
225
    default it does nothing.
226

227
    This function is only called if you have something already set in
228
    self.needed_locks for the level.
229

230
    @param level: Locking level which is going to be locked
231
    @type level: member of ganeti.locking.LEVELS
232

233
    """
234

    
235
  def CheckPrereq(self):
236
    """Check prerequisites for this LU.
237

238
    This method should check that the prerequisites for the execution
239
    of this LU are fulfilled. It can do internode communication, but
240
    it should be idempotent - no cluster or system changes are
241
    allowed.
242

243
    The method should raise errors.OpPrereqError in case something is
244
    not fulfilled. Its return value is ignored.
245

246
    This method should also update all the parameters of the opcode to
247
    their canonical form if it hasn't been done by ExpandNames before.
248

249
    """
250
    if self.tasklets is not None:
251
      for (idx, tl) in enumerate(self.tasklets):
252
        logging.debug("Checking prerequisites for tasklet %s/%s",
253
                      idx + 1, len(self.tasklets))
254
        tl.CheckPrereq()
255
    else:
256
      pass
257

    
258
  def Exec(self, feedback_fn):
259
    """Execute the LU.
260

261
    This method should implement the actual work. It should raise
262
    errors.OpExecError for failures that are somewhat dealt with in
263
    code, or expected.
264

265
    """
266
    if self.tasklets is not None:
267
      for (idx, tl) in enumerate(self.tasklets):
268
        logging.debug("Executing tasklet %s/%s", idx + 1, len(self.tasklets))
269
        tl.Exec(feedback_fn)
270
    else:
271
      raise NotImplementedError
272

    
273
  def BuildHooksEnv(self):
274
    """Build hooks environment for this LU.
275

276
    This method should return a three-node tuple consisting of: a dict
277
    containing the environment that will be used for running the
278
    specific hook for this LU, a list of node names on which the hook
279
    should run before the execution, and a list of node names on which
280
    the hook should run after the execution.
281

282
    The keys of the dict must not have 'GANETI_' prefixed as this will
283
    be handled in the hooks runner. Also note additional keys will be
284
    added by the hooks runner. If the LU doesn't define any
285
    environment, an empty dict (and not None) should be returned.
286

287
    No nodes should be returned as an empty list (and not None).
288

289
    Note that if the HPATH for a LU class is None, this function will
290
    not be called.
291

292
    """
293
    raise NotImplementedError
294

    
295
  def HooksCallBack(self, phase, hook_results, feedback_fn, lu_result):
296
    """Notify the LU about the results of its hooks.
297

298
    This method is called every time a hooks phase is executed, and notifies
299
    the Logical Unit about the hooks' result. The LU can then use it to alter
300
    its result based on the hooks.  By default the method does nothing and the
301
    previous result is passed back unchanged but any LU can define it if it
302
    wants to use the local cluster hook-scripts somehow.
303

304
    @param phase: one of L{constants.HOOKS_PHASE_POST} or
305
        L{constants.HOOKS_PHASE_PRE}; it denotes the hooks phase
306
    @param hook_results: the results of the multi-node hooks rpc call
307
    @param feedback_fn: function used send feedback back to the caller
308
    @param lu_result: the previous Exec result this LU had, or None
309
        in the PRE phase
310
    @return: the new Exec result, based on the previous result
311
        and hook results
312

313
    """
314
    # API must be kept, thus we ignore the unused argument and could
315
    # be a function warnings
316
    # pylint: disable-msg=W0613,R0201
317
    return lu_result
318

    
319
  def _ExpandAndLockInstance(self):
320
    """Helper function to expand and lock an instance.
321

322
    Many LUs that work on an instance take its name in self.op.instance_name
323
    and need to expand it and then declare the expanded name for locking. This
324
    function does it, and then updates self.op.instance_name to the expanded
325
    name. It also initializes needed_locks as a dict, if this hasn't been done
326
    before.
327

328
    """
329
    if self.needed_locks is None:
330
      self.needed_locks = {}
331
    else:
332
      assert locking.LEVEL_INSTANCE not in self.needed_locks, \
333
        "_ExpandAndLockInstance called with instance-level locks set"
334
    self.op.instance_name = _ExpandInstanceName(self.cfg,
335
                                                self.op.instance_name)
336
    self.needed_locks[locking.LEVEL_INSTANCE] = self.op.instance_name
337

    
338
  def _LockInstancesNodes(self, primary_only=False):
339
    """Helper function to declare instances' nodes for locking.
340

341
    This function should be called after locking one or more instances to lock
342
    their nodes. Its effect is populating self.needed_locks[locking.LEVEL_NODE]
343
    with all primary or secondary nodes for instances already locked and
344
    present in self.needed_locks[locking.LEVEL_INSTANCE].
345

346
    It should be called from DeclareLocks, and for safety only works if
347
    self.recalculate_locks[locking.LEVEL_NODE] is set.
348

349
    In the future it may grow parameters to just lock some instance's nodes, or
350
    to just lock primaries or secondary nodes, if needed.
351

352
    If should be called in DeclareLocks in a way similar to::
353

354
      if level == locking.LEVEL_NODE:
355
        self._LockInstancesNodes()
356

357
    @type primary_only: boolean
358
    @param primary_only: only lock primary nodes of locked instances
359

360
    """
361
    assert locking.LEVEL_NODE in self.recalculate_locks, \
362
      "_LockInstancesNodes helper function called with no nodes to recalculate"
363

    
364
    # TODO: check if we're really been called with the instance locks held
365

    
366
    # For now we'll replace self.needed_locks[locking.LEVEL_NODE], but in the
367
    # future we might want to have different behaviors depending on the value
368
    # of self.recalculate_locks[locking.LEVEL_NODE]
369
    wanted_nodes = []
370
    for instance_name in self.acquired_locks[locking.LEVEL_INSTANCE]:
371
      instance = self.context.cfg.GetInstanceInfo(instance_name)
372
      wanted_nodes.append(instance.primary_node)
373
      if not primary_only:
374
        wanted_nodes.extend(instance.secondary_nodes)
375

    
376
    if self.recalculate_locks[locking.LEVEL_NODE] == constants.LOCKS_REPLACE:
377
      self.needed_locks[locking.LEVEL_NODE] = wanted_nodes
378
    elif self.recalculate_locks[locking.LEVEL_NODE] == constants.LOCKS_APPEND:
379
      self.needed_locks[locking.LEVEL_NODE].extend(wanted_nodes)
380

    
381
    del self.recalculate_locks[locking.LEVEL_NODE]
382

    
383

    
384
class NoHooksLU(LogicalUnit): # pylint: disable-msg=W0223
385
  """Simple LU which runs no hooks.
386

387
  This LU is intended as a parent for other LogicalUnits which will
388
  run no hooks, in order to reduce duplicate code.
389

390
  """
391
  HPATH = None
392
  HTYPE = None
393

    
394
  def BuildHooksEnv(self):
395
    """Empty BuildHooksEnv for NoHooksLu.
396

397
    This just raises an error.
398

399
    """
400
    assert False, "BuildHooksEnv called for NoHooksLUs"
401

    
402

    
403
class Tasklet:
404
  """Tasklet base class.
405

406
  Tasklets are subcomponents for LUs. LUs can consist entirely of tasklets or
407
  they can mix legacy code with tasklets. Locking needs to be done in the LU,
408
  tasklets know nothing about locks.
409

410
  Subclasses must follow these rules:
411
    - Implement CheckPrereq
412
    - Implement Exec
413

414
  """
415
  def __init__(self, lu):
416
    self.lu = lu
417

    
418
    # Shortcuts
419
    self.cfg = lu.cfg
420
    self.rpc = lu.rpc
421

    
422
  def CheckPrereq(self):
423
    """Check prerequisites for this tasklets.
424

425
    This method should check whether the prerequisites for the execution of
426
    this tasklet are fulfilled. It can do internode communication, but it
427
    should be idempotent - no cluster or system changes are allowed.
428

429
    The method should raise errors.OpPrereqError in case something is not
430
    fulfilled. Its return value is ignored.
431

432
    This method should also update all parameters to their canonical form if it
433
    hasn't been done before.
434

435
    """
436
    pass
437

    
438
  def Exec(self, feedback_fn):
439
    """Execute the tasklet.
440

441
    This method should implement the actual work. It should raise
442
    errors.OpExecError for failures that are somewhat dealt with in code, or
443
    expected.
444

445
    """
446
    raise NotImplementedError
447

    
448

    
449
class _QueryBase:
450
  """Base for query utility classes.
451

452
  """
453
  #: Attribute holding field definitions
454
  FIELDS = None
455

    
456
  def __init__(self, filter_, fields, use_locking):
457
    """Initializes this class.
458

459
    """
460
    self.use_locking = use_locking
461

    
462
    self.query = query.Query(self.FIELDS, fields, filter_=filter_,
463
                             namefield="name")
464
    self.requested_data = self.query.RequestedData()
465
    self.names = self.query.RequestedNames()
466

    
467
    # Sort only if no names were requested
468
    self.sort_by_name = not self.names
469

    
470
    self.do_locking = None
471
    self.wanted = None
472

    
473
  def _GetNames(self, lu, all_names, lock_level):
474
    """Helper function to determine names asked for in the query.
475

476
    """
477
    if self.do_locking:
478
      names = lu.acquired_locks[lock_level]
479
    else:
480
      names = all_names
481

    
482
    if self.wanted == locking.ALL_SET:
483
      assert not self.names
484
      # caller didn't specify names, so ordering is not important
485
      return utils.NiceSort(names)
486

    
487
    # caller specified names and we must keep the same order
488
    assert self.names
489
    assert not self.do_locking or lu.acquired_locks[lock_level]
490

    
491
    missing = set(self.wanted).difference(names)
492
    if missing:
493
      raise errors.OpExecError("Some items were removed before retrieving"
494
                               " their data: %s" % missing)
495

    
496
    # Return expanded names
497
    return self.wanted
498

    
499
  @classmethod
500
  def FieldsQuery(cls, fields):
501
    """Returns list of available fields.
502

503
    @return: List of L{objects.QueryFieldDefinition}
504

505
    """
506
    return query.QueryFields(cls.FIELDS, fields)
507

    
508
  def ExpandNames(self, lu):
509
    """Expand names for this query.
510

511
    See L{LogicalUnit.ExpandNames}.
512

513
    """
514
    raise NotImplementedError()
515

    
516
  def DeclareLocks(self, lu, level):
517
    """Declare locks for this query.
518

519
    See L{LogicalUnit.DeclareLocks}.
520

521
    """
522
    raise NotImplementedError()
523

    
524
  def _GetQueryData(self, lu):
525
    """Collects all data for this query.
526

527
    @return: Query data object
528

529
    """
530
    raise NotImplementedError()
531

    
532
  def NewStyleQuery(self, lu):
533
    """Collect data and execute query.
534

535
    """
536
    return query.GetQueryResponse(self.query, self._GetQueryData(lu),
537
                                  sort_by_name=self.sort_by_name)
538

    
539
  def OldStyleQuery(self, lu):
540
    """Collect data and execute query.
541

542
    """
543
    return self.query.OldStyleQuery(self._GetQueryData(lu),
544
                                    sort_by_name=self.sort_by_name)
545

    
546

    
547
def _GetWantedNodes(lu, nodes):
548
  """Returns list of checked and expanded node names.
549

550
  @type lu: L{LogicalUnit}
551
  @param lu: the logical unit on whose behalf we execute
552
  @type nodes: list
553
  @param nodes: list of node names or None for all nodes
554
  @rtype: list
555
  @return: the list of nodes, sorted
556
  @raise errors.ProgrammerError: if the nodes parameter is wrong type
557

558
  """
559
  if nodes:
560
    return [_ExpandNodeName(lu.cfg, name) for name in nodes]
561

    
562
  return utils.NiceSort(lu.cfg.GetNodeList())
563

    
564

    
565
def _GetWantedInstances(lu, instances):
566
  """Returns list of checked and expanded instance names.
567

568
  @type lu: L{LogicalUnit}
569
  @param lu: the logical unit on whose behalf we execute
570
  @type instances: list
571
  @param instances: list of instance names or None for all instances
572
  @rtype: list
573
  @return: the list of instances, sorted
574
  @raise errors.OpPrereqError: if the instances parameter is wrong type
575
  @raise errors.OpPrereqError: if any of the passed instances is not found
576

577
  """
578
  if instances:
579
    wanted = [_ExpandInstanceName(lu.cfg, name) for name in instances]
580
  else:
581
    wanted = utils.NiceSort(lu.cfg.GetInstanceList())
582
  return wanted
583

    
584

    
585
def _GetUpdatedParams(old_params, update_dict,
586
                      use_default=True, use_none=False):
587
  """Return the new version of a parameter dictionary.
588

589
  @type old_params: dict
590
  @param old_params: old parameters
591
  @type update_dict: dict
592
  @param update_dict: dict containing new parameter values, or
593
      constants.VALUE_DEFAULT to reset the parameter to its default
594
      value
595
  @param use_default: boolean
596
  @type use_default: whether to recognise L{constants.VALUE_DEFAULT}
597
      values as 'to be deleted' values
598
  @param use_none: boolean
599
  @type use_none: whether to recognise C{None} values as 'to be
600
      deleted' values
601
  @rtype: dict
602
  @return: the new parameter dictionary
603

604
  """
605
  params_copy = copy.deepcopy(old_params)
606
  for key, val in update_dict.iteritems():
607
    if ((use_default and val == constants.VALUE_DEFAULT) or
608
        (use_none and val is None)):
609
      try:
610
        del params_copy[key]
611
      except KeyError:
612
        pass
613
    else:
614
      params_copy[key] = val
615
  return params_copy
616

    
617

    
618
def _CheckOutputFields(static, dynamic, selected):
619
  """Checks whether all selected fields are valid.
620

621
  @type static: L{utils.FieldSet}
622
  @param static: static fields set
623
  @type dynamic: L{utils.FieldSet}
624
  @param dynamic: dynamic fields set
625

626
  """
627
  f = utils.FieldSet()
628
  f.Extend(static)
629
  f.Extend(dynamic)
630

    
631
  delta = f.NonMatching(selected)
632
  if delta:
633
    raise errors.OpPrereqError("Unknown output fields selected: %s"
634
                               % ",".join(delta), errors.ECODE_INVAL)
635

    
636

    
637
def _CheckGlobalHvParams(params):
638
  """Validates that given hypervisor params are not global ones.
639

640
  This will ensure that instances don't get customised versions of
641
  global params.
642

643
  """
644
  used_globals = constants.HVC_GLOBALS.intersection(params)
645
  if used_globals:
646
    msg = ("The following hypervisor parameters are global and cannot"
647
           " be customized at instance level, please modify them at"
648
           " cluster level: %s" % utils.CommaJoin(used_globals))
649
    raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
650

    
651

    
652
def _CheckNodeOnline(lu, node, msg=None):
653
  """Ensure that a given node is online.
654

655
  @param lu: the LU on behalf of which we make the check
656
  @param node: the node to check
657
  @param msg: if passed, should be a message to replace the default one
658
  @raise errors.OpPrereqError: if the node is offline
659

660
  """
661
  if msg is None:
662
    msg = "Can't use offline node"
663
  if lu.cfg.GetNodeInfo(node).offline:
664
    raise errors.OpPrereqError("%s: %s" % (msg, node), errors.ECODE_STATE)
665

    
666

    
667
def _CheckNodeNotDrained(lu, node):
668
  """Ensure that a given node is not drained.
669

670
  @param lu: the LU on behalf of which we make the check
671
  @param node: the node to check
672
  @raise errors.OpPrereqError: if the node is drained
673

674
  """
675
  if lu.cfg.GetNodeInfo(node).drained:
676
    raise errors.OpPrereqError("Can't use drained node %s" % node,
677
                               errors.ECODE_STATE)
678

    
679

    
680
def _CheckNodeVmCapable(lu, node):
681
  """Ensure that a given node is vm capable.
682

683
  @param lu: the LU on behalf of which we make the check
684
  @param node: the node to check
685
  @raise errors.OpPrereqError: if the node is not vm capable
686

687
  """
688
  if not lu.cfg.GetNodeInfo(node).vm_capable:
689
    raise errors.OpPrereqError("Can't use non-vm_capable node %s" % node,
690
                               errors.ECODE_STATE)
691

    
692

    
693
def _CheckNodeHasOS(lu, node, os_name, force_variant):
694
  """Ensure that a node supports a given OS.
695

696
  @param lu: the LU on behalf of which we make the check
697
  @param node: the node to check
698
  @param os_name: the OS to query about
699
  @param force_variant: whether to ignore variant errors
700
  @raise errors.OpPrereqError: if the node is not supporting the OS
701

702
  """
703
  result = lu.rpc.call_os_get(node, os_name)
704
  result.Raise("OS '%s' not in supported OS list for node %s" %
705
               (os_name, node),
706
               prereq=True, ecode=errors.ECODE_INVAL)
707
  if not force_variant:
708
    _CheckOSVariant(result.payload, os_name)
709

    
710

    
711
def _CheckNodeHasSecondaryIP(lu, node, secondary_ip, prereq):
712
  """Ensure that a node has the given secondary ip.
713

714
  @type lu: L{LogicalUnit}
715
  @param lu: the LU on behalf of which we make the check
716
  @type node: string
717
  @param node: the node to check
718
  @type secondary_ip: string
719
  @param secondary_ip: the ip to check
720
  @type prereq: boolean
721
  @param prereq: whether to throw a prerequisite or an execute error
722
  @raise errors.OpPrereqError: if the node doesn't have the ip, and prereq=True
723
  @raise errors.OpExecError: if the node doesn't have the ip, and prereq=False
724

725
  """
726
  result = lu.rpc.call_node_has_ip_address(node, secondary_ip)
727
  result.Raise("Failure checking secondary ip on node %s" % node,
728
               prereq=prereq, ecode=errors.ECODE_ENVIRON)
729
  if not result.payload:
730
    msg = ("Node claims it doesn't have the secondary ip you gave (%s),"
731
           " please fix and re-run this command" % secondary_ip)
732
    if prereq:
733
      raise errors.OpPrereqError(msg, errors.ECODE_ENVIRON)
734
    else:
735
      raise errors.OpExecError(msg)
736

    
737

    
738
def _GetClusterDomainSecret():
739
  """Reads the cluster domain secret.
740

741
  """
742
  return utils.ReadOneLineFile(constants.CLUSTER_DOMAIN_SECRET_FILE,
743
                               strict=True)
744

    
745

    
746
def _CheckInstanceDown(lu, instance, reason):
747
  """Ensure that an instance is not running."""
748
  if instance.admin_up:
749
    raise errors.OpPrereqError("Instance %s is marked to be up, %s" %
750
                               (instance.name, reason), errors.ECODE_STATE)
751

    
752
  pnode = instance.primary_node
753
  ins_l = lu.rpc.call_instance_list([pnode], [instance.hypervisor])[pnode]
754
  ins_l.Raise("Can't contact node %s for instance information" % pnode,
755
              prereq=True, ecode=errors.ECODE_ENVIRON)
756

    
757
  if instance.name in ins_l.payload:
758
    raise errors.OpPrereqError("Instance %s is running, %s" %
759
                               (instance.name, reason), errors.ECODE_STATE)
760

    
761

    
762
def _ExpandItemName(fn, name, kind):
763
  """Expand an item name.
764

765
  @param fn: the function to use for expansion
766
  @param name: requested item name
767
  @param kind: text description ('Node' or 'Instance')
768
  @return: the resolved (full) name
769
  @raise errors.OpPrereqError: if the item is not found
770

771
  """
772
  full_name = fn(name)
773
  if full_name is None:
774
    raise errors.OpPrereqError("%s '%s' not known" % (kind, name),
775
                               errors.ECODE_NOENT)
776
  return full_name
777

    
778

    
779
def _ExpandNodeName(cfg, name):
780
  """Wrapper over L{_ExpandItemName} for nodes."""
781
  return _ExpandItemName(cfg.ExpandNodeName, name, "Node")
782

    
783

    
784
def _ExpandInstanceName(cfg, name):
785
  """Wrapper over L{_ExpandItemName} for instance."""
786
  return _ExpandItemName(cfg.ExpandInstanceName, name, "Instance")
787

    
788

    
789
def _BuildInstanceHookEnv(name, primary_node, secondary_nodes, os_type, status,
790
                          memory, vcpus, nics, disk_template, disks,
791
                          bep, hvp, hypervisor_name):
792
  """Builds instance related env variables for hooks
793

794
  This builds the hook environment from individual variables.
795

796
  @type name: string
797
  @param name: the name of the instance
798
  @type primary_node: string
799
  @param primary_node: the name of the instance's primary node
800
  @type secondary_nodes: list
801
  @param secondary_nodes: list of secondary nodes as strings
802
  @type os_type: string
803
  @param os_type: the name of the instance's OS
804
  @type status: boolean
805
  @param status: the should_run status of the instance
806
  @type memory: string
807
  @param memory: the memory size of the instance
808
  @type vcpus: string
809
  @param vcpus: the count of VCPUs the instance has
810
  @type nics: list
811
  @param nics: list of tuples (ip, mac, mode, link) representing
812
      the NICs the instance has
813
  @type disk_template: string
814
  @param disk_template: the disk template of the instance
815
  @type disks: list
816
  @param disks: the list of (size, mode) pairs
817
  @type bep: dict
818
  @param bep: the backend parameters for the instance
819
  @type hvp: dict
820
  @param hvp: the hypervisor parameters for the instance
821
  @type hypervisor_name: string
822
  @param hypervisor_name: the hypervisor for the instance
823
  @rtype: dict
824
  @return: the hook environment for this instance
825

826
  """
827
  if status:
828
    str_status = "up"
829
  else:
830
    str_status = "down"
831
  env = {
832
    "OP_TARGET": name,
833
    "INSTANCE_NAME": name,
834
    "INSTANCE_PRIMARY": primary_node,
835
    "INSTANCE_SECONDARIES": " ".join(secondary_nodes),
836
    "INSTANCE_OS_TYPE": os_type,
837
    "INSTANCE_STATUS": str_status,
838
    "INSTANCE_MEMORY": memory,
839
    "INSTANCE_VCPUS": vcpus,
840
    "INSTANCE_DISK_TEMPLATE": disk_template,
841
    "INSTANCE_HYPERVISOR": hypervisor_name,
842
  }
843

    
844
  if nics:
845
    nic_count = len(nics)
846
    for idx, (ip, mac, mode, link) in enumerate(nics):
847
      if ip is None:
848
        ip = ""
849
      env["INSTANCE_NIC%d_IP" % idx] = ip
850
      env["INSTANCE_NIC%d_MAC" % idx] = mac
851
      env["INSTANCE_NIC%d_MODE" % idx] = mode
852
      env["INSTANCE_NIC%d_LINK" % idx] = link
853
      if mode == constants.NIC_MODE_BRIDGED:
854
        env["INSTANCE_NIC%d_BRIDGE" % idx] = link
855
  else:
856
    nic_count = 0
857

    
858
  env["INSTANCE_NIC_COUNT"] = nic_count
859

    
860
  if disks:
861
    disk_count = len(disks)
862
    for idx, (size, mode) in enumerate(disks):
863
      env["INSTANCE_DISK%d_SIZE" % idx] = size
864
      env["INSTANCE_DISK%d_MODE" % idx] = mode
865
  else:
866
    disk_count = 0
867

    
868
  env["INSTANCE_DISK_COUNT"] = disk_count
869

    
870
  for source, kind in [(bep, "BE"), (hvp, "HV")]:
871
    for key, value in source.items():
872
      env["INSTANCE_%s_%s" % (kind, key)] = value
873

    
874
  return env
875

    
876

    
877
def _NICListToTuple(lu, nics):
878
  """Build a list of nic information tuples.
879

880
  This list is suitable to be passed to _BuildInstanceHookEnv or as a return
881
  value in LUInstanceQueryData.
882

883
  @type lu:  L{LogicalUnit}
884
  @param lu: the logical unit on whose behalf we execute
885
  @type nics: list of L{objects.NIC}
886
  @param nics: list of nics to convert to hooks tuples
887

888
  """
889
  hooks_nics = []
890
  cluster = lu.cfg.GetClusterInfo()
891
  for nic in nics:
892
    ip = nic.ip
893
    mac = nic.mac
894
    filled_params = cluster.SimpleFillNIC(nic.nicparams)
895
    mode = filled_params[constants.NIC_MODE]
896
    link = filled_params[constants.NIC_LINK]
897
    hooks_nics.append((ip, mac, mode, link))
898
  return hooks_nics
899

    
900

    
901
def _BuildInstanceHookEnvByObject(lu, instance, override=None):
902
  """Builds instance related env variables for hooks from an object.
903

904
  @type lu: L{LogicalUnit}
905
  @param lu: the logical unit on whose behalf we execute
906
  @type instance: L{objects.Instance}
907
  @param instance: the instance for which we should build the
908
      environment
909
  @type override: dict
910
  @param override: dictionary with key/values that will override
911
      our values
912
  @rtype: dict
913
  @return: the hook environment dictionary
914

915
  """
916
  cluster = lu.cfg.GetClusterInfo()
917
  bep = cluster.FillBE(instance)
918
  hvp = cluster.FillHV(instance)
919
  args = {
920
    'name': instance.name,
921
    'primary_node': instance.primary_node,
922
    'secondary_nodes': instance.secondary_nodes,
923
    'os_type': instance.os,
924
    'status': instance.admin_up,
925
    'memory': bep[constants.BE_MEMORY],
926
    'vcpus': bep[constants.BE_VCPUS],
927
    'nics': _NICListToTuple(lu, instance.nics),
928
    'disk_template': instance.disk_template,
929
    'disks': [(disk.size, disk.mode) for disk in instance.disks],
930
    'bep': bep,
931
    'hvp': hvp,
932
    'hypervisor_name': instance.hypervisor,
933
  }
934
  if override:
935
    args.update(override)
936
  return _BuildInstanceHookEnv(**args) # pylint: disable-msg=W0142
937

    
938

    
939
def _AdjustCandidatePool(lu, exceptions):
940
  """Adjust the candidate pool after node operations.
941

942
  """
943
  mod_list = lu.cfg.MaintainCandidatePool(exceptions)
944
  if mod_list:
945
    lu.LogInfo("Promoted nodes to master candidate role: %s",
946
               utils.CommaJoin(node.name for node in mod_list))
947
    for name in mod_list:
948
      lu.context.ReaddNode(name)
949
  mc_now, mc_max, _ = lu.cfg.GetMasterCandidateStats(exceptions)
950
  if mc_now > mc_max:
951
    lu.LogInfo("Note: more nodes are candidates (%d) than desired (%d)" %
952
               (mc_now, mc_max))
953

    
954

    
955
def _DecideSelfPromotion(lu, exceptions=None):
956
  """Decide whether I should promote myself as a master candidate.
957

958
  """
959
  cp_size = lu.cfg.GetClusterInfo().candidate_pool_size
960
  mc_now, mc_should, _ = lu.cfg.GetMasterCandidateStats(exceptions)
961
  # the new node will increase mc_max with one, so:
962
  mc_should = min(mc_should + 1, cp_size)
963
  return mc_now < mc_should
964

    
965

    
966
def _CheckNicsBridgesExist(lu, target_nics, target_node):
967
  """Check that the brigdes needed by a list of nics exist.
968

969
  """
970
  cluster = lu.cfg.GetClusterInfo()
971
  paramslist = [cluster.SimpleFillNIC(nic.nicparams) for nic in target_nics]
972
  brlist = [params[constants.NIC_LINK] for params in paramslist
973
            if params[constants.NIC_MODE] == constants.NIC_MODE_BRIDGED]
974
  if brlist:
975
    result = lu.rpc.call_bridges_exist(target_node, brlist)
976
    result.Raise("Error checking bridges on destination node '%s'" %
977
                 target_node, prereq=True, ecode=errors.ECODE_ENVIRON)
978

    
979

    
980
def _CheckInstanceBridgesExist(lu, instance, node=None):
981
  """Check that the brigdes needed by an instance exist.
982

983
  """
984
  if node is None:
985
    node = instance.primary_node
986
  _CheckNicsBridgesExist(lu, instance.nics, node)
987

    
988

    
989
def _CheckOSVariant(os_obj, name):
990
  """Check whether an OS name conforms to the os variants specification.
991

992
  @type os_obj: L{objects.OS}
993
  @param os_obj: OS object to check
994
  @type name: string
995
  @param name: OS name passed by the user, to check for validity
996

997
  """
998
  if not os_obj.supported_variants:
999
    return
1000
  variant = objects.OS.GetVariant(name)
1001
  if not variant:
1002
    raise errors.OpPrereqError("OS name must include a variant",
1003
                               errors.ECODE_INVAL)
1004

    
1005
  if variant not in os_obj.supported_variants:
1006
    raise errors.OpPrereqError("Unsupported OS variant", errors.ECODE_INVAL)
1007

    
1008

    
1009
def _GetNodeInstancesInner(cfg, fn):
1010
  return [i for i in cfg.GetAllInstancesInfo().values() if fn(i)]
1011

    
1012

    
1013
def _GetNodeInstances(cfg, node_name):
1014
  """Returns a list of all primary and secondary instances on a node.
1015

1016
  """
1017

    
1018
  return _GetNodeInstancesInner(cfg, lambda inst: node_name in inst.all_nodes)
1019

    
1020

    
1021
def _GetNodePrimaryInstances(cfg, node_name):
1022
  """Returns primary instances on a node.
1023

1024
  """
1025
  return _GetNodeInstancesInner(cfg,
1026
                                lambda inst: node_name == inst.primary_node)
1027

    
1028

    
1029
def _GetNodeSecondaryInstances(cfg, node_name):
1030
  """Returns secondary instances on a node.
1031

1032
  """
1033
  return _GetNodeInstancesInner(cfg,
1034
                                lambda inst: node_name in inst.secondary_nodes)
1035

    
1036

    
1037
def _GetStorageTypeArgs(cfg, storage_type):
1038
  """Returns the arguments for a storage type.
1039

1040
  """
1041
  # Special case for file storage
1042
  if storage_type == constants.ST_FILE:
1043
    # storage.FileStorage wants a list of storage directories
1044
    return [[cfg.GetFileStorageDir(), cfg.GetSharedFileStorageDir()]]
1045

    
1046
  return []
1047

    
1048

    
1049
def _FindFaultyInstanceDisks(cfg, rpc, instance, node_name, prereq):
1050
  faulty = []
1051

    
1052
  for dev in instance.disks:
1053
    cfg.SetDiskID(dev, node_name)
1054

    
1055
  result = rpc.call_blockdev_getmirrorstatus(node_name, instance.disks)
1056
  result.Raise("Failed to get disk status from node %s" % node_name,
1057
               prereq=prereq, ecode=errors.ECODE_ENVIRON)
1058

    
1059
  for idx, bdev_status in enumerate(result.payload):
1060
    if bdev_status and bdev_status.ldisk_status == constants.LDS_FAULTY:
1061
      faulty.append(idx)
1062

    
1063
  return faulty
1064

    
1065

    
1066
def _CheckIAllocatorOrNode(lu, iallocator_slot, node_slot):
1067
  """Check the sanity of iallocator and node arguments and use the
1068
  cluster-wide iallocator if appropriate.
1069

1070
  Check that at most one of (iallocator, node) is specified. If none is
1071
  specified, then the LU's opcode's iallocator slot is filled with the
1072
  cluster-wide default iallocator.
1073

1074
  @type iallocator_slot: string
1075
  @param iallocator_slot: the name of the opcode iallocator slot
1076
  @type node_slot: string
1077
  @param node_slot: the name of the opcode target node slot
1078

1079
  """
1080
  node = getattr(lu.op, node_slot, None)
1081
  iallocator = getattr(lu.op, iallocator_slot, None)
1082

    
1083
  if node is not None and iallocator is not None:
1084
    raise errors.OpPrereqError("Do not specify both, iallocator and node.",
1085
                               errors.ECODE_INVAL)
1086
  elif node is None and iallocator is None:
1087
    default_iallocator = lu.cfg.GetDefaultIAllocator()
1088
    if default_iallocator:
1089
      setattr(lu.op, iallocator_slot, default_iallocator)
1090
    else:
1091
      raise errors.OpPrereqError("No iallocator or node given and no"
1092
                                 " cluster-wide default iallocator found."
1093
                                 " Please specify either an iallocator or a"
1094
                                 " node, or set a cluster-wide default"
1095
                                 " iallocator.")
1096

    
1097

    
1098
class LUClusterPostInit(LogicalUnit):
1099
  """Logical unit for running hooks after cluster initialization.
1100

1101
  """
1102
  HPATH = "cluster-init"
1103
  HTYPE = constants.HTYPE_CLUSTER
1104

    
1105
  def BuildHooksEnv(self):
1106
    """Build hooks env.
1107

1108
    """
1109
    env = {"OP_TARGET": self.cfg.GetClusterName()}
1110
    mn = self.cfg.GetMasterNode()
1111
    return env, [], [mn]
1112

    
1113
  def Exec(self, feedback_fn):
1114
    """Nothing to do.
1115

1116
    """
1117
    return True
1118

    
1119

    
1120
class LUClusterDestroy(LogicalUnit):
1121
  """Logical unit for destroying the cluster.
1122

1123
  """
1124
  HPATH = "cluster-destroy"
1125
  HTYPE = constants.HTYPE_CLUSTER
1126

    
1127
  def BuildHooksEnv(self):
1128
    """Build hooks env.
1129

1130
    """
1131
    env = {"OP_TARGET": self.cfg.GetClusterName()}
1132
    return env, [], []
1133

    
1134
  def CheckPrereq(self):
1135
    """Check prerequisites.
1136

1137
    This checks whether the cluster is empty.
1138

1139
    Any errors are signaled by raising errors.OpPrereqError.
1140

1141
    """
1142
    master = self.cfg.GetMasterNode()
1143

    
1144
    nodelist = self.cfg.GetNodeList()
1145
    if len(nodelist) != 1 or nodelist[0] != master:
1146
      raise errors.OpPrereqError("There are still %d node(s) in"
1147
                                 " this cluster." % (len(nodelist) - 1),
1148
                                 errors.ECODE_INVAL)
1149
    instancelist = self.cfg.GetInstanceList()
1150
    if instancelist:
1151
      raise errors.OpPrereqError("There are still %d instance(s) in"
1152
                                 " this cluster." % len(instancelist),
1153
                                 errors.ECODE_INVAL)
1154

    
1155
  def Exec(self, feedback_fn):
1156
    """Destroys the cluster.
1157

1158
    """
1159
    master = self.cfg.GetMasterNode()
1160

    
1161
    # Run post hooks on master node before it's removed
1162
    hm = self.proc.hmclass(self.rpc.call_hooks_runner, self)
1163
    try:
1164
      hm.RunPhase(constants.HOOKS_PHASE_POST, [master])
1165
    except:
1166
      # pylint: disable-msg=W0702
1167
      self.LogWarning("Errors occurred running hooks on %s" % master)
1168

    
1169
    result = self.rpc.call_node_stop_master(master, False)
1170
    result.Raise("Could not disable the master role")
1171

    
1172
    return master
1173

    
1174

    
1175
def _VerifyCertificate(filename):
1176
  """Verifies a certificate for LUClusterVerify.
1177

1178
  @type filename: string
1179
  @param filename: Path to PEM file
1180

1181
  """
1182
  try:
1183
    cert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM,
1184
                                           utils.ReadFile(filename))
1185
  except Exception, err: # pylint: disable-msg=W0703
1186
    return (LUClusterVerify.ETYPE_ERROR,
1187
            "Failed to load X509 certificate %s: %s" % (filename, err))
1188

    
1189
  (errcode, msg) = \
1190
    utils.VerifyX509Certificate(cert, constants.SSL_CERT_EXPIRATION_WARN,
1191
                                constants.SSL_CERT_EXPIRATION_ERROR)
1192

    
1193
  if msg:
1194
    fnamemsg = "While verifying %s: %s" % (filename, msg)
1195
  else:
1196
    fnamemsg = None
1197

    
1198
  if errcode is None:
1199
    return (None, fnamemsg)
1200
  elif errcode == utils.CERT_WARNING:
1201
    return (LUClusterVerify.ETYPE_WARNING, fnamemsg)
1202
  elif errcode == utils.CERT_ERROR:
1203
    return (LUClusterVerify.ETYPE_ERROR, fnamemsg)
1204

    
1205
  raise errors.ProgrammerError("Unhandled certificate error code %r" % errcode)
1206

    
1207

    
1208
class LUClusterVerify(LogicalUnit):
1209
  """Verifies the cluster status.
1210

1211
  """
1212
  HPATH = "cluster-verify"
1213
  HTYPE = constants.HTYPE_CLUSTER
1214
  REQ_BGL = False
1215

    
1216
  TCLUSTER = "cluster"
1217
  TNODE = "node"
1218
  TINSTANCE = "instance"
1219

    
1220
  ECLUSTERCFG = (TCLUSTER, "ECLUSTERCFG")
1221
  ECLUSTERCERT = (TCLUSTER, "ECLUSTERCERT")
1222
  EINSTANCEBADNODE = (TINSTANCE, "EINSTANCEBADNODE")
1223
  EINSTANCEDOWN = (TINSTANCE, "EINSTANCEDOWN")
1224
  EINSTANCELAYOUT = (TINSTANCE, "EINSTANCELAYOUT")
1225
  EINSTANCEMISSINGDISK = (TINSTANCE, "EINSTANCEMISSINGDISK")
1226
  EINSTANCEFAULTYDISK = (TINSTANCE, "EINSTANCEFAULTYDISK")
1227
  EINSTANCEWRONGNODE = (TINSTANCE, "EINSTANCEWRONGNODE")
1228
  EINSTANCESPLITGROUPS = (TINSTANCE, "EINSTANCESPLITGROUPS")
1229
  ENODEDRBD = (TNODE, "ENODEDRBD")
1230
  ENODEDRBDHELPER = (TNODE, "ENODEDRBDHELPER")
1231
  ENODEFILECHECK = (TNODE, "ENODEFILECHECK")
1232
  ENODEHOOKS = (TNODE, "ENODEHOOKS")
1233
  ENODEHV = (TNODE, "ENODEHV")
1234
  ENODELVM = (TNODE, "ENODELVM")
1235
  ENODEN1 = (TNODE, "ENODEN1")
1236
  ENODENET = (TNODE, "ENODENET")
1237
  ENODEOS = (TNODE, "ENODEOS")
1238
  ENODEORPHANINSTANCE = (TNODE, "ENODEORPHANINSTANCE")
1239
  ENODEORPHANLV = (TNODE, "ENODEORPHANLV")
1240
  ENODERPC = (TNODE, "ENODERPC")
1241
  ENODESSH = (TNODE, "ENODESSH")
1242
  ENODEVERSION = (TNODE, "ENODEVERSION")
1243
  ENODESETUP = (TNODE, "ENODESETUP")
1244
  ENODETIME = (TNODE, "ENODETIME")
1245
  ENODEOOBPATH = (TNODE, "ENODEOOBPATH")
1246

    
1247
  ETYPE_FIELD = "code"
1248
  ETYPE_ERROR = "ERROR"
1249
  ETYPE_WARNING = "WARNING"
1250

    
1251
  _HOOKS_INDENT_RE = re.compile("^", re.M)
1252

    
1253
  class NodeImage(object):
1254
    """A class representing the logical and physical status of a node.
1255

1256
    @type name: string
1257
    @ivar name: the node name to which this object refers
1258
    @ivar volumes: a structure as returned from
1259
        L{ganeti.backend.GetVolumeList} (runtime)
1260
    @ivar instances: a list of running instances (runtime)
1261
    @ivar pinst: list of configured primary instances (config)
1262
    @ivar sinst: list of configured secondary instances (config)
1263
    @ivar sbp: dictionary of {primary-node: list of instances} for all
1264
        instances for which this node is secondary (config)
1265
    @ivar mfree: free memory, as reported by hypervisor (runtime)
1266
    @ivar dfree: free disk, as reported by the node (runtime)
1267
    @ivar offline: the offline status (config)
1268
    @type rpc_fail: boolean
1269
    @ivar rpc_fail: whether the RPC verify call was successfull (overall,
1270
        not whether the individual keys were correct) (runtime)
1271
    @type lvm_fail: boolean
1272
    @ivar lvm_fail: whether the RPC call didn't return valid LVM data
1273
    @type hyp_fail: boolean
1274
    @ivar hyp_fail: whether the RPC call didn't return the instance list
1275
    @type ghost: boolean
1276
    @ivar ghost: whether this is a known node or not (config)
1277
    @type os_fail: boolean
1278
    @ivar os_fail: whether the RPC call didn't return valid OS data
1279
    @type oslist: list
1280
    @ivar oslist: list of OSes as diagnosed by DiagnoseOS
1281
    @type vm_capable: boolean
1282
    @ivar vm_capable: whether the node can host instances
1283

1284
    """
1285
    def __init__(self, offline=False, name=None, vm_capable=True):
1286
      self.name = name
1287
      self.volumes = {}
1288
      self.instances = []
1289
      self.pinst = []
1290
      self.sinst = []
1291
      self.sbp = {}
1292
      self.mfree = 0
1293
      self.dfree = 0
1294
      self.offline = offline
1295
      self.vm_capable = vm_capable
1296
      self.rpc_fail = False
1297
      self.lvm_fail = False
1298
      self.hyp_fail = False
1299
      self.ghost = False
1300
      self.os_fail = False
1301
      self.oslist = {}
1302

    
1303
  def ExpandNames(self):
1304
    self.needed_locks = {
1305
      locking.LEVEL_NODE: locking.ALL_SET,
1306
      locking.LEVEL_INSTANCE: locking.ALL_SET,
1307
    }
1308
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
1309

    
1310
  def _Error(self, ecode, item, msg, *args, **kwargs):
1311
    """Format an error message.
1312

1313
    Based on the opcode's error_codes parameter, either format a
1314
    parseable error code, or a simpler error string.
1315

1316
    This must be called only from Exec and functions called from Exec.
1317

1318
    """
1319
    ltype = kwargs.get(self.ETYPE_FIELD, self.ETYPE_ERROR)
1320
    itype, etxt = ecode
1321
    # first complete the msg
1322
    if args:
1323
      msg = msg % args
1324
    # then format the whole message
1325
    if self.op.error_codes:
1326
      msg = "%s:%s:%s:%s:%s" % (ltype, etxt, itype, item, msg)
1327
    else:
1328
      if item:
1329
        item = " " + item
1330
      else:
1331
        item = ""
1332
      msg = "%s: %s%s: %s" % (ltype, itype, item, msg)
1333
    # and finally report it via the feedback_fn
1334
    self._feedback_fn("  - %s" % msg)
1335

    
1336
  def _ErrorIf(self, cond, *args, **kwargs):
1337
    """Log an error message if the passed condition is True.
1338

1339
    """
1340
    cond = bool(cond) or self.op.debug_simulate_errors
1341
    if cond:
1342
      self._Error(*args, **kwargs)
1343
    # do not mark the operation as failed for WARN cases only
1344
    if kwargs.get(self.ETYPE_FIELD, self.ETYPE_ERROR) == self.ETYPE_ERROR:
1345
      self.bad = self.bad or cond
1346

    
1347
  def _VerifyNode(self, ninfo, nresult):
1348
    """Perform some basic validation on data returned from a node.
1349

1350
      - check the result data structure is well formed and has all the
1351
        mandatory fields
1352
      - check ganeti version
1353

1354
    @type ninfo: L{objects.Node}
1355
    @param ninfo: the node to check
1356
    @param nresult: the results from the node
1357
    @rtype: boolean
1358
    @return: whether overall this call was successful (and we can expect
1359
         reasonable values in the respose)
1360

1361
    """
1362
    node = ninfo.name
1363
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1364

    
1365
    # main result, nresult should be a non-empty dict
1366
    test = not nresult or not isinstance(nresult, dict)
1367
    _ErrorIf(test, self.ENODERPC, node,
1368
                  "unable to verify node: no data returned")
1369
    if test:
1370
      return False
1371

    
1372
    # compares ganeti version
1373
    local_version = constants.PROTOCOL_VERSION
1374
    remote_version = nresult.get("version", None)
1375
    test = not (remote_version and
1376
                isinstance(remote_version, (list, tuple)) and
1377
                len(remote_version) == 2)
1378
    _ErrorIf(test, self.ENODERPC, node,
1379
             "connection to node returned invalid data")
1380
    if test:
1381
      return False
1382

    
1383
    test = local_version != remote_version[0]
1384
    _ErrorIf(test, self.ENODEVERSION, node,
1385
             "incompatible protocol versions: master %s,"
1386
             " node %s", local_version, remote_version[0])
1387
    if test:
1388
      return False
1389

    
1390
    # node seems compatible, we can actually try to look into its results
1391

    
1392
    # full package version
1393
    self._ErrorIf(constants.RELEASE_VERSION != remote_version[1],
1394
                  self.ENODEVERSION, node,
1395
                  "software version mismatch: master %s, node %s",
1396
                  constants.RELEASE_VERSION, remote_version[1],
1397
                  code=self.ETYPE_WARNING)
1398

    
1399
    hyp_result = nresult.get(constants.NV_HYPERVISOR, None)
1400
    if ninfo.vm_capable and isinstance(hyp_result, dict):
1401
      for hv_name, hv_result in hyp_result.iteritems():
1402
        test = hv_result is not None
1403
        _ErrorIf(test, self.ENODEHV, node,
1404
                 "hypervisor %s verify failure: '%s'", hv_name, hv_result)
1405

    
1406
    hvp_result = nresult.get(constants.NV_HVPARAMS, None)
1407
    if ninfo.vm_capable and isinstance(hvp_result, list):
1408
      for item, hv_name, hv_result in hvp_result:
1409
        _ErrorIf(True, self.ENODEHV, node,
1410
                 "hypervisor %s parameter verify failure (source %s): %s",
1411
                 hv_name, item, hv_result)
1412

    
1413
    test = nresult.get(constants.NV_NODESETUP,
1414
                           ["Missing NODESETUP results"])
1415
    _ErrorIf(test, self.ENODESETUP, node, "node setup error: %s",
1416
             "; ".join(test))
1417

    
1418
    return True
1419

    
1420
  def _VerifyNodeTime(self, ninfo, nresult,
1421
                      nvinfo_starttime, nvinfo_endtime):
1422
    """Check the node time.
1423

1424
    @type ninfo: L{objects.Node}
1425
    @param ninfo: the node to check
1426
    @param nresult: the remote results for the node
1427
    @param nvinfo_starttime: the start time of the RPC call
1428
    @param nvinfo_endtime: the end time of the RPC call
1429

1430
    """
1431
    node = ninfo.name
1432
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1433

    
1434
    ntime = nresult.get(constants.NV_TIME, None)
1435
    try:
1436
      ntime_merged = utils.MergeTime(ntime)
1437
    except (ValueError, TypeError):
1438
      _ErrorIf(True, self.ENODETIME, node, "Node returned invalid time")
1439
      return
1440

    
1441
    if ntime_merged < (nvinfo_starttime - constants.NODE_MAX_CLOCK_SKEW):
1442
      ntime_diff = "%.01fs" % abs(nvinfo_starttime - ntime_merged)
1443
    elif ntime_merged > (nvinfo_endtime + constants.NODE_MAX_CLOCK_SKEW):
1444
      ntime_diff = "%.01fs" % abs(ntime_merged - nvinfo_endtime)
1445
    else:
1446
      ntime_diff = None
1447

    
1448
    _ErrorIf(ntime_diff is not None, self.ENODETIME, node,
1449
             "Node time diverges by at least %s from master node time",
1450
             ntime_diff)
1451

    
1452
  def _VerifyNodeLVM(self, ninfo, nresult, vg_name):
1453
    """Check the node time.
1454

1455
    @type ninfo: L{objects.Node}
1456
    @param ninfo: the node to check
1457
    @param nresult: the remote results for the node
1458
    @param vg_name: the configured VG name
1459

1460
    """
1461
    if vg_name is None:
1462
      return
1463

    
1464
    node = ninfo.name
1465
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1466

    
1467
    # checks vg existence and size > 20G
1468
    vglist = nresult.get(constants.NV_VGLIST, None)
1469
    test = not vglist
1470
    _ErrorIf(test, self.ENODELVM, node, "unable to check volume groups")
1471
    if not test:
1472
      vgstatus = utils.CheckVolumeGroupSize(vglist, vg_name,
1473
                                            constants.MIN_VG_SIZE)
1474
      _ErrorIf(vgstatus, self.ENODELVM, node, vgstatus)
1475

    
1476
    # check pv names
1477
    pvlist = nresult.get(constants.NV_PVLIST, None)
1478
    test = pvlist is None
1479
    _ErrorIf(test, self.ENODELVM, node, "Can't get PV list from node")
1480
    if not test:
1481
      # check that ':' is not present in PV names, since it's a
1482
      # special character for lvcreate (denotes the range of PEs to
1483
      # use on the PV)
1484
      for _, pvname, owner_vg in pvlist:
1485
        test = ":" in pvname
1486
        _ErrorIf(test, self.ENODELVM, node, "Invalid character ':' in PV"
1487
                 " '%s' of VG '%s'", pvname, owner_vg)
1488

    
1489
  def _VerifyNodeNetwork(self, ninfo, nresult):
1490
    """Check the node time.
1491

1492
    @type ninfo: L{objects.Node}
1493
    @param ninfo: the node to check
1494
    @param nresult: the remote results for the node
1495

1496
    """
1497
    node = ninfo.name
1498
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1499

    
1500
    test = constants.NV_NODELIST not in nresult
1501
    _ErrorIf(test, self.ENODESSH, node,
1502
             "node hasn't returned node ssh connectivity data")
1503
    if not test:
1504
      if nresult[constants.NV_NODELIST]:
1505
        for a_node, a_msg in nresult[constants.NV_NODELIST].items():
1506
          _ErrorIf(True, self.ENODESSH, node,
1507
                   "ssh communication with node '%s': %s", a_node, a_msg)
1508

    
1509
    test = constants.NV_NODENETTEST not in nresult
1510
    _ErrorIf(test, self.ENODENET, node,
1511
             "node hasn't returned node tcp connectivity data")
1512
    if not test:
1513
      if nresult[constants.NV_NODENETTEST]:
1514
        nlist = utils.NiceSort(nresult[constants.NV_NODENETTEST].keys())
1515
        for anode in nlist:
1516
          _ErrorIf(True, self.ENODENET, node,
1517
                   "tcp communication with node '%s': %s",
1518
                   anode, nresult[constants.NV_NODENETTEST][anode])
1519

    
1520
    test = constants.NV_MASTERIP not in nresult
1521
    _ErrorIf(test, self.ENODENET, node,
1522
             "node hasn't returned node master IP reachability data")
1523
    if not test:
1524
      if not nresult[constants.NV_MASTERIP]:
1525
        if node == self.master_node:
1526
          msg = "the master node cannot reach the master IP (not configured?)"
1527
        else:
1528
          msg = "cannot reach the master IP"
1529
        _ErrorIf(True, self.ENODENET, node, msg)
1530

    
1531
  def _VerifyInstance(self, instance, instanceconfig, node_image,
1532
                      diskstatus):
1533
    """Verify an instance.
1534

1535
    This function checks to see if the required block devices are
1536
    available on the instance's node.
1537

1538
    """
1539
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1540
    node_current = instanceconfig.primary_node
1541

    
1542
    node_vol_should = {}
1543
    instanceconfig.MapLVsByNode(node_vol_should)
1544

    
1545
    for node in node_vol_should:
1546
      n_img = node_image[node]
1547
      if n_img.offline or n_img.rpc_fail or n_img.lvm_fail:
1548
        # ignore missing volumes on offline or broken nodes
1549
        continue
1550
      for volume in node_vol_should[node]:
1551
        test = volume not in n_img.volumes
1552
        _ErrorIf(test, self.EINSTANCEMISSINGDISK, instance,
1553
                 "volume %s missing on node %s", volume, node)
1554

    
1555
    if instanceconfig.admin_up:
1556
      pri_img = node_image[node_current]
1557
      test = instance not in pri_img.instances and not pri_img.offline
1558
      _ErrorIf(test, self.EINSTANCEDOWN, instance,
1559
               "instance not running on its primary node %s",
1560
               node_current)
1561

    
1562
    for node, n_img in node_image.items():
1563
      if node != node_current:
1564
        test = instance in n_img.instances
1565
        _ErrorIf(test, self.EINSTANCEWRONGNODE, instance,
1566
                 "instance should not run on node %s", node)
1567

    
1568
    diskdata = [(nname, success, status, idx)
1569
                for (nname, disks) in diskstatus.items()
1570
                for idx, (success, status) in enumerate(disks)]
1571

    
1572
    for nname, success, bdev_status, idx in diskdata:
1573
      # the 'ghost node' construction in Exec() ensures that we have a
1574
      # node here
1575
      snode = node_image[nname]
1576
      bad_snode = snode.ghost or snode.offline
1577
      _ErrorIf(instanceconfig.admin_up and not success and not bad_snode,
1578
               self.EINSTANCEFAULTYDISK, instance,
1579
               "couldn't retrieve status for disk/%s on %s: %s",
1580
               idx, nname, bdev_status)
1581
      _ErrorIf((instanceconfig.admin_up and success and
1582
                bdev_status.ldisk_status == constants.LDS_FAULTY),
1583
               self.EINSTANCEFAULTYDISK, instance,
1584
               "disk/%s on %s is faulty", idx, nname)
1585

    
1586
  def _VerifyOrphanVolumes(self, node_vol_should, node_image, reserved):
1587
    """Verify if there are any unknown volumes in the cluster.
1588

1589
    The .os, .swap and backup volumes are ignored. All other volumes are
1590
    reported as unknown.
1591

1592
    @type reserved: L{ganeti.utils.FieldSet}
1593
    @param reserved: a FieldSet of reserved volume names
1594

1595
    """
1596
    for node, n_img in node_image.items():
1597
      if n_img.offline or n_img.rpc_fail or n_img.lvm_fail:
1598
        # skip non-healthy nodes
1599
        continue
1600
      for volume in n_img.volumes:
1601
        test = ((node not in node_vol_should or
1602
                volume not in node_vol_should[node]) and
1603
                not reserved.Matches(volume))
1604
        self._ErrorIf(test, self.ENODEORPHANLV, node,
1605
                      "volume %s is unknown", volume)
1606

    
1607
  def _VerifyOrphanInstances(self, instancelist, node_image):
1608
    """Verify the list of running instances.
1609

1610
    This checks what instances are running but unknown to the cluster.
1611

1612
    """
1613
    for node, n_img in node_image.items():
1614
      for o_inst in n_img.instances:
1615
        test = o_inst not in instancelist
1616
        self._ErrorIf(test, self.ENODEORPHANINSTANCE, node,
1617
                      "instance %s on node %s should not exist", o_inst, node)
1618

    
1619
  def _VerifyNPlusOneMemory(self, node_image, instance_cfg):
1620
    """Verify N+1 Memory Resilience.
1621

1622
    Check that if one single node dies we can still start all the
1623
    instances it was primary for.
1624

1625
    """
1626
    cluster_info = self.cfg.GetClusterInfo()
1627
    for node, n_img in node_image.items():
1628
      # This code checks that every node which is now listed as
1629
      # secondary has enough memory to host all instances it is
1630
      # supposed to should a single other node in the cluster fail.
1631
      # FIXME: not ready for failover to an arbitrary node
1632
      # FIXME: does not support file-backed instances
1633
      # WARNING: we currently take into account down instances as well
1634
      # as up ones, considering that even if they're down someone
1635
      # might want to start them even in the event of a node failure.
1636
      if n_img.offline:
1637
        # we're skipping offline nodes from the N+1 warning, since
1638
        # most likely we don't have good memory infromation from them;
1639
        # we already list instances living on such nodes, and that's
1640
        # enough warning
1641
        continue
1642
      for prinode, instances in n_img.sbp.items():
1643
        needed_mem = 0
1644
        for instance in instances:
1645
          bep = cluster_info.FillBE(instance_cfg[instance])
1646
          if bep[constants.BE_AUTO_BALANCE]:
1647
            needed_mem += bep[constants.BE_MEMORY]
1648
        test = n_img.mfree < needed_mem
1649
        self._ErrorIf(test, self.ENODEN1, node,
1650
                      "not enough memory to accomodate instance failovers"
1651
                      " should node %s fail", prinode)
1652

    
1653
  def _VerifyNodeFiles(self, ninfo, nresult, file_list, local_cksum,
1654
                       master_files):
1655
    """Verifies and computes the node required file checksums.
1656

1657
    @type ninfo: L{objects.Node}
1658
    @param ninfo: the node to check
1659
    @param nresult: the remote results for the node
1660
    @param file_list: required list of files
1661
    @param local_cksum: dictionary of local files and their checksums
1662
    @param master_files: list of files that only masters should have
1663

1664
    """
1665
    node = ninfo.name
1666
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1667

    
1668
    remote_cksum = nresult.get(constants.NV_FILELIST, None)
1669
    test = not isinstance(remote_cksum, dict)
1670
    _ErrorIf(test, self.ENODEFILECHECK, node,
1671
             "node hasn't returned file checksum data")
1672
    if test:
1673
      return
1674

    
1675
    for file_name in file_list:
1676
      node_is_mc = ninfo.master_candidate
1677
      must_have = (file_name not in master_files) or node_is_mc
1678
      # missing
1679
      test1 = file_name not in remote_cksum
1680
      # invalid checksum
1681
      test2 = not test1 and remote_cksum[file_name] != local_cksum[file_name]
1682
      # existing and good
1683
      test3 = not test1 and remote_cksum[file_name] == local_cksum[file_name]
1684
      _ErrorIf(test1 and must_have, self.ENODEFILECHECK, node,
1685
               "file '%s' missing", file_name)
1686
      _ErrorIf(test2 and must_have, self.ENODEFILECHECK, node,
1687
               "file '%s' has wrong checksum", file_name)
1688
      # not candidate and this is not a must-have file
1689
      _ErrorIf(test2 and not must_have, self.ENODEFILECHECK, node,
1690
               "file '%s' should not exist on non master"
1691
               " candidates (and the file is outdated)", file_name)
1692
      # all good, except non-master/non-must have combination
1693
      _ErrorIf(test3 and not must_have, self.ENODEFILECHECK, node,
1694
               "file '%s' should not exist"
1695
               " on non master candidates", file_name)
1696

