Statistics
| Branch: | Tag: | Revision:

root / lib / cmdlib.py @ 622444e5

History | View | Annotate | Download (371.5 kB)

1
#
2
#
3

    
4
# Copyright (C) 2006, 2007, 2008, 2009, 2010 Google Inc.
5
#
6
# This program is free software; you can redistribute it and/or modify
7
# it under the terms of the GNU General Public License as published by
8
# the Free Software Foundation; either version 2 of the License, or
9
# (at your option) any later version.
10
#
11
# This program is distributed in the hope that it will be useful, but
12
# WITHOUT ANY WARRANTY; without even the implied warranty of
13
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
# General Public License for more details.
15
#
16
# You should have received a copy of the GNU General Public License
17
# along with this program; if not, write to the Free Software
18
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
# 02110-1301, USA.
20

    
21

    
22
"""Module implementing the master-side code."""
23

    
24
# pylint: disable-msg=W0201,C0302
25

    
26
# W0201 since most LU attributes are defined in CheckPrereq or similar
27
# functions
28

    
29
# C0302: since we have waaaay to many lines in this module
30

    
31
import os
32
import os.path
33
import time
34
import re
35
import platform
36
import logging
37
import copy
38
import OpenSSL
39
import socket
40
import tempfile
41
import shutil
42

    
43
from ganeti import ssh
44
from ganeti import utils
45
from ganeti import errors
46
from ganeti import hypervisor
47
from ganeti import locking
48
from ganeti import constants
49
from ganeti import objects
50
from ganeti import serializer
51
from ganeti import ssconf
52
from ganeti import uidpool
53
from ganeti import compat
54
from ganeti import masterd
55
from ganeti import netutils
56
from ganeti import ht
57

    
58
import ganeti.masterd.instance # pylint: disable-msg=W0611
59

    
60
# Common opcode attributes
61

    
62
#: output fields for a query operation
63
_POutputFields = ("output_fields", ht.NoDefault, ht.TListOf(ht.TNonEmptyString))
64

    
65

    
66
#: the shutdown timeout
67
_PShutdownTimeout = ("shutdown_timeout", constants.DEFAULT_SHUTDOWN_TIMEOUT,
68
                     ht.TPositiveInt)
69

    
70
#: the force parameter
71
_PForce = ("force", False, ht.TBool)
72

    
73
#: a required instance name (for single-instance LUs)
74
_PInstanceName = ("instance_name", ht.NoDefault, ht.TNonEmptyString)
75

    
76
#: Whether to ignore offline nodes
77
_PIgnoreOfflineNodes = ("ignore_offline_nodes", False, ht.TBool)
78

    
79
#: a required node name (for single-node LUs)
80
_PNodeName = ("node_name", ht.NoDefault, ht.TNonEmptyString)
81

    
82
#: the migration type (live/non-live)
83
_PMigrationMode = ("mode", None,
84
                   ht.TOr(ht.TNone, ht.TElemOf(constants.HT_MIGRATION_MODES)))
85

    
86
#: the obsolete 'live' mode (boolean)
87
_PMigrationLive = ("live", None, ht.TMaybeBool)
88

    
89

    
90
# End types
91
class LogicalUnit(object):
92
  """Logical Unit base class.
93

94
  Subclasses must follow these rules:
95
    - implement ExpandNames
96
    - implement CheckPrereq (except when tasklets are used)
97
    - implement Exec (except when tasklets are used)
98
    - implement BuildHooksEnv
99
    - redefine HPATH and HTYPE
100
    - optionally redefine their run requirements:
101
        REQ_BGL: the LU needs to hold the Big Ganeti Lock exclusively
102

103
  Note that all commands require root permissions.
104

105
  @ivar dry_run_result: the value (if any) that will be returned to the caller
106
      in dry-run mode (signalled by opcode dry_run parameter)
107
  @cvar _OP_PARAMS: a list of opcode attributes, their defaults values
108
      they should get if not already defined, and types they must match
109

110
  """
111
  HPATH = None
112
  HTYPE = None
113
  _OP_PARAMS = []
114
  REQ_BGL = True
115

    
116
  def __init__(self, processor, op, context, rpc):
117
    """Constructor for LogicalUnit.
118

119
    This needs to be overridden in derived classes in order to check op
120
    validity.
121

122
    """
123
    self.proc = processor
124
    self.op = op
125
    self.cfg = context.cfg
126
    self.context = context
127
    self.rpc = rpc
128
    # Dicts used to declare locking needs to mcpu
129
    self.needed_locks = None
130
    self.acquired_locks = {}
131
    self.share_locks = dict.fromkeys(locking.LEVELS, 0)
132
    self.add_locks = {}
133
    self.remove_locks = {}
134
    # Used to force good behavior when calling helper functions
135
    self.recalculate_locks = {}
136
    self.__ssh = None
137
    # logging
138
    self.Log = processor.Log # pylint: disable-msg=C0103
139
    self.LogWarning = processor.LogWarning # pylint: disable-msg=C0103
140
    self.LogInfo = processor.LogInfo # pylint: disable-msg=C0103
141
    self.LogStep = processor.LogStep # pylint: disable-msg=C0103
142
    # support for dry-run
143
    self.dry_run_result = None
144
    # support for generic debug attribute
145
    if (not hasattr(self.op, "debug_level") or
146
        not isinstance(self.op.debug_level, int)):
147
      self.op.debug_level = 0
148

    
149
    # Tasklets
150
    self.tasklets = None
151

    
152
    # The new kind-of-type-system
153
    op_id = self.op.OP_ID
154
    for attr_name, aval, test in self._OP_PARAMS:
155
      if not hasattr(op, attr_name):
156
        if aval == ht.NoDefault:
157
          raise errors.OpPrereqError("Required parameter '%s.%s' missing" %
158
                                     (op_id, attr_name), errors.ECODE_INVAL)
159
        else:
160
          if callable(aval):
161
            dval = aval()
162
          else:
163
            dval = aval
164
          setattr(self.op, attr_name, dval)
165
      attr_val = getattr(op, attr_name)
166
      if test == ht.NoType:
167
        # no tests here
168
        continue
169
      if not callable(test):
170
        raise errors.ProgrammerError("Validation for parameter '%s.%s' failed,"
171
                                     " given type is not a proper type (%s)" %
172
                                     (op_id, attr_name, test))
173
      if not test(attr_val):
174
        logging.error("OpCode %s, parameter %s, has invalid type %s/value %s",
175
                      self.op.OP_ID, attr_name, type(attr_val), attr_val)
176
        raise errors.OpPrereqError("Parameter '%s.%s' fails validation" %
177
                                   (op_id, attr_name), errors.ECODE_INVAL)
178

    
179
    self.CheckArguments()
180

    
181
  def __GetSSH(self):
182
    """Returns the SshRunner object
183

184
    """
185
    if not self.__ssh:
186
      self.__ssh = ssh.SshRunner(self.cfg.GetClusterName())
187
    return self.__ssh
188

    
189
  ssh = property(fget=__GetSSH)
190

    
191
  def CheckArguments(self):
192
    """Check syntactic validity for the opcode arguments.
193

194
    This method is for doing a simple syntactic check and ensure
195
    validity of opcode parameters, without any cluster-related
196
    checks. While the same can be accomplished in ExpandNames and/or
197
    CheckPrereq, doing these separate is better because:
198

199
      - ExpandNames is left as as purely a lock-related function
200
      - CheckPrereq is run after we have acquired locks (and possible
201
        waited for them)
202

203
    The function is allowed to change the self.op attribute so that
204
    later methods can no longer worry about missing parameters.
205

206
    """
207
    pass
208

    
209
  def ExpandNames(self):
210
    """Expand names for this LU.
211

212
    This method is called before starting to execute the opcode, and it should
213
    update all the parameters of the opcode to their canonical form (e.g. a
214
    short node name must be fully expanded after this method has successfully
215
    completed). This way locking, hooks, logging, ecc. can work correctly.
216

217
    LUs which implement this method must also populate the self.needed_locks
218
    member, as a dict with lock levels as keys, and a list of needed lock names
219
    as values. Rules:
220

221
      - use an empty dict if you don't need any lock
222
      - if you don't need any lock at a particular level omit that level
223
      - don't put anything for the BGL level
224
      - if you want all locks at a level use locking.ALL_SET as a value
225

226
    If you need to share locks (rather than acquire them exclusively) at one
227
    level you can modify self.share_locks, setting a true value (usually 1) for
228
    that level. By default locks are not shared.
229

230
    This function can also define a list of tasklets, which then will be
231
    executed in order instead of the usual LU-level CheckPrereq and Exec
232
    functions, if those are not defined by the LU.
233

234
    Examples::
235

236
      # Acquire all nodes and one instance
237
      self.needed_locks = {
238
        locking.LEVEL_NODE: locking.ALL_SET,
239
        locking.LEVEL_INSTANCE: ['instance1.example.com'],
240
      }
241
      # Acquire just two nodes
242
      self.needed_locks = {
243
        locking.LEVEL_NODE: ['node1.example.com', 'node2.example.com'],
244
      }
245
      # Acquire no locks
246
      self.needed_locks = {} # No, you can't leave it to the default value None
247

248
    """
249
    # The implementation of this method is mandatory only if the new LU is
250
    # concurrent, so that old LUs don't need to be changed all at the same
251
    # time.
252
    if self.REQ_BGL:
253
      self.needed_locks = {} # Exclusive LUs don't need locks.
254
    else:
255
      raise NotImplementedError
256

    
257
  def DeclareLocks(self, level):
258
    """Declare LU locking needs for a level
259

260
    While most LUs can just declare their locking needs at ExpandNames time,
261
    sometimes there's the need to calculate some locks after having acquired
262
    the ones before. This function is called just before acquiring locks at a
263
    particular level, but after acquiring the ones at lower levels, and permits
264
    such calculations. It can be used to modify self.needed_locks, and by
265
    default it does nothing.
266

267
    This function is only called if you have something already set in
268
    self.needed_locks for the level.
269

270
    @param level: Locking level which is going to be locked
271
    @type level: member of ganeti.locking.LEVELS
272

273
    """
274

    
275
  def CheckPrereq(self):
276
    """Check prerequisites for this LU.
277

278
    This method should check that the prerequisites for the execution
279
    of this LU are fulfilled. It can do internode communication, but
280
    it should be idempotent - no cluster or system changes are
281
    allowed.
282

283
    The method should raise errors.OpPrereqError in case something is
284
    not fulfilled. Its return value is ignored.
285

286
    This method should also update all the parameters of the opcode to
287
    their canonical form if it hasn't been done by ExpandNames before.
288

289
    """
290
    if self.tasklets is not None:
291
      for (idx, tl) in enumerate(self.tasklets):
292
        logging.debug("Checking prerequisites for tasklet %s/%s",
293
                      idx + 1, len(self.tasklets))
294
        tl.CheckPrereq()
295
    else:
296
      pass
297

    
298
  def Exec(self, feedback_fn):
299
    """Execute the LU.
300

301
    This method should implement the actual work. It should raise
302
    errors.OpExecError for failures that are somewhat dealt with in
303
    code, or expected.
304

305
    """
306
    if self.tasklets is not None:
307
      for (idx, tl) in enumerate(self.tasklets):
308
        logging.debug("Executing tasklet %s/%s", idx + 1, len(self.tasklets))
309
        tl.Exec(feedback_fn)
310
    else:
311
      raise NotImplementedError
312

    
313
  def BuildHooksEnv(self):
314
    """Build hooks environment for this LU.
315

316
    This method should return a three-node tuple consisting of: a dict
317
    containing the environment that will be used for running the
318
    specific hook for this LU, a list of node names on which the hook
319
    should run before the execution, and a list of node names on which
320
    the hook should run after the execution.
321

322
    The keys of the dict must not have 'GANETI_' prefixed as this will
323
    be handled in the hooks runner. Also note additional keys will be
324
    added by the hooks runner. If the LU doesn't define any
325
    environment, an empty dict (and not None) should be returned.
326

327
    No nodes should be returned as an empty list (and not None).
328

329
    Note that if the HPATH for a LU class is None, this function will
330
    not be called.
331

332
    """
333
    raise NotImplementedError
334

    
335
  def HooksCallBack(self, phase, hook_results, feedback_fn, lu_result):
336
    """Notify the LU about the results of its hooks.
337

338
    This method is called every time a hooks phase is executed, and notifies
339
    the Logical Unit about the hooks' result. The LU can then use it to alter
340
    its result based on the hooks.  By default the method does nothing and the
341
    previous result is passed back unchanged but any LU can define it if it
342
    wants to use the local cluster hook-scripts somehow.
343

344
    @param phase: one of L{constants.HOOKS_PHASE_POST} or
345
        L{constants.HOOKS_PHASE_PRE}; it denotes the hooks phase
346
    @param hook_results: the results of the multi-node hooks rpc call
347
    @param feedback_fn: function used send feedback back to the caller
348
    @param lu_result: the previous Exec result this LU had, or None
349
        in the PRE phase
350
    @return: the new Exec result, based on the previous result
351
        and hook results
352

353
    """
354
    # API must be kept, thus we ignore the unused argument and could
355
    # be a function warnings
356
    # pylint: disable-msg=W0613,R0201
357
    return lu_result
358

    
359
  def _ExpandAndLockInstance(self):
360
    """Helper function to expand and lock an instance.
361

362
    Many LUs that work on an instance take its name in self.op.instance_name
363
    and need to expand it and then declare the expanded name for locking. This
364
    function does it, and then updates self.op.instance_name to the expanded
365
    name. It also initializes needed_locks as a dict, if this hasn't been done
366
    before.
367

368
    """
369
    if self.needed_locks is None:
370
      self.needed_locks = {}
371
    else:
372
      assert locking.LEVEL_INSTANCE not in self.needed_locks, \
373
        "_ExpandAndLockInstance called with instance-level locks set"
374
    self.op.instance_name = _ExpandInstanceName(self.cfg,
375
                                                self.op.instance_name)
376
    self.needed_locks[locking.LEVEL_INSTANCE] = self.op.instance_name
377

    
378
  def _LockInstancesNodes(self, primary_only=False):
379
    """Helper function to declare instances' nodes for locking.
380

381
    This function should be called after locking one or more instances to lock
382
    their nodes. Its effect is populating self.needed_locks[locking.LEVEL_NODE]
383
    with all primary or secondary nodes for instances already locked and
384
    present in self.needed_locks[locking.LEVEL_INSTANCE].
385

386
    It should be called from DeclareLocks, and for safety only works if
387
    self.recalculate_locks[locking.LEVEL_NODE] is set.
388

389
    In the future it may grow parameters to just lock some instance's nodes, or
390
    to just lock primaries or secondary nodes, if needed.
391

392
    If should be called in DeclareLocks in a way similar to::
393

394
      if level == locking.LEVEL_NODE:
395
        self._LockInstancesNodes()
396

397
    @type primary_only: boolean
398
    @param primary_only: only lock primary nodes of locked instances
399

400
    """
401
    assert locking.LEVEL_NODE in self.recalculate_locks, \
402
      "_LockInstancesNodes helper function called with no nodes to recalculate"
403

    
404
    # TODO: check if we're really been called with the instance locks held
405

    
406
    # For now we'll replace self.needed_locks[locking.LEVEL_NODE], but in the
407
    # future we might want to have different behaviors depending on the value
408
    # of self.recalculate_locks[locking.LEVEL_NODE]
409
    wanted_nodes = []
410
    for instance_name in self.acquired_locks[locking.LEVEL_INSTANCE]:
411
      instance = self.context.cfg.GetInstanceInfo(instance_name)
412
      wanted_nodes.append(instance.primary_node)
413
      if not primary_only:
414
        wanted_nodes.extend(instance.secondary_nodes)
415

    
416
    if self.recalculate_locks[locking.LEVEL_NODE] == constants.LOCKS_REPLACE:
417
      self.needed_locks[locking.LEVEL_NODE] = wanted_nodes
418
    elif self.recalculate_locks[locking.LEVEL_NODE] == constants.LOCKS_APPEND:
419
      self.needed_locks[locking.LEVEL_NODE].extend(wanted_nodes)
420

    
421
    del self.recalculate_locks[locking.LEVEL_NODE]
422

    
423

    
424
class NoHooksLU(LogicalUnit): # pylint: disable-msg=W0223
425
  """Simple LU which runs no hooks.
426

427
  This LU is intended as a parent for other LogicalUnits which will
428
  run no hooks, in order to reduce duplicate code.
429

430
  """
431
  HPATH = None
432
  HTYPE = None
433

    
434
  def BuildHooksEnv(self):
435
    """Empty BuildHooksEnv for NoHooksLu.
436

437
    This just raises an error.
438

439
    """
440
    assert False, "BuildHooksEnv called for NoHooksLUs"
441

    
442

    
443
class Tasklet:
444
  """Tasklet base class.
445

446
  Tasklets are subcomponents for LUs. LUs can consist entirely of tasklets or
447
  they can mix legacy code with tasklets. Locking needs to be done in the LU,
448
  tasklets know nothing about locks.
449

450
  Subclasses must follow these rules:
451
    - Implement CheckPrereq
452
    - Implement Exec
453

454
  """
455
  def __init__(self, lu):
456
    self.lu = lu
457

    
458
    # Shortcuts
459
    self.cfg = lu.cfg
460
    self.rpc = lu.rpc
461

    
462
  def CheckPrereq(self):
463
    """Check prerequisites for this tasklets.
464

465
    This method should check whether the prerequisites for the execution of
466
    this tasklet are fulfilled. It can do internode communication, but it
467
    should be idempotent - no cluster or system changes are allowed.
468

469
    The method should raise errors.OpPrereqError in case something is not
470
    fulfilled. Its return value is ignored.
471

472
    This method should also update all parameters to their canonical form if it
473
    hasn't been done before.
474

475
    """
476
    pass
477

    
478
  def Exec(self, feedback_fn):
479
    """Execute the tasklet.
480

481
    This method should implement the actual work. It should raise
482
    errors.OpExecError for failures that are somewhat dealt with in code, or
483
    expected.
484

485
    """
486
    raise NotImplementedError
487

    
488

    
489
def _GetWantedNodes(lu, nodes):
490
  """Returns list of checked and expanded node names.
491

492
  @type lu: L{LogicalUnit}
493
  @param lu: the logical unit on whose behalf we execute
494
  @type nodes: list
495
  @param nodes: list of node names or None for all nodes
496
  @rtype: list
497
  @return: the list of nodes, sorted
498
  @raise errors.ProgrammerError: if the nodes parameter is wrong type
499

500
  """
501
  if not nodes:
502
    raise errors.ProgrammerError("_GetWantedNodes should only be called with a"
503
      " non-empty list of nodes whose name is to be expanded.")
504

    
505
  wanted = [_ExpandNodeName(lu.cfg, name) for name in nodes]
506
  return utils.NiceSort(wanted)
507

    
508

    
509
def _GetWantedInstances(lu, instances):
510
  """Returns list of checked and expanded instance names.
511

512
  @type lu: L{LogicalUnit}
513
  @param lu: the logical unit on whose behalf we execute
514
  @type instances: list
515
  @param instances: list of instance names or None for all instances
516
  @rtype: list
517
  @return: the list of instances, sorted
518
  @raise errors.OpPrereqError: if the instances parameter is wrong type
519
  @raise errors.OpPrereqError: if any of the passed instances is not found
520

521
  """
522
  if instances:
523
    wanted = [_ExpandInstanceName(lu.cfg, name) for name in instances]
524
  else:
525
    wanted = utils.NiceSort(lu.cfg.GetInstanceList())
526
  return wanted
527

    
528

    
529
def _GetUpdatedParams(old_params, update_dict,
530
                      use_default=True, use_none=False):
531
  """Return the new version of a parameter dictionary.
532

533
  @type old_params: dict
534
  @param old_params: old parameters
535
  @type update_dict: dict
536
  @param update_dict: dict containing new parameter values, or
537
      constants.VALUE_DEFAULT to reset the parameter to its default
538
      value
539
  @param use_default: boolean
540
  @type use_default: whether to recognise L{constants.VALUE_DEFAULT}
541
      values as 'to be deleted' values
542
  @param use_none: boolean
543
  @type use_none: whether to recognise C{None} values as 'to be
544
      deleted' values
545
  @rtype: dict
546
  @return: the new parameter dictionary
547

548
  """
549
  params_copy = copy.deepcopy(old_params)
550
  for key, val in update_dict.iteritems():
551
    if ((use_default and val == constants.VALUE_DEFAULT) or
552
        (use_none and val is None)):
553
      try:
554
        del params_copy[key]
555
      except KeyError:
556
        pass
557
    else:
558
      params_copy[key] = val
559
  return params_copy
560

    
561

    
562
def _CheckOutputFields(static, dynamic, selected):
563
  """Checks whether all selected fields are valid.
564

565
  @type static: L{utils.FieldSet}
566
  @param static: static fields set
567
  @type dynamic: L{utils.FieldSet}
568
  @param dynamic: dynamic fields set
569

570
  """
571
  f = utils.FieldSet()
572
  f.Extend(static)
573
  f.Extend(dynamic)
574

    
575
  delta = f.NonMatching(selected)
576
  if delta:
577
    raise errors.OpPrereqError("Unknown output fields selected: %s"
578
                               % ",".join(delta), errors.ECODE_INVAL)
579

    
580

    
581
def _CheckGlobalHvParams(params):
582
  """Validates that given hypervisor params are not global ones.
583

584
  This will ensure that instances don't get customised versions of
585
  global params.
586

587
  """
588
  used_globals = constants.HVC_GLOBALS.intersection(params)
589
  if used_globals:
590
    msg = ("The following hypervisor parameters are global and cannot"
591
           " be customized at instance level, please modify them at"
592
           " cluster level: %s" % utils.CommaJoin(used_globals))
593
    raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
594

    
595

    
596
def _CheckNodeOnline(lu, node):
597
  """Ensure that a given node is online.
598

599
  @param lu: the LU on behalf of which we make the check
600
  @param node: the node to check
601
  @raise errors.OpPrereqError: if the node is offline
602

603
  """
604
  if lu.cfg.GetNodeInfo(node).offline:
605
    raise errors.OpPrereqError("Can't use offline node %s" % node,
606
                               errors.ECODE_INVAL)
607

    
608

    
609
def _CheckNodeNotDrained(lu, node):
610
  """Ensure that a given node is not drained.
611

612
  @param lu: the LU on behalf of which we make the check
613
  @param node: the node to check
614
  @raise errors.OpPrereqError: if the node is drained
615

616
  """
617
  if lu.cfg.GetNodeInfo(node).drained:
618
    raise errors.OpPrereqError("Can't use drained node %s" % node,
619
                               errors.ECODE_INVAL)
620

    
621

    
622
def _CheckNodeHasOS(lu, node, os_name, force_variant):
623
  """Ensure that a node supports a given OS.
624

625
  @param lu: the LU on behalf of which we make the check
626
  @param node: the node to check
627
  @param os_name: the OS to query about
628
  @param force_variant: whether to ignore variant errors
629
  @raise errors.OpPrereqError: if the node is not supporting the OS
630

631
  """
632
  result = lu.rpc.call_os_get(node, os_name)
633
  result.Raise("OS '%s' not in supported OS list for node %s" %
634
               (os_name, node),
635
               prereq=True, ecode=errors.ECODE_INVAL)
636
  if not force_variant:
637
    _CheckOSVariant(result.payload, os_name)
638

    
639

    
640
def _RequireFileStorage():
641
  """Checks that file storage is enabled.
642

643
  @raise errors.OpPrereqError: when file storage is disabled
644

645
  """
646
  if not constants.ENABLE_FILE_STORAGE:
647
    raise errors.OpPrereqError("File storage disabled at configure time",
648
                               errors.ECODE_INVAL)
649

    
650

    
651
def _CheckDiskTemplate(template):
652
  """Ensure a given disk template is valid.
653

654
  """
655
  if template not in constants.DISK_TEMPLATES:
656
    msg = ("Invalid disk template name '%s', valid templates are: %s" %
657
           (template, utils.CommaJoin(constants.DISK_TEMPLATES)))
658
    raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
659
  if template == constants.DT_FILE:
660
    _RequireFileStorage()
661
  return True
662

    
663

    
664
def _CheckStorageType(storage_type):
665
  """Ensure a given storage type is valid.
666

667
  """
668
  if storage_type not in constants.VALID_STORAGE_TYPES:
669
    raise errors.OpPrereqError("Unknown storage type: %s" % storage_type,
670
                               errors.ECODE_INVAL)
671
  if storage_type == constants.ST_FILE:
672
    _RequireFileStorage()
673
  return True
674

    
675

    
676
def _GetClusterDomainSecret():
677
  """Reads the cluster domain secret.
678

679
  """
680
  return utils.ReadOneLineFile(constants.CLUSTER_DOMAIN_SECRET_FILE,
681
                               strict=True)
682

    
683

    
684
def _CheckInstanceDown(lu, instance, reason):
685
  """Ensure that an instance is not running."""
686
  if instance.admin_up:
687
    raise errors.OpPrereqError("Instance %s is marked to be up, %s" %
688
                               (instance.name, reason), errors.ECODE_STATE)
689

    
690
  pnode = instance.primary_node
691
  ins_l = lu.rpc.call_instance_list([pnode], [instance.hypervisor])[pnode]
692
  ins_l.Raise("Can't contact node %s for instance information" % pnode,
693
              prereq=True, ecode=errors.ECODE_ENVIRON)
694

    
695
  if instance.name in ins_l.payload:
696
    raise errors.OpPrereqError("Instance %s is running, %s" %
697
                               (instance.name, reason), errors.ECODE_STATE)
698

    
699

    
700
def _ExpandItemName(fn, name, kind):
701
  """Expand an item name.
702

703
  @param fn: the function to use for expansion
704
  @param name: requested item name
705
  @param kind: text description ('Node' or 'Instance')
706
  @return: the resolved (full) name
707
  @raise errors.OpPrereqError: if the item is not found
708

709
  """
710
  full_name = fn(name)
711
  if full_name is None:
712
    raise errors.OpPrereqError("%s '%s' not known" % (kind, name),
713
                               errors.ECODE_NOENT)
714
  return full_name
715

    
716

    
717
def _ExpandNodeName(cfg, name):
718
  """Wrapper over L{_ExpandItemName} for nodes."""
719
  return _ExpandItemName(cfg.ExpandNodeName, name, "Node")
720

    
721

    
722
def _ExpandInstanceName(cfg, name):
723
  """Wrapper over L{_ExpandItemName} for instance."""
724
  return _ExpandItemName(cfg.ExpandInstanceName, name, "Instance")
725

    
726

    
727
def _BuildInstanceHookEnv(name, primary_node, secondary_nodes, os_type, status,
728
                          memory, vcpus, nics, disk_template, disks,
729
                          bep, hvp, hypervisor_name):
730
  """Builds instance related env variables for hooks
731

732
  This builds the hook environment from individual variables.
733

734
  @type name: string
735
  @param name: the name of the instance
736
  @type primary_node: string
737
  @param primary_node: the name of the instance's primary node
738
  @type secondary_nodes: list
739
  @param secondary_nodes: list of secondary nodes as strings
740
  @type os_type: string
741
  @param os_type: the name of the instance's OS
742
  @type status: boolean
743
  @param status: the should_run status of the instance
744
  @type memory: string
745
  @param memory: the memory size of the instance
746
  @type vcpus: string
747
  @param vcpus: the count of VCPUs the instance has
748
  @type nics: list
749
  @param nics: list of tuples (ip, mac, mode, link) representing
750
      the NICs the instance has
751
  @type disk_template: string
752
  @param disk_template: the disk template of the instance
753
  @type disks: list
754
  @param disks: the list of (size, mode) pairs
755
  @type bep: dict
756
  @param bep: the backend parameters for the instance
757
  @type hvp: dict
758
  @param hvp: the hypervisor parameters for the instance
759
  @type hypervisor_name: string
760
  @param hypervisor_name: the hypervisor for the instance
761
  @rtype: dict
762
  @return: the hook environment for this instance
763

764
  """
765
  if status:
766
    str_status = "up"
767
  else:
768
    str_status = "down"
769
  env = {
770
    "OP_TARGET": name,
771
    "INSTANCE_NAME": name,
772
    "INSTANCE_PRIMARY": primary_node,
773
    "INSTANCE_SECONDARIES": " ".join(secondary_nodes),
774
    "INSTANCE_OS_TYPE": os_type,
775
    "INSTANCE_STATUS": str_status,
776
    "INSTANCE_MEMORY": memory,
777
    "INSTANCE_VCPUS": vcpus,
778
    "INSTANCE_DISK_TEMPLATE": disk_template,
779
    "INSTANCE_HYPERVISOR": hypervisor_name,
780
  }
781

    
782
  if nics:
783
    nic_count = len(nics)
784
    for idx, (ip, mac, mode, link) in enumerate(nics):
785
      if ip is None:
786
        ip = ""
787
      env["INSTANCE_NIC%d_IP" % idx] = ip
788
      env["INSTANCE_NIC%d_MAC" % idx] = mac
789
      env["INSTANCE_NIC%d_MODE" % idx] = mode
790
      env["INSTANCE_NIC%d_LINK" % idx] = link
791
      if mode == constants.NIC_MODE_BRIDGED:
792
        env["INSTANCE_NIC%d_BRIDGE" % idx] = link
793
  else:
794
    nic_count = 0
795

    
796
  env["INSTANCE_NIC_COUNT"] = nic_count
797

    
798
  if disks:
799
    disk_count = len(disks)
800
    for idx, (size, mode) in enumerate(disks):
801
      env["INSTANCE_DISK%d_SIZE" % idx] = size
802
      env["INSTANCE_DISK%d_MODE" % idx] = mode
803
  else:
804
    disk_count = 0
805

    
806
  env["INSTANCE_DISK_COUNT"] = disk_count
807

    
808
  for source, kind in [(bep, "BE"), (hvp, "HV")]:
809
    for key, value in source.items():
810
      env["INSTANCE_%s_%s" % (kind, key)] = value
811

    
812
  return env
813

    
814

    
815
def _NICListToTuple(lu, nics):
816
  """Build a list of nic information tuples.
817

818
  This list is suitable to be passed to _BuildInstanceHookEnv or as a return
819
  value in LUQueryInstanceData.
820

821
  @type lu:  L{LogicalUnit}
822
  @param lu: the logical unit on whose behalf we execute
823
  @type nics: list of L{objects.NIC}
824
  @param nics: list of nics to convert to hooks tuples
825

826
  """
827
  hooks_nics = []
828
  cluster = lu.cfg.GetClusterInfo()
829
  for nic in nics:
830
    ip = nic.ip
831
    mac = nic.mac
832
    filled_params = cluster.SimpleFillNIC(nic.nicparams)
833
    mode = filled_params[constants.NIC_MODE]
834
    link = filled_params[constants.NIC_LINK]
835
    hooks_nics.append((ip, mac, mode, link))
836
  return hooks_nics
837

    
838

    
839
def _BuildInstanceHookEnvByObject(lu, instance, override=None):
840
  """Builds instance related env variables for hooks from an object.
841

842
  @type lu: L{LogicalUnit}
843
  @param lu: the logical unit on whose behalf we execute
844
  @type instance: L{objects.Instance}
845
  @param instance: the instance for which we should build the
846
      environment
847
  @type override: dict
848
  @param override: dictionary with key/values that will override
849
      our values
850
  @rtype: dict
851
  @return: the hook environment dictionary
852

853
  """
854
  cluster = lu.cfg.GetClusterInfo()
855
  bep = cluster.FillBE(instance)
856
  hvp = cluster.FillHV(instance)
857
  args = {
858
    'name': instance.name,
859
    'primary_node': instance.primary_node,
860
    'secondary_nodes': instance.secondary_nodes,
861
    'os_type': instance.os,
862
    'status': instance.admin_up,
863
    'memory': bep[constants.BE_MEMORY],
864
    'vcpus': bep[constants.BE_VCPUS],
865
    'nics': _NICListToTuple(lu, instance.nics),
866
    'disk_template': instance.disk_template,
867
    'disks': [(disk.size, disk.mode) for disk in instance.disks],
868
    'bep': bep,
869
    'hvp': hvp,
870
    'hypervisor_name': instance.hypervisor,
871
  }
872
  if override:
873
    args.update(override)
874
  return _BuildInstanceHookEnv(**args) # pylint: disable-msg=W0142
875

    
876

    
877
def _AdjustCandidatePool(lu, exceptions):
878
  """Adjust the candidate pool after node operations.
879

880
  """
881
  mod_list = lu.cfg.MaintainCandidatePool(exceptions)
882
  if mod_list:
883
    lu.LogInfo("Promoted nodes to master candidate role: %s",
884
               utils.CommaJoin(node.name for node in mod_list))
885
    for name in mod_list:
886
      lu.context.ReaddNode(name)
887
  mc_now, mc_max, _ = lu.cfg.GetMasterCandidateStats(exceptions)
888
  if mc_now > mc_max:
889
    lu.LogInfo("Note: more nodes are candidates (%d) than desired (%d)" %
890
               (mc_now, mc_max))
891

    
892

    
893
def _DecideSelfPromotion(lu, exceptions=None):
894
  """Decide whether I should promote myself as a master candidate.
895

896
  """
897
  cp_size = lu.cfg.GetClusterInfo().candidate_pool_size
898
  mc_now, mc_should, _ = lu.cfg.GetMasterCandidateStats(exceptions)
899
  # the new node will increase mc_max with one, so:
900
  mc_should = min(mc_should + 1, cp_size)
901
  return mc_now < mc_should
902

    
903

    
904
def _CheckNicsBridgesExist(lu, target_nics, target_node):
905
  """Check that the brigdes needed by a list of nics exist.
906

907
  """
908
  cluster = lu.cfg.GetClusterInfo()
909
  paramslist = [cluster.SimpleFillNIC(nic.nicparams) for nic in target_nics]
910
  brlist = [params[constants.NIC_LINK] for params in paramslist
911
            if params[constants.NIC_MODE] == constants.NIC_MODE_BRIDGED]
912
  if brlist:
913
    result = lu.rpc.call_bridges_exist(target_node, brlist)
914
    result.Raise("Error checking bridges on destination node '%s'" %
915
                 target_node, prereq=True, ecode=errors.ECODE_ENVIRON)
916

    
917

    
918
def _CheckInstanceBridgesExist(lu, instance, node=None):
919
  """Check that the brigdes needed by an instance exist.
920

921
  """
922
  if node is None:
923
    node = instance.primary_node
924
  _CheckNicsBridgesExist(lu, instance.nics, node)
925

    
926

    
927
def _CheckOSVariant(os_obj, name):
928
  """Check whether an OS name conforms to the os variants specification.
929

930
  @type os_obj: L{objects.OS}
931
  @param os_obj: OS object to check
932
  @type name: string
933
  @param name: OS name passed by the user, to check for validity
934

935
  """
936
  if not os_obj.supported_variants:
937
    return
938
  variant = objects.OS.GetVariant(name)
939
  if not variant:
940
    raise errors.OpPrereqError("OS name must include a variant",
941
                               errors.ECODE_INVAL)
942

    
943
  if variant not in os_obj.supported_variants:
944
    raise errors.OpPrereqError("Unsupported OS variant", errors.ECODE_INVAL)
945

    
946

    
947
def _GetNodeInstancesInner(cfg, fn):
948
  return [i for i in cfg.GetAllInstancesInfo().values() if fn(i)]
949

    
950

    
951
def _GetNodeInstances(cfg, node_name):
952
  """Returns a list of all primary and secondary instances on a node.
953

954
  """
955

    
956
  return _GetNodeInstancesInner(cfg, lambda inst: node_name in inst.all_nodes)
957

    
958

    
959
def _GetNodePrimaryInstances(cfg, node_name):
960
  """Returns primary instances on a node.
961

962
  """
963
  return _GetNodeInstancesInner(cfg,
964
                                lambda inst: node_name == inst.primary_node)
965

    
966

    
967
def _GetNodeSecondaryInstances(cfg, node_name):
968
  """Returns secondary instances on a node.
969

970
  """
971
  return _GetNodeInstancesInner(cfg,
972
                                lambda inst: node_name in inst.secondary_nodes)
973

    
974

    
975
def _GetStorageTypeArgs(cfg, storage_type):
976
  """Returns the arguments for a storage type.
977

978
  """
979
  # Special case for file storage
980
  if storage_type == constants.ST_FILE:
981
    # storage.FileStorage wants a list of storage directories
982
    return [[cfg.GetFileStorageDir()]]
983

    
984
  return []
985

    
986

    
987
def _FindFaultyInstanceDisks(cfg, rpc, instance, node_name, prereq):
988
  faulty = []
989

    
990
  for dev in instance.disks:
991
    cfg.SetDiskID(dev, node_name)
992

    
993
  result = rpc.call_blockdev_getmirrorstatus(node_name, instance.disks)
994
  result.Raise("Failed to get disk status from node %s" % node_name,
995
               prereq=prereq, ecode=errors.ECODE_ENVIRON)
996

    
997
  for idx, bdev_status in enumerate(result.payload):
998
    if bdev_status and bdev_status.ldisk_status == constants.LDS_FAULTY:
999
      faulty.append(idx)
1000

    
1001
  return faulty
1002

    
1003

    
1004
def _CheckIAllocatorOrNode(lu, iallocator_slot, node_slot):
1005
  """Check the sanity of iallocator and node arguments and use the
1006
  cluster-wide iallocator if appropriate.
1007

1008
  Check that at most one of (iallocator, node) is specified. If none is
1009
  specified, then the LU's opcode's iallocator slot is filled with the
1010
  cluster-wide default iallocator.
1011

1012
  @type iallocator_slot: string
1013
  @param iallocator_slot: the name of the opcode iallocator slot
1014
  @type node_slot: string
1015
  @param node_slot: the name of the opcode target node slot
1016

1017
  """
1018
  node = getattr(lu.op, node_slot, None)
1019
  iallocator = getattr(lu.op, iallocator_slot, None)
1020

    
1021
  if node is not None and iallocator is not None:
1022
    raise errors.OpPrereqError("Do not specify both, iallocator and node.",
1023
                               errors.ECODE_INVAL)
1024
  elif node is None and iallocator is None:
1025
    default_iallocator = lu.cfg.GetDefaultIAllocator()
1026
    if default_iallocator:
1027
      setattr(lu.op, iallocator_slot, default_iallocator)
1028
    else:
1029
      raise errors.OpPrereqError("No iallocator or node given and no"
1030
                                 " cluster-wide default iallocator found."
1031
                                 " Please specify either an iallocator or a"
1032
                                 " node, or set a cluster-wide default"
1033
                                 " iallocator.")
1034

    
1035

    
1036
class LUPostInitCluster(LogicalUnit):
1037
  """Logical unit for running hooks after cluster initialization.
1038

1039
  """
1040
  HPATH = "cluster-init"
1041
  HTYPE = constants.HTYPE_CLUSTER
1042

    
1043
  def BuildHooksEnv(self):
1044
    """Build hooks env.
1045

1046
    """
1047
    env = {"OP_TARGET": self.cfg.GetClusterName()}
1048
    mn = self.cfg.GetMasterNode()
1049
    return env, [], [mn]
1050

    
1051
  def Exec(self, feedback_fn):
1052
    """Nothing to do.
1053

1054
    """
1055
    return True
1056

    
1057

    
1058
class LUDestroyCluster(LogicalUnit):
1059
  """Logical unit for destroying the cluster.
1060

1061
  """
1062
  HPATH = "cluster-destroy"
1063
  HTYPE = constants.HTYPE_CLUSTER
1064

    
1065
  def BuildHooksEnv(self):
1066
    """Build hooks env.
1067

1068
    """
1069
    env = {"OP_TARGET": self.cfg.GetClusterName()}
1070
    return env, [], []
1071

    
1072
  def CheckPrereq(self):
1073
    """Check prerequisites.
1074

1075
    This checks whether the cluster is empty.
1076

1077
    Any errors are signaled by raising errors.OpPrereqError.
1078

1079
    """
1080
    master = self.cfg.GetMasterNode()
1081

    
1082
    nodelist = self.cfg.GetNodeList()
1083
    if len(nodelist) != 1 or nodelist[0] != master:
1084
      raise errors.OpPrereqError("There are still %d node(s) in"
1085
                                 " this cluster." % (len(nodelist) - 1),
1086
                                 errors.ECODE_INVAL)
1087
    instancelist = self.cfg.GetInstanceList()
1088
    if instancelist:
1089
      raise errors.OpPrereqError("There are still %d instance(s) in"
1090
                                 " this cluster." % len(instancelist),
1091
                                 errors.ECODE_INVAL)
1092

    
1093
  def Exec(self, feedback_fn):
1094
    """Destroys the cluster.
1095

1096
    """
1097
    master = self.cfg.GetMasterNode()
1098

    
1099
    # Run post hooks on master node before it's removed
1100
    hm = self.proc.hmclass(self.rpc.call_hooks_runner, self)
1101
    try:
1102
      hm.RunPhase(constants.HOOKS_PHASE_POST, [master])
1103
    except:
1104
      # pylint: disable-msg=W0702
1105
      self.LogWarning("Errors occurred running hooks on %s" % master)
1106

    
1107
    result = self.rpc.call_node_stop_master(master, False)
1108
    result.Raise("Could not disable the master role")
1109

    
1110
    return master
1111

    
1112

    
1113
def _VerifyCertificate(filename):
1114
  """Verifies a certificate for LUVerifyCluster.
1115

1116
  @type filename: string
1117
  @param filename: Path to PEM file
1118

1119
  """
1120
  try:
1121
    cert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM,
1122
                                           utils.ReadFile(filename))
1123
  except Exception, err: # pylint: disable-msg=W0703
1124
    return (LUVerifyCluster.ETYPE_ERROR,
1125
            "Failed to load X509 certificate %s: %s" % (filename, err))
1126

    
1127
  (errcode, msg) = \
1128
    utils.VerifyX509Certificate(cert, constants.SSL_CERT_EXPIRATION_WARN,
1129
                                constants.SSL_CERT_EXPIRATION_ERROR)
1130

    
1131
  if msg:
1132
    fnamemsg = "While verifying %s: %s" % (filename, msg)
1133
  else:
1134
    fnamemsg = None
1135

    
1136
  if errcode is None:
1137
    return (None, fnamemsg)
1138
  elif errcode == utils.CERT_WARNING:
1139
    return (LUVerifyCluster.ETYPE_WARNING, fnamemsg)
1140
  elif errcode == utils.CERT_ERROR:
1141
    return (LUVerifyCluster.ETYPE_ERROR, fnamemsg)
1142

    
1143
  raise errors.ProgrammerError("Unhandled certificate error code %r" % errcode)
1144

    
1145

    
1146
class LUVerifyCluster(LogicalUnit):
1147
  """Verifies the cluster status.
1148

