root / lib / bootstrap.py @ 34ca3914
History | View | Annotate | Download (11.9 kB)
1 | a0c9f010 | Michael Hanselmann | #
|
---|---|---|---|
2 | a0c9f010 | Michael Hanselmann | #
|
3 | a0c9f010 | Michael Hanselmann | |
4 | a0c9f010 | Michael Hanselmann | # Copyright (C) 2006, 2007, 2008 Google Inc.
|
5 | a0c9f010 | Michael Hanselmann | #
|
6 | a0c9f010 | Michael Hanselmann | # This program is free software; you can redistribute it and/or modify
|
7 | a0c9f010 | Michael Hanselmann | # it under the terms of the GNU General Public License as published by
|
8 | a0c9f010 | Michael Hanselmann | # the Free Software Foundation; either version 2 of the License, or
|
9 | a0c9f010 | Michael Hanselmann | # (at your option) any later version.
|
10 | a0c9f010 | Michael Hanselmann | #
|
11 | a0c9f010 | Michael Hanselmann | # This program is distributed in the hope that it will be useful, but
|
12 | a0c9f010 | Michael Hanselmann | # WITHOUT ANY WARRANTY; without even the implied warranty of
|
13 | a0c9f010 | Michael Hanselmann | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
14 | a0c9f010 | Michael Hanselmann | # General Public License for more details.
|
15 | a0c9f010 | Michael Hanselmann | #
|
16 | a0c9f010 | Michael Hanselmann | # You should have received a copy of the GNU General Public License
|
17 | a0c9f010 | Michael Hanselmann | # along with this program; if not, write to the Free Software
|
18 | a0c9f010 | Michael Hanselmann | # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
19 | a0c9f010 | Michael Hanselmann | # 02110-1301, USA.
|
20 | a0c9f010 | Michael Hanselmann | |
21 | a0c9f010 | Michael Hanselmann | |
22 | a0c9f010 | Michael Hanselmann | """Functions to bootstrap a new cluster.
|
23 | a0c9f010 | Michael Hanselmann |
|
24 | a0c9f010 | Michael Hanselmann | """
|
25 | a0c9f010 | Michael Hanselmann | |
26 | a0c9f010 | Michael Hanselmann | import os |
27 | a0c9f010 | Michael Hanselmann | import os.path |
28 | a0c9f010 | Michael Hanselmann | import sha |
29 | a0c9f010 | Michael Hanselmann | import re |
30 | b1b6ea87 | Iustin Pop | import logging |
31 | a0c9f010 | Michael Hanselmann | |
32 | a0c9f010 | Michael Hanselmann | from ganeti import rpc |
33 | a0c9f010 | Michael Hanselmann | from ganeti import ssh |
34 | a0c9f010 | Michael Hanselmann | from ganeti import utils |
35 | a0c9f010 | Michael Hanselmann | from ganeti import errors |
36 | a0c9f010 | Michael Hanselmann | from ganeti import config |
37 | a0c9f010 | Michael Hanselmann | from ganeti import constants |
38 | a0c9f010 | Michael Hanselmann | from ganeti import ssconf |
39 | a0c9f010 | Michael Hanselmann | |
40 | a0c9f010 | Michael Hanselmann | |
41 | a0c9f010 | Michael Hanselmann | def _InitSSHSetup(node): |
42 | a0c9f010 | Michael Hanselmann | """Setup the SSH configuration for the cluster.
|
43 | a0c9f010 | Michael Hanselmann |
|
44 | a0c9f010 | Michael Hanselmann |
|
45 | a0c9f010 | Michael Hanselmann | This generates a dsa keypair for root, adds the pub key to the
|
46 | a0c9f010 | Michael Hanselmann | permitted hosts and adds the hostkey to its own known hosts.