    
1697
  def _VerifyNodeDrbd(self, ninfo, nresult, instanceinfo, drbd_helper,
1698
                      drbd_map):
1699
    """Verifies and the node DRBD status.
1700

1701
    @type ninfo: L{objects.Node}
1702
    @param ninfo: the node to check
1703
    @param nresult: the remote results for the node
1704
    @param instanceinfo: the dict of instances
1705
    @param drbd_helper: the configured DRBD usermode helper
1706
    @param drbd_map: the DRBD map as returned by
1707
        L{ganeti.config.ConfigWriter.ComputeDRBDMap}
1708

1709
    """
1710
    node = ninfo.name
1711
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1712

    
1713
    if drbd_helper:
1714
      helper_result = nresult.get(constants.NV_DRBDHELPER, None)
1715
      test = (helper_result == None)
1716
      _ErrorIf(test, self.ENODEDRBDHELPER, node,
1717
               "no drbd usermode helper returned")
1718
      if helper_result:
1719
        status, payload = helper_result
1720
        test = not status
1721
        _ErrorIf(test, self.ENODEDRBDHELPER, node,
1722
                 "drbd usermode helper check unsuccessful: %s", payload)
1723
        test = status and (payload != drbd_helper)
1724
        _ErrorIf(test, self.ENODEDRBDHELPER, node,
1725
                 "wrong drbd usermode helper: %s", payload)
1726

    
1727
    # compute the DRBD minors
1728
    node_drbd = {}
1729
    for minor, instance in drbd_map[node].items():
1730
      test = instance not in instanceinfo
1731
      _ErrorIf(test, self.ECLUSTERCFG, None,
1732
               "ghost instance '%s' in temporary DRBD map", instance)
1733
        # ghost instance should not be running, but otherwise we
1734
        # don't give double warnings (both ghost instance and
1735
        # unallocated minor in use)
1736
      if test:
1737
        node_drbd[minor] = (instance, False)
1738
      else:
1739
        instance = instanceinfo[instance]
1740
        node_drbd[minor] = (instance.name, instance.admin_up)
1741

    
1742
    # and now check them
1743
    used_minors = nresult.get(constants.NV_DRBDLIST, [])
1744
    test = not isinstance(used_minors, (tuple, list))
1745
    _ErrorIf(test, self.ENODEDRBD, node,
1746
             "cannot parse drbd status file: %s", str(used_minors))
1747
    if test:
1748
      # we cannot check drbd status
1749
      return
1750

    
1751
    for minor, (iname, must_exist) in node_drbd.items():
1752
      test = minor not in used_minors and must_exist
1753
      _ErrorIf(test, self.ENODEDRBD, node,
1754
               "drbd minor %d of instance %s is not active", minor, iname)
1755
    for minor in used_minors:
1756
      test = minor not in node_drbd
1757
      _ErrorIf(test, self.ENODEDRBD, node,
1758
               "unallocated drbd minor %d is in use", minor)
1759

    
1760
  def _UpdateNodeOS(self, ninfo, nresult, nimg):
1761
    """Builds the node OS structures.
1762

1763
    @type ninfo: L{objects.Node}
1764
    @param ninfo: the node to check
1765
    @param nresult: the remote results for the node
1766
    @param nimg: the node image object
1767

1768
    """
1769
    node = ninfo.name
1770
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1771

    
1772
    remote_os = nresult.get(constants.NV_OSLIST, None)
1773
    test = (not isinstance(remote_os, list) or
1774
            not compat.all(isinstance(v, list) and len(v) == 7
1775
                           for v in remote_os))
1776

    
1777
    _ErrorIf(test, self.ENODEOS, node,
1778
             "node hasn't returned valid OS data")
1779

    
1780
    nimg.os_fail = test
1781

    
1782
    if test:
1783
      return
1784

    
1785
    os_dict = {}
1786

    
1787
    for (name, os_path, status, diagnose,
1788
         variants, parameters, api_ver) in nresult[constants.NV_OSLIST]:
1789

    
1790
      if name not in os_dict:
1791
        os_dict[name] = []
1792

    
1793
      # parameters is a list of lists instead of list of tuples due to
1794
      # JSON lacking a real tuple type, fix it:
1795
      parameters = [tuple(v) for v in parameters]
1796
      os_dict[name].append((os_path, status, diagnose,
1797
                            set(variants), set(parameters), set(api_ver)))
1798

    
1799
    nimg.oslist = os_dict
1800

    
1801
  def _VerifyNodeOS(self, ninfo, nimg, base):
1802
    """Verifies the node OS list.
1803

1804
    @type ninfo: L{objects.Node}
1805
    @param ninfo: the node to check
1806
    @param nimg: the node image object
1807
    @param base: the 'template' node we match against (e.g. from the master)
1808

1809
    """
1810
    node = ninfo.name
1811
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1812

    
1813
    assert not nimg.os_fail, "Entered _VerifyNodeOS with failed OS rpc?"
1814

    
1815
    for os_name, os_data in nimg.oslist.items():
1816
      assert os_data, "Empty OS status for OS %s?!" % os_name
1817
      f_path, f_status, f_diag, f_var, f_param, f_api = os_data[0]
1818
      _ErrorIf(not f_status, self.ENODEOS, node,
1819
               "Invalid OS %s (located at %s): %s", os_name, f_path, f_diag)
1820
      _ErrorIf(len(os_data) > 1, self.ENODEOS, node,
1821
               "OS '%s' has multiple entries (first one shadows the rest): %s",
1822
               os_name, utils.CommaJoin([v[0] for v in os_data]))
1823
      # this will catched in backend too
1824
      _ErrorIf(compat.any(v >= constants.OS_API_V15 for v in f_api)
1825
               and not f_var, self.ENODEOS, node,
1826
               "OS %s with API at least %d does not declare any variant",
1827
               os_name, constants.OS_API_V15)
1828
      # comparisons with the 'base' image
1829
      test = os_name not in base.oslist
1830
      _ErrorIf(test, self.ENODEOS, node,
1831
               "Extra OS %s not present on reference node (%s)",
1832
               os_name, base.name)
1833
      if test:
1834
        continue
1835
      assert base.oslist[os_name], "Base node has empty OS status?"
1836
      _, b_status, _, b_var, b_param, b_api = base.oslist[os_name][0]
1837
      if not b_status:
1838
        # base OS is invalid, skipping
1839
        continue
1840
      for kind, a, b in [("API version", f_api, b_api),
1841
                         ("variants list", f_var, b_var),
1842
                         ("parameters", f_param, b_param)]:
1843
        _ErrorIf(a != b, self.ENODEOS, node,
1844
                 "OS %s %s differs from reference node %s: %s vs. %s",
1845
                 kind, os_name, base.name,
1846
                 utils.CommaJoin(a), utils.CommaJoin(b))
1847

    
1848
    # check any missing OSes
1849
    missing = set(base.oslist.keys()).difference(nimg.oslist.keys())
1850
    _ErrorIf(missing, self.ENODEOS, node,
1851
             "OSes present on reference node %s but missing on this node: %s",
1852
             base.name, utils.CommaJoin(missing))
1853

    
1854
  def _VerifyOob(self, ninfo, nresult):
1855
    """Verifies out of band functionality of a node.
1856

1857
    @type ninfo: L{objects.Node}
1858
    @param ninfo: the node to check
1859
    @param nresult: the remote results for the node
1860

1861
    """
1862
    node = ninfo.name
1863
    # We just have to verify the paths on master and/or master candidates
1864
    # as the oob helper is invoked on the master
1865
    if ((ninfo.master_candidate or ninfo.master_capable) and
1866
        constants.NV_OOB_PATHS in nresult):
1867
      for path_result in nresult[constants.NV_OOB_PATHS]:
1868
        self._ErrorIf(path_result, self.ENODEOOBPATH, node, path_result)
1869

    
1870
  def _UpdateNodeVolumes(self, ninfo, nresult, nimg, vg_name):
1871
    """Verifies and updates the node volume data.
1872

1873
    This function will update a L{NodeImage}'s internal structures
1874
    with data from the remote call.
1875

1876
    @type ninfo: L{objects.Node}
1877
    @param ninfo: the node to check
1878
    @param nresult: the remote results for the node
1879
    @param nimg: the node image object
1880
    @param vg_name: the configured VG name
1881

1882
    """
1883
    node = ninfo.name
1884
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1885

    
1886
    nimg.lvm_fail = True
1887
    lvdata = nresult.get(constants.NV_LVLIST, "Missing LV data")
1888
    if vg_name is None:
1889
      pass
1890
    elif isinstance(lvdata, basestring):
1891
      _ErrorIf(True, self.ENODELVM, node, "LVM problem on node: %s",
1892
               utils.SafeEncode(lvdata))
1893
    elif not isinstance(lvdata, dict):
1894
      _ErrorIf(True, self.ENODELVM, node, "rpc call to node failed (lvlist)")
1895
    else:
1896
      nimg.volumes = lvdata
1897
      nimg.lvm_fail = False
1898

    
1899
  def _UpdateNodeInstances(self, ninfo, nresult, nimg):
1900
    """Verifies and updates the node instance list.
1901

1902
    If the listing was successful, then updates this node's instance
1903
    list. Otherwise, it marks the RPC call as failed for the instance
1904
    list key.
1905

1906
    @type ninfo: L{objects.Node}
1907
    @param ninfo: the node to check
1908
    @param nresult: the remote results for the node
1909
    @param nimg: the node image object
1910

1911
    """
1912
    idata = nresult.get(constants.NV_INSTANCELIST, None)
1913
    test = not isinstance(idata, list)
1914
    self._ErrorIf(test, self.ENODEHV, ninfo.name, "rpc call to node failed"
1915
                  " (instancelist): %s", utils.SafeEncode(str(idata)))
1916
    if test:
1917
      nimg.hyp_fail = True
1918
    else:
1919
      nimg.instances = idata
1920

    
1921
  def _UpdateNodeInfo(self, ninfo, nresult, nimg, vg_name):
1922
    """Verifies and computes a node information map
1923

1924
    @type ninfo: L{objects.Node}
1925
    @param ninfo: the node to check
1926
    @param nresult: the remote results for the node
1927
    @param nimg: the node image object
1928
    @param vg_name: the configured VG name
1929

1930
    """
1931
    node = ninfo.name
1932
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1933

    
1934
    # try to read free memory (from the hypervisor)
1935
    hv_info = nresult.get(constants.NV_HVINFO, None)
1936
    test = not isinstance(hv_info, dict) or "memory_free" not in hv_info
1937
    _ErrorIf(test, self.ENODEHV, node, "rpc call to node failed (hvinfo)")
1938
    if not test:
1939
      try:
1940
        nimg.mfree = int(hv_info["memory_free"])
1941
      except (ValueError, TypeError):
1942
        _ErrorIf(True, self.ENODERPC, node,
1943
                 "node returned invalid nodeinfo, check hypervisor")
1944

    
1945
    # FIXME: devise a free space model for file based instances as well
1946
    if vg_name is not None:
1947
      test = (constants.NV_VGLIST not in nresult or
1948
              vg_name not in nresult[constants.NV_VGLIST])
1949
      _ErrorIf(test, self.ENODELVM, node,
1950
               "node didn't return data for the volume group '%s'"
1951
               " - it is either missing or broken", vg_name)
1952
      if not test:
1953
        try:
1954
          nimg.dfree = int(nresult[constants.NV_VGLIST][vg_name])
1955
        except (ValueError, TypeError):
1956
          _ErrorIf(True, self.ENODERPC, node,
1957
                   "node returned invalid LVM info, check LVM status")
1958

    
1959
  def _CollectDiskInfo(self, nodelist, node_image, instanceinfo):
1960
    """Gets per-disk status information for all instances.
1961

1962
    @type nodelist: list of strings
1963
    @param nodelist: Node names
1964
    @type node_image: dict of (name, L{objects.Node})
1965
    @param node_image: Node objects
1966
    @type instanceinfo: dict of (name, L{objects.Instance})
1967
    @param instanceinfo: Instance objects
1968
    @rtype: {instance: {node: [(succes, payload)]}}
1969
    @return: a dictionary of per-instance dictionaries with nodes as
1970
        keys and disk information as values; the disk information is a
1971
        list of tuples (success, payload)
1972

1973
    """
1974
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1975

    
1976
    node_disks = {}
1977
    node_disks_devonly = {}
1978
    diskless_instances = set()
1979
    diskless = constants.DT_DISKLESS
1980

    
1981
    for nname in nodelist:
1982
      node_instances = list(itertools.chain(node_image[nname].pinst,
1983
                                            node_image[nname].sinst))
1984
      diskless_instances.update(inst for inst in node_instances
1985
                                if instanceinfo[inst].disk_template == diskless)
1986
      disks = [(inst, disk)
1987
               for inst in node_instances
1988
               for disk in instanceinfo[inst].disks]
1989

    
1990
      if not disks:
1991
        # No need to collect data
1992
        continue
1993

    
1994
      node_disks[nname] = disks
1995

    
1996
      # Creating copies as SetDiskID below will modify the objects and that can
1997
      # lead to incorrect data returned from nodes
1998
      devonly = [dev.Copy() for (_, dev) in disks]
1999

    
2000
      for dev in devonly:
2001
        self.cfg.SetDiskID(dev, nname)
2002

    
2003
      node_disks_devonly[nname] = devonly
2004

    
2005
    assert len(node_disks) == len(node_disks_devonly)
2006

    
2007
    # Collect data from all nodes with disks
2008
    result = self.rpc.call_blockdev_getmirrorstatus_multi(node_disks.keys(),
2009
                                                          node_disks_devonly)
2010

    
2011
    assert len(result) == len(node_disks)
2012

    
2013
    instdisk = {}
2014

    
2015
    for (nname, nres) in result.items():
2016
      disks = node_disks[nname]
2017

    
2018
      if nres.offline:
2019
        # No data from this node
2020
        data = len(disks) * [(False, "node offline")]
2021
      else:
2022
        msg = nres.fail_msg
2023
        _ErrorIf(msg, self.ENODERPC, nname,
2024
                 "while getting disk information: %s", msg)
2025
        if msg:
2026
          # No data from this node
2027
          data = len(disks) * [(False, msg)]
2028
        else:
2029
          data = []
2030
          for idx, i in enumerate(nres.payload):
2031
            if isinstance(i, (tuple, list)) and len(i) == 2:
2032
              data.append(i)
2033
            else:
2034
              logging.warning("Invalid result from node %s, entry %d: %s",
2035
                              nname, idx, i)
2036
              data.append((False, "Invalid result from the remote node"))
2037

    
2038
      for ((inst, _), status) in zip(disks, data):
2039
        instdisk.setdefault(inst, {}).setdefault(nname, []).append(status)
2040

    
2041
    # Add empty entries for diskless instances.
2042
    for inst in diskless_instances:
2043
      assert inst not in instdisk
2044
      instdisk[inst] = {}
2045

    
2046
    assert compat.all(len(statuses) == len(instanceinfo[inst].disks) and
2047
                      len(nnames) <= len(instanceinfo[inst].all_nodes) and
2048
                      compat.all(isinstance(s, (tuple, list)) and
2049
                                 len(s) == 2 for s in statuses)
2050
                      for inst, nnames in instdisk.items()
2051
                      for nname, statuses in nnames.items())
2052
    assert set(instdisk) == set(instanceinfo), "instdisk consistency failure"
2053

    
2054
    return instdisk
2055

    
2056
  def _VerifyHVP(self, hvp_data):
2057
    """Verifies locally the syntax of the hypervisor parameters.
2058

2059
    """
2060
    for item, hv_name, hv_params in hvp_data:
2061
      msg = ("hypervisor %s parameters syntax check (source %s): %%s" %
2062
             (item, hv_name))
2063
      try:
2064
        hv_class = hypervisor.GetHypervisor(hv_name)
2065
        utils.ForceDictType(hv_params, constants.HVS_PARAMETER_TYPES)
2066
        hv_class.CheckParameterSyntax(hv_params)
2067
      except errors.GenericError, err:
2068
        self._ErrorIf(True, self.ECLUSTERCFG, None, msg % str(err))
2069

    
2070

    
2071
  def BuildHooksEnv(self):
2072
    """Build hooks env.
2073

2074
    Cluster-Verify hooks just ran in the post phase and their failure makes
2075
    the output be logged in the verify output and the verification to fail.
2076

2077
    """
2078
    all_nodes = self.cfg.GetNodeList()
2079
    env = {
2080
      "CLUSTER_TAGS": " ".join(self.cfg.GetClusterInfo().GetTags())
2081
      }
2082
    for node in self.cfg.GetAllNodesInfo().values():
2083
      env["NODE_TAGS_%s" % node.name] = " ".join(node.GetTags())
2084

    
2085
    return env, [], all_nodes
2086

    
2087
  def Exec(self, feedback_fn):
2088
    """Verify integrity of cluster, performing various test on nodes.
2089

2090
    """
2091
    # This method has too many local variables. pylint: disable-msg=R0914
2092
    self.bad = False
2093
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
2094
    verbose = self.op.verbose
2095
    self._feedback_fn = feedback_fn
2096
    feedback_fn("* Verifying global settings")
2097
    for msg in self.cfg.VerifyConfig():
2098
      _ErrorIf(True, self.ECLUSTERCFG, None, msg)
2099

    
2100
    # Check the cluster certificates
2101
    for cert_filename in constants.ALL_CERT_FILES:
2102
      (errcode, msg) = _VerifyCertificate(cert_filename)
2103
      _ErrorIf(errcode, self.ECLUSTERCERT, None, msg, code=errcode)
2104

    
2105
    vg_name = self.cfg.GetVGName()
2106
    drbd_helper = self.cfg.GetDRBDHelper()
2107
    hypervisors = self.cfg.GetClusterInfo().enabled_hypervisors
2108
    cluster = self.cfg.GetClusterInfo()
2109
    nodelist = utils.NiceSort(self.cfg.GetNodeList())
2110
    nodeinfo = [self.cfg.GetNodeInfo(nname) for nname in nodelist]
2111
    nodeinfo_byname = dict(zip(nodelist, nodeinfo))
2112
    instancelist = utils.NiceSort(self.cfg.GetInstanceList())
2113
    instanceinfo = dict((iname, self.cfg.GetInstanceInfo(iname))
2114
                        for iname in instancelist)
2115
    groupinfo = self.cfg.GetAllNodeGroupsInfo()
2116
    i_non_redundant = [] # Non redundant instances
2117
    i_non_a_balanced = [] # Non auto-balanced instances
2118
    n_offline = 0 # Count of offline nodes
2119
    n_drained = 0 # Count of nodes being drained
2120
    node_vol_should = {}
2121

    
2122
    # FIXME: verify OS list
2123
    # do local checksums
2124
    master_files = [constants.CLUSTER_CONF_FILE]
2125
    master_node = self.master_node = self.cfg.GetMasterNode()
2126
    master_ip = self.cfg.GetMasterIP()
2127

    
2128
    file_names = ssconf.SimpleStore().GetFileList()
2129
    file_names.extend(constants.ALL_CERT_FILES)
2130
    file_names.extend(master_files)
2131
    if cluster.modify_etc_hosts:
2132
      file_names.append(constants.ETC_HOSTS)
2133

    
2134
    local_checksums = utils.FingerprintFiles(file_names)
2135

    
2136
    # Compute the set of hypervisor parameters
2137
    hvp_data = []
2138
    for hv_name in hypervisors:
2139
      hvp_data.append(("cluster", hv_name, cluster.GetHVDefaults(hv_name)))
2140
    for os_name, os_hvp in cluster.os_hvp.items():
2141
      for hv_name, hv_params in os_hvp.items():
2142
        if not hv_params:
2143
          continue
2144
        full_params = cluster.GetHVDefaults(hv_name, os_name=os_name)
2145
        hvp_data.append(("os %s" % os_name, hv_name, full_params))
2146
    # TODO: collapse identical parameter values in a single one
2147
    for instance in instanceinfo.values():
2148
      if not instance.hvparams:
2149
        continue
2150
      hvp_data.append(("instance %s" % instance.name, instance.hypervisor,
2151
                       cluster.FillHV(instance)))
2152
    # and verify them locally
2153
    self._VerifyHVP(hvp_data)
2154

    
2155
    feedback_fn("* Gathering data (%d nodes)" % len(nodelist))
2156
    node_verify_param = {
2157
      constants.NV_FILELIST: file_names,
2158
      constants.NV_NODELIST: [node.name for node in nodeinfo
2159
                              if not node.offline],
2160
      constants.NV_HYPERVISOR: hypervisors,
2161
      constants.NV_HVPARAMS: hvp_data,
2162
      constants.NV_NODENETTEST: [(node.name, node.primary_ip,
2163
                                  node.secondary_ip) for node in nodeinfo
2164
                                 if not node.offline],
2165
      constants.NV_INSTANCELIST: hypervisors,
2166
      constants.NV_VERSION: None,
2167
      constants.NV_HVINFO: self.cfg.GetHypervisorType(),
2168
      constants.NV_NODESETUP: None,
2169
      constants.NV_TIME: None,
2170
      constants.NV_MASTERIP: (master_node, master_ip),
2171
      constants.NV_OSLIST: None,
2172
      constants.NV_VMNODES: self.cfg.GetNonVmCapableNodeList(),
2173
      }
2174

    
2175
    if vg_name is not None:
2176
      node_verify_param[constants.NV_VGLIST] = None
2177
      node_verify_param[constants.NV_LVLIST] = vg_name
2178
      node_verify_param[constants.NV_PVLIST] = [vg_name]
2179
      node_verify_param[constants.NV_DRBDLIST] = None
2180

    
2181
    if drbd_helper:
2182
      node_verify_param[constants.NV_DRBDHELPER] = drbd_helper
2183

    
2184
    # Build our expected cluster state
2185
    node_image = dict((node.name, self.NodeImage(offline=node.offline,
2186
                                                 name=node.name,
2187
                                                 vm_capable=node.vm_capable))
2188
                      for node in nodeinfo)
2189

    
2190
    # Gather OOB paths
2191
    oob_paths = []
2192
    for node in nodeinfo:
2193
      path = _SupportsOob(self.cfg, node)
2194
      if path and path not in oob_paths:
2195
        oob_paths.append(path)
2196

    
2197
    if oob_paths:
2198
      node_verify_param[constants.NV_OOB_PATHS] = oob_paths
2199

    
2200
    for instance in instancelist:
2201
      inst_config = instanceinfo[instance]
2202

    
2203
      for nname in inst_config.all_nodes:
2204
        if nname not in node_image:
2205
          # ghost node
2206
          gnode = self.NodeImage(name=nname)
2207
          gnode.ghost = True
2208
          node_image[nname] = gnode
2209

    
2210
      inst_config.MapLVsByNode(node_vol_should)
2211

    
2212
      pnode = inst_config.primary_node
2213
      node_image[pnode].pinst.append(instance)
2214

    
2215
      for snode in inst_config.secondary_nodes:
2216
        nimg = node_image[snode]
2217
        nimg.sinst.append(instance)
2218
        if pnode not in nimg.sbp:
2219
          nimg.sbp[pnode] = []
2220
        nimg.sbp[pnode].append(instance)
2221

    
2222
    # At this point, we have the in-memory data structures complete,
2223
    # except for the runtime information, which we'll gather next
2224

    
2225
    # Due to the way our RPC system works, exact response times cannot be
2226
    # guaranteed (e.g. a broken node could run into a timeout). By keeping the
2227
    # time before and after executing the request, we can at least have a time
2228
    # window.
2229
    nvinfo_starttime = time.time()
2230
    all_nvinfo = self.rpc.call_node_verify(nodelist, node_verify_param,
2231
                                           self.cfg.GetClusterName())
2232
    nvinfo_endtime = time.time()
2233

    
2234
    all_drbd_map = self.cfg.ComputeDRBDMap()
2235

    
2236
    feedback_fn("* Gathering disk information (%s nodes)" % len(nodelist))
2237
    instdisk = self._CollectDiskInfo(nodelist, node_image, instanceinfo)
2238

    
2239
    feedback_fn("* Verifying node status")
2240

    
2241
    refos_img = None
2242

    
2243
    for node_i in nodeinfo:
2244
      node = node_i.name
2245
      nimg = node_image[node]
2246

    
2247
      if node_i.offline:
2248
        if verbose:
2249
          feedback_fn("* Skipping offline node %s" % (node,))
2250
        n_offline += 1
2251
        continue
2252

    
2253
      if node == master_node:
2254
        ntype = "master"
2255
      elif node_i.master_candidate:
2256
        ntype = "master candidate"
2257
      elif node_i.drained:
2258
        ntype = "drained"
2259
        n_drained += 1
2260
      else:
2261
        ntype = "regular"
2262
      if verbose:
2263
        feedback_fn("* Verifying node %s (%s)" % (node, ntype))
2264

    
2265
      msg = all_nvinfo[node].fail_msg
2266
      _ErrorIf(msg, self.ENODERPC, node, "while contacting node: %s", msg)
2267
      if msg:
2268
        nimg.rpc_fail = True
2269
        continue
2270

    
2271
      nresult = all_nvinfo[node].payload
2272

    
2273
      nimg.call_ok = self._VerifyNode(node_i, nresult)
2274
      self._VerifyNodeTime(node_i, nresult, nvinfo_starttime, nvinfo_endtime)
2275
      self._VerifyNodeNetwork(node_i, nresult)
2276
      self._VerifyNodeFiles(node_i, nresult, file_names, local_checksums,
2277
                            master_files)
2278

    
2279
      self._VerifyOob(node_i, nresult)
2280

    
2281
      if nimg.vm_capable:
2282
        self._VerifyNodeLVM(node_i, nresult, vg_name)
2283
        self._VerifyNodeDrbd(node_i, nresult, instanceinfo, drbd_helper,
2284
                             all_drbd_map)
2285

    
2286
        self._UpdateNodeVolumes(node_i, nresult, nimg, vg_name)
2287
        self._UpdateNodeInstances(node_i, nresult, nimg)
2288
        self._UpdateNodeInfo(node_i, nresult, nimg, vg_name)
2289
        self._UpdateNodeOS(node_i, nresult, nimg)
2290
        if not nimg.os_fail:
2291
          if refos_img is None:
2292
            refos_img = nimg
2293
          self._VerifyNodeOS(node_i, nimg, refos_img)
2294

    
2295
    feedback_fn("* Verifying instance status")
2296
    for instance in instancelist:
2297
      if verbose:
2298
        feedback_fn("* Verifying instance %s" % instance)
2299
      inst_config = instanceinfo[instance]
2300
      self._VerifyInstance(instance, inst_config, node_image,
2301
                           instdisk[instance])
2302
      inst_nodes_offline = []
2303

    
2304
      pnode = inst_config.primary_node
2305
      pnode_img = node_image[pnode]
2306
      _ErrorIf(pnode_img.rpc_fail and not pnode_img.offline,
2307
               self.ENODERPC, pnode, "instance %s, connection to"
2308
               " primary node failed", instance)
2309

    
2310
      _ErrorIf(pnode_img.offline, self.EINSTANCEBADNODE, instance,
2311
               "instance lives on offline node %s", inst_config.primary_node)
2312

    
2313
      # If the instance is non-redundant we cannot survive losing its primary
2314
      # node, so we are not N+1 compliant. On the other hand we have no disk
2315
      # templates with more than one secondary so that situation is not well
2316
      # supported either.
2317
      # FIXME: does not support file-backed instances
2318
      if not inst_config.secondary_nodes:
2319
        i_non_redundant.append(instance)
2320

    
2321
      _ErrorIf(len(inst_config.secondary_nodes) > 1, self.EINSTANCELAYOUT,
2322
               instance, "instance has multiple secondary nodes: %s",
2323
               utils.CommaJoin(inst_config.secondary_nodes),
2324
               code=self.ETYPE_WARNING)
2325

    
2326
      if inst_config.disk_template in constants.DTS_NET_MIRROR:
2327
        pnode = inst_config.primary_node
2328
        instance_nodes = utils.NiceSort(inst_config.all_nodes)
2329
        instance_groups = {}
2330

    
2331
        for node in instance_nodes:
2332
          instance_groups.setdefault(nodeinfo_byname[node].group,
2333
                                     []).append(node)
2334

    
2335
        pretty_list = [
2336
          "%s (group %s)" % (utils.CommaJoin(nodes), groupinfo[group].name)
2337
          # Sort so that we always list the primary node first.
2338
          for group, nodes in sorted(instance_groups.items(),
2339
                                     key=lambda (_, nodes): pnode in nodes,
2340
                                     reverse=True)]
2341

    
2342
        self._ErrorIf(len(instance_groups) > 1, self.EINSTANCESPLITGROUPS,
2343
                      instance, "instance has primary and secondary nodes in"
2344
                      " different groups: %s", utils.CommaJoin(pretty_list),
2345
                      code=self.ETYPE_WARNING)
2346

    
2347
      if not cluster.FillBE(inst_config)[constants.BE_AUTO_BALANCE]:
2348
        i_non_a_balanced.append(instance)
2349

    
2350
      for snode in inst_config.secondary_nodes:
2351
        s_img = node_image[snode]
2352
        _ErrorIf(s_img.rpc_fail and not s_img.offline, self.ENODERPC, snode,
2353
                 "instance %s, connection to secondary node failed", instance)
2354

    
2355
        if s_img.offline:
2356
          inst_nodes_offline.append(snode)
2357

    
2358
      # warn that the instance lives on offline nodes
2359
      _ErrorIf(inst_nodes_offline, self.EINSTANCEBADNODE, instance,
2360
               "instance has offline secondary node(s) %s",
2361
               utils.CommaJoin(inst_nodes_offline))
2362
      # ... or ghost/non-vm_capable nodes
2363
      for node in inst_config.all_nodes:
2364
        _ErrorIf(node_image[node].ghost, self.EINSTANCEBADNODE, instance,
2365
                 "instance lives on ghost node %s", node)
2366
        _ErrorIf(not node_image[node].vm_capable, self.EINSTANCEBADNODE,
2367
                 instance, "instance lives on non-vm_capable node %s", node)
2368

    
2369
    feedback_fn("* Verifying orphan volumes")
2370
    reserved = utils.FieldSet(*cluster.reserved_lvs)
2371
    self._VerifyOrphanVolumes(node_vol_should, node_image, reserved)
2372

    
2373
    feedback_fn("* Verifying orphan instances")
2374
    self._VerifyOrphanInstances(instancelist, node_image)
2375

    
2376
    if constants.VERIFY_NPLUSONE_MEM not in self.op.skip_checks:
2377
      feedback_fn("* Verifying N+1 Memory redundancy")
2378
      self._VerifyNPlusOneMemory(node_image, instanceinfo)
2379

    
2380
    feedback_fn("* Other Notes")
2381
    if i_non_redundant:
2382
      feedback_fn("  - NOTICE: %d non-redundant instance(s) found."
2383
                  % len(i_non_redundant))
2384

    
2385
    if i_non_a_balanced:
2386
      feedback_fn("  - NOTICE: %d non-auto-balanced instance(s) found."
2387
                  % len(i_non_a_balanced))
2388

    
2389
    if n_offline:
2390
      feedback_fn("  - NOTICE: %d offline node(s) found." % n_offline)
2391

    
2392
    if n_drained:
2393
      feedback_fn("  - NOTICE: %d drained node(s) found." % n_drained)
2394

    
2395
    return not self.bad
2396

    
2397
  def HooksCallBack(self, phase, hooks_results, feedback_fn, lu_result):
2398
    """Analyze the post-hooks' result
2399

2400
    This method analyses the hook result, handles it, and sends some
2401
    nicely-formatted feedback back to the user.
2402

2403
    @param phase: one of L{constants.HOOKS_PHASE_POST} or
2404
        L{constants.HOOKS_PHASE_PRE}; it denotes the hooks phase
2405
    @param hooks_results: the results of the multi-node hooks rpc call
2406
    @param feedback_fn: function used send feedback back to the caller
2407
    @param lu_result: previous Exec result
2408
    @return: the new Exec result, based on the previous result
2409
        and hook results
2410

2411
    """
2412
    # We only really run POST phase hooks, and are only interested in
2413
    # their results
2414
    if phase == constants.HOOKS_PHASE_POST:
2415
      # Used to change hooks' output to proper indentation
2416
      feedback_fn("* Hooks Results")
2417
      assert hooks_results, "invalid result from hooks"
2418

    
2419
      for node_name in hooks_results:
2420
        res = hooks_results[node_name]
2421
        msg = res.fail_msg
2422
        test = msg and not res.offline
2423
        self._ErrorIf(test, self.ENODEHOOKS, node_name,
2424
                      "Communication failure in hooks execution: %s", msg)
2425
        if res.offline or msg:
2426
          # No need to investigate payload if node is offline or gave an error.
2427
          # override manually lu_result here as _ErrorIf only
2428
          # overrides self.bad
2429
          lu_result = 1
2430
          continue
2431
        for script, hkr, output in res.payload:
2432
          test = hkr == constants.HKR_FAIL
2433
          self._ErrorIf(test, self.ENODEHOOKS, node_name,
2434
                        "Script %s failed, output:", script)
2435
          if test:
2436
            output = self._HOOKS_INDENT_RE.sub('      ', output)
2437
            feedback_fn("%s" % output)
2438
            lu_result = 0
2439

    
2440
      return lu_result
2441

    
2442

    
2443
class LUClusterVerifyDisks(NoHooksLU):
2444
  """Verifies the cluster disks status.
2445

2446
  """
2447
  REQ_BGL = False
2448

    
2449
  def ExpandNames(self):
2450
    self.needed_locks = {
2451
      locking.LEVEL_NODE: locking.ALL_SET,
2452
      locking.LEVEL_INSTANCE: locking.ALL_SET,
2453
    }
2454
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
2455

    
2456
  def Exec(self, feedback_fn):
2457
    """Verify integrity of cluster disks.
2458

2459
    @rtype: tuple of three items
2460
    @return: a tuple of (dict of node-to-node_error, list of instances
2461
        which need activate-disks, dict of instance: (node, volume) for
2462
        missing volumes
2463

2464
    """
2465
    result = res_nodes, res_instances, res_missing = {}, [], {}
2466

    
2467
    nodes = utils.NiceSort(self.cfg.GetVmCapableNodeList())
2468
    instances = self.cfg.GetAllInstancesInfo().values()
2469

    
2470
    nv_dict = {}
2471
    for inst in instances:
2472
      inst_lvs = {}
2473
      if not inst.admin_up:
2474
        continue
2475
      inst.MapLVsByNode(inst_lvs)
2476
      # transform { iname: {node: [vol,],},} to {(node, vol): iname}
2477
      for node, vol_list in inst_lvs.iteritems():
2478
        for vol in vol_list:
2479
          nv_dict[(node, vol)] = inst
2480

    
2481
    if not nv_dict:
2482
      return result
2483

    
2484
    node_lvs = self.rpc.call_lv_list(nodes, [])
2485
    for node, node_res in node_lvs.items():
2486
      if node_res.offline:
2487
        continue
2488
      msg = node_res.fail_msg
2489
      if msg:
2490
        logging.warning("Error enumerating LVs on node %s: %s", node, msg)
2491
        res_nodes[node] = msg
2492
        continue
2493

    
2494
      lvs = node_res.payload
2495
      for lv_name, (_, _, lv_online) in lvs.items():
2496
        inst = nv_dict.pop((node, lv_name), None)
2497
        if (not lv_online and inst is not None
2498
            and inst.name not in res_instances):
2499
          res_instances.append(inst.name)
2500

    
2501
    # any leftover items in nv_dict are missing LVs, let's arrange the
2502
    # data better
2503
    for key, inst in nv_dict.iteritems():
2504
      if inst.name not in res_missing:
2505
        res_missing[inst.name] = []
2506
      res_missing[inst.name].append(key)
2507

    
2508
    return result
2509

    
2510

    
2511
class LUClusterRepairDiskSizes(NoHooksLU):
2512
  """Verifies the cluster disks sizes.
2513

2514
  """
2515
  REQ_BGL = False
2516

    
2517
  def ExpandNames(self):
2518
    if self.op.instances:
2519
      self.wanted_names = []
2520
      for name in self.op.instances:
2521
        full_name = _ExpandInstanceName(self.cfg, name)
2522
        self.wanted_names.append(full_name)
2523
      self.needed_locks = {
2524
        locking.LEVEL_NODE: [],
2525
        locking.LEVEL_INSTANCE: self.wanted_names,
2526
        }
2527
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
2528
    else:
2529
      self.wanted_names = None
2530
      self.needed_locks = {
2531
        locking.LEVEL_NODE: locking.ALL_SET,
2532
        locking.LEVEL_INSTANCE: locking.ALL_SET,
2533
        }
2534
    self.share_locks = dict(((i, 1) for i in locking.LEVELS))
2535

    
2536
  def DeclareLocks(self, level):
2537
    if level == locking.LEVEL_NODE and self.wanted_names is not None:
2538
      self._LockInstancesNodes(primary_only=True)
2539

    
2540
  def CheckPrereq(self):
2541
    """Check prerequisites.
2542

2543
    This only checks the optional instance list against the existing names.
2544

2545
    """
2546
    if self.wanted_names is None:
2547
      self.wanted_names = self.acquired_locks[locking.LEVEL_INSTANCE]
2548

    
2549
    self.wanted_instances = [self.cfg.GetInstanceInfo(name) for name
2550
                             in self.wanted_names]
2551

    
2552
  def _EnsureChildSizes(self, disk):
2553
    """Ensure children of the disk have the needed disk size.
2554

2555
    This is valid mainly for DRBD8 and fixes an issue where the
2556
    children have smaller disk size.
2557

2558
    @param disk: an L{ganeti.objects.Disk} object
2559

2560
    """
2561
    if disk.dev_type == constants.LD_DRBD8:
2562
      assert disk.children, "Empty children for DRBD8?"
2563
      fchild = disk.children[0]
2564
      mismatch = fchild.size < disk.size
2565
      if mismatch:
2566
        self.LogInfo("Child disk has size %d, parent %d, fixing",
2567
                     fchild.size, disk.size)
2568
        fchild.size = disk.size
2569

    
2570
      # and we recurse on this child only, not on the metadev
2571
      return self._EnsureChildSizes(fchild) or mismatch
2572
    else:
2573
      return False
2574

    
2575
  def Exec(self, feedback_fn):
2576
    """Verify the size of cluster disks.
2577

2578
    """
2579
    # TODO: check child disks too
2580
    # TODO: check differences in size between primary/secondary nodes
2581
    per_node_disks = {}
2582
    for instance in self.wanted_instances:
2583
      pnode = instance.primary_node
2584
      if pnode not in per_node_disks:
2585
        per_node_disks[pnode] = []
2586
      for idx, disk in enumerate(instance.disks):
2587
        per_node_disks[pnode].append((instance, idx, disk))
2588

    
2589
    changed = []
2590
    for node, dskl in per_node_disks.items():
2591
      newl = [v[2].Copy() for v in dskl]
2592
      for dsk in newl:
2593
        self.cfg.SetDiskID(dsk, node)
2594
      result = self.rpc.call_blockdev_getsize(node, newl)
2595
      if result.fail_msg:
2596
        self.LogWarning("Failure in blockdev_getsize call to node"
2597
                        " %s, ignoring", node)
2598
        continue
2599
      if len(result.payload) != len(dskl):
2600
        logging.warning("Invalid result from node %s: len(dksl)=%d,"
2601
                        " result.payload=%s", node, len(dskl), result.payload)
2602
        self.LogWarning("Invalid result from node %s, ignoring node results",
2603
                        node)
2604
        continue
2605
      for ((instance, idx, disk), size) in zip(dskl, result.payload):
2606
        if size is None:
2607
          self.LogWarning("Disk %d of instance %s did not return size"
2608
                          " information, ignoring", idx, instance.name)
2609
          continue
2610
        if not isinstance(size, (int, long)):
2611
          self.LogWarning("Disk %d of instance %s did not return valid"
2612
                          " size information, ignoring", idx, instance.name)
2613
          continue
2614
        size = size >> 20
2615
        if size != disk.size:
2616
          self.LogInfo("Disk %d of instance %s has mismatched size,"
2617
                       " correcting: recorded %d, actual %d", idx,
2618
                       instance.name, disk.size, size)
2619
          disk.size = size
2620
          self.cfg.Update(instance, feedback_fn)
2621
          changed.append((instance.name, idx, size))
2622
        if self._EnsureChildSizes(disk):
2623
          self.cfg.Update(instance, feedback_fn)
2624
          changed.append((instance.name, idx, disk.size))
2625
    return changed
2626

    
2627

    
2628
class LUClusterRename(LogicalUnit):
2629
  """Rename the cluster.
2630

2631
  """
2632
  HPATH = "cluster-rename"
2633
  HTYPE = constants.HTYPE_CLUSTER
2634

    
2635
  def BuildHooksEnv(self):
2636
    """Build hooks env.
2637

2638
    """
2639
    env = {
2640
      "OP_TARGET": self.cfg.GetClusterName(),
2641
      "NEW_NAME": self.op.name,
2642
      }
2643
    mn = self.cfg.GetMasterNode()
2644
    all_nodes = self.cfg.GetNodeList()
2645
    return env, [mn], all_nodes
2646

    
2647
  def CheckPrereq(self):
2648
    """Verify that the passed name is a valid one.
2649

2650
    """
2651
    hostname = netutils.GetHostname(name=self.op.name,
2652
                                    family=self.cfg.GetPrimaryIPFamily())
2653

    
2654
    new_name = hostname.name
2655
    self.ip = new_ip = hostname.ip
2656
    old_name = self.cfg.GetClusterName()
2657
    old_ip = self.cfg.GetMasterIP()
2658
    if new_name == old_name and new_ip == old_ip:
2659
      raise errors.OpPrereqError("Neither the name nor the IP address of the"
2660
                                 " cluster has changed",
2661
                                 errors.ECODE_INVAL)
2662
    if new_ip != old_ip:
2663
      if netutils.TcpPing(new_ip, constants.DEFAULT_NODED_PORT):
2664
        raise errors.OpPrereqError("The given cluster IP address (%s) is"
2665
                                   " reachable on the network" %
2666
                                   new_ip, errors.ECODE_NOTUNIQUE)
2667

    
2668
    self.op.name = new_name
2669

    
2670
  def Exec(self, feedback_fn):
2671
    """Rename the cluster.
2672

2673
    """
2674
    clustername = self.op.name
2675
    ip = self.ip
2676

    
2677
    # shutdown the master IP
2678
    master = self.cfg.GetMasterNode()
2679
    result = self.rpc.call_node_stop_master(master, False)
2680
    result.Raise("Could not disable the master role")
2681

    
2682
    try:
2683
      cluster = self.cfg.GetClusterInfo()
2684
      cluster.cluster_name = clustername
2685
      cluster.master_ip = ip
2686
      self.cfg.Update(cluster, feedback_fn)
2687

    
2688
      # update the known hosts file
2689
      ssh.WriteKnownHostsFile(self.cfg, constants.SSH_KNOWN_HOSTS_FILE)
2690
      node_list = self.cfg.GetOnlineNodeList()
2691
      try:
2692
        node_list.remove(master)
2693
      except ValueError:
2694
        pass
2695
      _UploadHelper(self, node_list, constants.SSH_KNOWN_HOSTS_FILE)
2696
    finally:
2697
      result = self.rpc.call_node_start_master(master, False, False)
2698
      msg = result.fail_msg
2699
      if msg:
2700
        self.LogWarning("Could not re-enable the master role on"
2701
                        " the master, please restart manually: %s", msg)
2702

    
2703
    return clustername
2704

    
2705

    
2706
class LUClusterSetParams(LogicalUnit):
2707
  """Change the parameters of the cluster.
2708

2709
  """
2710
  HPATH = "cluster-modify"
2711
  HTYPE = constants.HTYPE_CLUSTER
2712
  REQ_BGL = False
2713

    
2714
  def CheckArguments(self):
2715
    """Check parameters
2716

2717
    """
2718
    if self.op.uid_pool:
2719
      uidpool.CheckUidPool(self.op.uid_pool)
2720

    
2721
    if self.op.add_uids:
2722
      uidpool.CheckUidPool(self.op.add_uids)
2723

    
2724
    if self.op.remove_uids:
2725
      uidpool.CheckUidPool(self.op.remove_uids)
2726

    
2727
  def ExpandNames(self):
2728
    # FIXME: in the future maybe other cluster params won't require checking on
2729
    # all nodes to be modified.
2730
    self.needed_locks = {
2731
      locking.LEVEL_NODE: locking.ALL_SET,
2732
    }
2733
    self.share_locks[locking.LEVEL_NODE] = 1
2734

    
2735
  def BuildHooksEnv(self):
2736
    """Build hooks env.
2737

2738
    """
2739
    env = {
2740
      "OP_TARGET": self.cfg.GetClusterName(),
2741
      "NEW_VG_NAME": self.op.vg_name,
2742
      }
2743
    mn = self.cfg.GetMasterNode()
2744
    return env, [mn], [mn]
2745

    
2746
  def CheckPrereq(self):
2747
    """Check prerequisites.
2748

2749
    This checks whether the given params don't conflict and
2750
    if the given volume group is valid.
2751

2752
    """
2753
    if self.op.vg_name is not None and not self.op.vg_name:
2754
      if self.cfg.HasAnyDiskOfType(constants.LD_LV):
2755
        raise errors.OpPrereqError("Cannot disable lvm storage while lvm-based"
2756
                                   " instances exist", errors.ECODE_INVAL)
2757

    
2758
    if self.op.drbd_helper is not None and not self.op.drbd_helper:
2759
      if self.cfg.HasAnyDiskOfType(constants.LD_DRBD8):
2760
        raise errors.OpPrereqError("Cannot disable drbd helper while"
2761
                                   " drbd-based instances exist",
2762
                                   errors.ECODE_INVAL)
2763

    
2764
    node_list = self.acquired_locks[locking.LEVEL_NODE]
2765

    
2766
    # if vg_name not None, checks given volume group on all nodes
2767
    if self.op.vg_name:
2768
      vglist = self.rpc.call_vg_list(node_list)
2769
      for node in node_list:
2770
        msg = vglist[node].fail_msg
2771
        if msg:
2772
          # ignoring down node
2773
          self.LogWarning("Error while gathering data on node %s"
2774
                          " (ignoring node): %s", node, msg)
2775
          continue
2776
        vgstatus = utils.CheckVolumeGroupSize(vglist[node].payload,
2777
                                              self.op.vg_name,
2778
                                              constants.MIN_VG_SIZE)
2779
        if vgstatus:
2780
          raise errors.OpPrereqError("Error on node '%s': %s" %
2781
                                     (node, vgstatus), errors.ECODE_ENVIRON)
2782

    
2783
    if self.op.drbd_helper:
2784
      # checks given drbd helper on all nodes
2785
      helpers = self.rpc.call_drbd_helper(node_list)
2786
      for node in node_list:
2787
        ninfo = self.cfg.GetNodeInfo(node)
2788
        if ninfo.offline:
2789
          self.LogInfo("Not checking drbd helper on offline node %s", node)
2790
          continue
2791
        msg = helpers[node].fail_msg
2792
        if msg:
2793
          raise errors.OpPrereqError("Error checking drbd helper on node"
2794
                                     " '%s': %s" % (node, msg),
2795
                                     errors.ECODE_ENVIRON)
2796
        node_helper = helpers[node].payload
2797
        if node_helper != self.op.drbd_helper:
2798
          raise errors.OpPrereqError("Error on node '%s': drbd helper is %s" %
2799
                                     (node, node_helper), errors.ECODE_ENVIRON)
2800

    
2801
    self.cluster = cluster = self.cfg.GetClusterInfo()
2802
    # validate params changes
2803
    if self.op.beparams:
2804
      utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
2805
      self.new_beparams = cluster.SimpleFillBE(self.op.beparams)
2806

    
2807
    if self.op.ndparams:
2808
      utils.ForceDictType(self.op.ndparams, constants.NDS_PARAMETER_TYPES)
2809
      self.new_ndparams = cluster.SimpleFillND(self.op.ndparams)
2810

    
2811
    if self.op.nicparams:
2812
      utils.ForceDictType(self.op.nicparams, constants.NICS_PARAMETER_TYPES)
2813
      self.new_nicparams = cluster.SimpleFillNIC(self.op.nicparams)
2814
      objects.NIC.CheckParameterSyntax(self.new_nicparams)
2815
      nic_errors = []
2816

    
2817
      # check all instances for consistency
2818
      for instance in self.cfg.GetAllInstancesInfo().values():
2819
        for nic_idx, nic in enumerate(instance.nics):
2820
          params_copy = copy.deepcopy(nic.nicparams)
2821
          params_filled = objects.FillDict(self.new_nicparams, params_copy)
2822

    
2823
          # check parameter syntax
2824
          try:
2825
            objects.NIC.CheckParameterSyntax(params_filled)
2826
          except errors.ConfigurationError, err:
2827
            nic_errors.append("Instance %s, nic/%d: %s" %
2828
                              (instance.name, nic_idx, err))
2829

    
2830
          # if we're moving instances to routed, check that they have an ip
2831
          target_mode = params_filled[constants.NIC_MODE]
2832
          if target_mode == constants.NIC_MODE_ROUTED and not nic.ip:
2833
            nic_errors.append("Instance %s, nic/%d: routed nick with no ip" %
2834
                              (instance.name, nic_idx))
2835
      if nic_errors:
2836
        raise errors.OpPrereqError("Cannot apply the change, errors:\n%s" %
2837
                                   "\n".join(nic_errors))
2838

    
2839
    # hypervisor list/parameters
2840
    self.new_hvparams = new_hvp = objects.FillDict(cluster.hvparams, {})
2841
    if self.op.hvparams:
2842
      for hv_name, hv_dict in self.op.hvparams.items():
2843
        if hv_name not in self.new_hvparams:
2844
          self.new_hvparams[hv_name] = hv_dict
2845
        else:
2846
          self.new_hvparams[hv_name].update(hv_dict)
2847

    
2848
    # os hypervisor parameters
2849
    self.new_os_hvp = objects.FillDict(cluster.os_hvp, {})
2850
    if self.op.os_hvp:
2851
      for os_name, hvs in self.op.os_hvp.items():
2852
        if os_name not in self.new_os_hvp:
2853
          self.new_os_hvp[os_name] = hvs
2854
        else:
2855
          for hv_name, hv_dict in hvs.items():
2856
            if hv_name not in self.new_os_hvp[os_name]:
2857
              self.new_os_hvp[os_name][hv_name] = hv_dict
2858
            else:
2859
              self.new_os_hvp[os_name][hv_name].update(hv_dict)
2860

    
2861
    # os parameters
2862
    self.new_osp = objects.FillDict(cluster.osparams, {})
2863
    if self.op.osparams:
2864
      for os_name, osp in self.op.osparams.items():
2865
        if os_name not in self.new_osp:
2866
          self.new_osp[os_name] = {}
2867

    
2868
        self.new_osp[os_name] = _GetUpdatedParams(self.new_osp[os_name], osp,
2869
                                                  use_none=True)
2870

    
2871
        if not self.new_osp[os_name]:
2872
          # we removed all parameters
2873
          del self.new_osp[os_name]
2874
        else:
2875
          # check the parameter validity (remote check)
2876
          _CheckOSParams(self, False, [self.cfg.GetMasterNode()],
2877
                         os_name, self.new_osp[os_name])
2878

    
2879
    # changes to the hypervisor list
2880
    if self.op.enabled_hypervisors is not None:
2881
      self.hv_list = self.op.enabled_hypervisors
2882
      for hv in self.hv_list:
2883
        # if the hypervisor doesn't already exist in the cluster
2884
        # hvparams, we initialize it to empty, and then (in both
2885
        # cases) we make sure to fill the defaults, as we might not
2886
        # have a complete defaults list if the hypervisor wasn't
2887
        # enabled before
2888
        if hv not in new_hvp:
2889
          new_hvp[hv] = {}
2890
        new_hvp[hv] = objects.FillDict(constants.HVC_DEFAULTS[hv], new_hvp[hv])
2891
        utils.ForceDictType(new_hvp[hv], constants.HVS_PARAMETER_TYPES)
2892
    else:
2893
      self.hv_list = cluster.enabled_hypervisors
2894

    
2895
    if self.op.hvparams or self.op.enabled_hypervisors is not None:
2896
      # either the enabled list has changed, or the parameters have, validate
2897
      for hv_name, hv_params in self.new_hvparams.items():
2898
        if ((self.op.hvparams and hv_name in self.op.hvparams) or
2899
            (self.op.enabled_hypervisors and
2900
             hv_name in self.op.enabled_hypervisors)):
2901
          # either this is a new hypervisor, or its parameters have changed
2902
          hv_class = hypervisor.GetHypervisor(hv_name)
2903
          utils.ForceDictType(hv_params, constants.HVS_PARAMETER_TYPES)
2904
          hv_class.CheckParameterSyntax(hv_params)
2905
          _CheckHVParams(self, node_list, hv_name, hv_params)
2906

    
2907
    if self.op.os_hvp:
2908
      # no need to check any newly-enabled hypervisors, since the
2909
      # defaults have already been checked in the above code-block
2910
      for os_name, os_hvp in self.new_os_hvp.items():
2911
        for hv_name, hv_params in os_hvp.items():
2912
          utils.ForceDictType(hv_params, constants.HVS_PARAMETER_TYPES)
2913
          # we need to fill in the new os_hvp on top of the actual hv_p
2914
          cluster_defaults = self.new_hvparams.get(hv_name, {})
2915
          new_osp = objects.FillDict(cluster_defaults, hv_params)
2916
          hv_class = hypervisor.GetHypervisor(hv_name)
2917
          hv_class.CheckParameterSyntax(new_osp)
2918
          _CheckHVParams(self, node_list, hv_name, new_osp)
2919

    
2920
    if self.op.default_iallocator:
2921
      alloc_script = utils.FindFile(self.op.default_iallocator,
2922
                                    constants.IALLOCATOR_SEARCH_PATH,
2923
                                    os.path.isfile)
2924
      if alloc_script is None:
2925
        raise errors.OpPrereqError("Invalid default iallocator script '%s'"
2926
                                   " specified" % self.op.default_iallocator,
2927
                                   errors.ECODE_INVAL)
2928

    
2929
  def Exec(self, feedback_fn):
2930
    """Change the parameters of the cluster.
2931

2932
    """
2933
    if self.op.vg_name is not None:
2934
      new_volume = self.op.vg_name
2935
      if not new_volume:
2936
        new_volume = None
2937
      if new_volume != self.cfg.GetVGName():
2938
        self.cfg.SetVGName(new_volume)
2939
      else:
2940
        feedback_fn("Cluster LVM configuration already in desired"
2941
                    " state, not changing")
2942
    if self.op.drbd_helper is not None:
2943
      new_helper = self.op.drbd_helper
2944
      if not new_helper:
2945
        new_helper = None
2946
      if new_helper != self.cfg.GetDRBDHelper():
2947
        self.cfg.SetDRBDHelper(new_helper)
2948
      else:
2949
        feedback_fn("Cluster DRBD helper already in desired state,"
2950
                    " not changing")
2951
    if self.op.hvparams:
2952
      self.cluster.hvparams = self.new_hvparams
2953
    if self.op.os_hvp:
2954
      self.cluster.os_hvp = self.new_os_hvp
2955
    if self.op.enabled_hypervisors is not None:
2956
      self.cluster.hvparams = self.new_hvparams
2957
      self.cluster.enabled_hypervisors = self.op.enabled_hypervisors
2958
    if self.op.beparams:
2959
      self.cluster.beparams[constants.PP_DEFAULT] = self.new_beparams
2960
    if self.op.nicparams:
2961
      self.cluster.nicparams[constants.PP_DEFAULT] = self.new_nicparams
2962
    if self.op.osparams:
2963
      self.cluster.osparams = self.new_osp
2964
    if self.op.ndparams:
2965
      self.cluster.ndparams = self.new_ndparams
2966

    
2967
    if self.op.candidate_pool_size is not None:
2968
      self.cluster.candidate_pool_size = self.op.candidate_pool_size
2969
      # we need to update the pool size here, otherwise the save will fail
2970
      _AdjustCandidatePool(self, [])
2971

    
2972
    if self.op.maintain_node_health is not None:
2973
      self.cluster.maintain_node_health = self.op.maintain_node_health
2974

    
2975
    if self.op.prealloc_wipe_disks is not None:
2976
      self.cluster.prealloc_wipe_disks = self.op.prealloc_wipe_disks
2977

    
2978
    if self.op.add_uids is not None:
2979
      uidpool.AddToUidPool(self.cluster.uid_pool, self.op.add_uids)
2980

    
2981
    if self.op.remove_uids is not None:
2982
      uidpool.RemoveFromUidPool(self.cluster.uid_pool, self.op.remove_uids)
2983

    
2984
    if self.op.uid_pool is not None:
2985
      self.cluster.uid_pool = self.op.uid_pool
2986

    
2987
    if self.op.default_iallocator is not None:
2988
      self.cluster.default_iallocator = self.op.default_iallocator
2989

    
2990
    if self.op.reserved_lvs is not None:
2991
      self.cluster.reserved_lvs = self.op.reserved_lvs
2992

    
2993
    def helper_os(aname, mods, desc):
2994
      desc += " OS list"
2995
      lst = getattr(self.cluster, aname)
2996
      for key, val in mods:
2997
        if key == constants.DDM_ADD:
2998
          if val in lst:
2999
            feedback_fn("OS %s already in %s, ignoring" % (val, desc))
3000
          else:
3001
            lst.append(val)
3002
        elif key == constants.DDM_REMOVE:
3003
          if val in lst:
3004
            lst.remove(val)
3005
          else:
3006
            feedback_fn("OS %s not found in %s, ignoring" % (val, desc))
3007
        else:
3008
          raise errors.ProgrammerError("Invalid modification '%s'" % key)
3009

    
3010
    if self.op.hidden_os:
3011
      helper_os("hidden_os", self.op.hidden_os, "hidden")
3012

    
3013
    if self.op.blacklisted_os:
3014
      helper_os("blacklisted_os", self.op.blacklisted_os, "blacklisted")
3015