1149
  """
1150
  HPATH = "cluster-verify"
1151
  HTYPE = constants.HTYPE_CLUSTER
1152
  _OP_PARAMS = [
1153
    ("skip_checks", ht.EmptyList,
1154
     ht.TListOf(ht.TElemOf(constants.VERIFY_OPTIONAL_CHECKS))),
1155
    ("verbose", False, ht.TBool),
1156
    ("error_codes", False, ht.TBool),
1157
    ("debug_simulate_errors", False, ht.TBool),
1158
    ]
1159
  REQ_BGL = False
1160

    
1161
  TCLUSTER = "cluster"
1162
  TNODE = "node"
1163
  TINSTANCE = "instance"
1164

    
1165
  ECLUSTERCFG = (TCLUSTER, "ECLUSTERCFG")
1166
  ECLUSTERCERT = (TCLUSTER, "ECLUSTERCERT")
1167
  EINSTANCEBADNODE = (TINSTANCE, "EINSTANCEBADNODE")
1168
  EINSTANCEDOWN = (TINSTANCE, "EINSTANCEDOWN")
1169
  EINSTANCELAYOUT = (TINSTANCE, "EINSTANCELAYOUT")
1170
  EINSTANCEMISSINGDISK = (TINSTANCE, "EINSTANCEMISSINGDISK")
1171
  EINSTANCEMISSINGDISK = (TINSTANCE, "EINSTANCEMISSINGDISK")
1172
  EINSTANCEWRONGNODE = (TINSTANCE, "EINSTANCEWRONGNODE")
1173
  ENODEDRBD = (TNODE, "ENODEDRBD")
1174
  ENODEDRBDHELPER = (TNODE, "ENODEDRBDHELPER")
1175
  ENODEFILECHECK = (TNODE, "ENODEFILECHECK")
1176
  ENODEHOOKS = (TNODE, "ENODEHOOKS")
1177
  ENODEHV = (TNODE, "ENODEHV")
1178
  ENODELVM = (TNODE, "ENODELVM")
1179
  ENODEN1 = (TNODE, "ENODEN1")
1180
  ENODENET = (TNODE, "ENODENET")
1181
  ENODEOS = (TNODE, "ENODEOS")
1182
  ENODEORPHANINSTANCE = (TNODE, "ENODEORPHANINSTANCE")
1183
  ENODEORPHANLV = (TNODE, "ENODEORPHANLV")
1184
  ENODERPC = (TNODE, "ENODERPC")
1185
  ENODESSH = (TNODE, "ENODESSH")
1186
  ENODEVERSION = (TNODE, "ENODEVERSION")
1187
  ENODESETUP = (TNODE, "ENODESETUP")
1188
  ENODETIME = (TNODE, "ENODETIME")
1189

    
1190
  ETYPE_FIELD = "code"
1191
  ETYPE_ERROR = "ERROR"
1192
  ETYPE_WARNING = "WARNING"
1193

    
1194
  class NodeImage(object):
1195
    """A class representing the logical and physical status of a node.
1196

1197
    @type name: string
1198
    @ivar name: the node name to which this object refers
1199
    @ivar volumes: a structure as returned from
1200
        L{ganeti.backend.GetVolumeList} (runtime)
1201
    @ivar instances: a list of running instances (runtime)
1202
    @ivar pinst: list of configured primary instances (config)
1203
    @ivar sinst: list of configured secondary instances (config)
1204
    @ivar sbp: diction of {secondary-node: list of instances} of all peers
1205
        of this node (config)
1206
    @ivar mfree: free memory, as reported by hypervisor (runtime)
1207
    @ivar dfree: free disk, as reported by the node (runtime)
1208
    @ivar offline: the offline status (config)
1209
    @type rpc_fail: boolean
1210
    @ivar rpc_fail: whether the RPC verify call was successfull (overall,
1211
        not whether the individual keys were correct) (runtime)
1212
    @type lvm_fail: boolean
1213
    @ivar lvm_fail: whether the RPC call didn't return valid LVM data
1214
    @type hyp_fail: boolean
1215
    @ivar hyp_fail: whether the RPC call didn't return the instance list
1216
    @type ghost: boolean
1217
    @ivar ghost: whether this is a known node or not (config)
1218
    @type os_fail: boolean
1219
    @ivar os_fail: whether the RPC call didn't return valid OS data
1220
    @type oslist: list
1221
    @ivar oslist: list of OSes as diagnosed by DiagnoseOS
1222

1223
    """
1224
    def __init__(self, offline=False, name=None):
1225
      self.name = name
1226
      self.volumes = {}
1227
      self.instances = []
1228
      self.pinst = []
1229
      self.sinst = []
1230
      self.sbp = {}
1231
      self.mfree = 0
1232
      self.dfree = 0
1233
      self.offline = offline
1234
      self.rpc_fail = False
1235
      self.lvm_fail = False
1236
      self.hyp_fail = False
1237
      self.ghost = False
1238
      self.os_fail = False
1239
      self.oslist = {}
1240

    
1241
  def ExpandNames(self):
1242
    self.needed_locks = {
1243
      locking.LEVEL_NODE: locking.ALL_SET,
1244
      locking.LEVEL_INSTANCE: locking.ALL_SET,
1245
    }
1246
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
1247

    
1248
  def _Error(self, ecode, item, msg, *args, **kwargs):
1249
    """Format an error message.
1250

1251
    Based on the opcode's error_codes parameter, either format a
1252
    parseable error code, or a simpler error string.
1253

1254
    This must be called only from Exec and functions called from Exec.
1255

1256
    """
1257
    ltype = kwargs.get(self.ETYPE_FIELD, self.ETYPE_ERROR)
1258
    itype, etxt = ecode
1259
    # first complete the msg
1260
    if args:
1261
      msg = msg % args
1262
    # then format the whole message
1263
    if self.op.error_codes:
1264
      msg = "%s:%s:%s:%s:%s" % (ltype, etxt, itype, item, msg)
1265
    else:
1266
      if item:
1267
        item = " " + item
1268
      else:
1269
        item = ""
1270
      msg = "%s: %s%s: %s" % (ltype, itype, item, msg)
1271
    # and finally report it via the feedback_fn
1272
    self._feedback_fn("  - %s" % msg)
1273

    
1274
  def _ErrorIf(self, cond, *args, **kwargs):
1275
    """Log an error message if the passed condition is True.
1276

1277
    """
1278
    cond = bool(cond) or self.op.debug_simulate_errors
1279
    if cond:
1280
      self._Error(*args, **kwargs)
1281
    # do not mark the operation as failed for WARN cases only
1282
    if kwargs.get(self.ETYPE_FIELD, self.ETYPE_ERROR) == self.ETYPE_ERROR:
1283
      self.bad = self.bad or cond
1284

    
1285
  def _VerifyNode(self, ninfo, nresult):
1286
    """Perform some basic validation on data returned from a node.
1287

1288
      - check the result data structure is well formed and has all the
1289
        mandatory fields
1290
      - check ganeti version
1291

1292
    @type ninfo: L{objects.Node}
1293
    @param ninfo: the node to check
1294
    @param nresult: the results from the node
1295
    @rtype: boolean
1296
    @return: whether overall this call was successful (and we can expect
1297
         reasonable values in the respose)
1298

1299
    """
1300
    node = ninfo.name
1301
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1302

    
1303
    # main result, nresult should be a non-empty dict
1304
    test = not nresult or not isinstance(nresult, dict)
1305
    _ErrorIf(test, self.ENODERPC, node,
1306
                  "unable to verify node: no data returned")
1307
    if test:
1308
      return False
1309

    
1310
    # compares ganeti version
1311
    local_version = constants.PROTOCOL_VERSION
1312
    remote_version = nresult.get("version", None)
1313
    test = not (remote_version and
1314
                isinstance(remote_version, (list, tuple)) and
1315
                len(remote_version) == 2)
1316
    _ErrorIf(test, self.ENODERPC, node,
1317
             "connection to node returned invalid data")
1318
    if test:
1319
      return False
1320

    
1321
    test = local_version != remote_version[0]
1322
    _ErrorIf(test, self.ENODEVERSION, node,
1323
             "incompatible protocol versions: master %s,"
1324
             " node %s", local_version, remote_version[0])
1325
    if test:
1326
      return False
1327

    
1328
    # node seems compatible, we can actually try to look into its results
1329

    
1330
    # full package version
1331
    self._ErrorIf(constants.RELEASE_VERSION != remote_version[1],
1332
                  self.ENODEVERSION, node,
1333
                  "software version mismatch: master %s, node %s",
1334
                  constants.RELEASE_VERSION, remote_version[1],
1335
                  code=self.ETYPE_WARNING)
1336

    
1337
    hyp_result = nresult.get(constants.NV_HYPERVISOR, None)
1338
    if isinstance(hyp_result, dict):
1339
      for hv_name, hv_result in hyp_result.iteritems():
1340
        test = hv_result is not None
1341
        _ErrorIf(test, self.ENODEHV, node,
1342
                 "hypervisor %s verify failure: '%s'", hv_name, hv_result)
1343

    
1344

    
1345
    test = nresult.get(constants.NV_NODESETUP,
1346
                           ["Missing NODESETUP results"])
1347
    _ErrorIf(test, self.ENODESETUP, node, "node setup error: %s",
1348
             "; ".join(test))
1349

    
1350
    return True
1351

    
1352
  def _VerifyNodeTime(self, ninfo, nresult,
1353
                      nvinfo_starttime, nvinfo_endtime):
1354
    """Check the node time.
1355

1356
    @type ninfo: L{objects.Node}
1357
    @param ninfo: the node to check
1358
    @param nresult: the remote results for the node
1359
    @param nvinfo_starttime: the start time of the RPC call
1360
    @param nvinfo_endtime: the end time of the RPC call
1361

1362
    """
1363
    node = ninfo.name
1364
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1365

    
1366
    ntime = nresult.get(constants.NV_TIME, None)
1367
    try:
1368
      ntime_merged = utils.MergeTime(ntime)
1369
    except (ValueError, TypeError):
1370
      _ErrorIf(True, self.ENODETIME, node, "Node returned invalid time")
1371
      return
1372

    
1373
    if ntime_merged < (nvinfo_starttime - constants.NODE_MAX_CLOCK_SKEW):
1374
      ntime_diff = "%.01fs" % abs(nvinfo_starttime - ntime_merged)
1375
    elif ntime_merged > (nvinfo_endtime + constants.NODE_MAX_CLOCK_SKEW):
1376
      ntime_diff = "%.01fs" % abs(ntime_merged - nvinfo_endtime)
1377
    else:
1378
      ntime_diff = None
1379

    
1380
    _ErrorIf(ntime_diff is not None, self.ENODETIME, node,
1381
             "Node time diverges by at least %s from master node time",
1382
             ntime_diff)
1383

    
1384
  def _VerifyNodeLVM(self, ninfo, nresult, vg_name):
1385
    """Check the node time.
1386

1387
    @type ninfo: L{objects.Node}
1388
    @param ninfo: the node to check
1389
    @param nresult: the remote results for the node
1390
    @param vg_name: the configured VG name
1391

1392
    """
1393
    if vg_name is None:
1394
      return
1395

    
1396
    node = ninfo.name
1397
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1398

    
1399
    # checks vg existence and size > 20G
1400
    vglist = nresult.get(constants.NV_VGLIST, None)
1401
    test = not vglist
1402
    _ErrorIf(test, self.ENODELVM, node, "unable to check volume groups")
1403
    if not test:
1404
      vgstatus = utils.CheckVolumeGroupSize(vglist, vg_name,
1405
                                            constants.MIN_VG_SIZE)
1406
      _ErrorIf(vgstatus, self.ENODELVM, node, vgstatus)
1407

    
1408
    # check pv names
1409
    pvlist = nresult.get(constants.NV_PVLIST, None)
1410
    test = pvlist is None
1411
    _ErrorIf(test, self.ENODELVM, node, "Can't get PV list from node")
1412
    if not test:
1413
      # check that ':' is not present in PV names, since it's a
1414
      # special character for lvcreate (denotes the range of PEs to
1415
      # use on the PV)
1416
      for _, pvname, owner_vg in pvlist:
1417
        test = ":" in pvname
1418
        _ErrorIf(test, self.ENODELVM, node, "Invalid character ':' in PV"
1419
                 " '%s' of VG '%s'", pvname, owner_vg)
1420

    
1421
  def _VerifyNodeNetwork(self, ninfo, nresult):
1422
    """Check the node time.
1423

1424
    @type ninfo: L{objects.Node}
1425
    @param ninfo: the node to check
1426
    @param nresult: the remote results for the node
1427

1428
    """
1429
    node = ninfo.name
1430
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1431

    
1432
    test = constants.NV_NODELIST not in nresult
1433
    _ErrorIf(test, self.ENODESSH, node,
1434
             "node hasn't returned node ssh connectivity data")
1435
    if not test:
1436
      if nresult[constants.NV_NODELIST]:
1437
        for a_node, a_msg in nresult[constants.NV_NODELIST].items():
1438
          _ErrorIf(True, self.ENODESSH, node,
1439
                   "ssh communication with node '%s': %s", a_node, a_msg)
1440

    
1441
    test = constants.NV_NODENETTEST not in nresult
1442
    _ErrorIf(test, self.ENODENET, node,
1443
             "node hasn't returned node tcp connectivity data")
1444
    if not test:
1445
      if nresult[constants.NV_NODENETTEST]:
1446
        nlist = utils.NiceSort(nresult[constants.NV_NODENETTEST].keys())
1447
        for anode in nlist:
1448
          _ErrorIf(True, self.ENODENET, node,
1449
                   "tcp communication with node '%s': %s",
1450
                   anode, nresult[constants.NV_NODENETTEST][anode])
1451

    
1452
    test = constants.NV_MASTERIP not in nresult
1453
    _ErrorIf(test, self.ENODENET, node,
1454
             "node hasn't returned node master IP reachability data")
1455
    if not test:
1456
      if not nresult[constants.NV_MASTERIP]:
1457
        if node == self.master_node:
1458
          msg = "the master node cannot reach the master IP (not configured?)"
1459
        else:
1460
          msg = "cannot reach the master IP"
1461
        _ErrorIf(True, self.ENODENET, node, msg)
1462

    
1463

    
1464
  def _VerifyInstance(self, instance, instanceconfig, node_image):
1465
    """Verify an instance.
1466

1467
    This function checks to see if the required block devices are
1468
    available on the instance's node.
1469

1470
    """
1471
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1472
    node_current = instanceconfig.primary_node
1473

    
1474
    node_vol_should = {}
1475
    instanceconfig.MapLVsByNode(node_vol_should)
1476

    
1477
    for node in node_vol_should:
1478
      n_img = node_image[node]
1479
      if n_img.offline or n_img.rpc_fail or n_img.lvm_fail:
1480
        # ignore missing volumes on offline or broken nodes
1481
        continue
1482
      for volume in node_vol_should[node]:
1483
        test = volume not in n_img.volumes
1484
        _ErrorIf(test, self.EINSTANCEMISSINGDISK, instance,
1485
                 "volume %s missing on node %s", volume, node)
1486

    
1487
    if instanceconfig.admin_up:
1488
      pri_img = node_image[node_current]
1489
      test = instance not in pri_img.instances and not pri_img.offline
1490
      _ErrorIf(test, self.EINSTANCEDOWN, instance,
1491
               "instance not running on its primary node %s",
1492
               node_current)
1493

    
1494
    for node, n_img in node_image.items():
1495
      if (not node == node_current):
1496
        test = instance in n_img.instances
1497
        _ErrorIf(test, self.EINSTANCEWRONGNODE, instance,
1498
                 "instance should not run on node %s", node)
1499

    
1500
  def _VerifyOrphanVolumes(self, node_vol_should, node_image, reserved):
1501
    """Verify if there are any unknown volumes in the cluster.
1502

1503
    The .os, .swap and backup volumes are ignored. All other volumes are
1504
    reported as unknown.
1505

1506
    @type reserved: L{ganeti.utils.FieldSet}
1507
    @param reserved: a FieldSet of reserved volume names
1508

1509
    """
1510
    for node, n_img in node_image.items():
1511
      if n_img.offline or n_img.rpc_fail or n_img.lvm_fail:
1512
        # skip non-healthy nodes
1513
        continue
1514
      for volume in n_img.volumes:
1515
        test = ((node not in node_vol_should or
1516
                volume not in node_vol_should[node]) and
1517
                not reserved.Matches(volume))
1518
        self._ErrorIf(test, self.ENODEORPHANLV, node,
1519
                      "volume %s is unknown", volume)
1520

    
1521
  def _VerifyOrphanInstances(self, instancelist, node_image):
1522
    """Verify the list of running instances.
1523

1524
    This checks what instances are running but unknown to the cluster.
1525

1526
    """
1527
    for node, n_img in node_image.items():
1528
      for o_inst in n_img.instances:
1529
        test = o_inst not in instancelist
1530
        self._ErrorIf(test, self.ENODEORPHANINSTANCE, node,
1531
                      "instance %s on node %s should not exist", o_inst, node)
1532

    
1533
  def _VerifyNPlusOneMemory(self, node_image, instance_cfg):
1534
    """Verify N+1 Memory Resilience.
1535

1536
    Check that if one single node dies we can still start all the
1537
    instances it was primary for.
1538

1539
    """
1540
    for node, n_img in node_image.items():
1541
      # This code checks that every node which is now listed as
1542
      # secondary has enough memory to host all instances it is
1543
      # supposed to should a single other node in the cluster fail.
1544
      # FIXME: not ready for failover to an arbitrary node
1545
      # FIXME: does not support file-backed instances
1546
      # WARNING: we currently take into account down instances as well
1547
      # as up ones, considering that even if they're down someone
1548
      # might want to start them even in the event of a node failure.
1549
      for prinode, instances in n_img.sbp.items():
1550
        needed_mem = 0
1551
        for instance in instances:
1552
          bep = self.cfg.GetClusterInfo().FillBE(instance_cfg[instance])
1553
          if bep[constants.BE_AUTO_BALANCE]:
1554
            needed_mem += bep[constants.BE_MEMORY]
1555
        test = n_img.mfree < needed_mem
1556
        self._ErrorIf(test, self.ENODEN1, node,
1557
                      "not enough memory on to accommodate"
1558
                      " failovers should peer node %s fail", prinode)
1559

    
1560
  def _VerifyNodeFiles(self, ninfo, nresult, file_list, local_cksum,
1561
                       master_files):
1562
    """Verifies and computes the node required file checksums.
1563

1564
    @type ninfo: L{objects.Node}
1565
    @param ninfo: the node to check
1566
    @param nresult: the remote results for the node
1567
    @param file_list: required list of files
1568
    @param local_cksum: dictionary of local files and their checksums
1569
    @param master_files: list of files that only masters should have
1570

1571
    """
1572
    node = ninfo.name
1573
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1574

    
1575
    remote_cksum = nresult.get(constants.NV_FILELIST, None)
1576
    test = not isinstance(remote_cksum, dict)
1577
    _ErrorIf(test, self.ENODEFILECHECK, node,
1578
             "node hasn't returned file checksum data")
1579
    if test:
1580
      return
1581

    
1582
    for file_name in file_list:
1583
      node_is_mc = ninfo.master_candidate
1584
      must_have = (file_name not in master_files) or node_is_mc
1585
      # missing
1586
      test1 = file_name not in remote_cksum
1587
      # invalid checksum
1588
      test2 = not test1 and remote_cksum[file_name] != local_cksum[file_name]
1589
      # existing and good
1590
      test3 = not test1 and remote_cksum[file_name] == local_cksum[file_name]
1591
      _ErrorIf(test1 and must_have, self.ENODEFILECHECK, node,
1592
               "file '%s' missing", file_name)
1593
      _ErrorIf(test2 and must_have, self.ENODEFILECHECK, node,
1594
               "file '%s' has wrong checksum", file_name)
1595
      # not candidate and this is not a must-have file
1596
      _ErrorIf(test2 and not must_have, self.ENODEFILECHECK, node,
1597
               "file '%s' should not exist on non master"
1598
               " candidates (and the file is outdated)", file_name)
1599
      # all good, except non-master/non-must have combination
1600
      _ErrorIf(test3 and not must_have, self.ENODEFILECHECK, node,
1601
               "file '%s' should not exist"
1602
               " on non master candidates", file_name)
1603

    
1604
  def _VerifyNodeDrbd(self, ninfo, nresult, instanceinfo, drbd_helper,
1605
                      drbd_map):
1606
    """Verifies and the node DRBD status.
1607

1608
    @type ninfo: L{objects.Node}
1609
    @param ninfo: the node to check
1610
    @param nresult: the remote results for the node
1611
    @param instanceinfo: the dict of instances
1612
    @param drbd_helper: the configured DRBD usermode helper
1613
    @param drbd_map: the DRBD map as returned by
1614
        L{ganeti.config.ConfigWriter.ComputeDRBDMap}
1615

1616
    """
1617
    node = ninfo.name
1618
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1619

    
1620
    if drbd_helper:
1621
      helper_result = nresult.get(constants.NV_DRBDHELPER, None)
1622
      test = (helper_result == None)
1623
      _ErrorIf(test, self.ENODEDRBDHELPER, node,
1624
               "no drbd usermode helper returned")
1625
      if helper_result:
1626
        status, payload = helper_result
1627
        test = not status
1628
        _ErrorIf(test, self.ENODEDRBDHELPER, node,
1629
                 "drbd usermode helper check unsuccessful: %s", payload)
1630
        test = status and (payload != drbd_helper)
1631
        _ErrorIf(test, self.ENODEDRBDHELPER, node,
1632
                 "wrong drbd usermode helper: %s", payload)
1633

    
1634
    # compute the DRBD minors
1635
    node_drbd = {}
1636
    for minor, instance in drbd_map[node].items():
1637
      test = instance not in instanceinfo
1638
      _ErrorIf(test, self.ECLUSTERCFG, None,
1639
               "ghost instance '%s' in temporary DRBD map", instance)
1640
        # ghost instance should not be running, but otherwise we
1641
        # don't give double warnings (both ghost instance and
1642
        # unallocated minor in use)
1643
      if test:
1644
        node_drbd[minor] = (instance, False)
1645
      else:
1646
        instance = instanceinfo[instance]
1647
        node_drbd[minor] = (instance.name, instance.admin_up)
1648

    
1649
    # and now check them
1650
    used_minors = nresult.get(constants.NV_DRBDLIST, [])
1651
    test = not isinstance(used_minors, (tuple, list))
1652
    _ErrorIf(test, self.ENODEDRBD, node,
1653
             "cannot parse drbd status file: %s", str(used_minors))
1654
    if test:
1655
      # we cannot check drbd status
1656
      return
1657

    
1658
    for minor, (iname, must_exist) in node_drbd.items():
1659
      test = minor not in used_minors and must_exist
1660
      _ErrorIf(test, self.ENODEDRBD, node,
1661
               "drbd minor %d of instance %s is not active", minor, iname)
1662
    for minor in used_minors:
1663
      test = minor not in node_drbd
1664
      _ErrorIf(test, self.ENODEDRBD, node,
1665
               "unallocated drbd minor %d is in use", minor)
1666

    
1667
  def _UpdateNodeOS(self, ninfo, nresult, nimg):
1668
    """Builds the node OS structures.
1669

1670
    @type ninfo: L{objects.Node}
1671
    @param ninfo: the node to check
1672
    @param nresult: the remote results for the node
1673
    @param nimg: the node image object
1674

1675
    """
1676
    node = ninfo.name
1677
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1678

    
1679
    remote_os = nresult.get(constants.NV_OSLIST, None)
1680
    test = (not isinstance(remote_os, list) or
1681
            not compat.all(isinstance(v, list) and len(v) == 7
1682
                           for v in remote_os))
1683

    
1684
    _ErrorIf(test, self.ENODEOS, node,
1685
             "node hasn't returned valid OS data")
1686

    
1687
    nimg.os_fail = test
1688

    
1689
    if test:
1690
      return
1691

    
1692
    os_dict = {}
1693

    
1694
    for (name, os_path, status, diagnose,
1695
         variants, parameters, api_ver) in nresult[constants.NV_OSLIST]:
1696

    
1697
      if name not in os_dict:
1698
        os_dict[name] = []
1699

    
1700
      # parameters is a list of lists instead of list of tuples due to
1701
      # JSON lacking a real tuple type, fix it:
1702
      parameters = [tuple(v) for v in parameters]
1703
      os_dict[name].append((os_path, status, diagnose,
1704
                            set(variants), set(parameters), set(api_ver)))
1705

    
1706
    nimg.oslist = os_dict
1707

    
1708
  def _VerifyNodeOS(self, ninfo, nimg, base):
1709
    """Verifies the node OS list.
1710

1711
    @type ninfo: L{objects.Node}
1712
    @param ninfo: the node to check
1713
    @param nimg: the node image object
1714
    @param base: the 'template' node we match against (e.g. from the master)
1715

1716
    """
1717
    node = ninfo.name
1718
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1719

    
1720
    assert not nimg.os_fail, "Entered _VerifyNodeOS with failed OS rpc?"
1721

    
1722
    for os_name, os_data in nimg.oslist.items():
1723
      assert os_data, "Empty OS status for OS %s?!" % os_name
1724
      f_path, f_status, f_diag, f_var, f_param, f_api = os_data[0]
1725
      _ErrorIf(not f_status, self.ENODEOS, node,
1726
               "Invalid OS %s (located at %s): %s", os_name, f_path, f_diag)
1727
      _ErrorIf(len(os_data) > 1, self.ENODEOS, node,
1728
               "OS '%s' has multiple entries (first one shadows the rest): %s",
1729
               os_name, utils.CommaJoin([v[0] for v in os_data]))
1730
      # this will catched in backend too
1731
      _ErrorIf(compat.any(v >= constants.OS_API_V15 for v in f_api)
1732
               and not f_var, self.ENODEOS, node,
1733
               "OS %s with API at least %d does not declare any variant",
1734
               os_name, constants.OS_API_V15)
1735
      # comparisons with the 'base' image
1736
      test = os_name not in base.oslist
1737
      _ErrorIf(test, self.ENODEOS, node,
1738
               "Extra OS %s not present on reference node (%s)",
1739
               os_name, base.name)
1740
      if test:
1741
        continue
1742
      assert base.oslist[os_name], "Base node has empty OS status?"
1743
      _, b_status, _, b_var, b_param, b_api = base.oslist[os_name][0]
1744
      if not b_status:
1745
        # base OS is invalid, skipping
1746
        continue
1747
      for kind, a, b in [("API version", f_api, b_api),
1748
                         ("variants list", f_var, b_var),
1749
                         ("parameters", f_param, b_param)]:
1750
        _ErrorIf(a != b, self.ENODEOS, node,
1751
                 "OS %s %s differs from reference node %s: %s vs. %s",
1752
                 kind, os_name, base.name,
1753
                 utils.CommaJoin(a), utils.CommaJoin(b))
1754

    
1755
    # check any missing OSes
1756
    missing = set(base.oslist.keys()).difference(nimg.oslist.keys())
1757
    _ErrorIf(missing, self.ENODEOS, node,
1758
             "OSes present on reference node %s but missing on this node: %s",
1759
             base.name, utils.CommaJoin(missing))
1760

    
1761
  def _UpdateNodeVolumes(self, ninfo, nresult, nimg, vg_name):
1762
    """Verifies and updates the node volume data.
1763

1764
    This function will update a L{NodeImage}'s internal structures
1765
    with data from the remote call.
1766

1767
    @type ninfo: L{objects.Node}
1768
    @param ninfo: the node to check
1769
    @param nresult: the remote results for the node
1770
    @param nimg: the node image object
1771
    @param vg_name: the configured VG name
1772

1773
    """
1774
    node = ninfo.name
1775
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1776

    
1777
    nimg.lvm_fail = True
1778
    lvdata = nresult.get(constants.NV_LVLIST, "Missing LV data")
1779
    if vg_name is None:
1780
      pass
1781
    elif isinstance(lvdata, basestring):
1782
      _ErrorIf(True, self.ENODELVM, node, "LVM problem on node: %s",
1783
               utils.SafeEncode(lvdata))
1784
    elif not isinstance(lvdata, dict):
1785
      _ErrorIf(True, self.ENODELVM, node, "rpc call to node failed (lvlist)")
1786
    else:
1787
      nimg.volumes = lvdata
1788
      nimg.lvm_fail = False
1789

    
1790
  def _UpdateNodeInstances(self, ninfo, nresult, nimg):
1791
    """Verifies and updates the node instance list.
1792

1793
    If the listing was successful, then updates this node's instance
1794
    list. Otherwise, it marks the RPC call as failed for the instance
1795
    list key.
1796

1797
    @type ninfo: L{objects.Node}
1798
    @param ninfo: the node to check
1799
    @param nresult: the remote results for the node
1800
    @param nimg: the node image object
1801

1802
    """
1803
    idata = nresult.get(constants.NV_INSTANCELIST, None)
1804
    test = not isinstance(idata, list)
1805
    self._ErrorIf(test, self.ENODEHV, ninfo.name, "rpc call to node failed"
1806
                  " (instancelist): %s", utils.SafeEncode(str(idata)))
1807
    if test:
1808
      nimg.hyp_fail = True
1809
    else:
1810
      nimg.instances = idata
1811

    
1812
  def _UpdateNodeInfo(self, ninfo, nresult, nimg, vg_name):
1813
    """Verifies and computes a node information map
1814

1815
    @type ninfo: L{objects.Node}
1816
    @param ninfo: the node to check
1817
    @param nresult: the remote results for the node
1818
    @param nimg: the node image object
1819
    @param vg_name: the configured VG name
1820

1821
    """
1822
    node = ninfo.name
1823
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1824

    
1825
    # try to read free memory (from the hypervisor)
1826
    hv_info = nresult.get(constants.NV_HVINFO, None)
1827
    test = not isinstance(hv_info, dict) or "memory_free" not in hv_info
1828
    _ErrorIf(test, self.ENODEHV, node, "rpc call to node failed (hvinfo)")
1829
    if not test:
1830
      try:
1831
        nimg.mfree = int(hv_info["memory_free"])
1832
      except (ValueError, TypeError):
1833
        _ErrorIf(True, self.ENODERPC, node,
1834
                 "node returned invalid nodeinfo, check hypervisor")
1835

    
1836
    # FIXME: devise a free space model for file based instances as well
1837
    if vg_name is not None:
1838
      test = (constants.NV_VGLIST not in nresult or
1839
              vg_name not in nresult[constants.NV_VGLIST])
1840
      _ErrorIf(test, self.ENODELVM, node,
1841
               "node didn't return data for the volume group '%s'"
1842
               " - it is either missing or broken", vg_name)
1843
      if not test:
1844
        try:
1845
          nimg.dfree = int(nresult[constants.NV_VGLIST][vg_name])
1846
        except (ValueError, TypeError):
1847
          _ErrorIf(True, self.ENODERPC, node,
1848
                   "node returned invalid LVM info, check LVM status")
1849

    
1850
  def BuildHooksEnv(self):
1851
    """Build hooks env.
1852

1853
    Cluster-Verify hooks just ran in the post phase and their failure makes
1854
    the output be logged in the verify output and the verification to fail.
1855

1856
    """
1857
    all_nodes = self.cfg.GetNodeList()
1858
    env = {
1859
      "CLUSTER_TAGS": " ".join(self.cfg.GetClusterInfo().GetTags())
1860
      }
1861
    for node in self.cfg.GetAllNodesInfo().values():
1862
      env["NODE_TAGS_%s" % node.name] = " ".join(node.GetTags())
1863

    
1864
    return env, [], all_nodes
1865

    
1866
  def Exec(self, feedback_fn):
1867
    """Verify integrity of cluster, performing various test on nodes.
1868

1869
    """
1870
    self.bad = False
1871
    _ErrorIf = self._ErrorIf # pylint: disable-msg=C0103
1872
    verbose = self.op.verbose
1873
    self._feedback_fn = feedback_fn
1874
    feedback_fn("* Verifying global settings")
1875
    for msg in self.cfg.VerifyConfig():
1876
      _ErrorIf(True, self.ECLUSTERCFG, None, msg)
1877

    
1878
    # Check the cluster certificates
1879
    for cert_filename in constants.ALL_CERT_FILES:
1880
      (errcode, msg) = _VerifyCertificate(cert_filename)
1881
      _ErrorIf(errcode, self.ECLUSTERCERT, None, msg, code=errcode)
1882

    
1883
    vg_name = self.cfg.GetVGName()
1884
    drbd_helper = self.cfg.GetDRBDHelper()
1885
    hypervisors = self.cfg.GetClusterInfo().enabled_hypervisors
1886
    cluster = self.cfg.GetClusterInfo()
1887
    nodelist = utils.NiceSort(self.cfg.GetNodeList())
1888
    nodeinfo = [self.cfg.GetNodeInfo(nname) for nname in nodelist]
1889
    instancelist = utils.NiceSort(self.cfg.GetInstanceList())
1890
    instanceinfo = dict((iname, self.cfg.GetInstanceInfo(iname))
1891
                        for iname in instancelist)
1892
    i_non_redundant = [] # Non redundant instances
1893
    i_non_a_balanced = [] # Non auto-balanced instances
1894
    n_offline = 0 # Count of offline nodes
1895
    n_drained = 0 # Count of nodes being drained
1896
    node_vol_should = {}
1897

    
1898
    # FIXME: verify OS list
1899
    # do local checksums
1900
    master_files = [constants.CLUSTER_CONF_FILE]
1901
    master_node = self.master_node = self.cfg.GetMasterNode()
1902
    master_ip = self.cfg.GetMasterIP()
1903

    
1904
    file_names = ssconf.SimpleStore().GetFileList()
1905
    file_names.extend(constants.ALL_CERT_FILES)
1906
    file_names.extend(master_files)
1907
    if cluster.modify_etc_hosts:
1908
      file_names.append(constants.ETC_HOSTS)
1909

    
1910
    local_checksums = utils.FingerprintFiles(file_names)
1911

    
1912
    feedback_fn("* Gathering data (%d nodes)" % len(nodelist))
1913
    node_verify_param = {
1914
      constants.NV_FILELIST: file_names,
1915
      constants.NV_NODELIST: [node.name for node in nodeinfo
1916
                              if not node.offline],
1917
      constants.NV_HYPERVISOR: hypervisors,
1918
      constants.NV_NODENETTEST: [(node.name, node.primary_ip,
1919
                                  node.secondary_ip) for node in nodeinfo
1920
                                 if not node.offline],
1921
      constants.NV_INSTANCELIST: hypervisors,
1922
      constants.NV_VERSION: None,
1923
      constants.NV_HVINFO: self.cfg.GetHypervisorType(),
1924
      constants.NV_NODESETUP: None,
1925
      constants.NV_TIME: None,
1926
      constants.NV_MASTERIP: (master_node, master_ip),
1927
      constants.NV_OSLIST: None,
1928
      }
1929

    
1930
    if vg_name is not None:
1931
      node_verify_param[constants.NV_VGLIST] = None
1932
      node_verify_param[constants.NV_LVLIST] = vg_name
1933
      node_verify_param[constants.NV_PVLIST] = [vg_name]
1934
      node_verify_param[constants.NV_DRBDLIST] = None
1935

    
1936
    if drbd_helper:
1937
      node_verify_param[constants.NV_DRBDHELPER] = drbd_helper
1938

    
1939
    # Build our expected cluster state
1940
    node_image = dict((node.name, self.NodeImage(offline=node.offline,
1941
                                                 name=node.name))
1942
                      for node in nodeinfo)
1943

    
1944
    for instance in instancelist:
1945
      inst_config = instanceinfo[instance]
1946

    
1947
      for nname in inst_config.all_nodes:
1948
        if nname not in node_image:
1949
          # ghost node
1950
          gnode = self.NodeImage(name=nname)
1951
          gnode.ghost = True
1952
          node_image[nname] = gnode
1953

    
1954
      inst_config.MapLVsByNode(node_vol_should)
1955

    
1956
      pnode = inst_config.primary_node
1957
      node_image[pnode].pinst.append(instance)
1958

    
1959
      for snode in inst_config.secondary_nodes:
1960
        nimg = node_image[snode]
1961
        nimg.sinst.append(instance)
1962
        if pnode not in nimg.sbp:
1963
          nimg.sbp[pnode] = []
1964
        nimg.sbp[pnode].append(instance)
1965

    
1966
    # At this point, we have the in-memory data structures complete,
1967
    # except for the runtime information, which we'll gather next
1968

    
1969
    # Due to the way our RPC system works, exact response times cannot be
1970
    # guaranteed (e.g. a broken node could run into a timeout). By keeping the
1971
    # time before and after executing the request, we can at least have a time
1972
    # window.
1973
    nvinfo_starttime = time.time()
1974
    all_nvinfo = self.rpc.call_node_verify(nodelist, node_verify_param,
1975
                                           self.cfg.GetClusterName())
1976
    nvinfo_endtime = time.time()
1977

    
1978
    all_drbd_map = self.cfg.ComputeDRBDMap()
1979

    
1980
    feedback_fn("* Verifying node status")
1981

    
1982
    refos_img = None
1983

    
1984
    for node_i in nodeinfo:
1985
      node = node_i.name
1986
      nimg = node_image[node]
1987

    
1988
      if node_i.offline:
1989
        if verbose:
1990
          feedback_fn("* Skipping offline node %s" % (node,))
1991
        n_offline += 1
1992
        continue
1993

    
1994
      if node == master_node:
1995
        ntype = "master"
1996
      elif node_i.master_candidate:
1997
        ntype = "master candidate"
1998
      elif node_i.drained:
1999
        ntype = "drained"
2000
        n_drained += 1
2001
      else:
2002
        ntype = "regular"
2003
      if verbose:
2004
        feedback_fn("* Verifying node %s (%s)" % (node, ntype))
2005

    
2006
      msg = all_nvinfo[node].fail_msg
2007
      _ErrorIf(msg, self.ENODERPC, node, "while contacting node: %s", msg)
2008
      if msg:
2009
        nimg.rpc_fail = True
2010
        continue
2011

    
2012
      nresult = all_nvinfo[node].payload
2013

    
2014
      nimg.call_ok = self._VerifyNode(node_i, nresult)
2015
      self._VerifyNodeNetwork(node_i, nresult)
2016
      self._VerifyNodeLVM(node_i, nresult, vg_name)
2017
      self._VerifyNodeFiles(node_i, nresult, file_names, local_checksums,
2018
                            master_files)
2019
      self._VerifyNodeDrbd(node_i, nresult, instanceinfo, drbd_helper,
2020
                           all_drbd_map)
2021
      self._VerifyNodeTime(node_i, nresult, nvinfo_starttime, nvinfo_endtime)
2022

    
2023
      self._UpdateNodeVolumes(node_i, nresult, nimg, vg_name)
2024
      self._UpdateNodeInstances(node_i, nresult, nimg)
2025
      self._UpdateNodeInfo(node_i, nresult, nimg, vg_name)
2026
      self._UpdateNodeOS(node_i, nresult, nimg)
2027
      if not nimg.os_fail:
2028
        if refos_img is None:
2029
          refos_img = nimg
2030
        self._VerifyNodeOS(node_i, nimg, refos_img)
2031

    
2032
    feedback_fn("* Verifying instance status")
2033
    for instance in instancelist:
2034
      if verbose:
2035
        feedback_fn("* Verifying instance %s" % instance)
2036
      inst_config = instanceinfo[instance]
2037
      self._VerifyInstance(instance, inst_config, node_image)
2038
      inst_nodes_offline = []
2039

    
2040
      pnode = inst_config.primary_node
2041
      pnode_img = node_image[pnode]
2042
      _ErrorIf(pnode_img.rpc_fail and not pnode_img.offline,
2043
               self.ENODERPC, pnode, "instance %s, connection to"
2044
               " primary node failed", instance)
2045

    
2046
      if pnode_img.offline:
2047
        inst_nodes_offline.append(pnode)
2048

    
2049
      # If the instance is non-redundant we cannot survive losing its primary
2050
      # node, so we are not N+1 compliant. On the other hand we have no disk
2051
      # templates with more than one secondary so that situation is not well
2052
      # supported either.
2053
      # FIXME: does not support file-backed instances
2054
      if not inst_config.secondary_nodes:
2055
        i_non_redundant.append(instance)
2056
      _ErrorIf(len(inst_config.secondary_nodes) > 1, self.EINSTANCELAYOUT,
2057
               instance, "instance has multiple secondary nodes: %s",
2058
               utils.CommaJoin(inst_config.secondary_nodes),
2059
               code=self.ETYPE_WARNING)
2060

    
2061
      if not cluster.FillBE(inst_config)[constants.BE_AUTO_BALANCE]:
2062
        i_non_a_balanced.append(instance)
2063

    
2064
      for snode in inst_config.secondary_nodes:
2065
        s_img = node_image[snode]
2066
        _ErrorIf(s_img.rpc_fail and not s_img.offline, self.ENODERPC, snode,
2067
                 "instance %s, connection to secondary node failed", instance)
2068

    
2069
        if s_img.offline:
2070
          inst_nodes_offline.append(snode)
2071

    
2072
      # warn that the instance lives on offline nodes
2073
      _ErrorIf(inst_nodes_offline, self.EINSTANCEBADNODE, instance,
2074
               "instance lives on offline node(s) %s",
2075
               utils.CommaJoin(inst_nodes_offline))
2076
      # ... or ghost nodes
2077
      for node in inst_config.all_nodes:
2078
        _ErrorIf(node_image[node].ghost, self.EINSTANCEBADNODE, instance,
2079
                 "instance lives on ghost node %s", node)
2080

    
2081
    feedback_fn("* Verifying orphan volumes")
2082
    reserved = utils.FieldSet(*cluster.reserved_lvs)
2083
    self._VerifyOrphanVolumes(node_vol_should, node_image, reserved)
2084

    
2085
    feedback_fn("* Verifying orphan instances")
2086
    self._VerifyOrphanInstances(instancelist, node_image)
2087

    
2088
    if constants.VERIFY_NPLUSONE_MEM not in self.op.skip_checks:
2089
      feedback_fn("* Verifying N+1 Memory redundancy")
2090
      self._VerifyNPlusOneMemory(node_image, instanceinfo)
2091

    
2092
    feedback_fn("* Other Notes")
2093
    if i_non_redundant:
2094
      feedback_fn("  - NOTICE: %d non-redundant instance(s) found."
2095
                  % len(i_non_redundant))
2096

    
2097
    if i_non_a_balanced:
2098
      feedback_fn("  - NOTICE: %d non-auto-balanced instance(s) found."
2099
                  % len(i_non_a_balanced))
2100

    
2101
    if n_offline:
2102
      feedback_fn("  - NOTICE: %d offline node(s) found." % n_offline)
2103

    
2104
    if n_drained:
2105
      feedback_fn("  - NOTICE: %d drained node(s) found." % n_drained)
2106