|
47 | a0c9f010 | Michael Hanselmann |
|
48 | a0c9f010 | Michael Hanselmann | Args:
|
49 | a0c9f010 | Michael Hanselmann | node: the name of this host as a fqdn
|
50 | a0c9f010 | Michael Hanselmann |
|
51 | a0c9f010 | Michael Hanselmann | """
|
52 | a0c9f010 | Michael Hanselmann | priv_key, pub_key, auth_keys = ssh.GetUserFiles(constants.GANETI_RUNAS) |
53 | a0c9f010 | Michael Hanselmann | |
54 | a0c9f010 | Michael Hanselmann | for name in priv_key, pub_key: |
55 | a0c9f010 | Michael Hanselmann | if os.path.exists(name):
|
56 | a0c9f010 | Michael Hanselmann | utils.CreateBackup(name) |
57 | a0c9f010 | Michael Hanselmann | utils.RemoveFile(name) |
58 | a0c9f010 | Michael Hanselmann | |
59 | a0c9f010 | Michael Hanselmann | result = utils.RunCmd(["ssh-keygen", "-t", "dsa", |
60 | a0c9f010 | Michael Hanselmann | "-f", priv_key,
|
61 | a0c9f010 | Michael Hanselmann | "-q", "-N", ""]) |
62 | a0c9f010 | Michael Hanselmann | if result.failed:
|
63 | a0c9f010 | Michael Hanselmann | raise errors.OpExecError("Could not generate ssh keypair, error %s" % |
64 | a0c9f010 | Michael Hanselmann | result.output) |
65 | a0c9f010 | Michael Hanselmann | |
66 | a0c9f010 | Michael Hanselmann | f = open(pub_key, 'r') |
67 | a0c9f010 | Michael Hanselmann | try:
|
68 | a0c9f010 | Michael Hanselmann | utils.AddAuthorizedKey(auth_keys, f.read(8192))
|
69 | a0c9f010 | Michael Hanselmann | finally:
|
70 | a0c9f010 | Michael Hanselmann | f.close() |
71 | a0c9f010 | Michael Hanselmann | |
72 | a0c9f010 | Michael Hanselmann | |
73 | a0c9f010 | Michael Hanselmann | def _InitGanetiServerSetup(ss): |
74 | a0c9f010 | Michael Hanselmann | """Setup the necessary configuration for the initial node daemon.
|
75 | a0c9f010 | Michael Hanselmann |
|
76 | a0c9f010 | Michael Hanselmann | This creates the nodepass file containing the shared password for
|
77 | a0c9f010 | Michael Hanselmann | the cluster and also generates the SSL certificate.
|
78 | a0c9f010 | Michael Hanselmann |
|
79 | 05f86716 | Guido Trotter | Args:
|
80 | 05f86716 | Guido Trotter | ss: A WritableSimpleStore
|
81 | 05f86716 | Guido Trotter |
|
82 | a0c9f010 | Michael Hanselmann | """
|
83 | a0c9f010 | Michael Hanselmann | # Create pseudo random password
|
84 | a0c9f010 | Michael Hanselmann | randpass = sha.new(os.urandom(64)).hexdigest()
|
85 | a0c9f010 | Michael Hanselmann | # and write it into sstore
|
86 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_NODED_PASS, randpass) |
87 | a0c9f010 | Michael Hanselmann | |
88 | a0c9f010 | Michael Hanselmann | result = utils.RunCmd(["openssl", "req", "-new", "-newkey", "rsa:1024", |
89 | a0c9f010 | Michael Hanselmann | "-days", str(365*5), "-nodes", "-x509", |
90 | a0c9f010 | Michael Hanselmann | "-keyout", constants.SSL_CERT_FILE,
|
91 | a0c9f010 | Michael Hanselmann | "-out", constants.SSL_CERT_FILE, "-batch"]) |
92 | a0c9f010 | Michael Hanselmann | if result.failed:
|
93 | a0c9f010 | Michael Hanselmann | raise errors.OpExecError("could not generate server ssl cert, command" |
94 | a0c9f010 | Michael Hanselmann | " %s had exitcode %s and error message %s" %
|
95 | a0c9f010 | Michael Hanselmann | (result.cmd, result.exit_code, result.output)) |
96 | a0c9f010 | Michael Hanselmann | |
97 | a0c9f010 | Michael Hanselmann | os.chmod(constants.SSL_CERT_FILE, 0400)
|
98 | a0c9f010 | Michael Hanselmann | |
99 | a0c9f010 | Michael Hanselmann | result = utils.RunCmd([constants.NODE_INITD_SCRIPT, "restart"])
|
100 | a0c9f010 | Michael Hanselmann | |
101 | a0c9f010 | Michael Hanselmann | if result.failed:
|
102 | a0c9f010 | Michael Hanselmann | raise errors.OpExecError("Could not start the node daemon, command %s" |
103 | a0c9f010 | Michael Hanselmann | " had exitcode %s and error %s" %
|
104 | a0c9f010 | Michael Hanselmann | (result.cmd, result.exit_code, result.output)) |
105 | a0c9f010 | Michael Hanselmann | |
106 | a0c9f010 | Michael Hanselmann | |
107 | a0c9f010 | Michael Hanselmann | def InitCluster(cluster_name, hypervisor_type, mac_prefix, def_bridge, |
108 | a0c9f010 | Michael Hanselmann | master_netdev, file_storage_dir, |
109 | a0c9f010 | Michael Hanselmann | secondary_ip=None,
|
110 | a0c9f010 | Michael Hanselmann | vg_name=None):
|
111 | a0c9f010 | Michael Hanselmann | """Initialise the cluster.