    
3016
    if self.op.master_netdev:
3017
      master = self.cfg.GetMasterNode()
3018
      feedback_fn("Shutting down master ip on the current netdev (%s)" %
3019
                  self.cluster.master_netdev)
3020
      result = self.rpc.call_node_stop_master(master, False)
3021
      result.Raise("Could not disable the master ip")
3022
      feedback_fn("Changing master_netdev from %s to %s" %
3023
                  (self.cluster.master_netdev, self.op.master_netdev))
3024
      self.cluster.master_netdev = self.op.master_netdev
3025

    
3026
    self.cfg.Update(self.cluster, feedback_fn)
3027

    
3028
    if self.op.master_netdev:
3029
      feedback_fn("Starting the master ip on the new master netdev (%s)" %
3030
                  self.op.master_netdev)
3031
      result = self.rpc.call_node_start_master(master, False, False)
3032
      if result.fail_msg:
3033
        self.LogWarning("Could not re-enable the master ip on"
3034
                        " the master, please restart manually: %s",
3035
                        result.fail_msg)
3036

    
3037

    
3038
def _UploadHelper(lu, nodes, fname):
3039
  """Helper for uploading a file and showing warnings.
3040

3041
  """
3042
  if os.path.exists(fname):
3043
    result = lu.rpc.call_upload_file(nodes, fname)
3044
    for to_node, to_result in result.items():
3045
      msg = to_result.fail_msg
3046
      if msg:
3047
        msg = ("Copy of file %s to node %s failed: %s" %
3048
               (fname, to_node, msg))
3049
        lu.proc.LogWarning(msg)
3050

    
3051

    
3052
def _RedistributeAncillaryFiles(lu, additional_nodes=None, additional_vm=True):
3053
  """Distribute additional files which are part of the cluster configuration.
3054

3055
  ConfigWriter takes care of distributing the config and ssconf files, but
3056
  there are more files which should be distributed to all nodes. This function
3057
  makes sure those are copied.
3058

3059
  @param lu: calling logical unit
3060
  @param additional_nodes: list of nodes not in the config to distribute to
3061
  @type additional_vm: boolean
3062
  @param additional_vm: whether the additional nodes are vm-capable or not
3063

3064
  """
3065
  # 1. Gather target nodes
3066
  myself = lu.cfg.GetNodeInfo(lu.cfg.GetMasterNode())
3067
  dist_nodes = lu.cfg.GetOnlineNodeList()
3068
  nvm_nodes = lu.cfg.GetNonVmCapableNodeList()
3069
  vm_nodes = [name for name in dist_nodes if name not in nvm_nodes]
3070
  if additional_nodes is not None:
3071
    dist_nodes.extend(additional_nodes)
3072
    if additional_vm:
3073
      vm_nodes.extend(additional_nodes)
3074
  if myself.name in dist_nodes:
3075
    dist_nodes.remove(myself.name)
3076
  if myself.name in vm_nodes:
3077
    vm_nodes.remove(myself.name)
3078

    
3079
  # 2. Gather files to distribute
3080
  dist_files = set([constants.ETC_HOSTS,
3081
                    constants.SSH_KNOWN_HOSTS_FILE,
3082
                    constants.RAPI_CERT_FILE,
3083
                    constants.RAPI_USERS_FILE,
3084
                    constants.CONFD_HMAC_KEY,
3085
                    constants.CLUSTER_DOMAIN_SECRET_FILE,
3086
                   ])
3087

    
3088
  vm_files = set()
3089
  enabled_hypervisors = lu.cfg.GetClusterInfo().enabled_hypervisors
3090
  for hv_name in enabled_hypervisors:
3091
    hv_class = hypervisor.GetHypervisor(hv_name)
3092
    vm_files.update(hv_class.GetAncillaryFiles())
3093

    
3094
  # 3. Perform the files upload
3095
  for fname in dist_files:
3096
    _UploadHelper(lu, dist_nodes, fname)
3097
  for fname in vm_files:
3098
    _UploadHelper(lu, vm_nodes, fname)
3099

    
3100

    
3101
class LUClusterRedistConf(NoHooksLU):
3102
  """Force the redistribution of cluster configuration.
3103

3104
  This is a very simple LU.
3105

3106
  """
3107
  REQ_BGL = False
3108

    
3109
  def ExpandNames(self):
3110
    self.needed_locks = {
3111
      locking.LEVEL_NODE: locking.ALL_SET,
3112
    }
3113
    self.share_locks[locking.LEVEL_NODE] = 1
3114

    
3115
  def Exec(self, feedback_fn):
3116
    """Redistribute the configuration.
3117

3118
    """
3119
    self.cfg.Update(self.cfg.GetClusterInfo(), feedback_fn)
3120
    _RedistributeAncillaryFiles(self)
3121

    
3122

    
3123
def _WaitForSync(lu, instance, disks=None, oneshot=False):
3124
  """Sleep and poll for an instance's disk to sync.
3125

3126
  """
3127
  if not instance.disks or disks is not None and not disks:
3128
    return True
3129

    
3130
  disks = _ExpandCheckDisks(instance, disks)
3131

    
3132
  if not oneshot:
3133
    lu.proc.LogInfo("Waiting for instance %s to sync disks." % instance.name)
3134

    
3135
  node = instance.primary_node
3136

    
3137
  for dev in disks:
3138
    lu.cfg.SetDiskID(dev, node)
3139

    
3140
  # TODO: Convert to utils.Retry
3141

    
3142
  retries = 0
3143
  degr_retries = 10 # in seconds, as we sleep 1 second each time
3144
  while True:
3145
    max_time = 0
3146
    done = True
3147
    cumul_degraded = False
3148
    rstats = lu.rpc.call_blockdev_getmirrorstatus(node, disks)
3149
    msg = rstats.fail_msg
3150
    if msg:
3151
      lu.LogWarning("Can't get any data from node %s: %s", node, msg)
3152
      retries += 1
3153
      if retries >= 10:
3154
        raise errors.RemoteError("Can't contact node %s for mirror data,"
3155
                                 " aborting." % node)
3156
      time.sleep(6)
3157
      continue
3158
    rstats = rstats.payload
3159
    retries = 0
3160
    for i, mstat in enumerate(rstats):
3161
      if mstat is None:
3162
        lu.LogWarning("Can't compute data for node %s/%s",
3163
                           node, disks[i].iv_name)
3164
        continue
3165

    
3166
      cumul_degraded = (cumul_degraded or
3167
                        (mstat.is_degraded and mstat.sync_percent is None))
3168
      if mstat.sync_percent is not None:
3169
        done = False
3170
        if mstat.estimated_time is not None:
3171
          rem_time = ("%s remaining (estimated)" %
3172
                      utils.FormatSeconds(mstat.estimated_time))
3173
          max_time = mstat.estimated_time
3174
        else:
3175
          rem_time = "no time estimate"
3176
        lu.proc.LogInfo("- device %s: %5.2f%% done, %s" %
3177
                        (disks[i].iv_name, mstat.sync_percent, rem_time))
3178

    
3179
    # if we're done but degraded, let's do a few small retries, to
3180
    # make sure we see a stable and not transient situation; therefore
3181
    # we force restart of the loop
3182
    if (done or oneshot) and cumul_degraded and degr_retries > 0:
3183
      logging.info("Degraded disks found, %d retries left", degr_retries)
3184
      degr_retries -= 1
3185
      time.sleep(1)
3186
      continue
3187

    
3188
    if done or oneshot:
3189
      break
3190

    
3191
    time.sleep(min(60, max_time))
3192

    
3193
  if done:
3194
    lu.proc.LogInfo("Instance %s's disks are in sync." % instance.name)
3195
  return not cumul_degraded
3196

    
3197

    
3198
def _CheckDiskConsistency(lu, dev, node, on_primary, ldisk=False):
3199
  """Check that mirrors are not degraded.
3200

3201
  The ldisk parameter, if True, will change the test from the
3202
  is_degraded attribute (which represents overall non-ok status for
3203
  the device(s)) to the ldisk (representing the local storage status).
3204

3205
  """
3206
  lu.cfg.SetDiskID(dev, node)
3207

    
3208
  result = True
3209

    
3210
  if on_primary or dev.AssembleOnSecondary():
3211
    rstats = lu.rpc.call_blockdev_find(node, dev)
3212
    msg = rstats.fail_msg
3213
    if msg:
3214
      lu.LogWarning("Can't find disk on node %s: %s", node, msg)
3215
      result = False
3216
    elif not rstats.payload:
3217
      lu.LogWarning("Can't find disk on node %s", node)
3218
      result = False
3219
    else:
3220
      if ldisk:
3221
        result = result and rstats.payload.ldisk_status == constants.LDS_OKAY
3222
      else:
3223
        result = result and not rstats.payload.is_degraded
3224

    
3225
  if dev.children:
3226
    for child in dev.children:
3227
      result = result and _CheckDiskConsistency(lu, child, node, on_primary)
3228

    
3229
  return result
3230

    
3231

    
3232
class LUOobCommand(NoHooksLU):
3233
  """Logical unit for OOB handling.
3234

3235
  """
3236
  REG_BGL = False
3237
  _SKIP_MASTER = (constants.OOB_POWER_OFF, constants.OOB_POWER_CYCLE)
3238

    
3239
  def CheckPrereq(self):
3240
    """Check prerequisites.
3241

3242
    This checks:
3243
     - the node exists in the configuration
3244
     - OOB is supported
3245

3246
    Any errors are signaled by raising errors.OpPrereqError.
3247

3248
    """
3249
    self.nodes = []
3250
    self.master_node = self.cfg.GetMasterNode()
3251

    
3252
    if self.op.node_names:
3253
      if self.op.command in self._SKIP_MASTER:
3254
        if self.master_node in self.op.node_names:
3255
          master_node_obj = self.cfg.GetNodeInfo(self.master_node)
3256
          master_oob_handler = _SupportsOob(self.cfg, master_node_obj)
3257

    
3258
          if master_oob_handler:
3259
            additional_text = ("Run '%s %s %s' if you want to operate on the"
3260
                               " master regardless") % (master_oob_handler,
3261
                                                        self.op.command,
3262
                                                        self.master_node)
3263
          else:
3264
            additional_text = "The master node does not support out-of-band"
3265

    
3266
          raise errors.OpPrereqError(("Operating on the master node %s is not"
3267
                                      " allowed for %s\n%s") %
3268
                                     (self.master_node, self.op.command,
3269
                                      additional_text), errors.ECODE_INVAL)
3270
    else:
3271
      self.op.node_names = self.cfg.GetNodeList()
3272
      if self.op.command in self._SKIP_MASTER:
3273
        self.op.node_names.remove(self.master_node)
3274

    
3275
    if self.op.command in self._SKIP_MASTER:
3276
      assert self.master_node not in self.op.node_names
3277

    
3278
    for node_name in self.op.node_names:
3279
      node = self.cfg.GetNodeInfo(node_name)
3280

    
3281
      if node is None:
3282
        raise errors.OpPrereqError("Node %s not found" % node_name,
3283
                                   errors.ECODE_NOENT)
3284
      else:
3285
        self.nodes.append(node)
3286

    
3287
      if (not self.op.ignore_status and
3288
          (self.op.command == constants.OOB_POWER_OFF and not node.offline)):
3289
        raise errors.OpPrereqError(("Cannot power off node %s because it is"
3290
                                    " not marked offline") % node_name,
3291
                                   errors.ECODE_STATE)
3292

    
3293
  def ExpandNames(self):
3294
    """Gather locks we need.
3295

3296
    """
3297
    if self.op.node_names:
3298
      self.op.node_names = [_ExpandNodeName(self.cfg, name)
3299
                            for name in self.op.node_names]
3300
      lock_names = self.op.node_names
3301
    else:
3302
      lock_names = locking.ALL_SET
3303

    
3304
    self.needed_locks = {
3305
      locking.LEVEL_NODE: lock_names,
3306
      }
3307

    
3308
  def Exec(self, feedback_fn):
3309
    """Execute OOB and return result if we expect any.
3310

3311
    """
3312
    master_node = self.master_node
3313
    ret = []
3314

    
3315
    for node in self.nodes:
3316
      node_entry = [(constants.RS_NORMAL, node.name)]
3317
      ret.append(node_entry)
3318

    
3319
      oob_program = _SupportsOob(self.cfg, node)
3320

    
3321
      if not oob_program:
3322
        node_entry.append((constants.RS_UNAVAIL, None))
3323
        continue
3324

    
3325
      logging.info("Executing out-of-band command '%s' using '%s' on %s",
3326
                   self.op.command, oob_program, node.name)
3327
      result = self.rpc.call_run_oob(master_node, oob_program,
3328
                                     self.op.command, node.name,
3329
                                     self.op.timeout)
3330

    
3331
      if result.fail_msg:
3332
        self.LogWarning("On node '%s' out-of-band RPC failed with: %s",
3333
                        node.name, result.fail_msg)
3334
        node_entry.append((constants.RS_NODATA, None))
3335
      else:
3336
        try:
3337
          self._CheckPayload(result)
3338
        except errors.OpExecError, err:
3339
          self.LogWarning("The payload returned by '%s' is not valid: %s",
3340
                          node.name, err)
3341
          node_entry.append((constants.RS_NODATA, None))
3342
        else:
3343
          if self.op.command == constants.OOB_HEALTH:
3344
            # For health we should log important events
3345
            for item, status in result.payload:
3346
              if status in [constants.OOB_STATUS_WARNING,
3347
                            constants.OOB_STATUS_CRITICAL]:
3348
                self.LogWarning("On node '%s' item '%s' has status '%s'",
3349
                                node.name, item, status)
3350

    
3351
          if self.op.command == constants.OOB_POWER_ON:
3352
            node.powered = True
3353
          elif self.op.command == constants.OOB_POWER_OFF:
3354
            node.powered = False
3355
          elif self.op.command == constants.OOB_POWER_STATUS:
3356
            powered = result.payload[constants.OOB_POWER_STATUS_POWERED]
3357
            if powered != node.powered:
3358
              logging.warning(("Recorded power state (%s) of node '%s' does not"
3359
                               " match actual power state (%s)"), node.powered,
3360
                              node.name, powered)
3361

    
3362
          # For configuration changing commands we should update the node
3363
          if self.op.command in (constants.OOB_POWER_ON,
3364
                                 constants.OOB_POWER_OFF):
3365
            self.cfg.Update(node, feedback_fn)
3366

    
3367
          node_entry.append((constants.RS_NORMAL, result.payload))
3368

    
3369
    return ret
3370

    
3371
  def _CheckPayload(self, result):
3372
    """Checks if the payload is valid.
3373

3374
    @param result: RPC result
3375
    @raises errors.OpExecError: If payload is not valid
3376

3377
    """
3378
    errs = []
3379
    if self.op.command == constants.OOB_HEALTH:
3380
      if not isinstance(result.payload, list):
3381
        errs.append("command 'health' is expected to return a list but got %s" %
3382
                    type(result.payload))
3383
      else:
3384
        for item, status in result.payload:
3385
          if status not in constants.OOB_STATUSES:
3386
            errs.append("health item '%s' has invalid status '%s'" %
3387
                        (item, status))
3388

    
3389
    if self.op.command == constants.OOB_POWER_STATUS:
3390
      if not isinstance(result.payload, dict):
3391
        errs.append("power-status is expected to return a dict but got %s" %
3392
                    type(result.payload))
3393

    
3394
    if self.op.command in [
3395
        constants.OOB_POWER_ON,
3396
        constants.OOB_POWER_OFF,
3397
        constants.OOB_POWER_CYCLE,
3398
        ]:
3399
      if result.payload is not None:
3400
        errs.append("%s is expected to not return payload but got '%s'" %
3401
                    (self.op.command, result.payload))
3402

    
3403
    if errs:
3404
      raise errors.OpExecError("Check of out-of-band payload failed due to %s" %
3405
                               utils.CommaJoin(errs))
3406

    
3407

    
3408

    
3409
class LUOsDiagnose(NoHooksLU):
3410
  """Logical unit for OS diagnose/query.
3411

3412
  """
3413
  REQ_BGL = False
3414
  _HID = "hidden"
3415
  _BLK = "blacklisted"
3416
  _VLD = "valid"
3417
  _FIELDS_STATIC = utils.FieldSet()
3418
  _FIELDS_DYNAMIC = utils.FieldSet("name", _VLD, "node_status", "variants",
3419
                                   "parameters", "api_versions", _HID, _BLK)
3420

    
3421
  def CheckArguments(self):
3422
    if self.op.names:
3423
      raise errors.OpPrereqError("Selective OS query not supported",
3424
                                 errors.ECODE_INVAL)
3425

    
3426
    _CheckOutputFields(static=self._FIELDS_STATIC,
3427
                       dynamic=self._FIELDS_DYNAMIC,
3428
                       selected=self.op.output_fields)
3429

    
3430
  def ExpandNames(self):
3431
    # Lock all nodes, in shared mode
3432
    # Temporary removal of locks, should be reverted later
3433
    # TODO: reintroduce locks when they are lighter-weight
3434
    self.needed_locks = {}
3435
    #self.share_locks[locking.LEVEL_NODE] = 1
3436
    #self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
3437

    
3438
  @staticmethod
3439
  def _DiagnoseByOS(rlist):
3440
    """Remaps a per-node return list into an a per-os per-node dictionary
3441

3442
    @param rlist: a map with node names as keys and OS objects as values
3443

3444
    @rtype: dict
3445
    @return: a dictionary with osnames as keys and as value another
3446
        map, with nodes as keys and tuples of (path, status, diagnose,
3447
        variants, parameters, api_versions) as values, eg::
3448

3449
          {"debian-etch": {"node1": [(/usr/lib/..., True, "", [], []),
3450
                                     (/srv/..., False, "invalid api")],
3451
                           "node2": [(/srv/..., True, "", [], [])]}
3452
          }
3453

3454
    """
3455
    all_os = {}
3456
    # we build here the list of nodes that didn't fail the RPC (at RPC
3457
    # level), so that nodes with a non-responding node daemon don't
3458
    # make all OSes invalid
3459
    good_nodes = [node_name for node_name in rlist
3460
                  if not rlist[node_name].fail_msg]
3461
    for node_name, nr in rlist.items():
3462
      if nr.fail_msg or not nr.payload:
3463
        continue
3464
      for (name, path, status, diagnose, variants,
3465
           params, api_versions) in nr.payload:
3466
        if name not in all_os:
3467
          # build a list of nodes for this os containing empty lists
3468
          # for each node in node_list
3469
          all_os[name] = {}
3470
          for nname in good_nodes:
3471
            all_os[name][nname] = []
3472
        # convert params from [name, help] to (name, help)
3473
        params = [tuple(v) for v in params]
3474
        all_os[name][node_name].append((path, status, diagnose,
3475
                                        variants, params, api_versions))
3476
    return all_os
3477

    
3478
  def Exec(self, feedback_fn):
3479
    """Compute the list of OSes.
3480

3481
    """
3482
    valid_nodes = [node.name
3483
                   for node in self.cfg.GetAllNodesInfo().values()
3484
                   if not node.offline and node.vm_capable]
3485
    node_data = self.rpc.call_os_diagnose(valid_nodes)
3486
    pol = self._DiagnoseByOS(node_data)
3487
    output = []
3488
    cluster = self.cfg.GetClusterInfo()
3489

    
3490
    for os_name in utils.NiceSort(pol.keys()):
3491
      os_data = pol[os_name]
3492
      row = []
3493
      valid = True
3494
      (variants, params, api_versions) = null_state = (set(), set(), set())
3495
      for idx, osl in enumerate(os_data.values()):
3496
        valid = bool(valid and osl and osl[0][1])
3497
        if not valid:
3498
          (variants, params, api_versions) = null_state
3499
          break
3500
        node_variants, node_params, node_api = osl[0][3:6]
3501
        if idx == 0: # first entry
3502
          variants = set(node_variants)
3503
          params = set(node_params)
3504
          api_versions = set(node_api)
3505
        else: # keep consistency
3506
          variants.intersection_update(node_variants)
3507
          params.intersection_update(node_params)
3508
          api_versions.intersection_update(node_api)
3509

    
3510
      is_hid = os_name in cluster.hidden_os
3511
      is_blk = os_name in cluster.blacklisted_os
3512
      if ((self._HID not in self.op.output_fields and is_hid) or
3513
          (self._BLK not in self.op.output_fields and is_blk) or
3514
          (self._VLD not in self.op.output_fields and not valid)):
3515
        continue
3516

    
3517
      for field in self.op.output_fields:
3518
        if field == "name":
3519
          val = os_name
3520
        elif field == self._VLD:
3521
          val = valid
3522
        elif field == "node_status":
3523
          # this is just a copy of the dict
3524
          val = {}
3525
          for node_name, nos_list in os_data.items():
3526
            val[node_name] = nos_list
3527
        elif field == "variants":
3528
          val = utils.NiceSort(list(variants))
3529
        elif field == "parameters":
3530
          val = list(params)
3531
        elif field == "api_versions":
3532
          val = list(api_versions)
3533
        elif field == self._HID:
3534
          val = is_hid
3535
        elif field == self._BLK:
3536
          val = is_blk
3537
        else:
3538
          raise errors.ParameterError(field)
3539
        row.append(val)
3540
      output.append(row)
3541

    
3542
    return output
3543

    
3544

    
3545
class LUNodeRemove(LogicalUnit):
3546
  """Logical unit for removing a node.
3547

3548
  """
3549
  HPATH = "node-remove"
3550
  HTYPE = constants.HTYPE_NODE
3551

    
3552
  def BuildHooksEnv(self):
3553
    """Build hooks env.
3554

3555
    This doesn't run on the target node in the pre phase as a failed
3556
    node would then be impossible to remove.
3557

3558
    """
3559
    env = {
3560
      "OP_TARGET": self.op.node_name,
3561
      "NODE_NAME": self.op.node_name,
3562
      }
3563
    all_nodes = self.cfg.GetNodeList()
3564
    try:
3565
      all_nodes.remove(self.op.node_name)
3566
    except ValueError:
3567
      logging.warning("Node %s which is about to be removed not found"
3568
                      " in the all nodes list", self.op.node_name)
3569
    return env, all_nodes, all_nodes
3570

    
3571
  def CheckPrereq(self):
3572
    """Check prerequisites.
3573

3574
    This checks:
3575
     - the node exists in the configuration
3576
     - it does not have primary or secondary instances
3577
     - it's not the master
3578

3579
    Any errors are signaled by raising errors.OpPrereqError.
3580

3581
    """
3582
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
3583
    node = self.cfg.GetNodeInfo(self.op.node_name)
3584
    assert node is not None
3585

    
3586
    instance_list = self.cfg.GetInstanceList()
3587

    
3588
    masternode = self.cfg.GetMasterNode()
3589
    if node.name == masternode:
3590
      raise errors.OpPrereqError("Node is the master node,"
3591
                                 " you need to failover first.",
3592
                                 errors.ECODE_INVAL)
3593

    
3594
    for instance_name in instance_list:
3595
      instance = self.cfg.GetInstanceInfo(instance_name)
3596
      if node.name in instance.all_nodes:
3597
        raise errors.OpPrereqError("Instance %s is still running on the node,"
3598
                                   " please remove first." % instance_name,
3599
                                   errors.ECODE_INVAL)
3600
    self.op.node_name = node.name
3601
    self.node = node
3602

    
3603
  def Exec(self, feedback_fn):
3604
    """Removes the node from the cluster.
3605

3606
    """
3607
    node = self.node
3608
    logging.info("Stopping the node daemon and removing configs from node %s",
3609
                 node.name)
3610

    
3611
    modify_ssh_setup = self.cfg.GetClusterInfo().modify_ssh_setup
3612

    
3613
    # Promote nodes to master candidate as needed
3614
    _AdjustCandidatePool(self, exceptions=[node.name])
3615
    self.context.RemoveNode(node.name)
3616

    
3617
    # Run post hooks on the node before it's removed
3618
    hm = self.proc.hmclass(self.rpc.call_hooks_runner, self)
3619
    try:
3620
      hm.RunPhase(constants.HOOKS_PHASE_POST, [node.name])
3621
    except:
3622
      # pylint: disable-msg=W0702
3623
      self.LogWarning("Errors occurred running hooks on %s" % node.name)
3624

    
3625
    result = self.rpc.call_node_leave_cluster(node.name, modify_ssh_setup)
3626
    msg = result.fail_msg
3627
    if msg:
3628
      self.LogWarning("Errors encountered on the remote node while leaving"
3629
                      " the cluster: %s", msg)
3630

    
3631
    # Remove node from our /etc/hosts
3632
    if self.cfg.GetClusterInfo().modify_etc_hosts:
3633
      master_node = self.cfg.GetMasterNode()
3634
      result = self.rpc.call_etc_hosts_modify(master_node,
3635
                                              constants.ETC_HOSTS_REMOVE,
3636
                                              node.name, None)
3637
      result.Raise("Can't update hosts file with new host data")
3638
      _RedistributeAncillaryFiles(self)
3639

    
3640

    
3641
class _NodeQuery(_QueryBase):
3642
  FIELDS = query.NODE_FIELDS
3643

    
3644
  def ExpandNames(self, lu):
3645
    lu.needed_locks = {}
3646
    lu.share_locks[locking.LEVEL_NODE] = 1
3647

    
3648
    if self.names:
3649
      self.wanted = _GetWantedNodes(lu, self.names)
3650
    else:
3651
      self.wanted = locking.ALL_SET
3652

    
3653
    self.do_locking = (self.use_locking and
3654
                       query.NQ_LIVE in self.requested_data)
3655

    
3656
    if self.do_locking:
3657
      # if we don't request only static fields, we need to lock the nodes
3658
      lu.needed_locks[locking.LEVEL_NODE] = self.wanted
3659

    
3660
  def DeclareLocks(self, lu, level):
3661
    pass
3662

    
3663
  def _GetQueryData(self, lu):
3664
    """Computes the list of nodes and their attributes.
3665

3666
    """
3667
    all_info = lu.cfg.GetAllNodesInfo()
3668

    
3669
    nodenames = self._GetNames(lu, all_info.keys(), locking.LEVEL_NODE)
3670

    
3671
    # Gather data as requested
3672
    if query.NQ_LIVE in self.requested_data:
3673
      # filter out non-vm_capable nodes
3674
      toquery_nodes = [name for name in nodenames if all_info[name].vm_capable]
3675

    
3676
      node_data = lu.rpc.call_node_info(toquery_nodes, lu.cfg.GetVGName(),
3677
                                        lu.cfg.GetHypervisorType())
3678
      live_data = dict((name, nresult.payload)
3679
                       for (name, nresult) in node_data.items()
3680
                       if not nresult.fail_msg and nresult.payload)
3681
    else:
3682
      live_data = None
3683

    
3684
    if query.NQ_INST in self.requested_data:
3685
      node_to_primary = dict([(name, set()) for name in nodenames])
3686
      node_to_secondary = dict([(name, set()) for name in nodenames])
3687

    
3688
      inst_data = lu.cfg.GetAllInstancesInfo()
3689

    
3690
      for inst in inst_data.values():
3691
        if inst.primary_node in node_to_primary:
3692
          node_to_primary[inst.primary_node].add(inst.name)
3693
        for secnode in inst.secondary_nodes:
3694
          if secnode in node_to_secondary:
3695
            node_to_secondary[secnode].add(inst.name)
3696
    else:
3697
      node_to_primary = None
3698
      node_to_secondary = None
3699

    
3700
    if query.NQ_OOB in self.requested_data:
3701
      oob_support = dict((name, bool(_SupportsOob(lu.cfg, node)))
3702
                         for name, node in all_info.iteritems())
3703
    else:
3704
      oob_support = None
3705

    
3706
    if query.NQ_GROUP in self.requested_data:
3707
      groups = lu.cfg.GetAllNodeGroupsInfo()
3708
    else:
3709
      groups = {}
3710

    
3711
    return query.NodeQueryData([all_info[name] for name in nodenames],
3712
                               live_data, lu.cfg.GetMasterNode(),
3713
                               node_to_primary, node_to_secondary, groups,
3714
                               oob_support, lu.cfg.GetClusterInfo())
3715

    
3716

    
3717
class LUNodeQuery(NoHooksLU):
3718
  """Logical unit for querying nodes.
3719

3720
  """
3721
  # pylint: disable-msg=W0142
3722
  REQ_BGL = False
3723

    
3724
  def CheckArguments(self):
3725
    self.nq = _NodeQuery(qlang.MakeSimpleFilter("name", self.op.names),
3726
                         self.op.output_fields, self.op.use_locking)
3727

    
3728
  def ExpandNames(self):
3729
    self.nq.ExpandNames(self)
3730

    
3731
  def Exec(self, feedback_fn):
3732
    return self.nq.OldStyleQuery(self)
3733

    
3734

    
3735
class LUNodeQueryvols(NoHooksLU):
3736
  """Logical unit for getting volumes on node(s).
3737

3738
  """
3739
  REQ_BGL = False
3740
  _FIELDS_DYNAMIC = utils.FieldSet("phys", "vg", "name", "size", "instance")
3741
  _FIELDS_STATIC = utils.FieldSet("node")
3742

    
3743
  def CheckArguments(self):
3744
    _CheckOutputFields(static=self._FIELDS_STATIC,
3745
                       dynamic=self._FIELDS_DYNAMIC,
3746
                       selected=self.op.output_fields)
3747

    
3748
  def ExpandNames(self):
3749
    self.needed_locks = {}
3750
    self.share_locks[locking.LEVEL_NODE] = 1
3751
    if not self.op.nodes:
3752
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
3753
    else:
3754
      self.needed_locks[locking.LEVEL_NODE] = \
3755
        _GetWantedNodes(self, self.op.nodes)
3756

    
3757
  def Exec(self, feedback_fn):
3758
    """Computes the list of nodes and their attributes.
3759

3760
    """
3761
    nodenames = self.acquired_locks[locking.LEVEL_NODE]
3762
    volumes = self.rpc.call_node_volumes(nodenames)
3763

    
3764
    ilist = [self.cfg.GetInstanceInfo(iname) for iname
3765
             in self.cfg.GetInstanceList()]
3766

    
3767
    lv_by_node = dict([(inst, inst.MapLVsByNode()) for inst in ilist])
3768

    
3769
    output = []
3770
    for node in nodenames:
3771
      nresult = volumes[node]
3772
      if nresult.offline:
3773
        continue
3774
      msg = nresult.fail_msg
3775
      if msg:
3776
        self.LogWarning("Can't compute volume data on node %s: %s", node, msg)
3777
        continue
3778

    
3779
      node_vols = nresult.payload[:]
3780
      node_vols.sort(key=lambda vol: vol['dev'])
3781

    
3782
      for vol in node_vols:
3783
        node_output = []
3784
        for field in self.op.output_fields:
3785
          if field == "node":
3786
            val = node
3787
          elif field == "phys":
3788
            val = vol['dev']
3789
          elif field == "vg":
3790
            val = vol['vg']
3791
          elif field == "name":
3792
            val = vol['name']
3793
          elif field == "size":
3794
            val = int(float(vol['size']))
3795
          elif field == "instance":
3796
            for inst in ilist:
3797
              if node not in lv_by_node[inst]:
3798
                continue
3799
              if vol['name'] in lv_by_node[inst][node]:
3800
                val = inst.name
3801
                break
3802
            else:
3803
              val = '-'
3804
          else:
3805
            raise errors.ParameterError(field)
3806
          node_output.append(str(val))
3807

    
3808
        output.append(node_output)
3809

    
3810
    return output
3811

    
3812

    
3813
class LUNodeQueryStorage(NoHooksLU):
3814
  """Logical unit for getting information on storage units on node(s).
3815

3816
  """
3817
  _FIELDS_STATIC = utils.FieldSet(constants.SF_NODE)
3818
  REQ_BGL = False
3819

    
3820
  def CheckArguments(self):
3821
    _CheckOutputFields(static=self._FIELDS_STATIC,
3822
                       dynamic=utils.FieldSet(*constants.VALID_STORAGE_FIELDS),
3823
                       selected=self.op.output_fields)
3824

    
3825
  def ExpandNames(self):
3826
    self.needed_locks = {}
3827
    self.share_locks[locking.LEVEL_NODE] = 1
3828

    
3829
    if self.op.nodes:
3830
      self.needed_locks[locking.LEVEL_NODE] = \
3831
        _GetWantedNodes(self, self.op.nodes)
3832
    else:
3833
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
3834

    
3835
  def Exec(self, feedback_fn):
3836
    """Computes the list of nodes and their attributes.
3837

3838
    """
3839
    self.nodes = self.acquired_locks[locking.LEVEL_NODE]
3840

    
3841
    # Always get name to sort by
3842
    if constants.SF_NAME in self.op.output_fields:
3843
      fields = self.op.output_fields[:]
3844
    else:
3845
      fields = [constants.SF_NAME] + self.op.output_fields
3846

    
3847
    # Never ask for node or type as it's only known to the LU
3848
    for extra in [constants.SF_NODE, constants.SF_TYPE]:
3849
      while extra in fields:
3850
        fields.remove(extra)
3851

    
3852
    field_idx = dict([(name, idx) for (idx, name) in enumerate(fields)])
3853
    name_idx = field_idx[constants.SF_NAME]
3854

    
3855
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
3856
    data = self.rpc.call_storage_list(self.nodes,
3857
                                      self.op.storage_type, st_args,
3858
                                      self.op.name, fields)
3859

    
3860
    result = []
3861

    
3862
    for node in utils.NiceSort(self.nodes):
3863
      nresult = data[node]
3864
      if nresult.offline:
3865
        continue
3866

    
3867
      msg = nresult.fail_msg
3868
      if msg:
3869
        self.LogWarning("Can't get storage data from node %s: %s", node, msg)
3870
        continue
3871

    
3872
      rows = dict([(row[name_idx], row) for row in nresult.payload])
3873

    
3874
      for name in utils.NiceSort(rows.keys()):
3875
        row = rows[name]
3876

    
3877
        out = []
3878

    
3879
        for field in self.op.output_fields:
3880
          if field == constants.SF_NODE:
3881
            val = node
3882
          elif field == constants.SF_TYPE:
3883
            val = self.op.storage_type
3884
          elif field in field_idx:
3885
            val = row[field_idx[field]]
3886
          else:
3887
            raise errors.ParameterError(field)
3888

    
3889
          out.append(val)
3890

    
3891
        result.append(out)
3892

    
3893
    return result
3894

    
3895

    
3896
class _InstanceQuery(_QueryBase):
3897
  FIELDS = query.INSTANCE_FIELDS
3898

    
3899
  def ExpandNames(self, lu):
3900
    lu.needed_locks = {}
3901
    lu.share_locks[locking.LEVEL_INSTANCE] = 1
3902
    lu.share_locks[locking.LEVEL_NODE] = 1
3903

    
3904
    if self.names:
3905
      self.wanted = _GetWantedInstances(lu, self.names)
3906
    else:
3907
      self.wanted = locking.ALL_SET
3908

    
3909
    self.do_locking = (self.use_locking and
3910
                       query.IQ_LIVE in self.requested_data)
3911
    if self.do_locking:
3912
      lu.needed_locks[locking.LEVEL_INSTANCE] = self.wanted
3913
      lu.needed_locks[locking.LEVEL_NODE] = []
3914
      lu.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
3915

    
3916
  def DeclareLocks(self, lu, level):
3917
    if level == locking.LEVEL_NODE and self.do_locking:
3918
      lu._LockInstancesNodes() # pylint: disable-msg=W0212
3919

    
3920
  def _GetQueryData(self, lu):
3921
    """Computes the list of instances and their attributes.
3922

3923
    """
3924
    cluster = lu.cfg.GetClusterInfo()
3925
    all_info = lu.cfg.GetAllInstancesInfo()
3926

    
3927
    instance_names = self._GetNames(lu, all_info.keys(), locking.LEVEL_INSTANCE)
3928

    
3929
    instance_list = [all_info[name] for name in instance_names]
3930
    nodes = frozenset(itertools.chain(*(inst.all_nodes
3931
                                        for inst in instance_list)))
3932
    hv_list = list(set([inst.hypervisor for inst in instance_list]))
3933
    bad_nodes = []
3934
    offline_nodes = []
3935
    wrongnode_inst = set()
3936

    
3937
    # Gather data as requested
3938
    if self.requested_data & set([query.IQ_LIVE, query.IQ_CONSOLE]):
3939
      live_data = {}
3940
      node_data = lu.rpc.call_all_instances_info(nodes, hv_list)
3941
      for name in nodes:
3942
        result = node_data[name]
3943
        if result.offline:
3944
          # offline nodes will be in both lists
3945
          assert result.fail_msg
3946
          offline_nodes.append(name)
3947
        if result.fail_msg:
3948
          bad_nodes.append(name)
3949
        elif result.payload:
3950
          for inst in result.payload:
3951
            if all_info[inst].primary_node == name:
3952
              live_data.update(result.payload)
3953
            else:
3954
              wrongnode_inst.add(inst)
3955
        # else no instance is alive
3956
    else:
3957
      live_data = {}
3958

    
3959
    if query.IQ_DISKUSAGE in self.requested_data:
3960
      disk_usage = dict((inst.name,
3961
                         _ComputeDiskSize(inst.disk_template,
3962
                                          [{"size": disk.size}
3963
                                           for disk in inst.disks]))
3964
                        for inst in instance_list)
3965
    else:
3966
      disk_usage = None
3967

    
3968
    if query.IQ_CONSOLE in self.requested_data:
3969
      consinfo = {}
3970
      for inst in instance_list:
3971
        if inst.name in live_data:
3972
          # Instance is running
3973
          consinfo[inst.name] = _GetInstanceConsole(cluster, inst)
3974
        else:
3975
          consinfo[inst.name] = None
3976
      assert set(consinfo.keys()) == set(instance_names)
3977
    else:
3978
      consinfo = None
3979

    
3980
    return query.InstanceQueryData(instance_list, lu.cfg.GetClusterInfo(),
3981
                                   disk_usage, offline_nodes, bad_nodes,
3982
                                   live_data, wrongnode_inst, consinfo)
3983

    
3984

    
3985
class LUQuery(NoHooksLU):
3986
  """Query for resources/items of a certain kind.
3987

3988
  """
3989
  # pylint: disable-msg=W0142
3990
  REQ_BGL = False
3991

    
3992
  def CheckArguments(self):
3993
    qcls = _GetQueryImplementation(self.op.what)
3994

    
3995
    self.impl = qcls(self.op.filter, self.op.fields, False)
3996

    
3997
  def ExpandNames(self):
3998
    self.impl.ExpandNames(self)
3999

    
4000
  def DeclareLocks(self, level):
4001
    self.impl.DeclareLocks(self, level)
4002

    
4003
  def Exec(self, feedback_fn):
4004
    return self.impl.NewStyleQuery(self)
4005

    
4006

    
4007
class LUQueryFields(NoHooksLU):
4008
  """Query for resources/items of a certain kind.
4009

4010
  """
4011
  # pylint: disable-msg=W0142
4012
  REQ_BGL = False
4013

    
4014
  def CheckArguments(self):
4015
    self.qcls = _GetQueryImplementation(self.op.what)
4016

    
4017
  def ExpandNames(self):
4018
    self.needed_locks = {}
4019

    
4020
  def Exec(self, feedback_fn):
4021
    return self.qcls.FieldsQuery(self.op.fields)
4022

    
4023

    
4024
class LUNodeModifyStorage(NoHooksLU):
4025
  """Logical unit for modifying a storage volume on a node.
4026

4027
  """
4028
  REQ_BGL = False
4029

    
4030
  def CheckArguments(self):
4031
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
4032

    
4033
    storage_type = self.op.storage_type
4034

    
4035
    try:
4036
      modifiable = constants.MODIFIABLE_STORAGE_FIELDS[storage_type]
4037
    except KeyError:
4038
      raise errors.OpPrereqError("Storage units of type '%s' can not be"
4039
                                 " modified" % storage_type,
4040
                                 errors.ECODE_INVAL)
4041

    
4042
    diff = set(self.op.changes.keys()) - modifiable
4043
    if diff:
4044
      raise errors.OpPrereqError("The following fields can not be modified for"
4045
                                 " storage units of type '%s': %r" %
4046
                                 (storage_type, list(diff)),
4047
                                 errors.ECODE_INVAL)
4048

    
4049
  def ExpandNames(self):
4050
    self.needed_locks = {
4051
      locking.LEVEL_NODE: self.op.node_name,
4052
      }
4053

    
4054
  def Exec(self, feedback_fn):
4055
    """Computes the list of nodes and their attributes.
4056

4057
    """
4058
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
4059
    result = self.rpc.call_storage_modify(self.op.node_name,
4060
                                          self.op.storage_type, st_args,
4061
                                          self.op.name, self.op.changes)
4062
    result.Raise("Failed to modify storage unit '%s' on %s" %
4063
                 (self.op.name, self.op.node_name))
4064

    
4065

    
4066
class LUNodeAdd(LogicalUnit):
4067
  """Logical unit for adding node to the cluster.
4068

4069
  """
4070
  HPATH = "node-add"
4071
  HTYPE = constants.HTYPE_NODE
4072
  _NFLAGS = ["master_capable", "vm_capable"]
4073

    
4074
  def CheckArguments(self):
4075
    self.primary_ip_family = self.cfg.GetPrimaryIPFamily()
4076
    # validate/normalize the node name
4077
    self.hostname = netutils.GetHostname(name=self.op.node_name,
4078
                                         family=self.primary_ip_family)
4079
    self.op.node_name = self.hostname.name
4080
    if self.op.readd and self.op.group:
4081
      raise errors.OpPrereqError("Cannot pass a node group when a node is"
4082
                                 " being readded", errors.ECODE_INVAL)
4083

    
4084
  def BuildHooksEnv(self):
4085
    """Build hooks env.
4086

4087
    This will run on all nodes before, and on all nodes + the new node after.
4088

4089
    """
4090
    env = {
4091
      "OP_TARGET": self.op.node_name,
4092
      "NODE_NAME": self.op.node_name,
4093
      "NODE_PIP": self.op.primary_ip,
4094
      "NODE_SIP": self.op.secondary_ip,
4095
      "MASTER_CAPABLE": str(self.op.master_capable),
4096
      "VM_CAPABLE": str(self.op.vm_capable),
4097
      }
4098
    nodes_0 = self.cfg.GetNodeList()
4099
    nodes_1 = nodes_0 + [self.op.node_name, ]
4100
    return env, nodes_0, nodes_1
4101

    
4102
  def CheckPrereq(self):
4103
    """Check prerequisites.
4104

4105
    This checks:
4106
     - the new node is not already in the config
4107
     - it is resolvable
4108
     - its parameters (single/dual homed) matches the cluster
4109

4110
    Any errors are signaled by raising errors.OpPrereqError.
4111

4112
    """
4113
    cfg = self.cfg
4114
    hostname = self.hostname
4115
    node = hostname.name
4116
    primary_ip = self.op.primary_ip = hostname.ip
4117
    if self.op.secondary_ip is None:
4118
      if self.primary_ip_family == netutils.IP6Address.family:
4119
        raise errors.OpPrereqError("When using a IPv6 primary address, a valid"
4120
                                   " IPv4 address must be given as secondary",
4121
                                   errors.ECODE_INVAL)
4122
      self.op.secondary_ip = primary_ip
4123

    
4124
    secondary_ip = self.op.secondary_ip
4125
    if not netutils.IP4Address.IsValid(secondary_ip):
4126
      raise errors.OpPrereqError("Secondary IP (%s) needs to be a valid IPv4"
4127
                                 " address" % secondary_ip, errors.ECODE_INVAL)
4128

    
4129
    node_list = cfg.GetNodeList()
4130
    if not self.op.readd and node in node_list:
4131
      raise errors.OpPrereqError("Node %s is already in the configuration" %
4132
                                 node, errors.ECODE_EXISTS)
4133
    elif self.op.readd and node not in node_list:
4134
      raise errors.OpPrereqError("Node %s is not in the configuration" % node,
4135
                                 errors.ECODE_NOENT)
4136

    
4137
    self.changed_primary_ip = False
4138

    
4139
    for existing_node_name in node_list:
4140
      existing_node = cfg.GetNodeInfo(existing_node_name)
4141

    
4142
      if self.op.readd and node == existing_node_name:
4143
        if existing_node.secondary_ip != secondary_ip:
4144
          raise errors.OpPrereqError("Readded node doesn't have the same IP"
4145
                                     " address configuration as before",
4146
                                     errors.ECODE_INVAL)
4147
        if existing_node.primary_ip != primary_ip:
4148
          self.changed_primary_ip = True
4149

    
4150
        continue
4151

    
4152
      if (existing_node.primary_ip == primary_ip or
4153
          existing_node.secondary_ip == primary_ip or
4154
          existing_node.primary_ip == secondary_ip or
4155
          existing_node.secondary_ip == secondary_ip):
4156
        raise errors.OpPrereqError("New node ip address(es) conflict with"
4157
                                   " existing node %s" % existing_node.name,
4158
                                   errors.ECODE_NOTUNIQUE)
4159

    
4160
    # After this 'if' block, None is no longer a valid value for the
4161
    # _capable op attributes
4162
    if self.op.readd:
4163
      old_node = self.cfg.GetNodeInfo(node)
4164
      assert old_node is not None, "Can't retrieve locked node %s" % node
4165
      for attr in self._NFLAGS:
4166
        if getattr(self.op, attr) is None:
4167
          setattr(self.op, attr, getattr(old_node, attr))
4168
    else:
4169
      for attr in self._NFLAGS:
4170
        if getattr(self.op, attr) is None:
4171
          setattr(self.op, attr, True)
4172

    
4173
    if self.op.readd and not self.op.vm_capable:
4174
      pri, sec = cfg.GetNodeInstances(node)
4175
      if pri or sec:
4176
        raise errors.OpPrereqError("Node %s being re-added with vm_capable"
4177
                                   " flag set to false, but it already holds"
4178
                                   " instances" % node,
4179
                                   errors.ECODE_STATE)
4180

    
4181
    # check that the type of the node (single versus dual homed) is the
4182
    # same as for the master
4183
    myself = cfg.GetNodeInfo(self.cfg.GetMasterNode())
4184
    master_singlehomed = myself.secondary_ip == myself.primary_ip
4185
    newbie_singlehomed = secondary_ip == primary_ip
4186
    if master_singlehomed != newbie_singlehomed:
4187
      if master_singlehomed:
4188
        raise errors.OpPrereqError("The master has no secondary ip but the"
4189
                                   " new node has one",
4190
                                   errors.ECODE_INVAL)
4191
      else:
4192
        raise errors.OpPrereqError("The master has a secondary ip but the"
4193
                                   " new node doesn't have one",
4194
                                   errors.ECODE_INVAL)
4195

    
4196
    # checks reachability
4197
    if not netutils.TcpPing(primary_ip, constants.DEFAULT_NODED_PORT):
4198
      raise errors.OpPrereqError("Node not reachable by ping",
4199
                                 errors.ECODE_ENVIRON)
4200

    
4201
    if not newbie_singlehomed:
4202
      # check reachability from my secondary ip to newbie's secondary ip
4203
      if not netutils.TcpPing(secondary_ip, constants.DEFAULT_NODED_PORT,
4204
                           source=myself.secondary_ip):
4205
        raise errors.OpPrereqError("Node secondary ip not reachable by TCP"
4206
                                   " based ping to node daemon port",
4207
                                   errors.ECODE_ENVIRON)
4208

    
4209
    if self.op.readd:
4210
      exceptions = [node]
4211
    else:
4212
      exceptions = []
4213

    
4214
    if self.op.master_capable:
4215
      self.master_candidate = _DecideSelfPromotion(self, exceptions=exceptions)
4216
    else:
4217
      self.master_candidate = False
4218

    
4219
    if self.op.readd:
4220
      self.new_node = old_node
4221
    else:
4222
      node_group = cfg.LookupNodeGroup(self.op.group)
4223
      self.new_node = objects.Node(name=node,
4224
                                   primary_ip=primary_ip,
4225
                                   secondary_ip=secondary_ip,
4226
                                   master_candidate=self.master_candidate,
4227
                                   offline=False, drained=False,
4228
                                   group=node_group)
4229

    
4230
    if self.op.ndparams:
4231
      utils.ForceDictType(self.op.ndparams, constants.NDS_PARAMETER_TYPES)
4232

    
4233
  def Exec(self, feedback_fn):
4234
    """Adds the new node to the cluster.
4235

4236
    """
4237
    new_node = self.new_node
4238
    node = new_node.name
4239

    
4240
    # We adding a new node so we assume it's powered
4241
    new_node.powered = True
4242

    
4243
    # for re-adds, reset the offline/drained/master-candidate flags;
4244
    # we need to reset here, otherwise offline would prevent RPC calls
4245
    # later in the procedure; this also means that if the re-add
4246
    # fails, we are left with a non-offlined, broken node
4247
    if self.op.readd:
4248
      new_node.drained = new_node.offline = False # pylint: disable-msg=W0201
4249
      self.LogInfo("Readding a node, the offline/drained flags were reset")
4250
      # if we demote the node, we do cleanup later in the procedure
4251
      new_node.master_candidate = self.master_candidate
4252
      if self.changed_primary_ip:
4253
        new_node.primary_ip = self.op.primary_ip
4254

    
4255
    # copy the master/vm_capable flags
4256
    for attr in self._NFLAGS:
4257
      setattr(new_node, attr, getattr(self.op, attr))
4258

    
4259
    # notify the user about any possible mc promotion
4260
    if new_node.master_candidate:
4261
      self.LogInfo("Node will be a master candidate")
4262

    
4263
    if self.op.ndparams:
4264
      new_node.ndparams = self.op.ndparams
4265
    else:
4266
      new_node.ndparams = {}
4267

    
4268
    # check connectivity
4269
    result = self.rpc.call_version([node])[node]
4270
    result.Raise("Can't get version information from node %s" % node)
4271
    if constants.PROTOCOL_VERSION == result.payload:
4272
      logging.info("Communication to node %s fine, sw version %s match",
4273
                   node, result.payload)
4274
    else:
4275
      raise errors.OpExecError("Version mismatch master version %s,"
4276
                               " node version %s" %
4277
                               (constants.PROTOCOL_VERSION, result.payload))
4278

    
4279
    # Add node to our /etc/hosts, and add key to known_hosts
4280
    if self.cfg.GetClusterInfo().modify_etc_hosts:
4281
      master_node = self.cfg.GetMasterNode()
4282
      result = self.rpc.call_etc_hosts_modify(master_node,
4283
                                              constants.ETC_HOSTS_ADD,
4284
                                              self.hostname.name,
4285
                                              self.hostname.ip)
4286
      result.Raise("Can't update hosts file with new host data")
4287

    
4288
    if new_node.secondary_ip != new_node.primary_ip:
4289
      _CheckNodeHasSecondaryIP(self, new_node.name, new_node.secondary_ip,
4290
                               False)
4291

    
4292
    node_verify_list = [self.cfg.GetMasterNode()]
4293
    node_verify_param = {
4294
      constants.NV_NODELIST: [node],
4295
      # TODO: do a node-net-test as well?
4296
    }
4297

    
4298
    result = self.rpc.call_node_verify(node_verify_list, node_verify_param,
4299
                                       self.cfg.GetClusterName())
4300
    for verifier in node_verify_list:
4301
      result[verifier].Raise("Cannot communicate with node %s" % verifier)
4302
      nl_payload = result[verifier].payload[constants.NV_NODELIST]
4303
      if nl_payload:
4304
        for failed in nl_payload:
4305
          feedback_fn("ssh/hostname verification failed"
4306
                      " (checking from %s): %s" %
4307
                      (verifier, nl_payload[failed]))
4308
        raise errors.OpExecError("ssh/hostname verification failed.")
4309

    
4310
    if self.op.readd:
4311
      _RedistributeAncillaryFiles(self)
4312
      self.context.ReaddNode(new_node)
4313
      # make sure we redistribute the config
4314
      self.cfg.Update(new_node, feedback_fn)
4315
      # and make sure the new node will not have old files around
4316
      if not new_node.master_candidate:
4317
        result = self.rpc.call_node_demote_from_mc(new_node.name)
4318
        msg = result.fail_msg
4319
        if msg:
4320
          self.LogWarning("Node failed to demote itself from master"
4321
                          " candidate status: %s" % msg)
4322
    else:
4323
      _RedistributeAncillaryFiles(self, additional_nodes=[node],
4324
                                  additional_vm=self.op.vm_capable)
4325
      self.context.AddNode(new_node, self.proc.GetECId())
4326

    
4327

    
4328
class LUNodeSetParams(LogicalUnit):
4329
  """Modifies the parameters of a node.
4330

4331
  @cvar _F2R: a dictionary from tuples of flags (mc, drained, offline)
4332
      to the node role (as _ROLE_*)
4333
  @cvar _R2F: a dictionary from node role to tuples of flags
4334
  @cvar _FLAGS: a list of attribute names corresponding to the flags
4335

4336
  """
4337
  HPATH = "node-modify"
4338
  HTYPE = constants.HTYPE_NODE
4339
  REQ_BGL = False
4340
  (_ROLE_CANDIDATE, _ROLE_DRAINED, _ROLE_OFFLINE, _ROLE_REGULAR) = range(4)
4341
  _F2R = {
4342
    (True, False, False): _ROLE_CANDIDATE,
4343
    (False, True, False): _ROLE_DRAINED,
4344
    (False, False, True): _ROLE_OFFLINE,
4345
    (False, False, False): _ROLE_REGULAR,
4346
    }
4347
  _R2F = dict((v, k) for k, v in _F2R.items())
4348
  _FLAGS = ["master_candidate", "drained", "offline"]
4349

    
4350
  def CheckArguments(self):
4351
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
4352
    all_mods = [self.op.offline, self.op.master_candidate, self.op.drained,
4353
                self.op.master_capable, self.op.vm_capable,
4354
                self.op.secondary_ip, self.op.ndparams]
4355
    if all_mods.count(None) == len(all_mods):
4356
      raise errors.OpPrereqError("Please pass at least one modification",
4357
                                 errors.ECODE_INVAL)
4358
    if all_mods.count(True) > 1:
4359
      raise errors.OpPrereqError("Can't set the node into more than one"
4360
                                 " state at the same time",
4361
                                 errors.ECODE_INVAL)
4362

    
4363
    # Boolean value that tells us whether we might be demoting from MC
4364
    self.might_demote = (self.op.master_candidate == False or
4365
                         self.op.offline == True or
4366
                         self.op.drained == True or
4367
                         self.op.master_capable == False)
4368

    
4369
    if self.op.secondary_ip:
4370
      if not netutils.IP4Address.IsValid(self.op.secondary_ip):
4371
        raise errors.OpPrereqError("Secondary IP (%s) needs to be a valid IPv4"
4372
                                   " address" % self.op.secondary_ip,
4373
                                   errors.ECODE_INVAL)
4374

    
4375
    self.lock_all = self.op.auto_promote and self.might_demote
4376
    self.lock_instances = self.op.secondary_ip is not None
4377

    
4378
  def ExpandNames(self):
4379
    if self.lock_all:
4380
      self.needed_locks = {locking.LEVEL_NODE: locking.ALL_SET}
4381
    else:
4382
      self.needed_locks = {locking.LEVEL_NODE: self.op.node_name}
4383

    
4384
    if self.lock_instances:
4385
      self.needed_locks[locking.LEVEL_INSTANCE] = locking.ALL_SET
4386

    
4387
  def DeclareLocks(self, level):
4388
    # If we have locked all instances, before waiting to lock nodes, release
4389
    # all the ones living on nodes unrelated to the current operation.
4390
    if level == locking.LEVEL_NODE and self.lock_instances:
4391
      instances_release = []
4392
      instances_keep = []
4393
      self.affected_instances = []
4394
      if self.needed_locks[locking.LEVEL_NODE] is not locking.ALL_SET:
4395
        for instance_name in self.acquired_locks[locking.LEVEL_INSTANCE]:
4396
          instance = self.context.cfg.GetInstanceInfo(instance_name)
4397
          i_mirrored = instance.disk_template in constants.DTS_NET_MIRROR
4398
          if i_mirrored and self.op.node_name in instance.all_nodes:
4399
            instances_keep.append(instance_name)
4400
            self.affected_instances.append(instance)
4401
          else:
4402
            instances_release.append(instance_name)
4403
        if instances_release:
4404
          self.context.glm.release(locking.LEVEL_INSTANCE, instances_release)
4405
          self.acquired_locks[locking.LEVEL_INSTANCE] = instances_keep
4406

    
4407
  def BuildHooksEnv(self):
4408
    """Build hooks env.
4409

4410
    This runs on the master node.
4411

4412
    """
4413
    env = {
4414
      "OP_TARGET": self.op.node_name,
4415
      "MASTER_CANDIDATE": str(self.op.master_candidate),
4416
      "OFFLINE": str(self.op.offline),
4417
      "DRAINED": str(self.op.drained),
4418
      "MASTER_CAPABLE": str(self.op.master_capable),
4419
      "VM_CAPABLE": str(self.op.vm_capable),
4420
      }
4421
    nl = [self.cfg.GetMasterNode(),
4422
          self.op.node_name]
4423
    return env, nl, nl
4424

    
4425
  def CheckPrereq(self):
4426
    """Check prerequisites.
4427

4428
    This only checks the instance list against the existing names.
4429

4430
    """
4431
    node = self.node = self.cfg.GetNodeInfo(self.op.node_name)
4432

    
4433
    if (self.op.master_candidate is not None or
4434
        self.op.drained is not None or
4435
        self.op.offline is not None):
4436
      # we can't change the master's node flags
4437
      if self.op.node_name == self.cfg.GetMasterNode():
4438
        raise errors.OpPrereqError("The master role can be changed"
4439
                                   " only via master-failover",
4440
                                   errors.ECODE_INVAL)
4441

    
4442
    if self.op.master_candidate and not node.master_capable:
4443
      raise errors.OpPrereqError("Node %s is not master capable, cannot make"
4444
                                 " it a master candidate" % node.name,
4445
                                 errors.ECODE_STATE)
4446

    
4447
    if self.op.vm_capable == False:
4448
      (ipri, isec) = self.cfg.GetNodeInstances(self.op.node_name)
4449
      if ipri or isec:
4450
        raise errors.OpPrereqError("Node %s hosts instances, cannot unset"
4451
                                   " the vm_capable flag" % node.name,
4452
                                   errors.ECODE_STATE)
4453