    
2107
    return not self.bad
2108

    
2109
  def HooksCallBack(self, phase, hooks_results, feedback_fn, lu_result):
2110
    """Analyze the post-hooks' result
2111

2112
    This method analyses the hook result, handles it, and sends some
2113
    nicely-formatted feedback back to the user.
2114

2115
    @param phase: one of L{constants.HOOKS_PHASE_POST} or
2116
        L{constants.HOOKS_PHASE_PRE}; it denotes the hooks phase
2117
    @param hooks_results: the results of the multi-node hooks rpc call
2118
    @param feedback_fn: function used send feedback back to the caller
2119
    @param lu_result: previous Exec result
2120
    @return: the new Exec result, based on the previous result
2121
        and hook results
2122

2123
    """
2124
    # We only really run POST phase hooks, and are only interested in
2125
    # their results
2126
    if phase == constants.HOOKS_PHASE_POST:
2127
      # Used to change hooks' output to proper indentation
2128
      indent_re = re.compile('^', re.M)
2129
      feedback_fn("* Hooks Results")
2130
      assert hooks_results, "invalid result from hooks"
2131

    
2132
      for node_name in hooks_results:
2133
        res = hooks_results[node_name]
2134
        msg = res.fail_msg
2135
        test = msg and not res.offline
2136
        self._ErrorIf(test, self.ENODEHOOKS, node_name,
2137
                      "Communication failure in hooks execution: %s", msg)
2138
        if res.offline or msg:
2139
          # No need to investigate payload if node is offline or gave an error.
2140
          # override manually lu_result here as _ErrorIf only
2141
          # overrides self.bad
2142
          lu_result = 1
2143
          continue
2144
        for script, hkr, output in res.payload:
2145
          test = hkr == constants.HKR_FAIL
2146
          self._ErrorIf(test, self.ENODEHOOKS, node_name,
2147
                        "Script %s failed, output:", script)
2148
          if test:
2149
            output = indent_re.sub('      ', output)
2150
            feedback_fn("%s" % output)
2151
            lu_result = 0
2152

    
2153
      return lu_result
2154

    
2155

    
2156
class LUVerifyDisks(NoHooksLU):
2157
  """Verifies the cluster disks status.
2158

2159
  """
2160
  REQ_BGL = False
2161

    
2162
  def ExpandNames(self):
2163
    self.needed_locks = {
2164
      locking.LEVEL_NODE: locking.ALL_SET,
2165
      locking.LEVEL_INSTANCE: locking.ALL_SET,
2166
    }
2167
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
2168

    
2169
  def Exec(self, feedback_fn):
2170
    """Verify integrity of cluster disks.
2171

2172
    @rtype: tuple of three items
2173
    @return: a tuple of (dict of node-to-node_error, list of instances
2174
        which need activate-disks, dict of instance: (node, volume) for
2175
        missing volumes
2176

2177
    """
2178
    result = res_nodes, res_instances, res_missing = {}, [], {}
2179

    
2180
    vg_name = self.cfg.GetVGName()
2181
    nodes = utils.NiceSort(self.cfg.GetNodeList())
2182
    instances = [self.cfg.GetInstanceInfo(name)
2183
                 for name in self.cfg.GetInstanceList()]
2184

    
2185
    nv_dict = {}
2186
    for inst in instances:
2187
      inst_lvs = {}
2188
      if (not inst.admin_up or
2189
          inst.disk_template not in constants.DTS_NET_MIRROR):
2190
        continue
2191
      inst.MapLVsByNode(inst_lvs)
2192
      # transform { iname: {node: [vol,],},} to {(node, vol): iname}
2193
      for node, vol_list in inst_lvs.iteritems():
2194
        for vol in vol_list:
2195
          nv_dict[(node, vol)] = inst
2196

    
2197
    if not nv_dict:
2198
      return result
2199

    
2200
    node_lvs = self.rpc.call_lv_list(nodes, vg_name)
2201

    
2202
    for node in nodes:
2203
      # node_volume
2204
      node_res = node_lvs[node]
2205
      if node_res.offline:
2206
        continue
2207
      msg = node_res.fail_msg
2208
      if msg:
2209
        logging.warning("Error enumerating LVs on node %s: %s", node, msg)
2210
        res_nodes[node] = msg
2211
        continue
2212

    
2213
      lvs = node_res.payload
2214
      for lv_name, (_, _, lv_online) in lvs.items():
2215
        inst = nv_dict.pop((node, lv_name), None)
2216
        if (not lv_online and inst is not None
2217
            and inst.name not in res_instances):
2218
          res_instances.append(inst.name)
2219

    
2220
    # any leftover items in nv_dict are missing LVs, let's arrange the
2221
    # data better
2222
    for key, inst in nv_dict.iteritems():
2223
      if inst.name not in res_missing:
2224
        res_missing[inst.name] = []
2225
      res_missing[inst.name].append(key)
2226

    
2227
    return result
2228

    
2229

    
2230
class LURepairDiskSizes(NoHooksLU):
2231
  """Verifies the cluster disks sizes.
2232

2233
  """
2234
  _OP_PARAMS = [("instances", ht.EmptyList, ht.TListOf(ht.TNonEmptyString))]
2235
  REQ_BGL = False
2236

    
2237
  def ExpandNames(self):
2238
    if self.op.instances:
2239
      self.wanted_names = []
2240
      for name in self.op.instances:
2241
        full_name = _ExpandInstanceName(self.cfg, name)
2242
        self.wanted_names.append(full_name)
2243
      self.needed_locks = {
2244
        locking.LEVEL_NODE: [],
2245
        locking.LEVEL_INSTANCE: self.wanted_names,
2246
        }
2247
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
2248
    else:
2249
      self.wanted_names = None
2250
      self.needed_locks = {
2251
        locking.LEVEL_NODE: locking.ALL_SET,
2252
        locking.LEVEL_INSTANCE: locking.ALL_SET,
2253
        }
2254
    self.share_locks = dict(((i, 1) for i in locking.LEVELS))
2255

    
2256
  def DeclareLocks(self, level):
2257
    if level == locking.LEVEL_NODE and self.wanted_names is not None:
2258
      self._LockInstancesNodes(primary_only=True)
2259

    
2260
  def CheckPrereq(self):
2261
    """Check prerequisites.
2262

2263
    This only checks the optional instance list against the existing names.
2264

2265
    """
2266
    if self.wanted_names is None:
2267
      self.wanted_names = self.acquired_locks[locking.LEVEL_INSTANCE]
2268

    
2269
    self.wanted_instances = [self.cfg.GetInstanceInfo(name) for name
2270
                             in self.wanted_names]
2271

    
2272
  def _EnsureChildSizes(self, disk):
2273
    """Ensure children of the disk have the needed disk size.
2274

2275
    This is valid mainly for DRBD8 and fixes an issue where the
2276
    children have smaller disk size.
2277

2278
    @param disk: an L{ganeti.objects.Disk} object
2279

2280
    """
2281
    if disk.dev_type == constants.LD_DRBD8:
2282
      assert disk.children, "Empty children for DRBD8?"
2283
      fchild = disk.children[0]
2284
      mismatch = fchild.size < disk.size
2285
      if mismatch:
2286
        self.LogInfo("Child disk has size %d, parent %d, fixing",
2287
                     fchild.size, disk.size)
2288
        fchild.size = disk.size
2289

    
2290
      # and we recurse on this child only, not on the metadev
2291
      return self._EnsureChildSizes(fchild) or mismatch
2292
    else:
2293
      return False
2294

    
2295
  def Exec(self, feedback_fn):
2296
    """Verify the size of cluster disks.
2297

2298
    """
2299
    # TODO: check child disks too
2300
    # TODO: check differences in size between primary/secondary nodes
2301
    per_node_disks = {}
2302
    for instance in self.wanted_instances:
2303
      pnode = instance.primary_node
2304
      if pnode not in per_node_disks:
2305
        per_node_disks[pnode] = []
2306
      for idx, disk in enumerate(instance.disks):
2307
        per_node_disks[pnode].append((instance, idx, disk))
2308

    
2309
    changed = []
2310
    for node, dskl in per_node_disks.items():
2311
      newl = [v[2].Copy() for v in dskl]
2312
      for dsk in newl:
2313
        self.cfg.SetDiskID(dsk, node)
2314
      result = self.rpc.call_blockdev_getsizes(node, newl)
2315
      if result.fail_msg:
2316
        self.LogWarning("Failure in blockdev_getsizes call to node"
2317
                        " %s, ignoring", node)
2318
        continue
2319
      if len(result.data) != len(dskl):
2320
        self.LogWarning("Invalid result from node %s, ignoring node results",
2321
                        node)
2322
        continue
2323
      for ((instance, idx, disk), size) in zip(dskl, result.data):
2324
        if size is None:
2325
          self.LogWarning("Disk %d of instance %s did not return size"
2326
                          " information, ignoring", idx, instance.name)
2327
          continue
2328
        if not isinstance(size, (int, long)):
2329
          self.LogWarning("Disk %d of instance %s did not return valid"
2330
                          " size information, ignoring", idx, instance.name)
2331
          continue
2332
        size = size >> 20
2333
        if size != disk.size:
2334
          self.LogInfo("Disk %d of instance %s has mismatched size,"
2335
                       " correcting: recorded %d, actual %d", idx,
2336
                       instance.name, disk.size, size)
2337
          disk.size = size
2338
          self.cfg.Update(instance, feedback_fn)
2339
          changed.append((instance.name, idx, size))
2340
        if self._EnsureChildSizes(disk):
2341
          self.cfg.Update(instance, feedback_fn)
2342
          changed.append((instance.name, idx, disk.size))
2343
    return changed
2344

    
2345

    
2346
class LURenameCluster(LogicalUnit):
2347
  """Rename the cluster.
2348

2349
  """
2350
  HPATH = "cluster-rename"
2351
  HTYPE = constants.HTYPE_CLUSTER
2352
  _OP_PARAMS = [("name", ht.NoDefault, ht.TNonEmptyString)]
2353

    
2354
  def BuildHooksEnv(self):
2355
    """Build hooks env.
2356

2357
    """
2358
    env = {
2359
      "OP_TARGET": self.cfg.GetClusterName(),
2360
      "NEW_NAME": self.op.name,
2361
      }
2362
    mn = self.cfg.GetMasterNode()
2363
    all_nodes = self.cfg.GetNodeList()
2364
    return env, [mn], all_nodes
2365

    
2366
  def CheckPrereq(self):
2367
    """Verify that the passed name is a valid one.
2368

2369
    """
2370
    hostname = netutils.GetHostname(name=self.op.name,
2371
                                    family=self.cfg.GetPrimaryIPFamily())
2372

    
2373
    new_name = hostname.name
2374
    self.ip = new_ip = hostname.ip
2375
    old_name = self.cfg.GetClusterName()
2376
    old_ip = self.cfg.GetMasterIP()
2377
    if new_name == old_name and new_ip == old_ip:
2378
      raise errors.OpPrereqError("Neither the name nor the IP address of the"
2379
                                 " cluster has changed",
2380
                                 errors.ECODE_INVAL)
2381
    if new_ip != old_ip:
2382
      if netutils.TcpPing(new_ip, constants.DEFAULT_NODED_PORT):
2383
        raise errors.OpPrereqError("The given cluster IP address (%s) is"
2384
                                   " reachable on the network" %
2385
                                   new_ip, errors.ECODE_NOTUNIQUE)
2386

    
2387
    self.op.name = new_name
2388

    
2389
  def Exec(self, feedback_fn):
2390
    """Rename the cluster.
2391

2392
    """
2393
    clustername = self.op.name
2394
    ip = self.ip
2395

    
2396
    # shutdown the master IP
2397
    master = self.cfg.GetMasterNode()
2398
    result = self.rpc.call_node_stop_master(master, False)
2399
    result.Raise("Could not disable the master role")
2400

    
2401
    try:
2402
      cluster = self.cfg.GetClusterInfo()
2403
      cluster.cluster_name = clustername
2404
      cluster.master_ip = ip
2405
      self.cfg.Update(cluster, feedback_fn)
2406

    
2407
      # update the known hosts file
2408
      ssh.WriteKnownHostsFile(self.cfg, constants.SSH_KNOWN_HOSTS_FILE)
2409
      node_list = self.cfg.GetNodeList()
2410
      try:
2411
        node_list.remove(master)
2412
      except ValueError:
2413
        pass
2414
      result = self.rpc.call_upload_file(node_list,
2415
                                         constants.SSH_KNOWN_HOSTS_FILE)
2416
      for to_node, to_result in result.iteritems():
2417
        msg = to_result.fail_msg
2418
        if msg:
2419
          msg = ("Copy of file %s to node %s failed: %s" %
2420
                 (constants.SSH_KNOWN_HOSTS_FILE, to_node, msg))
2421
          self.proc.LogWarning(msg)
2422

    
2423
    finally:
2424
      result = self.rpc.call_node_start_master(master, False, False)
2425
      msg = result.fail_msg
2426
      if msg:
2427
        self.LogWarning("Could not re-enable the master role on"
2428
                        " the master, please restart manually: %s", msg)
2429

    
2430
    return clustername
2431

    
2432

    
2433
class LUSetClusterParams(LogicalUnit):
2434
  """Change the parameters of the cluster.
2435

2436
  """
2437
  HPATH = "cluster-modify"
2438
  HTYPE = constants.HTYPE_CLUSTER
2439
  _OP_PARAMS = [
2440
    ("vg_name", None, ht.TMaybeString),
2441
    ("enabled_hypervisors", None,
2442
     ht.TOr(ht.TAnd(ht.TListOf(ht.TElemOf(constants.HYPER_TYPES)), ht.TTrue),
2443
            ht.TNone)),
2444
    ("hvparams", None, ht.TOr(ht.TDictOf(ht.TNonEmptyString, ht.TDict),
2445
                              ht.TNone)),
2446
    ("beparams", None, ht.TOr(ht.TDictOf(ht.TNonEmptyString, ht.TDict),
2447
                              ht.TNone)),
2448
    ("os_hvp", None, ht.TOr(ht.TDictOf(ht.TNonEmptyString, ht.TDict),
2449
                            ht.TNone)),
2450
    ("osparams", None, ht.TOr(ht.TDictOf(ht.TNonEmptyString, ht.TDict),
2451
                              ht.TNone)),
2452
    ("candidate_pool_size", None, ht.TOr(ht.TStrictPositiveInt, ht.TNone)),
2453
    ("uid_pool", None, ht.NoType),
2454
    ("add_uids", None, ht.NoType),
2455
    ("remove_uids", None, ht.NoType),
2456
    ("maintain_node_health", None, ht.TMaybeBool),
2457
    ("nicparams", None, ht.TOr(ht.TDict, ht.TNone)),
2458
    ("drbd_helper", None, ht.TOr(ht.TString, ht.TNone)),
2459
    ("default_iallocator", None, ht.TOr(ht.TString, ht.TNone)),
2460
    ("reserved_lvs", None, ht.TOr(ht.TListOf(ht.TNonEmptyString), ht.TNone)),
2461
    ("hidden_os", None, ht.TOr(ht.TListOf(\
2462
          ht.TAnd(ht.TList,
2463
                ht.TIsLength(2),
2464
                ht.TMap(lambda v: v[0], ht.TElemOf(constants.DDMS_VALUES)))),
2465
          ht.TNone)),
2466
    ("blacklisted_os", None, ht.TOr(ht.TListOf(\
2467
          ht.TAnd(ht.TList,
2468
                ht.TIsLength(2),
2469
                ht.TMap(lambda v: v[0], ht.TElemOf(constants.DDMS_VALUES)))),
2470
          ht.TNone)),
2471
    ]
2472
  REQ_BGL = False
2473

    
2474
  def CheckArguments(self):
2475
    """Check parameters
2476

2477
    """
2478
    if self.op.uid_pool:
2479
      uidpool.CheckUidPool(self.op.uid_pool)
2480

    
2481
    if self.op.add_uids:
2482
      uidpool.CheckUidPool(self.op.add_uids)
2483

    
2484
    if self.op.remove_uids:
2485
      uidpool.CheckUidPool(self.op.remove_uids)
2486

    
2487
  def ExpandNames(self):
2488
    # FIXME: in the future maybe other cluster params won't require checking on
2489
    # all nodes to be modified.
2490
    self.needed_locks = {
2491
      locking.LEVEL_NODE: locking.ALL_SET,
2492
    }
2493
    self.share_locks[locking.LEVEL_NODE] = 1
2494

    
2495
  def BuildHooksEnv(self):
2496
    """Build hooks env.
2497

2498
    """
2499
    env = {
2500
      "OP_TARGET": self.cfg.GetClusterName(),
2501
      "NEW_VG_NAME": self.op.vg_name,
2502
      }
2503
    mn = self.cfg.GetMasterNode()
2504
    return env, [mn], [mn]
2505

    
2506
  def CheckPrereq(self):
2507
    """Check prerequisites.
2508

2509
    This checks whether the given params don't conflict and
2510
    if the given volume group is valid.
2511

2512
    """
2513
    if self.op.vg_name is not None and not self.op.vg_name:
2514
      if self.cfg.HasAnyDiskOfType(constants.LD_LV):
2515
        raise errors.OpPrereqError("Cannot disable lvm storage while lvm-based"
2516
                                   " instances exist", errors.ECODE_INVAL)
2517

    
2518
    if self.op.drbd_helper is not None and not self.op.drbd_helper:
2519
      if self.cfg.HasAnyDiskOfType(constants.LD_DRBD8):
2520
        raise errors.OpPrereqError("Cannot disable drbd helper while"
2521
                                   " drbd-based instances exist",
2522
                                   errors.ECODE_INVAL)
2523

    
2524
    node_list = self.acquired_locks[locking.LEVEL_NODE]
2525

    
2526
    # if vg_name not None, checks given volume group on all nodes
2527
    if self.op.vg_name:
2528
      vglist = self.rpc.call_vg_list(node_list)
2529
      for node in node_list:
2530
        msg = vglist[node].fail_msg
2531
        if msg:
2532
          # ignoring down node
2533
          self.LogWarning("Error while gathering data on node %s"
2534
                          " (ignoring node): %s", node, msg)
2535
          continue
2536
        vgstatus = utils.CheckVolumeGroupSize(vglist[node].payload,
2537
                                              self.op.vg_name,
2538
                                              constants.MIN_VG_SIZE)
2539
        if vgstatus:
2540
          raise errors.OpPrereqError("Error on node '%s': %s" %
2541
                                     (node, vgstatus), errors.ECODE_ENVIRON)
2542

    
2543
    if self.op.drbd_helper:
2544
      # checks given drbd helper on all nodes
2545
      helpers = self.rpc.call_drbd_helper(node_list)
2546
      for node in node_list:
2547
        ninfo = self.cfg.GetNodeInfo(node)
2548
        if ninfo.offline:
2549
          self.LogInfo("Not checking drbd helper on offline node %s", node)
2550
          continue
2551
        msg = helpers[node].fail_msg
2552
        if msg:
2553
          raise errors.OpPrereqError("Error checking drbd helper on node"
2554
                                     " '%s': %s" % (node, msg),
2555
                                     errors.ECODE_ENVIRON)
2556
        node_helper = helpers[node].payload
2557
        if node_helper != self.op.drbd_helper:
2558
          raise errors.OpPrereqError("Error on node '%s': drbd helper is %s" %
2559
                                     (node, node_helper), errors.ECODE_ENVIRON)
2560

    
2561
    self.cluster = cluster = self.cfg.GetClusterInfo()
2562
    # validate params changes
2563
    if self.op.beparams:
2564
      utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
2565
      self.new_beparams = cluster.SimpleFillBE(self.op.beparams)
2566

    
2567
    if self.op.nicparams:
2568
      utils.ForceDictType(self.op.nicparams, constants.NICS_PARAMETER_TYPES)
2569
      self.new_nicparams = cluster.SimpleFillNIC(self.op.nicparams)
2570
      objects.NIC.CheckParameterSyntax(self.new_nicparams)
2571
      nic_errors = []
2572

    
2573
      # check all instances for consistency
2574
      for instance in self.cfg.GetAllInstancesInfo().values():
2575
        for nic_idx, nic in enumerate(instance.nics):
2576
          params_copy = copy.deepcopy(nic.nicparams)
2577
          params_filled = objects.FillDict(self.new_nicparams, params_copy)
2578

    
2579
          # check parameter syntax
2580
          try:
2581
            objects.NIC.CheckParameterSyntax(params_filled)
2582
          except errors.ConfigurationError, err:
2583
            nic_errors.append("Instance %s, nic/%d: %s" %
2584
                              (instance.name, nic_idx, err))
2585

    
2586
          # if we're moving instances to routed, check that they have an ip
2587
          target_mode = params_filled[constants.NIC_MODE]
2588
          if target_mode == constants.NIC_MODE_ROUTED and not nic.ip:
2589
            nic_errors.append("Instance %s, nic/%d: routed nick with no ip" %
2590
                              (instance.name, nic_idx))
2591
      if nic_errors:
2592
        raise errors.OpPrereqError("Cannot apply the change, errors:\n%s" %
2593
                                   "\n".join(nic_errors))
2594

    
2595
    # hypervisor list/parameters
2596
    self.new_hvparams = new_hvp = objects.FillDict(cluster.hvparams, {})
2597
    if self.op.hvparams:
2598
      for hv_name, hv_dict in self.op.hvparams.items():
2599
        if hv_name not in self.new_hvparams:
2600
          self.new_hvparams[hv_name] = hv_dict
2601
        else:
2602
          self.new_hvparams[hv_name].update(hv_dict)
2603

    
2604
    # os hypervisor parameters
2605
    self.new_os_hvp = objects.FillDict(cluster.os_hvp, {})
2606
    if self.op.os_hvp:
2607
      for os_name, hvs in self.op.os_hvp.items():
2608
        if os_name not in self.new_os_hvp:
2609
          self.new_os_hvp[os_name] = hvs
2610
        else:
2611
          for hv_name, hv_dict in hvs.items():
2612
            if hv_name not in self.new_os_hvp[os_name]:
2613
              self.new_os_hvp[os_name][hv_name] = hv_dict
2614
            else:
2615
              self.new_os_hvp[os_name][hv_name].update(hv_dict)
2616

    
2617
    # os parameters
2618
    self.new_osp = objects.FillDict(cluster.osparams, {})
2619
    if self.op.osparams:
2620
      for os_name, osp in self.op.osparams.items():
2621
        if os_name not in self.new_osp:
2622
          self.new_osp[os_name] = {}
2623

    
2624
        self.new_osp[os_name] = _GetUpdatedParams(self.new_osp[os_name], osp,
2625
                                                  use_none=True)
2626

    
2627
        if not self.new_osp[os_name]:
2628
          # we removed all parameters
2629
          del self.new_osp[os_name]
2630
        else:
2631
          # check the parameter validity (remote check)
2632
          _CheckOSParams(self, False, [self.cfg.GetMasterNode()],
2633
                         os_name, self.new_osp[os_name])
2634

    
2635
    # changes to the hypervisor list
2636
    if self.op.enabled_hypervisors is not None:
2637
      self.hv_list = self.op.enabled_hypervisors
2638
      for hv in self.hv_list:
2639
        # if the hypervisor doesn't already exist in the cluster
2640
        # hvparams, we initialize it to empty, and then (in both
2641
        # cases) we make sure to fill the defaults, as we might not
2642
        # have a complete defaults list if the hypervisor wasn't
2643
        # enabled before
2644
        if hv not in new_hvp:
2645
          new_hvp[hv] = {}
2646
        new_hvp[hv] = objects.FillDict(constants.HVC_DEFAULTS[hv], new_hvp[hv])
2647
        utils.ForceDictType(new_hvp[hv], constants.HVS_PARAMETER_TYPES)
2648
    else:
2649
      self.hv_list = cluster.enabled_hypervisors
2650

    
2651
    if self.op.hvparams or self.op.enabled_hypervisors is not None:
2652
      # either the enabled list has changed, or the parameters have, validate
2653
      for hv_name, hv_params in self.new_hvparams.items():
2654
        if ((self.op.hvparams and hv_name in self.op.hvparams) or
2655
            (self.op.enabled_hypervisors and
2656
             hv_name in self.op.enabled_hypervisors)):
2657
          # either this is a new hypervisor, or its parameters have changed
2658
          hv_class = hypervisor.GetHypervisor(hv_name)
2659
          utils.ForceDictType(hv_params, constants.HVS_PARAMETER_TYPES)
2660
          hv_class.CheckParameterSyntax(hv_params)
2661
          _CheckHVParams(self, node_list, hv_name, hv_params)
2662

    
2663
    if self.op.os_hvp:
2664
      # no need to check any newly-enabled hypervisors, since the
2665
      # defaults have already been checked in the above code-block
2666
      for os_name, os_hvp in self.new_os_hvp.items():
2667
        for hv_name, hv_params in os_hvp.items():
2668
          utils.ForceDictType(hv_params, constants.HVS_PARAMETER_TYPES)
2669
          # we need to fill in the new os_hvp on top of the actual hv_p
2670
          cluster_defaults = self.new_hvparams.get(hv_name, {})
2671
          new_osp = objects.FillDict(cluster_defaults, hv_params)
2672
          hv_class = hypervisor.GetHypervisor(hv_name)
2673
          hv_class.CheckParameterSyntax(new_osp)
2674
          _CheckHVParams(self, node_list, hv_name, new_osp)
2675

    
2676
    if self.op.default_iallocator:
2677
      alloc_script = utils.FindFile(self.op.default_iallocator,
2678
                                    constants.IALLOCATOR_SEARCH_PATH,
2679
                                    os.path.isfile)
2680
      if alloc_script is None:
2681
        raise errors.OpPrereqError("Invalid default iallocator script '%s'"
2682
                                   " specified" % self.op.default_iallocator,
2683
                                   errors.ECODE_INVAL)
2684

    
2685
  def Exec(self, feedback_fn):
2686
    """Change the parameters of the cluster.
2687

2688
    """
2689
    if self.op.vg_name is not None:
2690
      new_volume = self.op.vg_name
2691
      if not new_volume:
2692
        new_volume = None
2693
      if new_volume != self.cfg.GetVGName():
2694
        self.cfg.SetVGName(new_volume)
2695
      else:
2696
        feedback_fn("Cluster LVM configuration already in desired"
2697
                    " state, not changing")
2698
    if self.op.drbd_helper is not None:
2699
      new_helper = self.op.drbd_helper
2700
      if not new_helper:
2701
        new_helper = None
2702
      if new_helper != self.cfg.GetDRBDHelper():
2703
        self.cfg.SetDRBDHelper(new_helper)
2704
      else:
2705
        feedback_fn("Cluster DRBD helper already in desired state,"
2706
                    " not changing")
2707
    if self.op.hvparams:
2708
      self.cluster.hvparams = self.new_hvparams
2709
    if self.op.os_hvp:
2710
      self.cluster.os_hvp = self.new_os_hvp
2711
    if self.op.enabled_hypervisors is not None:
2712
      self.cluster.hvparams = self.new_hvparams
2713
      self.cluster.enabled_hypervisors = self.op.enabled_hypervisors
2714
    if self.op.beparams:
2715
      self.cluster.beparams[constants.PP_DEFAULT] = self.new_beparams
2716
    if self.op.nicparams:
2717
      self.cluster.nicparams[constants.PP_DEFAULT] = self.new_nicparams
2718
    if self.op.osparams:
2719
      self.cluster.osparams = self.new_osp
2720

    
2721
    if self.op.candidate_pool_size is not None:
2722
      self.cluster.candidate_pool_size = self.op.candidate_pool_size
2723
      # we need to update the pool size here, otherwise the save will fail
2724
      _AdjustCandidatePool(self, [])
2725

    
2726
    if self.op.maintain_node_health is not None:
2727
      self.cluster.maintain_node_health = self.op.maintain_node_health
2728

    
2729
    if self.op.add_uids is not None:
2730
      uidpool.AddToUidPool(self.cluster.uid_pool, self.op.add_uids)
2731

    
2732
    if self.op.remove_uids is not None:
2733
      uidpool.RemoveFromUidPool(self.cluster.uid_pool, self.op.remove_uids)
2734

    
2735
    if self.op.uid_pool is not None:
2736
      self.cluster.uid_pool = self.op.uid_pool
2737

    
2738
    if self.op.default_iallocator is not None:
2739
      self.cluster.default_iallocator = self.op.default_iallocator
2740

    
2741
    if self.op.reserved_lvs is not None:
2742
      self.cluster.reserved_lvs = self.op.reserved_lvs
2743

    
2744
    def helper_os(aname, mods, desc):
2745
      desc += " OS list"
2746
      lst = getattr(self.cluster, aname)
2747
      for key, val in mods:
2748
        if key == constants.DDM_ADD:
2749
          if val in lst:
2750
            feedback_fn("OS %s already in %s, ignoring", val, desc)
2751
          else:
2752
            lst.append(val)
2753
        elif key == constants.DDM_REMOVE:
2754
          if val in lst:
2755
            lst.remove(val)
2756
          else:
2757
            feedback_fn("OS %s not found in %s, ignoring", val, desc)
2758
        else:
2759
          raise errors.ProgrammerError("Invalid modification '%s'" % key)
2760

    
2761
    if self.op.hidden_os:
2762
      helper_os("hidden_os", self.op.hidden_os, "hidden")
2763

    
2764
    if self.op.blacklisted_os:
2765
      helper_os("blacklisted_os", self.op.blacklisted_os, "blacklisted")
2766

    
2767
    self.cfg.Update(self.cluster, feedback_fn)
2768

    
2769

    
2770
def _RedistributeAncillaryFiles(lu, additional_nodes=None):
2771
  """Distribute additional files which are part of the cluster configuration.
2772

2773
  ConfigWriter takes care of distributing the config and ssconf files, but
2774
  there are more files which should be distributed to all nodes. This function
2775
  makes sure those are copied.
2776

2777
  @param lu: calling logical unit
2778
  @param additional_nodes: list of nodes not in the config to distribute to
2779

2780
  """
2781
  # 1. Gather target nodes
2782
  myself = lu.cfg.GetNodeInfo(lu.cfg.GetMasterNode())
2783
  dist_nodes = lu.cfg.GetOnlineNodeList()
2784
  if additional_nodes is not None:
2785
    dist_nodes.extend(additional_nodes)
2786
  if myself.name in dist_nodes:
2787
    dist_nodes.remove(myself.name)
2788

    
2789
  # 2. Gather files to distribute
2790
  dist_files = set([constants.ETC_HOSTS,
2791
                    constants.SSH_KNOWN_HOSTS_FILE,
2792
                    constants.RAPI_CERT_FILE,
2793
                    constants.RAPI_USERS_FILE,
2794
                    constants.CONFD_HMAC_KEY,
2795
                    constants.CLUSTER_DOMAIN_SECRET_FILE,
2796
                   ])
2797

    
2798
  enabled_hypervisors = lu.cfg.GetClusterInfo().enabled_hypervisors
2799
  for hv_name in enabled_hypervisors:
2800
    hv_class = hypervisor.GetHypervisor(hv_name)
2801
    dist_files.update(hv_class.GetAncillaryFiles())
2802

    
2803
  # 3. Perform the files upload
2804
  for fname in dist_files:
2805
    if os.path.exists(fname):
2806
      result = lu.rpc.call_upload_file(dist_nodes, fname)
2807
      for to_node, to_result in result.items():
2808
        msg = to_result.fail_msg
2809
        if msg:
2810
          msg = ("Copy of file %s to node %s failed: %s" %
2811
                 (fname, to_node, msg))
2812
          lu.proc.LogWarning(msg)
2813

    
2814

    
2815
class LURedistributeConfig(NoHooksLU):
2816
  """Force the redistribution of cluster configuration.
2817

2818
  This is a very simple LU.
2819

2820
  """
2821
  REQ_BGL = False
2822

    
2823
  def ExpandNames(self):
2824
    self.needed_locks = {
2825
      locking.LEVEL_NODE: locking.ALL_SET,
2826
    }
2827
    self.share_locks[locking.LEVEL_NODE] = 1
2828

    
2829
  def Exec(self, feedback_fn):
2830
    """Redistribute the configuration.
2831

2832
    """
2833
    self.cfg.Update(self.cfg.GetClusterInfo(), feedback_fn)
2834
    _RedistributeAncillaryFiles(self)
2835

    
2836

    
2837
def _WaitForSync(lu, instance, disks=None, oneshot=False):
2838
  """Sleep and poll for an instance's disk to sync.
2839

2840
  """
2841
  if not instance.disks or disks is not None and not disks:
2842
    return True
2843

    
2844
  disks = _ExpandCheckDisks(instance, disks)
2845

    
2846
  if not oneshot:
2847
    lu.proc.LogInfo("Waiting for instance %s to sync disks." % instance.name)
2848

    
2849
  node = instance.primary_node
2850

    
2851
  for dev in disks:
2852
    lu.cfg.SetDiskID(dev, node)
2853

    
2854
  # TODO: Convert to utils.Retry
2855

    
2856
  retries = 0
2857
  degr_retries = 10 # in seconds, as we sleep 1 second each time
2858
  while True:
2859
    max_time = 0
2860
    done = True
2861
    cumul_degraded = False
2862
    rstats = lu.rpc.call_blockdev_getmirrorstatus(node, disks)
2863
    msg = rstats.fail_msg
2864
    if msg:
2865
      lu.LogWarning("Can't get any data from node %s: %s", node, msg)
2866
      retries += 1
2867
      if retries >= 10:
2868
        raise errors.RemoteError("Can't contact node %s for mirror data,"
2869
                                 " aborting." % node)
2870
      time.sleep(6)
2871
      continue
2872
    rstats = rstats.payload
2873
    retries = 0
2874
    for i, mstat in enumerate(rstats):
2875
      if mstat is None:
2876
        lu.LogWarning("Can't compute data for node %s/%s",
2877
                           node, disks[i].iv_name)
2878
        continue
2879

    
2880
      cumul_degraded = (cumul_degraded or
2881
                        (mstat.is_degraded and mstat.sync_percent is None))
2882
      if mstat.sync_percent is not None:
2883
        done = False
2884
        if mstat.estimated_time is not None:
2885
          rem_time = ("%s remaining (estimated)" %
2886
                      utils.FormatSeconds(mstat.estimated_time))
2887
          max_time = mstat.estimated_time
2888
        else:
2889
          rem_time = "no time estimate"
2890
        lu.proc.LogInfo("- device %s: %5.2f%% done, %s" %
2891
                        (disks[i].iv_name, mstat.sync_percent, rem_time))
2892

    
2893
    # if we're done but degraded, let's do a few small retries, to
2894
    # make sure we see a stable and not transient situation; therefore
2895
    # we force restart of the loop
2896
    if (done or oneshot) and cumul_degraded and degr_retries > 0:
2897
      logging.info("Degraded disks found, %d retries left", degr_retries)
2898
      degr_retries -= 1
2899
      time.sleep(1)
2900
      continue
2901

    
2902
    if done or oneshot:
2903
      break
2904

    
2905
    time.sleep(min(60, max_time))
2906

    
2907
  if done:
2908
    lu.proc.LogInfo("Instance %s's disks are in sync." % instance.name)
2909
  return not cumul_degraded
2910

    
2911

    
2912
def _CheckDiskConsistency(lu, dev, node, on_primary, ldisk=False):
2913
  """Check that mirrors are not degraded.
2914

2915
  The ldisk parameter, if True, will change the test from the
2916
  is_degraded attribute (which represents overall non-ok status for
2917
  the device(s)) to the ldisk (representing the local storage status).
2918

2919
  """
2920
  lu.cfg.SetDiskID(dev, node)
2921

    
2922
  result = True
2923

    
2924
  if on_primary or dev.AssembleOnSecondary():
2925
    rstats = lu.rpc.call_blockdev_find(node, dev)
2926
    msg = rstats.fail_msg
2927
    if msg:
2928
      lu.LogWarning("Can't find disk on node %s: %s", node, msg)
2929
      result = False
2930
    elif not rstats.payload:
2931
      lu.LogWarning("Can't find disk on node %s", node)
2932
      result = False
2933
    else:
2934
      if ldisk:
2935
        result = result and rstats.payload.ldisk_status == constants.LDS_OKAY
2936
      else:
2937
        result = result and not rstats.payload.is_degraded
2938

    
2939
  if dev.children:
2940
    for child in dev.children:
2941
      result = result and _CheckDiskConsistency(lu, child, node, on_primary)
2942

    
2943
  return result
2944

    
2945

    
2946
class LUDiagnoseOS(NoHooksLU):
2947
  """Logical unit for OS diagnose/query.
2948

2949
  """
2950
  _OP_PARAMS = [
2951
    _POutputFields,
2952
    ("names", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
2953
    ]
2954
  REQ_BGL = False
2955
  _HID = "hidden"
2956
  _BLK = "blacklisted"
2957
  _VLD = "valid"
2958
  _FIELDS_STATIC = utils.FieldSet()
2959
  _FIELDS_DYNAMIC = utils.FieldSet("name", _VLD, "node_status", "variants",
2960
                                   "parameters", "api_versions", _HID, _BLK)
2961

    
2962
  def CheckArguments(self):
2963
    if self.op.names:
2964
      raise errors.OpPrereqError("Selective OS query not supported",
2965
                                 errors.ECODE_INVAL)
2966

    
2967
    _CheckOutputFields(static=self._FIELDS_STATIC,
2968
                       dynamic=self._FIELDS_DYNAMIC,
2969
                       selected=self.op.output_fields)
2970

    
2971
  def ExpandNames(self):
2972
    # Lock all nodes, in shared mode
2973
    # Temporary removal of locks, should be reverted later
2974
    # TODO: reintroduce locks when they are lighter-weight
2975
    self.needed_locks = {}
2976
    #self.share_locks[locking.LEVEL_NODE] = 1
2977
    #self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
2978

    
2979
  @staticmethod
2980
  def _DiagnoseByOS(rlist):
2981
    """Remaps a per-node return list into an a per-os per-node dictionary
2982

2983
    @param rlist: a map with node names as keys and OS objects as values
2984

2985
    @rtype: dict
2986
    @return: a dictionary with osnames as keys and as value another
2987
        map, with nodes as keys and tuples of (path, status, diagnose,
2988
        variants, parameters, api_versions) as values, eg::
2989

2990
          {"debian-etch": {"node1": [(/usr/lib/..., True, "", [], []),
2991
                                     (/srv/..., False, "invalid api")],
2992
                           "node2": [(/srv/..., True, "", [], [])]}
2993
          }
2994

2995
    """
2996
    all_os = {}
2997
    # we build here the list of nodes that didn't fail the RPC (at RPC
2998
    # level), so that nodes with a non-responding node daemon don't
2999
    # make all OSes invalid
3000
    good_nodes = [node_name for node_name in rlist
3001
                  if not rlist[node_name].fail_msg]
3002
    for node_name, nr in rlist.items():
3003
      if nr.fail_msg or not nr.payload:
3004
        continue
3005
      for (name, path, status, diagnose, variants,
3006
           params, api_versions) in nr.payload:
3007
        if name not in all_os:
3008
          # build a list of nodes for this os containing empty lists
3009
          # for each node in node_list
3010
          all_os[name] = {}
3011
          for nname in good_nodes:
3012
            all_os[name][nname] = []
3013
        # convert params from [name, help] to (name, help)
3014
        params = [tuple(v) for v in params]
3015
        all_os[name][node_name].append((path, status, diagnose,
3016
                                        variants, params, api_versions))
3017
    return all_os
3018

    
3019
  def Exec(self, feedback_fn):
3020
    """Compute the list of OSes.
3021

3022
    """
3023
    valid_nodes = [node for node in self.cfg.GetOnlineNodeList()]
3024
    node_data = self.rpc.call_os_diagnose(valid_nodes)
3025
    pol = self._DiagnoseByOS(node_data)
3026
    output = []
3027
    cluster = self.cfg.GetClusterInfo()
3028

    
3029
    for os_name in utils.NiceSort(pol.keys()):
3030
      os_data = pol[os_name]
3031
      row = []
3032
      valid = True
3033
      (variants, params, api_versions) = null_state = (set(), set(), set())
3034
      for idx, osl in enumerate(os_data.values()):
3035
        valid = bool(valid and osl and osl[0][1])
3036
        if not valid:
3037
          (variants, params, api_versions) = null_state
3038
          break
3039
        node_variants, node_params, node_api = osl[0][3:6]
3040
        if idx == 0: # first entry
3041
          variants = set(node_variants)
3042
          params = set(node_params)
3043
          api_versions = set(node_api)
3044
        else: # keep consistency
3045
          variants.intersection_update(node_variants)
3046
          params.intersection_update(node_params)
3047
          api_versions.intersection_update(node_api)
3048

    
3049
      is_hid = os_name in cluster.hidden_os
3050
      is_blk = os_name in cluster.blacklisted_os
3051
      if ((self._HID not in self.op.output_fields and is_hid) or
3052
          (self._BLK not in self.op.output_fields and is_blk) or
3053
          (self._VLD not in self.op.output_fields and not valid)):
3054
        continue
3055

    
3056
      for field in self.op.output_fields:
3057
        if field == "name":
3058
          val = os_name
3059
        elif field == self._VLD:
3060
          val = valid
3061
        elif field == "node_status":
3062
          # this is just a copy of the dict
3063
          val = {}
3064
          for node_name, nos_list in os_data.items():
3065
            val[node_name] = nos_list
3066
        elif field == "variants":
3067
          val = utils.NiceSort(list(variants))
3068
        elif field == "parameters":
3069
          val = list(params)
3070
        elif field == "api_versions":
3071
          val = list(api_versions)
3072
        elif field == self._HID:
3073
          val = is_hid
3074
        elif field == self._BLK:
3075
          val = is_blk
3076
        else:
3077
          raise errors.ParameterError(field)
3078
        row.append(val)
3079
      output.append(row)
3080

    
3081
    return output
3082

    
3083

    
3084
class LURemoveNode(LogicalUnit):
3085
  """Logical unit for removing a node.
3086

3087
  """
3088
  HPATH = "node-remove"
3089
  HTYPE = constants.HTYPE_NODE
3090
  _OP_PARAMS = [
3091
    _PNodeName,
3092
    ]
3093

    
3094
  def BuildHooksEnv(self):
3095
    """Build hooks env.
3096

3097
    This doesn't run on the target node in the pre phase as a failed
3098
    node would then be impossible to remove.
3099

3100
    """
3101
    env = {
3102
      "OP_TARGET": self.op.node_name,
3103
      "NODE_NAME": self.op.node_name,
3104
      }
3105
    all_nodes = self.cfg.GetNodeList()
3106
    try:
3107
      all_nodes.remove(self.op.node_name)
3108
    except ValueError:
3109
      logging.warning("Node %s which is about to be removed not found"
3110
                      " in the all nodes list", self.op.node_name)
3111
    return env, all_nodes, all_nodes
3112