|
112 | a0c9f010 | Michael Hanselmann |
|
113 | a0c9f010 | Michael Hanselmann | """
|
114 | a0c9f010 | Michael Hanselmann | if config.ConfigWriter.IsCluster():
|
115 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Cluster is already initialised") |
116 | a0c9f010 | Michael Hanselmann | |
117 | a0c9f010 | Michael Hanselmann | if hypervisor_type == constants.HT_XEN_HVM31:
|
118 | a0c9f010 | Michael Hanselmann | if not os.path.exists(constants.VNC_PASSWORD_FILE): |
119 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Please prepare the cluster VNC" |
120 | a0c9f010 | Michael Hanselmann | "password file %s" %
|
121 | a0c9f010 | Michael Hanselmann | constants.VNC_PASSWORD_FILE) |
122 | a0c9f010 | Michael Hanselmann | |
123 | a0c9f010 | Michael Hanselmann | hostname = utils.HostInfo() |
124 | a0c9f010 | Michael Hanselmann | |
125 | a0c9f010 | Michael Hanselmann | if hostname.ip.startswith("127."): |
126 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("This host's IP resolves to the private" |
127 | a0c9f010 | Michael Hanselmann | " range (%s). Please fix DNS or %s." %
|
128 | a0c9f010 | Michael Hanselmann | (hostname.ip, constants.ETC_HOSTS)) |
129 | a0c9f010 | Michael Hanselmann | |
130 | a0c9f010 | Michael Hanselmann | if not utils.TcpPing(hostname.ip, constants.DEFAULT_NODED_PORT, |
131 | a0c9f010 | Michael Hanselmann | source=constants.LOCALHOST_IP_ADDRESS): |
132 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Inconsistency: this host's name resolves" |
133 | a0c9f010 | Michael Hanselmann | " to %s,\nbut this ip address does not"
|
134 | a0c9f010 | Michael Hanselmann | " belong to this host."