    
4454
    if node.master_candidate and self.might_demote and not self.lock_all:
4455
      assert not self.op.auto_promote, "auto_promote set but lock_all not"
4456
      # check if after removing the current node, we're missing master
4457
      # candidates
4458
      (mc_remaining, mc_should, _) = \
4459
          self.cfg.GetMasterCandidateStats(exceptions=[node.name])
4460
      if mc_remaining < mc_should:
4461
        raise errors.OpPrereqError("Not enough master candidates, please"
4462
                                   " pass auto promote option to allow"
4463
                                   " promotion", errors.ECODE_STATE)
4464

    
4465
    self.old_flags = old_flags = (node.master_candidate,
4466
                                  node.drained, node.offline)
4467
    assert old_flags in self._F2R, "Un-handled old flags  %s" % str(old_flags)
4468
    self.old_role = old_role = self._F2R[old_flags]
4469

    
4470
    # Check for ineffective changes
4471
    for attr in self._FLAGS:
4472
      if (getattr(self.op, attr) == False and getattr(node, attr) == False):
4473
        self.LogInfo("Ignoring request to unset flag %s, already unset", attr)
4474
        setattr(self.op, attr, None)
4475

    
4476
    # Past this point, any flag change to False means a transition
4477
    # away from the respective state, as only real changes are kept
4478

    
4479
    # TODO: We might query the real power state if it supports OOB
4480
    if _SupportsOob(self.cfg, node):
4481
      if self.op.offline is False and not (node.powered or
4482
                                           self.op.powered == True):
4483
        raise errors.OpPrereqError(("Please power on node %s first before you"
4484
                                    " can reset offline state") %
4485
                                   self.op.node_name)
4486
    elif self.op.powered is not None:
4487
      raise errors.OpPrereqError(("Unable to change powered state for node %s"
4488
                                  " which does not support out-of-band"
4489
                                  " handling") % self.op.node_name)
4490

    
4491
    # If we're being deofflined/drained, we'll MC ourself if needed
4492
    if (self.op.drained == False or self.op.offline == False or
4493
        (self.op.master_capable and not node.master_capable)):
4494
      if _DecideSelfPromotion(self):
4495
        self.op.master_candidate = True
4496
        self.LogInfo("Auto-promoting node to master candidate")
4497

    
4498
    # If we're no longer master capable, we'll demote ourselves from MC
4499
    if self.op.master_capable == False and node.master_candidate:
4500
      self.LogInfo("Demoting from master candidate")
4501
      self.op.master_candidate = False
4502

    
4503
    # Compute new role
4504
    assert [getattr(self.op, attr) for attr in self._FLAGS].count(True) <= 1
4505
    if self.op.master_candidate:
4506
      new_role = self._ROLE_CANDIDATE
4507
    elif self.op.drained:
4508
      new_role = self._ROLE_DRAINED
4509
    elif self.op.offline:
4510
      new_role = self._ROLE_OFFLINE
4511
    elif False in [self.op.master_candidate, self.op.drained, self.op.offline]:
4512
      # False is still in new flags, which means we're un-setting (the
4513
      # only) True flag
4514
      new_role = self._ROLE_REGULAR
4515
    else: # no new flags, nothing, keep old role
4516
      new_role = old_role
4517

    
4518
    self.new_role = new_role
4519

    
4520
    if old_role == self._ROLE_OFFLINE and new_role != old_role:
4521
      # Trying to transition out of offline status
4522
      result = self.rpc.call_version([node.name])[node.name]
4523
      if result.fail_msg:
4524
        raise errors.OpPrereqError("Node %s is being de-offlined but fails"
4525
                                   " to report its version: %s" %
4526
                                   (node.name, result.fail_msg),
4527
                                   errors.ECODE_STATE)
4528
      else:
4529
        self.LogWarning("Transitioning node from offline to online state"
4530
                        " without using re-add. Please make sure the node"
4531
                        " is healthy!")
4532

    
4533
    if self.op.secondary_ip:
4534
      # Ok even without locking, because this can't be changed by any LU
4535
      master = self.cfg.GetNodeInfo(self.cfg.GetMasterNode())
4536
      master_singlehomed = master.secondary_ip == master.primary_ip
4537
      if master_singlehomed and self.op.secondary_ip:
4538
        raise errors.OpPrereqError("Cannot change the secondary ip on a single"
4539
                                   " homed cluster", errors.ECODE_INVAL)
4540

    
4541
      if node.offline:
4542
        if self.affected_instances:
4543
          raise errors.OpPrereqError("Cannot change secondary ip: offline"
4544
                                     " node has instances (%s) configured"
4545
                                     " to use it" % self.affected_instances)
4546
      else:
4547
        # On online nodes, check that no instances are running, and that
4548
        # the node has the new ip and we can reach it.
4549
        for instance in self.affected_instances:
4550
          _CheckInstanceDown(self, instance, "cannot change secondary ip")
4551

    
4552
        _CheckNodeHasSecondaryIP(self, node.name, self.op.secondary_ip, True)
4553
        if master.name != node.name:
4554
          # check reachability from master secondary ip to new secondary ip
4555
          if not netutils.TcpPing(self.op.secondary_ip,
4556
                                  constants.DEFAULT_NODED_PORT,
4557
                                  source=master.secondary_ip):
4558
            raise errors.OpPrereqError("Node secondary ip not reachable by TCP"
4559
                                       " based ping to node daemon port",
4560
                                       errors.ECODE_ENVIRON)
4561

    
4562
    if self.op.ndparams:
4563
      new_ndparams = _GetUpdatedParams(self.node.ndparams, self.op.ndparams)
4564
      utils.ForceDictType(new_ndparams, constants.NDS_PARAMETER_TYPES)
4565
      self.new_ndparams = new_ndparams
4566

    
4567
  def Exec(self, feedback_fn):
4568
    """Modifies a node.
4569

4570
    """
4571
    node = self.node
4572
    old_role = self.old_role
4573
    new_role = self.new_role
4574

    
4575
    result = []
4576

    
4577
    if self.op.ndparams:
4578
      node.ndparams = self.new_ndparams
4579

    
4580
    if self.op.powered is not None:
4581
      node.powered = self.op.powered
4582

    
4583
    for attr in ["master_capable", "vm_capable"]:
4584
      val = getattr(self.op, attr)
4585
      if val is not None:
4586
        setattr(node, attr, val)
4587
        result.append((attr, str(val)))
4588

    
4589
    if new_role != old_role:
4590
      # Tell the node to demote itself, if no longer MC and not offline
4591
      if old_role == self._ROLE_CANDIDATE and new_role != self._ROLE_OFFLINE:
4592
        msg = self.rpc.call_node_demote_from_mc(node.name).fail_msg
4593
        if msg:
4594
          self.LogWarning("Node failed to demote itself: %s", msg)
4595

    
4596
      new_flags = self._R2F[new_role]
4597
      for of, nf, desc in zip(self.old_flags, new_flags, self._FLAGS):
4598
        if of != nf:
4599
          result.append((desc, str(nf)))
4600
      (node.master_candidate, node.drained, node.offline) = new_flags
4601

    
4602
      # we locked all nodes, we adjust the CP before updating this node
4603
      if self.lock_all:
4604
        _AdjustCandidatePool(self, [node.name])
4605

    
4606
    if self.op.secondary_ip:
4607
      node.secondary_ip = self.op.secondary_ip
4608
      result.append(("secondary_ip", self.op.secondary_ip))
4609

    
4610
    # this will trigger configuration file update, if needed
4611
    self.cfg.Update(node, feedback_fn)
4612

    
4613
    # this will trigger job queue propagation or cleanup if the mc
4614
    # flag changed
4615
    if [old_role, new_role].count(self._ROLE_CANDIDATE) == 1:
4616
      self.context.ReaddNode(node)
4617

    
4618
    return result
4619

    
4620

    
4621
class LUNodePowercycle(NoHooksLU):
4622
  """Powercycles a node.
4623

4624
  """
4625
  REQ_BGL = False
4626

    
4627
  def CheckArguments(self):
4628
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
4629
    if self.op.node_name == self.cfg.GetMasterNode() and not self.op.force:
4630
      raise errors.OpPrereqError("The node is the master and the force"
4631
                                 " parameter was not set",
4632
                                 errors.ECODE_INVAL)
4633

    
4634
  def ExpandNames(self):
4635
    """Locking for PowercycleNode.
4636

4637
    This is a last-resort option and shouldn't block on other
4638
    jobs. Therefore, we grab no locks.
4639

4640
    """
4641
    self.needed_locks = {}
4642

    
4643
  def Exec(self, feedback_fn):
4644
    """Reboots a node.
4645

4646
    """
4647
    result = self.rpc.call_node_powercycle(self.op.node_name,
4648
                                           self.cfg.GetHypervisorType())
4649
    result.Raise("Failed to schedule the reboot")
4650
    return result.payload
4651

    
4652

    
4653
class LUClusterQuery(NoHooksLU):
4654
  """Query cluster configuration.
4655

4656
  """
4657
  REQ_BGL = False
4658

    
4659
  def ExpandNames(self):
4660
    self.needed_locks = {}
4661

    
4662
  def Exec(self, feedback_fn):
4663
    """Return cluster config.
4664

4665
    """
4666
    cluster = self.cfg.GetClusterInfo()
4667
    os_hvp = {}
4668

    
4669
    # Filter just for enabled hypervisors
4670
    for os_name, hv_dict in cluster.os_hvp.items():
4671
      os_hvp[os_name] = {}
4672
      for hv_name, hv_params in hv_dict.items():
4673
        if hv_name in cluster.enabled_hypervisors:
4674
          os_hvp[os_name][hv_name] = hv_params
4675

    
4676
    # Convert ip_family to ip_version
4677
    primary_ip_version = constants.IP4_VERSION
4678
    if cluster.primary_ip_family == netutils.IP6Address.family:
4679
      primary_ip_version = constants.IP6_VERSION
4680

    
4681
    result = {
4682
      "software_version": constants.RELEASE_VERSION,
4683
      "protocol_version": constants.PROTOCOL_VERSION,
4684
      "config_version": constants.CONFIG_VERSION,
4685
      "os_api_version": max(constants.OS_API_VERSIONS),
4686
      "export_version": constants.EXPORT_VERSION,
4687
      "architecture": (platform.architecture()[0], platform.machine()),
4688
      "name": cluster.cluster_name,
4689
      "master": cluster.master_node,
4690
      "default_hypervisor": cluster.enabled_hypervisors[0],
4691
      "enabled_hypervisors": cluster.enabled_hypervisors,
4692
      "hvparams": dict([(hypervisor_name, cluster.hvparams[hypervisor_name])
4693
                        for hypervisor_name in cluster.enabled_hypervisors]),
4694
      "os_hvp": os_hvp,
4695
      "beparams": cluster.beparams,
4696
      "osparams": cluster.osparams,
4697
      "nicparams": cluster.nicparams,
4698
      "ndparams": cluster.ndparams,
4699
      "candidate_pool_size": cluster.candidate_pool_size,
4700
      "master_netdev": cluster.master_netdev,
4701
      "volume_group_name": cluster.volume_group_name,
4702
      "drbd_usermode_helper": cluster.drbd_usermode_helper,
4703
      "file_storage_dir": cluster.file_storage_dir,
4704
      "shared_file_storage_dir": cluster.shared_file_storage_dir,
4705
      "maintain_node_health": cluster.maintain_node_health,
4706
      "ctime": cluster.ctime,
4707
      "mtime": cluster.mtime,
4708
      "uuid": cluster.uuid,
4709
      "tags": list(cluster.GetTags()),
4710
      "uid_pool": cluster.uid_pool,
4711
      "default_iallocator": cluster.default_iallocator,
4712
      "reserved_lvs": cluster.reserved_lvs,
4713
      "primary_ip_version": primary_ip_version,
4714
      "prealloc_wipe_disks": cluster.prealloc_wipe_disks,
4715
      "hidden_os": cluster.hidden_os,
4716
      "blacklisted_os": cluster.blacklisted_os,
4717
      }
4718

    
4719
    return result
4720

    
4721

    
4722
class LUClusterConfigQuery(NoHooksLU):
4723
  """Return configuration values.
4724

4725
  """
4726
  REQ_BGL = False
4727
  _FIELDS_DYNAMIC = utils.FieldSet()
4728
  _FIELDS_STATIC = utils.FieldSet("cluster_name", "master_node", "drain_flag",
4729
                                  "watcher_pause", "volume_group_name")
4730

    
4731
  def CheckArguments(self):
4732
    _CheckOutputFields(static=self._FIELDS_STATIC,
4733
                       dynamic=self._FIELDS_DYNAMIC,
4734
                       selected=self.op.output_fields)
4735

    
4736
  def ExpandNames(self):
4737
    self.needed_locks = {}
4738

    
4739
  def Exec(self, feedback_fn):
4740
    """Dump a representation of the cluster config to the standard output.
4741

4742
    """
4743
    values = []
4744
    for field in self.op.output_fields:
4745
      if field == "cluster_name":
4746
        entry = self.cfg.GetClusterName()
4747
      elif field == "master_node":
4748
        entry = self.cfg.GetMasterNode()
4749
      elif field == "drain_flag":
4750
        entry = os.path.exists(constants.JOB_QUEUE_DRAIN_FILE)
4751
      elif field == "watcher_pause":
4752
        entry = utils.ReadWatcherPauseFile(constants.WATCHER_PAUSEFILE)
4753
      elif field == "volume_group_name":
4754
        entry = self.cfg.GetVGName()
4755
      else:
4756
        raise errors.ParameterError(field)
4757
      values.append(entry)
4758
    return values
4759

    
4760

    
4761
class LUInstanceActivateDisks(NoHooksLU):
4762
  """Bring up an instance's disks.
4763

4764
  """
4765
  REQ_BGL = False
4766

    
4767
  def ExpandNames(self):
4768
    self._ExpandAndLockInstance()
4769
    self.needed_locks[locking.LEVEL_NODE] = []
4770
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
4771

    
4772
  def DeclareLocks(self, level):
4773
    if level == locking.LEVEL_NODE:
4774
      self._LockInstancesNodes()
4775

    
4776
  def CheckPrereq(self):
4777
    """Check prerequisites.
4778

4779
    This checks that the instance is in the cluster.
4780

4781
    """
4782
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4783
    assert self.instance is not None, \
4784
      "Cannot retrieve locked instance %s" % self.op.instance_name
4785
    _CheckNodeOnline(self, self.instance.primary_node)
4786

    
4787
  def Exec(self, feedback_fn):
4788
    """Activate the disks.
4789

4790
    """
4791
    disks_ok, disks_info = \
4792
              _AssembleInstanceDisks(self, self.instance,
4793
                                     ignore_size=self.op.ignore_size)
4794
    if not disks_ok:
4795
      raise errors.OpExecError("Cannot activate block devices")
4796

    
4797
    return disks_info
4798

    
4799

    
4800
def _AssembleInstanceDisks(lu, instance, disks=None, ignore_secondaries=False,
4801
                           ignore_size=False):
4802
  """Prepare the block devices for an instance.
4803

4804
  This sets up the block devices on all nodes.
4805

4806
  @type lu: L{LogicalUnit}
4807
  @param lu: the logical unit on whose behalf we execute
4808
  @type instance: L{objects.Instance}
4809
  @param instance: the instance for whose disks we assemble
4810
  @type disks: list of L{objects.Disk} or None
4811
  @param disks: which disks to assemble (or all, if None)
4812
  @type ignore_secondaries: boolean
4813
  @param ignore_secondaries: if true, errors on secondary nodes
4814
      won't result in an error return from the function
4815
  @type ignore_size: boolean
4816
  @param ignore_size: if true, the current known size of the disk
4817
      will not be used during the disk activation, useful for cases
4818
      when the size is wrong
4819
  @return: False if the operation failed, otherwise a list of
4820
      (host, instance_visible_name, node_visible_name)
4821
      with the mapping from node devices to instance devices
4822

4823
  """
4824
  device_info = []
4825
  disks_ok = True
4826
  iname = instance.name
4827
  disks = _ExpandCheckDisks(instance, disks)
4828

    
4829
  # With the two passes mechanism we try to reduce the window of
4830
  # opportunity for the race condition of switching DRBD to primary
4831
  # before handshaking occured, but we do not eliminate it
4832

    
4833
  # The proper fix would be to wait (with some limits) until the
4834
  # connection has been made and drbd transitions from WFConnection
4835
  # into any other network-connected state (Connected, SyncTarget,
4836
  # SyncSource, etc.)
4837

    
4838
  # 1st pass, assemble on all nodes in secondary mode
4839
  for idx, inst_disk in enumerate(disks):
4840
    for node, node_disk in inst_disk.ComputeNodeTree(instance.primary_node):
4841
      if ignore_size:
4842
        node_disk = node_disk.Copy()
4843
        node_disk.UnsetSize()
4844
      lu.cfg.SetDiskID(node_disk, node)
4845
      result = lu.rpc.call_blockdev_assemble(node, node_disk, iname, False, idx)
4846
      msg = result.fail_msg
4847
      if msg:
4848
        lu.proc.LogWarning("Could not prepare block device %s on node %s"
4849
                           " (is_primary=False, pass=1): %s",
4850
                           inst_disk.iv_name, node, msg)
4851
        if not ignore_secondaries:
4852
          disks_ok = False
4853

    
4854
  # FIXME: race condition on drbd migration to primary
4855

    
4856
  # 2nd pass, do only the primary node
4857
  for idx, inst_disk in enumerate(disks):
4858
    dev_path = None
4859

    
4860
    for node, node_disk in inst_disk.ComputeNodeTree(instance.primary_node):
4861
      if node != instance.primary_node:
4862
        continue
4863
      if ignore_size:
4864
        node_disk = node_disk.Copy()
4865
        node_disk.UnsetSize()
4866
      lu.cfg.SetDiskID(node_disk, node)
4867
      result = lu.rpc.call_blockdev_assemble(node, node_disk, iname, True, idx)
4868
      msg = result.fail_msg
4869
      if msg:
4870
        lu.proc.LogWarning("Could not prepare block device %s on node %s"
4871
                           " (is_primary=True, pass=2): %s",
4872
                           inst_disk.iv_name, node, msg)
4873
        disks_ok = False
4874
      else:
4875
        dev_path = result.payload
4876

    
4877
    device_info.append((instance.primary_node, inst_disk.iv_name, dev_path))
4878

    
4879
  # leave the disks configured for the primary node
4880
  # this is a workaround that would be fixed better by
4881
  # improving the logical/physical id handling
4882
  for disk in disks:
4883
    lu.cfg.SetDiskID(disk, instance.primary_node)
4884

    
4885
  return disks_ok, device_info
4886

    
4887

    
4888
def _StartInstanceDisks(lu, instance, force):
4889
  """Start the disks of an instance.
4890

4891
  """
4892
  disks_ok, _ = _AssembleInstanceDisks(lu, instance,
4893
                                           ignore_secondaries=force)
4894
  if not disks_ok:
4895
    _ShutdownInstanceDisks(lu, instance)
4896
    if force is not None and not force:
4897
      lu.proc.LogWarning("", hint="If the message above refers to a"
4898
                         " secondary node,"
4899
                         " you can retry the operation using '--force'.")
4900
    raise errors.OpExecError("Disk consistency error")
4901

    
4902

    
4903
class LUInstanceDeactivateDisks(NoHooksLU):
4904
  """Shutdown an instance's disks.
4905

4906
  """
4907
  REQ_BGL = False
4908

    
4909
  def ExpandNames(self):
4910
    self._ExpandAndLockInstance()
4911
    self.needed_locks[locking.LEVEL_NODE] = []
4912
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
4913

    
4914
  def DeclareLocks(self, level):
4915
    if level == locking.LEVEL_NODE:
4916
      self._LockInstancesNodes()
4917

    
4918
  def CheckPrereq(self):
4919
    """Check prerequisites.
4920

4921
    This checks that the instance is in the cluster.
4922

4923
    """
4924
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4925
    assert self.instance is not None, \
4926
      "Cannot retrieve locked instance %s" % self.op.instance_name
4927

    
4928
  def Exec(self, feedback_fn):
4929
    """Deactivate the disks
4930

4931
    """
4932
    instance = self.instance
4933
    if self.op.force:
4934
      _ShutdownInstanceDisks(self, instance)
4935
    else:
4936
      _SafeShutdownInstanceDisks(self, instance)
4937

    
4938

    
4939
def _SafeShutdownInstanceDisks(lu, instance, disks=None):
4940
  """Shutdown block devices of an instance.
4941

4942
  This function checks if an instance is running, before calling
4943
  _ShutdownInstanceDisks.
4944

4945
  """
4946
  _CheckInstanceDown(lu, instance, "cannot shutdown disks")
4947
  _ShutdownInstanceDisks(lu, instance, disks=disks)
4948

    
4949

    
4950
def _ExpandCheckDisks(instance, disks):
4951
  """Return the instance disks selected by the disks list
4952

4953
  @type disks: list of L{objects.Disk} or None
4954
  @param disks: selected disks
4955
  @rtype: list of L{objects.Disk}
4956
  @return: selected instance disks to act on
4957

4958
  """
4959
  if disks is None:
4960
    return instance.disks
4961
  else:
4962
    if not set(disks).issubset(instance.disks):
4963
      raise errors.ProgrammerError("Can only act on disks belonging to the"
4964
                                   " target instance")
4965
    return disks
4966

    
4967

    
4968
def _ShutdownInstanceDisks(lu, instance, disks=None, ignore_primary=False):
4969
  """Shutdown block devices of an instance.
4970

4971
  This does the shutdown on all nodes of the instance.
4972

4973
  If the ignore_primary is false, errors on the primary node are
4974
  ignored.
4975

4976
  """
4977
  all_result = True
4978
  disks = _ExpandCheckDisks(instance, disks)
4979

    
4980
  for disk in disks:
4981
    for node, top_disk in disk.ComputeNodeTree(instance.primary_node):
4982
      lu.cfg.SetDiskID(top_disk, node)
4983
      result = lu.rpc.call_blockdev_shutdown(node, top_disk)
4984
      msg = result.fail_msg
4985
      if msg:
4986
        lu.LogWarning("Could not shutdown block device %s on node %s: %s",
4987
                      disk.iv_name, node, msg)
4988
        if ((node == instance.primary_node and not ignore_primary) or
4989
            (node != instance.primary_node and not result.offline)):
4990
          all_result = False
4991
  return all_result
4992

    
4993

    
4994
def _CheckNodeFreeMemory(lu, node, reason, requested, hypervisor_name):
4995
  """Checks if a node has enough free memory.
4996

4997
  This function check if a given node has the needed amount of free
4998
  memory. In case the node has less memory or we cannot get the
4999
  information from the node, this function raise an OpPrereqError
5000
  exception.
5001

5002
  @type lu: C{LogicalUnit}
5003
  @param lu: a logical unit from which we get configuration data
5004
  @type node: C{str}
5005
  @param node: the node to check
5006
  @type reason: C{str}
5007
  @param reason: string to use in the error message
5008
  @type requested: C{int}
5009
  @param requested: the amount of memory in MiB to check for
5010
  @type hypervisor_name: C{str}
5011
  @param hypervisor_name: the hypervisor to ask for memory stats
5012
  @raise errors.OpPrereqError: if the node doesn't have enough memory, or
5013
      we cannot check the node
5014

5015
  """
5016
  nodeinfo = lu.rpc.call_node_info([node], None, hypervisor_name)
5017
  nodeinfo[node].Raise("Can't get data from node %s" % node,
5018
                       prereq=True, ecode=errors.ECODE_ENVIRON)
5019
  free_mem = nodeinfo[node].payload.get('memory_free', None)
5020
  if not isinstance(free_mem, int):
5021
    raise errors.OpPrereqError("Can't compute free memory on node %s, result"
5022
                               " was '%s'" % (node, free_mem),
5023
                               errors.ECODE_ENVIRON)
5024
  if requested > free_mem:
5025
    raise errors.OpPrereqError("Not enough memory on node %s for %s:"
5026
                               " needed %s MiB, available %s MiB" %
5027
                               (node, reason, requested, free_mem),
5028
                               errors.ECODE_NORES)
5029

    
5030

    
5031
def _CheckNodesFreeDiskPerVG(lu, nodenames, req_sizes):
5032
  """Checks if nodes have enough free disk space in the all VGs.
5033

5034
  This function check if all given nodes have the needed amount of
5035
  free disk. In case any node has less disk or we cannot get the
5036
  information from the node, this function raise an OpPrereqError
5037
  exception.
5038

5039
  @type lu: C{LogicalUnit}
5040
  @param lu: a logical unit from which we get configuration data
5041
  @type nodenames: C{list}
5042
  @param nodenames: the list of node names to check
5043
  @type req_sizes: C{dict}
5044
  @param req_sizes: the hash of vg and corresponding amount of disk in
5045
      MiB to check for
5046
  @raise errors.OpPrereqError: if the node doesn't have enough disk,
5047
      or we cannot check the node
5048

5049
  """
5050
  for vg, req_size in req_sizes.items():
5051
    _CheckNodesFreeDiskOnVG(lu, nodenames, vg, req_size)
5052

    
5053

    
5054
def _CheckNodesFreeDiskOnVG(lu, nodenames, vg, requested):
5055
  """Checks if nodes have enough free disk space in the specified VG.
5056

5057
  This function check if all given nodes have the needed amount of
5058
  free disk. In case any node has less disk or we cannot get the
5059
  information from the node, this function raise an OpPrereqError
5060
  exception.
5061

5062
  @type lu: C{LogicalUnit}
5063
  @param lu: a logical unit from which we get configuration data
5064
  @type nodenames: C{list}
5065
  @param nodenames: the list of node names to check
5066
  @type vg: C{str}
5067
  @param vg: the volume group to check
5068
  @type requested: C{int}
5069
  @param requested: the amount of disk in MiB to check for
5070
  @raise errors.OpPrereqError: if the node doesn't have enough disk,
5071
      or we cannot check the node
5072

5073
  """
5074
  nodeinfo = lu.rpc.call_node_info(nodenames, vg, None)
5075
  for node in nodenames:
5076
    info = nodeinfo[node]
5077
    info.Raise("Cannot get current information from node %s" % node,
5078
               prereq=True, ecode=errors.ECODE_ENVIRON)
5079
    vg_free = info.payload.get("vg_free", None)
5080
    if not isinstance(vg_free, int):
5081
      raise errors.OpPrereqError("Can't compute free disk space on node"
5082
                                 " %s for vg %s, result was '%s'" %
5083
                                 (node, vg, vg_free), errors.ECODE_ENVIRON)
5084
    if requested > vg_free:
5085
      raise errors.OpPrereqError("Not enough disk space on target node %s"
5086
                                 " vg %s: required %d MiB, available %d MiB" %
5087
                                 (node, vg, requested, vg_free),
5088
                                 errors.ECODE_NORES)
5089

    
5090

    
5091
class LUInstanceStartup(LogicalUnit):
5092
  """Starts an instance.
5093

5094
  """
5095
  HPATH = "instance-start"
5096
  HTYPE = constants.HTYPE_INSTANCE
5097
  REQ_BGL = False
5098

    
5099
  def CheckArguments(self):
5100
    # extra beparams
5101
    if self.op.beparams:
5102
      # fill the beparams dict
5103
      utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
5104

    
5105
  def ExpandNames(self):
5106
    self._ExpandAndLockInstance()
5107

    
5108
  def BuildHooksEnv(self):
5109
    """Build hooks env.
5110

5111
    This runs on master, primary and secondary nodes of the instance.
5112

5113
    """
5114
    env = {
5115
      "FORCE": self.op.force,
5116
      }
5117
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
5118
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5119
    return env, nl, nl
5120

    
5121
  def CheckPrereq(self):
5122
    """Check prerequisites.
5123

5124
    This checks that the instance is in the cluster.
5125

5126
    """
5127
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5128
    assert self.instance is not None, \
5129
      "Cannot retrieve locked instance %s" % self.op.instance_name
5130

    
5131
    # extra hvparams
5132
    if self.op.hvparams:
5133
      # check hypervisor parameter syntax (locally)
5134
      cluster = self.cfg.GetClusterInfo()
5135
      utils.ForceDictType(self.op.hvparams, constants.HVS_PARAMETER_TYPES)
5136
      filled_hvp = cluster.FillHV(instance)
5137
      filled_hvp.update(self.op.hvparams)
5138
      hv_type = hypervisor.GetHypervisor(instance.hypervisor)
5139
      hv_type.CheckParameterSyntax(filled_hvp)
5140
      _CheckHVParams(self, instance.all_nodes, instance.hypervisor, filled_hvp)
5141

    
5142
    self.primary_offline = self.cfg.GetNodeInfo(instance.primary_node).offline
5143

    
5144
    if self.primary_offline and self.op.ignore_offline_nodes:
5145
      self.proc.LogWarning("Ignoring offline primary node")
5146

    
5147
      if self.op.hvparams or self.op.beparams:
5148
        self.proc.LogWarning("Overridden parameters are ignored")
5149
    else:
5150
      _CheckNodeOnline(self, instance.primary_node)
5151

    
5152
      bep = self.cfg.GetClusterInfo().FillBE(instance)
5153

    
5154
      # check bridges existence
5155
      _CheckInstanceBridgesExist(self, instance)
5156

    
5157
      remote_info = self.rpc.call_instance_info(instance.primary_node,
5158
                                                instance.name,
5159
                                                instance.hypervisor)
5160
      remote_info.Raise("Error checking node %s" % instance.primary_node,
5161
                        prereq=True, ecode=errors.ECODE_ENVIRON)
5162
      if not remote_info.payload: # not running already
5163
        _CheckNodeFreeMemory(self, instance.primary_node,
5164
                             "starting instance %s" % instance.name,
5165
                             bep[constants.BE_MEMORY], instance.hypervisor)
5166

    
5167
  def Exec(self, feedback_fn):
5168
    """Start the instance.
5169

5170
    """
5171
    instance = self.instance
5172
    force = self.op.force
5173

    
5174
    self.cfg.MarkInstanceUp(instance.name)
5175

    
5176
    if self.primary_offline:
5177
      assert self.op.ignore_offline_nodes
5178
      self.proc.LogInfo("Primary node offline, marked instance as started")
5179
    else:
5180
      node_current = instance.primary_node
5181

    
5182
      _StartInstanceDisks(self, instance, force)
5183

    
5184
      result = self.rpc.call_instance_start(node_current, instance,
5185
                                            self.op.hvparams, self.op.beparams)
5186
      msg = result.fail_msg
5187
      if msg:
5188
        _ShutdownInstanceDisks(self, instance)
5189
        raise errors.OpExecError("Could not start instance: %s" % msg)
5190

    
5191

    
5192
class LUInstanceReboot(LogicalUnit):
5193
  """Reboot an instance.
5194

5195
  """
5196
  HPATH = "instance-reboot"
5197
  HTYPE = constants.HTYPE_INSTANCE
5198
  REQ_BGL = False
5199

    
5200
  def ExpandNames(self):
5201
    self._ExpandAndLockInstance()
5202

    
5203
  def BuildHooksEnv(self):
5204
    """Build hooks env.
5205

5206
    This runs on master, primary and secondary nodes of the instance.
5207

5208
    """
5209
    env = {
5210
      "IGNORE_SECONDARIES": self.op.ignore_secondaries,
5211
      "REBOOT_TYPE": self.op.reboot_type,
5212
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
5213
      }
5214
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
5215
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5216
    return env, nl, nl
5217

    
5218
  def CheckPrereq(self):
5219
    """Check prerequisites.
5220

5221
    This checks that the instance is in the cluster.
5222

5223
    """
5224
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5225
    assert self.instance is not None, \
5226
      "Cannot retrieve locked instance %s" % self.op.instance_name
5227

    
5228
    _CheckNodeOnline(self, instance.primary_node)
5229

    
5230
    # check bridges existence
5231
    _CheckInstanceBridgesExist(self, instance)
5232

    
5233
  def Exec(self, feedback_fn):
5234
    """Reboot the instance.
5235

5236
    """
5237
    instance = self.instance
5238
    ignore_secondaries = self.op.ignore_secondaries
5239
    reboot_type = self.op.reboot_type
5240

    
5241
    remote_info = self.rpc.call_instance_info(instance.primary_node,
5242
                                              instance.name,
5243
                                              instance.hypervisor)
5244
    remote_info.Raise("Error checking node %s" % instance.primary_node)
5245
    instance_running = bool(remote_info.payload)
5246

    
5247
    node_current = instance.primary_node
5248

    
5249
    if instance_running and reboot_type in [constants.INSTANCE_REBOOT_SOFT,
5250
                                            constants.INSTANCE_REBOOT_HARD]:
5251
      for disk in instance.disks:
5252
        self.cfg.SetDiskID(disk, node_current)
5253
      result = self.rpc.call_instance_reboot(node_current, instance,
5254
                                             reboot_type,
5255
                                             self.op.shutdown_timeout)
5256
      result.Raise("Could not reboot instance")
5257
    else:
5258
      if instance_running:
5259
        result = self.rpc.call_instance_shutdown(node_current, instance,
5260
                                                 self.op.shutdown_timeout)
5261
        result.Raise("Could not shutdown instance for full reboot")
5262
        _ShutdownInstanceDisks(self, instance)
5263
      else:
5264
        self.LogInfo("Instance %s was already stopped, starting now",
5265
                     instance.name)
5266
      _StartInstanceDisks(self, instance, ignore_secondaries)
5267
      result = self.rpc.call_instance_start(node_current, instance, None, None)
5268
      msg = result.fail_msg
5269
      if msg:
5270
        _ShutdownInstanceDisks(self, instance)
5271
        raise errors.OpExecError("Could not start instance for"
5272
                                 " full reboot: %s" % msg)
5273

    
5274
    self.cfg.MarkInstanceUp(instance.name)
5275

    
5276

    
5277
class LUInstanceShutdown(LogicalUnit):
5278
  """Shutdown an instance.
5279

5280
  """
5281
  HPATH = "instance-stop"
5282
  HTYPE = constants.HTYPE_INSTANCE
5283
  REQ_BGL = False
5284

    
5285
  def ExpandNames(self):
5286
    self._ExpandAndLockInstance()
5287

    
5288
  def BuildHooksEnv(self):
5289
    """Build hooks env.
5290

5291
    This runs on master, primary and secondary nodes of the instance.
5292

5293
    """
5294
    env = _BuildInstanceHookEnvByObject(self, self.instance)
5295
    env["TIMEOUT"] = self.op.timeout
5296
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5297
    return env, nl, nl
5298

    
5299
  def CheckPrereq(self):
5300
    """Check prerequisites.
5301

5302
    This checks that the instance is in the cluster.
5303

5304
    """
5305
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5306
    assert self.instance is not None, \
5307
      "Cannot retrieve locked instance %s" % self.op.instance_name
5308

    
5309
    self.primary_offline = \
5310
      self.cfg.GetNodeInfo(self.instance.primary_node).offline
5311

    
5312
    if self.primary_offline and self.op.ignore_offline_nodes:
5313
      self.proc.LogWarning("Ignoring offline primary node")
5314
    else:
5315
      _CheckNodeOnline(self, self.instance.primary_node)
5316

    
5317
  def Exec(self, feedback_fn):
5318
    """Shutdown the instance.
5319

5320
    """
5321
    instance = self.instance
5322
    node_current = instance.primary_node
5323
    timeout = self.op.timeout
5324

    
5325
    self.cfg.MarkInstanceDown(instance.name)
5326

    
5327
    if self.primary_offline:
5328
      assert self.op.ignore_offline_nodes
5329
      self.proc.LogInfo("Primary node offline, marked instance as stopped")
5330
    else:
5331
      result = self.rpc.call_instance_shutdown(node_current, instance, timeout)
5332
      msg = result.fail_msg
5333
      if msg:
5334
        self.proc.LogWarning("Could not shutdown instance: %s" % msg)
5335

    
5336
      _ShutdownInstanceDisks(self, instance)
5337

    
5338

    
5339
class LUInstanceReinstall(LogicalUnit):
5340
  """Reinstall an instance.
5341

5342
  """
5343
  HPATH = "instance-reinstall"
5344
  HTYPE = constants.HTYPE_INSTANCE
5345
  REQ_BGL = False
5346

    
5347
  def ExpandNames(self):
5348
    self._ExpandAndLockInstance()
5349

    
5350
  def BuildHooksEnv(self):
5351
    """Build hooks env.
5352

5353
    This runs on master, primary and secondary nodes of the instance.
5354

5355
    """
5356
    env = _BuildInstanceHookEnvByObject(self, self.instance)
5357
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5358
    return env, nl, nl
5359

    
5360
  def CheckPrereq(self):
5361
    """Check prerequisites.
5362

5363
    This checks that the instance is in the cluster and is not running.
5364

5365
    """
5366
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5367
    assert instance is not None, \
5368
      "Cannot retrieve locked instance %s" % self.op.instance_name
5369
    _CheckNodeOnline(self, instance.primary_node, "Instance primary node"
5370
                     " offline, cannot reinstall")
5371
    for node in instance.secondary_nodes:
5372
      _CheckNodeOnline(self, node, "Instance secondary node offline,"
5373
                       " cannot reinstall")
5374

    
5375
    if instance.disk_template == constants.DT_DISKLESS:
5376
      raise errors.OpPrereqError("Instance '%s' has no disks" %
5377
                                 self.op.instance_name,
5378
                                 errors.ECODE_INVAL)
5379
    _CheckInstanceDown(self, instance, "cannot reinstall")
5380

    
5381
    if self.op.os_type is not None:
5382
      # OS verification
5383
      pnode = _ExpandNodeName(self.cfg, instance.primary_node)
5384
      _CheckNodeHasOS(self, pnode, self.op.os_type, self.op.force_variant)
5385
      instance_os = self.op.os_type
5386
    else:
5387
      instance_os = instance.os
5388

    
5389
    nodelist = list(instance.all_nodes)
5390

    
5391
    if self.op.osparams:
5392
      i_osdict = _GetUpdatedParams(instance.osparams, self.op.osparams)
5393
      _CheckOSParams(self, True, nodelist, instance_os, i_osdict)
5394
      self.os_inst = i_osdict # the new dict (without defaults)
5395
    else:
5396
      self.os_inst = None
5397

    
5398
    self.instance = instance
5399

    
5400
  def Exec(self, feedback_fn):
5401
    """Reinstall the instance.
5402

5403
    """
5404
    inst = self.instance
5405

    
5406
    if self.op.os_type is not None:
5407
      feedback_fn("Changing OS to '%s'..." % self.op.os_type)
5408
      inst.os = self.op.os_type
5409
      # Write to configuration
5410
      self.cfg.Update(inst, feedback_fn)
5411

    
5412
    _StartInstanceDisks(self, inst, None)
5413
    try:
5414
      feedback_fn("Running the instance OS create scripts...")
5415
      # FIXME: pass debug option from opcode to backend
5416
      result = self.rpc.call_instance_os_add(inst.primary_node, inst, True,
5417
                                             self.op.debug_level,
5418
                                             osparams=self.os_inst)
5419
      result.Raise("Could not install OS for instance %s on node %s" %
5420
                   (inst.name, inst.primary_node))
5421
    finally:
5422
      _ShutdownInstanceDisks(self, inst)
5423

    
5424

    
5425
class LUInstanceRecreateDisks(LogicalUnit):
5426
  """Recreate an instance's missing disks.
5427

5428
  """
5429
  HPATH = "instance-recreate-disks"
5430
  HTYPE = constants.HTYPE_INSTANCE
5431
  REQ_BGL = False
5432

    
5433
  def ExpandNames(self):
5434
    self._ExpandAndLockInstance()
5435

    
5436
  def BuildHooksEnv(self):
5437
    """Build hooks env.
5438

5439
    This runs on master, primary and secondary nodes of the instance.
5440

5441
    """
5442
    env = _BuildInstanceHookEnvByObject(self, self.instance)
5443
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5444
    return env, nl, nl
5445

    
5446
  def CheckPrereq(self):
5447
    """Check prerequisites.
5448

5449
    This checks that the instance is in the cluster and is not running.
5450

5451
    """
5452
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5453
    assert instance is not None, \
5454
      "Cannot retrieve locked instance %s" % self.op.instance_name
5455
    _CheckNodeOnline(self, instance.primary_node)
5456

    
5457
    if instance.disk_template == constants.DT_DISKLESS:
5458
      raise errors.OpPrereqError("Instance '%s' has no disks" %
5459
                                 self.op.instance_name, errors.ECODE_INVAL)
5460
    _CheckInstanceDown(self, instance, "cannot recreate disks")
5461

    
5462
    if not self.op.disks:
5463
      self.op.disks = range(len(instance.disks))
5464
    else:
5465
      for idx in self.op.disks:
5466
        if idx >= len(instance.disks):
5467
          raise errors.OpPrereqError("Invalid disk index passed '%s'" % idx,
5468
                                     errors.ECODE_INVAL)
5469

    
5470
    self.instance = instance
5471

    
5472
  def Exec(self, feedback_fn):
5473
    """Recreate the disks.
5474

5475
    """
5476
    to_skip = []
5477
    for idx, _ in enumerate(self.instance.disks):
5478
      if idx not in self.op.disks: # disk idx has not been passed in
5479
        to_skip.append(idx)
5480
        continue
5481

    
5482
    _CreateDisks(self, self.instance, to_skip=to_skip)
5483

    
5484

    
5485
class LUInstanceRename(LogicalUnit):
5486
  """Rename an instance.
5487

5488
  """
5489
  HPATH = "instance-rename"
5490
  HTYPE = constants.HTYPE_INSTANCE
5491

    
5492
  def CheckArguments(self):
5493
    """Check arguments.
5494

5495
    """
5496
    if self.op.ip_check and not self.op.name_check:
5497
      # TODO: make the ip check more flexible and not depend on the name check
5498
      raise errors.OpPrereqError("Cannot do ip check without a name check",
5499
                                 errors.ECODE_INVAL)
5500

    
5501
  def BuildHooksEnv(self):
5502
    """Build hooks env.
5503

5504
    This runs on master, primary and secondary nodes of the instance.
5505

5506
    """
5507
    env = _BuildInstanceHookEnvByObject(self, self.instance)
5508
    env["INSTANCE_NEW_NAME"] = self.op.new_name
5509
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
5510
    return env, nl, nl
5511

    
5512
  def CheckPrereq(self):
5513
    """Check prerequisites.
5514

5515
    This checks that the instance is in the cluster and is not running.
5516

5517
    """
5518
    self.op.instance_name = _ExpandInstanceName(self.cfg,
5519
                                                self.op.instance_name)
5520
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5521
    assert instance is not None
5522
    _CheckNodeOnline(self, instance.primary_node)
5523
    _CheckInstanceDown(self, instance, "cannot rename")
5524
    self.instance = instance
5525

    
5526
    new_name = self.op.new_name
5527
    if self.op.name_check:
5528
      hostname = netutils.GetHostname(name=new_name)
5529
      self.LogInfo("Resolved given name '%s' to '%s'", new_name,
5530
                   hostname.name)
5531
      if not utils.MatchNameComponent(self.op.new_name, [hostname.name]):
5532
        raise errors.OpPrereqError(("Resolved hostname '%s' does not look the"
5533
                                    " same as given hostname '%s'") %
5534
                                    (hostname.name, self.op.new_name),
5535
                                    errors.ECODE_INVAL)
5536
      new_name = self.op.new_name = hostname.name
5537
      if (self.op.ip_check and
5538
          netutils.TcpPing(hostname.ip, constants.DEFAULT_NODED_PORT)):
5539
        raise errors.OpPrereqError("IP %s of instance %s already in use" %
5540
                                   (hostname.ip, new_name),
5541
                                   errors.ECODE_NOTUNIQUE)
5542

    
5543
    instance_list = self.cfg.GetInstanceList()
5544
    if new_name in instance_list and new_name != instance.name:
5545
      raise errors.OpPrereqError("Instance '%s' is already in the cluster" %
5546
                                 new_name, errors.ECODE_EXISTS)
5547

    
5548
  def Exec(self, feedback_fn):
5549
    """Rename the instance.
5550

5551
    """
5552
    inst = self.instance
5553
    old_name = inst.name
5554

    
5555
    rename_file_storage = False
5556
    if (inst.disk_template in (constants.DT_FILE, constants.DT_SHARED_FILE) and
5557
        self.op.new_name != inst.name):
5558
      old_file_storage_dir = os.path.dirname(inst.disks[0].logical_id[1])
5559
      rename_file_storage = True
5560

    
5561
    self.cfg.RenameInstance(inst.name, self.op.new_name)
5562
    # Change the instance lock. This is definitely safe while we hold the BGL
5563
    self.context.glm.remove(locking.LEVEL_INSTANCE, old_name)
5564
    self.context.glm.add(locking.LEVEL_INSTANCE, self.op.new_name)
5565

    
5566
    # re-read the instance from the configuration after rename
5567
    inst = self.cfg.GetInstanceInfo(self.op.new_name)
5568

    
5569
    if rename_file_storage:
5570
      new_file_storage_dir = os.path.dirname(inst.disks[0].logical_id[1])
5571
      result = self.rpc.call_file_storage_dir_rename(inst.primary_node,
5572
                                                     old_file_storage_dir,
5573
                                                     new_file_storage_dir)
5574
      result.Raise("Could not rename on node %s directory '%s' to '%s'"
5575
                   " (but the instance has been renamed in Ganeti)" %
5576
                   (inst.primary_node, old_file_storage_dir,
5577
                    new_file_storage_dir))
5578

    
5579
    _StartInstanceDisks(self, inst, None)
5580
    try:
5581
      result = self.rpc.call_instance_run_rename(inst.primary_node, inst,
5582
                                                 old_name, self.op.debug_level)
5583
      msg = result.fail_msg
5584
      if msg:
5585
        msg = ("Could not run OS rename script for instance %s on node %s"
5586
               " (but the instance has been renamed in Ganeti): %s" %
5587
               (inst.name, inst.primary_node, msg))
5588
        self.proc.LogWarning(msg)
5589
    finally:
5590
      _ShutdownInstanceDisks(self, inst)
5591

    
5592
    return inst.name
5593

    
5594

    
5595
class LUInstanceRemove(LogicalUnit):
5596
  """Remove an instance.
5597

5598
  """
5599
  HPATH = "instance-remove"
5600
  HTYPE = constants.HTYPE_INSTANCE
5601
  REQ_BGL = False
5602

    
5603
  def ExpandNames(self):
5604
    self._ExpandAndLockInstance()
5605
    self.needed_locks[locking.LEVEL_NODE] = []
5606
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5607

    
5608
  def DeclareLocks(self, level):
5609
    if level == locking.LEVEL_NODE:
5610
      self._LockInstancesNodes()
5611

    
5612
  def BuildHooksEnv(self):
5613
    """Build hooks env.
5614

5615
    This runs on master, primary and secondary nodes of the instance.
5616

5617
    """
5618
    env = _BuildInstanceHookEnvByObject(self, self.instance)
5619
    env["SHUTDOWN_TIMEOUT"] = self.op.shutdown_timeout
5620
    nl = [self.cfg.GetMasterNode()]
5621
    nl_post = list(self.instance.all_nodes) + nl
5622
    return env, nl, nl_post
5623

    
5624
  def CheckPrereq(self):
5625
    """Check prerequisites.
5626

5627
    This checks that the instance is in the cluster.
5628

5629
    """
5630
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5631
    assert self.instance is not None, \
5632
      "Cannot retrieve locked instance %s" % self.op.instance_name
5633

    
5634
  def Exec(self, feedback_fn):
5635
    """Remove the instance.
5636

5637
    """
5638
    instance = self.instance
5639
    logging.info("Shutting down instance %s on node %s",
5640
                 instance.name, instance.primary_node)
5641

    
5642
    result = self.rpc.call_instance_shutdown(instance.primary_node, instance,
5643
                                             self.op.shutdown_timeout)
5644
    msg = result.fail_msg
5645
    if msg:
5646
      if self.op.ignore_failures:
5647
        feedback_fn("Warning: can't shutdown instance: %s" % msg)
5648
      else:
5649
        raise errors.OpExecError("Could not shutdown instance %s on"
5650
                                 " node %s: %s" %
5651
                                 (instance.name, instance.primary_node, msg))
5652

    
5653
    _RemoveInstance(self, feedback_fn, instance, self.op.ignore_failures)
5654

    
5655

    
5656
def _RemoveInstance(lu, feedback_fn, instance, ignore_failures):
5657
  """Utility function to remove an instance.
5658

5659
  """
5660
  logging.info("Removing block devices for instance %s", instance.name)
5661

    
5662
  if not _RemoveDisks(lu, instance):
5663
    if not ignore_failures:
5664
      raise errors.OpExecError("Can't remove instance's disks")
5665
    feedback_fn("Warning: can't remove instance's disks")
5666

    
5667
  logging.info("Removing instance %s out of cluster config", instance.name)
5668

    
5669
  lu.cfg.RemoveInstance(instance.name)
5670

    
5671
  assert not lu.remove_locks.get(locking.LEVEL_INSTANCE), \
5672
    "Instance lock removal conflict"
5673

    
5674
  # Remove lock for the instance
5675
  lu.remove_locks[locking.LEVEL_INSTANCE] = instance.name
5676

    
5677

    
5678
class LUInstanceQuery(NoHooksLU):
5679
  """Logical unit for querying instances.
5680

5681
  """
5682
  # pylint: disable-msg=W0142
5683
  REQ_BGL = False
5684

    
5685
  def CheckArguments(self):
5686
    self.iq = _InstanceQuery(qlang.MakeSimpleFilter("name", self.op.names),
5687
                             self.op.output_fields, self.op.use_locking)
5688

    
5689
  def ExpandNames(self):
5690
    self.iq.ExpandNames(self)
5691

    
5692
  def DeclareLocks(self, level):
5693
    self.iq.DeclareLocks(self, level)
5694

    
5695
  def Exec(self, feedback_fn):
5696
    return self.iq.OldStyleQuery(self)
5697

    
5698

    
5699
class LUInstanceFailover(LogicalUnit):
5700
  """Failover an instance.
5701

5702
  """
5703
  HPATH = "instance-failover"
5704
  HTYPE = constants.HTYPE_INSTANCE
5705
  REQ_BGL = False
5706

    
5707
  def ExpandNames(self):
5708
    self._ExpandAndLockInstance()
5709
    self.needed_locks[locking.LEVEL_NODE] = []
5710
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5711

    
5712
  def DeclareLocks(self, level):
5713
    if level == locking.LEVEL_NODE:
5714
      self._LockInstancesNodes()
5715

    
5716
  def BuildHooksEnv(self):
5717
    """Build hooks env.
5718

5719
    This runs on master, primary and secondary nodes of the instance.
5720

5721
    """
5722
    instance = self.instance
5723
    source_node = instance.primary_node
5724
    target_node = instance.secondary_nodes[0]
5725
    env = {
5726
      "IGNORE_CONSISTENCY": self.op.ignore_consistency,
5727
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
5728
      "OLD_PRIMARY": source_node,
5729
      "OLD_SECONDARY": target_node,
5730
      "NEW_PRIMARY": target_node,
5731
      "NEW_SECONDARY": source_node,
5732
      }
5733
    env.update(_BuildInstanceHookEnvByObject(self, instance))
5734
    nl = [self.cfg.GetMasterNode()] + list(instance.secondary_nodes)
5735
    nl_post = list(nl)
5736
    nl_post.append(source_node)
5737
    return env, nl, nl_post
5738

    
5739
  def CheckPrereq(self):
5740
    """Check prerequisites.
5741

5742
    This checks that the instance is in the cluster.
5743

5744
    """
5745
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5746
    assert self.instance is not None, \
5747
      "Cannot retrieve locked instance %s" % self.op.instance_name
5748

    
5749
    bep = self.cfg.GetClusterInfo().FillBE(instance)
5750
    if instance.disk_template not in constants.DTS_NET_MIRROR:
5751
      raise errors.OpPrereqError("Instance's disk layout is not"
5752
                                 " network mirrored, cannot failover.",
5753
                                 errors.ECODE_STATE)
5754

    
5755
    secondary_nodes = instance.secondary_nodes
5756
    if not secondary_nodes:
5757
      raise errors.ProgrammerError("no secondary node but using "
5758
                                   "a mirrored disk template")
5759

    
5760
    target_node = secondary_nodes[0]
5761
    _CheckNodeOnline(self, target_node)
5762
    _CheckNodeNotDrained(self, target_node)
5763
    if instance.admin_up:
5764
      # check memory requirements on the secondary node
5765
      _CheckNodeFreeMemory(self, target_node, "failing over instance %s" %
5766
                           instance.name, bep[constants.BE_MEMORY],
5767
                           instance.hypervisor)
5768
    else:
5769
      self.LogInfo("Not checking memory on the secondary node as"
5770
                   " instance will not be started")
5771

    
5772
    # check bridge existance
5773
    _CheckInstanceBridgesExist(self, instance, node=target_node)
5774

    
5775
  def Exec(self, feedback_fn):
5776
    """Failover an instance.
5777

5778
    The failover is done by shutting it down on its present node and
5779
    starting it on the secondary.
5780

5781
    """
5782
    instance = self.instance
5783
    primary_node = self.cfg.GetNodeInfo(instance.primary_node)
5784

    
5785
    source_node = instance.primary_node
5786
    target_node = instance.secondary_nodes[0]
5787

    
5788
    if instance.admin_up:
5789
      feedback_fn("* checking disk consistency between source and target")
5790
      for dev in instance.disks:
5791
        # for drbd, these are drbd over lvm
5792
        if not _CheckDiskConsistency(self, dev, target_node, False):
5793
          if not self.op.ignore_consistency:
5794
            raise errors.OpExecError("Disk %s is degraded on target node,"
5795
                                     " aborting failover." % dev.iv_name)
5796
    else:
5797
      feedback_fn("* not checking disk consistency as instance is not running")
5798

    
5799
    feedback_fn("* shutting down instance on source node")
5800
    logging.info("Shutting down instance %s on node %s",
5801
                 instance.name, source_node)
5802

    
5803
    result = self.rpc.call_instance_shutdown(source_node, instance,
5804
                                             self.op.shutdown_timeout)
5805
    msg = result.fail_msg
5806
    if msg:
5807
      if self.op.ignore_consistency or primary_node.offline:
5808
        self.proc.LogWarning("Could not shutdown instance %s on node %s."
5809
                             " Proceeding anyway. Please make sure node"
5810
                             " %s is down. Error details: %s",
5811
                             instance.name, source_node, source_node, msg)
5812
      else:
5813
        raise errors.OpExecError("Could not shutdown instance %s on"
5814
                                 " node %s: %s" %
5815
                                 (instance.name, source_node, msg))
5816

    
5817
    feedback_fn("* deactivating the instance's disks on source node")
5818
    if not _ShutdownInstanceDisks(self, instance, ignore_primary=True):
5819
      raise errors.OpExecError("Can't shut down the instance's disks.")
5820

    
5821
    instance.primary_node = target_node
5822
    # distribute new instance config to the other nodes
5823
    self.cfg.Update(instance, feedback_fn)
5824

    
5825
    # Only start the instance if it's marked as up
5826
    if instance.admin_up:
5827
      feedback_fn("* activating the instance's disks on target node")
5828
      logging.info("Starting instance %s on node %s",
5829
                   instance.name, target_node)
5830

    
5831
      disks_ok, _ = _AssembleInstanceDisks(self, instance,
5832
                                           ignore_secondaries=True)
5833
      if not disks_ok:
5834
        _ShutdownInstanceDisks(self, instance)
5835
        raise errors.OpExecError("Can't activate the instance's disks")
5836

    
5837
      feedback_fn("* starting the instance on the target node")
5838
      result = self.rpc.call_instance_start(target_node, instance, None, None)
5839
      msg = result.fail_msg
5840
      if msg:
5841
        _ShutdownInstanceDisks(self, instance)
5842
        raise errors.OpExecError("Could not start instance %s on node %s: %s" %
5843
                                 (instance.name, target_node, msg))
5844

    
5845

    
5846
class LUInstanceMigrate(LogicalUnit):
5847
  """Migrate an instance.
5848

5849
  This is migration without shutting down, compared to the failover,
5850
  which is done with shutdown.
5851

5852
  """
5853
  HPATH = "instance-migrate"
5854
  HTYPE = constants.HTYPE_INSTANCE
5855
  REQ_BGL = False
5856

    
5857
  def ExpandNames(self):
5858
    self._ExpandAndLockInstance()
5859

    
5860
    self.needed_locks[locking.LEVEL_NODE] = []
5861
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5862

    
5863
    self._migrater = TLMigrateInstance(self, self.op.instance_name,
5864
                                       self.op.cleanup)
5865
    self.tasklets = [self._migrater]
5866

    
5867
  def DeclareLocks(self, level):
5868
    if level == locking.LEVEL_NODE:
5869
      self._LockInstancesNodes()
5870

    
5871
  def BuildHooksEnv(self):
5872
    """Build hooks env.
5873

5874
    This runs on master, primary and secondary nodes of the instance.
5875

5876
    """
5877
    instance = self._migrater.instance
5878
    source_node = instance.primary_node
5879
    target_node = instance.secondary_nodes[0]
5880
    env = _BuildInstanceHookEnvByObject(self, instance)
5881
    env["MIGRATE_LIVE"] = self._migrater.live
5882
    env["MIGRATE_CLEANUP"] = self.op.cleanup
5883
    env.update({
5884
        "OLD_PRIMARY": source_node,
5885
        "OLD_SECONDARY": target_node,
5886
        "NEW_PRIMARY": target_node,
5887
        "NEW_SECONDARY": source_node,
5888
        })
5889
    nl = [self.cfg.GetMasterNode()] + list(instance.secondary_nodes)
5890
    nl_post = list(nl)
5891
    nl_post.append(source_node)
5892
    return env, nl, nl_post
5893

    
5894

    
5895
class LUInstanceMove(LogicalUnit):
5896
  """Move an instance by data-copying.
5897

5898
  """
5899
  HPATH = "instance-move"
5900
  HTYPE = constants.HTYPE_INSTANCE
5901
  REQ_BGL = False
5902

    
5903
  def ExpandNames(self):
5904
    self._ExpandAndLockInstance()
5905
    target_node = _ExpandNodeName(self.cfg, self.op.target_node)
5906
    self.op.target_node = target_node
5907
    self.needed_locks[locking.LEVEL_NODE] = [target_node]
5908
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
5909