    
3113
  def CheckPrereq(self):
3114
    """Check prerequisites.
3115

3116
    This checks:
3117
     - the node exists in the configuration
3118
     - it does not have primary or secondary instances
3119
     - it's not the master
3120

3121
    Any errors are signaled by raising errors.OpPrereqError.
3122

3123
    """
3124
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
3125
    node = self.cfg.GetNodeInfo(self.op.node_name)
3126
    assert node is not None
3127

    
3128
    instance_list = self.cfg.GetInstanceList()
3129

    
3130
    masternode = self.cfg.GetMasterNode()
3131
    if node.name == masternode:
3132
      raise errors.OpPrereqError("Node is the master node,"
3133
                                 " you need to failover first.",
3134
                                 errors.ECODE_INVAL)
3135

    
3136
    for instance_name in instance_list:
3137
      instance = self.cfg.GetInstanceInfo(instance_name)
3138
      if node.name in instance.all_nodes:
3139
        raise errors.OpPrereqError("Instance %s is still running on the node,"
3140
                                   " please remove first." % instance_name,
3141
                                   errors.ECODE_INVAL)
3142
    self.op.node_name = node.name
3143
    self.node = node
3144

    
3145
  def Exec(self, feedback_fn):
3146
    """Removes the node from the cluster.
3147

3148
    """
3149
    node = self.node
3150
    logging.info("Stopping the node daemon and removing configs from node %s",
3151
                 node.name)
3152

    
3153
    modify_ssh_setup = self.cfg.GetClusterInfo().modify_ssh_setup
3154

    
3155
    # Promote nodes to master candidate as needed
3156
    _AdjustCandidatePool(self, exceptions=[node.name])
3157
    self.context.RemoveNode(node.name)
3158

    
3159
    # Run post hooks on the node before it's removed
3160
    hm = self.proc.hmclass(self.rpc.call_hooks_runner, self)
3161
    try:
3162
      hm.RunPhase(constants.HOOKS_PHASE_POST, [node.name])
3163
    except:
3164
      # pylint: disable-msg=W0702
3165
      self.LogWarning("Errors occurred running hooks on %s" % node.name)
3166

    
3167
    result = self.rpc.call_node_leave_cluster(node.name, modify_ssh_setup)
3168
    msg = result.fail_msg
3169
    if msg:
3170
      self.LogWarning("Errors encountered on the remote node while leaving"
3171
                      " the cluster: %s", msg)
3172

    
3173
    # Remove node from our /etc/hosts
3174
    if self.cfg.GetClusterInfo().modify_etc_hosts:
3175
      master_node = self.cfg.GetMasterNode()
3176
      result = self.rpc.call_etc_hosts_modify(master_node,
3177
                                              constants.ETC_HOSTS_REMOVE,
3178
                                              node.name, None)
3179
      result.Raise("Can't update hosts file with new host data")
3180
      _RedistributeAncillaryFiles(self)
3181

    
3182

    
3183
class LUQueryNodes(NoHooksLU):
3184
  """Logical unit for querying nodes.
3185

3186
  """
3187
  # pylint: disable-msg=W0142
3188
  _OP_PARAMS = [
3189
    _POutputFields,
3190
    ("names", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
3191
    ("use_locking", False, ht.TBool),
3192
    ]
3193
  REQ_BGL = False
3194

    
3195
  _SIMPLE_FIELDS = ["name", "serial_no", "ctime", "mtime", "uuid",
3196
                    "master_candidate", "offline", "drained"]
3197

    
3198
  _FIELDS_DYNAMIC = utils.FieldSet(
3199
    "dtotal", "dfree",
3200
    "mtotal", "mnode", "mfree",
3201
    "bootid",
3202
    "ctotal", "cnodes", "csockets",
3203
    )
3204

    
3205
  _FIELDS_STATIC = utils.FieldSet(*[
3206
    "pinst_cnt", "sinst_cnt",
3207
    "pinst_list", "sinst_list",
3208
    "pip", "sip", "tags",
3209
    "master",
3210
    "role"] + _SIMPLE_FIELDS
3211
    )
3212

    
3213
  def CheckArguments(self):
3214
    _CheckOutputFields(static=self._FIELDS_STATIC,
3215
                       dynamic=self._FIELDS_DYNAMIC,
3216
                       selected=self.op.output_fields)
3217

    
3218
  def ExpandNames(self):
3219
    self.needed_locks = {}
3220
    self.share_locks[locking.LEVEL_NODE] = 1
3221

    
3222
    if self.op.names:
3223
      self.wanted = _GetWantedNodes(self, self.op.names)
3224
    else:
3225
      self.wanted = locking.ALL_SET
3226

    
3227
    self.do_node_query = self._FIELDS_STATIC.NonMatching(self.op.output_fields)
3228
    self.do_locking = self.do_node_query and self.op.use_locking
3229
    if self.do_locking:
3230
      # if we don't request only static fields, we need to lock the nodes
3231
      self.needed_locks[locking.LEVEL_NODE] = self.wanted
3232

    
3233
  def Exec(self, feedback_fn):
3234
    """Computes the list of nodes and their attributes.
3235

3236
    """
3237
    all_info = self.cfg.GetAllNodesInfo()
3238
    if self.do_locking:
3239
      nodenames = self.acquired_locks[locking.LEVEL_NODE]
3240
    elif self.wanted != locking.ALL_SET:
3241
      nodenames = self.wanted
3242
      missing = set(nodenames).difference(all_info.keys())
3243
      if missing:
3244
        raise errors.OpExecError(
3245
          "Some nodes were removed before retrieving their data: %s" % missing)
3246
    else:
3247
      nodenames = all_info.keys()
3248

    
3249
    nodenames = utils.NiceSort(nodenames)
3250
    nodelist = [all_info[name] for name in nodenames]
3251

    
3252
    # begin data gathering
3253

    
3254
    if self.do_node_query:
3255
      live_data = {}
3256
      node_data = self.rpc.call_node_info(nodenames, self.cfg.GetVGName(),
3257
                                          self.cfg.GetHypervisorType())
3258
      for name in nodenames:
3259
        nodeinfo = node_data[name]
3260
        if not nodeinfo.fail_msg and nodeinfo.payload:
3261
          nodeinfo = nodeinfo.payload
3262
          fn = utils.TryConvert
3263
          live_data[name] = {
3264
            "mtotal": fn(int, nodeinfo.get('memory_total', None)),
3265
            "mnode": fn(int, nodeinfo.get('memory_dom0', None)),
3266
            "mfree": fn(int, nodeinfo.get('memory_free', None)),
3267
            "dtotal": fn(int, nodeinfo.get('vg_size', None)),
3268
            "dfree": fn(int, nodeinfo.get('vg_free', None)),
3269
            "ctotal": fn(int, nodeinfo.get('cpu_total', None)),
3270
            "bootid": nodeinfo.get('bootid', None),
3271
            "cnodes": fn(int, nodeinfo.get('cpu_nodes', None)),
3272
            "csockets": fn(int, nodeinfo.get('cpu_sockets', None)),
3273
            }
3274
        else:
3275
          live_data[name] = {}
3276
    else:
3277
      live_data = dict.fromkeys(nodenames, {})
3278

    
3279
    node_to_primary = dict([(name, set()) for name in nodenames])
3280
    node_to_secondary = dict([(name, set()) for name in nodenames])
3281

    
3282
    inst_fields = frozenset(("pinst_cnt", "pinst_list",
3283
                             "sinst_cnt", "sinst_list"))
3284
    if inst_fields & frozenset(self.op.output_fields):
3285
      inst_data = self.cfg.GetAllInstancesInfo()
3286

    
3287
      for inst in inst_data.values():
3288
        if inst.primary_node in node_to_primary:
3289
          node_to_primary[inst.primary_node].add(inst.name)
3290
        for secnode in inst.secondary_nodes:
3291
          if secnode in node_to_secondary:
3292
            node_to_secondary[secnode].add(inst.name)
3293

    
3294
    master_node = self.cfg.GetMasterNode()
3295

    
3296
    # end data gathering
3297

    
3298
    output = []
3299
    for node in nodelist:
3300
      node_output = []
3301
      for field in self.op.output_fields:
3302
        if field in self._SIMPLE_FIELDS:
3303
          val = getattr(node, field)
3304
        elif field == "pinst_list":
3305
          val = list(node_to_primary[node.name])
3306
        elif field == "sinst_list":
3307
          val = list(node_to_secondary[node.name])
3308
        elif field == "pinst_cnt":
3309
          val = len(node_to_primary[node.name])
3310
        elif field == "sinst_cnt":
3311
          val = len(node_to_secondary[node.name])
3312
        elif field == "pip":
3313
          val = node.primary_ip
3314
        elif field == "sip":
3315
          val = node.secondary_ip
3316
        elif field == "tags":
3317
          val = list(node.GetTags())
3318
        elif field == "master":
3319
          val = node.name == master_node
3320
        elif self._FIELDS_DYNAMIC.Matches(field):
3321
          val = live_data[node.name].get(field, None)
3322
        elif field == "role":
3323
          if node.name == master_node:
3324
            val = "M"
3325
          elif node.master_candidate:
3326
            val = "C"
3327
          elif node.drained:
3328
            val = "D"
3329
          elif node.offline:
3330
            val = "O"
3331
          else:
3332
            val = "R"
3333
        else:
3334
          raise errors.ParameterError(field)
3335
        node_output.append(val)
3336
      output.append(node_output)
3337

    
3338
    return output
3339

    
3340

    
3341
class LUQueryNodeVolumes(NoHooksLU):
3342
  """Logical unit for getting volumes on node(s).
3343

3344
  """
3345
  _OP_PARAMS = [
3346
    ("nodes", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
3347
    ("output_fields", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
3348
    ]
3349
  REQ_BGL = False
3350
  _FIELDS_DYNAMIC = utils.FieldSet("phys", "vg", "name", "size", "instance")
3351
  _FIELDS_STATIC = utils.FieldSet("node")
3352

    
3353
  def CheckArguments(self):
3354
    _CheckOutputFields(static=self._FIELDS_STATIC,
3355
                       dynamic=self._FIELDS_DYNAMIC,
3356
                       selected=self.op.output_fields)
3357

    
3358
  def ExpandNames(self):
3359
    self.needed_locks = {}
3360
    self.share_locks[locking.LEVEL_NODE] = 1
3361
    if not self.op.nodes:
3362
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
3363
    else:
3364
      self.needed_locks[locking.LEVEL_NODE] = \
3365
        _GetWantedNodes(self, self.op.nodes)
3366

    
3367
  def Exec(self, feedback_fn):
3368
    """Computes the list of nodes and their attributes.
3369

3370
    """
3371
    nodenames = self.acquired_locks[locking.LEVEL_NODE]
3372
    volumes = self.rpc.call_node_volumes(nodenames)
3373

    
3374
    ilist = [self.cfg.GetInstanceInfo(iname) for iname
3375
             in self.cfg.GetInstanceList()]
3376

    
3377
    lv_by_node = dict([(inst, inst.MapLVsByNode()) for inst in ilist])
3378

    
3379
    output = []
3380
    for node in nodenames:
3381
      nresult = volumes[node]
3382
      if nresult.offline:
3383
        continue
3384
      msg = nresult.fail_msg
3385
      if msg:
3386
        self.LogWarning("Can't compute volume data on node %s: %s", node, msg)
3387
        continue
3388

    
3389
      node_vols = nresult.payload[:]
3390
      node_vols.sort(key=lambda vol: vol['dev'])
3391

    
3392
      for vol in node_vols:
3393
        node_output = []
3394
        for field in self.op.output_fields:
3395
          if field == "node":
3396
            val = node
3397
          elif field == "phys":
3398
            val = vol['dev']
3399
          elif field == "vg":
3400
            val = vol['vg']
3401
          elif field == "name":
3402
            val = vol['name']
3403
          elif field == "size":
3404
            val = int(float(vol['size']))
3405
          elif field == "instance":
3406
            for inst in ilist:
3407
              if node not in lv_by_node[inst]:
3408
                continue
3409
              if vol['name'] in lv_by_node[inst][node]:
3410
                val = inst.name
3411
                break
3412
            else:
3413
              val = '-'
3414
          else:
3415
            raise errors.ParameterError(field)
3416
          node_output.append(str(val))
3417

    
3418
        output.append(node_output)
3419

    
3420
    return output
3421

    
3422

    
3423
class LUQueryNodeStorage(NoHooksLU):
3424
  """Logical unit for getting information on storage units on node(s).
3425

3426
  """
3427
  _FIELDS_STATIC = utils.FieldSet(constants.SF_NODE)
3428
  _OP_PARAMS = [
3429
    ("nodes", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
3430
    ("storage_type", ht.NoDefault, _CheckStorageType),
3431
    ("output_fields", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
3432
    ("name", None, ht.TMaybeString),
3433
    ]
3434
  REQ_BGL = False
3435

    
3436
  def CheckArguments(self):
3437
    _CheckOutputFields(static=self._FIELDS_STATIC,
3438
                       dynamic=utils.FieldSet(*constants.VALID_STORAGE_FIELDS),
3439
                       selected=self.op.output_fields)
3440

    
3441
  def ExpandNames(self):
3442
    self.needed_locks = {}
3443
    self.share_locks[locking.LEVEL_NODE] = 1
3444

    
3445
    if self.op.nodes:
3446
      self.needed_locks[locking.LEVEL_NODE] = \
3447
        _GetWantedNodes(self, self.op.nodes)
3448
    else:
3449
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
3450

    
3451
  def Exec(self, feedback_fn):
3452
    """Computes the list of nodes and their attributes.
3453

3454
    """
3455
    self.nodes = self.acquired_locks[locking.LEVEL_NODE]
3456

    
3457
    # Always get name to sort by
3458
    if constants.SF_NAME in self.op.output_fields:
3459
      fields = self.op.output_fields[:]
3460
    else:
3461
      fields = [constants.SF_NAME] + self.op.output_fields
3462

    
3463
    # Never ask for node or type as it's only known to the LU
3464
    for extra in [constants.SF_NODE, constants.SF_TYPE]:
3465
      while extra in fields:
3466
        fields.remove(extra)
3467

    
3468
    field_idx = dict([(name, idx) for (idx, name) in enumerate(fields)])
3469
    name_idx = field_idx[constants.SF_NAME]
3470

    
3471
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
3472
    data = self.rpc.call_storage_list(self.nodes,
3473
                                      self.op.storage_type, st_args,
3474
                                      self.op.name, fields)
3475

    
3476
    result = []
3477

    
3478
    for node in utils.NiceSort(self.nodes):
3479
      nresult = data[node]
3480
      if nresult.offline:
3481
        continue
3482

    
3483
      msg = nresult.fail_msg
3484
      if msg:
3485
        self.LogWarning("Can't get storage data from node %s: %s", node, msg)
3486
        continue
3487

    
3488
      rows = dict([(row[name_idx], row) for row in nresult.payload])
3489

    
3490
      for name in utils.NiceSort(rows.keys()):
3491
        row = rows[name]
3492

    
3493
        out = []
3494

    
3495
        for field in self.op.output_fields:
3496
          if field == constants.SF_NODE:
3497
            val = node
3498
          elif field == constants.SF_TYPE:
3499
            val = self.op.storage_type
3500
          elif field in field_idx:
3501
            val = row[field_idx[field]]
3502
          else:
3503
            raise errors.ParameterError(field)
3504

    
3505
          out.append(val)
3506

    
3507
        result.append(out)
3508

    
3509
    return result
3510

    
3511

    
3512
class LUModifyNodeStorage(NoHooksLU):
3513
  """Logical unit for modifying a storage volume on a node.
3514

3515
  """
3516
  _OP_PARAMS = [
3517
    _PNodeName,
3518
    ("storage_type", ht.NoDefault, _CheckStorageType),
3519
    ("name", ht.NoDefault, ht.TNonEmptyString),
3520
    ("changes", ht.NoDefault, ht.TDict),
3521
    ]
3522
  REQ_BGL = False
3523

    
3524
  def CheckArguments(self):
3525
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
3526

    
3527
    storage_type = self.op.storage_type
3528

    
3529
    try:
3530
      modifiable = constants.MODIFIABLE_STORAGE_FIELDS[storage_type]
3531
    except KeyError:
3532
      raise errors.OpPrereqError("Storage units of type '%s' can not be"
3533
                                 " modified" % storage_type,
3534
                                 errors.ECODE_INVAL)
3535

    
3536
    diff = set(self.op.changes.keys()) - modifiable
3537
    if diff:
3538
      raise errors.OpPrereqError("The following fields can not be modified for"
3539
                                 " storage units of type '%s': %r" %
3540
                                 (storage_type, list(diff)),
3541
                                 errors.ECODE_INVAL)
3542

    
3543
  def ExpandNames(self):
3544
    self.needed_locks = {
3545
      locking.LEVEL_NODE: self.op.node_name,
3546
      }
3547

    
3548
  def Exec(self, feedback_fn):
3549
    """Computes the list of nodes and their attributes.
3550

3551
    """
3552
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
3553
    result = self.rpc.call_storage_modify(self.op.node_name,
3554
                                          self.op.storage_type, st_args,
3555
                                          self.op.name, self.op.changes)
3556
    result.Raise("Failed to modify storage unit '%s' on %s" %
3557
                 (self.op.name, self.op.node_name))
3558

    
3559

    
3560
class LUAddNode(LogicalUnit):
3561
  """Logical unit for adding node to the cluster.
3562

3563
  """
3564
  HPATH = "node-add"
3565
  HTYPE = constants.HTYPE_NODE
3566
  _OP_PARAMS = [
3567
    _PNodeName,
3568
    ("primary_ip", None, ht.NoType),
3569
    ("secondary_ip", None, ht.TMaybeString),
3570
    ("readd", False, ht.TBool),
3571
    ("nodegroup", None, ht.TMaybeString)
3572
    ]
3573

    
3574
  def CheckArguments(self):
3575
    self.primary_ip_family = self.cfg.GetPrimaryIPFamily()
3576
    # validate/normalize the node name
3577
    self.hostname = netutils.GetHostname(name=self.op.node_name,
3578
                                         family=self.primary_ip_family)
3579
    self.op.node_name = self.hostname.name
3580
    if self.op.readd and self.op.nodegroup:
3581
      raise errors.OpPrereqError("Cannot pass a nodegroup when a node is"
3582
                                 " being readded", errors.ECODE_INVAL)
3583

    
3584
  def BuildHooksEnv(self):
3585
    """Build hooks env.
3586

3587
    This will run on all nodes before, and on all nodes + the new node after.
3588

3589
    """
3590
    env = {
3591
      "OP_TARGET": self.op.node_name,
3592
      "NODE_NAME": self.op.node_name,
3593
      "NODE_PIP": self.op.primary_ip,
3594
      "NODE_SIP": self.op.secondary_ip,
3595
      }
3596
    nodes_0 = self.cfg.GetNodeList()
3597
    nodes_1 = nodes_0 + [self.op.node_name, ]
3598
    return env, nodes_0, nodes_1
3599

    
3600
  def CheckPrereq(self):
3601
    """Check prerequisites.
3602

3603
    This checks:
3604
     - the new node is not already in the config
3605
     - it is resolvable
3606
     - its parameters (single/dual homed) matches the cluster
3607

3608
    Any errors are signaled by raising errors.OpPrereqError.
3609

3610
    """
3611
    cfg = self.cfg
3612
    hostname = self.hostname
3613
    node = hostname.name
3614
    primary_ip = self.op.primary_ip = hostname.ip
3615
    if self.op.secondary_ip is None:
3616
      if self.primary_ip_family == netutils.IP6Address.family:
3617
        raise errors.OpPrereqError("When using a IPv6 primary address, a valid"
3618
                                   " IPv4 address must be given as secondary",
3619
                                   errors.ECODE_INVAL)
3620
      self.op.secondary_ip = primary_ip
3621

    
3622
    secondary_ip = self.op.secondary_ip
3623
    if not netutils.IP4Address.IsValid(secondary_ip):
3624
      raise errors.OpPrereqError("Secondary IP (%s) needs to be a valid IPv4"
3625
                                 " address" % secondary_ip, errors.ECODE_INVAL)
3626

    
3627
    node_list = cfg.GetNodeList()
3628
    if not self.op.readd and node in node_list:
3629
      raise errors.OpPrereqError("Node %s is already in the configuration" %
3630
                                 node, errors.ECODE_EXISTS)
3631
    elif self.op.readd and node not in node_list:
3632
      raise errors.OpPrereqError("Node %s is not in the configuration" % node,
3633
                                 errors.ECODE_NOENT)
3634

    
3635
    self.changed_primary_ip = False
3636

    
3637
    for existing_node_name in node_list:
3638
      existing_node = cfg.GetNodeInfo(existing_node_name)
3639

    
3640
      if self.op.readd and node == existing_node_name:
3641
        if existing_node.secondary_ip != secondary_ip:
3642
          raise errors.OpPrereqError("Readded node doesn't have the same IP"
3643
                                     " address configuration as before",
3644
                                     errors.ECODE_INVAL)
3645
        if existing_node.primary_ip != primary_ip:
3646
          self.changed_primary_ip = True
3647

    
3648
        continue
3649

    
3650
      if (existing_node.primary_ip == primary_ip or
3651
          existing_node.secondary_ip == primary_ip or
3652
          existing_node.primary_ip == secondary_ip or
3653
          existing_node.secondary_ip == secondary_ip):
3654
        raise errors.OpPrereqError("New node ip address(es) conflict with"
3655
                                   " existing node %s" % existing_node.name,
3656
                                   errors.ECODE_NOTUNIQUE)
3657

    
3658
    # check that the type of the node (single versus dual homed) is the
3659
    # same as for the master
3660
    myself = cfg.GetNodeInfo(self.cfg.GetMasterNode())
3661
    master_singlehomed = myself.secondary_ip == myself.primary_ip
3662
    newbie_singlehomed = secondary_ip == primary_ip
3663
    if master_singlehomed != newbie_singlehomed:
3664
      if master_singlehomed:
3665
        raise errors.OpPrereqError("The master has no private ip but the"
3666
                                   " new node has one",
3667
                                   errors.ECODE_INVAL)
3668
      else:
3669
        raise errors.OpPrereqError("The master has a private ip but the"
3670
                                   " new node doesn't have one",
3671
                                   errors.ECODE_INVAL)
3672

    
3673
    # checks reachability
3674
    if not netutils.TcpPing(primary_ip, constants.DEFAULT_NODED_PORT):
3675
      raise errors.OpPrereqError("Node not reachable by ping",
3676
                                 errors.ECODE_ENVIRON)
3677

    
3678
    if not newbie_singlehomed:
3679
      # check reachability from my secondary ip to newbie's secondary ip
3680
      if not netutils.TcpPing(secondary_ip, constants.DEFAULT_NODED_PORT,
3681
                           source=myself.secondary_ip):
3682
        raise errors.OpPrereqError("Node secondary ip not reachable by TCP"
3683
                                   " based ping to noded port",
3684
                                   errors.ECODE_ENVIRON)
3685

    
3686
    if self.op.readd:
3687
      exceptions = [node]
3688
    else:
3689
      exceptions = []
3690

    
3691
    self.master_candidate = _DecideSelfPromotion(self, exceptions=exceptions)
3692

    
3693
    if self.op.readd:
3694
      self.new_node = self.cfg.GetNodeInfo(node)
3695
      assert self.new_node is not None, "Can't retrieve locked node %s" % node
3696
    else:
3697
      nodegroup = cfg.LookupNodeGroup(self.op.nodegroup)
3698
      self.new_node = objects.Node(name=node,
3699
                                   primary_ip=primary_ip,
3700
                                   secondary_ip=secondary_ip,
3701
                                   master_candidate=self.master_candidate,
3702
                                   offline=False, drained=False,
3703
                                   nodegroup=nodegroup)
3704

    
3705
  def Exec(self, feedback_fn):
3706
    """Adds the new node to the cluster.
3707

3708
    """
3709
    new_node = self.new_node
3710
    node = new_node.name
3711

    
3712
    # for re-adds, reset the offline/drained/master-candidate flags;
3713
    # we need to reset here, otherwise offline would prevent RPC calls
3714
    # later in the procedure; this also means that if the re-add
3715
    # fails, we are left with a non-offlined, broken node
3716
    if self.op.readd:
3717
      new_node.drained = new_node.offline = False # pylint: disable-msg=W0201
3718
      self.LogInfo("Readding a node, the offline/drained flags were reset")
3719
      # if we demote the node, we do cleanup later in the procedure
3720
      new_node.master_candidate = self.master_candidate
3721
      if self.changed_primary_ip:
3722
        new_node.primary_ip = self.op.primary_ip
3723

    
3724
    # notify the user about any possible mc promotion
3725
    if new_node.master_candidate:
3726
      self.LogInfo("Node will be a master candidate")
3727

    
3728
    # check connectivity
3729
    result = self.rpc.call_version([node])[node]
3730
    result.Raise("Can't get version information from node %s" % node)
3731
    if constants.PROTOCOL_VERSION == result.payload:
3732
      logging.info("Communication to node %s fine, sw version %s match",
3733
                   node, result.payload)
3734
    else:
3735
      raise errors.OpExecError("Version mismatch master version %s,"
3736
                               " node version %s" %
3737
                               (constants.PROTOCOL_VERSION, result.payload))
3738

    
3739
    # Add node to our /etc/hosts, and add key to known_hosts
3740
    if self.cfg.GetClusterInfo().modify_etc_hosts:
3741
      master_node = self.cfg.GetMasterNode()
3742
      result = self.rpc.call_etc_hosts_modify(master_node,
3743
                                              constants.ETC_HOSTS_ADD,
3744
                                              self.hostname.name,
3745
                                              self.hostname.ip)
3746
      result.Raise("Can't update hosts file with new host data")
3747

    
3748
    if new_node.secondary_ip != new_node.primary_ip:
3749
      result = self.rpc.call_node_has_ip_address(new_node.name,
3750
                                                 new_node.secondary_ip)
3751
      result.Raise("Failure checking secondary ip on node %s" % new_node.name,
3752
                   prereq=True, ecode=errors.ECODE_ENVIRON)
3753
      if not result.payload:
3754
        raise errors.OpExecError("Node claims it doesn't have the secondary ip"
3755
                                 " you gave (%s). Please fix and re-run this"
3756
                                 " command." % new_node.secondary_ip)
3757

    
3758
    node_verify_list = [self.cfg.GetMasterNode()]
3759
    node_verify_param = {
3760
      constants.NV_NODELIST: [node],
3761
      # TODO: do a node-net-test as well?
3762
    }
3763

    
3764
    result = self.rpc.call_node_verify(node_verify_list, node_verify_param,
3765
                                       self.cfg.GetClusterName())
3766
    for verifier in node_verify_list:
3767
      result[verifier].Raise("Cannot communicate with node %s" % verifier)
3768
      nl_payload = result[verifier].payload[constants.NV_NODELIST]
3769
      if nl_payload:
3770
        for failed in nl_payload:
3771
          feedback_fn("ssh/hostname verification failed"
3772
                      " (checking from %s): %s" %
3773
                      (verifier, nl_payload[failed]))
3774
        raise errors.OpExecError("ssh/hostname verification failed.")
3775

    
3776
    if self.op.readd:
3777
      _RedistributeAncillaryFiles(self)
3778
      self.context.ReaddNode(new_node)
3779
      # make sure we redistribute the config
3780
      self.cfg.Update(new_node, feedback_fn)
3781
      # and make sure the new node will not have old files around
3782
      if not new_node.master_candidate:
3783
        result = self.rpc.call_node_demote_from_mc(new_node.name)
3784
        msg = result.fail_msg
3785
        if msg:
3786
          self.LogWarning("Node failed to demote itself from master"
3787
                          " candidate status: %s" % msg)
3788
    else:
3789
      _RedistributeAncillaryFiles(self, additional_nodes=[node])
3790
      self.context.AddNode(new_node, self.proc.GetECId())
3791

    
3792

    
3793
class LUSetNodeParams(LogicalUnit):
3794
  """Modifies the parameters of a node.
3795

3796
  """
3797
  HPATH = "node-modify"
3798
  HTYPE = constants.HTYPE_NODE
3799
  _OP_PARAMS = [
3800
    _PNodeName,
3801
    ("master_candidate", None, ht.TMaybeBool),
3802
    ("offline", None, ht.TMaybeBool),
3803
    ("drained", None, ht.TMaybeBool),
3804
    ("auto_promote", False, ht.TBool),
3805
    _PForce,
3806
    ]
3807
  REQ_BGL = False
3808

    
3809
  def CheckArguments(self):
3810
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
3811
    all_mods = [self.op.offline, self.op.master_candidate, self.op.drained]
3812
    if all_mods.count(None) == 3:
3813
      raise errors.OpPrereqError("Please pass at least one modification",
3814
                                 errors.ECODE_INVAL)
3815
    if all_mods.count(True) > 1:
3816
      raise errors.OpPrereqError("Can't set the node into more than one"
3817
                                 " state at the same time",
3818
                                 errors.ECODE_INVAL)
3819

    
3820
    # Boolean value that tells us whether we're offlining or draining the node
3821
    self.offline_or_drain = (self.op.offline == True or
3822
                             self.op.drained == True)
3823
    self.deoffline_or_drain = (self.op.offline == False or
3824
                               self.op.drained == False)
3825
    self.might_demote = (self.op.master_candidate == False or
3826
                         self.offline_or_drain)
3827

    
3828
    self.lock_all = self.op.auto_promote and self.might_demote
3829

    
3830

    
3831
  def ExpandNames(self):
3832
    if self.lock_all:
3833
      self.needed_locks = {locking.LEVEL_NODE: locking.ALL_SET}
3834
    else:
3835
      self.needed_locks = {locking.LEVEL_NODE: self.op.node_name}
3836

    
3837
  def BuildHooksEnv(self):
3838
    """Build hooks env.
3839

3840
    This runs on the master node.
3841

3842
    """
3843
    env = {
3844
      "OP_TARGET": self.op.node_name,
3845
      "MASTER_CANDIDATE": str(self.op.master_candidate),
3846
      "OFFLINE": str(self.op.offline),
3847
      "DRAINED": str(self.op.drained),
3848
      }
3849
    nl = [self.cfg.GetMasterNode(),
3850
          self.op.node_name]
3851
    return env, nl, nl
3852

    
3853
  def CheckPrereq(self):
3854
    """Check prerequisites.
3855

3856
    This only checks the instance list against the existing names.
3857

3858
    """
3859
    node = self.node = self.cfg.GetNodeInfo(self.op.node_name)
3860

    
3861
    if (self.op.master_candidate is not None or
3862
        self.op.drained is not None or
3863
        self.op.offline is not None):
3864
      # we can't change the master's node flags
3865
      if self.op.node_name == self.cfg.GetMasterNode():
3866
        raise errors.OpPrereqError("The master role can be changed"
3867
                                   " only via master-failover",
3868
                                   errors.ECODE_INVAL)
3869

    
3870

    
3871
    if node.master_candidate and self.might_demote and not self.lock_all:
3872
      assert not self.op.auto_promote, "auto-promote set but lock_all not"
3873
      # check if after removing the current node, we're missing master
3874
      # candidates
3875
      (mc_remaining, mc_should, _) = \
3876
          self.cfg.GetMasterCandidateStats(exceptions=[node.name])
3877
      if mc_remaining < mc_should:
3878
        raise errors.OpPrereqError("Not enough master candidates, please"
3879
                                   " pass auto_promote to allow promotion",
3880
                                   errors.ECODE_INVAL)
3881

    
3882
    if (self.op.master_candidate == True and
3883
        ((node.offline and not self.op.offline == False) or
3884
         (node.drained and not self.op.drained == False))):
3885
      raise errors.OpPrereqError("Node '%s' is offline or drained, can't set"
3886
                                 " to master_candidate" % node.name,
3887
                                 errors.ECODE_INVAL)
3888

    
3889
    # If we're being deofflined/drained, we'll MC ourself if needed
3890
    if (self.deoffline_or_drain and not self.offline_or_drain and not
3891
        self.op.master_candidate == True and not node.master_candidate):
3892
      self.op.master_candidate = _DecideSelfPromotion(self)
3893
      if self.op.master_candidate:
3894
        self.LogInfo("Autopromoting node to master candidate")
3895

    
3896
    return
3897

    
3898
  def Exec(self, feedback_fn):
3899
    """Modifies a node.
3900

3901
    """
3902
    node = self.node
3903

    
3904
    result = []
3905
    changed_mc = False
3906

    
3907
    if self.op.offline is not None:
3908
      node.offline = self.op.offline
3909
      result.append(("offline", str(self.op.offline)))
3910
      if self.op.offline == True:
3911
        if node.master_candidate:
3912
          node.master_candidate = False
3913
          changed_mc = True
3914
          result.append(("master_candidate", "auto-demotion due to offline"))
3915
        if node.drained:
3916
          node.drained = False
3917
          result.append(("drained", "clear drained status due to offline"))
3918

    
3919
    if self.op.master_candidate is not None:
3920
      node.master_candidate = self.op.master_candidate
3921
      changed_mc = True
3922
      result.append(("master_candidate", str(self.op.master_candidate)))
3923
      if self.op.master_candidate == False:
3924
        rrc = self.rpc.call_node_demote_from_mc(node.name)
3925
        msg = rrc.fail_msg
3926
        if msg:
3927
          self.LogWarning("Node failed to demote itself: %s" % msg)
3928

    
3929
    if self.op.drained is not None:
3930
      node.drained = self.op.drained
3931
      result.append(("drained", str(self.op.drained)))
3932
      if self.op.drained == True:
3933
        if node.master_candidate:
3934
          node.master_candidate = False
3935
          changed_mc = True
3936
          result.append(("master_candidate", "auto-demotion due to drain"))
3937
          rrc = self.rpc.call_node_demote_from_mc(node.name)
3938
          msg = rrc.fail_msg
3939
          if msg:
3940
            self.LogWarning("Node failed to demote itself: %s" % msg)
3941
        if node.offline:
3942
          node.offline = False
3943
          result.append(("offline", "clear offline status due to drain"))
3944

    
3945
    # we locked all nodes, we adjust the CP before updating this node
3946
    if self.lock_all:
3947
      _AdjustCandidatePool(self, [node.name])
3948

    
3949
    # this will trigger configuration file update, if needed
3950
    self.cfg.Update(node, feedback_fn)
3951

    
3952
    # this will trigger job queue propagation or cleanup
3953
    if changed_mc:
3954
      self.context.ReaddNode(node)
3955

    
3956
    return result
3957

    
3958

    
3959
class LUPowercycleNode(NoHooksLU):
3960
  """Powercycles a node.
3961

3962
  """
3963
  _OP_PARAMS = [
3964
    _PNodeName,
3965
    _PForce,
3966
    ]
3967
  REQ_BGL = False
3968

    
3969
  def CheckArguments(self):
3970
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
3971
    if self.op.node_name == self.cfg.GetMasterNode() and not self.op.force:
3972
      raise errors.OpPrereqError("The node is the master and the force"
3973
                                 " parameter was not set",
3974
                                 errors.ECODE_INVAL)
3975

    
3976
  def ExpandNames(self):
3977
    """Locking for PowercycleNode.
3978

3979
    This is a last-resort option and shouldn't block on other
3980
    jobs. Therefore, we grab no locks.
3981

3982
    """
3983
    self.needed_locks = {}
3984

    
3985
  def Exec(self, feedback_fn):
3986
    """Reboots a node.
3987

3988
    """
3989
    result = self.rpc.call_node_powercycle(self.op.node_name,
3990
                                           self.cfg.GetHypervisorType())
3991
    result.Raise("Failed to schedule the reboot")
3992
    return result.payload
3993

    
3994

    
3995
class LUQueryClusterInfo(NoHooksLU):
3996
  """Query cluster configuration.
3997

3998
  """
3999
  REQ_BGL = False
4000

    
4001
  def ExpandNames(self):
4002
    self.needed_locks = {}
4003

    
4004
  def Exec(self, feedback_fn):
4005
    """Return cluster config.
4006

4007
    """
4008
    cluster = self.cfg.GetClusterInfo()
4009
    os_hvp = {}
4010

    
4011
    # Filter just for enabled hypervisors
4012
    for os_name, hv_dict in cluster.os_hvp.items():
4013
      os_hvp[os_name] = {}
4014
      for hv_name, hv_params in hv_dict.items():
4015
        if hv_name in cluster.enabled_hypervisors:
4016
          os_hvp[os_name][hv_name] = hv_params
4017

    
4018
    # Convert ip_family to ip_version
4019
    primary_ip_version = constants.IP4_VERSION
4020
    if cluster.primary_ip_family == netutils.IP6Address.family:
4021
      primary_ip_version = constants.IP6_VERSION
4022

    
4023
    result = {
4024
      "software_version": constants.RELEASE_VERSION,
4025
      "protocol_version": constants.PROTOCOL_VERSION,
4026
      "config_version": constants.CONFIG_VERSION,
4027
      "os_api_version": max(constants.OS_API_VERSIONS),
4028
      "export_version": constants.EXPORT_VERSION,
4029
      "architecture": (platform.architecture()[0], platform.machine()),
4030
      "name": cluster.cluster_name,
4031
      "master": cluster.master_node,
4032
      "default_hypervisor": cluster.enabled_hypervisors[0],
4033
      "enabled_hypervisors": cluster.enabled_hypervisors,
4034
      "hvparams": dict([(hypervisor_name, cluster.hvparams[hypervisor_name])
4035
                        for hypervisor_name in cluster.enabled_hypervisors]),
4036
      "os_hvp": os_hvp,
4037
      "beparams": cluster.beparams,
4038
      "osparams": cluster.osparams,
4039
      "nicparams": cluster.nicparams,
4040
      "candidate_pool_size": cluster.candidate_pool_size,
4041
      "master_netdev": cluster.master_netdev,
4042
      "volume_group_name": cluster.volume_group_name,
4043
      "drbd_usermode_helper": cluster.drbd_usermode_helper,
4044
      "file_storage_dir": cluster.file_storage_dir,
4045
      "maintain_node_health": cluster.maintain_node_health,
4046
      "ctime": cluster.ctime,
4047
      "mtime": cluster.mtime,
4048
      "uuid": cluster.uuid,
4049
      "tags": list(cluster.GetTags()),
4050
      "uid_pool": cluster.uid_pool,
4051
      "default_iallocator": cluster.default_iallocator,
4052
      "reserved_lvs": cluster.reserved_lvs,
4053
      "primary_ip_version": primary_ip_version,
4054
      "prealloc_wipe_disks": cluster.prealloc_wipe_disks,
4055
      }
4056

    
4057
    return result
4058

    
4059

    
4060
class LUQueryConfigValues(NoHooksLU):
4061
  """Return configuration values.
4062

4063
  """
4064
  _OP_PARAMS = [_POutputFields]
4065
  REQ_BGL = False
4066
  _FIELDS_DYNAMIC = utils.FieldSet()
4067
  _FIELDS_STATIC = utils.FieldSet("cluster_name", "master_node", "drain_flag",
4068
                                  "watcher_pause", "volume_group_name")
4069

    
4070
  def CheckArguments(self):
4071
    _CheckOutputFields(static=self._FIELDS_STATIC,
4072
                       dynamic=self._FIELDS_DYNAMIC,
4073
                       selected=self.op.output_fields)
4074

    
4075
  def ExpandNames(self):
4076
    self.needed_locks = {}
4077

    
4078
  def Exec(self, feedback_fn):
4079
    """Dump a representation of the cluster config to the standard output.
4080

4081
    """
4082
    values = []
4083
    for field in self.op.output_fields:
4084
      if field == "cluster_name":
4085
        entry = self.cfg.GetClusterName()
4086
      elif field == "master_node":
4087
        entry = self.cfg.GetMasterNode()
4088
      elif field == "drain_flag":
4089
        entry = os.path.exists(constants.JOB_QUEUE_DRAIN_FILE)
4090
      elif field == "watcher_pause":
4091
        entry = utils.ReadWatcherPauseFile(constants.WATCHER_PAUSEFILE)
4092
      elif field == "volume_group_name":
4093
        entry = self.cfg.GetVGName()
4094
      else:
4095
        raise errors.ParameterError(field)
4096
      values.append(entry)
4097
    return values
4098

    
4099

    
4100
class LUActivateInstanceDisks(NoHooksLU):
4101
  """Bring up an instance's disks.
4102

4103
  """
4104
  _OP_PARAMS = [
4105
    _PInstanceName,
4106
    ("ignore_size", False, ht.TBool),
4107
    ]
4108
  REQ_BGL = False
4109

    
4110
  def ExpandNames(self):
4111
    self._ExpandAndLockInstance()
4112
    self.needed_locks[locking.LEVEL_NODE] = []
4113
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
4114

    
4115
  def DeclareLocks(self, level):
4116
    if level == locking.LEVEL_NODE:
4117
      self._LockInstancesNodes()
4118

    
4119
  def CheckPrereq(self):
4120
    """Check prerequisites.
4121

4122
    This checks that the instance is in the cluster.
4123

4124
    """
4125
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4126
    assert self.instance is not None, \
4127
      "Cannot retrieve locked instance %s" % self.op.instance_name
4128
    _CheckNodeOnline(self, self.instance.primary_node)
4129

    
4130
  def Exec(self, feedback_fn):
4131
    """Activate the disks.
4132

4133
    """
4134
    disks_ok, disks_info = \
4135
              _AssembleInstanceDisks(self, self.instance,
4136
                                     ignore_size=self.op.ignore_size)
4137
    if not disks_ok:
4138
      raise errors.OpExecError("Cannot activate block devices")
4139

    
4140
    return disks_info
4141

    
4142

    
4143
def _AssembleInstanceDisks(lu, instance, disks=None, ignore_secondaries=False,
4144
                           ignore_size=False):
4145
  """Prepare the block devices for an instance.
4146

4147
  This sets up the block devices on all nodes.
4148

4149
  @type lu: L{LogicalUnit}
4150
  @param lu: the logical unit on whose behalf we execute
4151
  @type instance: L{objects.Instance}
4152
  @param instance: the instance for whose disks we assemble
4153
  @type disks: list of L{objects.Disk} or None
4154
  @param disks: which disks to assemble (or all, if None)
4155
  @type ignore_secondaries: boolean
4156
  @param ignore_secondaries: if true, errors on secondary nodes
4157
      won't result in an error return from the function
4158
  @type ignore_size: boolean
4159
  @param ignore_size: if true, the current known size of the disk
4160
      will not be used during the disk activation, useful for cases
4161
      when the size is wrong
4162
  @return: False if the operation failed, otherwise a list of
4163
      (host, instance_visible_name, node_visible_name)
4164
      with the mapping from node devices to instance devices
4165

4166
  """
4167
  device_info = []
4168
  disks_ok = True
4169
  iname = instance.name
4170
  disks = _ExpandCheckDisks(instance, disks)
4171