|
135 | a0c9f010 | Michael Hanselmann | " Aborting." % hostname.ip)
|
136 | a0c9f010 | Michael Hanselmann | |
137 | a0c9f010 | Michael Hanselmann | clustername = utils.HostInfo(cluster_name) |
138 | a0c9f010 | Michael Hanselmann | |
139 | a0c9f010 | Michael Hanselmann | if utils.TcpPing(clustername.ip, constants.DEFAULT_NODED_PORT,
|
140 | a0c9f010 | Michael Hanselmann | timeout=5):
|
141 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Cluster IP already active. Aborting.") |
142 | a0c9f010 | Michael Hanselmann | |
143 | a0c9f010 | Michael Hanselmann | if secondary_ip:
|
144 | a0c9f010 | Michael Hanselmann | if not utils.IsValidIP(secondary_ip): |
145 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Invalid secondary ip given") |
146 | a0c9f010 | Michael Hanselmann | if (secondary_ip != hostname.ip and |
147 | a0c9f010 | Michael Hanselmann | (not utils.TcpPing(secondary_ip, constants.DEFAULT_NODED_PORT,
|
148 | a0c9f010 | Michael Hanselmann | source=constants.LOCALHOST_IP_ADDRESS))): |
149 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("You gave %s as secondary IP," |
150 | a0c9f010 | Michael Hanselmann | " but it does not belong to this host." %
|
151 | a0c9f010 | Michael Hanselmann | secondary_ip) |
152 | a0c9f010 | Michael Hanselmann | |
153 | a0c9f010 | Michael Hanselmann | if vg_name is not None: |
154 | a0c9f010 | Michael Hanselmann | # Check if volume group is valid
|
155 | a0c9f010 | Michael Hanselmann | vgstatus = utils.CheckVolumeGroupSize(utils.ListVolumeGroups(), vg_name, |
156 | a0c9f010 | Michael Hanselmann | constants.MIN_VG_SIZE) |
157 | a0c9f010 | Michael Hanselmann | if vgstatus:
|
158 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Error: %s\nspecify --no-lvm-storage if" |
159 | a0c9f010 | Michael Hanselmann | " you are not using lvm" % vgstatus)
|
160 | a0c9f010 | Michael Hanselmann | |
161 | a0c9f010 | Michael Hanselmann | file_storage_dir = os.path.normpath(file_storage_dir) |
162 | a0c9f010 | Michael Hanselmann | |
163 | a0c9f010 | Michael Hanselmann | if not os.path.isabs(file_storage_dir): |
164 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("The file storage directory you passed is" |
165 | a0c9f010 | Michael Hanselmann | " not an absolute path.")
|
166 | a0c9f010 | Michael Hanselmann | |
167 | a0c9f010 | Michael Hanselmann | if not os.path.exists(file_storage_dir): |
168 | a0c9f010 | Michael Hanselmann | try:
|
169 | a0c9f010 | Michael Hanselmann | os.makedirs(file_storage_dir, 0750)
|
170 | a0c9f010 | Michael Hanselmann | except OSError, err: |
171 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Cannot create file storage directory" |
172 | a0c9f010 | Michael Hanselmann | " '%s': %s" %
|
173 | a0c9f010 | Michael Hanselmann | (file_storage_dir, err)) |
174 | a0c9f010 | Michael Hanselmann | |
175 | a0c9f010 | Michael Hanselmann | if not os.path.isdir(file_storage_dir): |
176 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("The file storage directory '%s' is not" |
177 | a0c9f010 | Michael Hanselmann | " a directory." % file_storage_dir)
|
178 | a0c9f010 | Michael Hanselmann | |
179 | a0c9f010 | Michael Hanselmann | if not re.match("^[0-9a-z]{2}:[0-9a-z]{2}:[0-9a-z]{2}$", mac_prefix): |
180 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Invalid mac prefix given '%s'" % mac_prefix) |
181 | a0c9f010 | Michael Hanselmann | |
182 | a0c9f010 | Michael Hanselmann | if hypervisor_type not in constants.HYPER_TYPES: |
183 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Invalid hypervisor type given '%s'" % |
184 | a0c9f010 | Michael Hanselmann | hypervisor_type) |
185 | a0c9f010 | Michael Hanselmann | |
186 | a0c9f010 | Michael Hanselmann | result = utils.RunCmd(["ip", "link", "show", "dev", master_netdev]) |
187 | a0c9f010 | Michael Hanselmann | if result.failed:
|
188 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Invalid master netdev given (%s): '%s'" % |
189 | a0c9f010 | Michael Hanselmann | (master_netdev, |