    
5910
  def DeclareLocks(self, level):
5911
    if level == locking.LEVEL_NODE:
5912
      self._LockInstancesNodes(primary_only=True)
5913

    
5914
  def BuildHooksEnv(self):
5915
    """Build hooks env.
5916

5917
    This runs on master, primary and secondary nodes of the instance.
5918

5919
    """
5920
    env = {
5921
      "TARGET_NODE": self.op.target_node,
5922
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
5923
      }
5924
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
5925
    nl = [self.cfg.GetMasterNode()] + [self.instance.primary_node,
5926
                                       self.op.target_node]
5927
    return env, nl, nl
5928

    
5929
  def CheckPrereq(self):
5930
    """Check prerequisites.
5931

5932
    This checks that the instance is in the cluster.
5933

5934
    """
5935
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5936
    assert self.instance is not None, \
5937
      "Cannot retrieve locked instance %s" % self.op.instance_name
5938

    
5939
    node = self.cfg.GetNodeInfo(self.op.target_node)
5940
    assert node is not None, \
5941
      "Cannot retrieve locked node %s" % self.op.target_node
5942

    
5943
    self.target_node = target_node = node.name
5944

    
5945
    if target_node == instance.primary_node:
5946
      raise errors.OpPrereqError("Instance %s is already on the node %s" %
5947
                                 (instance.name, target_node),
5948
                                 errors.ECODE_STATE)
5949

    
5950
    bep = self.cfg.GetClusterInfo().FillBE(instance)
5951

    
5952
    for idx, dsk in enumerate(instance.disks):
5953
      if dsk.dev_type not in (constants.LD_LV, constants.LD_FILE):
5954
        raise errors.OpPrereqError("Instance disk %d has a complex layout,"
5955
                                   " cannot copy" % idx, errors.ECODE_STATE)
5956

    
5957
    _CheckNodeOnline(self, target_node)
5958
    _CheckNodeNotDrained(self, target_node)
5959
    _CheckNodeVmCapable(self, target_node)
5960

    
5961
    if instance.admin_up:
5962
      # check memory requirements on the secondary node
5963
      _CheckNodeFreeMemory(self, target_node, "failing over instance %s" %
5964
                           instance.name, bep[constants.BE_MEMORY],
5965
                           instance.hypervisor)
5966
    else:
5967
      self.LogInfo("Not checking memory on the secondary node as"
5968
                   " instance will not be started")
5969

    
5970
    # check bridge existance
5971
    _CheckInstanceBridgesExist(self, instance, node=target_node)
5972

    
5973
  def Exec(self, feedback_fn):
5974
    """Move an instance.
5975

5976
    The move is done by shutting it down on its present node, copying
5977
    the data over (slow) and starting it on the new node.
5978

5979
    """
5980
    instance = self.instance
5981

    
5982
    source_node = instance.primary_node
5983
    target_node = self.target_node
5984

    
5985
    self.LogInfo("Shutting down instance %s on source node %s",
5986
                 instance.name, source_node)
5987

    
5988
    result = self.rpc.call_instance_shutdown(source_node, instance,
5989
                                             self.op.shutdown_timeout)
5990
    msg = result.fail_msg
5991
    if msg:
5992
      if self.op.ignore_consistency:
5993
        self.proc.LogWarning("Could not shutdown instance %s on node %s."
5994
                             " Proceeding anyway. Please make sure node"
5995
                             " %s is down. Error details: %s",
5996
                             instance.name, source_node, source_node, msg)
5997
      else:
5998
        raise errors.OpExecError("Could not shutdown instance %s on"
5999
                                 " node %s: %s" %
6000
                                 (instance.name, source_node, msg))
6001

    
6002
    # create the target disks
6003
    try:
6004
      _CreateDisks(self, instance, target_node=target_node)
6005
    except errors.OpExecError:
6006
      self.LogWarning("Device creation failed, reverting...")
6007
      try:
6008
        _RemoveDisks(self, instance, target_node=target_node)
6009
      finally:
6010
        self.cfg.ReleaseDRBDMinors(instance.name)
6011
        raise
6012

    
6013
    cluster_name = self.cfg.GetClusterInfo().cluster_name
6014

    
6015
    errs = []
6016
    # activate, get path, copy the data over
6017
    for idx, disk in enumerate(instance.disks):
6018
      self.LogInfo("Copying data for disk %d", idx)
6019
      result = self.rpc.call_blockdev_assemble(target_node, disk,
6020
                                               instance.name, True, idx)
6021
      if result.fail_msg:
6022
        self.LogWarning("Can't assemble newly created disk %d: %s",
6023
                        idx, result.fail_msg)
6024
        errs.append(result.fail_msg)
6025
        break
6026
      dev_path = result.payload
6027
      result = self.rpc.call_blockdev_export(source_node, disk,
6028
                                             target_node, dev_path,
6029
                                             cluster_name)
6030
      if result.fail_msg:
6031
        self.LogWarning("Can't copy data over for disk %d: %s",
6032
                        idx, result.fail_msg)
6033
        errs.append(result.fail_msg)
6034
        break
6035

    
6036
    if errs:
6037
      self.LogWarning("Some disks failed to copy, aborting")
6038
      try:
6039
        _RemoveDisks(self, instance, target_node=target_node)
6040
      finally:
6041
        self.cfg.ReleaseDRBDMinors(instance.name)
6042
        raise errors.OpExecError("Errors during disk copy: %s" %
6043
                                 (",".join(errs),))
6044

    
6045
    instance.primary_node = target_node
6046
    self.cfg.Update(instance, feedback_fn)
6047

    
6048
    self.LogInfo("Removing the disks on the original node")
6049
    _RemoveDisks(self, instance, target_node=source_node)
6050

    
6051
    # Only start the instance if it's marked as up
6052
    if instance.admin_up:
6053
      self.LogInfo("Starting instance %s on node %s",
6054
                   instance.name, target_node)
6055

    
6056
      disks_ok, _ = _AssembleInstanceDisks(self, instance,
6057
                                           ignore_secondaries=True)
6058
      if not disks_ok:
6059
        _ShutdownInstanceDisks(self, instance)
6060
        raise errors.OpExecError("Can't activate the instance's disks")
6061

    
6062
      result = self.rpc.call_instance_start(target_node, instance, None, None)
6063
      msg = result.fail_msg
6064
      if msg:
6065
        _ShutdownInstanceDisks(self, instance)
6066
        raise errors.OpExecError("Could not start instance %s on node %s: %s" %
6067
                                 (instance.name, target_node, msg))
6068

    
6069

    
6070
class LUNodeMigrate(LogicalUnit):
6071
  """Migrate all instances from a node.
6072

6073
  """
6074
  HPATH = "node-migrate"
6075
  HTYPE = constants.HTYPE_NODE
6076
  REQ_BGL = False
6077

    
6078
  def ExpandNames(self):
6079
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
6080

    
6081
    self.needed_locks = {
6082
      locking.LEVEL_NODE: [self.op.node_name],
6083
      }
6084

    
6085
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
6086

    
6087
    # Create tasklets for migrating instances for all instances on this node
6088
    names = []
6089
    tasklets = []
6090

    
6091
    for inst in _GetNodePrimaryInstances(self.cfg, self.op.node_name):
6092
      logging.debug("Migrating instance %s", inst.name)
6093
      names.append(inst.name)
6094

    
6095
      tasklets.append(TLMigrateInstance(self, inst.name, False))
6096

    
6097
    self.tasklets = tasklets
6098

    
6099
    # Declare instance locks
6100
    self.needed_locks[locking.LEVEL_INSTANCE] = names
6101

    
6102
  def DeclareLocks(self, level):
6103
    if level == locking.LEVEL_NODE:
6104
      self._LockInstancesNodes()
6105

    
6106
  def BuildHooksEnv(self):
6107
    """Build hooks env.
6108

6109
    This runs on the master, the primary and all the secondaries.
6110

6111
    """
6112
    env = {
6113
      "NODE_NAME": self.op.node_name,
6114
      }
6115

    
6116
    nl = [self.cfg.GetMasterNode()]
6117

    
6118
    return (env, nl, nl)
6119

    
6120

    
6121
class TLMigrateInstance(Tasklet):
6122
  """Tasklet class for instance migration.
6123

6124
  @type live: boolean
6125
  @ivar live: whether the migration will be done live or non-live;
6126
      this variable is initalized only after CheckPrereq has run
6127

6128
  """
6129
  def __init__(self, lu, instance_name, cleanup):
6130
    """Initializes this class.
6131

6132
    """
6133
    Tasklet.__init__(self, lu)
6134

    
6135
    # Parameters
6136
    self.instance_name = instance_name
6137
    self.cleanup = cleanup
6138
    self.live = False # will be overridden later
6139

    
6140
  def CheckPrereq(self):
6141
    """Check prerequisites.
6142

6143
    This checks that the instance is in the cluster.
6144

6145
    """
6146
    instance_name = _ExpandInstanceName(self.lu.cfg, self.instance_name)
6147
    instance = self.cfg.GetInstanceInfo(instance_name)
6148
    assert instance is not None
6149

    
6150
    if instance.disk_template != constants.DT_DRBD8:
6151
      raise errors.OpPrereqError("Instance's disk layout is not"
6152
                                 " drbd8, cannot migrate.", errors.ECODE_STATE)
6153

    
6154
    secondary_nodes = instance.secondary_nodes
6155
    if not secondary_nodes:
6156
      raise errors.ConfigurationError("No secondary node but using"
6157
                                      " drbd8 disk template")
6158

    
6159
    i_be = self.cfg.GetClusterInfo().FillBE(instance)
6160

    
6161
    target_node = secondary_nodes[0]
6162
    # check memory requirements on the secondary node
6163
    _CheckNodeFreeMemory(self.lu, target_node, "migrating instance %s" %
6164
                         instance.name, i_be[constants.BE_MEMORY],
6165
                         instance.hypervisor)
6166

    
6167
    # check bridge existance
6168
    _CheckInstanceBridgesExist(self.lu, instance, node=target_node)
6169

    
6170
    if not self.cleanup:
6171
      _CheckNodeNotDrained(self.lu, target_node)
6172
      result = self.rpc.call_instance_migratable(instance.primary_node,
6173
                                                 instance)
6174
      result.Raise("Can't migrate, please use failover",
6175
                   prereq=True, ecode=errors.ECODE_STATE)
6176

    
6177
    self.instance = instance
6178

    
6179
    if self.lu.op.live is not None and self.lu.op.mode is not None:
6180
      raise errors.OpPrereqError("Only one of the 'live' and 'mode'"
6181
                                 " parameters are accepted",
6182
                                 errors.ECODE_INVAL)
6183
    if self.lu.op.live is not None:
6184
      if self.lu.op.live:
6185
        self.lu.op.mode = constants.HT_MIGRATION_LIVE
6186
      else:
6187
        self.lu.op.mode = constants.HT_MIGRATION_NONLIVE
6188
      # reset the 'live' parameter to None so that repeated
6189
      # invocations of CheckPrereq do not raise an exception
6190
      self.lu.op.live = None
6191
    elif self.lu.op.mode is None:
6192
      # read the default value from the hypervisor
6193
      i_hv = self.cfg.GetClusterInfo().FillHV(instance, skip_globals=False)
6194
      self.lu.op.mode = i_hv[constants.HV_MIGRATION_MODE]
6195

    
6196
    self.live = self.lu.op.mode == constants.HT_MIGRATION_LIVE
6197

    
6198
  def _WaitUntilSync(self):
6199
    """Poll with custom rpc for disk sync.
6200

6201
    This uses our own step-based rpc call.
6202

6203
    """
6204
    self.feedback_fn("* wait until resync is done")
6205
    all_done = False
6206
    while not all_done:
6207
      all_done = True
6208
      result = self.rpc.call_drbd_wait_sync(self.all_nodes,
6209
                                            self.nodes_ip,
6210
                                            self.instance.disks)
6211
      min_percent = 100
6212
      for node, nres in result.items():
6213
        nres.Raise("Cannot resync disks on node %s" % node)
6214
        node_done, node_percent = nres.payload
6215
        all_done = all_done and node_done
6216
        if node_percent is not None:
6217
          min_percent = min(min_percent, node_percent)
6218
      if not all_done:
6219
        if min_percent < 100:
6220
          self.feedback_fn("   - progress: %.1f%%" % min_percent)
6221
        time.sleep(2)
6222

    
6223
  def _EnsureSecondary(self, node):
6224
    """Demote a node to secondary.
6225

6226
    """
6227
    self.feedback_fn("* switching node %s to secondary mode" % node)
6228

    
6229
    for dev in self.instance.disks:
6230
      self.cfg.SetDiskID(dev, node)
6231

    
6232
    result = self.rpc.call_blockdev_close(node, self.instance.name,
6233
                                          self.instance.disks)
6234
    result.Raise("Cannot change disk to secondary on node %s" % node)
6235

    
6236
  def _GoStandalone(self):
6237
    """Disconnect from the network.
6238

6239
    """
6240
    self.feedback_fn("* changing into standalone mode")
6241
    result = self.rpc.call_drbd_disconnect_net(self.all_nodes, self.nodes_ip,
6242
                                               self.instance.disks)
6243
    for node, nres in result.items():
6244
      nres.Raise("Cannot disconnect disks node %s" % node)
6245

    
6246
  def _GoReconnect(self, multimaster):
6247
    """Reconnect to the network.
6248

6249
    """
6250
    if multimaster:
6251
      msg = "dual-master"
6252
    else:
6253
      msg = "single-master"
6254
    self.feedback_fn("* changing disks into %s mode" % msg)
6255
    result = self.rpc.call_drbd_attach_net(self.all_nodes, self.nodes_ip,
6256
                                           self.instance.disks,
6257
                                           self.instance.name, multimaster)
6258
    for node, nres in result.items():
6259
      nres.Raise("Cannot change disks config on node %s" % node)
6260

    
6261
  def _ExecCleanup(self):
6262
    """Try to cleanup after a failed migration.
6263

6264
    The cleanup is done by:
6265
      - check that the instance is running only on one node
6266
        (and update the config if needed)
6267
      - change disks on its secondary node to secondary
6268
      - wait until disks are fully synchronized
6269
      - disconnect from the network
6270
      - change disks into single-master mode
6271
      - wait again until disks are fully synchronized
6272

6273
    """
6274
    instance = self.instance
6275
    target_node = self.target_node
6276
    source_node = self.source_node
6277

    
6278
    # check running on only one node
6279
    self.feedback_fn("* checking where the instance actually runs"
6280
                     " (if this hangs, the hypervisor might be in"
6281
                     " a bad state)")
6282
    ins_l = self.rpc.call_instance_list(self.all_nodes, [instance.hypervisor])
6283
    for node, result in ins_l.items():
6284
      result.Raise("Can't contact node %s" % node)
6285

    
6286
    runningon_source = instance.name in ins_l[source_node].payload
6287
    runningon_target = instance.name in ins_l[target_node].payload
6288

    
6289
    if runningon_source and runningon_target:
6290
      raise errors.OpExecError("Instance seems to be running on two nodes,"
6291
                               " or the hypervisor is confused. You will have"
6292
                               " to ensure manually that it runs only on one"
6293
                               " and restart this operation.")
6294

    
6295
    if not (runningon_source or runningon_target):
6296
      raise errors.OpExecError("Instance does not seem to be running at all."
6297
                               " In this case, it's safer to repair by"
6298
                               " running 'gnt-instance stop' to ensure disk"
6299
                               " shutdown, and then restarting it.")
6300

    
6301
    if runningon_target:
6302
      # the migration has actually succeeded, we need to update the config
6303
      self.feedback_fn("* instance running on secondary node (%s),"
6304
                       " updating config" % target_node)
6305
      instance.primary_node = target_node
6306
      self.cfg.Update(instance, self.feedback_fn)
6307
      demoted_node = source_node
6308
    else:
6309
      self.feedback_fn("* instance confirmed to be running on its"
6310
                       " primary node (%s)" % source_node)
6311
      demoted_node = target_node
6312

    
6313
    self._EnsureSecondary(demoted_node)
6314
    try:
6315
      self._WaitUntilSync()
6316
    except errors.OpExecError:
6317
      # we ignore here errors, since if the device is standalone, it
6318
      # won't be able to sync
6319
      pass
6320
    self._GoStandalone()
6321
    self._GoReconnect(False)
6322
    self._WaitUntilSync()
6323

    
6324
    self.feedback_fn("* done")
6325

    
6326
  def _RevertDiskStatus(self):
6327
    """Try to revert the disk status after a failed migration.
6328

6329
    """
6330
    target_node = self.target_node
6331
    try:
6332
      self._EnsureSecondary(target_node)
6333
      self._GoStandalone()
6334
      self._GoReconnect(False)
6335
      self._WaitUntilSync()
6336
    except errors.OpExecError, err:
6337
      self.lu.LogWarning("Migration failed and I can't reconnect the"
6338
                         " drives: error '%s'\n"
6339
                         "Please look and recover the instance status" %
6340
                         str(err))
6341

    
6342
  def _AbortMigration(self):
6343
    """Call the hypervisor code to abort a started migration.
6344

6345
    """
6346
    instance = self.instance
6347
    target_node = self.target_node
6348
    migration_info = self.migration_info
6349

    
6350
    abort_result = self.rpc.call_finalize_migration(target_node,
6351
                                                    instance,
6352
                                                    migration_info,
6353
                                                    False)
6354
    abort_msg = abort_result.fail_msg
6355
    if abort_msg:
6356
      logging.error("Aborting migration failed on target node %s: %s",
6357
                    target_node, abort_msg)
6358
      # Don't raise an exception here, as we stil have to try to revert the
6359
      # disk status, even if this step failed.
6360

    
6361
  def _ExecMigration(self):
6362
    """Migrate an instance.
6363

6364
    The migrate is done by:
6365
      - change the disks into dual-master mode
6366
      - wait until disks are fully synchronized again
6367
      - migrate the instance
6368
      - change disks on the new secondary node (the old primary) to secondary
6369
      - wait until disks are fully synchronized
6370
      - change disks into single-master mode
6371

6372
    """
6373
    instance = self.instance
6374
    target_node = self.target_node
6375
    source_node = self.source_node
6376

    
6377
    self.feedback_fn("* checking disk consistency between source and target")
6378
    for dev in instance.disks:
6379
      if not _CheckDiskConsistency(self.lu, dev, target_node, False):
6380
        raise errors.OpExecError("Disk %s is degraded or not fully"
6381
                                 " synchronized on target node,"
6382
                                 " aborting migrate." % dev.iv_name)
6383

    
6384
    # First get the migration information from the remote node
6385
    result = self.rpc.call_migration_info(source_node, instance)
6386
    msg = result.fail_msg
6387
    if msg:
6388
      log_err = ("Failed fetching source migration information from %s: %s" %
6389
                 (source_node, msg))
6390
      logging.error(log_err)
6391
      raise errors.OpExecError(log_err)
6392

    
6393
    self.migration_info = migration_info = result.payload
6394

    
6395
    # Then switch the disks to master/master mode
6396
    self._EnsureSecondary(target_node)
6397
    self._GoStandalone()
6398
    self._GoReconnect(True)
6399
    self._WaitUntilSync()
6400

    
6401
    self.feedback_fn("* preparing %s to accept the instance" % target_node)
6402
    result = self.rpc.call_accept_instance(target_node,
6403
                                           instance,
6404
                                           migration_info,
6405
                                           self.nodes_ip[target_node])
6406

    
6407
    msg = result.fail_msg
6408
    if msg:
6409
      logging.error("Instance pre-migration failed, trying to revert"
6410
                    " disk status: %s", msg)
6411
      self.feedback_fn("Pre-migration failed, aborting")
6412
      self._AbortMigration()
6413
      self._RevertDiskStatus()
6414
      raise errors.OpExecError("Could not pre-migrate instance %s: %s" %
6415
                               (instance.name, msg))
6416

    
6417
    self.feedback_fn("* migrating instance to %s" % target_node)
6418
    time.sleep(10)
6419
    result = self.rpc.call_instance_migrate(source_node, instance,
6420
                                            self.nodes_ip[target_node],
6421
                                            self.live)
6422
    msg = result.fail_msg
6423
    if msg:
6424
      logging.error("Instance migration failed, trying to revert"
6425
                    " disk status: %s", msg)
6426
      self.feedback_fn("Migration failed, aborting")
6427
      self._AbortMigration()
6428
      self._RevertDiskStatus()
6429
      raise errors.OpExecError("Could not migrate instance %s: %s" %
6430
                               (instance.name, msg))
6431
    time.sleep(10)
6432

    
6433
    instance.primary_node = target_node
6434
    # distribute new instance config to the other nodes
6435
    self.cfg.Update(instance, self.feedback_fn)
6436

    
6437
    result = self.rpc.call_finalize_migration(target_node,
6438
                                              instance,
6439
                                              migration_info,
6440
                                              True)
6441
    msg = result.fail_msg
6442
    if msg:
6443
      logging.error("Instance migration succeeded, but finalization failed:"
6444
                    " %s", msg)
6445
      raise errors.OpExecError("Could not finalize instance migration: %s" %
6446
                               msg)
6447

    
6448
    self._EnsureSecondary(source_node)
6449
    self._WaitUntilSync()
6450
    self._GoStandalone()
6451
    self._GoReconnect(False)
6452
    self._WaitUntilSync()
6453

    
6454
    self.feedback_fn("* done")
6455

    
6456
  def Exec(self, feedback_fn):
6457
    """Perform the migration.
6458

6459
    """
6460
    feedback_fn("Migrating instance %s" % self.instance.name)
6461

    
6462
    self.feedback_fn = feedback_fn
6463

    
6464
    self.source_node = self.instance.primary_node
6465
    self.target_node = self.instance.secondary_nodes[0]
6466
    self.all_nodes = [self.source_node, self.target_node]
6467
    self.nodes_ip = {
6468
      self.source_node: self.cfg.GetNodeInfo(self.source_node).secondary_ip,
6469
      self.target_node: self.cfg.GetNodeInfo(self.target_node).secondary_ip,
6470
      }
6471

    
6472
    if self.cleanup:
6473
      return self._ExecCleanup()
6474
    else:
6475
      return self._ExecMigration()
6476

    
6477

    
6478
def _CreateBlockDev(lu, node, instance, device, force_create,
6479
                    info, force_open):
6480
  """Create a tree of block devices on a given node.
6481

6482
  If this device type has to be created on secondaries, create it and
6483
  all its children.
6484

6485
  If not, just recurse to children keeping the same 'force' value.
6486

6487
  @param lu: the lu on whose behalf we execute
6488
  @param node: the node on which to create the device
6489
  @type instance: L{objects.Instance}
6490
  @param instance: the instance which owns the device
6491
  @type device: L{objects.Disk}
6492
  @param device: the device to create
6493
  @type force_create: boolean
6494
  @param force_create: whether to force creation of this device; this
6495
      will be change to True whenever we find a device which has
6496
      CreateOnSecondary() attribute
6497
  @param info: the extra 'metadata' we should attach to the device
6498
      (this will be represented as a LVM tag)
6499
  @type force_open: boolean
6500
  @param force_open: this parameter will be passes to the
6501
      L{backend.BlockdevCreate} function where it specifies
6502
      whether we run on primary or not, and it affects both
6503
      the child assembly and the device own Open() execution
6504

6505
  """
6506
  if device.CreateOnSecondary():
6507
    force_create = True
6508

    
6509
  if device.children:
6510
    for child in device.children:
6511
      _CreateBlockDev(lu, node, instance, child, force_create,
6512
                      info, force_open)
6513

    
6514
  if not force_create:
6515
    return
6516

    
6517
  _CreateSingleBlockDev(lu, node, instance, device, info, force_open)
6518

    
6519

    
6520
def _CreateSingleBlockDev(lu, node, instance, device, info, force_open):
6521
  """Create a single block device on a given node.
6522

6523
  This will not recurse over children of the device, so they must be
6524
  created in advance.
6525

6526
  @param lu: the lu on whose behalf we execute
6527
  @param node: the node on which to create the device
6528
  @type instance: L{objects.Instance}
6529
  @param instance: the instance which owns the device
6530
  @type device: L{objects.Disk}
6531
  @param device: the device to create
6532
  @param info: the extra 'metadata' we should attach to the device
6533
      (this will be represented as a LVM tag)
6534
  @type force_open: boolean
6535
  @param force_open: this parameter will be passes to the
6536
      L{backend.BlockdevCreate} function where it specifies
6537
      whether we run on primary or not, and it affects both
6538
      the child assembly and the device own Open() execution
6539

6540
  """
6541
  lu.cfg.SetDiskID(device, node)
6542
  result = lu.rpc.call_blockdev_create(node, device, device.size,
6543
                                       instance.name, force_open, info)
6544
  result.Raise("Can't create block device %s on"
6545
               " node %s for instance %s" % (device, node, instance.name))
6546
  if device.physical_id is None:
6547
    device.physical_id = result.payload
6548

    
6549

    
6550
def _GenerateUniqueNames(lu, exts):
6551
  """Generate a suitable LV name.
6552

6553
  This will generate a logical volume name for the given instance.
6554

6555
  """
6556
  results = []
6557
  for val in exts:
6558
    new_id = lu.cfg.GenerateUniqueID(lu.proc.GetECId())
6559
    results.append("%s%s" % (new_id, val))
6560
  return results
6561

    
6562

    
6563
def _GenerateDRBD8Branch(lu, primary, secondary, size, vgname, names, iv_name,
6564
                         p_minor, s_minor):
6565
  """Generate a drbd8 device complete with its children.
6566

6567
  """
6568
  port = lu.cfg.AllocatePort()
6569
  shared_secret = lu.cfg.GenerateDRBDSecret(lu.proc.GetECId())
6570
  dev_data = objects.Disk(dev_type=constants.LD_LV, size=size,
6571
                          logical_id=(vgname, names[0]))
6572
  dev_meta = objects.Disk(dev_type=constants.LD_LV, size=128,
6573
                          logical_id=(vgname, names[1]))
6574
  drbd_dev = objects.Disk(dev_type=constants.LD_DRBD8, size=size,
6575
                          logical_id=(primary, secondary, port,
6576
                                      p_minor, s_minor,
6577
                                      shared_secret),
6578
                          children=[dev_data, dev_meta],
6579
                          iv_name=iv_name)
6580
  return drbd_dev
6581

    
6582

    
6583
def _GenerateDiskTemplate(lu, template_name,
6584
                          instance_name, primary_node,
6585
                          secondary_nodes, disk_info,
6586
                          file_storage_dir, file_driver,
6587
                          base_index, feedback_fn):
6588
  """Generate the entire disk layout for a given template type.
6589

6590
  """
6591
  #TODO: compute space requirements
6592

    
6593
  vgname = lu.cfg.GetVGName()
6594
  disk_count = len(disk_info)
6595
  disks = []
6596
  if template_name == constants.DT_DISKLESS:
6597
    pass
6598
  elif template_name == constants.DT_PLAIN:
6599
    if len(secondary_nodes) != 0:
6600
      raise errors.ProgrammerError("Wrong template configuration")
6601

    
6602
    names = _GenerateUniqueNames(lu, [".disk%d" % (base_index + i)
6603
                                      for i in range(disk_count)])
6604
    for idx, disk in enumerate(disk_info):
6605
      disk_index = idx + base_index
6606
      vg = disk.get("vg", vgname)
6607
      feedback_fn("* disk %i, vg %s, name %s" % (idx, vg, names[idx]))
6608
      disk_dev = objects.Disk(dev_type=constants.LD_LV, size=disk["size"],
6609
                              logical_id=(vg, names[idx]),
6610
                              iv_name="disk/%d" % disk_index,
6611
                              mode=disk["mode"])
6612
      disks.append(disk_dev)
6613
  elif template_name == constants.DT_DRBD8:
6614
    if len(secondary_nodes) != 1:
6615
      raise errors.ProgrammerError("Wrong template configuration")
6616
    remote_node = secondary_nodes[0]
6617
    minors = lu.cfg.AllocateDRBDMinor(
6618
      [primary_node, remote_node] * len(disk_info), instance_name)
6619

    
6620
    names = []
6621
    for lv_prefix in _GenerateUniqueNames(lu, [".disk%d" % (base_index + i)
6622
                                               for i in range(disk_count)]):
6623
      names.append(lv_prefix + "_data")
6624
      names.append(lv_prefix + "_meta")
6625
    for idx, disk in enumerate(disk_info):
6626
      disk_index = idx + base_index
6627
      vg = disk.get("vg", vgname)
6628
      disk_dev = _GenerateDRBD8Branch(lu, primary_node, remote_node,
6629
                                      disk["size"], vg, names[idx*2:idx*2+2],
6630
                                      "disk/%d" % disk_index,
6631
                                      minors[idx*2], minors[idx*2+1])
6632
      disk_dev.mode = disk["mode"]
6633
      disks.append(disk_dev)
6634
  elif template_name == constants.DT_FILE:
6635
    if len(secondary_nodes) != 0:
6636
      raise errors.ProgrammerError("Wrong template configuration")
6637

    
6638
    opcodes.RequireFileStorage()
6639

    
6640
    for idx, disk in enumerate(disk_info):
6641
      disk_index = idx + base_index
6642
      disk_dev = objects.Disk(dev_type=constants.LD_FILE, size=disk["size"],
6643
                              iv_name="disk/%d" % disk_index,
6644
                              logical_id=(file_driver,
6645
                                          "%s/disk%d" % (file_storage_dir,
6646
                                                         disk_index)),
6647
                              mode=disk["mode"])
6648
      disks.append(disk_dev)
6649
  elif template_name == constants.DT_SHARED_FILE:
6650
    if len(secondary_nodes) != 0:
6651
      raise errors.ProgrammerError("Wrong template configuration")
6652

    
6653
    opcodes.RequireSharedFileStorage()
6654

    
6655
    for idx, disk in enumerate(disk_info):
6656
      disk_index = idx + base_index
6657
      disk_dev = objects.Disk(dev_type=constants.LD_FILE, size=disk["size"],
6658
                              iv_name="disk/%d" % disk_index,
6659
                              logical_id=(file_driver,
6660
                                          "%s/disk%d" % (file_storage_dir,
6661
                                                         disk_index)),
6662
                              mode=disk["mode"])
6663
      disks.append(disk_dev)
6664
  elif template_name == constants.DT_BLOCK:
6665
    if len(secondary_nodes) != 0:
6666
      raise errors.ProgrammerError("Wrong template configuration")
6667

    
6668
    for idx, disk in enumerate(disk_info):
6669
      disk_index = idx + base_index
6670
      disk_dev = objects.Disk(dev_type=constants.LD_BLOCKDEV, size=disk["size"],
6671
                              logical_id=(constants.BLOCKDEV_DRIVER_MANUAL,
6672
                                          disk["adopt"]),
6673
                              iv_name="disk/%d" % disk_index,
6674
                              mode=disk["mode"])
6675
      disks.append(disk_dev)
6676

    
6677
  else:
6678
    raise errors.ProgrammerError("Invalid disk template '%s'" % template_name)
6679
  return disks
6680

    
6681

    
6682
def _GetInstanceInfoText(instance):
6683
  """Compute that text that should be added to the disk's metadata.
6684

6685
  """
6686
  return "originstname+%s" % instance.name
6687

    
6688

    
6689
def _CalcEta(time_taken, written, total_size):
6690
  """Calculates the ETA based on size written and total size.
6691

6692
  @param time_taken: The time taken so far
6693
  @param written: amount written so far
6694
  @param total_size: The total size of data to be written
6695
  @return: The remaining time in seconds
6696

6697
  """
6698
  avg_time = time_taken / float(written)
6699
  return (total_size - written) * avg_time
6700

    
6701

    
6702
def _WipeDisks(lu, instance):
6703
  """Wipes instance disks.
6704

6705
  @type lu: L{LogicalUnit}
6706
  @param lu: the logical unit on whose behalf we execute
6707
  @type instance: L{objects.Instance}
6708
  @param instance: the instance whose disks we should create
6709
  @return: the success of the wipe
6710

6711
  """
6712
  node = instance.primary_node
6713

    
6714
  for device in instance.disks:
6715
    lu.cfg.SetDiskID(device, node)
6716

    
6717
  logging.info("Pause sync of instance %s disks", instance.name)
6718
  result = lu.rpc.call_blockdev_pause_resume_sync(node, instance.disks, True)
6719

    
6720
  for idx, success in enumerate(result.payload):
6721
    if not success:
6722
      logging.warn("pause-sync of instance %s for disks %d failed",
6723
                   instance.name, idx)
6724

    
6725
  try:
6726
    for idx, device in enumerate(instance.disks):
6727
      lu.LogInfo("* Wiping disk %d", idx)
6728
      logging.info("Wiping disk %d for instance %s, node %s",
6729
                   idx, instance.name, node)
6730

    
6731
      # The wipe size is MIN_WIPE_CHUNK_PERCENT % of the instance disk but
6732
      # MAX_WIPE_CHUNK at max
6733
      wipe_chunk_size = min(constants.MAX_WIPE_CHUNK, device.size / 100.0 *
6734
                            constants.MIN_WIPE_CHUNK_PERCENT)
6735

    
6736
      offset = 0
6737
      size = device.size
6738
      last_output = 0
6739
      start_time = time.time()
6740

    
6741
      while offset < size:
6742
        wipe_size = min(wipe_chunk_size, size - offset)
6743
        result = lu.rpc.call_blockdev_wipe(node, device, offset, wipe_size)
6744
        result.Raise("Could not wipe disk %d at offset %d for size %d" %
6745
                     (idx, offset, wipe_size))
6746
        now = time.time()
6747
        offset += wipe_size
6748
        if now - last_output >= 60:
6749
          eta = _CalcEta(now - start_time, offset, size)
6750
          lu.LogInfo(" - done: %.1f%% ETA: %s" %
6751
                     (offset / float(size) * 100, utils.FormatSeconds(eta)))
6752
          last_output = now
6753
  finally:
6754
    logging.info("Resume sync of instance %s disks", instance.name)
6755

    
6756
    result = lu.rpc.call_blockdev_pause_resume_sync(node, instance.disks, False)
6757

    
6758
    for idx, success in enumerate(result.payload):
6759
      if not success:
6760
        lu.LogWarning("Warning: Resume sync of disk %d failed. Please have a"
6761
                      " look at the status and troubleshoot the issue.", idx)
6762
        logging.warn("resume-sync of instance %s for disks %d failed",
6763
                     instance.name, idx)
6764

    
6765

    
6766
def _CreateDisks(lu, instance, to_skip=None, target_node=None):
6767
  """Create all disks for an instance.
6768

6769
  This abstracts away some work from AddInstance.
6770

6771
  @type lu: L{LogicalUnit}
6772
  @param lu: the logical unit on whose behalf we execute
6773
  @type instance: L{objects.Instance}
6774
  @param instance: the instance whose disks we should create
6775
  @type to_skip: list
6776
  @param to_skip: list of indices to skip
6777
  @type target_node: string
6778
  @param target_node: if passed, overrides the target node for creation
6779
  @rtype: boolean
6780
  @return: the success of the creation
6781

6782
  """
6783
  info = _GetInstanceInfoText(instance)
6784
  if target_node is None:
6785
    pnode = instance.primary_node
6786
    all_nodes = instance.all_nodes
6787
  else:
6788
    pnode = target_node
6789
    all_nodes = [pnode]
6790

    
6791
  if instance.disk_template in (constants.DT_FILE, constants.DT_SHARED_FILE):
6792
    file_storage_dir = os.path.dirname(instance.disks[0].logical_id[1])
6793
    result = lu.rpc.call_file_storage_dir_create(pnode, file_storage_dir)
6794

    
6795
    result.Raise("Failed to create directory '%s' on"
6796
                 " node %s" % (file_storage_dir, pnode))
6797

    
6798
  # Note: this needs to be kept in sync with adding of disks in
6799
  # LUInstanceSetParams
6800
  for idx, device in enumerate(instance.disks):
6801
    if to_skip and idx in to_skip:
6802
      continue
6803
    logging.info("Creating volume %s for instance %s",
6804
                 device.iv_name, instance.name)
6805
    #HARDCODE
6806
    for node in all_nodes:
6807
      f_create = node == pnode
6808
      _CreateBlockDev(lu, node, instance, device, f_create, info, f_create)
6809

    
6810

    
6811
def _RemoveDisks(lu, instance, target_node=None):
6812
  """Remove all disks for an instance.
6813

6814
  This abstracts away some work from `AddInstance()` and
6815
  `RemoveInstance()`. Note that in case some of the devices couldn't
6816
  be removed, the removal will continue with the other ones (compare
6817
  with `_CreateDisks()`).
6818

6819
  @type lu: L{LogicalUnit}
6820
  @param lu: the logical unit on whose behalf we execute
6821
  @type instance: L{objects.Instance}
6822
  @param instance: the instance whose disks we should remove
6823
  @type target_node: string
6824
  @param target_node: used to override the node on which to remove the disks
6825
  @rtype: boolean
6826
  @return: the success of the removal
6827

6828
  """
6829
  logging.info("Removing block devices for instance %s", instance.name)
6830

    
6831
  all_result = True
6832
  for device in instance.disks:
6833
    if target_node:
6834
      edata = [(target_node, device)]
6835
    else:
6836
      edata = device.ComputeNodeTree(instance.primary_node)
6837
    for node, disk in edata:
6838
      lu.cfg.SetDiskID(disk, node)
6839
      msg = lu.rpc.call_blockdev_remove(node, disk).fail_msg
6840
      if msg:
6841
        lu.LogWarning("Could not remove block device %s on node %s,"
6842
                      " continuing anyway: %s", device.iv_name, node, msg)
6843
        all_result = False
6844

    
6845
  if instance.disk_template == constants.DT_FILE:
6846
    file_storage_dir = os.path.dirname(instance.disks[0].logical_id[1])
6847
    if target_node:
6848
      tgt = target_node
6849
    else:
6850
      tgt = instance.primary_node
6851
    result = lu.rpc.call_file_storage_dir_remove(tgt, file_storage_dir)
6852
    if result.fail_msg:
6853
      lu.LogWarning("Could not remove directory '%s' on node %s: %s",
6854
                    file_storage_dir, instance.primary_node, result.fail_msg)
6855
      all_result = False
6856

    
6857
  return all_result
6858

    
6859

    
6860
def _ComputeDiskSizePerVG(disk_template, disks):
6861
  """Compute disk size requirements in the volume group
6862

6863
  """
6864
  def _compute(disks, payload):
6865
    """Universal algorithm
6866

6867
    """
6868
    vgs = {}
6869
    for disk in disks:
6870
      vgs[disk["vg"]] = vgs.get("vg", 0) + disk["size"] + payload
6871

    
6872
    return vgs
6873

    
6874
  # Required free disk space as a function of disk and swap space
6875
  req_size_dict = {
6876
    constants.DT_DISKLESS: {},
6877
    constants.DT_PLAIN: _compute(disks, 0),
6878
    # 128 MB are added for drbd metadata for each disk
6879
    constants.DT_DRBD8: _compute(disks, 128),
6880
    constants.DT_FILE: {},
6881
    constants.DT_SHARED_FILE: {},
6882
  }
6883

    
6884
  if disk_template not in req_size_dict:
6885
    raise errors.ProgrammerError("Disk template '%s' size requirement"
6886
                                 " is unknown" %  disk_template)
6887

    
6888
  return req_size_dict[disk_template]
6889

    
6890

    
6891
def _ComputeDiskSize(disk_template, disks):
6892
  """Compute disk size requirements in the volume group
6893

6894
  """
6895
  # Required free disk space as a function of disk and swap space
6896
  req_size_dict = {
6897
    constants.DT_DISKLESS: None,
6898
    constants.DT_PLAIN: sum(d["size"] for d in disks),
6899
    # 128 MB are added for drbd metadata for each disk
6900
    constants.DT_DRBD8: sum(d["size"] + 128 for d in disks),
6901
    constants.DT_FILE: None,
6902
    constants.DT_SHARED_FILE: 0,
6903
    constants.DT_BLOCK: 0,
6904
  }
6905

    
6906
  if disk_template not in req_size_dict:
6907
    raise errors.ProgrammerError("Disk template '%s' size requirement"
6908
                                 " is unknown" %  disk_template)
6909

    
6910
  return req_size_dict[disk_template]
6911

    
6912

    
6913
def _FilterVmNodes(lu, nodenames):
6914
  """Filters out non-vm_capable nodes from a list.
6915

6916
  @type lu: L{LogicalUnit}
6917
  @param lu: the logical unit for which we check
6918
  @type nodenames: list
6919
  @param nodenames: the list of nodes on which we should check
6920
  @rtype: list
6921
  @return: the list of vm-capable nodes
6922

6923
  """
6924
  vm_nodes = frozenset(lu.cfg.GetNonVmCapableNodeList())
6925
  return [name for name in nodenames if name not in vm_nodes]
6926

    
6927

    
6928
def _CheckHVParams(lu, nodenames, hvname, hvparams):
6929
  """Hypervisor parameter validation.
6930

6931
  This function abstract the hypervisor parameter validation to be
6932
  used in both instance create and instance modify.
6933

6934
  @type lu: L{LogicalUnit}
6935
  @param lu: the logical unit for which we check
6936
  @type nodenames: list
6937
  @param nodenames: the list of nodes on which we should check
6938
  @type hvname: string
6939
  @param hvname: the name of the hypervisor we should use
6940
  @type hvparams: dict
6941
  @param hvparams: the parameters which we need to check
6942
  @raise errors.OpPrereqError: if the parameters are not valid
6943

6944
  """
6945
  nodenames = _FilterVmNodes(lu, nodenames)
6946
  hvinfo = lu.rpc.call_hypervisor_validate_params(nodenames,
6947
                                                  hvname,
6948
                                                  hvparams)
6949
  for node in nodenames:
6950
    info = hvinfo[node]
6951
    if info.offline:
6952
      continue
6953
    info.Raise("Hypervisor parameter validation failed on node %s" % node)
6954

    
6955

    
6956
def _CheckOSParams(lu, required, nodenames, osname, osparams):
6957
  """OS parameters validation.
6958

6959
  @type lu: L{LogicalUnit}
6960
  @param lu: the logical unit for which we check
6961
  @type required: boolean
6962
  @param required: whether the validation should fail if the OS is not
6963
      found
6964
  @type nodenames: list
6965
  @param nodenames: the list of nodes on which we should check
6966
  @type osname: string
6967
  @param osname: the name of the hypervisor we should use
6968
  @type osparams: dict
6969
  @param osparams: the parameters which we need to check
6970
  @raise errors.OpPrereqError: if the parameters are not valid
6971

6972
  """
6973
  nodenames = _FilterVmNodes(lu, nodenames)
6974
  result = lu.rpc.call_os_validate(required, nodenames, osname,
6975
                                   [constants.OS_VALIDATE_PARAMETERS],
6976
                                   osparams)
6977
  for node, nres in result.items():
6978
    # we don't check for offline cases since this should be run only
6979
    # against the master node and/or an instance's nodes
6980
    nres.Raise("OS Parameters validation failed on node %s" % node)
6981
    if not nres.payload:
6982
      lu.LogInfo("OS %s not found on node %s, validation skipped",
6983
                 osname, node)
6984

    
6985

    
6986
class LUInstanceCreate(LogicalUnit):
6987
  """Create an instance.
6988

6989
  """
6990
  HPATH = "instance-add"
6991
  HTYPE = constants.HTYPE_INSTANCE
6992
  REQ_BGL = False
6993

    
6994
  def CheckArguments(self):
6995
    """Check arguments.
6996

6997
    """
6998
    # do not require name_check to ease forward/backward compatibility
6999
    # for tools
7000
    if self.op.no_install and self.op.start:
7001
      self.LogInfo("No-installation mode selected, disabling startup")
7002
      self.op.start = False
7003
    # validate/normalize the instance name
7004
    self.op.instance_name = \
7005
      netutils.Hostname.GetNormalizedName(self.op.instance_name)
7006

    
7007
    if self.op.ip_check and not self.op.name_check:
7008
      # TODO: make the ip check more flexible and not depend on the name check
7009
      raise errors.OpPrereqError("Cannot do ip check without a name check",
7010
                                 errors.ECODE_INVAL)
7011

    
7012
    # check nics' parameter names
7013
    for nic in self.op.nics:
7014
      utils.ForceDictType(nic, constants.INIC_PARAMS_TYPES)
7015

    
7016
    # check disks. parameter names and consistent adopt/no-adopt strategy
7017
    has_adopt = has_no_adopt = False
7018
    for disk in self.op.disks:
7019
      utils.ForceDictType(disk, constants.IDISK_PARAMS_TYPES)
7020
      if "adopt" in disk:
7021
        has_adopt = True
7022
      else:
7023
        has_no_adopt = True
7024
    if has_adopt and has_no_adopt:
7025
      raise errors.OpPrereqError("Either all disks are adopted or none is",
7026
                                 errors.ECODE_INVAL)
7027
    if has_adopt:
7028
      if self.op.disk_template not in constants.DTS_MAY_ADOPT:
7029
        raise errors.OpPrereqError("Disk adoption is not supported for the"
7030
                                   " '%s' disk template" %
7031
                                   self.op.disk_template,
7032
                                   errors.ECODE_INVAL)
7033
      if self.op.iallocator is not None:
7034
        raise errors.OpPrereqError("Disk adoption not allowed with an"
7035
                                   " iallocator script", errors.ECODE_INVAL)
7036
      if self.op.mode == constants.INSTANCE_IMPORT:
7037
        raise errors.OpPrereqError("Disk adoption not allowed for"
7038
                                   " instance import", errors.ECODE_INVAL)
7039
    else:
7040
      if self.op.disk_template in constants.DTS_MUST_ADOPT:
7041
        raise errors.OpPrereqError("Disk template %s requires disk adoption,"
7042
                                   " but no 'adopt' parameter given" %
7043
                                   self.op.disk_template,
7044
                                   errors.ECODE_INVAL)
7045

    
7046
    self.adopt_disks = has_adopt
7047

    
7048
    # instance name verification
7049
    if self.op.name_check:
7050
      self.hostname1 = netutils.GetHostname(name=self.op.instance_name)
7051
      self.op.instance_name = self.hostname1.name
7052
      # used in CheckPrereq for ip ping check
7053
      self.check_ip = self.hostname1.ip
7054
    else:
7055
      self.check_ip = None
7056

    
7057
    # file storage checks
7058
    if (self.op.file_driver and
7059
        not self.op.file_driver in constants.FILE_DRIVER):
7060
      raise errors.OpPrereqError("Invalid file driver name '%s'" %
7061
                                 self.op.file_driver, errors.ECODE_INVAL)
7062

    
7063
    if self.op.file_storage_dir and os.path.isabs(self.op.file_storage_dir):
7064
      raise errors.OpPrereqError("File storage directory path not absolute",
7065
                                 errors.ECODE_INVAL)
7066

    
7067
    ### Node/iallocator related checks
7068
    _CheckIAllocatorOrNode(self, "iallocator", "pnode")
7069

    
7070
    if self.op.pnode is not None:
7071
      if self.op.disk_template in constants.DTS_NET_MIRROR:
7072
        if self.op.snode is None:
7073
          raise errors.OpPrereqError("The networked disk templates need"
7074
                                     " a mirror node", errors.ECODE_INVAL)
7075
      elif self.op.snode:
7076
        self.LogWarning("Secondary node will be ignored on non-mirrored disk"
7077
                        " template")
7078
        self.op.snode = None
7079

    
7080
    self._cds = _GetClusterDomainSecret()
7081

    
7082
    if self.op.mode == constants.INSTANCE_IMPORT:
7083
      # On import force_variant must be True, because if we forced it at
7084
      # initial install, our only chance when importing it back is that it
7085
      # works again!
7086
      self.op.force_variant = True
7087

    
7088
      if self.op.no_install:
7089
        self.LogInfo("No-installation mode has no effect during import")
7090

    
7091
    elif self.op.mode == constants.INSTANCE_CREATE:
7092
      if self.op.os_type is None:
7093
        raise errors.OpPrereqError("No guest OS specified",
7094
                                   errors.ECODE_INVAL)
7095
      if self.op.os_type in self.cfg.GetClusterInfo().blacklisted_os:
7096
        raise errors.OpPrereqError("Guest OS '%s' is not allowed for"
7097
                                   " installation" % self.op.os_type,
7098
                                   errors.ECODE_STATE)
7099
      if self.op.disk_template is None:
7100
        raise errors.OpPrereqError("No disk template specified",
7101
                                   errors.ECODE_INVAL)
7102

    
7103
    elif self.op.mode == constants.INSTANCE_REMOTE_IMPORT:
7104
      # Check handshake to ensure both clusters have the same domain secret
7105
      src_handshake = self.op.source_handshake
7106
      if not src_handshake:
7107
        raise errors.OpPrereqError("Missing source handshake",
7108
                                   errors.ECODE_INVAL)
7109

    
7110
      errmsg = masterd.instance.CheckRemoteExportHandshake(self._cds,
7111
                                                           src_handshake)
7112
      if errmsg:
7113
        raise errors.OpPrereqError("Invalid handshake: %s" % errmsg,
7114
                                   errors.ECODE_INVAL)
7115

    
7116
      # Load and check source CA
7117
      self.source_x509_ca_pem = self.op.source_x509_ca
7118
      if not self.source_x509_ca_pem:
7119
        raise errors.OpPrereqError("Missing source X509 CA",
7120
                                   errors.ECODE_INVAL)
7121

    
7122
      try:
7123
        (cert, _) = utils.LoadSignedX509Certificate(self.source_x509_ca_pem,
7124
                                                    self._cds)
7125
      except OpenSSL.crypto.Error, err:
7126
        raise errors.OpPrereqError("Unable to load source X509 CA (%s)" %
7127
                                   (err, ), errors.ECODE_INVAL)
7128

    
7129
      (errcode, msg) = utils.VerifyX509Certificate(cert, None, None)
7130
      if errcode is not None:
7131
        raise errors.OpPrereqError("Invalid source X509 CA (%s)" % (msg, ),
7132
                                   errors.ECODE_INVAL)
7133

    
7134
      self.source_x509_ca = cert
7135

    
7136
      src_instance_name = self.op.source_instance_name
7137
      if not src_instance_name:
7138
        raise errors.OpPrereqError("Missing source instance name",
7139
                                   errors.ECODE_INVAL)
7140

    
7141
      self.source_instance_name = \
7142
          netutils.GetHostname(name=src_instance_name).name
7143

    
7144
    else:
7145
      raise errors.OpPrereqError("Invalid instance creation mode %r" %
7146
                                 self.op.mode, errors.ECODE_INVAL)
7147

    
7148
  def ExpandNames(self):
7149
    """ExpandNames for CreateInstance.
7150

7151
    Figure out the right locks for instance creation.
7152

7153
    """
7154
    self.needed_locks = {}
7155

    
7156
    instance_name = self.op.instance_name
7157
    # this is just a preventive check, but someone might still add this
7158
    # instance in the meantime, and creation will fail at lock-add time
7159
    if instance_name in self.cfg.GetInstanceList():
7160
      raise errors.OpPrereqError("Instance '%s' is already in the cluster" %
7161
                                 instance_name, errors.ECODE_EXISTS)
7162

    
7163
    self.add_locks[locking.LEVEL_INSTANCE] = instance_name
7164

    
7165
    if self.op.iallocator:
7166
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
7167
    else:
7168
      self.op.pnode = _ExpandNodeName(self.cfg, self.op.pnode)
7169
      nodelist = [self.op.pnode]
7170
      if self.op.snode is not None:
7171
        self.op.snode = _ExpandNodeName(self.cfg, self.op.snode)
7172
        nodelist.append(self.op.snode)
7173
      self.needed_locks[locking.LEVEL_NODE] = nodelist
7174

    
7175
    # in case of import lock the source node too
7176
    if self.op.mode == constants.INSTANCE_IMPORT:
7177
      src_node = self.op.src_node
7178
      src_path = self.op.src_path
7179

    
7180
      if src_path is None:
7181
        self.op.src_path = src_path = self.op.instance_name
7182

    
7183
      if src_node is None:
7184
        self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
7185
        self.op.src_node = None
7186
        if os.path.isabs(src_path):
7187
          raise errors.OpPrereqError("Importing an instance from an absolute"
7188
                                     " path requires a source node option.",
7189
                                     errors.ECODE_INVAL)
7190
      else:
7191
        self.op.src_node = src_node = _ExpandNodeName(self.cfg, src_node)
7192
        if self.needed_locks[locking.LEVEL_NODE] is not locking.ALL_SET:
7193
          self.needed_locks[locking.LEVEL_NODE].append(src_node)
7194
        if not os.path.isabs(src_path):
7195
          self.op.src_path = src_path = \
7196
            utils.PathJoin(constants.EXPORT_DIR, src_path)
7197

    
7198
  def _RunAllocator(self):
7199
    """Run the allocator based on input opcode.
7200

7201
    """
7202
    nics = [n.ToDict() for n in self.nics]
7203
    ial = IAllocator(self.cfg, self.rpc,
7204
                     mode=constants.IALLOCATOR_MODE_ALLOC,
7205
                     name=self.op.instance_name,
7206
                     disk_template=self.op.disk_template,
7207
                     tags=[],
7208
                     os=self.op.os_type,
7209
                     vcpus=self.be_full[constants.BE_VCPUS],
7210
                     mem_size=self.be_full[constants.BE_MEMORY],
7211
                     disks=self.disks,
7212
                     nics=nics,
7213
                     hypervisor=self.op.hypervisor,
7214
                     )
7215

    
7216
    ial.Run(self.op.iallocator)
7217

    
7218
    if not ial.success:
7219
      raise errors.OpPrereqError("Can't compute nodes using"
7220
                                 " iallocator '%s': %s" %
7221
                                 (self.op.iallocator, ial.info),
7222
                                 errors.ECODE_NORES)
7223
    if len(ial.result) != ial.required_nodes:
7224
      raise errors.OpPrereqError("iallocator '%s' returned invalid number"
7225
                                 " of nodes (%s), required %s" %
7226
                                 (self.op.iallocator, len(ial.result),
7227
                                  ial.required_nodes), errors.ECODE_FAULT)
7228
    self.op.pnode = ial.result[0]
7229
    self.LogInfo("Selected nodes for instance %s via iallocator %s: %s",
7230
                 self.op.instance_name, self.op.iallocator,
7231
                 utils.CommaJoin(ial.result))
7232
    if ial.required_nodes == 2:
7233
      self.op.snode = ial.result[1]
7234

    
7235
  def BuildHooksEnv(self):
7236
    """Build hooks env.
7237

7238
    This runs on master, primary and secondary nodes of the instance.
7239

7240
    """
7241
    env = {
7242
      "ADD_MODE": self.op.mode,
7243
      }
7244
    if self.op.mode == constants.INSTANCE_IMPORT:
7245
      env["SRC_NODE"] = self.op.src_node
7246
      env["SRC_PATH"] = self.op.src_path
7247
      env["SRC_IMAGES"] = self.src_images
7248

    
7249
    env.update(_BuildInstanceHookEnv(
7250
      name=self.op.instance_name,
7251
      primary_node=self.op.pnode,
7252
      secondary_nodes=self.secondaries,
7253
      status=self.op.start,
7254
      os_type=self.op.os_type,
7255
      memory=self.be_full[constants.BE_MEMORY],
7256
      vcpus=self.be_full[constants.BE_VCPUS],
7257
      nics=_NICListToTuple(self, self.nics),
7258
      disk_template=self.op.disk_template,
7259
      disks=[(d["size"], d["mode"]) for d in self.disks],
7260
      bep=self.be_full,
7261
      hvp=self.hv_full,
7262
      hypervisor_name=self.op.hypervisor,
7263
    ))
7264

    
7265
    nl = ([self.cfg.GetMasterNode(), self.op.pnode] +
7266
          self.secondaries)
7267
    return env, nl, nl
7268

    
7269
  def _ReadExportInfo(self):
7270
    """Reads the export information from disk.
7271

7272
    It will override the opcode source node and path with the actual
7273
    information, if these two were not specified before.
7274

7275
    @return: the export information
7276

7277
    """
7278
    assert self.op.mode == constants.INSTANCE_IMPORT
7279

    
7280
    src_node = self.op.src_node
7281
    src_path = self.op.src_path
7282

    
7283
    if src_node is None:
7284
      locked_nodes = self.acquired_locks[locking.LEVEL_NODE]
7285
      exp_list = self.rpc.call_export_list(locked_nodes)
7286
      found = False
7287
      for node in exp_list:
7288
        if exp_list[node].fail_msg:
7289
          continue
7290
        if src_path in exp_list[node].payload:
7291
          found = True
7292
          self.op.src_node = src_node = node
7293
          self.op.src_path = src_path = utils.PathJoin(constants.EXPORT_DIR,
7294
                                                       src_path)
7295
          break
7296
      if not found:
7297
        raise errors.OpPrereqError("No export found for relative path %s" %
7298
                                    src_path, errors.ECODE_INVAL)
7299

    
7300
    _CheckNodeOnline(self, src_node)
7301
    result = self.rpc.call_export_info(src_node, src_path)
7302
    result.Raise("No export or invalid export found in dir %s" % src_path)
7303

    
7304
    export_info = objects.SerializableConfigParser.Loads(str(result.payload))
7305
    if not export_info.has_section(constants.INISECT_EXP):
7306
      raise errors.ProgrammerError("Corrupted export config",
7307
                                   errors.ECODE_ENVIRON)
7308

    
7309
    ei_version = export_info.get(constants.INISECT_EXP, "version")
7310
    if (int(ei_version) != constants.EXPORT_VERSION):
7311
      raise errors.OpPrereqError("Wrong export version %s (wanted %d)" %
7312
                                 (ei_version, constants.EXPORT_VERSION),
7313
                                 errors.ECODE_ENVIRON)
7314
    return export_info
7315

    
7316
  def _ReadExportParams(self, einfo):
7317
    """Use export parameters as defaults.
7318

7319
    In case the opcode doesn't specify (as in override) some instance
7320
    parameters, then try to use them from the export information, if
7321
    that declares them.
7322

7323
    """
7324
    self.op.os_type = einfo.get(constants.INISECT_EXP, "os")
7325