    
4172
  # With the two passes mechanism we try to reduce the window of
4173
  # opportunity for the race condition of switching DRBD to primary
4174
  # before handshaking occured, but we do not eliminate it
4175

    
4176
  # The proper fix would be to wait (with some limits) until the
4177
  # connection has been made and drbd transitions from WFConnection
4178
  # into any other network-connected state (Connected, SyncTarget,
4179
  # SyncSource, etc.)
4180

    
4181
  # 1st pass, assemble on all nodes in secondary mode
4182
  for inst_disk in disks:
4183
    for node, node_disk in inst_disk.ComputeNodeTree(instance.primary_node):
4184
      if ignore_size:
4185
        node_disk = node_disk.Copy()
4186
        node_disk.UnsetSize()
4187
      lu.cfg.SetDiskID(node_disk, node)
4188
      result = lu.rpc.call_blockdev_assemble(node, node_disk, iname, False)
4189
      msg = result.fail_msg
4190
      if msg:
4191
        lu.proc.LogWarning("Could not prepare block device %s on node %s"
4192
                           " (is_primary=False, pass=1): %s",
4193
                           inst_disk.iv_name, node, msg)
4194
        if not ignore_secondaries:
4195
          disks_ok = False
4196

    
4197
  # FIXME: race condition on drbd migration to primary
4198

    
4199
  # 2nd pass, do only the primary node
4200
  for inst_disk in disks:
4201
    dev_path = None
4202

    
4203
    for node, node_disk in inst_disk.ComputeNodeTree(instance.primary_node):
4204
      if node != instance.primary_node:
4205
        continue
4206
      if ignore_size:
4207
        node_disk = node_disk.Copy()
4208
        node_disk.UnsetSize()
4209
      lu.cfg.SetDiskID(node_disk, node)
4210
      result = lu.rpc.call_blockdev_assemble(node, node_disk, iname, True)
4211
      msg = result.fail_msg
4212
      if msg:
4213
        lu.proc.LogWarning("Could not prepare block device %s on node %s"
4214
                           " (is_primary=True, pass=2): %s",
4215
                           inst_disk.iv_name, node, msg)
4216
        disks_ok = False
4217
      else:
4218
        dev_path = result.payload
4219

    
4220
    device_info.append((instance.primary_node, inst_disk.iv_name, dev_path))
4221

    
4222
  # leave the disks configured for the primary node
4223
  # this is a workaround that would be fixed better by
4224
  # improving the logical/physical id handling
4225
  for disk in disks:
4226
    lu.cfg.SetDiskID(disk, instance.primary_node)
4227

    
4228
  return disks_ok, device_info
4229

    
4230

    
4231
def _StartInstanceDisks(lu, instance, force):
4232
  """Start the disks of an instance.
4233

4234
  """
4235
  disks_ok, _ = _AssembleInstanceDisks(lu, instance,
4236
                                           ignore_secondaries=force)
4237
  if not disks_ok:
4238
    _ShutdownInstanceDisks(lu, instance)
4239
    if force is not None and not force:
4240
      lu.proc.LogWarning("", hint="If the message above refers to a"
4241
                         " secondary node,"
4242
                         " you can retry the operation using '--force'.")
4243
    raise errors.OpExecError("Disk consistency error")
4244

    
4245

    
4246
class LUDeactivateInstanceDisks(NoHooksLU):
4247
  """Shutdown an instance's disks.
4248

4249
  """
4250
  _OP_PARAMS = [
4251
    _PInstanceName,
4252
    ]
4253
  REQ_BGL = False
4254

    
4255
  def ExpandNames(self):
4256
    self._ExpandAndLockInstance()
4257
    self.needed_locks[locking.LEVEL_NODE] = []
4258
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
4259

    
4260
  def DeclareLocks(self, level):
4261
    if level == locking.LEVEL_NODE:
4262
      self._LockInstancesNodes()
4263

    
4264
  def CheckPrereq(self):
4265
    """Check prerequisites.
4266

4267
    This checks that the instance is in the cluster.
4268

4269
    """
4270
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4271
    assert self.instance is not None, \
4272
      "Cannot retrieve locked instance %s" % self.op.instance_name
4273

    
4274
  def Exec(self, feedback_fn):
4275
    """Deactivate the disks
4276

4277
    """
4278
    instance = self.instance
4279
    _SafeShutdownInstanceDisks(self, instance)
4280

    
4281

    
4282
def _SafeShutdownInstanceDisks(lu, instance, disks=None):
4283
  """Shutdown block devices of an instance.
4284

4285
  This function checks if an instance is running, before calling
4286
  _ShutdownInstanceDisks.
4287

4288
  """
4289
  _CheckInstanceDown(lu, instance, "cannot shutdown disks")
4290
  _ShutdownInstanceDisks(lu, instance, disks=disks)
4291

    
4292

    
4293
def _ExpandCheckDisks(instance, disks):
4294
  """Return the instance disks selected by the disks list
4295

4296
  @type disks: list of L{objects.Disk} or None
4297
  @param disks: selected disks
4298
  @rtype: list of L{objects.Disk}
4299
  @return: selected instance disks to act on
4300

4301
  """
4302
  if disks is None:
4303
    return instance.disks
4304
  else:
4305
    if not set(disks).issubset(instance.disks):
4306
      raise errors.ProgrammerError("Can only act on disks belonging to the"
4307
                                   " target instance")
4308
    return disks
4309

    
4310

    
4311
def _ShutdownInstanceDisks(lu, instance, disks=None, ignore_primary=False):
4312
  """Shutdown block devices of an instance.
4313

4314
  This does the shutdown on all nodes of the instance.
4315

4316
  If the ignore_primary is false, errors on the primary node are
4317
  ignored.
4318

4319
  """
4320
  all_result = True
4321
  disks = _ExpandCheckDisks(instance, disks)
4322

    
4323
  for disk in disks:
4324
    for node, top_disk in disk.ComputeNodeTree(instance.primary_node):
4325
      lu.cfg.SetDiskID(top_disk, node)
4326
      result = lu.rpc.call_blockdev_shutdown(node, top_disk)
4327
      msg = result.fail_msg
4328
      if msg:
4329
        lu.LogWarning("Could not shutdown block device %s on node %s: %s",
4330
                      disk.iv_name, node, msg)
4331
        if not ignore_primary or node != instance.primary_node:
4332
          all_result = False
4333
  return all_result
4334

    
4335

    
4336
def _CheckNodeFreeMemory(lu, node, reason, requested, hypervisor_name):
4337
  """Checks if a node has enough free memory.
4338

4339
  This function check if a given node has the needed amount of free
4340
  memory. In case the node has less memory or we cannot get the
4341
  information from the node, this function raise an OpPrereqError
4342
  exception.
4343

4344
  @type lu: C{LogicalUnit}
4345
  @param lu: a logical unit from which we get configuration data
4346
  @type node: C{str}
4347
  @param node: the node to check
4348
  @type reason: C{str}
4349
  @param reason: string to use in the error message
4350
  @type requested: C{int}
4351
  @param requested: the amount of memory in MiB to check for
4352
  @type hypervisor_name: C{str}
4353
  @param hypervisor_name: the hypervisor to ask for memory stats
4354
  @raise errors.OpPrereqError: if the node doesn't have enough memory, or
4355
      we cannot check the node
4356

4357
  """
4358
  nodeinfo = lu.rpc.call_node_info([node], lu.cfg.GetVGName(), hypervisor_name)
4359
  nodeinfo[node].Raise("Can't get data from node %s" % node,
4360
                       prereq=True, ecode=errors.ECODE_ENVIRON)
4361
  free_mem = nodeinfo[node].payload.get('memory_free', None)
4362
  if not isinstance(free_mem, int):
4363
    raise errors.OpPrereqError("Can't compute free memory on node %s, result"
4364
                               " was '%s'" % (node, free_mem),
4365
                               errors.ECODE_ENVIRON)
4366
  if requested > free_mem:
4367
    raise errors.OpPrereqError("Not enough memory on node %s for %s:"
4368
                               " needed %s MiB, available %s MiB" %
4369
                               (node, reason, requested, free_mem),
4370
                               errors.ECODE_NORES)
4371

    
4372

    
4373
def _CheckNodesFreeDisk(lu, nodenames, requested):
4374
  """Checks if nodes have enough free disk space in the default VG.
4375

4376
  This function check if all given nodes have the needed amount of
4377
  free disk. In case any node has less disk or we cannot get the
4378
  information from the node, this function raise an OpPrereqError
4379
  exception.
4380

4381
  @type lu: C{LogicalUnit}
4382
  @param lu: a logical unit from which we get configuration data
4383
  @type nodenames: C{list}
4384
  @param nodenames: the list of node names to check
4385
  @type requested: C{int}
4386
  @param requested: the amount of disk in MiB to check for
4387
  @raise errors.OpPrereqError: if the node doesn't have enough disk, or
4388
      we cannot check the node
4389

4390
  """
4391
  nodeinfo = lu.rpc.call_node_info(nodenames, lu.cfg.GetVGName(),
4392
                                   lu.cfg.GetHypervisorType())
4393
  for node in nodenames:
4394
    info = nodeinfo[node]
4395
    info.Raise("Cannot get current information from node %s" % node,
4396
               prereq=True, ecode=errors.ECODE_ENVIRON)
4397
    vg_free = info.payload.get("vg_free", None)
4398
    if not isinstance(vg_free, int):
4399
      raise errors.OpPrereqError("Can't compute free disk space on node %s,"
4400
                                 " result was '%s'" % (node, vg_free),
4401
                                 errors.ECODE_ENVIRON)
4402
    if requested > vg_free:
4403
      raise errors.OpPrereqError("Not enough disk space on target node %s:"
4404
                                 " required %d MiB, available %d MiB" %
4405
                                 (node, requested, vg_free),
4406
                                 errors.ECODE_NORES)
4407

    
4408

    
4409
class LUStartupInstance(LogicalUnit):
4410
  """Starts an instance.
4411

4412
  """
4413
  HPATH = "instance-start"
4414
  HTYPE = constants.HTYPE_INSTANCE
4415
  _OP_PARAMS = [
4416
    _PInstanceName,
4417
    _PForce,
4418
    _PIgnoreOfflineNodes,
4419
    ("hvparams", ht.EmptyDict, ht.TDict),
4420
    ("beparams", ht.EmptyDict, ht.TDict),
4421
    ]
4422
  REQ_BGL = False
4423

    
4424
  def CheckArguments(self):
4425
    # extra beparams
4426
    if self.op.beparams:
4427
      # fill the beparams dict
4428
      utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
4429

    
4430
  def ExpandNames(self):
4431
    self._ExpandAndLockInstance()
4432

    
4433
  def BuildHooksEnv(self):
4434
    """Build hooks env.
4435

4436
    This runs on master, primary and secondary nodes of the instance.
4437

4438
    """
4439
    env = {
4440
      "FORCE": self.op.force,
4441
      }
4442
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
4443
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4444
    return env, nl, nl
4445

    
4446
  def CheckPrereq(self):
4447
    """Check prerequisites.
4448

4449
    This checks that the instance is in the cluster.
4450

4451
    """
4452
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4453
    assert self.instance is not None, \
4454
      "Cannot retrieve locked instance %s" % self.op.instance_name
4455

    
4456
    # extra hvparams
4457
    if self.op.hvparams:
4458
      # check hypervisor parameter syntax (locally)
4459
      cluster = self.cfg.GetClusterInfo()
4460
      utils.ForceDictType(self.op.hvparams, constants.HVS_PARAMETER_TYPES)
4461
      filled_hvp = cluster.FillHV(instance)
4462
      filled_hvp.update(self.op.hvparams)
4463
      hv_type = hypervisor.GetHypervisor(instance.hypervisor)
4464
      hv_type.CheckParameterSyntax(filled_hvp)
4465
      _CheckHVParams(self, instance.all_nodes, instance.hypervisor, filled_hvp)
4466

    
4467
    self.primary_offline = self.cfg.GetNodeInfo(instance.primary_node).offline
4468

    
4469
    if self.primary_offline and self.op.ignore_offline_nodes:
4470
      self.proc.LogWarning("Ignoring offline primary node")
4471

    
4472
      if self.op.hvparams or self.op.beparams:
4473
        self.proc.LogWarning("Overridden parameters are ignored")
4474
    else:
4475
      _CheckNodeOnline(self, instance.primary_node)
4476

    
4477
      bep = self.cfg.GetClusterInfo().FillBE(instance)
4478

    
4479
      # check bridges existence
4480
      _CheckInstanceBridgesExist(self, instance)
4481

    
4482
      remote_info = self.rpc.call_instance_info(instance.primary_node,
4483
                                                instance.name,
4484
                                                instance.hypervisor)
4485
      remote_info.Raise("Error checking node %s" % instance.primary_node,
4486
                        prereq=True, ecode=errors.ECODE_ENVIRON)
4487
      if not remote_info.payload: # not running already
4488
        _CheckNodeFreeMemory(self, instance.primary_node,
4489
                             "starting instance %s" % instance.name,
4490
                             bep[constants.BE_MEMORY], instance.hypervisor)
4491

    
4492
  def Exec(self, feedback_fn):
4493
    """Start the instance.
4494

4495
    """
4496
    instance = self.instance
4497
    force = self.op.force
4498

    
4499
    self.cfg.MarkInstanceUp(instance.name)
4500

    
4501
    if self.primary_offline:
4502
      assert self.op.ignore_offline_nodes
4503
      self.proc.LogInfo("Primary node offline, marked instance as started")
4504
    else:
4505
      node_current = instance.primary_node
4506

    
4507
      _StartInstanceDisks(self, instance, force)
4508

    
4509
      result = self.rpc.call_instance_start(node_current, instance,
4510
                                            self.op.hvparams, self.op.beparams)
4511
      msg = result.fail_msg
4512
      if msg:
4513
        _ShutdownInstanceDisks(self, instance)
4514
        raise errors.OpExecError("Could not start instance: %s" % msg)
4515

    
4516

    
4517
class LURebootInstance(LogicalUnit):
4518
  """Reboot an instance.
4519

4520
  """
4521
  HPATH = "instance-reboot"
4522
  HTYPE = constants.HTYPE_INSTANCE
4523
  _OP_PARAMS = [
4524
    _PInstanceName,
4525
    ("ignore_secondaries", False, ht.TBool),
4526
    ("reboot_type", ht.NoDefault, ht.TElemOf(constants.REBOOT_TYPES)),
4527
    _PShutdownTimeout,
4528
    ]
4529
  REQ_BGL = False
4530

    
4531
  def ExpandNames(self):
4532
    self._ExpandAndLockInstance()
4533

    
4534
  def BuildHooksEnv(self):
4535
    """Build hooks env.
4536

4537
    This runs on master, primary and secondary nodes of the instance.
4538

4539
    """
4540
    env = {
4541
      "IGNORE_SECONDARIES": self.op.ignore_secondaries,
4542
      "REBOOT_TYPE": self.op.reboot_type,
4543
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
4544
      }
4545
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
4546
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4547
    return env, nl, nl
4548

    
4549
  def CheckPrereq(self):
4550
    """Check prerequisites.
4551

4552
    This checks that the instance is in the cluster.
4553

4554
    """
4555
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4556
    assert self.instance is not None, \
4557
      "Cannot retrieve locked instance %s" % self.op.instance_name
4558

    
4559
    _CheckNodeOnline(self, instance.primary_node)
4560

    
4561
    # check bridges existence
4562
    _CheckInstanceBridgesExist(self, instance)
4563

    
4564
  def Exec(self, feedback_fn):
4565
    """Reboot the instance.
4566

4567
    """
4568
    instance = self.instance
4569
    ignore_secondaries = self.op.ignore_secondaries
4570
    reboot_type = self.op.reboot_type
4571

    
4572
    node_current = instance.primary_node
4573

    
4574
    if reboot_type in [constants.INSTANCE_REBOOT_SOFT,
4575
                       constants.INSTANCE_REBOOT_HARD]:
4576
      for disk in instance.disks:
4577
        self.cfg.SetDiskID(disk, node_current)
4578
      result = self.rpc.call_instance_reboot(node_current, instance,
4579
                                             reboot_type,
4580
                                             self.op.shutdown_timeout)
4581
      result.Raise("Could not reboot instance")
4582
    else:
4583
      result = self.rpc.call_instance_shutdown(node_current, instance,
4584
                                               self.op.shutdown_timeout)
4585
      result.Raise("Could not shutdown instance for full reboot")
4586
      _ShutdownInstanceDisks(self, instance)
4587
      _StartInstanceDisks(self, instance, ignore_secondaries)
4588
      result = self.rpc.call_instance_start(node_current, instance, None, None)
4589
      msg = result.fail_msg
4590
      if msg:
4591
        _ShutdownInstanceDisks(self, instance)
4592
        raise errors.OpExecError("Could not start instance for"
4593
                                 " full reboot: %s" % msg)
4594

    
4595
    self.cfg.MarkInstanceUp(instance.name)
4596

    
4597

    
4598
class LUShutdownInstance(LogicalUnit):
4599
  """Shutdown an instance.
4600

4601
  """
4602
  HPATH = "instance-stop"
4603
  HTYPE = constants.HTYPE_INSTANCE
4604
  _OP_PARAMS = [
4605
    _PInstanceName,
4606
    _PIgnoreOfflineNodes,
4607
    ("timeout", constants.DEFAULT_SHUTDOWN_TIMEOUT, ht.TPositiveInt),
4608
    ]
4609
  REQ_BGL = False
4610

    
4611
  def ExpandNames(self):
4612
    self._ExpandAndLockInstance()
4613

    
4614
  def BuildHooksEnv(self):
4615
    """Build hooks env.
4616

4617
    This runs on master, primary and secondary nodes of the instance.
4618

4619
    """
4620
    env = _BuildInstanceHookEnvByObject(self, self.instance)
4621
    env["TIMEOUT"] = self.op.timeout
4622
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4623
    return env, nl, nl
4624

    
4625
  def CheckPrereq(self):
4626
    """Check prerequisites.
4627

4628
    This checks that the instance is in the cluster.
4629

4630
    """
4631
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4632
    assert self.instance is not None, \
4633
      "Cannot retrieve locked instance %s" % self.op.instance_name
4634

    
4635
    self.primary_offline = \
4636
      self.cfg.GetNodeInfo(self.instance.primary_node).offline
4637

    
4638
    if self.primary_offline and self.op.ignore_offline_nodes:
4639
      self.proc.LogWarning("Ignoring offline primary node")
4640
    else:
4641
      _CheckNodeOnline(self, self.instance.primary_node)
4642

    
4643
  def Exec(self, feedback_fn):
4644
    """Shutdown the instance.
4645

4646
    """
4647
    instance = self.instance
4648
    node_current = instance.primary_node
4649
    timeout = self.op.timeout
4650

    
4651
    self.cfg.MarkInstanceDown(instance.name)
4652

    
4653
    if self.primary_offline:
4654
      assert self.op.ignore_offline_nodes
4655
      self.proc.LogInfo("Primary node offline, marked instance as stopped")
4656
    else:
4657
      result = self.rpc.call_instance_shutdown(node_current, instance, timeout)
4658
      msg = result.fail_msg
4659
      if msg:
4660
        self.proc.LogWarning("Could not shutdown instance: %s" % msg)
4661

    
4662
      _ShutdownInstanceDisks(self, instance)
4663

    
4664

    
4665
class LUReinstallInstance(LogicalUnit):
4666
  """Reinstall an instance.
4667

4668
  """
4669
  HPATH = "instance-reinstall"
4670
  HTYPE = constants.HTYPE_INSTANCE
4671
  _OP_PARAMS = [
4672
    _PInstanceName,
4673
    ("os_type", None, ht.TMaybeString),
4674
    ("force_variant", False, ht.TBool),
4675
    ("osparams", None, ht.TOr(ht.TDict, ht.TNone)),
4676
    ]
4677
  REQ_BGL = False
4678

    
4679
  def ExpandNames(self):
4680
    self._ExpandAndLockInstance()
4681

    
4682
  def BuildHooksEnv(self):
4683
    """Build hooks env.
4684

4685
    This runs on master, primary and secondary nodes of the instance.
4686

4687
    """
4688
    env = _BuildInstanceHookEnvByObject(self, self.instance)
4689
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4690
    return env, nl, nl
4691

    
4692
  def CheckPrereq(self):
4693
    """Check prerequisites.
4694

4695
    This checks that the instance is in the cluster and is not running.
4696

4697
    """
4698
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4699
    assert instance is not None, \
4700
      "Cannot retrieve locked instance %s" % self.op.instance_name
4701
    _CheckNodeOnline(self, instance.primary_node)
4702

    
4703
    if instance.disk_template == constants.DT_DISKLESS:
4704
      raise errors.OpPrereqError("Instance '%s' has no disks" %
4705
                                 self.op.instance_name,
4706
                                 errors.ECODE_INVAL)
4707
    _CheckInstanceDown(self, instance, "cannot reinstall")
4708

    
4709
    if self.op.os_type is not None:
4710
      # OS verification
4711
      pnode = _ExpandNodeName(self.cfg, instance.primary_node)
4712
      _CheckNodeHasOS(self, pnode, self.op.os_type, self.op.force_variant)
4713
      instance_os = self.op.os_type
4714
    else:
4715
      instance_os = instance.os
4716

    
4717
    nodelist = list(instance.all_nodes)
4718

    
4719
    if self.op.osparams:
4720
      i_osdict = _GetUpdatedParams(instance.osparams, self.op.osparams)
4721
      _CheckOSParams(self, True, nodelist, instance_os, i_osdict)
4722
      self.os_inst = i_osdict # the new dict (without defaults)
4723
    else:
4724
      self.os_inst = None
4725

    
4726
    self.instance = instance
4727

    
4728
  def Exec(self, feedback_fn):
4729
    """Reinstall the instance.
4730

4731
    """
4732
    inst = self.instance
4733

    
4734
    if self.op.os_type is not None:
4735
      feedback_fn("Changing OS to '%s'..." % self.op.os_type)
4736
      inst.os = self.op.os_type
4737
      # Write to configuration
4738
      self.cfg.Update(inst, feedback_fn)
4739

    
4740
    _StartInstanceDisks(self, inst, None)
4741
    try:
4742
      feedback_fn("Running the instance OS create scripts...")
4743
      # FIXME: pass debug option from opcode to backend
4744
      result = self.rpc.call_instance_os_add(inst.primary_node, inst, True,
4745
                                             self.op.debug_level,
4746
                                             osparams=self.os_inst)
4747
      result.Raise("Could not install OS for instance %s on node %s" %
4748
                   (inst.name, inst.primary_node))
4749
    finally:
4750
      _ShutdownInstanceDisks(self, inst)
4751

    
4752

    
4753
class LURecreateInstanceDisks(LogicalUnit):
4754
  """Recreate an instance's missing disks.
4755

4756
  """
4757
  HPATH = "instance-recreate-disks"
4758
  HTYPE = constants.HTYPE_INSTANCE
4759
  _OP_PARAMS = [
4760
    _PInstanceName,
4761
    ("disks", ht.EmptyList, ht.TListOf(ht.TPositiveInt)),
4762
    ]
4763
  REQ_BGL = False
4764

    
4765
  def ExpandNames(self):
4766
    self._ExpandAndLockInstance()
4767

    
4768
  def BuildHooksEnv(self):
4769
    """Build hooks env.
4770

4771
    This runs on master, primary and secondary nodes of the instance.
4772

4773
    """
4774
    env = _BuildInstanceHookEnvByObject(self, self.instance)
4775
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4776
    return env, nl, nl
4777

    
4778
  def CheckPrereq(self):
4779
    """Check prerequisites.
4780

4781
    This checks that the instance is in the cluster and is not running.
4782

4783
    """
4784
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4785
    assert instance is not None, \
4786
      "Cannot retrieve locked instance %s" % self.op.instance_name
4787
    _CheckNodeOnline(self, instance.primary_node)
4788

    
4789
    if instance.disk_template == constants.DT_DISKLESS:
4790
      raise errors.OpPrereqError("Instance '%s' has no disks" %
4791
                                 self.op.instance_name, errors.ECODE_INVAL)
4792
    _CheckInstanceDown(self, instance, "cannot recreate disks")
4793

    
4794
    if not self.op.disks:
4795
      self.op.disks = range(len(instance.disks))
4796
    else:
4797
      for idx in self.op.disks:
4798
        if idx >= len(instance.disks):
4799
          raise errors.OpPrereqError("Invalid disk index passed '%s'" % idx,
4800
                                     errors.ECODE_INVAL)
4801

    
4802
    self.instance = instance
4803

    
4804
  def Exec(self, feedback_fn):
4805
    """Recreate the disks.
4806

4807
    """
4808
    to_skip = []
4809
    for idx, _ in enumerate(self.instance.disks):
4810
      if idx not in self.op.disks: # disk idx has not been passed in
4811
        to_skip.append(idx)
4812
        continue
4813

    
4814
    _CreateDisks(self, self.instance, to_skip=to_skip)
4815

    
4816

    
4817
class LURenameInstance(LogicalUnit):
4818
  """Rename an instance.
4819

4820
  """
4821
  HPATH = "instance-rename"
4822
  HTYPE = constants.HTYPE_INSTANCE
4823
  _OP_PARAMS = [
4824
    _PInstanceName,
4825
    ("new_name", ht.NoDefault, ht.TNonEmptyString),
4826
    ("ip_check", False, ht.TBool),
4827
    ("name_check", True, ht.TBool),
4828
    ]
4829

    
4830
  def CheckArguments(self):
4831
    """Check arguments.
4832

4833
    """
4834
    if self.op.ip_check and not self.op.name_check:
4835
      # TODO: make the ip check more flexible and not depend on the name check
4836
      raise errors.OpPrereqError("Cannot do ip check without a name check",
4837
                                 errors.ECODE_INVAL)
4838

    
4839
  def BuildHooksEnv(self):
4840
    """Build hooks env.
4841

4842
    This runs on master, primary and secondary nodes of the instance.
4843

4844
    """
4845
    env = _BuildInstanceHookEnvByObject(self, self.instance)
4846
    env["INSTANCE_NEW_NAME"] = self.op.new_name
4847
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
4848
    return env, nl, nl
4849

    
4850
  def CheckPrereq(self):
4851
    """Check prerequisites.
4852

4853
    This checks that the instance is in the cluster and is not running.
4854

4855
    """
4856
    self.op.instance_name = _ExpandInstanceName(self.cfg,
4857
                                                self.op.instance_name)
4858
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4859
    assert instance is not None
4860
    _CheckNodeOnline(self, instance.primary_node)
4861
    _CheckInstanceDown(self, instance, "cannot rename")
4862
    self.instance = instance
4863

    
4864
    new_name = self.op.new_name
4865
    if self.op.name_check:
4866
      hostname = netutils.GetHostname(name=new_name)
4867
      new_name = self.op.new_name = hostname.name
4868
      if (self.op.ip_check and
4869
          netutils.TcpPing(hostname.ip, constants.DEFAULT_NODED_PORT)):
4870
        raise errors.OpPrereqError("IP %s of instance %s already in use" %
4871
                                   (hostname.ip, new_name),
4872
                                   errors.ECODE_NOTUNIQUE)
4873

    
4874
    instance_list = self.cfg.GetInstanceList()
4875
    if new_name in instance_list:
4876
      raise errors.OpPrereqError("Instance '%s' is already in the cluster" %
4877
                                 new_name, errors.ECODE_EXISTS)
4878

    
4879
  def Exec(self, feedback_fn):
4880
    """Reinstall the instance.
4881

4882
    """
4883
    inst = self.instance
4884
    old_name = inst.name
4885

    
4886
    if inst.disk_template == constants.DT_FILE:
4887
      old_file_storage_dir = os.path.dirname(inst.disks[0].logical_id[1])
4888

    
4889
    self.cfg.RenameInstance(inst.name, self.op.new_name)
4890
    # Change the instance lock. This is definitely safe while we hold the BGL
4891
    self.context.glm.remove(locking.LEVEL_INSTANCE, old_name)
4892
    self.context.glm.add(locking.LEVEL_INSTANCE, self.op.new_name)
4893

    
4894
    # re-read the instance from the configuration after rename
4895
    inst = self.cfg.GetInstanceInfo(self.op.new_name)
4896

    
4897
    if inst.disk_template == constants.DT_FILE:
4898
      new_file_storage_dir = os.path.dirname(inst.disks[0].logical_id[1])
4899
      result = self.rpc.call_file_storage_dir_rename(inst.primary_node,
4900
                                                     old_file_storage_dir,
4901
                                                     new_file_storage_dir)
4902
      result.Raise("Could not rename on node %s directory '%s' to '%s'"
4903
                   " (but the instance has been renamed in Ganeti)" %
4904
                   (inst.primary_node, old_file_storage_dir,
4905
                    new_file_storage_dir))
4906

    
4907
    _StartInstanceDisks(self, inst, None)
4908
    try:
4909
      result = self.rpc.call_instance_run_rename(inst.primary_node, inst,
4910
                                                 old_name, self.op.debug_level)
4911
      msg = result.fail_msg
4912
      if msg:
4913
        msg = ("Could not run OS rename script for instance %s on node %s"
4914
               " (but the instance has been renamed in Ganeti): %s" %
4915
               (inst.name, inst.primary_node, msg))
4916
        self.proc.LogWarning(msg)
4917
    finally:
4918
      _ShutdownInstanceDisks(self, inst)
4919

    
4920
    return inst.name
4921

    
4922

    
4923
class LURemoveInstance(LogicalUnit):
4924
  """Remove an instance.
4925

4926
  """
4927
  HPATH = "instance-remove"
4928
  HTYPE = constants.HTYPE_INSTANCE
4929
  _OP_PARAMS = [
4930
    _PInstanceName,
4931
    ("ignore_failures", False, ht.TBool),
4932
    _PShutdownTimeout,
4933
    ]
4934
  REQ_BGL = False
4935

    
4936
  def ExpandNames(self):
4937
    self._ExpandAndLockInstance()
4938
    self.needed_locks[locking.LEVEL_NODE] = []
4939
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
4940

    
4941
  def DeclareLocks(self, level):
4942
    if level == locking.LEVEL_NODE:
4943
      self._LockInstancesNodes()
4944

    
4945
  def BuildHooksEnv(self):
4946
    """Build hooks env.
4947

4948
    This runs on master, primary and secondary nodes of the instance.
4949

4950
    """
4951
    env = _BuildInstanceHookEnvByObject(self, self.instance)
4952
    env["SHUTDOWN_TIMEOUT"] = self.op.shutdown_timeout
4953
    nl = [self.cfg.GetMasterNode()]
4954
    nl_post = list(self.instance.all_nodes) + nl
4955
    return env, nl, nl_post
4956

    
4957
  def CheckPrereq(self):
4958
    """Check prerequisites.
4959

4960
    This checks that the instance is in the cluster.
4961

4962
    """
4963
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
4964
    assert self.instance is not None, \
4965
      "Cannot retrieve locked instance %s" % self.op.instance_name
4966

    
4967
  def Exec(self, feedback_fn):
4968
    """Remove the instance.
4969

4970
    """
4971
    instance = self.instance
4972
    logging.info("Shutting down instance %s on node %s",
4973
                 instance.name, instance.primary_node)
4974

    
4975
    result = self.rpc.call_instance_shutdown(instance.primary_node, instance,
4976
                                             self.op.shutdown_timeout)
4977
    msg = result.fail_msg
4978
    if msg:
4979
      if self.op.ignore_failures:
4980
        feedback_fn("Warning: can't shutdown instance: %s" % msg)
4981
      else:
4982
        raise errors.OpExecError("Could not shutdown instance %s on"
4983
                                 " node %s: %s" %
4984
                                 (instance.name, instance.primary_node, msg))
4985

    
4986
    _RemoveInstance(self, feedback_fn, instance, self.op.ignore_failures)
4987

    
4988

    
4989
def _RemoveInstance(lu, feedback_fn, instance, ignore_failures):
4990
  """Utility function to remove an instance.
4991

4992
  """
4993
  logging.info("Removing block devices for instance %s", instance.name)
4994

    
4995
  if not _RemoveDisks(lu, instance):
4996
    if not ignore_failures:
4997
      raise errors.OpExecError("Can't remove instance's disks")
4998
    feedback_fn("Warning: can't remove instance's disks")
4999

    
5000
  logging.info("Removing instance %s out of cluster config", instance.name)
5001

    
5002
  lu.cfg.RemoveInstance(instance.name)
5003

    
5004
  assert not lu.remove_locks.get(locking.LEVEL_INSTANCE), \
5005
    "Instance lock removal conflict"
5006

    
5007
  # Remove lock for the instance
5008
  lu.remove_locks[locking.LEVEL_INSTANCE] = instance.name
5009

    
5010

    
5011
class LUQueryInstances(NoHooksLU):
5012
  """Logical unit for querying instances.
5013

5014
  """
5015
  # pylint: disable-msg=W0142
5016
  _OP_PARAMS = [
5017
    ("output_fields", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
5018
    ("names", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
5019
    ("use_locking", False, ht.TBool),
5020
    ]
5021
  REQ_BGL = False
5022
  _SIMPLE_FIELDS = ["name", "os", "network_port", "hypervisor",
5023
                    "serial_no", "ctime", "mtime", "uuid"]
5024
  _FIELDS_STATIC = utils.FieldSet(*["name", "os", "pnode", "snodes",
5025
                                    "admin_state",
5026
                                    "disk_template", "ip", "mac", "bridge",
5027
                                    "nic_mode", "nic_link",
5028
                                    "sda_size", "sdb_size", "vcpus", "tags",
5029
                                    "network_port", "beparams",
5030
                                    r"(disk)\.(size)/([0-9]+)",
5031
                                    r"(disk)\.(sizes)", "disk_usage",
5032
                                    r"(nic)\.(mac|ip|mode|link)/([0-9]+)",
5033
                                    r"(nic)\.(bridge)/([0-9]+)",
5034
                                    r"(nic)\.(macs|ips|modes|links|bridges)",
5035
                                    r"(disk|nic)\.(count)",
5036
                                    "hvparams", "custom_hvparams",
5037
                                    "custom_beparams", "custom_nicparams",
5038
                                    ] + _SIMPLE_FIELDS +
5039
                                  ["hv/%s" % name
5040
                                   for name in constants.HVS_PARAMETERS
5041
                                   if name not in constants.HVC_GLOBALS] +
5042
                                  ["be/%s" % name
5043
                                   for name in constants.BES_PARAMETERS])
5044
  _FIELDS_DYNAMIC = utils.FieldSet("oper_state",
5045
                                   "oper_ram",
5046
                                   "oper_vcpus",
5047
                                   "status")
5048

    
5049

    
5050
  def CheckArguments(self):
5051
    _CheckOutputFields(static=self._FIELDS_STATIC,
5052
                       dynamic=self._FIELDS_DYNAMIC,
5053
                       selected=self.op.output_fields)
5054

    
5055
  def ExpandNames(self):
5056
    self.needed_locks = {}
5057
    self.share_locks[locking.LEVEL_INSTANCE] = 1
5058
    self.share_locks[locking.LEVEL_NODE] = 1
5059

    
5060
    if self.op.names:
5061
      self.wanted = _GetWantedInstances(self, self.op.names)
5062
    else:
5063
      self.wanted = locking.ALL_SET
5064

    
5065
    self.do_node_query = self._FIELDS_STATIC.NonMatching(self.op.output_fields)
5066
    self.do_locking = self.do_node_query and self.op.use_locking
5067
    if self.do_locking:
5068
      self.needed_locks[locking.LEVEL_INSTANCE] = self.wanted
5069
      self.needed_locks[locking.LEVEL_NODE] = []
5070
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5071

    
5072
  def DeclareLocks(self, level):
5073
    if level == locking.LEVEL_NODE and self.do_locking:
5074
      self._LockInstancesNodes()
5075

    
5076
  def Exec(self, feedback_fn):
5077
    """Computes the list of nodes and their attributes.
5078

5079
    """
5080
    # pylint: disable-msg=R0912
5081
    # way too many branches here
5082
    all_info = self.cfg.GetAllInstancesInfo()
5083
    if self.wanted == locking.ALL_SET:
5084
      # caller didn't specify instance names, so ordering is not important
5085
      if self.do_locking:
5086
        instance_names = self.acquired_locks[locking.LEVEL_INSTANCE]
5087
      else:
5088
        instance_names = all_info.keys()
5089
      instance_names = utils.NiceSort(instance_names)
5090
    else:
5091
      # caller did specify names, so we must keep the ordering
5092
      if self.do_locking:
5093
        tgt_set = self.acquired_locks[locking.LEVEL_INSTANCE]
5094
      else:
5095
        tgt_set = all_info.keys()
5096
      missing = set(self.wanted).difference(tgt_set)
5097
      if missing:
5098
        raise errors.OpExecError("Some instances were removed before"
5099
                                 " retrieving their data: %s" % missing)
5100
      instance_names = self.wanted
5101

    
5102
    instance_list = [all_info[iname] for iname in instance_names]
5103

    
5104
    # begin data gathering
5105

    
5106
    nodes = frozenset([inst.primary_node for inst in instance_list])
5107
    hv_list = list(set([inst.hypervisor for inst in instance_list]))
5108

    
5109
    bad_nodes = []
5110
    off_nodes = []
5111
    if self.do_node_query:
5112
      live_data = {}
5113
      node_data = self.rpc.call_all_instances_info(nodes, hv_list)
5114
      for name in nodes:
5115
        result = node_data[name]
5116
        if result.offline:
5117
          # offline nodes will be in both lists
5118
          off_nodes.append(name)
5119
        if result.fail_msg:
5120
          bad_nodes.append(name)
5121
        else:
5122
          if result.payload:
5123
            live_data.update(result.payload)
5124
          # else no instance is alive
5125
    else:
5126
      live_data = dict([(name, {}) for name in instance_names])
5127

    
5128
    # end data gathering
5129

    
5130
    HVPREFIX = "hv/"
5131
    BEPREFIX = "be/"
5132
    output = []
5133
    cluster = self.cfg.GetClusterInfo()
5134
    for instance in instance_list:
5135
      iout = []
5136
      i_hv = cluster.FillHV(instance, skip_globals=True)
5137
      i_be = cluster.FillBE(instance)
5138
      i_nicp = [cluster.SimpleFillNIC(nic.nicparams) for nic in instance.nics]
5139
      for field in self.op.output_fields:
5140
        st_match = self._FIELDS_STATIC.Matches(field)
5141
        if field in self._SIMPLE_FIELDS:
5142
          val = getattr(instance, field)
5143
        elif field == "pnode":
5144
          val = instance.primary_node
5145
        elif field == "snodes":
5146
          val = list(instance.secondary_nodes)
5147
        elif field == "admin_state":
5148
          val = instance.admin_up
5149
        elif field == "oper_state":
5150
          if instance.primary_node in bad_nodes:
5151
            val = None
5152
          else:
5153
            val = bool(live_data.get(instance.name))
5154
        elif field == "status":
5155
          if instance.primary_node in off_nodes:
5156
            val = "ERROR_nodeoffline"
5157
          elif instance.primary_node in bad_nodes:
5158
            val = "ERROR_nodedown"
5159
          else:
5160
            running = bool(live_data.get(instance.name))
5161
            if running:
5162
              if instance.admin_up:
5163
                val = "running"
5164
              else:
5165
                val = "ERROR_up"
5166
            else:
5167
              if instance.admin_up:
5168
                val = "ERROR_down"
5169
              else:
5170
                val = "ADMIN_down"
5171
        elif field == "oper_ram":
5172
          if instance.primary_node in bad_nodes:
5173
            val = None
5174
          elif instance.name in live_data:
5175
            val = live_data[instance.name].get("memory", "?")
5176
          else:
5177
            val = "-"
5178
        elif field == "oper_vcpus":
5179
          if instance.primary_node in bad_nodes:
5180
            val = None
5181
          elif instance.name in live_data:
5182
            val = live_data[instance.name].get("vcpus", "?")
5183
          else:
5184
            val = "-"
5185
        elif field == "vcpus":
5186
          val = i_be[constants.BE_VCPUS]
5187
        elif field == "disk_template":
5188
          val = instance.disk_template
5189
        elif field == "ip":
5190
          if instance.nics:
5191
            val = instance.nics[0].ip
5192
          else:
5193
            val = None
5194
        elif field == "nic_mode":
5195
          if instance.nics:
5196
            val = i_nicp[0][constants.NIC_MODE]
5197
          else:
5198
            val = None
5199
        elif field == "nic_link":
5200
          if instance.nics:
5201
            val = i_nicp[0][constants.NIC_LINK]
5202
          else:
5203
            val = None
5204
        elif field == "bridge":
5205
          if (instance.nics and
5206
              i_nicp[0][constants.NIC_MODE] == constants.NIC_MODE_BRIDGED):
5207
            val = i_nicp[0][constants.NIC_LINK]
5208
          else:
5209
            val = None
5210
        elif field == "mac":
5211
          if instance.nics:
5212
            val = instance.nics[0].mac
5213
          else:
5214
            val = None
5215
        elif field == "custom_nicparams":
5216
          val = [nic.nicparams for nic in instance.nics]
5217
        elif field == "sda_size" or field == "sdb_size":
5218
          idx = ord(field[2]) - ord('a')
5219
          try:
5220
            val = instance.FindDisk(idx).size
5221
          except errors.OpPrereqError:
5222
            val = None
5223
        elif field == "disk_usage": # total disk usage per node
5224
          disk_sizes = [{'size': disk.size} for disk in instance.disks]
5225
          val = _ComputeDiskSize(instance.disk_template, disk_sizes)
5226
        elif field == "tags":
5227
          val = list(instance.GetTags())
5228
        elif field == "custom_hvparams":
5229
          val = instance.hvparams # not filled!
5230
        elif field == "hvparams":
5231
          val = i_hv
5232
        elif (field.startswith(HVPREFIX) and
5233
              field[len(HVPREFIX):] in constants.HVS_PARAMETERS and
5234
              field[len(HVPREFIX):] not in constants.HVC_GLOBALS):
5235
          val = i_hv.get(field[len(HVPREFIX):], None)
5236
        elif field == "custom_beparams":
5237
          val = instance.beparams
5238
        elif field == "beparams":
5239
          val = i_be
5240
        elif (field.startswith(BEPREFIX) and
5241
              field[len(BEPREFIX):] in constants.BES_PARAMETERS):
5242
          val = i_be.get(field[len(BEPREFIX):], None)
5243
        elif st_match and st_match.groups():
5244
          # matches a variable list
5245
          st_groups = st_match.groups()
5246
          if st_groups and st_groups[0] == "disk":
5247
            if st_groups[1] == "count":
5248
              val = len(instance.disks)
5249
            elif st_groups[1] == "sizes":
5250
              val = [disk.size for disk in instance.disks]
5251
            elif st_groups[1] == "size":
5252
              try:
5253
                val = instance.FindDisk(st_groups[2]).size
5254
              except errors.OpPrereqError:
5255
                val = None
5256
            else:
5257
              assert False, "Unhandled disk parameter"
5258
          elif st_groups[0] == "nic":
5259
            if st_groups[1] == "count":
5260
              val = len(instance.nics)
5261
            elif st_groups[1] == "macs":
5262
              val = [nic.mac for nic in instance.nics]
5263
            elif st_groups[1] == "ips":
5264
              val = [nic.ip for nic in instance.nics]
5265
            elif st_groups[1] == "modes":
5266
              val = [nicp[constants.NIC_MODE] for nicp in i_nicp]
5267
            elif st_groups[1] == "links":
5268
              val = [nicp[constants.NIC_LINK] for nicp in i_nicp]
5269
            elif st_groups[1] == "bridges":
5270
              val = []
5271
              for nicp in i_nicp:
5272
                if nicp[constants.NIC_MODE] == constants.NIC_MODE_BRIDGED:
5273
                  val.append(nicp[constants.NIC_LINK])
5274
                else:
5275
                  val.append(None)
5276
            else:
5277
              # index-based item
5278
              nic_idx = int(st_groups[2])
5279
              if nic_idx >= len(instance.nics):
5280
                val = None
5281
              else:
5282
                if st_groups[1] == "mac":
5283
                  val = instance.nics[nic_idx].mac
5284
                elif st_groups[1] == "ip":
5285
                  val = instance.nics[nic_idx].ip
5286
                elif st_groups[1] == "mode":
5287
                  val = i_nicp[nic_idx][constants.NIC_MODE]
5288
                elif st_groups[1] == "link":
5289
                  val = i_nicp[nic_idx][constants.NIC_LINK]
5290
                elif st_groups[1] == "bridge":
5291
                  nic_mode = i_nicp[nic_idx][constants.NIC_MODE]
5292
                  if nic_mode == constants.NIC_MODE_BRIDGED:
5293
                    val = i_nicp[nic_idx][constants.NIC_LINK]
5294
                  else:
5295
                    val = None
5296
                else:
5297
                  assert False, "Unhandled NIC parameter"
5298
          else:
5299
            assert False, ("Declared but unhandled variable parameter '%s'" %
5300
                           field)
5301
        else:
5302
          assert False, "Declared but unhandled parameter '%s'" % field
5303
        iout.append(val)
5304
      output.append(iout)
5305