190 | a0c9f010 | Michael Hanselmann | result.output.strip())) |
191 | a0c9f010 | Michael Hanselmann | |
192 | a0c9f010 | Michael Hanselmann | if not (os.path.isfile(constants.NODE_INITD_SCRIPT) and |
193 | a0c9f010 | Michael Hanselmann | os.access(constants.NODE_INITD_SCRIPT, os.X_OK)): |
194 | a0c9f010 | Michael Hanselmann | raise errors.OpPrereqError("Init.d script '%s' missing or not" |
195 | a0c9f010 | Michael Hanselmann | " executable." % constants.NODE_INITD_SCRIPT)
|
196 | a0c9f010 | Michael Hanselmann | |
197 | a0c9f010 | Michael Hanselmann | # set up the simple store
|
198 | 05f86716 | Guido Trotter | ss = ssconf.WritableSimpleStore() |
199 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_HYPERVISOR, hypervisor_type) |
200 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_MASTER_NODE, hostname.name) |
201 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_MASTER_IP, clustername.ip) |
202 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_MASTER_NETDEV, master_netdev) |
203 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_CLUSTER_NAME, clustername.name) |
204 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_FILE_STORAGE_DIR, file_storage_dir) |
205 | a0c9f010 | Michael Hanselmann | ss.SetKey(ss.SS_CONFIG_VERSION, constants.CONFIG_VERSION) |
206 | a0c9f010 | Michael Hanselmann | |
207 | a0c9f010 | Michael Hanselmann | # set up the inter-node password and certificate
|
208 | a0c9f010 | Michael Hanselmann | _InitGanetiServerSetup(ss) |
209 | a0c9f010 | Michael Hanselmann | |
210 | a0c9f010 | Michael Hanselmann | # set up ssh config and /etc/hosts
|
211 | a0c9f010 | Michael Hanselmann | f = open(constants.SSH_HOST_RSA_PUB, 'r') |
212 | a0c9f010 | Michael Hanselmann | try:
|
213 | a0c9f010 | Michael Hanselmann | sshline = f.read() |
214 | a0c9f010 | Michael Hanselmann | finally:
|
215 | a0c9f010 | Michael Hanselmann | f.close() |
216 | a0c9f010 | Michael Hanselmann | sshkey = sshline.split(" ")[1] |
217 | a0c9f010 | Michael Hanselmann | |
218 | a0c9f010 | Michael Hanselmann | utils.AddHostToEtcHosts(hostname.name) |
219 | a0c9f010 | Michael Hanselmann | _InitSSHSetup(hostname.name) |
220 | a0c9f010 | Michael Hanselmann | |
221 | a0c9f010 | Michael Hanselmann | # init of cluster config file
|
222 | a0c9f010 | Michael Hanselmann | cfg = config.ConfigWriter() |
223 | a0c9f010 | Michael Hanselmann | cfg.InitConfig(hostname.name, hostname.ip, secondary_ip, sshkey, |
224 | a0c9f010 | Michael Hanselmann | mac_prefix, vg_name, def_bridge) |
225 | a0c9f010 | Michael Hanselmann | |
226 | a0c9f010 | Michael Hanselmann | ssh.WriteKnownHostsFile(cfg, ss, constants.SSH_KNOWN_HOSTS_FILE) |
227 | 827f753e | Guido Trotter | |
228 | b3f1cf6f | Iustin Pop | # start the master ip
|
229 | b3f1cf6f | Iustin Pop | # TODO: Review rpc call from bootstrap
|
230 | b3f1cf6f | Iustin Pop | rpc.call_node_start_master(hostname.name, True)
|
231 | b3f1cf6f | Iustin Pop | |
232 | b1b6ea87 | Iustin Pop | |
233 | 140aa4a8 | Iustin Pop | def FinalizeClusterDestroy(master): |
234 | 140aa4a8 | Iustin Pop | """Execute the last steps of cluster destroy
|
235 | 140aa4a8 | Iustin Pop |
|
236 | 140aa4a8 | Iustin Pop | This function shuts down all the daemons, completing the destroy
|
237 | 140aa4a8 | Iustin Pop | begun in cmdlib.LUDestroyOpcode.
|
238 | 140aa4a8 | Iustin Pop |
|
239 | 140aa4a8 | Iustin Pop | """
|
240 | 140aa4a8 | Iustin Pop | if not rpc.call_node_stop_master(master, True): |
241 | 140aa4a8 | Iustin Pop | logging.warning("Could not disable the master role")
|
242 | 140aa4a8 | Iustin Pop | if not rpc.call_node_leave_cluster(master): |
243 | 140aa4a8 | Iustin Pop | logging.warning("Could not shutdown the node daemon and cleanup the node")
|
244 | 140aa4a8 | Iustin Pop | |
245 | 140aa4a8 | Iustin Pop | |
246 | c4b6c29c | Michael Hanselmann | def SetupNodeDaemon(node, ssh_key_check): |
247 | 827f753e | Guido Trotter | """Add a node to the cluster.