    
7326
    if self.op.disk_template is None:
7327
      if einfo.has_option(constants.INISECT_INS, "disk_template"):
7328
        self.op.disk_template = einfo.get(constants.INISECT_INS,
7329
                                          "disk_template")
7330
      else:
7331
        raise errors.OpPrereqError("No disk template specified and the export"
7332
                                   " is missing the disk_template information",
7333
                                   errors.ECODE_INVAL)
7334

    
7335
    if not self.op.disks:
7336
      if einfo.has_option(constants.INISECT_INS, "disk_count"):
7337
        disks = []
7338
        # TODO: import the disk iv_name too
7339
        for idx in range(einfo.getint(constants.INISECT_INS, "disk_count")):
7340
          disk_sz = einfo.getint(constants.INISECT_INS, "disk%d_size" % idx)
7341
          disks.append({"size": disk_sz})
7342
        self.op.disks = disks
7343
      else:
7344
        raise errors.OpPrereqError("No disk info specified and the export"
7345
                                   " is missing the disk information",
7346
                                   errors.ECODE_INVAL)
7347

    
7348
    if (not self.op.nics and
7349
        einfo.has_option(constants.INISECT_INS, "nic_count")):
7350
      nics = []
7351
      for idx in range(einfo.getint(constants.INISECT_INS, "nic_count")):
7352
        ndict = {}
7353
        for name in list(constants.NICS_PARAMETERS) + ["ip", "mac"]:
7354
          v = einfo.get(constants.INISECT_INS, "nic%d_%s" % (idx, name))
7355
          ndict[name] = v
7356
        nics.append(ndict)
7357
      self.op.nics = nics
7358

    
7359
    if (self.op.hypervisor is None and
7360
        einfo.has_option(constants.INISECT_INS, "hypervisor")):
7361
      self.op.hypervisor = einfo.get(constants.INISECT_INS, "hypervisor")
7362
    if einfo.has_section(constants.INISECT_HYP):
7363
      # use the export parameters but do not override the ones
7364
      # specified by the user
7365
      for name, value in einfo.items(constants.INISECT_HYP):
7366
        if name not in self.op.hvparams:
7367
          self.op.hvparams[name] = value
7368

    
7369
    if einfo.has_section(constants.INISECT_BEP):
7370
      # use the parameters, without overriding
7371
      for name, value in einfo.items(constants.INISECT_BEP):
7372
        if name not in self.op.beparams:
7373
          self.op.beparams[name] = value
7374
    else:
7375
      # try to read the parameters old style, from the main section
7376
      for name in constants.BES_PARAMETERS:
7377
        if (name not in self.op.beparams and
7378
            einfo.has_option(constants.INISECT_INS, name)):
7379
          self.op.beparams[name] = einfo.get(constants.INISECT_INS, name)
7380

    
7381
    if einfo.has_section(constants.INISECT_OSP):
7382
      # use the parameters, without overriding
7383
      for name, value in einfo.items(constants.INISECT_OSP):
7384
        if name not in self.op.osparams:
7385
          self.op.osparams[name] = value
7386

    
7387
  def _RevertToDefaults(self, cluster):
7388
    """Revert the instance parameters to the default values.
7389

7390
    """
7391
    # hvparams
7392
    hv_defs = cluster.SimpleFillHV(self.op.hypervisor, self.op.os_type, {})
7393
    for name in self.op.hvparams.keys():
7394
      if name in hv_defs and hv_defs[name] == self.op.hvparams[name]:
7395
        del self.op.hvparams[name]
7396
    # beparams
7397
    be_defs = cluster.SimpleFillBE({})
7398
    for name in self.op.beparams.keys():
7399
      if name in be_defs and be_defs[name] == self.op.beparams[name]:
7400
        del self.op.beparams[name]
7401
    # nic params
7402
    nic_defs = cluster.SimpleFillNIC({})
7403
    for nic in self.op.nics:
7404
      for name in constants.NICS_PARAMETERS:
7405
        if name in nic and name in nic_defs and nic[name] == nic_defs[name]:
7406
          del nic[name]
7407
    # osparams
7408
    os_defs = cluster.SimpleFillOS(self.op.os_type, {})
7409
    for name in self.op.osparams.keys():
7410
      if name in os_defs and os_defs[name] == self.op.osparams[name]:
7411
        del self.op.osparams[name]
7412

    
7413
  def CheckPrereq(self):
7414
    """Check prerequisites.
7415

7416
    """
7417
    if self.op.mode == constants.INSTANCE_IMPORT:
7418
      export_info = self._ReadExportInfo()
7419
      self._ReadExportParams(export_info)
7420

    
7421
    if (not self.cfg.GetVGName() and
7422
        self.op.disk_template not in constants.DTS_NOT_LVM):
7423
      raise errors.OpPrereqError("Cluster does not support lvm-based"
7424
                                 " instances", errors.ECODE_STATE)
7425

    
7426
    if self.op.hypervisor is None:
7427
      self.op.hypervisor = self.cfg.GetHypervisorType()
7428

    
7429
    cluster = self.cfg.GetClusterInfo()
7430
    enabled_hvs = cluster.enabled_hypervisors
7431
    if self.op.hypervisor not in enabled_hvs:
7432
      raise errors.OpPrereqError("Selected hypervisor (%s) not enabled in the"
7433
                                 " cluster (%s)" % (self.op.hypervisor,
7434
                                  ",".join(enabled_hvs)),
7435
                                 errors.ECODE_STATE)
7436

    
7437
    # check hypervisor parameter syntax (locally)
7438
    utils.ForceDictType(self.op.hvparams, constants.HVS_PARAMETER_TYPES)
7439
    filled_hvp = cluster.SimpleFillHV(self.op.hypervisor, self.op.os_type,
7440
                                      self.op.hvparams)
7441
    hv_type = hypervisor.GetHypervisor(self.op.hypervisor)
7442
    hv_type.CheckParameterSyntax(filled_hvp)
7443
    self.hv_full = filled_hvp
7444
    # check that we don't specify global parameters on an instance
7445
    _CheckGlobalHvParams(self.op.hvparams)
7446

    
7447
    # fill and remember the beparams dict
7448
    utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
7449
    self.be_full = cluster.SimpleFillBE(self.op.beparams)
7450

    
7451
    # build os parameters
7452
    self.os_full = cluster.SimpleFillOS(self.op.os_type, self.op.osparams)
7453

    
7454
    # now that hvp/bep are in final format, let's reset to defaults,
7455
    # if told to do so
7456
    if self.op.identify_defaults:
7457
      self._RevertToDefaults(cluster)
7458

    
7459
    # NIC buildup
7460
    self.nics = []
7461
    for idx, nic in enumerate(self.op.nics):
7462
      nic_mode_req = nic.get("mode", None)
7463
      nic_mode = nic_mode_req
7464
      if nic_mode is None:
7465
        nic_mode = cluster.nicparams[constants.PP_DEFAULT][constants.NIC_MODE]
7466

    
7467
      # in routed mode, for the first nic, the default ip is 'auto'
7468
      if nic_mode == constants.NIC_MODE_ROUTED and idx == 0:
7469
        default_ip_mode = constants.VALUE_AUTO
7470
      else:
7471
        default_ip_mode = constants.VALUE_NONE
7472

    
7473
      # ip validity checks
7474
      ip = nic.get("ip", default_ip_mode)
7475
      if ip is None or ip.lower() == constants.VALUE_NONE:
7476
        nic_ip = None
7477
      elif ip.lower() == constants.VALUE_AUTO:
7478
        if not self.op.name_check:
7479
          raise errors.OpPrereqError("IP address set to auto but name checks"
7480
                                     " have been skipped",
7481
                                     errors.ECODE_INVAL)
7482
        nic_ip = self.hostname1.ip
7483
      else:
7484
        if not netutils.IPAddress.IsValid(ip):
7485
          raise errors.OpPrereqError("Invalid IP address '%s'" % ip,
7486
                                     errors.ECODE_INVAL)
7487
        nic_ip = ip
7488

    
7489
      # TODO: check the ip address for uniqueness
7490
      if nic_mode == constants.NIC_MODE_ROUTED and not nic_ip:
7491
        raise errors.OpPrereqError("Routed nic mode requires an ip address",
7492
                                   errors.ECODE_INVAL)
7493

    
7494
      # MAC address verification
7495
      mac = nic.get("mac", constants.VALUE_AUTO)
7496
      if mac not in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
7497
        mac = utils.NormalizeAndValidateMac(mac)
7498

    
7499
        try:
7500
          self.cfg.ReserveMAC(mac, self.proc.GetECId())
7501
        except errors.ReservationError:
7502
          raise errors.OpPrereqError("MAC address %s already in use"
7503
                                     " in cluster" % mac,
7504
                                     errors.ECODE_NOTUNIQUE)
7505

    
7506
      #  Build nic parameters
7507
      link = nic.get(constants.INIC_LINK, None)
7508
      nicparams = {}
7509
      if nic_mode_req:
7510
        nicparams[constants.NIC_MODE] = nic_mode_req
7511
      if link:
7512
        nicparams[constants.NIC_LINK] = link
7513

    
7514
      check_params = cluster.SimpleFillNIC(nicparams)
7515
      objects.NIC.CheckParameterSyntax(check_params)
7516
      self.nics.append(objects.NIC(mac=mac, ip=nic_ip, nicparams=nicparams))
7517

    
7518
    # disk checks/pre-build
7519
    self.disks = []
7520
    for disk in self.op.disks:
7521
      mode = disk.get("mode", constants.DISK_RDWR)
7522
      if mode not in constants.DISK_ACCESS_SET:
7523
        raise errors.OpPrereqError("Invalid disk access mode '%s'" %
7524
                                   mode, errors.ECODE_INVAL)
7525
      size = disk.get("size", None)
7526
      if size is None:
7527
        raise errors.OpPrereqError("Missing disk size", errors.ECODE_INVAL)
7528
      try:
7529
        size = int(size)
7530
      except (TypeError, ValueError):
7531
        raise errors.OpPrereqError("Invalid disk size '%s'" % size,
7532
                                   errors.ECODE_INVAL)
7533
      vg = disk.get("vg", self.cfg.GetVGName())
7534
      new_disk = {"size": size, "mode": mode, "vg": vg}
7535
      if "adopt" in disk:
7536
        new_disk["adopt"] = disk["adopt"]
7537
      self.disks.append(new_disk)
7538

    
7539
    if self.op.mode == constants.INSTANCE_IMPORT:
7540

    
7541
      # Check that the new instance doesn't have less disks than the export
7542
      instance_disks = len(self.disks)
7543
      export_disks = export_info.getint(constants.INISECT_INS, 'disk_count')
7544
      if instance_disks < export_disks:
7545
        raise errors.OpPrereqError("Not enough disks to import."
7546
                                   " (instance: %d, export: %d)" %
7547
                                   (instance_disks, export_disks),
7548
                                   errors.ECODE_INVAL)
7549

    
7550
      disk_images = []
7551
      for idx in range(export_disks):
7552
        option = 'disk%d_dump' % idx
7553
        if export_info.has_option(constants.INISECT_INS, option):
7554
          # FIXME: are the old os-es, disk sizes, etc. useful?
7555
          export_name = export_info.get(constants.INISECT_INS, option)
7556
          image = utils.PathJoin(self.op.src_path, export_name)
7557
          disk_images.append(image)
7558
        else:
7559
          disk_images.append(False)
7560

    
7561
      self.src_images = disk_images
7562

    
7563
      old_name = export_info.get(constants.INISECT_INS, 'name')
7564
      try:
7565
        exp_nic_count = export_info.getint(constants.INISECT_INS, 'nic_count')
7566
      except (TypeError, ValueError), err:
7567
        raise errors.OpPrereqError("Invalid export file, nic_count is not"
7568
                                   " an integer: %s" % str(err),
7569
                                   errors.ECODE_STATE)
7570
      if self.op.instance_name == old_name:
7571
        for idx, nic in enumerate(self.nics):
7572
          if nic.mac == constants.VALUE_AUTO and exp_nic_count >= idx:
7573
            nic_mac_ini = 'nic%d_mac' % idx
7574
            nic.mac = export_info.get(constants.INISECT_INS, nic_mac_ini)
7575

    
7576
    # ENDIF: self.op.mode == constants.INSTANCE_IMPORT
7577

    
7578
    # ip ping checks (we use the same ip that was resolved in ExpandNames)
7579
    if self.op.ip_check:
7580
      if netutils.TcpPing(self.check_ip, constants.DEFAULT_NODED_PORT):
7581
        raise errors.OpPrereqError("IP %s of instance %s already in use" %
7582
                                   (self.check_ip, self.op.instance_name),
7583
                                   errors.ECODE_NOTUNIQUE)
7584

    
7585
    #### mac address generation
7586
    # By generating here the mac address both the allocator and the hooks get
7587
    # the real final mac address rather than the 'auto' or 'generate' value.
7588
    # There is a race condition between the generation and the instance object
7589
    # creation, which means that we know the mac is valid now, but we're not
7590
    # sure it will be when we actually add the instance. If things go bad
7591
    # adding the instance will abort because of a duplicate mac, and the
7592
    # creation job will fail.
7593
    for nic in self.nics:
7594
      if nic.mac in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
7595
        nic.mac = self.cfg.GenerateMAC(self.proc.GetECId())
7596

    
7597
    #### allocator run
7598

    
7599
    if self.op.iallocator is not None:
7600
      self._RunAllocator()
7601

    
7602
    #### node related checks
7603

    
7604
    # check primary node
7605
    self.pnode = pnode = self.cfg.GetNodeInfo(self.op.pnode)
7606
    assert self.pnode is not None, \
7607
      "Cannot retrieve locked node %s" % self.op.pnode
7608
    if pnode.offline:
7609
      raise errors.OpPrereqError("Cannot use offline primary node '%s'" %
7610
                                 pnode.name, errors.ECODE_STATE)
7611
    if pnode.drained:
7612
      raise errors.OpPrereqError("Cannot use drained primary node '%s'" %
7613
                                 pnode.name, errors.ECODE_STATE)
7614
    if not pnode.vm_capable:
7615
      raise errors.OpPrereqError("Cannot use non-vm_capable primary node"
7616
                                 " '%s'" % pnode.name, errors.ECODE_STATE)
7617

    
7618
    self.secondaries = []
7619

    
7620
    # mirror node verification
7621
    if self.op.disk_template in constants.DTS_NET_MIRROR:
7622
      if self.op.snode == pnode.name:
7623
        raise errors.OpPrereqError("The secondary node cannot be the"
7624
                                   " primary node.", errors.ECODE_INVAL)
7625
      _CheckNodeOnline(self, self.op.snode)
7626
      _CheckNodeNotDrained(self, self.op.snode)
7627
      _CheckNodeVmCapable(self, self.op.snode)
7628
      self.secondaries.append(self.op.snode)
7629

    
7630
    nodenames = [pnode.name] + self.secondaries
7631

    
7632
    if not self.adopt_disks:
7633
      # Check lv size requirements, if not adopting
7634
      req_sizes = _ComputeDiskSizePerVG(self.op.disk_template, self.disks)
7635
      _CheckNodesFreeDiskPerVG(self, nodenames, req_sizes)
7636

    
7637
    elif self.op.disk_template == constants.DT_PLAIN: # Check the adoption data
7638
      all_lvs = set([i["vg"] + "/" + i["adopt"] for i in self.disks])
7639
      if len(all_lvs) != len(self.disks):
7640
        raise errors.OpPrereqError("Duplicate volume names given for adoption",
7641
                                   errors.ECODE_INVAL)
7642
      for lv_name in all_lvs:
7643
        try:
7644
          # FIXME: lv_name here is "vg/lv" need to ensure that other calls
7645
          # to ReserveLV uses the same syntax
7646
          self.cfg.ReserveLV(lv_name, self.proc.GetECId())
7647
        except errors.ReservationError:
7648
          raise errors.OpPrereqError("LV named %s used by another instance" %
7649
                                     lv_name, errors.ECODE_NOTUNIQUE)
7650

    
7651
      vg_names = self.rpc.call_vg_list([pnode.name])[pnode.name]
7652
      vg_names.Raise("Cannot get VG information from node %s" % pnode.name)
7653

    
7654
      node_lvs = self.rpc.call_lv_list([pnode.name],
7655
                                       vg_names.payload.keys())[pnode.name]
7656
      node_lvs.Raise("Cannot get LV information from node %s" % pnode.name)
7657
      node_lvs = node_lvs.payload
7658

    
7659
      delta = all_lvs.difference(node_lvs.keys())
7660
      if delta:
7661
        raise errors.OpPrereqError("Missing logical volume(s): %s" %
7662
                                   utils.CommaJoin(delta),
7663
                                   errors.ECODE_INVAL)
7664
      online_lvs = [lv for lv in all_lvs if node_lvs[lv][2]]
7665
      if online_lvs:
7666
        raise errors.OpPrereqError("Online logical volumes found, cannot"
7667
                                   " adopt: %s" % utils.CommaJoin(online_lvs),
7668
                                   errors.ECODE_STATE)
7669
      # update the size of disk based on what is found
7670
      for dsk in self.disks:
7671
        dsk["size"] = int(float(node_lvs[dsk["vg"] + "/" + dsk["adopt"]][0]))
7672

    
7673
    elif self.op.disk_template == constants.DT_BLOCK:
7674
      # Normalize and de-duplicate device paths
7675
      all_disks = set([os.path.abspath(i["adopt"]) for i in self.disks])
7676
      if len(all_disks) != len(self.disks):
7677
        raise errors.OpPrereqError("Duplicate disk names given for adoption",
7678
                                   errors.ECODE_INVAL)
7679
      baddisks = [d for d in all_disks
7680
                  if not d.startswith(constants.ADOPTABLE_BLOCKDEV_ROOT)]
7681
      if baddisks:
7682
        raise errors.OpPrereqError("Device node(s) %s lie outside %s and"
7683
                                   " cannot be adopted" %
7684
                                   (", ".join(baddisks),
7685
                                    constants.ADOPTABLE_BLOCKDEV_ROOT),
7686
                                   errors.ECODE_INVAL)
7687

    
7688
      node_disks = self.rpc.call_bdev_sizes([pnode.name],
7689
                                            list(all_disks))[pnode.name]
7690
      node_disks.Raise("Cannot get block device information from node %s" %
7691
                       pnode.name)
7692
      node_disks = node_disks.payload
7693
      delta = all_disks.difference(node_disks.keys())
7694
      if delta:
7695
        raise errors.OpPrereqError("Missing block device(s): %s" %
7696
                                   utils.CommaJoin(delta),
7697
                                   errors.ECODE_INVAL)
7698
      for dsk in self.disks:
7699
        dsk["size"] = int(float(node_disks[dsk["adopt"]]))
7700

    
7701
    _CheckHVParams(self, nodenames, self.op.hypervisor, self.op.hvparams)
7702

    
7703
    _CheckNodeHasOS(self, pnode.name, self.op.os_type, self.op.force_variant)
7704
    # check OS parameters (remotely)
7705
    _CheckOSParams(self, True, nodenames, self.op.os_type, self.os_full)
7706

    
7707
    _CheckNicsBridgesExist(self, self.nics, self.pnode.name)
7708

    
7709
    # memory check on primary node
7710
    if self.op.start:
7711
      _CheckNodeFreeMemory(self, self.pnode.name,
7712
                           "creating instance %s" % self.op.instance_name,
7713
                           self.be_full[constants.BE_MEMORY],
7714
                           self.op.hypervisor)
7715

    
7716
    self.dry_run_result = list(nodenames)
7717

    
7718
  def Exec(self, feedback_fn):
7719
    """Create and add the instance to the cluster.
7720

7721
    """
7722
    instance = self.op.instance_name
7723
    pnode_name = self.pnode.name
7724

    
7725
    ht_kind = self.op.hypervisor
7726
    if ht_kind in constants.HTS_REQ_PORT:
7727
      network_port = self.cfg.AllocatePort()
7728
    else:
7729
      network_port = None
7730

    
7731
    if constants.ENABLE_FILE_STORAGE or constants.ENABLE_SHARED_FILE_STORAGE:
7732
      # this is needed because os.path.join does not accept None arguments
7733
      if self.op.file_storage_dir is None:
7734
        string_file_storage_dir = ""
7735
      else:
7736
        string_file_storage_dir = self.op.file_storage_dir
7737

    
7738
      # build the full file storage dir path
7739
      if self.op.disk_template == constants.DT_SHARED_FILE:
7740
        get_fsd_fn = self.cfg.GetSharedFileStorageDir
7741
      else:
7742
        get_fsd_fn = self.cfg.GetFileStorageDir
7743

    
7744
      file_storage_dir = utils.PathJoin(get_fsd_fn(),
7745
                                        string_file_storage_dir, instance)
7746
    else:
7747
      file_storage_dir = ""
7748

    
7749
    disks = _GenerateDiskTemplate(self,
7750
                                  self.op.disk_template,
7751
                                  instance, pnode_name,
7752
                                  self.secondaries,
7753
                                  self.disks,
7754
                                  file_storage_dir,
7755
                                  self.op.file_driver,
7756
                                  0,
7757
                                  feedback_fn)
7758

    
7759
    iobj = objects.Instance(name=instance, os=self.op.os_type,
7760
                            primary_node=pnode_name,
7761
                            nics=self.nics, disks=disks,
7762
                            disk_template=self.op.disk_template,
7763
                            admin_up=False,
7764
                            network_port=network_port,
7765
                            beparams=self.op.beparams,
7766
                            hvparams=self.op.hvparams,
7767
                            hypervisor=self.op.hypervisor,
7768
                            osparams=self.op.osparams,
7769
                            )
7770

    
7771
    if self.adopt_disks:
7772
      if self.op.disk_template == constants.DT_PLAIN:
7773
        # rename LVs to the newly-generated names; we need to construct
7774
        # 'fake' LV disks with the old data, plus the new unique_id
7775
        tmp_disks = [objects.Disk.FromDict(v.ToDict()) for v in disks]
7776
        rename_to = []
7777
        for t_dsk, a_dsk in zip (tmp_disks, self.disks):
7778
          rename_to.append(t_dsk.logical_id)
7779
          t_dsk.logical_id = (t_dsk.logical_id[0], a_dsk["adopt"])
7780
          self.cfg.SetDiskID(t_dsk, pnode_name)
7781
        result = self.rpc.call_blockdev_rename(pnode_name,
7782
                                               zip(tmp_disks, rename_to))
7783
        result.Raise("Failed to rename adoped LVs")
7784
    else:
7785
      feedback_fn("* creating instance disks...")
7786
      try:
7787
        _CreateDisks(self, iobj)
7788
      except errors.OpExecError:
7789
        self.LogWarning("Device creation failed, reverting...")
7790
        try:
7791
          _RemoveDisks(self, iobj)
7792
        finally:
7793
          self.cfg.ReleaseDRBDMinors(instance)
7794
          raise
7795

    
7796
      if self.cfg.GetClusterInfo().prealloc_wipe_disks:
7797
        feedback_fn("* wiping instance disks...")
7798
        try:
7799
          _WipeDisks(self, iobj)
7800
        except errors.OpExecError:
7801
          self.LogWarning("Device wiping failed, reverting...")
7802
          try:
7803
            _RemoveDisks(self, iobj)
7804
          finally:
7805
            self.cfg.ReleaseDRBDMinors(instance)
7806
            raise
7807

    
7808
    feedback_fn("adding instance %s to cluster config" % instance)
7809

    
7810
    self.cfg.AddInstance(iobj, self.proc.GetECId())
7811

    
7812
    # Declare that we don't want to remove the instance lock anymore, as we've
7813
    # added the instance to the config
7814
    del self.remove_locks[locking.LEVEL_INSTANCE]
7815
    # Unlock all the nodes
7816
    if self.op.mode == constants.INSTANCE_IMPORT:
7817
      nodes_keep = [self.op.src_node]
7818
      nodes_release = [node for node in self.acquired_locks[locking.LEVEL_NODE]
7819
                       if node != self.op.src_node]
7820
      self.context.glm.release(locking.LEVEL_NODE, nodes_release)
7821
      self.acquired_locks[locking.LEVEL_NODE] = nodes_keep
7822
    else:
7823
      self.context.glm.release(locking.LEVEL_NODE)
7824
      del self.acquired_locks[locking.LEVEL_NODE]
7825

    
7826
    if self.op.wait_for_sync:
7827
      disk_abort = not _WaitForSync(self, iobj)
7828
    elif iobj.disk_template in constants.DTS_NET_MIRROR:
7829
      # make sure the disks are not degraded (still sync-ing is ok)
7830
      time.sleep(15)
7831
      feedback_fn("* checking mirrors status")
7832
      disk_abort = not _WaitForSync(self, iobj, oneshot=True)
7833
    else:
7834
      disk_abort = False
7835

    
7836
    if disk_abort:
7837
      _RemoveDisks(self, iobj)
7838
      self.cfg.RemoveInstance(iobj.name)
7839
      # Make sure the instance lock gets removed
7840
      self.remove_locks[locking.LEVEL_INSTANCE] = iobj.name
7841
      raise errors.OpExecError("There are some degraded disks for"
7842
                               " this instance")
7843

    
7844
    if iobj.disk_template != constants.DT_DISKLESS and not self.adopt_disks:
7845
      if self.op.mode == constants.INSTANCE_CREATE:
7846
        if not self.op.no_install:
7847
          feedback_fn("* running the instance OS create scripts...")
7848
          # FIXME: pass debug option from opcode to backend
7849
          result = self.rpc.call_instance_os_add(pnode_name, iobj, False,
7850
                                                 self.op.debug_level)
7851
          result.Raise("Could not add os for instance %s"
7852
                       " on node %s" % (instance, pnode_name))
7853

    
7854
      elif self.op.mode == constants.INSTANCE_IMPORT:
7855
        feedback_fn("* running the instance OS import scripts...")
7856

    
7857
        transfers = []
7858

    
7859
        for idx, image in enumerate(self.src_images):
7860
          if not image:
7861
            continue
7862

    
7863
          # FIXME: pass debug option from opcode to backend
7864
          dt = masterd.instance.DiskTransfer("disk/%s" % idx,
7865
                                             constants.IEIO_FILE, (image, ),
7866
                                             constants.IEIO_SCRIPT,
7867
                                             (iobj.disks[idx], idx),
7868
                                             None)
7869
          transfers.append(dt)
7870

    
7871
        import_result = \
7872
          masterd.instance.TransferInstanceData(self, feedback_fn,
7873
                                                self.op.src_node, pnode_name,
7874
                                                self.pnode.secondary_ip,
7875
                                                iobj, transfers)
7876
        if not compat.all(import_result):
7877
          self.LogWarning("Some disks for instance %s on node %s were not"
7878
                          " imported successfully" % (instance, pnode_name))
7879

    
7880
      elif self.op.mode == constants.INSTANCE_REMOTE_IMPORT:
7881
        feedback_fn("* preparing remote import...")
7882
        # The source cluster will stop the instance before attempting to make a
7883
        # connection. In some cases stopping an instance can take a long time,
7884
        # hence the shutdown timeout is added to the connection timeout.
7885
        connect_timeout = (constants.RIE_CONNECT_TIMEOUT +
7886
                           self.op.source_shutdown_timeout)
7887
        timeouts = masterd.instance.ImportExportTimeouts(connect_timeout)
7888

    
7889
        assert iobj.primary_node == self.pnode.name
7890
        disk_results = \
7891
          masterd.instance.RemoteImport(self, feedback_fn, iobj, self.pnode,
7892
                                        self.source_x509_ca,
7893
                                        self._cds, timeouts)
7894
        if not compat.all(disk_results):
7895
          # TODO: Should the instance still be started, even if some disks
7896
          # failed to import (valid for local imports, too)?
7897
          self.LogWarning("Some disks for instance %s on node %s were not"
7898
                          " imported successfully" % (instance, pnode_name))
7899

    
7900
        # Run rename script on newly imported instance
7901
        assert iobj.name == instance
7902
        feedback_fn("Running rename script for %s" % instance)
7903
        result = self.rpc.call_instance_run_rename(pnode_name, iobj,
7904
                                                   self.source_instance_name,
7905
                                                   self.op.debug_level)
7906
        if result.fail_msg:
7907
          self.LogWarning("Failed to run rename script for %s on node"
7908
                          " %s: %s" % (instance, pnode_name, result.fail_msg))
7909

    
7910
      else:
7911
        # also checked in the prereq part
7912
        raise errors.ProgrammerError("Unknown OS initialization mode '%s'"
7913
                                     % self.op.mode)
7914

    
7915
    if self.op.start:
7916
      iobj.admin_up = True
7917
      self.cfg.Update(iobj, feedback_fn)
7918
      logging.info("Starting instance %s on node %s", instance, pnode_name)
7919
      feedback_fn("* starting instance...")
7920
      result = self.rpc.call_instance_start(pnode_name, iobj, None, None)
7921
      result.Raise("Could not start instance")
7922

    
7923
    return list(iobj.all_nodes)
7924

    
7925

    
7926
class LUInstanceConsole(NoHooksLU):
7927
  """Connect to an instance's console.
7928

7929
  This is somewhat special in that it returns the command line that
7930
  you need to run on the master node in order to connect to the
7931
  console.
7932

7933
  """
7934
  REQ_BGL = False
7935

    
7936
  def ExpandNames(self):
7937
    self._ExpandAndLockInstance()
7938

    
7939
  def CheckPrereq(self):
7940
    """Check prerequisites.
7941

7942
    This checks that the instance is in the cluster.
7943

7944
    """
7945
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
7946
    assert self.instance is not None, \
7947
      "Cannot retrieve locked instance %s" % self.op.instance_name
7948
    _CheckNodeOnline(self, self.instance.primary_node)
7949

    
7950
  def Exec(self, feedback_fn):
7951
    """Connect to the console of an instance
7952

7953
    """
7954
    instance = self.instance
7955
    node = instance.primary_node
7956

    
7957
    node_insts = self.rpc.call_instance_list([node],
7958
                                             [instance.hypervisor])[node]
7959
    node_insts.Raise("Can't get node information from %s" % node)
7960

    
7961
    if instance.name not in node_insts.payload:
7962
      if instance.admin_up:
7963
        state = constants.INSTST_ERRORDOWN
7964
      else:
7965
        state = constants.INSTST_ADMINDOWN
7966
      raise errors.OpExecError("Instance %s is not running (state %s)" %
7967
                               (instance.name, state))
7968

    
7969
    logging.debug("Connecting to console of %s on %s", instance.name, node)
7970

    
7971
    return _GetInstanceConsole(self.cfg.GetClusterInfo(), instance)
7972

    
7973

    
7974
def _GetInstanceConsole(cluster, instance):
7975
  """Returns console information for an instance.
7976

7977
  @type cluster: L{objects.Cluster}
7978
  @type instance: L{objects.Instance}
7979
  @rtype: dict
7980

7981
  """
7982
  hyper = hypervisor.GetHypervisor(instance.hypervisor)
7983
  # beparams and hvparams are passed separately, to avoid editing the
7984
  # instance and then saving the defaults in the instance itself.
7985
  hvparams = cluster.FillHV(instance)
7986
  beparams = cluster.FillBE(instance)
7987
  console = hyper.GetInstanceConsole(instance, hvparams, beparams)
7988

    
7989
  assert console.instance == instance.name
7990
  assert console.Validate()
7991

    
7992
  return console.ToDict()
7993

    
7994

    
7995
class LUInstanceReplaceDisks(LogicalUnit):
7996
  """Replace the disks of an instance.
7997

7998
  """
7999
  HPATH = "mirrors-replace"
8000
  HTYPE = constants.HTYPE_INSTANCE
8001
  REQ_BGL = False
8002

    
8003
  def CheckArguments(self):
8004
    TLReplaceDisks.CheckArguments(self.op.mode, self.op.remote_node,
8005
                                  self.op.iallocator)
8006

    
8007
  def ExpandNames(self):
8008
    self._ExpandAndLockInstance()
8009

    
8010
    if self.op.iallocator is not None:
8011
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
8012

    
8013
    elif self.op.remote_node is not None:
8014
      remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
8015
      self.op.remote_node = remote_node
8016

    
8017
      # Warning: do not remove the locking of the new secondary here
8018
      # unless DRBD8.AddChildren is changed to work in parallel;
8019
      # currently it doesn't since parallel invocations of
8020
      # FindUnusedMinor will conflict
8021
      self.needed_locks[locking.LEVEL_NODE] = [remote_node]
8022
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
8023

    
8024
    else:
8025
      self.needed_locks[locking.LEVEL_NODE] = []
8026
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8027

    
8028
    self.replacer = TLReplaceDisks(self, self.op.instance_name, self.op.mode,
8029
                                   self.op.iallocator, self.op.remote_node,
8030
                                   self.op.disks, False, self.op.early_release)
8031

    
8032
    self.tasklets = [self.replacer]
8033

    
8034
  def DeclareLocks(self, level):
8035
    # If we're not already locking all nodes in the set we have to declare the
8036
    # instance's primary/secondary nodes.
8037
    if (level == locking.LEVEL_NODE and
8038
        self.needed_locks[locking.LEVEL_NODE] is not locking.ALL_SET):
8039
      self._LockInstancesNodes()
8040

    
8041
  def BuildHooksEnv(self):
8042
    """Build hooks env.
8043

8044
    This runs on the master, the primary and all the secondaries.
8045

8046
    """
8047
    instance = self.replacer.instance
8048
    env = {
8049
      "MODE": self.op.mode,
8050
      "NEW_SECONDARY": self.op.remote_node,
8051
      "OLD_SECONDARY": instance.secondary_nodes[0],
8052
      }
8053
    env.update(_BuildInstanceHookEnvByObject(self, instance))
8054
    nl = [
8055
      self.cfg.GetMasterNode(),
8056
      instance.primary_node,
8057
      ]
8058
    if self.op.remote_node is not None:
8059
      nl.append(self.op.remote_node)
8060
    return env, nl, nl
8061

    
8062

    
8063
class TLReplaceDisks(Tasklet):
8064
  """Replaces disks for an instance.
8065

8066
  Note: Locking is not within the scope of this class.
8067

8068
  """
8069
  def __init__(self, lu, instance_name, mode, iallocator_name, remote_node,
8070
               disks, delay_iallocator, early_release):
8071
    """Initializes this class.
8072

8073
    """
8074
    Tasklet.__init__(self, lu)
8075

    
8076
    # Parameters
8077
    self.instance_name = instance_name
8078
    self.mode = mode
8079
    self.iallocator_name = iallocator_name
8080
    self.remote_node = remote_node
8081
    self.disks = disks
8082
    self.delay_iallocator = delay_iallocator
8083
    self.early_release = early_release
8084

    
8085
    # Runtime data
8086
    self.instance = None
8087
    self.new_node = None
8088
    self.target_node = None
8089
    self.other_node = None
8090
    self.remote_node_info = None
8091
    self.node_secondary_ip = None
8092

    
8093
  @staticmethod
8094
  def CheckArguments(mode, remote_node, iallocator):
8095
    """Helper function for users of this class.
8096

8097
    """
8098
    # check for valid parameter combination
8099
    if mode == constants.REPLACE_DISK_CHG:
8100
      if remote_node is None and iallocator is None:
8101
        raise errors.OpPrereqError("When changing the secondary either an"
8102
                                   " iallocator script must be used or the"
8103
                                   " new node given", errors.ECODE_INVAL)
8104

    
8105
      if remote_node is not None and iallocator is not None:
8106
        raise errors.OpPrereqError("Give either the iallocator or the new"
8107
                                   " secondary, not both", errors.ECODE_INVAL)
8108

    
8109
    elif remote_node is not None or iallocator is not None:
8110
      # Not replacing the secondary
8111
      raise errors.OpPrereqError("The iallocator and new node options can"
8112
                                 " only be used when changing the"
8113
                                 " secondary node", errors.ECODE_INVAL)
8114

    
8115
  @staticmethod
8116
  def _RunAllocator(lu, iallocator_name, instance_name, relocate_from):
8117
    """Compute a new secondary node using an IAllocator.
8118

8119
    """
8120
    ial = IAllocator(lu.cfg, lu.rpc,
8121
                     mode=constants.IALLOCATOR_MODE_RELOC,
8122
                     name=instance_name,
8123
                     relocate_from=relocate_from)
8124

    
8125
    ial.Run(iallocator_name)
8126

    
8127
    if not ial.success:
8128
      raise errors.OpPrereqError("Can't compute nodes using iallocator '%s':"
8129
                                 " %s" % (iallocator_name, ial.info),
8130
                                 errors.ECODE_NORES)
8131

    
8132
    if len(ial.result) != ial.required_nodes:
8133
      raise errors.OpPrereqError("iallocator '%s' returned invalid number"
8134
                                 " of nodes (%s), required %s" %
8135
                                 (iallocator_name,
8136
                                  len(ial.result), ial.required_nodes),
8137
                                 errors.ECODE_FAULT)
8138

    
8139
    remote_node_name = ial.result[0]
8140

    
8141
    lu.LogInfo("Selected new secondary for instance '%s': %s",
8142
               instance_name, remote_node_name)
8143

    
8144
    return remote_node_name
8145

    
8146
  def _FindFaultyDisks(self, node_name):
8147
    return _FindFaultyInstanceDisks(self.cfg, self.rpc, self.instance,
8148
                                    node_name, True)
8149

    
8150
  def CheckPrereq(self):
8151
    """Check prerequisites.
8152

8153
    This checks that the instance is in the cluster.
8154

8155
    """
8156
    self.instance = instance = self.cfg.GetInstanceInfo(self.instance_name)
8157
    assert instance is not None, \
8158
      "Cannot retrieve locked instance %s" % self.instance_name
8159

    
8160
    if instance.disk_template != constants.DT_DRBD8:
8161
      raise errors.OpPrereqError("Can only run replace disks for DRBD8-based"
8162
                                 " instances", errors.ECODE_INVAL)
8163

    
8164
    if len(instance.secondary_nodes) != 1:
8165
      raise errors.OpPrereqError("The instance has a strange layout,"
8166
                                 " expected one secondary but found %d" %
8167
                                 len(instance.secondary_nodes),
8168
                                 errors.ECODE_FAULT)
8169

    
8170
    if not self.delay_iallocator:
8171
      self._CheckPrereq2()
8172

    
8173
  def _CheckPrereq2(self):
8174
    """Check prerequisites, second part.
8175

8176
    This function should always be part of CheckPrereq. It was separated and is
8177
    now called from Exec because during node evacuation iallocator was only
8178
    called with an unmodified cluster model, not taking planned changes into
8179
    account.
8180

8181
    """
8182
    instance = self.instance
8183
    secondary_node = instance.secondary_nodes[0]
8184

    
8185
    if self.iallocator_name is None:
8186
      remote_node = self.remote_node
8187
    else:
8188
      remote_node = self._RunAllocator(self.lu, self.iallocator_name,
8189
                                       instance.name, instance.secondary_nodes)
8190

    
8191
    if remote_node is not None:
8192
      self.remote_node_info = self.cfg.GetNodeInfo(remote_node)
8193
      assert self.remote_node_info is not None, \
8194
        "Cannot retrieve locked node %s" % remote_node
8195
    else:
8196
      self.remote_node_info = None
8197

    
8198
    if remote_node == self.instance.primary_node:
8199
      raise errors.OpPrereqError("The specified node is the primary node of"
8200
                                 " the instance.", errors.ECODE_INVAL)
8201

    
8202
    if remote_node == secondary_node:
8203
      raise errors.OpPrereqError("The specified node is already the"
8204
                                 " secondary node of the instance.",
8205
                                 errors.ECODE_INVAL)
8206

    
8207
    if self.disks and self.mode in (constants.REPLACE_DISK_AUTO,
8208
                                    constants.REPLACE_DISK_CHG):
8209
      raise errors.OpPrereqError("Cannot specify disks to be replaced",
8210
                                 errors.ECODE_INVAL)
8211

    
8212
    if self.mode == constants.REPLACE_DISK_AUTO:
8213
      faulty_primary = self._FindFaultyDisks(instance.primary_node)
8214
      faulty_secondary = self._FindFaultyDisks(secondary_node)
8215

    
8216
      if faulty_primary and faulty_secondary:
8217
        raise errors.OpPrereqError("Instance %s has faulty disks on more than"
8218
                                   " one node and can not be repaired"
8219
                                   " automatically" % self.instance_name,
8220
                                   errors.ECODE_STATE)
8221

    
8222
      if faulty_primary:
8223
        self.disks = faulty_primary
8224
        self.target_node = instance.primary_node
8225
        self.other_node = secondary_node
8226
        check_nodes = [self.target_node, self.other_node]
8227
      elif faulty_secondary:
8228
        self.disks = faulty_secondary
8229
        self.target_node = secondary_node
8230
        self.other_node = instance.primary_node
8231
        check_nodes = [self.target_node, self.other_node]
8232
      else:
8233
        self.disks = []
8234
        check_nodes = []
8235

    
8236
    else:
8237
      # Non-automatic modes
8238
      if self.mode == constants.REPLACE_DISK_PRI:
8239
        self.target_node = instance.primary_node
8240
        self.other_node = secondary_node
8241
        check_nodes = [self.target_node, self.other_node]
8242

    
8243
      elif self.mode == constants.REPLACE_DISK_SEC:
8244
        self.target_node = secondary_node
8245
        self.other_node = instance.primary_node
8246
        check_nodes = [self.target_node, self.other_node]
8247

    
8248
      elif self.mode == constants.REPLACE_DISK_CHG:
8249
        self.new_node = remote_node
8250
        self.other_node = instance.primary_node
8251
        self.target_node = secondary_node
8252
        check_nodes = [self.new_node, self.other_node]
8253

    
8254
        _CheckNodeNotDrained(self.lu, remote_node)
8255
        _CheckNodeVmCapable(self.lu, remote_node)
8256

    
8257
        old_node_info = self.cfg.GetNodeInfo(secondary_node)
8258
        assert old_node_info is not None
8259
        if old_node_info.offline and not self.early_release:
8260
          # doesn't make sense to delay the release
8261
          self.early_release = True
8262
          self.lu.LogInfo("Old secondary %s is offline, automatically enabling"
8263
                          " early-release mode", secondary_node)
8264

    
8265
      else:
8266
        raise errors.ProgrammerError("Unhandled disk replace mode (%s)" %
8267
                                     self.mode)
8268

    
8269
      # If not specified all disks should be replaced
8270
      if not self.disks:
8271
        self.disks = range(len(self.instance.disks))
8272

    
8273
    for node in check_nodes:
8274
      _CheckNodeOnline(self.lu, node)
8275

    
8276
    # Check whether disks are valid
8277
    for disk_idx in self.disks:
8278
      instance.FindDisk(disk_idx)
8279

    
8280
    # Get secondary node IP addresses
8281
    node_2nd_ip = {}
8282

    
8283
    for node_name in [self.target_node, self.other_node, self.new_node]:
8284
      if node_name is not None:
8285
        node_2nd_ip[node_name] = self.cfg.GetNodeInfo(node_name).secondary_ip
8286

    
8287
    self.node_secondary_ip = node_2nd_ip
8288

    
8289
  def Exec(self, feedback_fn):
8290
    """Execute disk replacement.
8291

8292
    This dispatches the disk replacement to the appropriate handler.
8293

8294
    """
8295
    if self.delay_iallocator:
8296
      self._CheckPrereq2()
8297

    
8298
    if not self.disks:
8299
      feedback_fn("No disks need replacement")
8300
      return
8301

    
8302
    feedback_fn("Replacing disk(s) %s for %s" %
8303
                (utils.CommaJoin(self.disks), self.instance.name))
8304

    
8305
    activate_disks = (not self.instance.admin_up)
8306

    
8307
    # Activate the instance disks if we're replacing them on a down instance
8308
    if activate_disks:
8309
      _StartInstanceDisks(self.lu, self.instance, True)
8310

    
8311
    try:
8312
      # Should we replace the secondary node?
8313
      if self.new_node is not None:
8314
        fn = self._ExecDrbd8Secondary
8315
      else:
8316
        fn = self._ExecDrbd8DiskOnly
8317

    
8318
      return fn(feedback_fn)
8319

    
8320
    finally:
8321
      # Deactivate the instance disks if we're replacing them on a
8322
      # down instance
8323
      if activate_disks:
8324
        _SafeShutdownInstanceDisks(self.lu, self.instance)
8325

    
8326
  def _CheckVolumeGroup(self, nodes):
8327
    self.lu.LogInfo("Checking volume groups")
8328

    
8329
    vgname = self.cfg.GetVGName()
8330

    
8331
    # Make sure volume group exists on all involved nodes
8332
    results = self.rpc.call_vg_list(nodes)
8333
    if not results:
8334
      raise errors.OpExecError("Can't list volume groups on the nodes")
8335

    
8336
    for node in nodes:
8337
      res = results[node]
8338
      res.Raise("Error checking node %s" % node)
8339
      if vgname not in res.payload:
8340
        raise errors.OpExecError("Volume group '%s' not found on node %s" %
8341
                                 (vgname, node))
8342

    
8343
  def _CheckDisksExistence(self, nodes):
8344
    # Check disk existence
8345
    for idx, dev in enumerate(self.instance.disks):
8346
      if idx not in self.disks:
8347
        continue
8348

    
8349
      for node in nodes:
8350
        self.lu.LogInfo("Checking disk/%d on %s" % (idx, node))
8351
        self.cfg.SetDiskID(dev, node)
8352

    
8353
        result = self.rpc.call_blockdev_find(node, dev)
8354

    
8355
        msg = result.fail_msg
8356
        if msg or not result.payload:
8357
          if not msg:
8358
            msg = "disk not found"
8359
          raise errors.OpExecError("Can't find disk/%d on node %s: %s" %
8360
                                   (idx, node, msg))
8361

    
8362
  def _CheckDisksConsistency(self, node_name, on_primary, ldisk):
8363
    for idx, dev in enumerate(self.instance.disks):
8364
      if idx not in self.disks:
8365
        continue
8366

    
8367
      self.lu.LogInfo("Checking disk/%d consistency on node %s" %
8368
                      (idx, node_name))
8369

    
8370
      if not _CheckDiskConsistency(self.lu, dev, node_name, on_primary,
8371
                                   ldisk=ldisk):
8372
        raise errors.OpExecError("Node %s has degraded storage, unsafe to"
8373
                                 " replace disks for instance %s" %
8374
                                 (node_name, self.instance.name))
8375

    
8376
  def _CreateNewStorage(self, node_name):
8377
    vgname = self.cfg.GetVGName()
8378
    iv_names = {}
8379

    
8380
    for idx, dev in enumerate(self.instance.disks):
8381
      if idx not in self.disks:
8382
        continue
8383

    
8384
      self.lu.LogInfo("Adding storage on %s for disk/%d" % (node_name, idx))
8385

    
8386
      self.cfg.SetDiskID(dev, node_name)
8387

    
8388
      lv_names = [".disk%d_%s" % (idx, suffix) for suffix in ["data", "meta"]]
8389
      names = _GenerateUniqueNames(self.lu, lv_names)
8390

    
8391
      lv_data = objects.Disk(dev_type=constants.LD_LV, size=dev.size,
8392
                             logical_id=(vgname, names[0]))
8393
      lv_meta = objects.Disk(dev_type=constants.LD_LV, size=128,
8394
                             logical_id=(vgname, names[1]))
8395

    
8396
      new_lvs = [lv_data, lv_meta]
8397
      old_lvs = dev.children
8398
      iv_names[dev.iv_name] = (dev, old_lvs, new_lvs)
8399

    
8400
      # we pass force_create=True to force the LVM creation
8401
      for new_lv in new_lvs:
8402
        _CreateBlockDev(self.lu, node_name, self.instance, new_lv, True,
8403
                        _GetInstanceInfoText(self.instance), False)
8404

    
8405
    return iv_names
8406

    
8407
  def _CheckDevices(self, node_name, iv_names):
8408
    for name, (dev, _, _) in iv_names.iteritems():
8409
      self.cfg.SetDiskID(dev, node_name)
8410

    
8411
      result = self.rpc.call_blockdev_find(node_name, dev)
8412

    
8413
      msg = result.fail_msg
8414
      if msg or not result.payload:
8415
        if not msg:
8416
          msg = "disk not found"
8417
        raise errors.OpExecError("Can't find DRBD device %s: %s" %
8418
                                 (name, msg))
8419

    
8420
      if result.payload.is_degraded:
8421
        raise errors.OpExecError("DRBD device %s is degraded!" % name)
8422

    
8423
  def _RemoveOldStorage(self, node_name, iv_names):
8424
    for name, (_, old_lvs, _) in iv_names.iteritems():
8425
      self.lu.LogInfo("Remove logical volumes for %s" % name)
8426

    
8427
      for lv in old_lvs:
8428
        self.cfg.SetDiskID(lv, node_name)
8429

    
8430
        msg = self.rpc.call_blockdev_remove(node_name, lv).fail_msg
8431
        if msg:
8432
          self.lu.LogWarning("Can't remove old LV: %s" % msg,
8433
                             hint="remove unused LVs manually")
8434

    
8435
  def _ReleaseNodeLock(self, node_name):
8436
    """Releases the lock for a given node."""
8437
    self.lu.context.glm.release(locking.LEVEL_NODE, node_name)
8438

    
8439
  def _ExecDrbd8DiskOnly(self, feedback_fn):
8440
    """Replace a disk on the primary or secondary for DRBD 8.
8441

8442
    The algorithm for replace is quite complicated:
8443

8444
      1. for each disk to be replaced:
8445

8446
        1. create new LVs on the target node with unique names
8447
        1. detach old LVs from the drbd device
8448
        1. rename old LVs to name_replaced.<time_t>
8449
        1. rename new LVs to old LVs
8450
        1. attach the new LVs (with the old names now) to the drbd device
8451

8452
      1. wait for sync across all devices
8453

8454
      1. for each modified disk:
8455

8456
        1. remove old LVs (which have the name name_replaces.<time_t>)
8457

8458
    Failures are not very well handled.
8459

8460
    """
8461
    steps_total = 6
8462

    
8463
    # Step: check device activation
8464
    self.lu.LogStep(1, steps_total, "Check device existence")
8465
    self._CheckDisksExistence([self.other_node, self.target_node])
8466
    self._CheckVolumeGroup([self.target_node, self.other_node])
8467

    
8468
    # Step: check other node consistency
8469
    self.lu.LogStep(2, steps_total, "Check peer consistency")
8470
    self._CheckDisksConsistency(self.other_node,
8471
                                self.other_node == self.instance.primary_node,
8472
                                False)
8473

    
8474
    # Step: create new storage
8475
    self.lu.LogStep(3, steps_total, "Allocate new storage")
8476
    iv_names = self._CreateNewStorage(self.target_node)
8477

    
8478
    # Step: for each lv, detach+rename*2+attach
8479
    self.lu.LogStep(4, steps_total, "Changing drbd configuration")
8480
    for dev, old_lvs, new_lvs in iv_names.itervalues():
8481
      self.lu.LogInfo("Detaching %s drbd from local storage" % dev.iv_name)
8482

    
8483
      result = self.rpc.call_blockdev_removechildren(self.target_node, dev,
8484
                                                     old_lvs)
8485
      result.Raise("Can't detach drbd from local storage on node"
8486
                   " %s for device %s" % (self.target_node, dev.iv_name))
8487
      #dev.children = []
8488
      #cfg.Update(instance)
8489

    
8490
      # ok, we created the new LVs, so now we know we have the needed
8491
      # storage; as such, we proceed on the target node to rename
8492
      # old_lv to _old, and new_lv to old_lv; note that we rename LVs
8493
      # using the assumption that logical_id == physical_id (which in
8494
      # turn is the unique_id on that node)
8495

    
8496
      # FIXME(iustin): use a better name for the replaced LVs
8497
      temp_suffix = int(time.time())
8498
      ren_fn = lambda d, suff: (d.physical_id[0],
8499
                                d.physical_id[1] + "_replaced-%s" % suff)
8500

    
8501
      # Build the rename list based on what LVs exist on the node
8502
      rename_old_to_new = []
8503
      for to_ren in old_lvs:
8504
        result = self.rpc.call_blockdev_find(self.target_node, to_ren)
8505
        if not result.fail_msg and result.payload:
8506
          # device exists
8507
          rename_old_to_new.append((to_ren, ren_fn(to_ren, temp_suffix)))
8508

    
8509
      self.lu.LogInfo("Renaming the old LVs on the target node")
8510
      result = self.rpc.call_blockdev_rename(self.target_node,
8511
                                             rename_old_to_new)
8512
      result.Raise("Can't rename old LVs on node %s" % self.target_node)
8513

    
8514
      # Now we rename the new LVs to the old LVs
8515
      self.lu.LogInfo("Renaming the new LVs on the target node")
8516
      rename_new_to_old = [(new, old.physical_id)
8517
                           for old, new in zip(old_lvs, new_lvs)]
8518
      result = self.rpc.call_blockdev_rename(self.target_node,
8519
                                             rename_new_to_old)
8520
      result.Raise("Can't rename new LVs on node %s" % self.target_node)
8521

    
8522
      for old, new in zip(old_lvs, new_lvs):
8523
        new.logical_id = old.logical_id
8524
        self.cfg.SetDiskID(new, self.target_node)
8525

    
8526
      for disk in old_lvs:
8527
        disk.logical_id = ren_fn(disk, temp_suffix)
8528
        self.cfg.SetDiskID(disk, self.target_node)
8529

    
8530
      # Now that the new lvs have the old name, we can add them to the device
8531
      self.lu.LogInfo("Adding new mirror component on %s" % self.target_node)
8532
      result = self.rpc.call_blockdev_addchildren(self.target_node, dev,
8533
                                                  new_lvs)
8534
      msg = result.fail_msg
8535
      if msg:
8536
        for new_lv in new_lvs:
8537
          msg2 = self.rpc.call_blockdev_remove(self.target_node,
8538
                                               new_lv).fail_msg
8539
          if msg2:
8540
            self.lu.LogWarning("Can't rollback device %s: %s", dev, msg2,
8541
                               hint=("cleanup manually the unused logical"
8542
                                     "volumes"))
8543
        raise errors.OpExecError("Can't add local storage to drbd: %s" % msg)
8544

    
8545
      dev.children = new_lvs
8546

    
8547
      self.cfg.Update(self.instance, feedback_fn)
8548

    
8549
    cstep = 5
8550
    if self.early_release:
8551
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8552
      cstep += 1
8553
      self._RemoveOldStorage(self.target_node, iv_names)
8554
      # WARNING: we release both node locks here, do not do other RPCs
8555
      # than WaitForSync to the primary node
8556
      self._ReleaseNodeLock([self.target_node, self.other_node])
8557

    
8558
    # Wait for sync
8559
    # This can fail as the old devices are degraded and _WaitForSync
8560
    # does a combined result over all disks, so we don't check its return value
8561
    self.lu.LogStep(cstep, steps_total, "Sync devices")
8562
    cstep += 1
8563
    _WaitForSync(self.lu, self.instance)
8564

    
8565
    # Check all devices manually
8566
    self._CheckDevices(self.instance.primary_node, iv_names)
8567

    
8568
    # Step: remove old storage
8569
    if not self.early_release:
8570
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8571
      cstep += 1
8572
      self._RemoveOldStorage(self.target_node, iv_names)
8573

    
8574
  def _ExecDrbd8Secondary(self, feedback_fn):
8575
    """Replace the secondary node for DRBD 8.
8576

8577
    The algorithm for replace is quite complicated:
8578
      - for all disks of the instance:
8579
        - create new LVs on the new node with same names
8580
        - shutdown the drbd device on the old secondary
8581
        - disconnect the drbd network on the primary
8582
        - create the drbd device on the new secondary
8583
        - network attach the drbd on the primary, using an artifice:
8584
          the drbd code for Attach() will connect to the network if it
8585
          finds a device which is connected to the good local disks but
8586
          not network enabled
8587
      - wait for sync across all devices
8588
      - remove all disks from the old secondary
8589

8590
    Failures are not very well handled.
8591

8592
    """
8593
    steps_total = 6
8594

    
8595
    # Step: check device activation
8596
    self.lu.LogStep(1, steps_total, "Check device existence")
8597
    self._CheckDisksExistence([self.instance.primary_node])
8598
    self._CheckVolumeGroup([self.instance.primary_node])
8599

    
8600
    # Step: check other node consistency
8601
    self.lu.LogStep(2, steps_total, "Check peer consistency")
8602
    self._CheckDisksConsistency(self.instance.primary_node, True, True)
8603

    
8604
    # Step: create new storage
8605
    self.lu.LogStep(3, steps_total, "Allocate new storage")
8606
    for idx, dev in enumerate(self.instance.disks):
8607
      self.lu.LogInfo("Adding new local storage on %s for disk/%d" %
8608
                      (self.new_node, idx))
8609
      # we pass force_create=True to force LVM creation
8610
      for new_lv in dev.children:
8611
        _CreateBlockDev(self.lu, self.new_node, self.instance, new_lv, True,
8612
                        _GetInstanceInfoText(self.instance), False)
8613

    
8614
    # Step 4: dbrd minors and drbd setups changes
8615
    # after this, we must manually remove the drbd minors on both the
8616
    # error and the success paths
8617
    self.lu.LogStep(4, steps_total, "Changing drbd configuration")
8618
    minors = self.cfg.AllocateDRBDMinor([self.new_node
8619
                                         for dev in self.instance.disks],
8620
                                        self.instance.name)
8621
    logging.debug("Allocated minors %r", minors)
8622

    
8623
    iv_names = {}
8624
    for idx, (dev, new_minor) in enumerate(zip(self.instance.disks, minors)):
8625
      self.lu.LogInfo("activating a new drbd on %s for disk/%d" %
8626
                      (self.new_node, idx))
8627
      # create new devices on new_node; note that we create two IDs:
8628
      # one without port, so the drbd will be activated without
8629
      # networking information on the new node at this stage, and one
8630
      # with network, for the latter activation in step 4
8631
      (o_node1, o_node2, o_port, o_minor1, o_minor2, o_secret) = dev.logical_id
8632
      if self.instance.primary_node == o_node1:
8633
        p_minor = o_minor1
8634
      else:
8635
        assert self.instance.primary_node == o_node2, "Three-node instance?"
8636
        p_minor = o_minor2
8637

    
8638
      new_alone_id = (self.instance.primary_node, self.new_node, None,
8639
                      p_minor, new_minor, o_secret)
8640
      new_net_id = (self.instance.primary_node, self.new_node, o_port,
8641
                    p_minor, new_minor, o_secret)
8642