    
5306
    return output
5307

    
5308

    
5309
class LUFailoverInstance(LogicalUnit):
5310
  """Failover an instance.
5311

5312
  """
5313
  HPATH = "instance-failover"
5314
  HTYPE = constants.HTYPE_INSTANCE
5315
  _OP_PARAMS = [
5316
    _PInstanceName,
5317
    ("ignore_consistency", False, ht.TBool),
5318
    _PShutdownTimeout,
5319
    ]
5320
  REQ_BGL = False
5321

    
5322
  def ExpandNames(self):
5323
    self._ExpandAndLockInstance()
5324
    self.needed_locks[locking.LEVEL_NODE] = []
5325
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5326

    
5327
  def DeclareLocks(self, level):
5328
    if level == locking.LEVEL_NODE:
5329
      self._LockInstancesNodes()
5330

    
5331
  def BuildHooksEnv(self):
5332
    """Build hooks env.
5333

5334
    This runs on master, primary and secondary nodes of the instance.
5335

5336
    """
5337
    instance = self.instance
5338
    source_node = instance.primary_node
5339
    target_node = instance.secondary_nodes[0]
5340
    env = {
5341
      "IGNORE_CONSISTENCY": self.op.ignore_consistency,
5342
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
5343
      "OLD_PRIMARY": source_node,
5344
      "OLD_SECONDARY": target_node,
5345
      "NEW_PRIMARY": target_node,
5346
      "NEW_SECONDARY": source_node,
5347
      }
5348
    env.update(_BuildInstanceHookEnvByObject(self, instance))
5349
    nl = [self.cfg.GetMasterNode()] + list(instance.secondary_nodes)
5350
    nl_post = list(nl)
5351
    nl_post.append(source_node)
5352
    return env, nl, nl_post
5353

    
5354
  def CheckPrereq(self):
5355
    """Check prerequisites.
5356

5357
    This checks that the instance is in the cluster.
5358

5359
    """
5360
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5361
    assert self.instance is not None, \
5362
      "Cannot retrieve locked instance %s" % self.op.instance_name
5363

    
5364
    bep = self.cfg.GetClusterInfo().FillBE(instance)
5365
    if instance.disk_template not in constants.DTS_NET_MIRROR:
5366
      raise errors.OpPrereqError("Instance's disk layout is not"
5367
                                 " network mirrored, cannot failover.",
5368
                                 errors.ECODE_STATE)
5369

    
5370
    secondary_nodes = instance.secondary_nodes
5371
    if not secondary_nodes:
5372
      raise errors.ProgrammerError("no secondary node but using "
5373
                                   "a mirrored disk template")
5374

    
5375
    target_node = secondary_nodes[0]
5376
    _CheckNodeOnline(self, target_node)
5377
    _CheckNodeNotDrained(self, target_node)
5378
    if instance.admin_up:
5379
      # check memory requirements on the secondary node
5380
      _CheckNodeFreeMemory(self, target_node, "failing over instance %s" %
5381
                           instance.name, bep[constants.BE_MEMORY],
5382
                           instance.hypervisor)
5383
    else:
5384
      self.LogInfo("Not checking memory on the secondary node as"
5385
                   " instance will not be started")
5386

    
5387
    # check bridge existance
5388
    _CheckInstanceBridgesExist(self, instance, node=target_node)
5389

    
5390
  def Exec(self, feedback_fn):
5391
    """Failover an instance.
5392

5393
    The failover is done by shutting it down on its present node and
5394
    starting it on the secondary.
5395

5396
    """
5397
    instance = self.instance
5398
    primary_node = self.cfg.GetNodeInfo(instance.primary_node)
5399

    
5400
    source_node = instance.primary_node
5401
    target_node = instance.secondary_nodes[0]
5402

    
5403
    if instance.admin_up:
5404
      feedback_fn("* checking disk consistency between source and target")
5405
      for dev in instance.disks:
5406
        # for drbd, these are drbd over lvm
5407
        if not _CheckDiskConsistency(self, dev, target_node, False):
5408
          if not self.op.ignore_consistency:
5409
            raise errors.OpExecError("Disk %s is degraded on target node,"
5410
                                     " aborting failover." % dev.iv_name)
5411
    else:
5412
      feedback_fn("* not checking disk consistency as instance is not running")
5413

    
5414
    feedback_fn("* shutting down instance on source node")
5415
    logging.info("Shutting down instance %s on node %s",
5416
                 instance.name, source_node)
5417

    
5418
    result = self.rpc.call_instance_shutdown(source_node, instance,
5419
                                             self.op.shutdown_timeout)
5420
    msg = result.fail_msg
5421
    if msg:
5422
      if self.op.ignore_consistency or primary_node.offline:
5423
        self.proc.LogWarning("Could not shutdown instance %s on node %s."
5424
                             " Proceeding anyway. Please make sure node"
5425
                             " %s is down. Error details: %s",
5426
                             instance.name, source_node, source_node, msg)
5427
      else:
5428
        raise errors.OpExecError("Could not shutdown instance %s on"
5429
                                 " node %s: %s" %
5430
                                 (instance.name, source_node, msg))
5431

    
5432
    feedback_fn("* deactivating the instance's disks on source node")
5433
    if not _ShutdownInstanceDisks(self, instance, ignore_primary=True):
5434
      raise errors.OpExecError("Can't shut down the instance's disks.")
5435

    
5436
    instance.primary_node = target_node
5437
    # distribute new instance config to the other nodes
5438
    self.cfg.Update(instance, feedback_fn)
5439

    
5440
    # Only start the instance if it's marked as up
5441
    if instance.admin_up:
5442
      feedback_fn("* activating the instance's disks on target node")
5443
      logging.info("Starting instance %s on node %s",
5444
                   instance.name, target_node)
5445

    
5446
      disks_ok, _ = _AssembleInstanceDisks(self, instance,
5447
                                           ignore_secondaries=True)
5448
      if not disks_ok:
5449
        _ShutdownInstanceDisks(self, instance)
5450
        raise errors.OpExecError("Can't activate the instance's disks")
5451

    
5452
      feedback_fn("* starting the instance on the target node")
5453
      result = self.rpc.call_instance_start(target_node, instance, None, None)
5454
      msg = result.fail_msg
5455
      if msg:
5456
        _ShutdownInstanceDisks(self, instance)
5457
        raise errors.OpExecError("Could not start instance %s on node %s: %s" %
5458
                                 (instance.name, target_node, msg))
5459

    
5460

    
5461
class LUMigrateInstance(LogicalUnit):
5462
  """Migrate an instance.
5463

5464
  This is migration without shutting down, compared to the failover,
5465
  which is done with shutdown.
5466

5467
  """
5468
  HPATH = "instance-migrate"
5469
  HTYPE = constants.HTYPE_INSTANCE
5470
  _OP_PARAMS = [
5471
    _PInstanceName,
5472
    _PMigrationMode,
5473
    _PMigrationLive,
5474
    ("cleanup", False, ht.TBool),
5475
    ]
5476

    
5477
  REQ_BGL = False
5478

    
5479
  def ExpandNames(self):
5480
    self._ExpandAndLockInstance()
5481

    
5482
    self.needed_locks[locking.LEVEL_NODE] = []
5483
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
5484

    
5485
    self._migrater = TLMigrateInstance(self, self.op.instance_name,
5486
                                       self.op.cleanup)
5487
    self.tasklets = [self._migrater]
5488

    
5489
  def DeclareLocks(self, level):
5490
    if level == locking.LEVEL_NODE:
5491
      self._LockInstancesNodes()
5492

    
5493
  def BuildHooksEnv(self):
5494
    """Build hooks env.
5495

5496
    This runs on master, primary and secondary nodes of the instance.
5497

5498
    """
5499
    instance = self._migrater.instance
5500
    source_node = instance.primary_node
5501
    target_node = instance.secondary_nodes[0]
5502
    env = _BuildInstanceHookEnvByObject(self, instance)
5503
    env["MIGRATE_LIVE"] = self._migrater.live
5504
    env["MIGRATE_CLEANUP"] = self.op.cleanup
5505
    env.update({
5506
        "OLD_PRIMARY": source_node,
5507
        "OLD_SECONDARY": target_node,
5508
        "NEW_PRIMARY": target_node,
5509
        "NEW_SECONDARY": source_node,
5510
        })
5511
    nl = [self.cfg.GetMasterNode()] + list(instance.secondary_nodes)
5512
    nl_post = list(nl)
5513
    nl_post.append(source_node)
5514
    return env, nl, nl_post
5515

    
5516

    
5517
class LUMoveInstance(LogicalUnit):
5518
  """Move an instance by data-copying.
5519

5520
  """
5521
  HPATH = "instance-move"
5522
  HTYPE = constants.HTYPE_INSTANCE
5523
  _OP_PARAMS = [
5524
    _PInstanceName,
5525
    ("target_node", ht.NoDefault, ht.TNonEmptyString),
5526
    _PShutdownTimeout,
5527
    ]
5528
  REQ_BGL = False
5529

    
5530
  def ExpandNames(self):
5531
    self._ExpandAndLockInstance()
5532
    target_node = _ExpandNodeName(self.cfg, self.op.target_node)
5533
    self.op.target_node = target_node
5534
    self.needed_locks[locking.LEVEL_NODE] = [target_node]
5535
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
5536

    
5537
  def DeclareLocks(self, level):
5538
    if level == locking.LEVEL_NODE:
5539
      self._LockInstancesNodes(primary_only=True)
5540

    
5541
  def BuildHooksEnv(self):
5542
    """Build hooks env.
5543

5544
    This runs on master, primary and secondary nodes of the instance.
5545

5546
    """
5547
    env = {
5548
      "TARGET_NODE": self.op.target_node,
5549
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
5550
      }
5551
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
5552
    nl = [self.cfg.GetMasterNode()] + [self.instance.primary_node,
5553
                                       self.op.target_node]
5554
    return env, nl, nl
5555

    
5556
  def CheckPrereq(self):
5557
    """Check prerequisites.
5558

5559
    This checks that the instance is in the cluster.
5560

5561
    """
5562
    self.instance = instance = self.cfg.GetInstanceInfo(self.op.instance_name)
5563
    assert self.instance is not None, \
5564
      "Cannot retrieve locked instance %s" % self.op.instance_name
5565

    
5566
    node = self.cfg.GetNodeInfo(self.op.target_node)
5567
    assert node is not None, \
5568
      "Cannot retrieve locked node %s" % self.op.target_node
5569

    
5570
    self.target_node = target_node = node.name
5571

    
5572
    if target_node == instance.primary_node:
5573
      raise errors.OpPrereqError("Instance %s is already on the node %s" %
5574
                                 (instance.name, target_node),
5575
                                 errors.ECODE_STATE)
5576

    
5577
    bep = self.cfg.GetClusterInfo().FillBE(instance)
5578

    
5579
    for idx, dsk in enumerate(instance.disks):
5580
      if dsk.dev_type not in (constants.LD_LV, constants.LD_FILE):
5581
        raise errors.OpPrereqError("Instance disk %d has a complex layout,"
5582
                                   " cannot copy" % idx, errors.ECODE_STATE)
5583

    
5584
    _CheckNodeOnline(self, target_node)
5585
    _CheckNodeNotDrained(self, target_node)
5586

    
5587
    if instance.admin_up:
5588
      # check memory requirements on the secondary node
5589
      _CheckNodeFreeMemory(self, target_node, "failing over instance %s" %
5590
                           instance.name, bep[constants.BE_MEMORY],
5591
                           instance.hypervisor)
5592
    else:
5593
      self.LogInfo("Not checking memory on the secondary node as"
5594
                   " instance will not be started")
5595

    
5596
    # check bridge existance
5597
    _CheckInstanceBridgesExist(self, instance, node=target_node)
5598

    
5599
  def Exec(self, feedback_fn):
5600
    """Move an instance.
5601

5602
    The move is done by shutting it down on its present node, copying
5603
    the data over (slow) and starting it on the new node.
5604

5605
    """
5606
    instance = self.instance
5607

    
5608
    source_node = instance.primary_node
5609
    target_node = self.target_node
5610

    
5611
    self.LogInfo("Shutting down instance %s on source node %s",
5612
                 instance.name, source_node)
5613

    
5614
    result = self.rpc.call_instance_shutdown(source_node, instance,
5615
                                             self.op.shutdown_timeout)
5616
    msg = result.fail_msg
5617
    if msg:
5618
      if self.op.ignore_consistency:
5619
        self.proc.LogWarning("Could not shutdown instance %s on node %s."
5620
                             " Proceeding anyway. Please make sure node"
5621
                             " %s is down. Error details: %s",
5622
                             instance.name, source_node, source_node, msg)
5623
      else:
5624
        raise errors.OpExecError("Could not shutdown instance %s on"
5625
                                 " node %s: %s" %
5626
                                 (instance.name, source_node, msg))
5627

    
5628
    # create the target disks
5629
    try:
5630
      _CreateDisks(self, instance, target_node=target_node)
5631
    except errors.OpExecError:
5632
      self.LogWarning("Device creation failed, reverting...")
5633
      try:
5634
        _RemoveDisks(self, instance, target_node=target_node)
5635
      finally:
5636
        self.cfg.ReleaseDRBDMinors(instance.name)
5637
        raise
5638

    
5639
    cluster_name = self.cfg.GetClusterInfo().cluster_name
5640

    
5641
    errs = []
5642
    # activate, get path, copy the data over
5643
    for idx, disk in enumerate(instance.disks):
5644
      self.LogInfo("Copying data for disk %d", idx)
5645
      result = self.rpc.call_blockdev_assemble(target_node, disk,
5646
                                               instance.name, True)
5647
      if result.fail_msg:
5648
        self.LogWarning("Can't assemble newly created disk %d: %s",
5649
                        idx, result.fail_msg)
5650
        errs.append(result.fail_msg)
5651
        break
5652
      dev_path = result.payload
5653
      result = self.rpc.call_blockdev_export(source_node, disk,
5654
                                             target_node, dev_path,
5655
                                             cluster_name)
5656
      if result.fail_msg:
5657
        self.LogWarning("Can't copy data over for disk %d: %s",
5658
                        idx, result.fail_msg)
5659
        errs.append(result.fail_msg)
5660
        break
5661

    
5662
    if errs:
5663
      self.LogWarning("Some disks failed to copy, aborting")
5664
      try:
5665
        _RemoveDisks(self, instance, target_node=target_node)
5666
      finally:
5667
        self.cfg.ReleaseDRBDMinors(instance.name)
5668
        raise errors.OpExecError("Errors during disk copy: %s" %
5669
                                 (",".join(errs),))
5670

    
5671
    instance.primary_node = target_node
5672
    self.cfg.Update(instance, feedback_fn)
5673

    
5674
    self.LogInfo("Removing the disks on the original node")
5675
    _RemoveDisks(self, instance, target_node=source_node)
5676

    
5677
    # Only start the instance if it's marked as up
5678
    if instance.admin_up:
5679
      self.LogInfo("Starting instance %s on node %s",
5680
                   instance.name, target_node)
5681

    
5682
      disks_ok, _ = _AssembleInstanceDisks(self, instance,
5683
                                           ignore_secondaries=True)
5684
      if not disks_ok:
5685
        _ShutdownInstanceDisks(self, instance)
5686
        raise errors.OpExecError("Can't activate the instance's disks")
5687

    
5688
      result = self.rpc.call_instance_start(target_node, instance, None, None)
5689
      msg = result.fail_msg
5690
      if msg:
5691
        _ShutdownInstanceDisks(self, instance)
5692
        raise errors.OpExecError("Could not start instance %s on node %s: %s" %
5693
                                 (instance.name, target_node, msg))
5694

    
5695

    
5696
class LUMigrateNode(LogicalUnit):
5697
  """Migrate all instances from a node.
5698

5699
  """
5700
  HPATH = "node-migrate"
5701
  HTYPE = constants.HTYPE_NODE
5702
  _OP_PARAMS = [
5703
    _PNodeName,
5704
    _PMigrationMode,
5705
    _PMigrationLive,
5706
    ]
5707
  REQ_BGL = False
5708

    
5709
  def ExpandNames(self):
5710
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
5711

    
5712
    self.needed_locks = {
5713
      locking.LEVEL_NODE: [self.op.node_name],
5714
      }
5715

    
5716
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
5717

    
5718
    # Create tasklets for migrating instances for all instances on this node
5719
    names = []
5720
    tasklets = []
5721

    
5722
    for inst in _GetNodePrimaryInstances(self.cfg, self.op.node_name):
5723
      logging.debug("Migrating instance %s", inst.name)
5724
      names.append(inst.name)
5725

    
5726
      tasklets.append(TLMigrateInstance(self, inst.name, False))
5727

    
5728
    self.tasklets = tasklets
5729

    
5730
    # Declare instance locks
5731
    self.needed_locks[locking.LEVEL_INSTANCE] = names
5732

    
5733
  def DeclareLocks(self, level):
5734
    if level == locking.LEVEL_NODE:
5735
      self._LockInstancesNodes()
5736

    
5737
  def BuildHooksEnv(self):
5738
    """Build hooks env.
5739

5740
    This runs on the master, the primary and all the secondaries.
5741

5742
    """
5743
    env = {
5744
      "NODE_NAME": self.op.node_name,
5745
      }
5746

    
5747
    nl = [self.cfg.GetMasterNode()]
5748

    
5749
    return (env, nl, nl)
5750

    
5751

    
5752
class TLMigrateInstance(Tasklet):
5753
  """Tasklet class for instance migration.
5754

5755
  @type live: boolean
5756
  @ivar live: whether the migration will be done live or non-live;
5757
      this variable is initalized only after CheckPrereq has run
5758

5759
  """
5760
  def __init__(self, lu, instance_name, cleanup):
5761
    """Initializes this class.
5762

5763
    """
5764
    Tasklet.__init__(self, lu)
5765

    
5766
    # Parameters
5767
    self.instance_name = instance_name
5768
    self.cleanup = cleanup
5769
    self.live = False # will be overridden later
5770

    
5771
  def CheckPrereq(self):
5772
    """Check prerequisites.
5773

5774
    This checks that the instance is in the cluster.
5775

5776
    """
5777
    instance_name = _ExpandInstanceName(self.lu.cfg, self.instance_name)
5778
    instance = self.cfg.GetInstanceInfo(instance_name)
5779
    assert instance is not None
5780

    
5781
    if instance.disk_template != constants.DT_DRBD8:
5782
      raise errors.OpPrereqError("Instance's disk layout is not"
5783
                                 " drbd8, cannot migrate.", errors.ECODE_STATE)
5784

    
5785
    secondary_nodes = instance.secondary_nodes
5786
    if not secondary_nodes:
5787
      raise errors.ConfigurationError("No secondary node but using"
5788
                                      " drbd8 disk template")
5789

    
5790
    i_be = self.cfg.GetClusterInfo().FillBE(instance)
5791

    
5792
    target_node = secondary_nodes[0]
5793
    # check memory requirements on the secondary node
5794
    _CheckNodeFreeMemory(self.lu, target_node, "migrating instance %s" %
5795
                         instance.name, i_be[constants.BE_MEMORY],
5796
                         instance.hypervisor)
5797

    
5798
    # check bridge existance
5799
    _CheckInstanceBridgesExist(self.lu, instance, node=target_node)
5800

    
5801
    if not self.cleanup:
5802
      _CheckNodeNotDrained(self.lu, target_node)
5803
      result = self.rpc.call_instance_migratable(instance.primary_node,
5804
                                                 instance)
5805
      result.Raise("Can't migrate, please use failover",
5806
                   prereq=True, ecode=errors.ECODE_STATE)
5807

    
5808
    self.instance = instance
5809

    
5810
    if self.lu.op.live is not None and self.lu.op.mode is not None:
5811
      raise errors.OpPrereqError("Only one of the 'live' and 'mode'"
5812
                                 " parameters are accepted",
5813
                                 errors.ECODE_INVAL)
5814
    if self.lu.op.live is not None:
5815
      if self.lu.op.live:
5816
        self.lu.op.mode = constants.HT_MIGRATION_LIVE
5817
      else:
5818
        self.lu.op.mode = constants.HT_MIGRATION_NONLIVE
5819
      # reset the 'live' parameter to None so that repeated
5820
      # invocations of CheckPrereq do not raise an exception
5821
      self.lu.op.live = None
5822
    elif self.lu.op.mode is None:
5823
      # read the default value from the hypervisor
5824
      i_hv = self.cfg.GetClusterInfo().FillHV(instance, skip_globals=False)
5825
      self.lu.op.mode = i_hv[constants.HV_MIGRATION_MODE]
5826

    
5827
    self.live = self.lu.op.mode == constants.HT_MIGRATION_LIVE
5828

    
5829
  def _WaitUntilSync(self):
5830
    """Poll with custom rpc for disk sync.
5831

5832
    This uses our own step-based rpc call.
5833

5834
    """
5835
    self.feedback_fn("* wait until resync is done")
5836
    all_done = False
5837
    while not all_done:
5838
      all_done = True
5839
      result = self.rpc.call_drbd_wait_sync(self.all_nodes,
5840
                                            self.nodes_ip,
5841
                                            self.instance.disks)
5842
      min_percent = 100
5843
      for node, nres in result.items():
5844
        nres.Raise("Cannot resync disks on node %s" % node)
5845
        node_done, node_percent = nres.payload
5846
        all_done = all_done and node_done
5847
        if node_percent is not None:
5848
          min_percent = min(min_percent, node_percent)
5849
      if not all_done:
5850
        if min_percent < 100:
5851
          self.feedback_fn("   - progress: %.1f%%" % min_percent)
5852
        time.sleep(2)
5853

    
5854
  def _EnsureSecondary(self, node):
5855
    """Demote a node to secondary.
5856

5857
    """
5858
    self.feedback_fn("* switching node %s to secondary mode" % node)
5859

    
5860
    for dev in self.instance.disks:
5861
      self.cfg.SetDiskID(dev, node)
5862

    
5863
    result = self.rpc.call_blockdev_close(node, self.instance.name,
5864
                                          self.instance.disks)
5865
    result.Raise("Cannot change disk to secondary on node %s" % node)
5866

    
5867
  def _GoStandalone(self):
5868
    """Disconnect from the network.
5869

5870
    """
5871
    self.feedback_fn("* changing into standalone mode")
5872
    result = self.rpc.call_drbd_disconnect_net(self.all_nodes, self.nodes_ip,
5873
                                               self.instance.disks)
5874
    for node, nres in result.items():
5875
      nres.Raise("Cannot disconnect disks node %s" % node)
5876

    
5877
  def _GoReconnect(self, multimaster):
5878
    """Reconnect to the network.
5879

5880
    """
5881
    if multimaster:
5882
      msg = "dual-master"
5883
    else:
5884
      msg = "single-master"
5885
    self.feedback_fn("* changing disks into %s mode" % msg)
5886
    result = self.rpc.call_drbd_attach_net(self.all_nodes, self.nodes_ip,
5887
                                           self.instance.disks,
5888
                                           self.instance.name, multimaster)
5889
    for node, nres in result.items():
5890
      nres.Raise("Cannot change disks config on node %s" % node)
5891

    
5892
  def _ExecCleanup(self):
5893
    """Try to cleanup after a failed migration.
5894

5895
    The cleanup is done by:
5896
      - check that the instance is running only on one node
5897
        (and update the config if needed)
5898
      - change disks on its secondary node to secondary
5899
      - wait until disks are fully synchronized
5900
      - disconnect from the network
5901
      - change disks into single-master mode
5902
      - wait again until disks are fully synchronized
5903

5904
    """
5905
    instance = self.instance
5906
    target_node = self.target_node
5907
    source_node = self.source_node
5908

    
5909
    # check running on only one node
5910
    self.feedback_fn("* checking where the instance actually runs"
5911
                     " (if this hangs, the hypervisor might be in"
5912
                     " a bad state)")
5913
    ins_l = self.rpc.call_instance_list(self.all_nodes, [instance.hypervisor])
5914
    for node, result in ins_l.items():
5915
      result.Raise("Can't contact node %s" % node)
5916

    
5917
    runningon_source = instance.name in ins_l[source_node].payload
5918
    runningon_target = instance.name in ins_l[target_node].payload
5919

    
5920
    if runningon_source and runningon_target:
5921
      raise errors.OpExecError("Instance seems to be running on two nodes,"
5922
                               " or the hypervisor is confused. You will have"
5923
                               " to ensure manually that it runs only on one"
5924
                               " and restart this operation.")
5925

    
5926
    if not (runningon_source or runningon_target):
5927
      raise errors.OpExecError("Instance does not seem to be running at all."
5928
                               " In this case, it's safer to repair by"
5929
                               " running 'gnt-instance stop' to ensure disk"
5930
                               " shutdown, and then restarting it.")
5931

    
5932
    if runningon_target:
5933
      # the migration has actually succeeded, we need to update the config
5934
      self.feedback_fn("* instance running on secondary node (%s),"
5935
                       " updating config" % target_node)
5936
      instance.primary_node = target_node
5937
      self.cfg.Update(instance, self.feedback_fn)
5938
      demoted_node = source_node
5939
    else:
5940
      self.feedback_fn("* instance confirmed to be running on its"
5941
                       " primary node (%s)" % source_node)
5942
      demoted_node = target_node
5943

    
5944
    self._EnsureSecondary(demoted_node)
5945
    try:
5946
      self._WaitUntilSync()
5947
    except errors.OpExecError:
5948
      # we ignore here errors, since if the device is standalone, it
5949
      # won't be able to sync
5950
      pass
5951
    self._GoStandalone()
5952
    self._GoReconnect(False)
5953
    self._WaitUntilSync()
5954

    
5955
    self.feedback_fn("* done")
5956

    
5957
  def _RevertDiskStatus(self):
5958
    """Try to revert the disk status after a failed migration.
5959

5960
    """
5961
    target_node = self.target_node
5962
    try:
5963
      self._EnsureSecondary(target_node)
5964
      self._GoStandalone()
5965
      self._GoReconnect(False)
5966
      self._WaitUntilSync()
5967
    except errors.OpExecError, err:
5968
      self.lu.LogWarning("Migration failed and I can't reconnect the"
5969
                         " drives: error '%s'\n"
5970
                         "Please look and recover the instance status" %
5971
                         str(err))
5972

    
5973
  def _AbortMigration(self):
5974
    """Call the hypervisor code to abort a started migration.
5975

5976
    """
5977
    instance = self.instance
5978
    target_node = self.target_node
5979
    migration_info = self.migration_info
5980

    
5981
    abort_result = self.rpc.call_finalize_migration(target_node,
5982
                                                    instance,
5983
                                                    migration_info,
5984
                                                    False)
5985
    abort_msg = abort_result.fail_msg
5986
    if abort_msg:
5987
      logging.error("Aborting migration failed on target node %s: %s",
5988
                    target_node, abort_msg)
5989
      # Don't raise an exception here, as we stil have to try to revert the
5990
      # disk status, even if this step failed.
5991

    
5992
  def _ExecMigration(self):
5993
    """Migrate an instance.
5994

5995
    The migrate is done by:
5996
      - change the disks into dual-master mode
5997
      - wait until disks are fully synchronized again
5998
      - migrate the instance
5999
      - change disks on the new secondary node (the old primary) to secondary
6000
      - wait until disks are fully synchronized
6001
      - change disks into single-master mode
6002

6003
    """
6004
    instance = self.instance
6005
    target_node = self.target_node
6006
    source_node = self.source_node
6007

    
6008
    self.feedback_fn("* checking disk consistency between source and target")
6009
    for dev in instance.disks:
6010
      if not _CheckDiskConsistency(self.lu, dev, target_node, False):
6011
        raise errors.OpExecError("Disk %s is degraded or not fully"
6012
                                 " synchronized on target node,"
6013
                                 " aborting migrate." % dev.iv_name)
6014

    
6015
    # First get the migration information from the remote node
6016
    result = self.rpc.call_migration_info(source_node, instance)
6017
    msg = result.fail_msg
6018
    if msg:
6019
      log_err = ("Failed fetching source migration information from %s: %s" %
6020
                 (source_node, msg))
6021
      logging.error(log_err)
6022
      raise errors.OpExecError(log_err)
6023

    
6024
    self.migration_info = migration_info = result.payload
6025

    
6026
    # Then switch the disks to master/master mode
6027
    self._EnsureSecondary(target_node)
6028
    self._GoStandalone()
6029
    self._GoReconnect(True)
6030
    self._WaitUntilSync()
6031

    
6032
    self.feedback_fn("* preparing %s to accept the instance" % target_node)
6033
    result = self.rpc.call_accept_instance(target_node,
6034
                                           instance,
6035
                                           migration_info,
6036
                                           self.nodes_ip[target_node])
6037

    
6038
    msg = result.fail_msg
6039
    if msg:
6040
      logging.error("Instance pre-migration failed, trying to revert"
6041
                    " disk status: %s", msg)
6042
      self.feedback_fn("Pre-migration failed, aborting")
6043
      self._AbortMigration()
6044
      self._RevertDiskStatus()
6045
      raise errors.OpExecError("Could not pre-migrate instance %s: %s" %
6046
                               (instance.name, msg))
6047

    
6048
    self.feedback_fn("* migrating instance to %s" % target_node)
6049
    time.sleep(10)
6050
    result = self.rpc.call_instance_migrate(source_node, instance,
6051
                                            self.nodes_ip[target_node],
6052
                                            self.live)
6053
    msg = result.fail_msg
6054
    if msg:
6055
      logging.error("Instance migration failed, trying to revert"
6056
                    " disk status: %s", msg)
6057
      self.feedback_fn("Migration failed, aborting")
6058
      self._AbortMigration()
6059
      self._RevertDiskStatus()
6060
      raise errors.OpExecError("Could not migrate instance %s: %s" %
6061
                               (instance.name, msg))
6062
    time.sleep(10)
6063

    
6064
    instance.primary_node = target_node
6065
    # distribute new instance config to the other nodes
6066
    self.cfg.Update(instance, self.feedback_fn)
6067

    
6068
    result = self.rpc.call_finalize_migration(target_node,
6069
                                              instance,
6070
                                              migration_info,
6071
                                              True)
6072
    msg = result.fail_msg
6073
    if msg:
6074
      logging.error("Instance migration succeeded, but finalization failed:"
6075
                    " %s", msg)
6076
      raise errors.OpExecError("Could not finalize instance migration: %s" %
6077
                               msg)
6078

    
6079
    self._EnsureSecondary(source_node)
6080
    self._WaitUntilSync()
6081
    self._GoStandalone()
6082
    self._GoReconnect(False)
6083
    self._WaitUntilSync()
6084

    
6085
    self.feedback_fn("* done")
6086

    
6087
  def Exec(self, feedback_fn):
6088
    """Perform the migration.
6089

6090
    """
6091
    feedback_fn("Migrating instance %s" % self.instance.name)
6092

    
6093
    self.feedback_fn = feedback_fn
6094

    
6095
    self.source_node = self.instance.primary_node
6096
    self.target_node = self.instance.secondary_nodes[0]
6097
    self.all_nodes = [self.source_node, self.target_node]
6098
    self.nodes_ip = {
6099
      self.source_node: self.cfg.GetNodeInfo(self.source_node).secondary_ip,
6100
      self.target_node: self.cfg.GetNodeInfo(self.target_node).secondary_ip,
6101
      }
6102

    
6103
    if self.cleanup:
6104
      return self._ExecCleanup()
6105
    else:
6106
      return self._ExecMigration()
6107

    
6108

    
6109
def _CreateBlockDev(lu, node, instance, device, force_create,
6110
                    info, force_open):
6111
  """Create a tree of block devices on a given node.
6112

6113
  If this device type has to be created on secondaries, create it and
6114
  all its children.
6115

6116
  If not, just recurse to children keeping the same 'force' value.
6117

6118
  @param lu: the lu on whose behalf we execute
6119
  @param node: the node on which to create the device
6120
  @type instance: L{objects.Instance}
6121
  @param instance: the instance which owns the device
6122
  @type device: L{objects.Disk}
6123
  @param device: the device to create
6124
  @type force_create: boolean
6125
  @param force_create: whether to force creation of this device; this
6126
      will be change to True whenever we find a device which has
6127
      CreateOnSecondary() attribute
6128
  @param info: the extra 'metadata' we should attach to the device
6129
      (this will be represented as a LVM tag)
6130
  @type force_open: boolean
6131
  @param force_open: this parameter will be passes to the
6132
      L{backend.BlockdevCreate} function where it specifies
6133
      whether we run on primary or not, and it affects both
6134
      the child assembly and the device own Open() execution
6135

6136
  """
6137
  if device.CreateOnSecondary():
6138
    force_create = True
6139

    
6140
  if device.children:
6141
    for child in device.children:
6142
      _CreateBlockDev(lu, node, instance, child, force_create,
6143
                      info, force_open)
6144

    
6145
  if not force_create:
6146
    return
6147

    
6148
  _CreateSingleBlockDev(lu, node, instance, device, info, force_open)
6149

    
6150

    
6151
def _CreateSingleBlockDev(lu, node, instance, device, info, force_open):
6152
  """Create a single block device on a given node.
6153

6154
  This will not recurse over children of the device, so they must be
6155
  created in advance.
6156

6157
  @param lu: the lu on whose behalf we execute
6158
  @param node: the node on which to create the device
6159
  @type instance: L{objects.Instance}
6160
  @param instance: the instance which owns the device
6161
  @type device: L{objects.Disk}
6162
  @param device: the device to create
6163
  @param info: the extra 'metadata' we should attach to the device
6164
      (this will be represented as a LVM tag)
6165
  @type force_open: boolean
6166
  @param force_open: this parameter will be passes to the
6167
      L{backend.BlockdevCreate} function where it specifies
6168
      whether we run on primary or not, and it affects both
6169
      the child assembly and the device own Open() execution
6170

6171
  """
6172
  lu.cfg.SetDiskID(device, node)
6173
  result = lu.rpc.call_blockdev_create(node, device, device.size,
6174
                                       instance.name, force_open, info)
6175
  result.Raise("Can't create block device %s on"
6176
               " node %s for instance %s" % (device, node, instance.name))
6177
  if device.physical_id is None:
6178
    device.physical_id = result.payload
6179

    
6180

    
6181
def _GenerateUniqueNames(lu, exts):
6182
  """Generate a suitable LV name.
6183

6184
  This will generate a logical volume name for the given instance.
6185

6186
  """
6187
  results = []
6188
  for val in exts:
6189
    new_id = lu.cfg.GenerateUniqueID(lu.proc.GetECId())
6190
    results.append("%s%s" % (new_id, val))
6191
  return results
6192

    
6193

    
6194
def _GenerateDRBD8Branch(lu, primary, secondary, size, names, iv_name,
6195
                         p_minor, s_minor):
6196
  """Generate a drbd8 device complete with its children.
6197

6198
  """
6199
  port = lu.cfg.AllocatePort()
6200
  vgname = lu.cfg.GetVGName()
6201
  shared_secret = lu.cfg.GenerateDRBDSecret(lu.proc.GetECId())
6202
  dev_data = objects.Disk(dev_type=constants.LD_LV, size=size,
6203
                          logical_id=(vgname, names[0]))
6204
  dev_meta = objects.Disk(dev_type=constants.LD_LV, size=128,
6205
                          logical_id=(vgname, names[1]))
6206
  drbd_dev = objects.Disk(dev_type=constants.LD_DRBD8, size=size,
6207
                          logical_id=(primary, secondary, port,
6208
                                      p_minor, s_minor,
6209
                                      shared_secret),
6210
                          children=[dev_data, dev_meta],
6211
                          iv_name=iv_name)
6212
  return drbd_dev
6213

    
6214

    
6215
def _GenerateDiskTemplate(lu, template_name,
6216
                          instance_name, primary_node,
6217
                          secondary_nodes, disk_info,
6218
                          file_storage_dir, file_driver,
6219
                          base_index):
6220
  """Generate the entire disk layout for a given template type.
6221

6222
  """
6223
  #TODO: compute space requirements
6224

    
6225
  vgname = lu.cfg.GetVGName()
6226
  disk_count = len(disk_info)
6227
  disks = []
6228
  if template_name == constants.DT_DISKLESS:
6229
    pass
6230
  elif template_name == constants.DT_PLAIN:
6231
    if len(secondary_nodes) != 0:
6232
      raise errors.ProgrammerError("Wrong template configuration")
6233

    
6234
    names = _GenerateUniqueNames(lu, [".disk%d" % (base_index + i)
6235
                                      for i in range(disk_count)])
6236
    for idx, disk in enumerate(disk_info):
6237
      disk_index = idx + base_index
6238
      disk_dev = objects.Disk(dev_type=constants.LD_LV, size=disk["size"],
6239
                              logical_id=(vgname, names[idx]),
6240
                              iv_name="disk/%d" % disk_index,
6241
                              mode=disk["mode"])
6242
      disks.append(disk_dev)
6243
  elif template_name == constants.DT_DRBD8:
6244
    if len(secondary_nodes) != 1:
6245
      raise errors.ProgrammerError("Wrong template configuration")
6246
    remote_node = secondary_nodes[0]
6247
    minors = lu.cfg.AllocateDRBDMinor(
6248
      [primary_node, remote_node] * len(disk_info), instance_name)
6249

    
6250
    names = []
6251
    for lv_prefix in _GenerateUniqueNames(lu, [".disk%d" % (base_index + i)
6252
                                               for i in range(disk_count)]):
6253
      names.append(lv_prefix + "_data")
6254
      names.append(lv_prefix + "_meta")
6255
    for idx, disk in enumerate(disk_info):
6256
      disk_index = idx + base_index
6257
      disk_dev = _GenerateDRBD8Branch(lu, primary_node, remote_node,
6258
                                      disk["size"], names[idx*2:idx*2+2],
6259
                                      "disk/%d" % disk_index,
6260
                                      minors[idx*2], minors[idx*2+1])
6261
      disk_dev.mode = disk["mode"]
6262
      disks.append(disk_dev)
6263
  elif template_name == constants.DT_FILE:
6264
    if len(secondary_nodes) != 0:
6265
      raise errors.ProgrammerError("Wrong template configuration")
6266

    
6267
    _RequireFileStorage()
6268

    
6269
    for idx, disk in enumerate(disk_info):
6270
      disk_index = idx + base_index
6271
      disk_dev = objects.Disk(dev_type=constants.LD_FILE, size=disk["size"],
6272
                              iv_name="disk/%d" % disk_index,
6273
                              logical_id=(file_driver,
6274
                                          "%s/disk%d" % (file_storage_dir,
6275
                                                         disk_index)),
6276
                              mode=disk["mode"])
6277
      disks.append(disk_dev)
6278
  else:
6279
    raise errors.ProgrammerError("Invalid disk template '%s'" % template_name)
6280
  return disks
6281

    
6282

    
6283
def _GetInstanceInfoText(instance):
6284
  """Compute that text that should be added to the disk's metadata.
6285

6286
  """
6287
  return "originstname+%s" % instance.name
6288

    
6289

    
6290
def _CalcEta(time_taken, written, total_size):
6291
  """Calculates the ETA based on size written and total size.
6292

6293
  @param time_taken: The time taken so far
6294
  @param written: amount written so far
6295
  @param total_size: The total size of data to be written
6296
  @return: The remaining time in seconds
6297

6298
  """
6299
  avg_time = time_taken / float(written)
6300
  return (total_size - written) * avg_time
6301

    
6302

    
6303
def _WipeDisks(lu, instance):
6304
  """Wipes instance disks.
6305

6306
  @type lu: L{LogicalUnit}
6307
  @param lu: the logical unit on whose behalf we execute
6308
  @type instance: L{objects.Instance}
6309
  @param instance: the instance whose disks we should create
6310
  @return: the success of the wipe
6311

6312
  """
6313
  node = instance.primary_node
6314
  for idx, device in enumerate(instance.disks):
6315
    lu.LogInfo("* Wiping disk %d", idx)
6316
    logging.info("Wiping disk %d for instance %s", idx, instance.name)
6317

    
6318
    # The wipe size is MIN_WIPE_CHUNK_PERCENT % of the instance disk but
6319
    # MAX_WIPE_CHUNK at max
6320
    wipe_chunk_size = min(constants.MAX_WIPE_CHUNK, device.size / 100.0 *
6321
                          constants.MIN_WIPE_CHUNK_PERCENT)
6322

    
6323
    offset = 0
6324
    size = device.size
6325
    last_output = 0
6326
    start_time = time.time()
6327