|
248 | 827f753e | Guido Trotter |
|
249 | b1b6ea87 | Iustin Pop | This function must be called before the actual opcode, and will ssh
|
250 | b1b6ea87 | Iustin Pop | to the remote node, copy the needed files, and start ganeti-noded,
|
251 | b1b6ea87 | Iustin Pop | allowing the master to do the rest via normal rpc calls.
|
252 | 827f753e | Guido Trotter |
|
253 | 827f753e | Guido Trotter | Args:
|
254 | 827f753e | Guido Trotter | node: fully qualified domain name for the new node
|
255 | 827f753e | Guido Trotter |
|
256 | 827f753e | Guido Trotter | """
|
257 | 827f753e | Guido Trotter | ss = ssconf.SimpleStore() |
258 | 827f753e | Guido Trotter | sshrunner = ssh.SshRunner(ss) |
259 | 827f753e | Guido Trotter | gntpass = ss.GetNodeDaemonPassword() |
260 | 827f753e | Guido Trotter | if not re.match('^[a-zA-Z0-9.]{1,64}$', gntpass): |
261 | 827f753e | Guido Trotter | raise errors.OpExecError("ganeti password corruption detected") |
262 | 827f753e | Guido Trotter | f = open(constants.SSL_CERT_FILE)
|
263 | 827f753e | Guido Trotter | try:
|
264 | 827f753e | Guido Trotter | gntpem = f.read(8192)
|
265 | 827f753e | Guido Trotter | finally:
|
266 | 827f753e | Guido Trotter | f.close() |
267 | 827f753e | Guido Trotter | # in the base64 pem encoding, neither '!' nor '.' are valid chars,
|
268 | 827f753e | Guido Trotter | # so we use this to detect an invalid certificate; as long as the
|
269 | 827f753e | Guido Trotter | # cert doesn't contain this, the here-document will be correctly
|
270 | 827f753e | Guido Trotter | # parsed by the shell sequence below
|
271 | 827f753e | Guido Trotter | if re.search('^!EOF\.', gntpem, re.MULTILINE): |
272 | 827f753e | Guido Trotter | raise errors.OpExecError("invalid PEM encoding in the SSL certificate") |
273 | 827f753e | Guido Trotter | if not gntpem.endswith("\n"): |
274 | 827f753e | Guido Trotter | raise errors.OpExecError("PEM must end with newline") |
275 | 827f753e | Guido Trotter | |
276 | 827f753e | Guido Trotter | # set up inter-node password and certificate and restarts the node daemon
|
277 | 827f753e | Guido Trotter | # and then connect with ssh to set password and start ganeti-noded
|
278 | 827f753e | Guido Trotter | # note that all the below variables are sanitized at this point,
|
279 | 827f753e | Guido Trotter | # either by being constants or by the checks above
|
280 | 827f753e | Guido Trotter | mycommand = ("umask 077 && "
|
281 | 827f753e | Guido Trotter | "echo '%s' > '%s' && "
|
282 | 827f753e | Guido Trotter | "cat > '%s' << '!EOF.' && \n"
|
283 | 827f753e | Guido Trotter | "%s!EOF.\n%s restart" %
|
284 | 827f753e | Guido Trotter | (gntpass, ss.KeyToFilename(ss.SS_NODED_PASS), |
285 | 827f753e | Guido Trotter | constants.SSL_CERT_FILE, gntpem, |
286 | 827f753e | Guido Trotter | constants.NODE_INITD_SCRIPT)) |
287 | 827f753e | Guido Trotter | |
288 | c4b6c29c | Michael Hanselmann | result = sshrunner.Run(node, 'root', mycommand, batch=False, |
289 | c4b6c29c | Michael Hanselmann | ask_key=ssh_key_check, |
290 | c4b6c29c | Michael Hanselmann | use_cluster_key=False,
|
291 | c4b6c29c | Michael Hanselmann | strict_host_check=ssh_key_check) |
292 | 827f753e | Guido Trotter | if result.failed:
|
293 | 827f753e | Guido Trotter | raise errors.OpExecError("Remote command on node %s, error: %s," |
294 | 827f753e | Guido Trotter | " output: %s" %
|
295 | 827f753e | Guido Trotter | (node, result.fail_reason, result.output)) |
296 | 827f753e | Guido Trotter | |
297 | 827f753e | Guido Trotter | return 0 |
298 | 827f753e | Guido Trotter | |
299 | b1b6ea87 | Iustin Pop | |
300 | b1b6ea87 | Iustin Pop | def MasterFailover(): |
301 | b1b6ea87 | Iustin Pop | """Failover the master node.