    
8643
      iv_names[idx] = (dev, dev.children, new_net_id)
8644
      logging.debug("Allocated new_minor: %s, new_logical_id: %s", new_minor,
8645
                    new_net_id)
8646
      new_drbd = objects.Disk(dev_type=constants.LD_DRBD8,
8647
                              logical_id=new_alone_id,
8648
                              children=dev.children,
8649
                              size=dev.size)
8650
      try:
8651
        _CreateSingleBlockDev(self.lu, self.new_node, self.instance, new_drbd,
8652
                              _GetInstanceInfoText(self.instance), False)
8653
      except errors.GenericError:
8654
        self.cfg.ReleaseDRBDMinors(self.instance.name)
8655
        raise
8656

    
8657
    # We have new devices, shutdown the drbd on the old secondary
8658
    for idx, dev in enumerate(self.instance.disks):
8659
      self.lu.LogInfo("Shutting down drbd for disk/%d on old node" % idx)
8660
      self.cfg.SetDiskID(dev, self.target_node)
8661
      msg = self.rpc.call_blockdev_shutdown(self.target_node, dev).fail_msg
8662
      if msg:
8663
        self.lu.LogWarning("Failed to shutdown drbd for disk/%d on old"
8664
                           "node: %s" % (idx, msg),
8665
                           hint=("Please cleanup this device manually as"
8666
                                 " soon as possible"))
8667

    
8668
    self.lu.LogInfo("Detaching primary drbds from the network (=> standalone)")
8669
    result = self.rpc.call_drbd_disconnect_net([self.instance.primary_node],
8670
                                               self.node_secondary_ip,
8671
                                               self.instance.disks)\
8672
                                              [self.instance.primary_node]
8673

    
8674
    msg = result.fail_msg
8675
    if msg:
8676
      # detaches didn't succeed (unlikely)
8677
      self.cfg.ReleaseDRBDMinors(self.instance.name)
8678
      raise errors.OpExecError("Can't detach the disks from the network on"
8679
                               " old node: %s" % (msg,))
8680

    
8681
    # if we managed to detach at least one, we update all the disks of
8682
    # the instance to point to the new secondary
8683
    self.lu.LogInfo("Updating instance configuration")
8684
    for dev, _, new_logical_id in iv_names.itervalues():
8685
      dev.logical_id = new_logical_id
8686
      self.cfg.SetDiskID(dev, self.instance.primary_node)
8687

    
8688
    self.cfg.Update(self.instance, feedback_fn)
8689

    
8690
    # and now perform the drbd attach
8691
    self.lu.LogInfo("Attaching primary drbds to new secondary"
8692
                    " (standalone => connected)")
8693
    result = self.rpc.call_drbd_attach_net([self.instance.primary_node,
8694
                                            self.new_node],
8695
                                           self.node_secondary_ip,
8696
                                           self.instance.disks,
8697
                                           self.instance.name,
8698
                                           False)
8699
    for to_node, to_result in result.items():
8700
      msg = to_result.fail_msg
8701
      if msg:
8702
        self.lu.LogWarning("Can't attach drbd disks on node %s: %s",
8703
                           to_node, msg,
8704
                           hint=("please do a gnt-instance info to see the"
8705
                                 " status of disks"))
8706
    cstep = 5
8707
    if self.early_release:
8708
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8709
      cstep += 1
8710
      self._RemoveOldStorage(self.target_node, iv_names)
8711
      # WARNING: we release all node locks here, do not do other RPCs
8712
      # than WaitForSync to the primary node
8713
      self._ReleaseNodeLock([self.instance.primary_node,
8714
                             self.target_node,
8715
                             self.new_node])
8716

    
8717
    # Wait for sync
8718
    # This can fail as the old devices are degraded and _WaitForSync
8719
    # does a combined result over all disks, so we don't check its return value
8720
    self.lu.LogStep(cstep, steps_total, "Sync devices")
8721
    cstep += 1
8722
    _WaitForSync(self.lu, self.instance)
8723

    
8724
    # Check all devices manually
8725
    self._CheckDevices(self.instance.primary_node, iv_names)
8726

    
8727
    # Step: remove old storage
8728
    if not self.early_release:
8729
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8730
      self._RemoveOldStorage(self.target_node, iv_names)
8731

    
8732

    
8733
class LURepairNodeStorage(NoHooksLU):
8734
  """Repairs the volume group on a node.
8735

8736
  """
8737
  REQ_BGL = False
8738

    
8739
  def CheckArguments(self):
8740
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
8741

    
8742
    storage_type = self.op.storage_type
8743

    
8744
    if (constants.SO_FIX_CONSISTENCY not in
8745
        constants.VALID_STORAGE_OPERATIONS.get(storage_type, [])):
8746
      raise errors.OpPrereqError("Storage units of type '%s' can not be"
8747
                                 " repaired" % storage_type,
8748
                                 errors.ECODE_INVAL)
8749

    
8750
  def ExpandNames(self):
8751
    self.needed_locks = {
8752
      locking.LEVEL_NODE: [self.op.node_name],
8753
      }
8754

    
8755
  def _CheckFaultyDisks(self, instance, node_name):
8756
    """Ensure faulty disks abort the opcode or at least warn."""
8757
    try:
8758
      if _FindFaultyInstanceDisks(self.cfg, self.rpc, instance,
8759
                                  node_name, True):
8760
        raise errors.OpPrereqError("Instance '%s' has faulty disks on"
8761
                                   " node '%s'" % (instance.name, node_name),
8762
                                   errors.ECODE_STATE)
8763
    except errors.OpPrereqError, err:
8764
      if self.op.ignore_consistency:
8765
        self.proc.LogWarning(str(err.args[0]))
8766
      else:
8767
        raise
8768

    
8769
  def CheckPrereq(self):
8770
    """Check prerequisites.
8771

8772
    """
8773
    # Check whether any instance on this node has faulty disks
8774
    for inst in _GetNodeInstances(self.cfg, self.op.node_name):
8775
      if not inst.admin_up:
8776
        continue
8777
      check_nodes = set(inst.all_nodes)
8778
      check_nodes.discard(self.op.node_name)
8779
      for inst_node_name in check_nodes:
8780
        self._CheckFaultyDisks(inst, inst_node_name)
8781

    
8782
  def Exec(self, feedback_fn):
8783
    feedback_fn("Repairing storage unit '%s' on %s ..." %
8784
                (self.op.name, self.op.node_name))
8785

    
8786
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
8787
    result = self.rpc.call_storage_execute(self.op.node_name,
8788
                                           self.op.storage_type, st_args,
8789
                                           self.op.name,
8790
                                           constants.SO_FIX_CONSISTENCY)
8791
    result.Raise("Failed to repair storage unit '%s' on %s" %
8792
                 (self.op.name, self.op.node_name))
8793

    
8794

    
8795
class LUNodeEvacStrategy(NoHooksLU):
8796
  """Computes the node evacuation strategy.
8797

8798
  """
8799
  REQ_BGL = False
8800

    
8801
  def CheckArguments(self):
8802
    _CheckIAllocatorOrNode(self, "iallocator", "remote_node")
8803

    
8804
  def ExpandNames(self):
8805
    self.op.nodes = _GetWantedNodes(self, self.op.nodes)
8806
    self.needed_locks = locks = {}
8807
    if self.op.remote_node is None:
8808
      locks[locking.LEVEL_NODE] = locking.ALL_SET
8809
    else:
8810
      self.op.remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
8811
      locks[locking.LEVEL_NODE] = self.op.nodes + [self.op.remote_node]
8812

    
8813
  def Exec(self, feedback_fn):
8814
    if self.op.remote_node is not None:
8815
      instances = []
8816
      for node in self.op.nodes:
8817
        instances.extend(_GetNodeSecondaryInstances(self.cfg, node))
8818
      result = []
8819
      for i in instances:
8820
        if i.primary_node == self.op.remote_node:
8821
          raise errors.OpPrereqError("Node %s is the primary node of"
8822
                                     " instance %s, cannot use it as"
8823
                                     " secondary" %
8824
                                     (self.op.remote_node, i.name),
8825
                                     errors.ECODE_INVAL)
8826
        result.append([i.name, self.op.remote_node])
8827
    else:
8828
      ial = IAllocator(self.cfg, self.rpc,
8829
                       mode=constants.IALLOCATOR_MODE_MEVAC,
8830
                       evac_nodes=self.op.nodes)
8831
      ial.Run(self.op.iallocator, validate=True)
8832
      if not ial.success:
8833
        raise errors.OpExecError("No valid evacuation solution: %s" % ial.info,
8834
                                 errors.ECODE_NORES)
8835
      result = ial.result
8836
    return result
8837

    
8838

    
8839
class LUInstanceGrowDisk(LogicalUnit):
8840
  """Grow a disk of an instance.
8841

8842
  """
8843
  HPATH = "disk-grow"
8844
  HTYPE = constants.HTYPE_INSTANCE
8845
  REQ_BGL = False
8846

    
8847
  def ExpandNames(self):
8848
    self._ExpandAndLockInstance()
8849
    self.needed_locks[locking.LEVEL_NODE] = []
8850
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8851

    
8852
  def DeclareLocks(self, level):
8853
    if level == locking.LEVEL_NODE:
8854
      self._LockInstancesNodes()
8855

    
8856
  def BuildHooksEnv(self):
8857
    """Build hooks env.
8858

8859
    This runs on the master, the primary and all the secondaries.
8860

8861
    """
8862
    env = {
8863
      "DISK": self.op.disk,
8864
      "AMOUNT": self.op.amount,
8865
      }
8866
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
8867
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
8868
    return env, nl, nl
8869

    
8870
  def CheckPrereq(self):
8871
    """Check prerequisites.
8872

8873
    This checks that the instance is in the cluster.
8874

8875
    """
8876
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
8877
    assert instance is not None, \
8878
      "Cannot retrieve locked instance %s" % self.op.instance_name
8879
    nodenames = list(instance.all_nodes)
8880
    for node in nodenames:
8881
      _CheckNodeOnline(self, node)
8882

    
8883
    self.instance = instance
8884

    
8885
    if instance.disk_template not in constants.DTS_GROWABLE:
8886
      raise errors.OpPrereqError("Instance's disk layout does not support"
8887
                                 " growing.", errors.ECODE_INVAL)
8888

    
8889
    self.disk = instance.FindDisk(self.op.disk)
8890

    
8891
    if instance.disk_template not in (constants.DT_FILE,
8892
                                      constants.DT_SHARED_FILE):
8893
      # TODO: check the free disk space for file, when that feature will be
8894
      # supported
8895
      _CheckNodesFreeDiskPerVG(self, nodenames,
8896
                               self.disk.ComputeGrowth(self.op.amount))
8897

    
8898
  def Exec(self, feedback_fn):
8899
    """Execute disk grow.
8900

8901
    """
8902
    instance = self.instance
8903
    disk = self.disk
8904

    
8905
    disks_ok, _ = _AssembleInstanceDisks(self, self.instance, disks=[disk])
8906
    if not disks_ok:
8907
      raise errors.OpExecError("Cannot activate block device to grow")
8908

    
8909
    for node in instance.all_nodes:
8910
      self.cfg.SetDiskID(disk, node)
8911
      result = self.rpc.call_blockdev_grow(node, disk, self.op.amount)
8912
      result.Raise("Grow request failed to node %s" % node)
8913

    
8914
      # TODO: Rewrite code to work properly
8915
      # DRBD goes into sync mode for a short amount of time after executing the
8916
      # "resize" command. DRBD 8.x below version 8.0.13 contains a bug whereby
8917
      # calling "resize" in sync mode fails. Sleeping for a short amount of
8918
      # time is a work-around.
8919
      time.sleep(5)
8920

    
8921
    disk.RecordGrow(self.op.amount)
8922
    self.cfg.Update(instance, feedback_fn)
8923
    if self.op.wait_for_sync:
8924
      disk_abort = not _WaitForSync(self, instance, disks=[disk])
8925
      if disk_abort:
8926
        self.proc.LogWarning("Warning: disk sync-ing has not returned a good"
8927
                             " status.\nPlease check the instance.")
8928
      if not instance.admin_up:
8929
        _SafeShutdownInstanceDisks(self, instance, disks=[disk])
8930
    elif not instance.admin_up:
8931
      self.proc.LogWarning("Not shutting down the disk even if the instance is"
8932
                           " not supposed to be running because no wait for"
8933
                           " sync mode was requested.")
8934

    
8935

    
8936
class LUInstanceQueryData(NoHooksLU):
8937
  """Query runtime instance data.
8938

8939
  """
8940
  REQ_BGL = False
8941

    
8942
  def ExpandNames(self):
8943
    self.needed_locks = {}
8944
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
8945

    
8946
    if self.op.instances:
8947
      self.wanted_names = []
8948
      for name in self.op.instances:
8949
        full_name = _ExpandInstanceName(self.cfg, name)
8950
        self.wanted_names.append(full_name)
8951
      self.needed_locks[locking.LEVEL_INSTANCE] = self.wanted_names
8952
    else:
8953
      self.wanted_names = None
8954
      self.needed_locks[locking.LEVEL_INSTANCE] = locking.ALL_SET
8955

    
8956
    self.needed_locks[locking.LEVEL_NODE] = []
8957
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8958

    
8959
  def DeclareLocks(self, level):
8960
    if level == locking.LEVEL_NODE:
8961
      self._LockInstancesNodes()
8962

    
8963
  def CheckPrereq(self):
8964
    """Check prerequisites.
8965

8966
    This only checks the optional instance list against the existing names.
8967

8968
    """
8969
    if self.wanted_names is None:
8970
      self.wanted_names = self.acquired_locks[locking.LEVEL_INSTANCE]
8971

    
8972
    self.wanted_instances = [self.cfg.GetInstanceInfo(name) for name
8973
                             in self.wanted_names]
8974

    
8975
  def _ComputeBlockdevStatus(self, node, instance_name, dev):
8976
    """Returns the status of a block device
8977

8978
    """
8979
    if self.op.static or not node:
8980
      return None
8981

    
8982
    self.cfg.SetDiskID(dev, node)
8983

    
8984
    result = self.rpc.call_blockdev_find(node, dev)
8985
    if result.offline:
8986
      return None
8987

    
8988
    result.Raise("Can't compute disk status for %s" % instance_name)
8989

    
8990
    status = result.payload
8991
    if status is None:
8992
      return None
8993

    
8994
    return (status.dev_path, status.major, status.minor,
8995
            status.sync_percent, status.estimated_time,
8996
            status.is_degraded, status.ldisk_status)
8997

    
8998
  def _ComputeDiskStatus(self, instance, snode, dev):
8999
    """Compute block device status.
9000

9001
    """
9002
    if dev.dev_type in constants.LDS_DRBD:
9003
      # we change the snode then (otherwise we use the one passed in)
9004
      if dev.logical_id[0] == instance.primary_node:
9005
        snode = dev.logical_id[1]
9006
      else:
9007
        snode = dev.logical_id[0]
9008

    
9009
    dev_pstatus = self._ComputeBlockdevStatus(instance.primary_node,
9010
                                              instance.name, dev)
9011
    dev_sstatus = self._ComputeBlockdevStatus(snode, instance.name, dev)
9012

    
9013
    if dev.children:
9014
      dev_children = [self._ComputeDiskStatus(instance, snode, child)
9015
                      for child in dev.children]
9016
    else:
9017
      dev_children = []
9018

    
9019
    data = {
9020
      "iv_name": dev.iv_name,
9021
      "dev_type": dev.dev_type,
9022
      "logical_id": dev.logical_id,
9023
      "physical_id": dev.physical_id,
9024
      "pstatus": dev_pstatus,
9025
      "sstatus": dev_sstatus,
9026
      "children": dev_children,
9027
      "mode": dev.mode,
9028
      "size": dev.size,
9029
      }
9030

    
9031
    return data
9032

    
9033
  def Exec(self, feedback_fn):
9034
    """Gather and return data"""
9035
    result = {}
9036

    
9037
    cluster = self.cfg.GetClusterInfo()
9038

    
9039
    for instance in self.wanted_instances:
9040
      if not self.op.static:
9041
        remote_info = self.rpc.call_instance_info(instance.primary_node,
9042
                                                  instance.name,
9043
                                                  instance.hypervisor)
9044
        remote_info.Raise("Error checking node %s" % instance.primary_node)
9045
        remote_info = remote_info.payload
9046
        if remote_info and "state" in remote_info:
9047
          remote_state = "up"
9048
        else:
9049
          remote_state = "down"
9050
      else:
9051
        remote_state = None
9052
      if instance.admin_up:
9053
        config_state = "up"
9054
      else:
9055
        config_state = "down"
9056

    
9057
      disks = [self._ComputeDiskStatus(instance, None, device)
9058
               for device in instance.disks]
9059

    
9060
      idict = {
9061
        "name": instance.name,
9062
        "config_state": config_state,
9063
        "run_state": remote_state,
9064
        "pnode": instance.primary_node,
9065
        "snodes": instance.secondary_nodes,
9066
        "os": instance.os,
9067
        # this happens to be the same format used for hooks
9068
        "nics": _NICListToTuple(self, instance.nics),
9069
        "disk_template": instance.disk_template,
9070
        "disks": disks,
9071
        "hypervisor": instance.hypervisor,
9072
        "network_port": instance.network_port,
9073
        "hv_instance": instance.hvparams,
9074
        "hv_actual": cluster.FillHV(instance, skip_globals=True),
9075
        "be_instance": instance.beparams,
9076
        "be_actual": cluster.FillBE(instance),
9077
        "os_instance": instance.osparams,
9078
        "os_actual": cluster.SimpleFillOS(instance.os, instance.osparams),
9079
        "serial_no": instance.serial_no,
9080
        "mtime": instance.mtime,
9081
        "ctime": instance.ctime,
9082
        "uuid": instance.uuid,
9083
        }
9084

    
9085
      result[instance.name] = idict
9086

    
9087
    return result
9088

    
9089

    
9090
class LUInstanceSetParams(LogicalUnit):
9091
  """Modifies an instances's parameters.
9092

9093
  """
9094
  HPATH = "instance-modify"
9095
  HTYPE = constants.HTYPE_INSTANCE
9096
  REQ_BGL = False
9097

    
9098
  def CheckArguments(self):
9099
    if not (self.op.nics or self.op.disks or self.op.disk_template or
9100
            self.op.hvparams or self.op.beparams or self.op.os_name):
9101
      raise errors.OpPrereqError("No changes submitted", errors.ECODE_INVAL)
9102

    
9103
    if self.op.hvparams:
9104
      _CheckGlobalHvParams(self.op.hvparams)
9105

    
9106
    # Disk validation
9107
    disk_addremove = 0
9108
    for disk_op, disk_dict in self.op.disks:
9109
      utils.ForceDictType(disk_dict, constants.IDISK_PARAMS_TYPES)
9110
      if disk_op == constants.DDM_REMOVE:
9111
        disk_addremove += 1
9112
        continue
9113
      elif disk_op == constants.DDM_ADD:
9114
        disk_addremove += 1
9115
      else:
9116
        if not isinstance(disk_op, int):
9117
          raise errors.OpPrereqError("Invalid disk index", errors.ECODE_INVAL)
9118
        if not isinstance(disk_dict, dict):
9119
          msg = "Invalid disk value: expected dict, got '%s'" % disk_dict
9120
          raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
9121

    
9122
      if disk_op == constants.DDM_ADD:
9123
        mode = disk_dict.setdefault('mode', constants.DISK_RDWR)
9124
        if mode not in constants.DISK_ACCESS_SET:
9125
          raise errors.OpPrereqError("Invalid disk access mode '%s'" % mode,
9126
                                     errors.ECODE_INVAL)
9127
        size = disk_dict.get('size', None)
9128
        if size is None:
9129
          raise errors.OpPrereqError("Required disk parameter size missing",
9130
                                     errors.ECODE_INVAL)
9131
        try:
9132
          size = int(size)
9133
        except (TypeError, ValueError), err:
9134
          raise errors.OpPrereqError("Invalid disk size parameter: %s" %
9135
                                     str(err), errors.ECODE_INVAL)
9136
        disk_dict['size'] = size
9137
      else:
9138
        # modification of disk
9139
        if 'size' in disk_dict:
9140
          raise errors.OpPrereqError("Disk size change not possible, use"
9141
                                     " grow-disk", errors.ECODE_INVAL)
9142

    
9143
    if disk_addremove > 1:
9144
      raise errors.OpPrereqError("Only one disk add or remove operation"
9145
                                 " supported at a time", errors.ECODE_INVAL)
9146

    
9147
    if self.op.disks and self.op.disk_template is not None:
9148
      raise errors.OpPrereqError("Disk template conversion and other disk"
9149
                                 " changes not supported at the same time",
9150
                                 errors.ECODE_INVAL)
9151

    
9152
    if (self.op.disk_template and
9153
        self.op.disk_template in constants.DTS_NET_MIRROR and
9154
        self.op.remote_node is None):
9155
      raise errors.OpPrereqError("Changing the disk template to a mirrored"
9156
                                 " one requires specifying a secondary node",
9157
                                 errors.ECODE_INVAL)
9158

    
9159
    # NIC validation
9160
    nic_addremove = 0
9161
    for nic_op, nic_dict in self.op.nics:
9162
      utils.ForceDictType(nic_dict, constants.INIC_PARAMS_TYPES)
9163
      if nic_op == constants.DDM_REMOVE:
9164
        nic_addremove += 1
9165
        continue
9166
      elif nic_op == constants.DDM_ADD:
9167
        nic_addremove += 1
9168
      else:
9169
        if not isinstance(nic_op, int):
9170
          raise errors.OpPrereqError("Invalid nic index", errors.ECODE_INVAL)
9171
        if not isinstance(nic_dict, dict):
9172
          msg = "Invalid nic value: expected dict, got '%s'" % nic_dict
9173
          raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
9174

    
9175
      # nic_dict should be a dict
9176
      nic_ip = nic_dict.get('ip', None)
9177
      if nic_ip is not None:
9178
        if nic_ip.lower() == constants.VALUE_NONE:
9179
          nic_dict['ip'] = None
9180
        else:
9181
          if not netutils.IPAddress.IsValid(nic_ip):
9182
            raise errors.OpPrereqError("Invalid IP address '%s'" % nic_ip,
9183
                                       errors.ECODE_INVAL)
9184

    
9185
      nic_bridge = nic_dict.get('bridge', None)
9186
      nic_link = nic_dict.get('link', None)
9187
      if nic_bridge and nic_link:
9188
        raise errors.OpPrereqError("Cannot pass 'bridge' and 'link'"
9189
                                   " at the same time", errors.ECODE_INVAL)
9190
      elif nic_bridge and nic_bridge.lower() == constants.VALUE_NONE:
9191
        nic_dict['bridge'] = None
9192
      elif nic_link and nic_link.lower() == constants.VALUE_NONE:
9193
        nic_dict['link'] = None
9194

    
9195
      if nic_op == constants.DDM_ADD:
9196
        nic_mac = nic_dict.get('mac', None)
9197
        if nic_mac is None:
9198
          nic_dict['mac'] = constants.VALUE_AUTO
9199

    
9200
      if 'mac' in nic_dict:
9201
        nic_mac = nic_dict['mac']
9202
        if nic_mac not in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
9203
          nic_mac = utils.NormalizeAndValidateMac(nic_mac)
9204

    
9205
        if nic_op != constants.DDM_ADD and nic_mac == constants.VALUE_AUTO:
9206
          raise errors.OpPrereqError("'auto' is not a valid MAC address when"
9207
                                     " modifying an existing nic",
9208
                                     errors.ECODE_INVAL)
9209

    
9210
    if nic_addremove > 1:
9211
      raise errors.OpPrereqError("Only one NIC add or remove operation"
9212
                                 " supported at a time", errors.ECODE_INVAL)
9213

    
9214
  def ExpandNames(self):
9215
    self._ExpandAndLockInstance()
9216
    self.needed_locks[locking.LEVEL_NODE] = []
9217
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
9218

    
9219
  def DeclareLocks(self, level):
9220
    if level == locking.LEVEL_NODE:
9221
      self._LockInstancesNodes()
9222
      if self.op.disk_template and self.op.remote_node:
9223
        self.op.remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
9224
        self.needed_locks[locking.LEVEL_NODE].append(self.op.remote_node)
9225

    
9226
  def BuildHooksEnv(self):
9227
    """Build hooks env.
9228

9229
    This runs on the master, primary and secondaries.
9230

9231
    """
9232
    args = dict()
9233
    if constants.BE_MEMORY in self.be_new:
9234
      args['memory'] = self.be_new[constants.BE_MEMORY]
9235
    if constants.BE_VCPUS in self.be_new:
9236
      args['vcpus'] = self.be_new[constants.BE_VCPUS]
9237
    # TODO: export disk changes. Note: _BuildInstanceHookEnv* don't export disk
9238
    # information at all.
9239
    if self.op.nics:
9240
      args['nics'] = []
9241
      nic_override = dict(self.op.nics)
9242
      for idx, nic in enumerate(self.instance.nics):
9243
        if idx in nic_override:
9244
          this_nic_override = nic_override[idx]
9245
        else:
9246
          this_nic_override = {}
9247
        if 'ip' in this_nic_override:
9248
          ip = this_nic_override['ip']
9249
        else:
9250
          ip = nic.ip
9251
        if 'mac' in this_nic_override:
9252
          mac = this_nic_override['mac']
9253
        else:
9254
          mac = nic.mac
9255
        if idx in self.nic_pnew:
9256
          nicparams = self.nic_pnew[idx]
9257
        else:
9258
          nicparams = self.cluster.SimpleFillNIC(nic.nicparams)
9259
        mode = nicparams[constants.NIC_MODE]
9260
        link = nicparams[constants.NIC_LINK]
9261
        args['nics'].append((ip, mac, mode, link))
9262
      if constants.DDM_ADD in nic_override:
9263
        ip = nic_override[constants.DDM_ADD].get('ip', None)
9264
        mac = nic_override[constants.DDM_ADD]['mac']
9265
        nicparams = self.nic_pnew[constants.DDM_ADD]
9266
        mode = nicparams[constants.NIC_MODE]
9267
        link = nicparams[constants.NIC_LINK]
9268
        args['nics'].append((ip, mac, mode, link))
9269
      elif constants.DDM_REMOVE in nic_override:
9270
        del args['nics'][-1]
9271

    
9272
    env = _BuildInstanceHookEnvByObject(self, self.instance, override=args)
9273
    if self.op.disk_template:
9274
      env["NEW_DISK_TEMPLATE"] = self.op.disk_template
9275
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
9276
    return env, nl, nl
9277

    
9278
  def CheckPrereq(self):
9279
    """Check prerequisites.
9280

9281
    This only checks the instance list against the existing names.
9282

9283
    """
9284
    # checking the new params on the primary/secondary nodes
9285

    
9286
    instance = self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
9287
    cluster = self.cluster = self.cfg.GetClusterInfo()
9288
    assert self.instance is not None, \
9289
      "Cannot retrieve locked instance %s" % self.op.instance_name
9290
    pnode = instance.primary_node
9291
    nodelist = list(instance.all_nodes)
9292

    
9293
    # OS change
9294
    if self.op.os_name and not self.op.force:
9295
      _CheckNodeHasOS(self, instance.primary_node, self.op.os_name,
9296
                      self.op.force_variant)
9297
      instance_os = self.op.os_name
9298
    else:
9299
      instance_os = instance.os
9300

    
9301
    if self.op.disk_template:
9302
      if instance.disk_template == self.op.disk_template:
9303
        raise errors.OpPrereqError("Instance already has disk template %s" %
9304
                                   instance.disk_template, errors.ECODE_INVAL)
9305

    
9306
      if (instance.disk_template,
9307
          self.op.disk_template) not in self._DISK_CONVERSIONS:
9308
        raise errors.OpPrereqError("Unsupported disk template conversion from"
9309
                                   " %s to %s" % (instance.disk_template,
9310
                                                  self.op.disk_template),
9311
                                   errors.ECODE_INVAL)
9312
      _CheckInstanceDown(self, instance, "cannot change disk template")
9313
      if self.op.disk_template in constants.DTS_NET_MIRROR:
9314
        if self.op.remote_node == pnode:
9315
          raise errors.OpPrereqError("Given new secondary node %s is the same"
9316
                                     " as the primary node of the instance" %
9317
                                     self.op.remote_node, errors.ECODE_STATE)
9318
        _CheckNodeOnline(self, self.op.remote_node)
9319
        _CheckNodeNotDrained(self, self.op.remote_node)
9320
        # FIXME: here we assume that the old instance type is DT_PLAIN
9321
        assert instance.disk_template == constants.DT_PLAIN
9322
        disks = [{"size": d.size, "vg": d.logical_id[0]}
9323
                 for d in instance.disks]
9324
        required = _ComputeDiskSizePerVG(self.op.disk_template, disks)
9325
        _CheckNodesFreeDiskPerVG(self, [self.op.remote_node], required)
9326

    
9327
    # hvparams processing
9328
    if self.op.hvparams:
9329
      hv_type = instance.hypervisor
9330
      i_hvdict = _GetUpdatedParams(instance.hvparams, self.op.hvparams)
9331
      utils.ForceDictType(i_hvdict, constants.HVS_PARAMETER_TYPES)
9332
      hv_new = cluster.SimpleFillHV(hv_type, instance.os, i_hvdict)
9333

    
9334
      # local check
9335
      hypervisor.GetHypervisor(hv_type).CheckParameterSyntax(hv_new)
9336
      _CheckHVParams(self, nodelist, instance.hypervisor, hv_new)
9337
      self.hv_new = hv_new # the new actual values
9338
      self.hv_inst = i_hvdict # the new dict (without defaults)
9339
    else:
9340
      self.hv_new = self.hv_inst = {}
9341

    
9342
    # beparams processing
9343
    if self.op.beparams:
9344
      i_bedict = _GetUpdatedParams(instance.beparams, self.op.beparams,
9345
                                   use_none=True)
9346
      utils.ForceDictType(i_bedict, constants.BES_PARAMETER_TYPES)
9347
      be_new = cluster.SimpleFillBE(i_bedict)
9348
      self.be_new = be_new # the new actual values
9349
      self.be_inst = i_bedict # the new dict (without defaults)
9350
    else:
9351
      self.be_new = self.be_inst = {}
9352

    
9353
    # osparams processing
9354
    if self.op.osparams:
9355
      i_osdict = _GetUpdatedParams(instance.osparams, self.op.osparams)
9356
      _CheckOSParams(self, True, nodelist, instance_os, i_osdict)
9357
      self.os_inst = i_osdict # the new dict (without defaults)
9358
    else:
9359
      self.os_inst = {}
9360

    
9361
    self.warn = []
9362

    
9363
    if constants.BE_MEMORY in self.op.beparams and not self.op.force:
9364
      mem_check_list = [pnode]
9365
      if be_new[constants.BE_AUTO_BALANCE]:
9366
        # either we changed auto_balance to yes or it was from before
9367
        mem_check_list.extend(instance.secondary_nodes)
9368
      instance_info = self.rpc.call_instance_info(pnode, instance.name,
9369
                                                  instance.hypervisor)
9370
      nodeinfo = self.rpc.call_node_info(mem_check_list, None,
9371
                                         instance.hypervisor)
9372
      pninfo = nodeinfo[pnode]
9373
      msg = pninfo.fail_msg
9374
      if msg:
9375
        # Assume the primary node is unreachable and go ahead
9376
        self.warn.append("Can't get info from primary node %s: %s" %
9377
                         (pnode,  msg))
9378
      elif not isinstance(pninfo.payload.get('memory_free', None), int):
9379
        self.warn.append("Node data from primary node %s doesn't contain"
9380
                         " free memory information" % pnode)
9381
      elif instance_info.fail_msg:
9382
        self.warn.append("Can't get instance runtime information: %s" %
9383
                        instance_info.fail_msg)
9384
      else:
9385
        if instance_info.payload:
9386
          current_mem = int(instance_info.payload['memory'])
9387
        else:
9388
          # Assume instance not running
9389
          # (there is a slight race condition here, but it's not very probable,
9390
          # and we have no other way to check)
9391
          current_mem = 0
9392
        miss_mem = (be_new[constants.BE_MEMORY] - current_mem -
9393
                    pninfo.payload['memory_free'])
9394
        if miss_mem > 0:
9395
          raise errors.OpPrereqError("This change will prevent the instance"
9396
                                     " from starting, due to %d MB of memory"
9397
                                     " missing on its primary node" % miss_mem,
9398
                                     errors.ECODE_NORES)
9399

    
9400
      if be_new[constants.BE_AUTO_BALANCE]:
9401
        for node, nres in nodeinfo.items():
9402
          if node not in instance.secondary_nodes:
9403
            continue
9404
          msg = nres.fail_msg
9405
          if msg:
9406
            self.warn.append("Can't get info from secondary node %s: %s" %
9407
                             (node, msg))
9408
          elif not isinstance(nres.payload.get('memory_free', None), int):
9409
            self.warn.append("Secondary node %s didn't return free"
9410
                             " memory information" % node)
9411
          elif be_new[constants.BE_MEMORY] > nres.payload['memory_free']:
9412
            self.warn.append("Not enough memory to failover instance to"
9413
                             " secondary node %s" % node)
9414

    
9415
    # NIC processing
9416
    self.nic_pnew = {}
9417
    self.nic_pinst = {}
9418
    for nic_op, nic_dict in self.op.nics:
9419
      if nic_op == constants.DDM_REMOVE:
9420
        if not instance.nics:
9421
          raise errors.OpPrereqError("Instance has no NICs, cannot remove",
9422
                                     errors.ECODE_INVAL)
9423
        continue
9424
      if nic_op != constants.DDM_ADD:
9425
        # an existing nic
9426
        if not instance.nics:
9427
          raise errors.OpPrereqError("Invalid NIC index %s, instance has"
9428
                                     " no NICs" % nic_op,
9429
                                     errors.ECODE_INVAL)
9430
        if nic_op < 0 or nic_op >= len(instance.nics):
9431
          raise errors.OpPrereqError("Invalid NIC index %s, valid values"
9432
                                     " are 0 to %d" %
9433
                                     (nic_op, len(instance.nics) - 1),
9434
                                     errors.ECODE_INVAL)
9435
        old_nic_params = instance.nics[nic_op].nicparams
9436
        old_nic_ip = instance.nics[nic_op].ip
9437
      else:
9438
        old_nic_params = {}
9439
        old_nic_ip = None
9440

    
9441
      update_params_dict = dict([(key, nic_dict[key])
9442
                                 for key in constants.NICS_PARAMETERS
9443
                                 if key in nic_dict])
9444

    
9445
      if 'bridge' in nic_dict:
9446
        update_params_dict[constants.NIC_LINK] = nic_dict['bridge']
9447

    
9448
      new_nic_params = _GetUpdatedParams(old_nic_params,
9449
                                         update_params_dict)
9450
      utils.ForceDictType(new_nic_params, constants.NICS_PARAMETER_TYPES)
9451
      new_filled_nic_params = cluster.SimpleFillNIC(new_nic_params)
9452
      objects.NIC.CheckParameterSyntax(new_filled_nic_params)
9453
      self.nic_pinst[nic_op] = new_nic_params
9454
      self.nic_pnew[nic_op] = new_filled_nic_params
9455
      new_nic_mode = new_filled_nic_params[constants.NIC_MODE]
9456

    
9457
      if new_nic_mode == constants.NIC_MODE_BRIDGED:
9458
        nic_bridge = new_filled_nic_params[constants.NIC_LINK]
9459
        msg = self.rpc.call_bridges_exist(pnode, [nic_bridge]).fail_msg
9460
        if msg:
9461
          msg = "Error checking bridges on node %s: %s" % (pnode, msg)
9462
          if self.op.force:
9463
            self.warn.append(msg)
9464
          else:
9465
            raise errors.OpPrereqError(msg, errors.ECODE_ENVIRON)
9466
      if new_nic_mode == constants.NIC_MODE_ROUTED:
9467
        if 'ip' in nic_dict:
9468
          nic_ip = nic_dict['ip']
9469
        else:
9470
          nic_ip = old_nic_ip
9471
        if nic_ip is None:
9472
          raise errors.OpPrereqError('Cannot set the nic ip to None'
9473
                                     ' on a routed nic', errors.ECODE_INVAL)
9474
      if 'mac' in nic_dict:
9475
        nic_mac = nic_dict['mac']
9476
        if nic_mac is None:
9477
          raise errors.OpPrereqError('Cannot set the nic mac to None',
9478
                                     errors.ECODE_INVAL)
9479
        elif nic_mac in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
9480
          # otherwise generate the mac
9481
          nic_dict['mac'] = self.cfg.GenerateMAC(self.proc.GetECId())
9482
        else:
9483
          # or validate/reserve the current one
9484
          try:
9485
            self.cfg.ReserveMAC(nic_mac, self.proc.GetECId())
9486
          except errors.ReservationError:
9487
            raise errors.OpPrereqError("MAC address %s already in use"
9488
                                       " in cluster" % nic_mac,
9489
                                       errors.ECODE_NOTUNIQUE)
9490

    
9491
    # DISK processing
9492
    if self.op.disks and instance.disk_template == constants.DT_DISKLESS:
9493
      raise errors.OpPrereqError("Disk operations not supported for"
9494
                                 " diskless instances",
9495
                                 errors.ECODE_INVAL)
9496
    for disk_op, _ in self.op.disks:
9497
      if disk_op == constants.DDM_REMOVE:
9498
        if len(instance.disks) == 1:
9499
          raise errors.OpPrereqError("Cannot remove the last disk of"
9500
                                     " an instance", errors.ECODE_INVAL)
9501
        _CheckInstanceDown(self, instance, "cannot remove disks")
9502

    
9503
      if (disk_op == constants.DDM_ADD and
9504
          len(instance.disks) >= constants.MAX_DISKS):
9505
        raise errors.OpPrereqError("Instance has too many disks (%d), cannot"
9506
                                   " add more" % constants.MAX_DISKS,
9507
                                   errors.ECODE_STATE)
9508
      if disk_op not in (constants.DDM_ADD, constants.DDM_REMOVE):
9509
        # an existing disk
9510
        if disk_op < 0 or disk_op >= len(instance.disks):
9511
          raise errors.OpPrereqError("Invalid disk index %s, valid values"
9512
                                     " are 0 to %d" %
9513
                                     (disk_op, len(instance.disks)),
9514
                                     errors.ECODE_INVAL)
9515

    
9516
    return
9517

    
9518
  def _ConvertPlainToDrbd(self, feedback_fn):
9519
    """Converts an instance from plain to drbd.
9520

9521
    """
9522
    feedback_fn("Converting template to drbd")
9523
    instance = self.instance
9524
    pnode = instance.primary_node
9525
    snode = self.op.remote_node
9526

    
9527
    # create a fake disk info for _GenerateDiskTemplate
9528
    disk_info = [{"size": d.size, "mode": d.mode} for d in instance.disks]
9529
    new_disks = _GenerateDiskTemplate(self, self.op.disk_template,
9530
                                      instance.name, pnode, [snode],
9531
                                      disk_info, None, None, 0, feedback_fn)
9532
    info = _GetInstanceInfoText(instance)
9533
    feedback_fn("Creating aditional volumes...")
9534
    # first, create the missing data and meta devices
9535
    for disk in new_disks:
9536
      # unfortunately this is... not too nice
9537
      _CreateSingleBlockDev(self, pnode, instance, disk.children[1],
9538
                            info, True)
9539
      for child in disk.children:
9540
        _CreateSingleBlockDev(self, snode, instance, child, info, True)
9541
    # at this stage, all new LVs have been created, we can rename the
9542
    # old ones
9543
    feedback_fn("Renaming original volumes...")
9544
    rename_list = [(o, n.children[0].logical_id)
9545
                   for (o, n) in zip(instance.disks, new_disks)]
9546
    result = self.rpc.call_blockdev_rename(pnode, rename_list)
9547
    result.Raise("Failed to rename original LVs")
9548

    
9549
    feedback_fn("Initializing DRBD devices...")
9550
    # all child devices are in place, we can now create the DRBD devices
9551
    for disk in new_disks:
9552
      for node in [pnode, snode]:
9553
        f_create = node == pnode
9554
        _CreateSingleBlockDev(self, node, instance, disk, info, f_create)
9555

    
9556
    # at this point, the instance has been modified
9557
    instance.disk_template = constants.DT_DRBD8
9558
    instance.disks = new_disks
9559
    self.cfg.Update(instance, feedback_fn)
9560

    
9561
    # disks are created, waiting for sync
9562
    disk_abort = not _WaitForSync(self, instance)
9563
    if disk_abort:
9564
      raise errors.OpExecError("There are some degraded disks for"
9565
                               " this instance, please cleanup manually")
9566

    
9567
  def _ConvertDrbdToPlain(self, feedback_fn):
9568
    """Converts an instance from drbd to plain.
9569

9570
    """
9571
    instance = self.instance
9572
    assert len(instance.secondary_nodes) == 1
9573
    pnode = instance.primary_node
9574
    snode = instance.secondary_nodes[0]
9575
    feedback_fn("Converting template to plain")
9576

    
9577
    old_disks = instance.disks
9578
    new_disks = [d.children[0] for d in old_disks]
9579

    
9580
    # copy over size and mode
9581
    for parent, child in zip(old_disks, new_disks):
9582
      child.size = parent.size
9583
      child.mode = parent.mode
9584

    
9585
    # update instance structure
9586
    instance.disks = new_disks
9587
    instance.disk_template = constants.DT_PLAIN
9588
    self.cfg.Update(instance, feedback_fn)
9589

    
9590
    feedback_fn("Removing volumes on the secondary node...")
9591
    for disk in old_disks:
9592
      self.cfg.SetDiskID(disk, snode)
9593
      msg = self.rpc.call_blockdev_remove(snode, disk).fail_msg
9594
      if msg:
9595
        self.LogWarning("Could not remove block device %s on node %s,"
9596
                        " continuing anyway: %s", disk.iv_name, snode, msg)
9597

    
9598
    feedback_fn("Removing unneeded volumes on the primary node...")
9599
    for idx, disk in enumerate(old_disks):
9600
      meta = disk.children[1]
9601
      self.cfg.SetDiskID(meta, pnode)
9602
      msg = self.rpc.call_blockdev_remove(pnode, meta).fail_msg
9603
      if msg:
9604
        self.LogWarning("Could not remove metadata for disk %d on node %s,"
9605
                        " continuing anyway: %s", idx, pnode, msg)
9606

    
9607
  def Exec(self, feedback_fn):
9608
    """Modifies an instance.
9609

9610
    All parameters take effect only at the next restart of the instance.
9611

9612
    """
9613
    # Process here the warnings from CheckPrereq, as we don't have a
9614
    # feedback_fn there.
9615
    for warn in self.warn:
9616
      feedback_fn("WARNING: %s" % warn)
9617

    
9618
    result = []
9619
    instance = self.instance
9620
    # disk changes
9621
    for disk_op, disk_dict in self.op.disks:
9622
      if disk_op == constants.DDM_REMOVE:
9623
        # remove the last disk
9624
        device = instance.disks.pop()
9625
        device_idx = len(instance.disks)
9626
        for node, disk in device.ComputeNodeTree(instance.primary_node):
9627
          self.cfg.SetDiskID(disk, node)
9628
          msg = self.rpc.call_blockdev_remove(node, disk).fail_msg
9629
          if msg:
9630
            self.LogWarning("Could not remove disk/%d on node %s: %s,"
9631
                            " continuing anyway", device_idx, node, msg)
9632
        result.append(("disk/%d" % device_idx, "remove"))
9633
      elif disk_op == constants.DDM_ADD:
9634
        # add a new disk
9635
        if instance.disk_template in (constants.DT_FILE,
9636
                                        constants.DT_SHARED_FILE):
9637
          file_driver, file_path = instance.disks[0].logical_id
9638
          file_path = os.path.dirname(file_path)
9639
        else:
9640
          file_driver = file_path = None
9641
        disk_idx_base = len(instance.disks)
9642
        new_disk = _GenerateDiskTemplate(self,
9643
                                         instance.disk_template,
9644
                                         instance.name, instance.primary_node,
9645
                                         instance.secondary_nodes,
9646
                                         [disk_dict],
9647
                                         file_path,
9648
                                         file_driver,
9649
                                         disk_idx_base, feedback_fn)[0]
9650
        instance.disks.append(new_disk)
9651
        info = _GetInstanceInfoText(instance)
9652

    
9653
        logging.info("Creating volume %s for instance %s",
9654
                     new_disk.iv_name, instance.name)
9655
        # Note: this needs to be kept in sync with _CreateDisks
9656
        #HARDCODE
9657
        for node in instance.all_nodes:
9658
          f_create = node == instance.primary_node
9659
          try:
9660
            _CreateBlockDev(self, node, instance, new_disk,
9661
                            f_create, info, f_create)
9662
          except errors.OpExecError, err:
9663
            self.LogWarning("Failed to create volume %s (%s) on"
9664
                            " node %s: %s",
9665
                            new_disk.iv_name, new_disk, node, err)
9666
        result.append(("disk/%d" % disk_idx_base, "add:size=%s,mode=%s" %
9667
                       (new_disk.size, new_disk.mode)))
9668
      else:
9669
        # change a given disk
9670
        instance.disks[disk_op].mode = disk_dict['mode']
9671
        result.append(("disk.mode/%d" % disk_op, disk_dict['mode']))
9672

    
9673
    if self.op.disk_template:
9674
      r_shut = _ShutdownInstanceDisks(self, instance)
9675
      if not r_shut:
9676
        raise errors.OpExecError("Cannot shutdown instance disks, unable to"
9677
                                 " proceed with disk template conversion")
9678
      mode = (instance.disk_template, self.op.disk_template)
9679
      try:
9680
        self._DISK_CONVERSIONS[mode](self, feedback_fn)
9681
      except:
9682
        self.cfg.ReleaseDRBDMinors(instance.name)
9683
        raise
9684
      result.append(("disk_template", self.op.disk_template))
9685

    
9686
    # NIC changes
9687
    for nic_op, nic_dict in self.op.nics:
9688
      if nic_op == constants.DDM_REMOVE:
9689
        # remove the last nic
9690
        del instance.nics[-1]
9691
        result.append(("nic.%d" % len(instance.nics), "remove"))
9692
      elif nic_op == constants.DDM_ADD:
9693
        # mac and bridge should be set, by now
9694
        mac = nic_dict['mac']
9695
        ip = nic_dict.get('ip', None)
9696
        nicparams = self.nic_pinst[constants.DDM_ADD]
9697
        new_nic = objects.NIC(mac=mac, ip=ip, nicparams=nicparams)
9698
        instance.nics.append(new_nic)
9699
        result.append(("nic.%d" % (len(instance.nics) - 1),
9700
                       "add:mac=%s,ip=%s,mode=%s,link=%s" %
9701
                       (new_nic.mac, new_nic.ip,
9702
                        self.nic_pnew[constants.DDM_ADD][constants.NIC_MODE],
9703
                        self.nic_pnew[constants.DDM_ADD][constants.NIC_LINK]
9704
                       )))
9705
      else:
9706
        for key in 'mac', 'ip':
9707
          if key in nic_dict:
9708
            setattr(instance.nics[nic_op], key, nic_dict[key])
9709
        if nic_op in self.nic_pinst:
9710
          instance.nics[nic_op].nicparams = self.nic_pinst[nic_op]
9711
        for key, val in nic_dict.iteritems():
9712
          result.append(("nic.%s/%d" % (key, nic_op), val))
9713

    
9714
    # hvparams changes
9715
    if self.op.hvparams:
9716
      instance.hvparams = self.hv_inst
9717
      for key, val in self.op.hvparams.iteritems():
9718
        result.append(("hv/%s" % key, val))
9719

    
9720
    # beparams changes
9721
    if self.op.beparams:
9722
      instance.beparams = self.be_inst
9723
      for key, val in self.op.beparams.iteritems():
9724
        result.append(("be/%s" % key, val))
9725

    
9726
    # OS change
9727
    if self.op.os_name:
9728
      instance.os = self.op.os_name
9729

    
9730
    # osparams changes
9731
    if self.op.osparams:
9732
      instance.osparams = self.os_inst
9733
      for key, val in self.op.osparams.iteritems():
9734
        result.append(("os/%s" % key, val))
9735

    
9736
    self.cfg.Update(instance, feedback_fn)
9737

    
9738
    return result
9739

    
9740
  _DISK_CONVERSIONS = {
9741
    (constants.DT_PLAIN, constants.DT_DRBD8): _ConvertPlainToDrbd,
9742
    (constants.DT_DRBD8, constants.DT_PLAIN): _ConvertDrbdToPlain,
9743
    }
9744

    
9745

    
9746
class LUBackupQuery(NoHooksLU):
9747
  """Query the exports list
9748

9749
  """
9750
  REQ_BGL = False
9751

    
9752
  def ExpandNames(self):
9753
    self.needed_locks = {}
9754
    self.share_locks[locking.LEVEL_NODE] = 1
9755
    if not self.op.nodes:
9756
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
9757
    else:
9758
      self.needed_locks[locking.LEVEL_NODE] = \
9759
        _GetWantedNodes(self, self.op.nodes)
9760

    
9761
  def Exec(self, feedback_fn):
9762
    """Compute the list of all the exported system images.
9763

9764
    @rtype: dict
9765
    @return: a dictionary with the structure node->(export-list)
9766
        where export-list is a list of the instances exported on
9767
        that node.
9768

9769
    """
9770
    self.nodes = self.acquired_locks[locking.LEVEL_NODE]
9771
    rpcresult = self.rpc.call_export_list(self.nodes)
9772
    result = {}
9773
    for node in rpcresult:
9774
      if rpcresult[node].fail_msg:
9775
        result[node] = False
9776
      else:
9777
        result[node] = rpcresult[node].payload
9778

    
9779
    return result
9780

    
9781

    
9782
class LUBackupPrepare(NoHooksLU):
9783
  """Prepares an instance for an export and returns useful information.
9784

9785
  """
9786
  REQ_BGL = False
9787

    
9788
  def ExpandNames(self):
9789
    self._ExpandAndLockInstance()
9790

    
9791
  def CheckPrereq(self):
9792
    """Check prerequisites.
9793

9794
    """
9795
    instance_name = self.op.instance_name
9796

    
9797
    self.instance = self.cfg.GetInstanceInfo(instance_name)
9798
    assert self.instance is not None, \
9799
          "Cannot retrieve locked instance %s" % self.op.instance_name
9800
    _CheckNodeOnline(self, self.instance.primary_node)
9801

    
9802
    self._cds = _GetClusterDomainSecret()
9803

    
9804
  def Exec(self, feedback_fn):
9805
    """Prepares an instance for an export.
9806

9807
    """
9808
    instance = self.instance
9809

    
9810
    if self.op.mode == constants.EXPORT_MODE_REMOTE:
9811
      salt = utils.GenerateSecret(8)
9812

    
9813
      feedback_fn("Generating X509 certificate on %s" % instance.primary_node)
9814
      result = self.rpc.call_x509_cert_create(instance.primary_node,
9815
                                              constants.RIE_CERT_VALIDITY)
9816
      result.Raise("Can't create X509 key and certificate on %s" % result.node)
9817

    
9818
      (name, cert_pem) = result.payload
9819

    
9820
      cert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM,
9821
                                             cert_pem)
9822

    
9823
      return {
9824
        "handshake": masterd.instance.ComputeRemoteExportHandshake(self._cds),
9825
        "x509_key_name": (name, utils.Sha1Hmac(self._cds, name, salt=salt),
9826
                          salt),
9827
        "x509_ca": utils.SignX509Certificate(cert, self._cds, salt),
9828
        }
9829

    
9830
    return None
9831

    
9832

    
9833
class LUBackupExport(LogicalUnit):
9834
  """Export an instance to an image in the cluster.
9835

9836
  """
9837
  HPATH = "instance-export"
9838
  HTYPE = constants.HTYPE_INSTANCE
9839
  REQ_BGL = False
9840

    
9841
  def CheckArguments(self):
9842
    """Check the arguments.
9843

9844
    """
9845
    self.x509_key_name = self.op.x509_key_name
9846
    self.dest_x509_ca_pem = self.op.destination_x509_ca
9847

    
9848
    if self.op.mode == constants.EXPORT_MODE_REMOTE:
9849
      if not self.x509_key_name:
9850
        raise errors.OpPrereqError("Missing X509 key name for encryption",
9851
                                   errors.ECODE_INVAL)
9852

    
9853
      if not self.dest_x509_ca_pem:
9854
        raise errors.OpPrereqError("Missing destination X509 CA",
9855
                                   errors.ECODE_INVAL)
9856

    
9857
  def ExpandNames(self):
9858
    self._ExpandAndLockInstance()
9859

    
9860
    # Lock all nodes for local exports
9861
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9862
      # FIXME: lock only instance primary and destination node
9863
      #
9864
      # Sad but true, for now we have do lock all nodes, as we don't know where
9865
      # the previous export might be, and in this LU we search for it and
9866
      # remove it from its current node. In the future we could fix this by:
9867
      #  - making a tasklet to search (share-lock all), then create the
9868
      #    new one, then one to remove, after
9869
      #  - removing the removal operation altogether
9870
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
9871

    
9872
  def DeclareLocks(self, level):
9873
    """Last minute lock declaration."""
9874
    # All nodes are locked anyway, so nothing to do here.
9875

    
9876
  def BuildHooksEnv(self):
9877
    """Build hooks env.
9878

9879
    This will run on the master, primary node and target node.
9880

9881
    """
9882
    env = {
9883
      "EXPORT_MODE": self.op.mode,
9884
      "EXPORT_NODE": self.op.target_node,
9885
      "EXPORT_DO_SHUTDOWN": self.op.shutdown,
9886
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
9887
      # TODO: Generic function for boolean env variables
9888
      "REMOVE_INSTANCE": str(bool(self.op.remove_instance)),
9889
      }
9890

    
9891
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
9892

    
9893
    nl = [self.cfg.GetMasterNode(), self.instance.primary_node]
9894

    
9895
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9896
      nl.append(self.op.target_node)
9897

    
9898
    return env, nl, nl
9899

    
9900
  def CheckPrereq(self):
9901
    """Check prerequisites.
9902

9903
    This checks that the instance and node names are valid.
9904

9905
    """
9906
    instance_name = self.op.instance_name
9907

    
9908
    self.instance = self.cfg.GetInstanceInfo(instance_name)
9909
    assert self.instance is not None, \
9910
          "Cannot retrieve locked instance %s" % self.op.instance_name
9911
    _CheckNodeOnline(self, self.instance.primary_node)
9912

    
9913
    if (self.op.remove_instance and self.instance.admin_up and
9914
        not self.op.shutdown):
9915
      raise errors.OpPrereqError("Can not remove instance without shutting it"
9916
                                 " down before")
9917

    
9918
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9919
      self.op.target_node = _ExpandNodeName(self.cfg, self.op.target_node)
9920
      self.dst_node = self.cfg.GetNodeInfo(self.op.target_node)
9921
      assert self.dst_node is not None
9922

    
9923
      _CheckNodeOnline(self, self.dst_node.name)
9924
      _CheckNodeNotDrained(self, self.dst_node.name)
9925

    
9926
      self._cds = None
9927
      self.dest_disk_info = None
9928
      self.dest_x509_ca = None
9929

    
9930
    elif self.op.mode == constants.EXPORT_MODE_REMOTE:
9931
      self.dst_node = None
9932

    
9933
      if len(self.op.target_node) != len(self.instance.disks):
9934
        raise errors.OpPrereqError(("Received destination information for %s"
9935
                                    " disks, but instance %s has %s disks") %
9936
                                   (len(self.op.target_node), instance_name,
9937
                                    len(self.instance.disks)),
9938
                                   errors.ECODE_INVAL)
9939

    
9940
      cds = _GetClusterDomainSecret()
9941

    
9942
      # Check X509 key name
9943
      try:
9944
        (key_name, hmac_digest, hmac_salt) = self.x509_key_name
9945
      except (TypeError, ValueError), err:
9946
        raise errors.OpPrereqError("Invalid data for X509 key name: %s" % err)
9947

    
9948
      if not utils.VerifySha1Hmac(cds, key_name, hmac_digest, salt=hmac_salt):
9949
        raise errors.OpPrereqError("HMAC for X509 key name is wrong",
9950
                                   errors.ECODE_INVAL)
9951

    
9952
      # Load and verify CA
9953
      try:
9954
        (cert, _) = utils.LoadSignedX509Certificate(self.dest_x509_ca_pem, cds)
9955
      except OpenSSL.crypto.Error, err:
9956
        raise errors.OpPrereqError("Unable to load destination X509 CA (%s)" %
9957
                                   (err, ), errors.ECODE_INVAL)
9958

    
9959
      (errcode, msg) = utils.VerifyX509Certificate(cert, None, None)
9960
      if errcode is not None:
9961
        raise errors.OpPrereqError("Invalid destination X509 CA (%s)" %
9962
                                   (msg, ), errors.ECODE_INVAL)
9963

    
9964
      self.dest_x509_ca = cert
9965

    
9966
      # Verify target information
9967
      disk_info = []
9968
      for idx, disk_data in enumerate(self.op.target_node):
9969
        try:
9970
          (host, port, magic) = \
9971
            masterd.instance.CheckRemoteExportDiskInfo(cds, idx, disk_data)
9972
        except errors.GenericError, err:
9973
          raise errors.OpPrereqError("Target info for disk %s: %s" %
9974
                                     (idx, err), errors.ECODE_INVAL)
9975

    
9976
        disk_info.append((host, port, magic))
9977

    
9978
      assert len(disk_info) == len(self.op.target_node)
9979
      self.dest_disk_info = disk_info
9980

    
9981
    else:
9982
      raise errors.ProgrammerError("Unhandled export mode %r" %
9983
                                   self.op.mode)
9984

    
9985
    # instance disk type verification
9986
    # TODO: Implement export support for file-based disks
9987
    for disk in self.instance.disks:
9988
      if disk.dev_type == constants.LD_FILE:
9989
        raise errors.OpPrereqError("Export not supported for instances with"
9990
                                   " file-based disks", errors.ECODE_INVAL)
9991