    
6328
    while offset < size:
6329
      wipe_size = min(wipe_chunk_size, size - offset)
6330
      result = lu.rpc.call_blockdev_wipe(node, device, offset, wipe_size)
6331
      result.Raise("Could not wipe disk %d at offset %d for size %d" %
6332
                   (idx, offset, wipe_size))
6333
      now = time.time()
6334
      offset += wipe_size
6335
      if now - last_output >= 60:
6336
        eta = _CalcEta(now - start_time, offset, size)
6337
        lu.LogInfo(" - done: %.1f%% ETA: %s" %
6338
                   (offset / float(size) * 100, utils.FormatSeconds(eta)))
6339
        last_output = now
6340

    
6341

    
6342
def _CreateDisks(lu, instance, to_skip=None, target_node=None):
6343
  """Create all disks for an instance.
6344

6345
  This abstracts away some work from AddInstance.
6346

6347
  @type lu: L{LogicalUnit}
6348
  @param lu: the logical unit on whose behalf we execute
6349
  @type instance: L{objects.Instance}
6350
  @param instance: the instance whose disks we should create
6351
  @type to_skip: list
6352
  @param to_skip: list of indices to skip
6353
  @type target_node: string
6354
  @param target_node: if passed, overrides the target node for creation
6355
  @rtype: boolean
6356
  @return: the success of the creation
6357

6358
  """
6359
  info = _GetInstanceInfoText(instance)
6360
  if target_node is None:
6361
    pnode = instance.primary_node
6362
    all_nodes = instance.all_nodes
6363
  else:
6364
    pnode = target_node
6365
    all_nodes = [pnode]
6366

    
6367
  if instance.disk_template == constants.DT_FILE:
6368
    file_storage_dir = os.path.dirname(instance.disks[0].logical_id[1])
6369
    result = lu.rpc.call_file_storage_dir_create(pnode, file_storage_dir)
6370

    
6371
    result.Raise("Failed to create directory '%s' on"
6372
                 " node %s" % (file_storage_dir, pnode))
6373

    
6374
  # Note: this needs to be kept in sync with adding of disks in
6375
  # LUSetInstanceParams
6376
  for idx, device in enumerate(instance.disks):
6377
    if to_skip and idx in to_skip:
6378
      continue
6379
    logging.info("Creating volume %s for instance %s",
6380
                 device.iv_name, instance.name)
6381
    #HARDCODE
6382
    for node in all_nodes:
6383
      f_create = node == pnode
6384
      _CreateBlockDev(lu, node, instance, device, f_create, info, f_create)
6385

    
6386

    
6387
def _RemoveDisks(lu, instance, target_node=None):
6388
  """Remove all disks for an instance.
6389

6390
  This abstracts away some work from `AddInstance()` and
6391
  `RemoveInstance()`. Note that in case some of the devices couldn't
6392
  be removed, the removal will continue with the other ones (compare
6393
  with `_CreateDisks()`).
6394

6395
  @type lu: L{LogicalUnit}
6396
  @param lu: the logical unit on whose behalf we execute
6397
  @type instance: L{objects.Instance}
6398
  @param instance: the instance whose disks we should remove
6399
  @type target_node: string
6400
  @param target_node: used to override the node on which to remove the disks
6401
  @rtype: boolean
6402
  @return: the success of the removal
6403

6404
  """
6405
  logging.info("Removing block devices for instance %s", instance.name)
6406

    
6407
  all_result = True
6408
  for device in instance.disks:
6409
    if target_node:
6410
      edata = [(target_node, device)]
6411
    else:
6412
      edata = device.ComputeNodeTree(instance.primary_node)
6413
    for node, disk in edata:
6414
      lu.cfg.SetDiskID(disk, node)
6415
      msg = lu.rpc.call_blockdev_remove(node, disk).fail_msg
6416
      if msg:
6417
        lu.LogWarning("Could not remove block device %s on node %s,"
6418
                      " continuing anyway: %s", device.iv_name, node, msg)
6419
        all_result = False
6420

    
6421
  if instance.disk_template == constants.DT_FILE:
6422
    file_storage_dir = os.path.dirname(instance.disks[0].logical_id[1])
6423
    if target_node:
6424
      tgt = target_node
6425
    else:
6426
      tgt = instance.primary_node
6427
    result = lu.rpc.call_file_storage_dir_remove(tgt, file_storage_dir)
6428
    if result.fail_msg:
6429
      lu.LogWarning("Could not remove directory '%s' on node %s: %s",
6430
                    file_storage_dir, instance.primary_node, result.fail_msg)
6431
      all_result = False
6432

    
6433
  return all_result
6434

    
6435

    
6436
def _ComputeDiskSize(disk_template, disks):
6437
  """Compute disk size requirements in the volume group
6438

6439
  """
6440
  # Required free disk space as a function of disk and swap space
6441
  req_size_dict = {
6442
    constants.DT_DISKLESS: None,
6443
    constants.DT_PLAIN: sum(d["size"] for d in disks),
6444
    # 128 MB are added for drbd metadata for each disk
6445
    constants.DT_DRBD8: sum(d["size"] + 128 for d in disks),
6446
    constants.DT_FILE: None,
6447
  }
6448

    
6449
  if disk_template not in req_size_dict:
6450
    raise errors.ProgrammerError("Disk template '%s' size requirement"
6451
                                 " is unknown" %  disk_template)
6452

    
6453
  return req_size_dict[disk_template]
6454

    
6455

    
6456
def _CheckHVParams(lu, nodenames, hvname, hvparams):
6457
  """Hypervisor parameter validation.
6458

6459
  This function abstract the hypervisor parameter validation to be
6460
  used in both instance create and instance modify.
6461

6462
  @type lu: L{LogicalUnit}
6463
  @param lu: the logical unit for which we check
6464
  @type nodenames: list
6465
  @param nodenames: the list of nodes on which we should check
6466
  @type hvname: string
6467
  @param hvname: the name of the hypervisor we should use
6468
  @type hvparams: dict
6469
  @param hvparams: the parameters which we need to check
6470
  @raise errors.OpPrereqError: if the parameters are not valid
6471

6472
  """
6473
  hvinfo = lu.rpc.call_hypervisor_validate_params(nodenames,
6474
                                                  hvname,
6475
                                                  hvparams)
6476
  for node in nodenames:
6477
    info = hvinfo[node]
6478
    if info.offline:
6479
      continue
6480
    info.Raise("Hypervisor parameter validation failed on node %s" % node)
6481

    
6482

    
6483
def _CheckOSParams(lu, required, nodenames, osname, osparams):
6484
  """OS parameters validation.
6485

6486
  @type lu: L{LogicalUnit}
6487
  @param lu: the logical unit for which we check
6488
  @type required: boolean
6489
  @param required: whether the validation should fail if the OS is not
6490
      found
6491
  @type nodenames: list
6492
  @param nodenames: the list of nodes on which we should check
6493
  @type osname: string
6494
  @param osname: the name of the hypervisor we should use
6495
  @type osparams: dict
6496
  @param osparams: the parameters which we need to check
6497
  @raise errors.OpPrereqError: if the parameters are not valid
6498

6499
  """
6500
  result = lu.rpc.call_os_validate(required, nodenames, osname,
6501
                                   [constants.OS_VALIDATE_PARAMETERS],
6502
                                   osparams)
6503
  for node, nres in result.items():
6504
    # we don't check for offline cases since this should be run only
6505
    # against the master node and/or an instance's nodes
6506
    nres.Raise("OS Parameters validation failed on node %s" % node)
6507
    if not nres.payload:
6508
      lu.LogInfo("OS %s not found on node %s, validation skipped",
6509
                 osname, node)
6510

    
6511

    
6512
class LUCreateInstance(LogicalUnit):
6513
  """Create an instance.
6514

6515
  """
6516
  HPATH = "instance-add"
6517
  HTYPE = constants.HTYPE_INSTANCE
6518
  _OP_PARAMS = [
6519
    _PInstanceName,
6520
    ("mode", ht.NoDefault, ht.TElemOf(constants.INSTANCE_CREATE_MODES)),
6521
    ("start", True, ht.TBool),
6522
    ("wait_for_sync", True, ht.TBool),
6523
    ("ip_check", True, ht.TBool),
6524
    ("name_check", True, ht.TBool),
6525
    ("disks", ht.NoDefault, ht.TListOf(ht.TDict)),
6526
    ("nics", ht.NoDefault, ht.TListOf(ht.TDict)),
6527
    ("hvparams", ht.EmptyDict, ht.TDict),
6528
    ("beparams", ht.EmptyDict, ht.TDict),
6529
    ("osparams", ht.EmptyDict, ht.TDict),
6530
    ("no_install", None, ht.TMaybeBool),
6531
    ("os_type", None, ht.TMaybeString),
6532
    ("force_variant", False, ht.TBool),
6533
    ("source_handshake", None, ht.TOr(ht.TList, ht.TNone)),
6534
    ("source_x509_ca", None, ht.TMaybeString),
6535
    ("source_instance_name", None, ht.TMaybeString),
6536
    ("src_node", None, ht.TMaybeString),
6537
    ("src_path", None, ht.TMaybeString),
6538
    ("pnode", None, ht.TMaybeString),
6539
    ("snode", None, ht.TMaybeString),
6540
    ("iallocator", None, ht.TMaybeString),
6541
    ("hypervisor", None, ht.TMaybeString),
6542
    ("disk_template", ht.NoDefault, _CheckDiskTemplate),
6543
    ("identify_defaults", False, ht.TBool),
6544
    ("file_driver", None, ht.TOr(ht.TNone, ht.TElemOf(constants.FILE_DRIVER))),
6545
    ("file_storage_dir", None, ht.TMaybeString),
6546
    ]
6547
  REQ_BGL = False
6548

    
6549
  def CheckArguments(self):
6550
    """Check arguments.
6551

6552
    """
6553
    # do not require name_check to ease forward/backward compatibility
6554
    # for tools
6555
    if self.op.no_install and self.op.start:
6556
      self.LogInfo("No-installation mode selected, disabling startup")
6557
      self.op.start = False
6558
    # validate/normalize the instance name
6559
    self.op.instance_name = \
6560
      netutils.Hostname.GetNormalizedName(self.op.instance_name)
6561

    
6562
    if self.op.ip_check and not self.op.name_check:
6563
      # TODO: make the ip check more flexible and not depend on the name check
6564
      raise errors.OpPrereqError("Cannot do ip check without a name check",
6565
                                 errors.ECODE_INVAL)
6566

    
6567
    # check nics' parameter names
6568
    for nic in self.op.nics:
6569
      utils.ForceDictType(nic, constants.INIC_PARAMS_TYPES)
6570

    
6571
    # check disks. parameter names and consistent adopt/no-adopt strategy
6572
    has_adopt = has_no_adopt = False
6573
    for disk in self.op.disks:
6574
      utils.ForceDictType(disk, constants.IDISK_PARAMS_TYPES)
6575
      if "adopt" in disk:
6576
        has_adopt = True
6577
      else:
6578
        has_no_adopt = True
6579
    if has_adopt and has_no_adopt:
6580
      raise errors.OpPrereqError("Either all disks are adopted or none is",
6581
                                 errors.ECODE_INVAL)
6582
    if has_adopt:
6583
      if self.op.disk_template not in constants.DTS_MAY_ADOPT:
6584
        raise errors.OpPrereqError("Disk adoption is not supported for the"
6585
                                   " '%s' disk template" %
6586
                                   self.op.disk_template,
6587
                                   errors.ECODE_INVAL)
6588
      if self.op.iallocator is not None:
6589
        raise errors.OpPrereqError("Disk adoption not allowed with an"
6590
                                   " iallocator script", errors.ECODE_INVAL)
6591
      if self.op.mode == constants.INSTANCE_IMPORT:
6592
        raise errors.OpPrereqError("Disk adoption not allowed for"
6593
                                   " instance import", errors.ECODE_INVAL)
6594

    
6595
    self.adopt_disks = has_adopt
6596

    
6597
    # instance name verification
6598
    if self.op.name_check:
6599
      self.hostname1 = netutils.GetHostname(name=self.op.instance_name)
6600
      self.op.instance_name = self.hostname1.name
6601
      # used in CheckPrereq for ip ping check
6602
      self.check_ip = self.hostname1.ip
6603
    elif self.op.mode == constants.INSTANCE_REMOTE_IMPORT:
6604
      raise errors.OpPrereqError("Remote imports require names to be checked" %
6605
                                 errors.ECODE_INVAL)
6606
    else:
6607
      self.check_ip = None
6608

    
6609
    # file storage checks
6610
    if (self.op.file_driver and
6611
        not self.op.file_driver in constants.FILE_DRIVER):
6612
      raise errors.OpPrereqError("Invalid file driver name '%s'" %
6613
                                 self.op.file_driver, errors.ECODE_INVAL)
6614

    
6615
    if self.op.file_storage_dir and os.path.isabs(self.op.file_storage_dir):
6616
      raise errors.OpPrereqError("File storage directory path not absolute",
6617
                                 errors.ECODE_INVAL)
6618

    
6619
    ### Node/iallocator related checks
6620
    _CheckIAllocatorOrNode(self, "iallocator", "pnode")
6621

    
6622
    if self.op.pnode is not None:
6623
      if self.op.disk_template in constants.DTS_NET_MIRROR:
6624
        if self.op.snode is None:
6625
          raise errors.OpPrereqError("The networked disk templates need"
6626
                                     " a mirror node", errors.ECODE_INVAL)
6627
      elif self.op.snode:
6628
        self.LogWarning("Secondary node will be ignored on non-mirrored disk"
6629
                        " template")
6630
        self.op.snode = None
6631

    
6632
    self._cds = _GetClusterDomainSecret()
6633

    
6634
    if self.op.mode == constants.INSTANCE_IMPORT:
6635
      # On import force_variant must be True, because if we forced it at
6636
      # initial install, our only chance when importing it back is that it
6637
      # works again!
6638
      self.op.force_variant = True
6639

    
6640
      if self.op.no_install:
6641
        self.LogInfo("No-installation mode has no effect during import")
6642

    
6643
    elif self.op.mode == constants.INSTANCE_CREATE:
6644
      if self.op.os_type is None:
6645
        raise errors.OpPrereqError("No guest OS specified",
6646
                                   errors.ECODE_INVAL)
6647
      if self.op.os_type in self.cfg.GetClusterInfo().blacklisted_os:
6648
        raise errors.OpPrereqError("Guest OS '%s' is not allowed for"
6649
                                   " installation" % self.op.os_type,
6650
                                   errors.ECODE_STATE)
6651
      if self.op.disk_template is None:
6652
        raise errors.OpPrereqError("No disk template specified",
6653
                                   errors.ECODE_INVAL)
6654

    
6655
    elif self.op.mode == constants.INSTANCE_REMOTE_IMPORT:
6656
      # Check handshake to ensure both clusters have the same domain secret
6657
      src_handshake = self.op.source_handshake
6658
      if not src_handshake:
6659
        raise errors.OpPrereqError("Missing source handshake",
6660
                                   errors.ECODE_INVAL)
6661

    
6662
      errmsg = masterd.instance.CheckRemoteExportHandshake(self._cds,
6663
                                                           src_handshake)
6664
      if errmsg:
6665
        raise errors.OpPrereqError("Invalid handshake: %s" % errmsg,
6666
                                   errors.ECODE_INVAL)
6667

    
6668
      # Load and check source CA
6669
      self.source_x509_ca_pem = self.op.source_x509_ca
6670
      if not self.source_x509_ca_pem:
6671
        raise errors.OpPrereqError("Missing source X509 CA",
6672
                                   errors.ECODE_INVAL)
6673

    
6674
      try:
6675
        (cert, _) = utils.LoadSignedX509Certificate(self.source_x509_ca_pem,
6676
                                                    self._cds)
6677
      except OpenSSL.crypto.Error, err:
6678
        raise errors.OpPrereqError("Unable to load source X509 CA (%s)" %
6679
                                   (err, ), errors.ECODE_INVAL)
6680

    
6681
      (errcode, msg) = utils.VerifyX509Certificate(cert, None, None)
6682
      if errcode is not None:
6683
        raise errors.OpPrereqError("Invalid source X509 CA (%s)" % (msg, ),
6684
                                   errors.ECODE_INVAL)
6685

    
6686
      self.source_x509_ca = cert
6687

    
6688
      src_instance_name = self.op.source_instance_name
6689
      if not src_instance_name:
6690
        raise errors.OpPrereqError("Missing source instance name",
6691
                                   errors.ECODE_INVAL)
6692

    
6693
      self.source_instance_name = \
6694
          netutils.GetHostname(name=src_instance_name).name
6695

    
6696
    else:
6697
      raise errors.OpPrereqError("Invalid instance creation mode %r" %
6698
                                 self.op.mode, errors.ECODE_INVAL)
6699

    
6700
  def ExpandNames(self):
6701
    """ExpandNames for CreateInstance.
6702

6703
    Figure out the right locks for instance creation.
6704

6705
    """
6706
    self.needed_locks = {}
6707

    
6708
    instance_name = self.op.instance_name
6709
    # this is just a preventive check, but someone might still add this
6710
    # instance in the meantime, and creation will fail at lock-add time
6711
    if instance_name in self.cfg.GetInstanceList():
6712
      raise errors.OpPrereqError("Instance '%s' is already in the cluster" %
6713
                                 instance_name, errors.ECODE_EXISTS)
6714

    
6715
    self.add_locks[locking.LEVEL_INSTANCE] = instance_name
6716

    
6717
    if self.op.iallocator:
6718
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
6719
    else:
6720
      self.op.pnode = _ExpandNodeName(self.cfg, self.op.pnode)
6721
      nodelist = [self.op.pnode]
6722
      if self.op.snode is not None:
6723
        self.op.snode = _ExpandNodeName(self.cfg, self.op.snode)
6724
        nodelist.append(self.op.snode)
6725
      self.needed_locks[locking.LEVEL_NODE] = nodelist
6726

    
6727
    # in case of import lock the source node too
6728
    if self.op.mode == constants.INSTANCE_IMPORT:
6729
      src_node = self.op.src_node
6730
      src_path = self.op.src_path
6731

    
6732
      if src_path is None:
6733
        self.op.src_path = src_path = self.op.instance_name
6734

    
6735
      if src_node is None:
6736
        self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
6737
        self.op.src_node = None
6738
        if os.path.isabs(src_path):
6739
          raise errors.OpPrereqError("Importing an instance from an absolute"
6740
                                     " path requires a source node option.",
6741
                                     errors.ECODE_INVAL)
6742
      else:
6743
        self.op.src_node = src_node = _ExpandNodeName(self.cfg, src_node)
6744
        if self.needed_locks[locking.LEVEL_NODE] is not locking.ALL_SET:
6745
          self.needed_locks[locking.LEVEL_NODE].append(src_node)
6746
        if not os.path.isabs(src_path):
6747
          self.op.src_path = src_path = \
6748
            utils.PathJoin(constants.EXPORT_DIR, src_path)
6749

    
6750
  def _RunAllocator(self):
6751
    """Run the allocator based on input opcode.
6752

6753
    """
6754
    nics = [n.ToDict() for n in self.nics]
6755
    ial = IAllocator(self.cfg, self.rpc,
6756
                     mode=constants.IALLOCATOR_MODE_ALLOC,
6757
                     name=self.op.instance_name,
6758
                     disk_template=self.op.disk_template,
6759
                     tags=[],
6760
                     os=self.op.os_type,
6761
                     vcpus=self.be_full[constants.BE_VCPUS],
6762
                     mem_size=self.be_full[constants.BE_MEMORY],
6763
                     disks=self.disks,
6764
                     nics=nics,
6765
                     hypervisor=self.op.hypervisor,
6766
                     )
6767

    
6768
    ial.Run(self.op.iallocator)
6769

    
6770
    if not ial.success:
6771
      raise errors.OpPrereqError("Can't compute nodes using"
6772
                                 " iallocator '%s': %s" %
6773
                                 (self.op.iallocator, ial.info),
6774
                                 errors.ECODE_NORES)
6775
    if len(ial.result) != ial.required_nodes:
6776
      raise errors.OpPrereqError("iallocator '%s' returned invalid number"
6777
                                 " of nodes (%s), required %s" %
6778
                                 (self.op.iallocator, len(ial.result),
6779
                                  ial.required_nodes), errors.ECODE_FAULT)
6780
    self.op.pnode = ial.result[0]
6781
    self.LogInfo("Selected nodes for instance %s via iallocator %s: %s",
6782
                 self.op.instance_name, self.op.iallocator,
6783
                 utils.CommaJoin(ial.result))
6784
    if ial.required_nodes == 2:
6785
      self.op.snode = ial.result[1]
6786

    
6787
  def BuildHooksEnv(self):
6788
    """Build hooks env.
6789

6790
    This runs on master, primary and secondary nodes of the instance.
6791

6792
    """
6793
    env = {
6794
      "ADD_MODE": self.op.mode,
6795
      }
6796
    if self.op.mode == constants.INSTANCE_IMPORT:
6797
      env["SRC_NODE"] = self.op.src_node
6798
      env["SRC_PATH"] = self.op.src_path
6799
      env["SRC_IMAGES"] = self.src_images
6800

    
6801
    env.update(_BuildInstanceHookEnv(
6802
      name=self.op.instance_name,
6803
      primary_node=self.op.pnode,
6804
      secondary_nodes=self.secondaries,
6805
      status=self.op.start,
6806
      os_type=self.op.os_type,
6807
      memory=self.be_full[constants.BE_MEMORY],
6808
      vcpus=self.be_full[constants.BE_VCPUS],
6809
      nics=_NICListToTuple(self, self.nics),
6810
      disk_template=self.op.disk_template,
6811
      disks=[(d["size"], d["mode"]) for d in self.disks],
6812
      bep=self.be_full,
6813
      hvp=self.hv_full,
6814
      hypervisor_name=self.op.hypervisor,
6815
    ))
6816

    
6817
    nl = ([self.cfg.GetMasterNode(), self.op.pnode] +
6818
          self.secondaries)
6819
    return env, nl, nl
6820

    
6821
  def _ReadExportInfo(self):
6822
    """Reads the export information from disk.
6823

6824
    It will override the opcode source node and path with the actual
6825
    information, if these two were not specified before.
6826

6827
    @return: the export information
6828

6829
    """
6830
    assert self.op.mode == constants.INSTANCE_IMPORT
6831

    
6832
    src_node = self.op.src_node
6833
    src_path = self.op.src_path
6834

    
6835
    if src_node is None:
6836
      locked_nodes = self.acquired_locks[locking.LEVEL_NODE]
6837
      exp_list = self.rpc.call_export_list(locked_nodes)
6838
      found = False
6839
      for node in exp_list:
6840
        if exp_list[node].fail_msg:
6841
          continue
6842
        if src_path in exp_list[node].payload:
6843
          found = True
6844
          self.op.src_node = src_node = node
6845
          self.op.src_path = src_path = utils.PathJoin(constants.EXPORT_DIR,
6846
                                                       src_path)
6847
          break
6848
      if not found:
6849
        raise errors.OpPrereqError("No export found for relative path %s" %
6850
                                    src_path, errors.ECODE_INVAL)
6851

    
6852
    _CheckNodeOnline(self, src_node)
6853
    result = self.rpc.call_export_info(src_node, src_path)
6854
    result.Raise("No export or invalid export found in dir %s" % src_path)
6855

    
6856
    export_info = objects.SerializableConfigParser.Loads(str(result.payload))
6857
    if not export_info.has_section(constants.INISECT_EXP):
6858
      raise errors.ProgrammerError("Corrupted export config",
6859
                                   errors.ECODE_ENVIRON)
6860

    
6861
    ei_version = export_info.get(constants.INISECT_EXP, "version")
6862
    if (int(ei_version) != constants.EXPORT_VERSION):
6863
      raise errors.OpPrereqError("Wrong export version %s (wanted %d)" %
6864
                                 (ei_version, constants.EXPORT_VERSION),
6865
                                 errors.ECODE_ENVIRON)
6866
    return export_info
6867

    
6868
  def _ReadExportParams(self, einfo):
6869
    """Use export parameters as defaults.
6870

6871
    In case the opcode doesn't specify (as in override) some instance
6872
    parameters, then try to use them from the export information, if
6873
    that declares them.
6874

6875
    """
6876
    self.op.os_type = einfo.get(constants.INISECT_EXP, "os")
6877

    
6878
    if self.op.disk_template is None:
6879
      if einfo.has_option(constants.INISECT_INS, "disk_template"):
6880
        self.op.disk_template = einfo.get(constants.INISECT_INS,
6881
                                          "disk_template")
6882
      else:
6883
        raise errors.OpPrereqError("No disk template specified and the export"
6884
                                   " is missing the disk_template information",
6885
                                   errors.ECODE_INVAL)
6886

    
6887
    if not self.op.disks:
6888
      if einfo.has_option(constants.INISECT_INS, "disk_count"):
6889
        disks = []
6890
        # TODO: import the disk iv_name too
6891
        for idx in range(einfo.getint(constants.INISECT_INS, "disk_count")):
6892
          disk_sz = einfo.getint(constants.INISECT_INS, "disk%d_size" % idx)
6893
          disks.append({"size": disk_sz})
6894
        self.op.disks = disks
6895
      else:
6896
        raise errors.OpPrereqError("No disk info specified and the export"
6897
                                   " is missing the disk information",
6898
                                   errors.ECODE_INVAL)
6899

    
6900
    if (not self.op.nics and
6901
        einfo.has_option(constants.INISECT_INS, "nic_count")):
6902
      nics = []
6903
      for idx in range(einfo.getint(constants.INISECT_INS, "nic_count")):
6904
        ndict = {}
6905
        for name in list(constants.NICS_PARAMETERS) + ["ip", "mac"]:
6906
          v = einfo.get(constants.INISECT_INS, "nic%d_%s" % (idx, name))
6907
          ndict[name] = v
6908
        nics.append(ndict)
6909
      self.op.nics = nics
6910

    
6911
    if (self.op.hypervisor is None and
6912
        einfo.has_option(constants.INISECT_INS, "hypervisor")):
6913
      self.op.hypervisor = einfo.get(constants.INISECT_INS, "hypervisor")
6914
    if einfo.has_section(constants.INISECT_HYP):
6915
      # use the export parameters but do not override the ones
6916
      # specified by the user
6917
      for name, value in einfo.items(constants.INISECT_HYP):
6918
        if name not in self.op.hvparams:
6919
          self.op.hvparams[name] = value
6920

    
6921
    if einfo.has_section(constants.INISECT_BEP):
6922
      # use the parameters, without overriding
6923
      for name, value in einfo.items(constants.INISECT_BEP):
6924
        if name not in self.op.beparams:
6925
          self.op.beparams[name] = value
6926
    else:
6927
      # try to read the parameters old style, from the main section
6928
      for name in constants.BES_PARAMETERS:
6929
        if (name not in self.op.beparams and
6930
            einfo.has_option(constants.INISECT_INS, name)):
6931
          self.op.beparams[name] = einfo.get(constants.INISECT_INS, name)
6932

    
6933
    if einfo.has_section(constants.INISECT_OSP):
6934
      # use the parameters, without overriding
6935
      for name, value in einfo.items(constants.INISECT_OSP):
6936
        if name not in self.op.osparams:
6937
          self.op.osparams[name] = value
6938

    
6939
  def _RevertToDefaults(self, cluster):
6940
    """Revert the instance parameters to the default values.
6941

6942
    """
6943
    # hvparams
6944
    hv_defs = cluster.SimpleFillHV(self.op.hypervisor, self.op.os_type, {})
6945
    for name in self.op.hvparams.keys():
6946
      if name in hv_defs and hv_defs[name] == self.op.hvparams[name]:
6947
        del self.op.hvparams[name]
6948
    # beparams
6949
    be_defs = cluster.SimpleFillBE({})
6950
    for name in self.op.beparams.keys():
6951
      if name in be_defs and be_defs[name] == self.op.beparams[name]:
6952
        del self.op.beparams[name]
6953
    # nic params
6954
    nic_defs = cluster.SimpleFillNIC({})
6955
    for nic in self.op.nics:
6956
      for name in constants.NICS_PARAMETERS:
6957
        if name in nic and name in nic_defs and nic[name] == nic_defs[name]:
6958
          del nic[name]
6959
    # osparams
6960
    os_defs = cluster.SimpleFillOS(self.op.os_type, {})
6961
    for name in self.op.osparams.keys():
6962
      if name in os_defs and os_defs[name] == self.op.osparams[name]:
6963
        del self.op.osparams[name]
6964

    
6965
  def CheckPrereq(self):
6966
    """Check prerequisites.
6967

6968
    """
6969
    if self.op.mode == constants.INSTANCE_IMPORT:
6970
      export_info = self._ReadExportInfo()
6971
      self._ReadExportParams(export_info)
6972

    
6973
    _CheckDiskTemplate(self.op.disk_template)
6974

    
6975
    if (not self.cfg.GetVGName() and
6976
        self.op.disk_template not in constants.DTS_NOT_LVM):
6977
      raise errors.OpPrereqError("Cluster does not support lvm-based"
6978
                                 " instances", errors.ECODE_STATE)
6979

    
6980
    if self.op.hypervisor is None:
6981
      self.op.hypervisor = self.cfg.GetHypervisorType()
6982

    
6983
    cluster = self.cfg.GetClusterInfo()
6984
    enabled_hvs = cluster.enabled_hypervisors
6985
    if self.op.hypervisor not in enabled_hvs:
6986
      raise errors.OpPrereqError("Selected hypervisor (%s) not enabled in the"
6987
                                 " cluster (%s)" % (self.op.hypervisor,
6988
                                  ",".join(enabled_hvs)),
6989
                                 errors.ECODE_STATE)
6990

    
6991
    # check hypervisor parameter syntax (locally)
6992
    utils.ForceDictType(self.op.hvparams, constants.HVS_PARAMETER_TYPES)
6993
    filled_hvp = cluster.SimpleFillHV(self.op.hypervisor, self.op.os_type,
6994
                                      self.op.hvparams)
6995
    hv_type = hypervisor.GetHypervisor(self.op.hypervisor)
6996
    hv_type.CheckParameterSyntax(filled_hvp)
6997
    self.hv_full = filled_hvp
6998
    # check that we don't specify global parameters on an instance
6999
    _CheckGlobalHvParams(self.op.hvparams)
7000

    
7001
    # fill and remember the beparams dict
7002
    utils.ForceDictType(self.op.beparams, constants.BES_PARAMETER_TYPES)
7003
    self.be_full = cluster.SimpleFillBE(self.op.beparams)
7004

    
7005
    # build os parameters
7006
    self.os_full = cluster.SimpleFillOS(self.op.os_type, self.op.osparams)
7007

    
7008
    # now that hvp/bep are in final format, let's reset to defaults,
7009
    # if told to do so
7010
    if self.op.identify_defaults:
7011
      self._RevertToDefaults(cluster)
7012

    
7013
    # NIC buildup
7014
    self.nics = []
7015
    for idx, nic in enumerate(self.op.nics):
7016
      nic_mode_req = nic.get("mode", None)
7017
      nic_mode = nic_mode_req
7018
      if nic_mode is None:
7019
        nic_mode = cluster.nicparams[constants.PP_DEFAULT][constants.NIC_MODE]
7020

    
7021
      # in routed mode, for the first nic, the default ip is 'auto'
7022
      if nic_mode == constants.NIC_MODE_ROUTED and idx == 0:
7023
        default_ip_mode = constants.VALUE_AUTO
7024
      else:
7025
        default_ip_mode = constants.VALUE_NONE
7026

    
7027
      # ip validity checks
7028
      ip = nic.get("ip", default_ip_mode)
7029
      if ip is None or ip.lower() == constants.VALUE_NONE:
7030
        nic_ip = None
7031
      elif ip.lower() == constants.VALUE_AUTO:
7032
        if not self.op.name_check:
7033
          raise errors.OpPrereqError("IP address set to auto but name checks"
7034
                                     " have been skipped",
7035
                                     errors.ECODE_INVAL)
7036
        nic_ip = self.hostname1.ip
7037
      else:
7038
        if not netutils.IPAddress.IsValid(ip):
7039
          raise errors.OpPrereqError("Invalid IP address '%s'" % ip,
7040
                                     errors.ECODE_INVAL)
7041
        nic_ip = ip
7042

    
7043
      # TODO: check the ip address for uniqueness
7044
      if nic_mode == constants.NIC_MODE_ROUTED and not nic_ip:
7045
        raise errors.OpPrereqError("Routed nic mode requires an ip address",
7046
                                   errors.ECODE_INVAL)
7047

    
7048
      # MAC address verification
7049
      mac = nic.get("mac", constants.VALUE_AUTO)
7050
      if mac not in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
7051
        mac = utils.NormalizeAndValidateMac(mac)
7052

    
7053
        try:
7054
          self.cfg.ReserveMAC(mac, self.proc.GetECId())
7055
        except errors.ReservationError:
7056
          raise errors.OpPrereqError("MAC address %s already in use"
7057
                                     " in cluster" % mac,
7058
                                     errors.ECODE_NOTUNIQUE)
7059

    
7060
      # bridge verification
7061
      bridge = nic.get("bridge", None)
7062
      link = nic.get("link", None)
7063
      if bridge and link:
7064
        raise errors.OpPrereqError("Cannot pass 'bridge' and 'link'"
7065
                                   " at the same time", errors.ECODE_INVAL)
7066
      elif bridge and nic_mode == constants.NIC_MODE_ROUTED:
7067
        raise errors.OpPrereqError("Cannot pass 'bridge' on a routed nic",
7068
                                   errors.ECODE_INVAL)
7069
      elif bridge:
7070
        link = bridge
7071

    
7072
      nicparams = {}
7073
      if nic_mode_req:
7074
        nicparams[constants.NIC_MODE] = nic_mode_req
7075
      if link:
7076
        nicparams[constants.NIC_LINK] = link
7077

    
7078
      check_params = cluster.SimpleFillNIC(nicparams)
7079
      objects.NIC.CheckParameterSyntax(check_params)
7080
      self.nics.append(objects.NIC(mac=mac, ip=nic_ip, nicparams=nicparams))
7081

    
7082
    # disk checks/pre-build
7083
    self.disks = []
7084
    for disk in self.op.disks:
7085
      mode = disk.get("mode", constants.DISK_RDWR)
7086
      if mode not in constants.DISK_ACCESS_SET:
7087
        raise errors.OpPrereqError("Invalid disk access mode '%s'" %
7088
                                   mode, errors.ECODE_INVAL)
7089
      size = disk.get("size", None)
7090
      if size is None:
7091
        raise errors.OpPrereqError("Missing disk size", errors.ECODE_INVAL)
7092
      try:
7093
        size = int(size)
7094
      except (TypeError, ValueError):
7095
        raise errors.OpPrereqError("Invalid disk size '%s'" % size,
7096
                                   errors.ECODE_INVAL)
7097
      new_disk = {"size": size, "mode": mode}
7098
      if "adopt" in disk:
7099
        new_disk["adopt"] = disk["adopt"]
7100
      self.disks.append(new_disk)
7101

    
7102
    if self.op.mode == constants.INSTANCE_IMPORT:
7103

    
7104
      # Check that the new instance doesn't have less disks than the export
7105
      instance_disks = len(self.disks)
7106
      export_disks = export_info.getint(constants.INISECT_INS, 'disk_count')
7107
      if instance_disks < export_disks:
7108
        raise errors.OpPrereqError("Not enough disks to import."
7109
                                   " (instance: %d, export: %d)" %
7110
                                   (instance_disks, export_disks),
7111
                                   errors.ECODE_INVAL)
7112

    
7113
      disk_images = []
7114
      for idx in range(export_disks):
7115
        option = 'disk%d_dump' % idx
7116
        if export_info.has_option(constants.INISECT_INS, option):
7117
          # FIXME: are the old os-es, disk sizes, etc. useful?
7118
          export_name = export_info.get(constants.INISECT_INS, option)
7119
          image = utils.PathJoin(self.op.src_path, export_name)
7120
          disk_images.append(image)
7121
        else:
7122
          disk_images.append(False)
7123

    
7124
      self.src_images = disk_images
7125

    
7126
      old_name = export_info.get(constants.INISECT_INS, 'name')
7127
      try:
7128
        exp_nic_count = export_info.getint(constants.INISECT_INS, 'nic_count')
7129
      except (TypeError, ValueError), err:
7130
        raise errors.OpPrereqError("Invalid export file, nic_count is not"
7131
                                   " an integer: %s" % str(err),
7132
                                   errors.ECODE_STATE)
7133
      if self.op.instance_name == old_name:
7134
        for idx, nic in enumerate(self.nics):
7135
          if nic.mac == constants.VALUE_AUTO and exp_nic_count >= idx:
7136
            nic_mac_ini = 'nic%d_mac' % idx
7137
            nic.mac = export_info.get(constants.INISECT_INS, nic_mac_ini)
7138

    
7139
    # ENDIF: self.op.mode == constants.INSTANCE_IMPORT
7140

    
7141
    # ip ping checks (we use the same ip that was resolved in ExpandNames)
7142
    if self.op.ip_check:
7143
      if netutils.TcpPing(self.check_ip, constants.DEFAULT_NODED_PORT):
7144
        raise errors.OpPrereqError("IP %s of instance %s already in use" %
7145
                                   (self.check_ip, self.op.instance_name),
7146
                                   errors.ECODE_NOTUNIQUE)
7147

    
7148
    #### mac address generation
7149
    # By generating here the mac address both the allocator and the hooks get
7150
    # the real final mac address rather than the 'auto' or 'generate' value.
7151
    # There is a race condition between the generation and the instance object
7152
    # creation, which means that we know the mac is valid now, but we're not
7153
    # sure it will be when we actually add the instance. If things go bad
7154
    # adding the instance will abort because of a duplicate mac, and the
7155
    # creation job will fail.
7156
    for nic in self.nics:
7157
      if nic.mac in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
7158
        nic.mac = self.cfg.GenerateMAC(self.proc.GetECId())
7159

    
7160
    #### allocator run
7161

    
7162
    if self.op.iallocator is not None:
7163
      self._RunAllocator()
7164

    
7165
    #### node related checks
7166

    
7167
    # check primary node
7168
    self.pnode = pnode = self.cfg.GetNodeInfo(self.op.pnode)
7169
    assert self.pnode is not None, \
7170
      "Cannot retrieve locked node %s" % self.op.pnode
7171
    if pnode.offline:
7172
      raise errors.OpPrereqError("Cannot use offline primary node '%s'" %
7173
                                 pnode.name, errors.ECODE_STATE)
7174
    if pnode.drained:
7175
      raise errors.OpPrereqError("Cannot use drained primary node '%s'" %
7176
                                 pnode.name, errors.ECODE_STATE)
7177

    
7178
    self.secondaries = []
7179

    
7180
    # mirror node verification
7181
    if self.op.disk_template in constants.DTS_NET_MIRROR:
7182
      if self.op.snode == pnode.name:
7183
        raise errors.OpPrereqError("The secondary node cannot be the"
7184
                                   " primary node.", errors.ECODE_INVAL)
7185
      _CheckNodeOnline(self, self.op.snode)
7186
      _CheckNodeNotDrained(self, self.op.snode)
7187
      self.secondaries.append(self.op.snode)
7188

    
7189
    nodenames = [pnode.name] + self.secondaries
7190

    
7191
    req_size = _ComputeDiskSize(self.op.disk_template,
7192
                                self.disks)
7193

    
7194
    # Check lv size requirements, if not adopting
7195
    if req_size is not None and not self.adopt_disks:
7196
      _CheckNodesFreeDisk(self, nodenames, req_size)
7197

    
7198
    if self.adopt_disks: # instead, we must check the adoption data
7199
      all_lvs = set([i["adopt"] for i in self.disks])
7200
      if len(all_lvs) != len(self.disks):
7201
        raise errors.OpPrereqError("Duplicate volume names given for adoption",
7202
                                   errors.ECODE_INVAL)
7203
      for lv_name in all_lvs:
7204
        try:
7205
          self.cfg.ReserveLV(lv_name, self.proc.GetECId())
7206
        except errors.ReservationError:
7207
          raise errors.OpPrereqError("LV named %s used by another instance" %
7208
                                     lv_name, errors.ECODE_NOTUNIQUE)
7209

    
7210
      node_lvs = self.rpc.call_lv_list([pnode.name],
7211
                                       self.cfg.GetVGName())[pnode.name]
7212
      node_lvs.Raise("Cannot get LV information from node %s" % pnode.name)
7213
      node_lvs = node_lvs.payload
7214
      delta = all_lvs.difference(node_lvs.keys())
7215
      if delta:
7216
        raise errors.OpPrereqError("Missing logical volume(s): %s" %
7217
                                   utils.CommaJoin(delta),
7218
                                   errors.ECODE_INVAL)
7219
      online_lvs = [lv for lv in all_lvs if node_lvs[lv][2]]
7220
      if online_lvs:
7221
        raise errors.OpPrereqError("Online logical volumes found, cannot"
7222
                                   " adopt: %s" % utils.CommaJoin(online_lvs),
7223
                                   errors.ECODE_STATE)
7224
      # update the size of disk based on what is found
7225
      for dsk in self.disks:
7226
        dsk["size"] = int(float(node_lvs[dsk["adopt"]][0]))
7227

    
7228
    _CheckHVParams(self, nodenames, self.op.hypervisor, self.op.hvparams)
7229

    
7230
    _CheckNodeHasOS(self, pnode.name, self.op.os_type, self.op.force_variant)
7231
    # check OS parameters (remotely)
7232
    _CheckOSParams(self, True, nodenames, self.op.os_type, self.os_full)
7233

    
7234
    _CheckNicsBridgesExist(self, self.nics, self.pnode.name)
7235

    
7236
    # memory check on primary node
7237
    if self.op.start:
7238
      _CheckNodeFreeMemory(self, self.pnode.name,
7239
                           "creating instance %s" % self.op.instance_name,
7240
                           self.be_full[constants.BE_MEMORY],
7241
                           self.op.hypervisor)
7242

    
7243
    self.dry_run_result = list(nodenames)
7244

    
7245
  def Exec(self, feedback_fn):
7246
    """Create and add the instance to the cluster.
7247

7248
    """
7249
    instance = self.op.instance_name
7250
    pnode_name = self.pnode.name
7251

    
7252
    ht_kind = self.op.hypervisor
7253
    if ht_kind in constants.HTS_REQ_PORT:
7254
      network_port = self.cfg.AllocatePort()
7255
    else:
7256
      network_port = None
7257

    
7258
    if constants.ENABLE_FILE_STORAGE:
7259
      # this is needed because os.path.join does not accept None arguments
7260
      if self.op.file_storage_dir is None:
7261
        string_file_storage_dir = ""
7262
      else:
7263
        string_file_storage_dir = self.op.file_storage_dir
7264

    
7265
      # build the full file storage dir path
7266
      file_storage_dir = utils.PathJoin(self.cfg.GetFileStorageDir(),
7267
                                        string_file_storage_dir, instance)
7268
    else:
7269
      file_storage_dir = ""
7270