|
302 | b1b6ea87 | Iustin Pop |
|
303 | b1b6ea87 | Iustin Pop | This checks that we are not already the master, and will cause the
|
304 | b1b6ea87 | Iustin Pop | current master to cease being master, and the non-master to become
|
305 | b1b6ea87 | Iustin Pop | new master.
|
306 | b1b6ea87 | Iustin Pop |
|
307 | b1b6ea87 | Iustin Pop | """
|
308 | b1b6ea87 | Iustin Pop | ss = ssconf.WritableSimpleStore() |
309 | b1b6ea87 | Iustin Pop | |
310 | b1b6ea87 | Iustin Pop | new_master = utils.HostInfo().name |
311 | b1b6ea87 | Iustin Pop | old_master = ss.GetMasterNode() |
312 | b1b6ea87 | Iustin Pop | |
313 | b1b6ea87 | Iustin Pop | if old_master == new_master:
|
314 | b1b6ea87 | Iustin Pop | raise errors.OpPrereqError("This commands must be run on the node" |
315 | b1b6ea87 | Iustin Pop | " where you want the new master to be."
|
316 | b1b6ea87 | Iustin Pop | " %s is already the master" %
|
317 | b1b6ea87 | Iustin Pop | old_master) |
318 | b1b6ea87 | Iustin Pop | # end checks
|
319 | b1b6ea87 | Iustin Pop | |
320 | b1b6ea87 | Iustin Pop | rcode = 0
|
321 | b1b6ea87 | Iustin Pop | |
322 | b1b6ea87 | Iustin Pop | logging.info("setting master to %s, old master: %s", new_master, old_master)
|
323 | b1b6ea87 | Iustin Pop | |
324 | b1b6ea87 | Iustin Pop | if not rpc.call_node_stop_master(old_master, True): |
325 | b1b6ea87 | Iustin Pop | logging.error("could disable the master role on the old master"
|
326 | b1b6ea87 | Iustin Pop | " %s, please disable manually", old_master)
|
327 | b1b6ea87 | Iustin Pop | |
328 | b1b6ea87 | Iustin Pop | ss.SetKey(ss.SS_MASTER_NODE, new_master) |
329 | b1b6ea87 | Iustin Pop | |
330 | b1b6ea87 | Iustin Pop | cfg = config.ConfigWriter() |
331 | b1b6ea87 | Iustin Pop | |
332 | b1b6ea87 | Iustin Pop | if not rpc.call_upload_file(cfg.GetNodeList(), |
333 | b1b6ea87 | Iustin Pop | ss.KeyToFilename(ss.SS_MASTER_NODE)): |
334 | 3b9e6a30 | Iustin Pop | logging.error("could not distribute the new simple store master file"
|
335 | 3b9e6a30 | Iustin Pop | " to the other nodes, please check.")
|
336 | b1b6ea87 | Iustin Pop | |
337 | b1b6ea87 | Iustin Pop | if not rpc.call_node_start_master(new_master, True): |
338 | b1b6ea87 | Iustin Pop | logging.error("could not start the master role on the new master"
|
339 | b1b6ea87 | Iustin Pop | " %s, please check", new_master)
|
340 | b1b6ea87 | Iustin Pop | rcode = 1
|
341 | b1b6ea87 | Iustin Pop | |
342 | b1b6ea87 | Iustin Pop | return rcode |