    
9992
  def _CleanupExports(self, feedback_fn):
9993
    """Removes exports of current instance from all other nodes.
9994

9995
    If an instance in a cluster with nodes A..D was exported to node C, its
9996
    exports will be removed from the nodes A, B and D.
9997

9998
    """
9999
    assert self.op.mode != constants.EXPORT_MODE_REMOTE
10000

    
10001
    nodelist = self.cfg.GetNodeList()
10002
    nodelist.remove(self.dst_node.name)
10003

    
10004
    # on one-node clusters nodelist will be empty after the removal
10005
    # if we proceed the backup would be removed because OpBackupQuery
10006
    # substitutes an empty list with the full cluster node list.
10007
    iname = self.instance.name
10008
    if nodelist:
10009
      feedback_fn("Removing old exports for instance %s" % iname)
10010
      exportlist = self.rpc.call_export_list(nodelist)
10011
      for node in exportlist:
10012
        if exportlist[node].fail_msg:
10013
          continue
10014
        if iname in exportlist[node].payload:
10015
          msg = self.rpc.call_export_remove(node, iname).fail_msg
10016
          if msg:
10017
            self.LogWarning("Could not remove older export for instance %s"
10018
                            " on node %s: %s", iname, node, msg)
10019

    
10020
  def Exec(self, feedback_fn):
10021
    """Export an instance to an image in the cluster.
10022

10023
    """
10024
    assert self.op.mode in constants.EXPORT_MODES
10025

    
10026
    instance = self.instance
10027
    src_node = instance.primary_node
10028

    
10029
    if self.op.shutdown:
10030
      # shutdown the instance, but not the disks
10031
      feedback_fn("Shutting down instance %s" % instance.name)
10032
      result = self.rpc.call_instance_shutdown(src_node, instance,
10033
                                               self.op.shutdown_timeout)
10034
      # TODO: Maybe ignore failures if ignore_remove_failures is set
10035
      result.Raise("Could not shutdown instance %s on"
10036
                   " node %s" % (instance.name, src_node))
10037

    
10038
    # set the disks ID correctly since call_instance_start needs the
10039
    # correct drbd minor to create the symlinks
10040
    for disk in instance.disks:
10041
      self.cfg.SetDiskID(disk, src_node)
10042

    
10043
    activate_disks = (not instance.admin_up)
10044

    
10045
    if activate_disks:
10046
      # Activate the instance disks if we'exporting a stopped instance
10047
      feedback_fn("Activating disks for %s" % instance.name)
10048
      _StartInstanceDisks(self, instance, None)
10049

    
10050
    try:
10051
      helper = masterd.instance.ExportInstanceHelper(self, feedback_fn,
10052
                                                     instance)
10053

    
10054
      helper.CreateSnapshots()
10055
      try:
10056
        if (self.op.shutdown and instance.admin_up and
10057
            not self.op.remove_instance):
10058
          assert not activate_disks
10059
          feedback_fn("Starting instance %s" % instance.name)
10060
          result = self.rpc.call_instance_start(src_node, instance, None, None)
10061
          msg = result.fail_msg
10062
          if msg:
10063
            feedback_fn("Failed to start instance: %s" % msg)
10064
            _ShutdownInstanceDisks(self, instance)
10065
            raise errors.OpExecError("Could not start instance: %s" % msg)
10066

    
10067
        if self.op.mode == constants.EXPORT_MODE_LOCAL:
10068
          (fin_resu, dresults) = helper.LocalExport(self.dst_node)
10069
        elif self.op.mode == constants.EXPORT_MODE_REMOTE:
10070
          connect_timeout = constants.RIE_CONNECT_TIMEOUT
10071
          timeouts = masterd.instance.ImportExportTimeouts(connect_timeout)
10072

    
10073
          (key_name, _, _) = self.x509_key_name
10074

    
10075
          dest_ca_pem = \
10076
            OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_PEM,
10077
                                            self.dest_x509_ca)
10078

    
10079
          (fin_resu, dresults) = helper.RemoteExport(self.dest_disk_info,
10080
                                                     key_name, dest_ca_pem,
10081
                                                     timeouts)
10082
      finally:
10083
        helper.Cleanup()
10084

    
10085
      # Check for backwards compatibility
10086
      assert len(dresults) == len(instance.disks)
10087
      assert compat.all(isinstance(i, bool) for i in dresults), \
10088
             "Not all results are boolean: %r" % dresults
10089

    
10090
    finally:
10091
      if activate_disks:
10092
        feedback_fn("Deactivating disks for %s" % instance.name)
10093
        _ShutdownInstanceDisks(self, instance)
10094

    
10095
    if not (compat.all(dresults) and fin_resu):
10096
      failures = []
10097
      if not fin_resu:
10098
        failures.append("export finalization")
10099
      if not compat.all(dresults):
10100
        fdsk = utils.CommaJoin(idx for (idx, dsk) in enumerate(dresults)
10101
                               if not dsk)
10102
        failures.append("disk export: disk(s) %s" % fdsk)
10103

    
10104
      raise errors.OpExecError("Export failed, errors in %s" %
10105
                               utils.CommaJoin(failures))
10106

    
10107
    # At this point, the export was successful, we can cleanup/finish
10108

    
10109
    # Remove instance if requested
10110
    if self.op.remove_instance:
10111
      feedback_fn("Removing instance %s" % instance.name)
10112
      _RemoveInstance(self, feedback_fn, instance,
10113
                      self.op.ignore_remove_failures)
10114

    
10115
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
10116
      self._CleanupExports(feedback_fn)
10117

    
10118
    return fin_resu, dresults
10119

    
10120

    
10121
class LUBackupRemove(NoHooksLU):
10122
  """Remove exports related to the named instance.
10123

10124
  """
10125
  REQ_BGL = False
10126

    
10127
  def ExpandNames(self):
10128
    self.needed_locks = {}
10129
    # We need all nodes to be locked in order for RemoveExport to work, but we
10130
    # don't need to lock the instance itself, as nothing will happen to it (and
10131
    # we can remove exports also for a removed instance)
10132
    self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
10133

    
10134
  def Exec(self, feedback_fn):
10135
    """Remove any export.
10136

10137
    """
10138
    instance_name = self.cfg.ExpandInstanceName(self.op.instance_name)
10139
    # If the instance was not found we'll try with the name that was passed in.
10140
    # This will only work if it was an FQDN, though.
10141
    fqdn_warn = False
10142
    if not instance_name:
10143
      fqdn_warn = True
10144
      instance_name = self.op.instance_name
10145

    
10146
    locked_nodes = self.acquired_locks[locking.LEVEL_NODE]
10147
    exportlist = self.rpc.call_export_list(locked_nodes)
10148
    found = False
10149
    for node in exportlist:
10150
      msg = exportlist[node].fail_msg
10151
      if msg:
10152
        self.LogWarning("Failed to query node %s (continuing): %s", node, msg)
10153
        continue
10154
      if instance_name in exportlist[node].payload:
10155
        found = True
10156
        result = self.rpc.call_export_remove(node, instance_name)
10157
        msg = result.fail_msg
10158
        if msg:
10159
          logging.error("Could not remove export for instance %s"
10160
                        " on node %s: %s", instance_name, node, msg)
10161

    
10162
    if fqdn_warn and not found:
10163
      feedback_fn("Export not found. If trying to remove an export belonging"
10164
                  " to a deleted instance please use its Fully Qualified"
10165
                  " Domain Name.")
10166

    
10167

    
10168
class LUGroupAdd(LogicalUnit):
10169
  """Logical unit for creating node groups.
10170

10171
  """
10172
  HPATH = "group-add"
10173
  HTYPE = constants.HTYPE_GROUP
10174
  REQ_BGL = False
10175

    
10176
  def ExpandNames(self):
10177
    # We need the new group's UUID here so that we can create and acquire the
10178
    # corresponding lock. Later, in Exec(), we'll indicate to cfg.AddNodeGroup
10179
    # that it should not check whether the UUID exists in the configuration.
10180
    self.group_uuid = self.cfg.GenerateUniqueID(self.proc.GetECId())
10181
    self.needed_locks = {}
10182
    self.add_locks[locking.LEVEL_NODEGROUP] = self.group_uuid
10183

    
10184
  def CheckPrereq(self):
10185
    """Check prerequisites.
10186

10187
    This checks that the given group name is not an existing node group
10188
    already.
10189

10190
    """
10191
    try:
10192
      existing_uuid = self.cfg.LookupNodeGroup(self.op.group_name)
10193
    except errors.OpPrereqError:
10194
      pass
10195
    else:
10196
      raise errors.OpPrereqError("Desired group name '%s' already exists as a"
10197
                                 " node group (UUID: %s)" %
10198
                                 (self.op.group_name, existing_uuid),
10199
                                 errors.ECODE_EXISTS)
10200

    
10201
    if self.op.ndparams:
10202
      utils.ForceDictType(self.op.ndparams, constants.NDS_PARAMETER_TYPES)
10203

    
10204
  def BuildHooksEnv(self):
10205
    """Build hooks env.
10206

10207
    """
10208
    env = {
10209
      "GROUP_NAME": self.op.group_name,
10210
      }
10211
    mn = self.cfg.GetMasterNode()
10212
    return env, [mn], [mn]
10213

    
10214
  def Exec(self, feedback_fn):
10215
    """Add the node group to the cluster.
10216

10217
    """
10218
    group_obj = objects.NodeGroup(name=self.op.group_name, members=[],
10219
                                  uuid=self.group_uuid,
10220
                                  alloc_policy=self.op.alloc_policy,
10221
                                  ndparams=self.op.ndparams)
10222

    
10223
    self.cfg.AddNodeGroup(group_obj, self.proc.GetECId(), check_uuid=False)
10224
    del self.remove_locks[locking.LEVEL_NODEGROUP]
10225

    
10226

    
10227
class LUGroupAssignNodes(NoHooksLU):
10228
  """Logical unit for assigning nodes to groups.
10229

10230
  """
10231
  REQ_BGL = False
10232

    
10233
  def ExpandNames(self):
10234
    # These raise errors.OpPrereqError on their own:
10235
    self.group_uuid = self.cfg.LookupNodeGroup(self.op.group_name)
10236
    self.op.nodes = _GetWantedNodes(self, self.op.nodes)
10237

    
10238
    # We want to lock all the affected nodes and groups. We have readily
10239
    # available the list of nodes, and the *destination* group. To gather the
10240
    # list of "source" groups, we need to fetch node information.
10241
    self.node_data = self.cfg.GetAllNodesInfo()
10242
    affected_groups = set(self.node_data[node].group for node in self.op.nodes)
10243
    affected_groups.add(self.group_uuid)
10244

    
10245
    self.needed_locks = {
10246
      locking.LEVEL_NODEGROUP: list(affected_groups),
10247
      locking.LEVEL_NODE: self.op.nodes,
10248
      }
10249

    
10250
  def CheckPrereq(self):
10251
    """Check prerequisites.
10252

10253
    """
10254
    self.group = self.cfg.GetNodeGroup(self.group_uuid)
10255
    instance_data = self.cfg.GetAllInstancesInfo()
10256

    
10257
    if self.group is None:
10258
      raise errors.OpExecError("Could not retrieve group '%s' (UUID: %s)" %
10259
                               (self.op.group_name, self.group_uuid))
10260

    
10261
    (new_splits, previous_splits) = \
10262
      self.CheckAssignmentForSplitInstances([(node, self.group_uuid)
10263
                                             for node in self.op.nodes],
10264
                                            self.node_data, instance_data)
10265

    
10266
    if new_splits:
10267
      fmt_new_splits = utils.CommaJoin(utils.NiceSort(new_splits))
10268

    
10269
      if not self.op.force:
10270
        raise errors.OpExecError("The following instances get split by this"
10271
                                 " change and --force was not given: %s" %
10272
                                 fmt_new_splits)
10273
      else:
10274
        self.LogWarning("This operation will split the following instances: %s",
10275
                        fmt_new_splits)
10276

    
10277
        if previous_splits:
10278
          self.LogWarning("In addition, these already-split instances continue"
10279
                          " to be spit across groups: %s",
10280
                          utils.CommaJoin(utils.NiceSort(previous_splits)))
10281

    
10282
  def Exec(self, feedback_fn):
10283
    """Assign nodes to a new group.
10284

10285
    """
10286
    for node in self.op.nodes:
10287
      self.node_data[node].group = self.group_uuid
10288

    
10289
    self.cfg.Update(self.group, feedback_fn) # Saves all modified nodes.
10290

    
10291
  @staticmethod
10292
  def CheckAssignmentForSplitInstances(changes, node_data, instance_data):
10293
    """Check for split instances after a node assignment.
10294

10295
    This method considers a series of node assignments as an atomic operation,
10296
    and returns information about split instances after applying the set of
10297
    changes.
10298

10299
    In particular, it returns information about newly split instances, and
10300
    instances that were already split, and remain so after the change.
10301

10302
    Only instances whose disk template is listed in constants.DTS_NET_MIRROR are
10303
    considered.
10304

10305
    @type changes: list of (node_name, new_group_uuid) pairs.
10306
    @param changes: list of node assignments to consider.
10307
    @param node_data: a dict with data for all nodes
10308
    @param instance_data: a dict with all instances to consider
10309
    @rtype: a two-tuple
10310
    @return: a list of instances that were previously okay and result split as a
10311
      consequence of this change, and a list of instances that were previously
10312
      split and this change does not fix.
10313

10314
    """
10315
    changed_nodes = dict((node, group) for node, group in changes
10316
                         if node_data[node].group != group)
10317

    
10318
    all_split_instances = set()
10319
    previously_split_instances = set()
10320

    
10321
    def InstanceNodes(instance):
10322
      return [instance.primary_node] + list(instance.secondary_nodes)
10323

    
10324
    for inst in instance_data.values():
10325
      if inst.disk_template not in constants.DTS_NET_MIRROR:
10326
        continue
10327

    
10328
      instance_nodes = InstanceNodes(inst)
10329

    
10330
      if len(set(node_data[node].group for node in instance_nodes)) > 1:
10331
        previously_split_instances.add(inst.name)
10332

    
10333
      if len(set(changed_nodes.get(node, node_data[node].group)
10334
                 for node in instance_nodes)) > 1:
10335
        all_split_instances.add(inst.name)
10336

    
10337
    return (list(all_split_instances - previously_split_instances),
10338
            list(previously_split_instances & all_split_instances))
10339

    
10340

    
10341
class _GroupQuery(_QueryBase):
10342
  FIELDS = query.GROUP_FIELDS
10343

    
10344
  def ExpandNames(self, lu):
10345
    lu.needed_locks = {}
10346

    
10347
    self._all_groups = lu.cfg.GetAllNodeGroupsInfo()
10348
    name_to_uuid = dict((g.name, g.uuid) for g in self._all_groups.values())
10349

    
10350
    if not self.names:
10351
      self.wanted = [name_to_uuid[name]
10352
                     for name in utils.NiceSort(name_to_uuid.keys())]
10353
    else:
10354
      # Accept names to be either names or UUIDs.
10355
      missing = []
10356
      self.wanted = []
10357
      all_uuid = frozenset(self._all_groups.keys())
10358

    
10359
      for name in self.names:
10360
        if name in all_uuid:
10361
          self.wanted.append(name)
10362
        elif name in name_to_uuid:
10363
          self.wanted.append(name_to_uuid[name])
10364
        else:
10365
          missing.append(name)
10366

    
10367
      if missing:
10368
        raise errors.OpPrereqError("Some groups do not exist: %s" % missing,
10369
                                   errors.ECODE_NOENT)
10370

    
10371
  def DeclareLocks(self, lu, level):
10372
    pass
10373

    
10374
  def _GetQueryData(self, lu):
10375
    """Computes the list of node groups and their attributes.
10376

10377
    """
10378
    do_nodes = query.GQ_NODE in self.requested_data
10379
    do_instances = query.GQ_INST in self.requested_data
10380

    
10381
    group_to_nodes = None
10382
    group_to_instances = None
10383

    
10384
    # For GQ_NODE, we need to map group->[nodes], and group->[instances] for
10385
    # GQ_INST. The former is attainable with just GetAllNodesInfo(), but for the
10386
    # latter GetAllInstancesInfo() is not enough, for we have to go through
10387
    # instance->node. Hence, we will need to process nodes even if we only need
10388
    # instance information.
10389
    if do_nodes or do_instances:
10390
      all_nodes = lu.cfg.GetAllNodesInfo()
10391
      group_to_nodes = dict((uuid, []) for uuid in self.wanted)
10392
      node_to_group = {}
10393

    
10394
      for node in all_nodes.values():
10395
        if node.group in group_to_nodes:
10396
          group_to_nodes[node.group].append(node.name)
10397
          node_to_group[node.name] = node.group
10398

    
10399
      if do_instances:
10400
        all_instances = lu.cfg.GetAllInstancesInfo()
10401
        group_to_instances = dict((uuid, []) for uuid in self.wanted)
10402

    
10403
        for instance in all_instances.values():
10404
          node = instance.primary_node
10405
          if node in node_to_group:
10406
            group_to_instances[node_to_group[node]].append(instance.name)
10407

    
10408
        if not do_nodes:
10409
          # Do not pass on node information if it was not requested.
10410
          group_to_nodes = None
10411

    
10412
    return query.GroupQueryData([self._all_groups[uuid]
10413
                                 for uuid in self.wanted],
10414
                                group_to_nodes, group_to_instances)
10415

    
10416

    
10417
class LUGroupQuery(NoHooksLU):
10418
  """Logical unit for querying node groups.
10419

10420
  """
10421
  REQ_BGL = False
10422

    
10423
  def CheckArguments(self):
10424
    self.gq = _GroupQuery(qlang.MakeSimpleFilter("name", self.op.names),
10425
                          self.op.output_fields, False)
10426

    
10427
  def ExpandNames(self):
10428
    self.gq.ExpandNames(self)
10429

    
10430
  def Exec(self, feedback_fn):
10431
    return self.gq.OldStyleQuery(self)
10432

    
10433

    
10434
class LUGroupSetParams(LogicalUnit):
10435
  """Modifies the parameters of a node group.
10436

10437
  """
10438
  HPATH = "group-modify"
10439
  HTYPE = constants.HTYPE_GROUP
10440
  REQ_BGL = False
10441

    
10442
  def CheckArguments(self):
10443
    all_changes = [
10444
      self.op.ndparams,
10445
      self.op.alloc_policy,
10446
      ]
10447

    
10448
    if all_changes.count(None) == len(all_changes):
10449
      raise errors.OpPrereqError("Please pass at least one modification",
10450
                                 errors.ECODE_INVAL)
10451

    
10452
  def ExpandNames(self):
10453
    # This raises errors.OpPrereqError on its own:
10454
    self.group_uuid = self.cfg.LookupNodeGroup(self.op.group_name)
10455

    
10456
    self.needed_locks = {
10457
      locking.LEVEL_NODEGROUP: [self.group_uuid],
10458
      }
10459

    
10460
  def CheckPrereq(self):
10461
    """Check prerequisites.
10462

10463
    """
10464
    self.group = self.cfg.GetNodeGroup(self.group_uuid)
10465

    
10466
    if self.group is None:
10467
      raise errors.OpExecError("Could not retrieve group '%s' (UUID: %s)" %
10468
                               (self.op.group_name, self.group_uuid))
10469

    
10470
    if self.op.ndparams:
10471
      new_ndparams = _GetUpdatedParams(self.group.ndparams, self.op.ndparams)
10472
      utils.ForceDictType(self.op.ndparams, constants.NDS_PARAMETER_TYPES)
10473
      self.new_ndparams = new_ndparams
10474

    
10475
  def BuildHooksEnv(self):
10476
    """Build hooks env.
10477

10478
    """
10479
    env = {
10480
      "GROUP_NAME": self.op.group_name,
10481
      "NEW_ALLOC_POLICY": self.op.alloc_policy,
10482
      }
10483
    mn = self.cfg.GetMasterNode()
10484
    return env, [mn], [mn]
10485

    
10486
  def Exec(self, feedback_fn):
10487
    """Modifies the node group.
10488

10489
    """
10490
    result = []
10491

    
10492
    if self.op.ndparams:
10493
      self.group.ndparams = self.new_ndparams
10494
      result.append(("ndparams", str(self.group.ndparams)))
10495

    
10496
    if self.op.alloc_policy:
10497
      self.group.alloc_policy = self.op.alloc_policy
10498

    
10499
    self.cfg.Update(self.group, feedback_fn)
10500
    return result
10501

    
10502

    
10503

    
10504
class LUGroupRemove(LogicalUnit):
10505
  HPATH = "group-remove"
10506
  HTYPE = constants.HTYPE_GROUP
10507
  REQ_BGL = False
10508

    
10509
  def ExpandNames(self):
10510
    # This will raises errors.OpPrereqError on its own:
10511
    self.group_uuid = self.cfg.LookupNodeGroup(self.op.group_name)
10512
    self.needed_locks = {
10513
      locking.LEVEL_NODEGROUP: [self.group_uuid],
10514
      }
10515

    
10516
  def CheckPrereq(self):
10517
    """Check prerequisites.
10518

10519
    This checks that the given group name exists as a node group, that is
10520
    empty (i.e., contains no nodes), and that is not the last group of the
10521
    cluster.
10522

10523
    """
10524
    # Verify that the group is empty.
10525
    group_nodes = [node.name
10526
                   for node in self.cfg.GetAllNodesInfo().values()
10527
                   if node.group == self.group_uuid]
10528

    
10529
    if group_nodes:
10530
      raise errors.OpPrereqError("Group '%s' not empty, has the following"
10531
                                 " nodes: %s" %
10532
                                 (self.op.group_name,
10533
                                  utils.CommaJoin(utils.NiceSort(group_nodes))),
10534
                                 errors.ECODE_STATE)
10535

    
10536
    # Verify the cluster would not be left group-less.
10537
    if len(self.cfg.GetNodeGroupList()) == 1:
10538
      raise errors.OpPrereqError("Group '%s' is the only group,"
10539
                                 " cannot be removed" %
10540
                                 self.op.group_name,
10541
                                 errors.ECODE_STATE)
10542

    
10543
  def BuildHooksEnv(self):
10544
    """Build hooks env.
10545

10546
    """
10547
    env = {
10548
      "GROUP_NAME": self.op.group_name,
10549
      }
10550
    mn = self.cfg.GetMasterNode()
10551
    return env, [mn], [mn]
10552

    
10553
  def Exec(self, feedback_fn):
10554
    """Remove the node group.
10555

10556
    """
10557
    try:
10558
      self.cfg.RemoveNodeGroup(self.group_uuid)
10559
    except errors.ConfigurationError:
10560
      raise errors.OpExecError("Group '%s' with UUID %s disappeared" %
10561
                               (self.op.group_name, self.group_uuid))
10562

    
10563
    self.remove_locks[locking.LEVEL_NODEGROUP] = self.group_uuid
10564

    
10565

    
10566
class LUGroupRename(LogicalUnit):
10567
  HPATH = "group-rename"
10568
  HTYPE = constants.HTYPE_GROUP
10569
  REQ_BGL = False
10570

    
10571
  def ExpandNames(self):
10572
    # This raises errors.OpPrereqError on its own:
10573
    self.group_uuid = self.cfg.LookupNodeGroup(self.op.group_name)
10574

    
10575
    self.needed_locks = {
10576
      locking.LEVEL_NODEGROUP: [self.group_uuid],
10577
      }
10578

    
10579
  def CheckPrereq(self):
10580
    """Check prerequisites.
10581

10582
    Ensures requested new name is not yet used.
10583

10584
    """
10585
    try:
10586
      new_name_uuid = self.cfg.LookupNodeGroup(self.op.new_name)
10587
    except errors.OpPrereqError:
10588
      pass
10589
    else:
10590
      raise errors.OpPrereqError("Desired new name '%s' clashes with existing"
10591
                                 " node group (UUID: %s)" %
10592
                                 (self.op.new_name, new_name_uuid),
10593
                                 errors.ECODE_EXISTS)
10594

    
10595
  def BuildHooksEnv(self):
10596
    """Build hooks env.
10597

10598
    """
10599
    env = {
10600
      "OLD_NAME": self.op.group_name,
10601
      "NEW_NAME": self.op.new_name,
10602
      }
10603

    
10604
    mn = self.cfg.GetMasterNode()
10605
    all_nodes = self.cfg.GetAllNodesInfo()
10606
    run_nodes = [mn]
10607
    all_nodes.pop(mn, None)
10608

    
10609
    for node in all_nodes.values():
10610
      if node.group == self.group_uuid:
10611
        run_nodes.append(node.name)
10612

    
10613
    return env, run_nodes, run_nodes
10614

    
10615
  def Exec(self, feedback_fn):
10616
    """Rename the node group.
10617

10618
    """
10619
    group = self.cfg.GetNodeGroup(self.group_uuid)
10620

    
10621
    if group is None:
10622
      raise errors.OpExecError("Could not retrieve group '%s' (UUID: %s)" %
10623
                               (self.op.group_name, self.group_uuid))
10624

    
10625
    group.name = self.op.new_name
10626
    self.cfg.Update(group, feedback_fn)
10627

    
10628
    return self.op.new_name
10629

    
10630

    
10631
class TagsLU(NoHooksLU): # pylint: disable-msg=W0223
10632
  """Generic tags LU.
10633

10634
  This is an abstract class which is the parent of all the other tags LUs.
10635

10636
  """
10637

    
10638
  def ExpandNames(self):
10639
    self.needed_locks = {}
10640
    if self.op.kind == constants.TAG_NODE:
10641
      self.op.name = _ExpandNodeName(self.cfg, self.op.name)
10642
      self.needed_locks[locking.LEVEL_NODE] = self.op.name
10643
    elif self.op.kind == constants.TAG_INSTANCE:
10644
      self.op.name = _ExpandInstanceName(self.cfg, self.op.name)
10645
      self.needed_locks[locking.LEVEL_INSTANCE] = self.op.name
10646

    
10647
    # FIXME: Acquire BGL for cluster tag operations (as of this writing it's
10648
    # not possible to acquire the BGL based on opcode parameters)
10649

    
10650
  def CheckPrereq(self):
10651
    """Check prerequisites.
10652

10653
    """
10654
    if self.op.kind == constants.TAG_CLUSTER:
10655
      self.target = self.cfg.GetClusterInfo()
10656
    elif self.op.kind == constants.TAG_NODE:
10657
      self.target = self.cfg.GetNodeInfo(self.op.name)
10658
    elif self.op.kind == constants.TAG_INSTANCE:
10659
      self.target = self.cfg.GetInstanceInfo(self.op.name)
10660
    else:
10661
      raise errors.OpPrereqError("Wrong tag type requested (%s)" %
10662
                                 str(self.op.kind), errors.ECODE_INVAL)
10663

    
10664

    
10665
class LUTagsGet(TagsLU):
10666
  """Returns the tags of a given object.
10667

10668
  """
10669
  REQ_BGL = False
10670

    
10671
  def ExpandNames(self):
10672
    TagsLU.ExpandNames(self)
10673

    
10674
    # Share locks as this is only a read operation
10675
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
10676

    
10677
  def Exec(self, feedback_fn):
10678
    """Returns the tag list.
10679

10680
    """
10681
    return list(self.target.GetTags())
10682

    
10683

    
10684
class LUTagsSearch(NoHooksLU):
10685
  """Searches the tags for a given pattern.
10686

10687
  """
10688
  REQ_BGL = False
10689

    
10690
  def ExpandNames(self):
10691
    self.needed_locks = {}
10692

    
10693
  def CheckPrereq(self):
10694
    """Check prerequisites.
10695

10696
    This checks the pattern passed for validity by compiling it.
10697

10698
    """
10699
    try:
10700
      self.re = re.compile(self.op.pattern)
10701
    except re.error, err:
10702
      raise errors.OpPrereqError("Invalid search pattern '%s': %s" %
10703
                                 (self.op.pattern, err), errors.ECODE_INVAL)
10704

    
10705
  def Exec(self, feedback_fn):
10706
    """Returns the tag list.
10707

10708
    """
10709
    cfg = self.cfg
10710
    tgts = [("/cluster", cfg.GetClusterInfo())]
10711
    ilist = cfg.GetAllInstancesInfo().values()
10712
    tgts.extend([("/instances/%s" % i.name, i) for i in ilist])
10713
    nlist = cfg.GetAllNodesInfo().values()
10714
    tgts.extend([("/nodes/%s" % n.name, n) for n in nlist])
10715
    results = []
10716
    for path, target in tgts:
10717
      for tag in target.GetTags():
10718
        if self.re.search(tag):
10719
          results.append((path, tag))
10720
    return results
10721

    
10722

    
10723
class LUTagsSet(TagsLU):
10724
  """Sets a tag on a given object.
10725

10726
  """
10727
  REQ_BGL = False
10728

    
10729
  def CheckPrereq(self):
10730
    """Check prerequisites.
10731

10732
    This checks the type and length of the tag name and value.
10733

10734
    """
10735
    TagsLU.CheckPrereq(self)
10736
    for tag in self.op.tags:
10737
      objects.TaggableObject.ValidateTag(tag)
10738

    
10739
  def Exec(self, feedback_fn):
10740
    """Sets the tag.
10741

10742
    """
10743
    try:
10744
      for tag in self.op.tags:
10745
        self.target.AddTag(tag)
10746
    except errors.TagError, err:
10747
      raise errors.OpExecError("Error while setting tag: %s" % str(err))
10748
    self.cfg.Update(self.target, feedback_fn)
10749

    
10750

    
10751
class LUTagsDel(TagsLU):
10752
  """Delete a list of tags from a given object.
10753

10754
  """
10755
  REQ_BGL = False
10756

    
10757
  def CheckPrereq(self):
10758
    """Check prerequisites.
10759

10760
    This checks that we have the given tag.
10761

10762
    """
10763
    TagsLU.CheckPrereq(self)
10764
    for tag in self.op.tags:
10765
      objects.TaggableObject.ValidateTag(tag)
10766
    del_tags = frozenset(self.op.tags)
10767
    cur_tags = self.target.GetTags()
10768

    
10769
    diff_tags = del_tags - cur_tags
10770
    if diff_tags:
10771
      diff_names = ("'%s'" % i for i in sorted(diff_tags))
10772
      raise errors.OpPrereqError("Tag(s) %s not found" %
10773
                                 (utils.CommaJoin(diff_names), ),
10774
                                 errors.ECODE_NOENT)
10775

    
10776
  def Exec(self, feedback_fn):
10777
    """Remove the tag from the object.
10778

10779
    """
10780
    for tag in self.op.tags:
10781
      self.target.RemoveTag(tag)
10782
    self.cfg.Update(self.target, feedback_fn)
10783

    
10784

    
10785
class LUTestDelay(NoHooksLU):
10786
  """Sleep for a specified amount of time.
10787

10788
  This LU sleeps on the master and/or nodes for a specified amount of
10789
  time.
10790

10791
  """
10792
  REQ_BGL = False
10793

    
10794
  def ExpandNames(self):
10795
    """Expand names and set required locks.
10796

10797
    This expands the node list, if any.
10798

10799
    """
10800
    self.needed_locks = {}
10801
    if self.op.on_nodes:
10802
      # _GetWantedNodes can be used here, but is not always appropriate to use
10803
      # this way in ExpandNames. Check LogicalUnit.ExpandNames docstring for
10804
      # more information.
10805
      self.op.on_nodes = _GetWantedNodes(self, self.op.on_nodes)
10806
      self.needed_locks[locking.LEVEL_NODE] = self.op.on_nodes
10807

    
10808
  def _TestDelay(self):
10809
    """Do the actual sleep.
10810

10811
    """
10812
    if self.op.on_master:
10813
      if not utils.TestDelay(self.op.duration):
10814
        raise errors.OpExecError("Error during master delay test")
10815
    if self.op.on_nodes:
10816
      result = self.rpc.call_test_delay(self.op.on_nodes, self.op.duration)
10817
      for node, node_result in result.items():
10818
        node_result.Raise("Failure during rpc call to node %s" % node)
10819

    
10820
  def Exec(self, feedback_fn):
10821
    """Execute the test delay opcode, with the wanted repetitions.
10822

10823
    """
10824
    if self.op.repeat == 0:
10825
      self._TestDelay()
10826
    else:
10827
      top_value = self.op.repeat - 1
10828
      for i in range(self.op.repeat):
10829
        self.LogInfo("Test delay iteration %d/%d" % (i, top_value))
10830
        self._TestDelay()
10831

    
10832

    
10833
class LUTestJqueue(NoHooksLU):
10834
  """Utility LU to test some aspects of the job queue.
10835

10836
  """
10837
  REQ_BGL = False
10838

    
10839
  # Must be lower than default timeout for WaitForJobChange to see whether it
10840
  # notices changed jobs
10841
  _CLIENT_CONNECT_TIMEOUT = 20.0
10842
  _CLIENT_CONFIRM_TIMEOUT = 60.0
10843

    
10844
  @classmethod
10845
  def _NotifyUsingSocket(cls, cb, errcls):
10846
    """Opens a Unix socket and waits for another program to connect.
10847

10848
    @type cb: callable
10849
    @param cb: Callback to send socket name to client
10850
    @type errcls: class
10851
    @param errcls: Exception class to use for errors
10852

10853
    """
10854
    # Using a temporary directory as there's no easy way to create temporary
10855
    # sockets without writing a custom loop around tempfile.mktemp and
10856
    # socket.bind
10857
    tmpdir = tempfile.mkdtemp()
10858
    try:
10859
      tmpsock = utils.PathJoin(tmpdir, "sock")
10860

    
10861
      logging.debug("Creating temporary socket at %s", tmpsock)
10862
      sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
10863
      try:
10864
        sock.bind(tmpsock)
10865
        sock.listen(1)
10866

    
10867
        # Send details to client
10868
        cb(tmpsock)
10869

    
10870
        # Wait for client to connect before continuing
10871
        sock.settimeout(cls._CLIENT_CONNECT_TIMEOUT)
10872
        try:
10873
          (conn, _) = sock.accept()
10874
        except socket.error, err:
10875
          raise errcls("Client didn't connect in time (%s)" % err)
10876
      finally:
10877
        sock.close()
10878
    finally:
10879
      # Remove as soon as client is connected
10880
      shutil.rmtree(tmpdir)
10881

    
10882
    # Wait for client to close
10883
    try:
10884
      try:
10885
        # pylint: disable-msg=E1101
10886
        # Instance of '_socketobject' has no ... member
10887
        conn.settimeout(cls._CLIENT_CONFIRM_TIMEOUT)
10888
        conn.recv(1)
10889
      except socket.error, err:
10890
        raise errcls("Client failed to confirm notification (%s)" % err)
10891
    finally:
10892
      conn.close()
10893

    
10894
  def _SendNotification(self, test, arg, sockname):
10895
    """Sends a notification to the client.
10896

10897
    @type test: string
10898
    @param test: Test name
10899
    @param arg: Test argument (depends on test)
10900
    @type sockname: string
10901
    @param sockname: Socket path
10902

10903
    """
10904
    self.Log(constants.ELOG_JQUEUE_TEST, (sockname, test, arg))
10905

    
10906
  def _Notify(self, prereq, test, arg):
10907
    """Notifies the client of a test.
10908

10909
    @type prereq: bool
10910
    @param prereq: Whether this is a prereq-phase test
10911
    @type test: string
10912
    @param test: Test name
10913
    @param arg: Test argument (depends on test)
10914

10915
    """
10916
    if prereq:
10917
      errcls = errors.OpPrereqError
10918
    else:
10919
      errcls = errors.OpExecError
10920

    
10921
    return self._NotifyUsingSocket(compat.partial(self._SendNotification,
10922
                                                  test, arg),
10923
                                   errcls)
10924

    
10925
  def CheckArguments(self):
10926
    self.checkargs_calls = getattr(self, "checkargs_calls", 0) + 1
10927
    self.expandnames_calls = 0
10928

    
10929
  def ExpandNames(self):
10930
    checkargs_calls = getattr(self, "checkargs_calls", 0)
10931
    if checkargs_calls < 1:
10932
      raise errors.ProgrammerError("CheckArguments was not called")
10933

    
10934
    self.expandnames_calls += 1
10935

    
10936
    if self.op.notify_waitlock:
10937
      self._Notify(True, constants.JQT_EXPANDNAMES, None)
10938

    
10939
    self.LogInfo("Expanding names")
10940

    
10941
    # Get lock on master node (just to get a lock, not for a particular reason)
10942
    self.needed_locks = {
10943
      locking.LEVEL_NODE: self.cfg.GetMasterNode(),
10944
      }
10945

    
10946
  def Exec(self, feedback_fn):
10947
    if self.expandnames_calls < 1:
10948
      raise errors.ProgrammerError("ExpandNames was not called")
10949

    
10950
    if self.op.notify_exec:
10951
      self._Notify(False, constants.JQT_EXEC, None)
10952

    
10953
    self.LogInfo("Executing")
10954

    
10955
    if self.op.log_messages:
10956
      self._Notify(False, constants.JQT_STARTMSG, len(self.op.log_messages))
10957
      for idx, msg in enumerate(self.op.log_messages):
10958
        self.LogInfo("Sending log message %s", idx + 1)
10959
        feedback_fn(constants.JQT_MSGPREFIX + msg)
10960
        # Report how many test messages have been sent
10961
        self._Notify(False, constants.JQT_LOGMSG, idx + 1)
10962

    
10963
    if self.op.fail:
10964
      raise errors.OpExecError("Opcode failure was requested")
10965

    
10966
    return True
10967

    
10968

    
10969
class IAllocator(object):
10970
  """IAllocator framework.
10971

10972
  An IAllocator instance has three sets of attributes:
10973
    - cfg that is needed to query the cluster
10974
    - input data (all members of the _KEYS class attribute are required)
10975
    - four buffer attributes (in|out_data|text), that represent the
10976
      input (to the external script) in text and data structure format,
10977
      and the output from it, again in two formats
10978
    - the result variables from the script (success, info, nodes) for
10979
      easy usage
10980

10981
  """
10982
  # pylint: disable-msg=R0902
10983
  # lots of instance attributes
10984
  _ALLO_KEYS = [
10985
    "name", "mem_size", "disks", "disk_template",
10986
    "os", "tags", "nics", "vcpus", "hypervisor",
10987
    ]
10988
  _RELO_KEYS = [
10989
    "name", "relocate_from",
10990
    ]
10991
  _EVAC_KEYS = [
10992
    "evac_nodes",
10993
    ]
10994

    
10995
  def __init__(self, cfg, rpc, mode, **kwargs):
10996
    self.cfg = cfg
10997
    self.rpc = rpc
10998
    # init buffer variables
10999
    self.in_text = self.out_text = self.in_data = self.out_data = None
11000
    # init all input fields so that pylint is happy
11001
    self.mode = mode
11002
    self.mem_size = self.disks = self.disk_template = None
11003
    self.os = self.tags = self.nics = self.vcpus = None
11004
    self.hypervisor = None
11005
    self.relocate_from = None
11006
    self.name = None
11007
    self.evac_nodes = None
11008
    # computed fields
11009
    self.required_nodes = None
11010
    # init result fields
11011
    self.success = self.info = self.result = None
11012
    if self.mode == constants.IALLOCATOR_MODE_ALLOC:
11013
      keyset = self._ALLO_KEYS
11014
      fn = self._AddNewInstance
11015
    elif self.mode == constants.IALLOCATOR_MODE_RELOC:
11016
      keyset = self._RELO_KEYS
11017
      fn = self._AddRelocateInstance
11018
    elif self.mode == constants.IALLOCATOR_MODE_MEVAC:
11019
      keyset = self._EVAC_KEYS
11020
      fn = self._AddEvacuateNodes
11021
    else:
11022
      raise errors.ProgrammerError("Unknown mode '%s' passed to the"
11023
                                   " IAllocator" % self.mode)
11024
    for key in kwargs:
11025
      if key not in keyset:
11026
        raise errors.ProgrammerError("Invalid input parameter '%s' to"
11027
                                     " IAllocator" % key)
11028
      setattr(self, key, kwargs[key])
11029

    
11030
    for key in keyset:
11031
      if key not in kwargs:
11032
        raise errors.ProgrammerError("Missing input parameter '%s' to"
11033
                                     " IAllocator" % key)
11034
    self._BuildInputData(fn)
11035

    
11036
  def _ComputeClusterData(self):
11037
    """Compute the generic allocator input data.
11038

11039
    This is the data that is independent of the actual operation.
11040

11041
    """
11042
    cfg = self.cfg
11043
    cluster_info = cfg.GetClusterInfo()
11044
    # cluster data
11045
    data = {
11046
      "version": constants.IALLOCATOR_VERSION,
11047
      "cluster_name": cfg.GetClusterName(),
11048
      "cluster_tags": list(cluster_info.GetTags()),
11049
      "enabled_hypervisors": list(cluster_info.enabled_hypervisors),
11050
      # we don't have job IDs
11051
      }
11052
    ninfo = cfg.GetAllNodesInfo()
11053
    iinfo = cfg.GetAllInstancesInfo().values()
11054
    i_list = [(inst, cluster_info.FillBE(inst)) for inst in iinfo]
11055

    
11056
    # node data
11057
    node_list = [n.name for n in ninfo.values() if n.vm_capable]
11058

    
11059
    if self.mode == constants.IALLOCATOR_MODE_ALLOC:
11060
      hypervisor_name = self.hypervisor
11061
    elif self.mode == constants.IALLOCATOR_MODE_RELOC:
11062
      hypervisor_name = cfg.GetInstanceInfo(self.name).hypervisor
11063
    elif self.mode == constants.IALLOCATOR_MODE_MEVAC:
11064
      hypervisor_name = cluster_info.enabled_hypervisors[0]
11065

    
11066
    node_data = self.rpc.call_node_info(node_list, cfg.GetVGName(),
11067
                                        hypervisor_name)
11068
    node_iinfo = \
11069
      self.rpc.call_all_instances_info(node_list,
11070
                                       cluster_info.enabled_hypervisors)
11071

    
11072
    data["nodegroups"] = self._ComputeNodeGroupData(cfg)
11073

    
11074
    config_ndata = self._ComputeBasicNodeData(ninfo)
11075
    data["nodes"] = self._ComputeDynamicNodeData(ninfo, node_data, node_iinfo,
11076
                                                 i_list, config_ndata)
11077
    assert len(data["nodes"]) == len(ninfo), \
11078
        "Incomplete node data computed"
11079

    
11080
    data["instances"] = self._ComputeInstanceData(cluster_info, i_list)
11081

    
11082
    self.in_data = data
11083

    
11084
  @staticmethod
11085
  def _ComputeNodeGroupData(cfg):
11086
    """Compute node groups data.
11087

11088
    """
11089
    ng = {}
11090
    for guuid, gdata in cfg.GetAllNodeGroupsInfo().items():
11091
      ng[guuid] = {
11092
        "name": gdata.name,
11093
        "alloc_policy": gdata.alloc_policy,
11094
        }
11095
    return ng
11096

    
11097
  @staticmethod
11098
  def _ComputeBasicNodeData(node_cfg):
11099
    """Compute global node data.
11100

11101
    @rtype: dict
11102
    @returns: a dict of name: (node dict, node config)
11103

11104
    """
11105
    node_results = {}
11106
    for ninfo in node_cfg.values():
11107
      # fill in static (config-based) values
11108
      pnr = {
11109
        "tags": list(ninfo.GetTags()),
11110
        "primary_ip": ninfo.primary_ip,
11111
        "secondary_ip": ninfo.secondary_ip,
11112
        "offline": ninfo.offline,
11113
        "drained": ninfo.drained,
11114
        "master_candidate": ninfo.master_candidate,
11115
        "group": ninfo.group,
11116
        "master_capable": ninfo.master_capable,
11117
        "vm_capable": ninfo.vm_capable,
11118
        }
11119

    
11120
      node_results[ninfo.name] = pnr
11121

    
11122
    return node_results
11123

    
11124
  @staticmethod
11125
  def _ComputeDynamicNodeData(node_cfg, node_data, node_iinfo, i_list,
11126
                              node_results):
11127
    """Compute global node data.
11128

11129
    @param node_results: the basic node structures as filled from the config
11130

11131
    """
11132
    # make a copy of the current dict
11133
    node_results = dict(node_results)
11134
    for nname, nresult in node_data.items():
11135
      assert nname in node_results, "Missing basic data for node %s" % nname
11136
      ninfo = node_cfg[nname]
11137

    
11138
      if not (ninfo.offline or ninfo.drained):
11139
        nresult.Raise("Can't get data for node %s" % nname)
11140
        node_iinfo[nname].Raise("Can't get node instance info from node %s" %
11141
                                nname)
11142
        remote_info = nresult.payload
11143

    
11144
        for attr in ['memory_total', 'memory_free', 'memory_dom0',
11145
                     'vg_size', 'vg_free', 'cpu_total']:
11146
          if attr not in remote_info:
11147
            raise errors.OpExecError("Node '%s' didn't return attribute"
11148
                                     " '%s'" % (nname, attr))
11149
          if not isinstance(remote_info[attr], int):
11150
            raise errors.OpExecError("Node '%s' returned invalid value"
11151
                                     " for '%s': %s" %
11152
                                     (nname, attr, remote_info[attr]))
11153
        # compute memory used by primary instances
11154
        i_p_mem = i_p_up_mem = 0
11155
        for iinfo, beinfo in i_list:
11156
          if iinfo.primary_node == nname:
11157
            i_p_mem += beinfo[constants.BE_MEMORY]
11158
            if iinfo.name not in node_iinfo[nname].payload:
11159
              i_used_mem = 0
11160
            else:
11161
              i_used_mem = int(node_iinfo[nname].payload[iinfo.name]['memory'])
11162
            i_mem_diff = beinfo[constants.BE_MEMORY] - i_used_mem
11163
            remote_info['memory_free'] -= max(0, i_mem_diff)
11164

    
11165
            if iinfo.admin_up:
11166
              i_p_up_mem += beinfo[constants.BE_MEMORY]
11167

    
11168
        # compute memory used by instances
11169
        pnr_dyn = {
11170
          "total_memory": remote_info['memory_total'],
11171
          "reserved_memory": remote_info['memory_dom0'],
11172
          "free_memory": remote_info['memory_free'],
11173
          "total_disk": remote_info['vg_size'],
11174
          "free_disk": remote_info['vg_free'],
11175
          "total_cpus": remote_info['cpu_total'],
11176
          "i_pri_memory": i_p_mem,
11177
          "i_pri_up_memory": i_p_up_mem,
11178
          }
11179
        pnr_dyn.update(node_results[nname])
11180
        node_results[nname] = pnr_dyn
11181

    
11182
    return node_results
11183

    
11184
  @staticmethod
11185
  def _ComputeInstanceData(cluster_info, i_list):
11186
    """Compute global instance data.
11187

11188
    """
11189
    instance_data = {}
11190
    for iinfo, beinfo in i_list:
11191
      nic_data = []
11192
      for nic in iinfo.nics:
11193
        filled_params = cluster_info.SimpleFillNIC(nic.nicparams)
11194
        nic_dict = {"mac": nic.mac,
11195
                    "ip": nic.ip,
11196
                    "mode": filled_params[constants.NIC_MODE],
11197
                    "link": filled_params[constants.NIC_LINK],
11198
                   }
11199
        if filled_params[constants.NIC_MODE] == constants.NIC_MODE_BRIDGED:
11200
          nic_dict["bridge"] = filled_params[constants.NIC_LINK]
11201
        nic_data.append(nic_dict)
11202
      pir = {
11203
        "tags": list(iinfo.GetTags()),
11204
        "admin_up": iinfo.admin_up,
11205
        "vcpus": beinfo[constants.BE_VCPUS],
11206
        "memory": beinfo[constants.BE_MEMORY],
11207
        "os": iinfo.os,
11208
        "nodes": [iinfo.primary_node] + list(iinfo.secondary_nodes),
11209
        "nics": nic_data,
11210
        "disks": [{"size": dsk.size, "mode": dsk.mode} for dsk in iinfo.disks],
11211
        "disk_template": iinfo.disk_template,
11212
        "hypervisor": iinfo.hypervisor,
11213
        }
11214
      pir["disk_space_total"] = _ComputeDiskSize(iinfo.disk_template,
11215
                                                 pir["disks"])
11216
      instance_data[iinfo.name] = pir
11217

    
11218
    return instance_data
11219

    
11220
  def _AddNewInstance(self):
11221
    """Add new instance data to allocator structure.
11222

11223
    This in combination with _AllocatorGetClusterData will create the
11224
    correct structure needed as input for the allocator.
11225

11226
    The checks for the completeness of the opcode must have already been
11227
    done.
11228

11229
    """
11230
    disk_space = _ComputeDiskSize(self.disk_template, self.disks)
11231

    
11232
    if self.disk_template in constants.DTS_NET_MIRROR:
11233
      self.required_nodes = 2
11234
    else:
11235
      self.required_nodes = 1
11236
    request = {
11237
      "name": self.name,
11238
      "disk_template": self.disk_template,
11239
      "tags": self.tags,
11240
      "os": self.os,
11241
      "vcpus": self.vcpus,
11242
      "memory": self.mem_size,
11243
      "disks": self.disks,
11244
      "disk_space_total": disk_space,
11245
      "nics": self.nics,
11246
      "required_nodes": self.required_nodes,
11247
      }
11248
    return request
11249

    
11250
  def _AddRelocateInstance(self):
11251
    """Add relocate instance data to allocator structure.
11252

11253
    This in combination with _IAllocatorGetClusterData will create the
11254
    correct structure needed as input for the allocator.
11255

11256
    The checks for the completeness of the opcode must have already been
11257
    done.
11258

11259
    """
11260
    instance = self.cfg.GetInstanceInfo(self.name)
11261
    if instance is None:
11262
      raise errors.ProgrammerError("Unknown instance '%s' passed to"
11263
                                   " IAllocator" % self.name)
11264

    
11265
    if instance.disk_template not in constants.DTS_NET_MIRROR:
11266
      raise errors.OpPrereqError("Can't relocate non-mirrored instances",
11267
                                 errors.ECODE_INVAL)
11268

    
11269
    if len(instance.secondary_nodes) != 1:
11270
      raise errors.OpPrereqError("Instance has not exactly one secondary node",
11271
                                 errors.ECODE_STATE)
11272

    
11273
    self.required_nodes = 1
11274
    disk_sizes = [{'size': disk.size} for disk in instance.disks]
11275
    disk_space = _ComputeDiskSize(instance.disk_template, disk_sizes)
11276

    
11277
    request = {
11278
      "name": self.name,
11279
      "disk_space_total": disk_space,
11280
      "required_nodes": self.required_nodes,
11281
      "relocate_from": self.relocate_from,
11282
      }
11283
    return request
11284

    
11285
  def _AddEvacuateNodes(self):
11286
    """Add evacuate nodes data to allocator structure.
11287

11288
    """
11289
    request = {
11290
      "evac_nodes": self.evac_nodes
11291
      }
11292
    return request
11293

    
11294
  def _BuildInputData(self, fn):
11295
    """Build input data structures.
11296

11297
    """
11298
    self._ComputeClusterData()
11299

    
11300
    request = fn()
11301
    request["type"] = self.mode
11302
    self.in_data["request"] = request
11303

    
11304
    self.in_text = serializer.Dump(self.in_data)
11305

    
11306
  def Run(self, name, validate=True, call_fn=None):
11307
    """Run an instance allocator and return the results.
11308

11309
    """
11310
    if call_fn is None:
11311
      call_fn = self.rpc.call_iallocator_runner
11312

    
11313
    result = call_fn(self.cfg.GetMasterNode(), name, self.in_text)
11314
    result.Raise("Failure while running the iallocator script")
11315

    
11316
    self.out_text = result.payload
11317
    if validate:
11318
      self._ValidateResult()
11319

    
11320
  def _ValidateResult(self):
11321
    """Process the allocator results.
11322

11323
    This will process and if successful save the result in
11324
    self.out_data and the other parameters.
11325

11326
    """
11327
    try:
11328
      rdict = serializer.Load(self.out_text)
11329
    except Exception, err:
11330
      raise errors.OpExecError("Can't parse iallocator results: %s" % str(err))
11331

    
11332
    if not isinstance(rdict, dict):
11333
      raise errors.OpExecError("Can't parse iallocator results: not a dict")
11334

    
11335
    # TODO: remove backwards compatiblity in later versions
11336
    if "nodes" in rdict and "result" not in rdict:
11337
      rdict["result"] = rdict["nodes"]
11338
      del rdict["nodes"]
11339

    
11340
    for key in "success", "info", "result":
11341
      if key not in rdict:
11342
        raise errors.OpExecError("Can't parse iallocator results:"
11343
                                 " missing key '%s'" % key)
11344
      setattr(self, key, rdict[key])
11345

    
11346
    if not isinstance(rdict["result"], list):
11347
      raise errors.OpExecError("Can't parse iallocator results: 'result' key"
11348
                               " is not a list")
11349
    self.out_data = rdict
11350

    
11351

    
11352
class LUTestAllocator(NoHooksLU):
11353
  """Run allocator tests.
11354

11355
  This LU runs the allocator tests
11356

11357
  """
11358
  def CheckPrereq(self):
11359
    """Check prerequisites.
11360

11361
    This checks the opcode parameters depending on the director and mode test.
11362

11363
    """
11364
    if self.op.mode == constants.IALLOCATOR_MODE_ALLOC:
11365
      for attr in ["mem_size", "disks", "disk_template",
11366
                   "os", "tags", "nics", "vcpus"]:
11367
        if not hasattr(self.op, attr):
11368
          raise errors.OpPrereqError("Missing attribute '%s' on opcode input" %
11369
                                     attr, errors.ECODE_INVAL)
11370
      iname = self.cfg.ExpandInstanceName(self.op.name)
11371
      if iname is not None:
11372
        raise errors.OpPrereqError("Instance '%s' already in the cluster" %
11373
                                   iname, errors.ECODE_EXISTS)
11374
      if not isinstance(self.op.nics, list):
11375
        raise errors.OpPrereqError("Invalid parameter 'nics'",
11376
                                   errors.ECODE_INVAL)
11377
      if not isinstance(self.op.disks, list):
11378
        raise errors.OpPrereqError("Invalid parameter 'disks'",
11379
                                   errors.ECODE_INVAL)
11380
      for row in self.op.disks:
11381
        if (not isinstance(row, dict) or
11382
            "size" not in row or
11383
            not isinstance(row["size"], int) or
11384
            "mode" not in row or
11385
            row["mode"] not in ['r', 'w']):
11386
          raise errors.OpPrereqError("Invalid contents of the 'disks'"
11387
                                     " parameter", errors.ECODE_INVAL)
11388
      if self.op.hypervisor is None:
11389
        self.op.hypervisor = self.cfg.GetHypervisorType()
11390
    elif self.op.mode == constants.IALLOCATOR_MODE_RELOC:
11391
      fname = _ExpandInstanceName(self.cfg, self.op.name)
11392
      self.op.name = fname
11393
      self.relocate_from = self.cfg.GetInstanceInfo(fname).secondary_nodes
11394
    elif self.op.mode == constants.IALLOCATOR_MODE_MEVAC:
11395
      if not hasattr(self.op, "evac_nodes"):
11396
        raise errors.OpPrereqError("Missing attribute 'evac_nodes' on"
11397
                                   " opcode input", errors.ECODE_INVAL)
11398
    else:
11399
      raise errors.OpPrereqError("Invalid test allocator mode '%s'" %
11400
                                 self.op.mode, errors.ECODE_INVAL)
11401

    
11402
    if self.op.direction == constants.IALLOCATOR_DIR_OUT:
11403
      if self.op.allocator is None:
11404
        raise errors.OpPrereqError("Missing allocator name",
11405
                                   errors.ECODE_INVAL)
11406
    elif self.op.direction != constants.IALLOCATOR_DIR_IN:
11407
      raise errors.OpPrereqError("Wrong allocator test '%s'" %
11408
                                 self.op.direction, errors.ECODE_INVAL)
11409

    
11410
  def Exec(self, feedback_fn):
11411
    """Run the allocator test.
11412

11413
    """
11414
    if self.op.mode == constants.IALLOCATOR_MODE_ALLOC:
11415
      ial = IAllocator(self.cfg, self.rpc,
11416
                       mode=self.op.mode,
11417
                       name=self.op.name,
11418
                       mem_size=self.op.mem_size,
11419
                       disks=self.op.disks,
11420
                       disk_template=self.op.disk_template,
11421
                       os=self.op.os,
11422
                       tags=self.op.tags,
11423
                       nics=self.op.nics,
11424
                       vcpus=self.op.vcpus,
11425
                       hypervisor=self.op.hypervisor,
11426
                       )
11427
    elif self.op.mode == constants.IALLOCATOR_MODE_RELOC:
11428
      ial = IAllocator(self.cfg, self.rpc,
11429
                       mode=self.op.mode,
11430
                       name=self.op.name,
11431
                       relocate_from=list(self.relocate_from),
11432
                       )
11433
    elif self.op.mode == constants.IALLOCATOR_MODE_MEVAC:
11434
      ial = IAllocator(self.cfg, self.rpc,
11435
                       mode=self.op.mode,
11436
                       evac_nodes=self.op.evac_nodes)
11437
    else:
11438
      raise errors.ProgrammerError("Uncatched mode %s in"
11439
                                   " LUTestAllocator.Exec", self.op.mode)
11440

    
11441
    if self.op.direction == constants.IALLOCATOR_DIR_IN:
11442
      result = ial.in_text
11443
    else:
11444
      ial.Run(self.op.allocator, validate=False)
11445
      result = ial.out_text
11446
    return result
11447

    
11448

    
11449
#: Query type implementations
11450
_QUERY_IMPL = {
11451
  constants.QR_INSTANCE: _InstanceQuery,
11452
  constants.QR_NODE: _NodeQuery,
11453
  constants.QR_GROUP: _GroupQuery,
11454
  }
11455

    
11456

    
11457
def _GetQueryImplementation(name):
11458
  """Returns the implemtnation for a query type.
11459

11460
  @param name: Query type, must be one of L{constants.QR_OP_QUERY}
11461

11462
  """
11463
  try:
11464
    return _QUERY_IMPL[name]
11465
  except KeyError:
11466
    raise errors.OpPrereqError("Unknown query resource '%s'" % name,
11467
                               errors.ECODE_INVAL)