    
7271
    disks = _GenerateDiskTemplate(self,
7272
                                  self.op.disk_template,
7273
                                  instance, pnode_name,
7274
                                  self.secondaries,
7275
                                  self.disks,
7276
                                  file_storage_dir,
7277
                                  self.op.file_driver,
7278
                                  0)
7279

    
7280
    iobj = objects.Instance(name=instance, os=self.op.os_type,
7281
                            primary_node=pnode_name,
7282
                            nics=self.nics, disks=disks,
7283
                            disk_template=self.op.disk_template,
7284
                            admin_up=False,
7285
                            network_port=network_port,
7286
                            beparams=self.op.beparams,
7287
                            hvparams=self.op.hvparams,
7288
                            hypervisor=self.op.hypervisor,
7289
                            osparams=self.op.osparams,
7290
                            )
7291

    
7292
    if self.adopt_disks:
7293
      # rename LVs to the newly-generated names; we need to construct
7294
      # 'fake' LV disks with the old data, plus the new unique_id
7295
      tmp_disks = [objects.Disk.FromDict(v.ToDict()) for v in disks]
7296
      rename_to = []
7297
      for t_dsk, a_dsk in zip (tmp_disks, self.disks):
7298
        rename_to.append(t_dsk.logical_id)
7299
        t_dsk.logical_id = (t_dsk.logical_id[0], a_dsk["adopt"])
7300
        self.cfg.SetDiskID(t_dsk, pnode_name)
7301
      result = self.rpc.call_blockdev_rename(pnode_name,
7302
                                             zip(tmp_disks, rename_to))
7303
      result.Raise("Failed to rename adoped LVs")
7304
    else:
7305
      feedback_fn("* creating instance disks...")
7306
      try:
7307
        _CreateDisks(self, iobj)
7308
      except errors.OpExecError:
7309
        self.LogWarning("Device creation failed, reverting...")
7310
        try:
7311
          _RemoveDisks(self, iobj)
7312
        finally:
7313
          self.cfg.ReleaseDRBDMinors(instance)
7314
          raise
7315

    
7316
      if self.cfg.GetClusterInfo().prealloc_wipe_disks:
7317
        feedback_fn("* wiping instance disks...")
7318
        try:
7319
          _WipeDisks(self, iobj)
7320
        except errors.OpExecError:
7321
          self.LogWarning("Device wiping failed, reverting...")
7322
          try:
7323
            _RemoveDisks(self, iobj)
7324
          finally:
7325
            self.cfg.ReleaseDRBDMinors(instance)
7326
            raise
7327

    
7328
    feedback_fn("adding instance %s to cluster config" % instance)
7329

    
7330
    self.cfg.AddInstance(iobj, self.proc.GetECId())
7331

    
7332
    # Declare that we don't want to remove the instance lock anymore, as we've
7333
    # added the instance to the config
7334
    del self.remove_locks[locking.LEVEL_INSTANCE]
7335
    # Unlock all the nodes
7336
    if self.op.mode == constants.INSTANCE_IMPORT:
7337
      nodes_keep = [self.op.src_node]
7338
      nodes_release = [node for node in self.acquired_locks[locking.LEVEL_NODE]
7339
                       if node != self.op.src_node]
7340
      self.context.glm.release(locking.LEVEL_NODE, nodes_release)
7341
      self.acquired_locks[locking.LEVEL_NODE] = nodes_keep
7342
    else:
7343
      self.context.glm.release(locking.LEVEL_NODE)
7344
      del self.acquired_locks[locking.LEVEL_NODE]
7345

    
7346
    if self.op.wait_for_sync:
7347
      disk_abort = not _WaitForSync(self, iobj)
7348
    elif iobj.disk_template in constants.DTS_NET_MIRROR:
7349
      # make sure the disks are not degraded (still sync-ing is ok)
7350
      time.sleep(15)
7351
      feedback_fn("* checking mirrors status")
7352
      disk_abort = not _WaitForSync(self, iobj, oneshot=True)
7353
    else:
7354
      disk_abort = False
7355

    
7356
    if disk_abort:
7357
      _RemoveDisks(self, iobj)
7358
      self.cfg.RemoveInstance(iobj.name)
7359
      # Make sure the instance lock gets removed
7360
      self.remove_locks[locking.LEVEL_INSTANCE] = iobj.name
7361
      raise errors.OpExecError("There are some degraded disks for"
7362
                               " this instance")
7363

    
7364
    if iobj.disk_template != constants.DT_DISKLESS and not self.adopt_disks:
7365
      if self.op.mode == constants.INSTANCE_CREATE:
7366
        if not self.op.no_install:
7367
          feedback_fn("* running the instance OS create scripts...")
7368
          # FIXME: pass debug option from opcode to backend
7369
          result = self.rpc.call_instance_os_add(pnode_name, iobj, False,
7370
                                                 self.op.debug_level)
7371
          result.Raise("Could not add os for instance %s"
7372
                       " on node %s" % (instance, pnode_name))
7373

    
7374
      elif self.op.mode == constants.INSTANCE_IMPORT:
7375
        feedback_fn("* running the instance OS import scripts...")
7376

    
7377
        transfers = []
7378

    
7379
        for idx, image in enumerate(self.src_images):
7380
          if not image:
7381
            continue
7382

    
7383
          # FIXME: pass debug option from opcode to backend
7384
          dt = masterd.instance.DiskTransfer("disk/%s" % idx,
7385
                                             constants.IEIO_FILE, (image, ),
7386
                                             constants.IEIO_SCRIPT,
7387
                                             (iobj.disks[idx], idx),
7388
                                             None)
7389
          transfers.append(dt)
7390

    
7391
        import_result = \
7392
          masterd.instance.TransferInstanceData(self, feedback_fn,
7393
                                                self.op.src_node, pnode_name,
7394
                                                self.pnode.secondary_ip,
7395
                                                iobj, transfers)
7396
        if not compat.all(import_result):
7397
          self.LogWarning("Some disks for instance %s on node %s were not"
7398
                          " imported successfully" % (instance, pnode_name))
7399

    
7400
      elif self.op.mode == constants.INSTANCE_REMOTE_IMPORT:
7401
        feedback_fn("* preparing remote import...")
7402
        connect_timeout = constants.RIE_CONNECT_TIMEOUT
7403
        timeouts = masterd.instance.ImportExportTimeouts(connect_timeout)
7404

    
7405
        disk_results = masterd.instance.RemoteImport(self, feedback_fn, iobj,
7406
                                                     self.source_x509_ca,
7407
                                                     self._cds, timeouts)
7408
        if not compat.all(disk_results):
7409
          # TODO: Should the instance still be started, even if some disks
7410
          # failed to import (valid for local imports, too)?
7411
          self.LogWarning("Some disks for instance %s on node %s were not"
7412
                          " imported successfully" % (instance, pnode_name))
7413

    
7414
        # Run rename script on newly imported instance
7415
        assert iobj.name == instance
7416
        feedback_fn("Running rename script for %s" % instance)
7417
        result = self.rpc.call_instance_run_rename(pnode_name, iobj,
7418
                                                   self.source_instance_name,
7419
                                                   self.op.debug_level)
7420
        if result.fail_msg:
7421
          self.LogWarning("Failed to run rename script for %s on node"
7422
                          " %s: %s" % (instance, pnode_name, result.fail_msg))
7423

    
7424
      else:
7425
        # also checked in the prereq part
7426
        raise errors.ProgrammerError("Unknown OS initialization mode '%s'"
7427
                                     % self.op.mode)
7428

    
7429
    if self.op.start:
7430
      iobj.admin_up = True
7431
      self.cfg.Update(iobj, feedback_fn)
7432
      logging.info("Starting instance %s on node %s", instance, pnode_name)
7433
      feedback_fn("* starting instance...")
7434
      result = self.rpc.call_instance_start(pnode_name, iobj, None, None)
7435
      result.Raise("Could not start instance")
7436

    
7437
    return list(iobj.all_nodes)
7438

    
7439

    
7440
class LUConnectConsole(NoHooksLU):
7441
  """Connect to an instance's console.
7442

7443
  This is somewhat special in that it returns the command line that
7444
  you need to run on the master node in order to connect to the
7445
  console.
7446

7447
  """
7448
  _OP_PARAMS = [
7449
    _PInstanceName
7450
    ]
7451
  REQ_BGL = False
7452

    
7453
  def ExpandNames(self):
7454
    self._ExpandAndLockInstance()
7455

    
7456
  def CheckPrereq(self):
7457
    """Check prerequisites.
7458

7459
    This checks that the instance is in the cluster.
7460

7461
    """
7462
    self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
7463
    assert self.instance is not None, \
7464
      "Cannot retrieve locked instance %s" % self.op.instance_name
7465
    _CheckNodeOnline(self, self.instance.primary_node)
7466

    
7467
  def Exec(self, feedback_fn):
7468
    """Connect to the console of an instance
7469

7470
    """
7471
    instance = self.instance
7472
    node = instance.primary_node
7473

    
7474
    node_insts = self.rpc.call_instance_list([node],
7475
                                             [instance.hypervisor])[node]
7476
    node_insts.Raise("Can't get node information from %s" % node)
7477

    
7478
    if instance.name not in node_insts.payload:
7479
      if instance.admin_up:
7480
        state = "ERROR_down"
7481
      else:
7482
        state = "ADMIN_down"
7483
      raise errors.OpExecError("Instance %s is not running (state %s)" %
7484
                               (instance.name, state))
7485

    
7486
    logging.debug("Connecting to console of %s on %s", instance.name, node)
7487

    
7488
    hyper = hypervisor.GetHypervisor(instance.hypervisor)
7489
    cluster = self.cfg.GetClusterInfo()
7490
    # beparams and hvparams are passed separately, to avoid editing the
7491
    # instance and then saving the defaults in the instance itself.
7492
    hvparams = cluster.FillHV(instance)
7493
    beparams = cluster.FillBE(instance)
7494
    console_cmd = hyper.GetShellCommandForConsole(instance, hvparams, beparams)
7495

    
7496
    # build ssh cmdline
7497
    return self.ssh.BuildCmd(node, "root", console_cmd, batch=True, tty=True)
7498

    
7499

    
7500
class LUReplaceDisks(LogicalUnit):
7501
  """Replace the disks of an instance.
7502

7503
  """
7504
  HPATH = "mirrors-replace"
7505
  HTYPE = constants.HTYPE_INSTANCE
7506
  _OP_PARAMS = [
7507
    _PInstanceName,
7508
    ("mode", ht.NoDefault, ht.TElemOf(constants.REPLACE_MODES)),
7509
    ("disks", ht.EmptyList, ht.TListOf(ht.TPositiveInt)),
7510
    ("remote_node", None, ht.TMaybeString),
7511
    ("iallocator", None, ht.TMaybeString),
7512
    ("early_release", False, ht.TBool),
7513
    ]
7514
  REQ_BGL = False
7515

    
7516
  def CheckArguments(self):
7517
    TLReplaceDisks.CheckArguments(self.op.mode, self.op.remote_node,
7518
                                  self.op.iallocator)
7519

    
7520
  def ExpandNames(self):
7521
    self._ExpandAndLockInstance()
7522

    
7523
    if self.op.iallocator is not None:
7524
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
7525

    
7526
    elif self.op.remote_node is not None:
7527
      remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
7528
      self.op.remote_node = remote_node
7529

    
7530
      # Warning: do not remove the locking of the new secondary here
7531
      # unless DRBD8.AddChildren is changed to work in parallel;
7532
      # currently it doesn't since parallel invocations of
7533
      # FindUnusedMinor will conflict
7534
      self.needed_locks[locking.LEVEL_NODE] = [remote_node]
7535
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_APPEND
7536

    
7537
    else:
7538
      self.needed_locks[locking.LEVEL_NODE] = []
7539
      self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
7540

    
7541
    self.replacer = TLReplaceDisks(self, self.op.instance_name, self.op.mode,
7542
                                   self.op.iallocator, self.op.remote_node,
7543
                                   self.op.disks, False, self.op.early_release)
7544

    
7545
    self.tasklets = [self.replacer]
7546

    
7547
  def DeclareLocks(self, level):
7548
    # If we're not already locking all nodes in the set we have to declare the
7549
    # instance's primary/secondary nodes.
7550
    if (level == locking.LEVEL_NODE and
7551
        self.needed_locks[locking.LEVEL_NODE] is not locking.ALL_SET):
7552
      self._LockInstancesNodes()
7553

    
7554
  def BuildHooksEnv(self):
7555
    """Build hooks env.
7556

7557
    This runs on the master, the primary and all the secondaries.
7558

7559
    """
7560
    instance = self.replacer.instance
7561
    env = {
7562
      "MODE": self.op.mode,
7563
      "NEW_SECONDARY": self.op.remote_node,
7564
      "OLD_SECONDARY": instance.secondary_nodes[0],
7565
      }
7566
    env.update(_BuildInstanceHookEnvByObject(self, instance))
7567
    nl = [
7568
      self.cfg.GetMasterNode(),
7569
      instance.primary_node,
7570
      ]
7571
    if self.op.remote_node is not None:
7572
      nl.append(self.op.remote_node)
7573
    return env, nl, nl
7574

    
7575

    
7576
class TLReplaceDisks(Tasklet):
7577
  """Replaces disks for an instance.
7578

7579
  Note: Locking is not within the scope of this class.
7580

7581
  """
7582
  def __init__(self, lu, instance_name, mode, iallocator_name, remote_node,
7583
               disks, delay_iallocator, early_release):
7584
    """Initializes this class.
7585

7586
    """
7587
    Tasklet.__init__(self, lu)
7588

    
7589
    # Parameters
7590
    self.instance_name = instance_name
7591
    self.mode = mode
7592
    self.iallocator_name = iallocator_name
7593
    self.remote_node = remote_node
7594
    self.disks = disks
7595
    self.delay_iallocator = delay_iallocator
7596
    self.early_release = early_release
7597

    
7598
    # Runtime data
7599
    self.instance = None
7600
    self.new_node = None
7601
    self.target_node = None
7602
    self.other_node = None
7603
    self.remote_node_info = None
7604
    self.node_secondary_ip = None
7605

    
7606
  @staticmethod
7607
  def CheckArguments(mode, remote_node, iallocator):
7608
    """Helper function for users of this class.
7609

7610
    """
7611
    # check for valid parameter combination
7612
    if mode == constants.REPLACE_DISK_CHG:
7613
      if remote_node is None and iallocator is None:
7614
        raise errors.OpPrereqError("When changing the secondary either an"
7615
                                   " iallocator script must be used or the"
7616
                                   " new node given", errors.ECODE_INVAL)
7617

    
7618
      if remote_node is not None and iallocator is not None:
7619
        raise errors.OpPrereqError("Give either the iallocator or the new"
7620
                                   " secondary, not both", errors.ECODE_INVAL)
7621

    
7622
    elif remote_node is not None or iallocator is not None:
7623
      # Not replacing the secondary
7624
      raise errors.OpPrereqError("The iallocator and new node options can"
7625
                                 " only be used when changing the"
7626
                                 " secondary node", errors.ECODE_INVAL)
7627

    
7628
  @staticmethod
7629
  def _RunAllocator(lu, iallocator_name, instance_name, relocate_from):
7630
    """Compute a new secondary node using an IAllocator.
7631

7632
    """
7633
    ial = IAllocator(lu.cfg, lu.rpc,
7634
                     mode=constants.IALLOCATOR_MODE_RELOC,
7635
                     name=instance_name,
7636
                     relocate_from=relocate_from)
7637

    
7638
    ial.Run(iallocator_name)
7639

    
7640
    if not ial.success:
7641
      raise errors.OpPrereqError("Can't compute nodes using iallocator '%s':"
7642
                                 " %s" % (iallocator_name, ial.info),
7643
                                 errors.ECODE_NORES)
7644

    
7645
    if len(ial.result) != ial.required_nodes:
7646
      raise errors.OpPrereqError("iallocator '%s' returned invalid number"
7647
                                 " of nodes (%s), required %s" %
7648
                                 (iallocator_name,
7649
                                  len(ial.result), ial.required_nodes),
7650
                                 errors.ECODE_FAULT)
7651

    
7652
    remote_node_name = ial.result[0]
7653

    
7654
    lu.LogInfo("Selected new secondary for instance '%s': %s",
7655
               instance_name, remote_node_name)
7656

    
7657
    return remote_node_name
7658

    
7659
  def _FindFaultyDisks(self, node_name):
7660
    return _FindFaultyInstanceDisks(self.cfg, self.rpc, self.instance,
7661
                                    node_name, True)
7662

    
7663
  def CheckPrereq(self):
7664
    """Check prerequisites.
7665

7666
    This checks that the instance is in the cluster.
7667

7668
    """
7669
    self.instance = instance = self.cfg.GetInstanceInfo(self.instance_name)
7670
    assert instance is not None, \
7671
      "Cannot retrieve locked instance %s" % self.instance_name
7672

    
7673
    if instance.disk_template != constants.DT_DRBD8:
7674
      raise errors.OpPrereqError("Can only run replace disks for DRBD8-based"
7675
                                 " instances", errors.ECODE_INVAL)
7676

    
7677
    if len(instance.secondary_nodes) != 1:
7678
      raise errors.OpPrereqError("The instance has a strange layout,"
7679
                                 " expected one secondary but found %d" %
7680
                                 len(instance.secondary_nodes),
7681
                                 errors.ECODE_FAULT)
7682

    
7683
    if not self.delay_iallocator:
7684
      self._CheckPrereq2()
7685

    
7686
  def _CheckPrereq2(self):
7687
    """Check prerequisites, second part.
7688

7689
    This function should always be part of CheckPrereq. It was separated and is
7690
    now called from Exec because during node evacuation iallocator was only
7691
    called with an unmodified cluster model, not taking planned changes into
7692
    account.
7693

7694
    """
7695
    instance = self.instance
7696
    secondary_node = instance.secondary_nodes[0]
7697

    
7698
    if self.iallocator_name is None:
7699
      remote_node = self.remote_node
7700
    else:
7701
      remote_node = self._RunAllocator(self.lu, self.iallocator_name,
7702
                                       instance.name, instance.secondary_nodes)
7703

    
7704
    if remote_node is not None:
7705
      self.remote_node_info = self.cfg.GetNodeInfo(remote_node)
7706
      assert self.remote_node_info is not None, \
7707
        "Cannot retrieve locked node %s" % remote_node
7708
    else:
7709
      self.remote_node_info = None
7710

    
7711
    if remote_node == self.instance.primary_node:
7712
      raise errors.OpPrereqError("The specified node is the primary node of"
7713
                                 " the instance.", errors.ECODE_INVAL)
7714

    
7715
    if remote_node == secondary_node:
7716
      raise errors.OpPrereqError("The specified node is already the"
7717
                                 " secondary node of the instance.",
7718
                                 errors.ECODE_INVAL)
7719

    
7720
    if self.disks and self.mode in (constants.REPLACE_DISK_AUTO,
7721
                                    constants.REPLACE_DISK_CHG):
7722
      raise errors.OpPrereqError("Cannot specify disks to be replaced",
7723
                                 errors.ECODE_INVAL)
7724

    
7725
    if self.mode == constants.REPLACE_DISK_AUTO:
7726
      faulty_primary = self._FindFaultyDisks(instance.primary_node)
7727
      faulty_secondary = self._FindFaultyDisks(secondary_node)
7728

    
7729
      if faulty_primary and faulty_secondary:
7730
        raise errors.OpPrereqError("Instance %s has faulty disks on more than"
7731
                                   " one node and can not be repaired"
7732
                                   " automatically" % self.instance_name,
7733
                                   errors.ECODE_STATE)
7734

    
7735
      if faulty_primary:
7736
        self.disks = faulty_primary
7737
        self.target_node = instance.primary_node
7738
        self.other_node = secondary_node
7739
        check_nodes = [self.target_node, self.other_node]
7740
      elif faulty_secondary:
7741
        self.disks = faulty_secondary
7742
        self.target_node = secondary_node
7743
        self.other_node = instance.primary_node
7744
        check_nodes = [self.target_node, self.other_node]
7745
      else:
7746
        self.disks = []
7747
        check_nodes = []
7748

    
7749
    else:
7750
      # Non-automatic modes
7751
      if self.mode == constants.REPLACE_DISK_PRI:
7752
        self.target_node = instance.primary_node
7753
        self.other_node = secondary_node
7754
        check_nodes = [self.target_node, self.other_node]
7755

    
7756
      elif self.mode == constants.REPLACE_DISK_SEC:
7757
        self.target_node = secondary_node
7758
        self.other_node = instance.primary_node
7759
        check_nodes = [self.target_node, self.other_node]
7760

    
7761
      elif self.mode == constants.REPLACE_DISK_CHG:
7762
        self.new_node = remote_node
7763
        self.other_node = instance.primary_node
7764
        self.target_node = secondary_node
7765
        check_nodes = [self.new_node, self.other_node]
7766

    
7767
        _CheckNodeNotDrained(self.lu, remote_node)
7768

    
7769
        old_node_info = self.cfg.GetNodeInfo(secondary_node)
7770
        assert old_node_info is not None
7771
        if old_node_info.offline and not self.early_release:
7772
          # doesn't make sense to delay the release
7773
          self.early_release = True
7774
          self.lu.LogInfo("Old secondary %s is offline, automatically enabling"
7775
                          " early-release mode", secondary_node)
7776

    
7777
      else:
7778
        raise errors.ProgrammerError("Unhandled disk replace mode (%s)" %
7779
                                     self.mode)
7780

    
7781
      # If not specified all disks should be replaced
7782
      if not self.disks:
7783
        self.disks = range(len(self.instance.disks))
7784

    
7785
    for node in check_nodes:
7786
      _CheckNodeOnline(self.lu, node)
7787

    
7788
    # Check whether disks are valid
7789
    for disk_idx in self.disks:
7790
      instance.FindDisk(disk_idx)
7791

    
7792
    # Get secondary node IP addresses
7793
    node_2nd_ip = {}
7794

    
7795
    for node_name in [self.target_node, self.other_node, self.new_node]:
7796
      if node_name is not None:
7797
        node_2nd_ip[node_name] = self.cfg.GetNodeInfo(node_name).secondary_ip
7798

    
7799
    self.node_secondary_ip = node_2nd_ip
7800

    
7801
  def Exec(self, feedback_fn):
7802
    """Execute disk replacement.
7803

7804
    This dispatches the disk replacement to the appropriate handler.
7805

7806
    """
7807
    if self.delay_iallocator:
7808
      self._CheckPrereq2()
7809

    
7810
    if not self.disks:
7811
      feedback_fn("No disks need replacement")
7812
      return
7813

    
7814
    feedback_fn("Replacing disk(s) %s for %s" %
7815
                (utils.CommaJoin(self.disks), self.instance.name))
7816

    
7817
    activate_disks = (not self.instance.admin_up)
7818

    
7819
    # Activate the instance disks if we're replacing them on a down instance
7820
    if activate_disks:
7821
      _StartInstanceDisks(self.lu, self.instance, True)
7822

    
7823
    try:
7824
      # Should we replace the secondary node?
7825
      if self.new_node is not None:
7826
        fn = self._ExecDrbd8Secondary
7827
      else:
7828
        fn = self._ExecDrbd8DiskOnly
7829

    
7830
      return fn(feedback_fn)
7831

    
7832
    finally:
7833
      # Deactivate the instance disks if we're replacing them on a
7834
      # down instance
7835
      if activate_disks:
7836
        _SafeShutdownInstanceDisks(self.lu, self.instance)
7837

    
7838
  def _CheckVolumeGroup(self, nodes):
7839
    self.lu.LogInfo("Checking volume groups")
7840

    
7841
    vgname = self.cfg.GetVGName()
7842

    
7843
    # Make sure volume group exists on all involved nodes
7844
    results = self.rpc.call_vg_list(nodes)
7845
    if not results:
7846
      raise errors.OpExecError("Can't list volume groups on the nodes")
7847

    
7848
    for node in nodes:
7849
      res = results[node]
7850
      res.Raise("Error checking node %s" % node)
7851
      if vgname not in res.payload:
7852
        raise errors.OpExecError("Volume group '%s' not found on node %s" %
7853
                                 (vgname, node))
7854

    
7855
  def _CheckDisksExistence(self, nodes):
7856
    # Check disk existence
7857
    for idx, dev in enumerate(self.instance.disks):
7858
      if idx not in self.disks:
7859
        continue
7860

    
7861
      for node in nodes:
7862
        self.lu.LogInfo("Checking disk/%d on %s" % (idx, node))
7863
        self.cfg.SetDiskID(dev, node)
7864

    
7865
        result = self.rpc.call_blockdev_find(node, dev)
7866

    
7867
        msg = result.fail_msg
7868
        if msg or not result.payload:
7869
          if not msg:
7870
            msg = "disk not found"
7871
          raise errors.OpExecError("Can't find disk/%d on node %s: %s" %
7872
                                   (idx, node, msg))
7873

    
7874
  def _CheckDisksConsistency(self, node_name, on_primary, ldisk):
7875
    for idx, dev in enumerate(self.instance.disks):
7876
      if idx not in self.disks:
7877
        continue
7878

    
7879
      self.lu.LogInfo("Checking disk/%d consistency on node %s" %
7880
                      (idx, node_name))
7881

    
7882
      if not _CheckDiskConsistency(self.lu, dev, node_name, on_primary,
7883
                                   ldisk=ldisk):
7884
        raise errors.OpExecError("Node %s has degraded storage, unsafe to"
7885
                                 " replace disks for instance %s" %
7886
                                 (node_name, self.instance.name))
7887

    
7888
  def _CreateNewStorage(self, node_name):
7889
    vgname = self.cfg.GetVGName()
7890
    iv_names = {}
7891

    
7892
    for idx, dev in enumerate(self.instance.disks):
7893
      if idx not in self.disks:
7894
        continue
7895

    
7896
      self.lu.LogInfo("Adding storage on %s for disk/%d" % (node_name, idx))
7897

    
7898
      self.cfg.SetDiskID(dev, node_name)
7899

    
7900
      lv_names = [".disk%d_%s" % (idx, suffix) for suffix in ["data", "meta"]]
7901
      names = _GenerateUniqueNames(self.lu, lv_names)
7902

    
7903
      lv_data = objects.Disk(dev_type=constants.LD_LV, size=dev.size,
7904
                             logical_id=(vgname, names[0]))
7905
      lv_meta = objects.Disk(dev_type=constants.LD_LV, size=128,
7906
                             logical_id=(vgname, names[1]))
7907

    
7908
      new_lvs = [lv_data, lv_meta]
7909
      old_lvs = dev.children
7910
      iv_names[dev.iv_name] = (dev, old_lvs, new_lvs)
7911

    
7912
      # we pass force_create=True to force the LVM creation
7913
      for new_lv in new_lvs:
7914
        _CreateBlockDev(self.lu, node_name, self.instance, new_lv, True,
7915
                        _GetInstanceInfoText(self.instance), False)
7916

    
7917
    return iv_names
7918

    
7919
  def _CheckDevices(self, node_name, iv_names):
7920
    for name, (dev, _, _) in iv_names.iteritems():
7921
      self.cfg.SetDiskID(dev, node_name)
7922

    
7923
      result = self.rpc.call_blockdev_find(node_name, dev)
7924

    
7925
      msg = result.fail_msg
7926
      if msg or not result.payload:
7927
        if not msg:
7928
          msg = "disk not found"
7929
        raise errors.OpExecError("Can't find DRBD device %s: %s" %
7930
                                 (name, msg))
7931

    
7932
      if result.payload.is_degraded:
7933
        raise errors.OpExecError("DRBD device %s is degraded!" % name)
7934

    
7935
  def _RemoveOldStorage(self, node_name, iv_names):
7936
    for name, (_, old_lvs, _) in iv_names.iteritems():
7937
      self.lu.LogInfo("Remove logical volumes for %s" % name)
7938

    
7939
      for lv in old_lvs:
7940
        self.cfg.SetDiskID(lv, node_name)
7941

    
7942
        msg = self.rpc.call_blockdev_remove(node_name, lv).fail_msg
7943
        if msg:
7944
          self.lu.LogWarning("Can't remove old LV: %s" % msg,
7945
                             hint="remove unused LVs manually")
7946

    
7947
  def _ReleaseNodeLock(self, node_name):
7948
    """Releases the lock for a given node."""
7949
    self.lu.context.glm.release(locking.LEVEL_NODE, node_name)
7950

    
7951
  def _ExecDrbd8DiskOnly(self, feedback_fn):
7952
    """Replace a disk on the primary or secondary for DRBD 8.
7953

7954
    The algorithm for replace is quite complicated:
7955

7956
      1. for each disk to be replaced:
7957

7958
        1. create new LVs on the target node with unique names
7959
        1. detach old LVs from the drbd device
7960
        1. rename old LVs to name_replaced.<time_t>
7961
        1. rename new LVs to old LVs
7962
        1. attach the new LVs (with the old names now) to the drbd device
7963

7964
      1. wait for sync across all devices
7965

7966
      1. for each modified disk:
7967

7968
        1. remove old LVs (which have the name name_replaces.<time_t>)
7969

7970
    Failures are not very well handled.
7971

7972
    """
7973
    steps_total = 6
7974

    
7975
    # Step: check device activation
7976
    self.lu.LogStep(1, steps_total, "Check device existence")
7977
    self._CheckDisksExistence([self.other_node, self.target_node])
7978
    self._CheckVolumeGroup([self.target_node, self.other_node])
7979

    
7980
    # Step: check other node consistency
7981
    self.lu.LogStep(2, steps_total, "Check peer consistency")
7982
    self._CheckDisksConsistency(self.other_node,
7983
                                self.other_node == self.instance.primary_node,
7984
                                False)
7985

    
7986
    # Step: create new storage
7987
    self.lu.LogStep(3, steps_total, "Allocate new storage")
7988
    iv_names = self._CreateNewStorage(self.target_node)
7989

    
7990
    # Step: for each lv, detach+rename*2+attach
7991
    self.lu.LogStep(4, steps_total, "Changing drbd configuration")
7992
    for dev, old_lvs, new_lvs in iv_names.itervalues():
7993
      self.lu.LogInfo("Detaching %s drbd from local storage" % dev.iv_name)
7994

    
7995
      result = self.rpc.call_blockdev_removechildren(self.target_node, dev,
7996
                                                     old_lvs)
7997
      result.Raise("Can't detach drbd from local storage on node"
7998
                   " %s for device %s" % (self.target_node, dev.iv_name))
7999
      #dev.children = []
8000
      #cfg.Update(instance)
8001

    
8002
      # ok, we created the new LVs, so now we know we have the needed
8003
      # storage; as such, we proceed on the target node to rename
8004
      # old_lv to _old, and new_lv to old_lv; note that we rename LVs
8005
      # using the assumption that logical_id == physical_id (which in
8006
      # turn is the unique_id on that node)
8007

    
8008
      # FIXME(iustin): use a better name for the replaced LVs
8009
      temp_suffix = int(time.time())
8010
      ren_fn = lambda d, suff: (d.physical_id[0],
8011
                                d.physical_id[1] + "_replaced-%s" % suff)
8012

    
8013
      # Build the rename list based on what LVs exist on the node
8014
      rename_old_to_new = []
8015
      for to_ren in old_lvs:
8016
        result = self.rpc.call_blockdev_find(self.target_node, to_ren)
8017
        if not result.fail_msg and result.payload:
8018
          # device exists
8019
          rename_old_to_new.append((to_ren, ren_fn(to_ren, temp_suffix)))
8020

    
8021
      self.lu.LogInfo("Renaming the old LVs on the target node")
8022
      result = self.rpc.call_blockdev_rename(self.target_node,
8023
                                             rename_old_to_new)
8024
      result.Raise("Can't rename old LVs on node %s" % self.target_node)
8025

    
8026
      # Now we rename the new LVs to the old LVs
8027
      self.lu.LogInfo("Renaming the new LVs on the target node")
8028
      rename_new_to_old = [(new, old.physical_id)
8029
                           for old, new in zip(old_lvs, new_lvs)]
8030
      result = self.rpc.call_blockdev_rename(self.target_node,
8031
                                             rename_new_to_old)
8032
      result.Raise("Can't rename new LVs on node %s" % self.target_node)
8033

    
8034
      for old, new in zip(old_lvs, new_lvs):
8035
        new.logical_id = old.logical_id
8036
        self.cfg.SetDiskID(new, self.target_node)
8037

    
8038
      for disk in old_lvs:
8039
        disk.logical_id = ren_fn(disk, temp_suffix)
8040
        self.cfg.SetDiskID(disk, self.target_node)
8041

    
8042
      # Now that the new lvs have the old name, we can add them to the device
8043
      self.lu.LogInfo("Adding new mirror component on %s" % self.target_node)
8044
      result = self.rpc.call_blockdev_addchildren(self.target_node, dev,
8045
                                                  new_lvs)
8046
      msg = result.fail_msg
8047
      if msg:
8048
        for new_lv in new_lvs:
8049
          msg2 = self.rpc.call_blockdev_remove(self.target_node,
8050
                                               new_lv).fail_msg
8051
          if msg2:
8052
            self.lu.LogWarning("Can't rollback device %s: %s", dev, msg2,
8053
                               hint=("cleanup manually the unused logical"
8054
                                     "volumes"))
8055
        raise errors.OpExecError("Can't add local storage to drbd: %s" % msg)
8056

    
8057
      dev.children = new_lvs
8058

    
8059
      self.cfg.Update(self.instance, feedback_fn)
8060

    
8061
    cstep = 5
8062
    if self.early_release:
8063
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8064
      cstep += 1
8065
      self._RemoveOldStorage(self.target_node, iv_names)
8066
      # WARNING: we release both node locks here, do not do other RPCs
8067
      # than WaitForSync to the primary node
8068
      self._ReleaseNodeLock([self.target_node, self.other_node])
8069

    
8070
    # Wait for sync
8071
    # This can fail as the old devices are degraded and _WaitForSync
8072
    # does a combined result over all disks, so we don't check its return value
8073
    self.lu.LogStep(cstep, steps_total, "Sync devices")
8074
    cstep += 1
8075
    _WaitForSync(self.lu, self.instance)
8076

    
8077
    # Check all devices manually
8078
    self._CheckDevices(self.instance.primary_node, iv_names)
8079

    
8080
    # Step: remove old storage
8081
    if not self.early_release:
8082
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8083
      cstep += 1
8084
      self._RemoveOldStorage(self.target_node, iv_names)
8085

    
8086
  def _ExecDrbd8Secondary(self, feedback_fn):
8087
    """Replace the secondary node for DRBD 8.
8088

8089
    The algorithm for replace is quite complicated:
8090
      - for all disks of the instance:
8091
        - create new LVs on the new node with same names
8092
        - shutdown the drbd device on the old secondary
8093
        - disconnect the drbd network on the primary
8094
        - create the drbd device on the new secondary
8095
        - network attach the drbd on the primary, using an artifice:
8096
          the drbd code for Attach() will connect to the network if it
8097
          finds a device which is connected to the good local disks but
8098
          not network enabled
8099
      - wait for sync across all devices
8100
      - remove all disks from the old secondary
8101

8102
    Failures are not very well handled.
8103

8104
    """
8105
    steps_total = 6
8106

    
8107
    # Step: check device activation
8108
    self.lu.LogStep(1, steps_total, "Check device existence")
8109
    self._CheckDisksExistence([self.instance.primary_node])
8110
    self._CheckVolumeGroup([self.instance.primary_node])
8111

    
8112
    # Step: check other node consistency
8113
    self.lu.LogStep(2, steps_total, "Check peer consistency")
8114
    self._CheckDisksConsistency(self.instance.primary_node, True, True)
8115

    
8116
    # Step: create new storage
8117
    self.lu.LogStep(3, steps_total, "Allocate new storage")
8118
    for idx, dev in enumerate(self.instance.disks):
8119
      self.lu.LogInfo("Adding new local storage on %s for disk/%d" %
8120
                      (self.new_node, idx))
8121
      # we pass force_create=True to force LVM creation
8122
      for new_lv in dev.children:
8123
        _CreateBlockDev(self.lu, self.new_node, self.instance, new_lv, True,
8124
                        _GetInstanceInfoText(self.instance), False)
8125

    
8126
    # Step 4: dbrd minors and drbd setups changes
8127
    # after this, we must manually remove the drbd minors on both the
8128
    # error and the success paths
8129
    self.lu.LogStep(4, steps_total, "Changing drbd configuration")
8130
    minors = self.cfg.AllocateDRBDMinor([self.new_node
8131
                                         for dev in self.instance.disks],
8132
                                        self.instance.name)
8133
    logging.debug("Allocated minors %r", minors)
8134

    
8135
    iv_names = {}
8136
    for idx, (dev, new_minor) in enumerate(zip(self.instance.disks, minors)):
8137
      self.lu.LogInfo("activating a new drbd on %s for disk/%d" %
8138
                      (self.new_node, idx))
8139
      # create new devices on new_node; note that we create two IDs:
8140
      # one without port, so the drbd will be activated without
8141
      # networking information on the new node at this stage, and one
8142
      # with network, for the latter activation in step 4
8143
      (o_node1, o_node2, o_port, o_minor1, o_minor2, o_secret) = dev.logical_id
8144
      if self.instance.primary_node == o_node1:
8145
        p_minor = o_minor1
8146
      else:
8147
        assert self.instance.primary_node == o_node2, "Three-node instance?"
8148
        p_minor = o_minor2
8149

    
8150
      new_alone_id = (self.instance.primary_node, self.new_node, None,
8151
                      p_minor, new_minor, o_secret)
8152
      new_net_id = (self.instance.primary_node, self.new_node, o_port,
8153
                    p_minor, new_minor, o_secret)
8154

    
8155
      iv_names[idx] = (dev, dev.children, new_net_id)
8156
      logging.debug("Allocated new_minor: %s, new_logical_id: %s", new_minor,
8157
                    new_net_id)
8158
      new_drbd = objects.Disk(dev_type=constants.LD_DRBD8,
8159
                              logical_id=new_alone_id,
8160
                              children=dev.children,
8161
                              size=dev.size)
8162
      try:
8163
        _CreateSingleBlockDev(self.lu, self.new_node, self.instance, new_drbd,
8164
                              _GetInstanceInfoText(self.instance), False)
8165
      except errors.GenericError:
8166
        self.cfg.ReleaseDRBDMinors(self.instance.name)
8167
        raise
8168

    
8169
    # We have new devices, shutdown the drbd on the old secondary
8170
    for idx, dev in enumerate(self.instance.disks):
8171
      self.lu.LogInfo("Shutting down drbd for disk/%d on old node" % idx)
8172
      self.cfg.SetDiskID(dev, self.target_node)
8173
      msg = self.rpc.call_blockdev_shutdown(self.target_node, dev).fail_msg
8174
      if msg:
8175
        self.lu.LogWarning("Failed to shutdown drbd for disk/%d on old"
8176
                           "node: %s" % (idx, msg),
8177
                           hint=("Please cleanup this device manually as"
8178
                                 " soon as possible"))
8179

    
8180
    self.lu.LogInfo("Detaching primary drbds from the network (=> standalone)")
8181
    result = self.rpc.call_drbd_disconnect_net([self.instance.primary_node],
8182
                                               self.node_secondary_ip,
8183
                                               self.instance.disks)\
8184
                                              [self.instance.primary_node]
8185

    
8186
    msg = result.fail_msg
8187
    if msg:
8188
      # detaches didn't succeed (unlikely)
8189
      self.cfg.ReleaseDRBDMinors(self.instance.name)
8190
      raise errors.OpExecError("Can't detach the disks from the network on"
8191
                               " old node: %s" % (msg,))
8192

    
8193
    # if we managed to detach at least one, we update all the disks of
8194
    # the instance to point to the new secondary
8195
    self.lu.LogInfo("Updating instance configuration")
8196
    for dev, _, new_logical_id in iv_names.itervalues():
8197
      dev.logical_id = new_logical_id
8198
      self.cfg.SetDiskID(dev, self.instance.primary_node)
8199

    
8200
    self.cfg.Update(self.instance, feedback_fn)
8201

    
8202
    # and now perform the drbd attach
8203
    self.lu.LogInfo("Attaching primary drbds to new secondary"
8204
                    " (standalone => connected)")
8205
    result = self.rpc.call_drbd_attach_net([self.instance.primary_node,
8206
                                            self.new_node],
8207
                                           self.node_secondary_ip,
8208
                                           self.instance.disks,
8209
                                           self.instance.name,
8210
                                           False)
8211
    for to_node, to_result in result.items():
8212
      msg = to_result.fail_msg
8213
      if msg:
8214
        self.lu.LogWarning("Can't attach drbd disks on node %s: %s",
8215
                           to_node, msg,
8216
                           hint=("please do a gnt-instance info to see the"
8217
                                 " status of disks"))
8218
    cstep = 5
8219
    if self.early_release:
8220
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8221
      cstep += 1
8222
      self._RemoveOldStorage(self.target_node, iv_names)
8223
      # WARNING: we release all node locks here, do not do other RPCs
8224
      # than WaitForSync to the primary node
8225
      self._ReleaseNodeLock([self.instance.primary_node,
8226
                             self.target_node,
8227
                             self.new_node])
8228

    
8229
    # Wait for sync
8230
    # This can fail as the old devices are degraded and _WaitForSync
8231
    # does a combined result over all disks, so we don't check its return value
8232
    self.lu.LogStep(cstep, steps_total, "Sync devices")
8233
    cstep += 1
8234
    _WaitForSync(self.lu, self.instance)
8235

    
8236
    # Check all devices manually
8237
    self._CheckDevices(self.instance.primary_node, iv_names)
8238

    
8239
    # Step: remove old storage
8240
    if not self.early_release:
8241
      self.lu.LogStep(cstep, steps_total, "Removing old storage")
8242
      self._RemoveOldStorage(self.target_node, iv_names)
8243

    
8244

    
8245
class LURepairNodeStorage(NoHooksLU):
8246
  """Repairs the volume group on a node.
8247

8248
  """
8249
  _OP_PARAMS = [
8250
    _PNodeName,
8251
    ("storage_type", ht.NoDefault, _CheckStorageType),
8252
    ("name", ht.NoDefault, ht.TNonEmptyString),
8253
    ("ignore_consistency", False, ht.TBool),
8254
    ]
8255
  REQ_BGL = False
8256

    
8257
  def CheckArguments(self):
8258
    self.op.node_name = _ExpandNodeName(self.cfg, self.op.node_name)
8259

    
8260
    storage_type = self.op.storage_type
8261

    
8262
    if (constants.SO_FIX_CONSISTENCY not in
8263
        constants.VALID_STORAGE_OPERATIONS.get(storage_type, [])):
8264
      raise errors.OpPrereqError("Storage units of type '%s' can not be"
8265
                                 " repaired" % storage_type,
8266
                                 errors.ECODE_INVAL)
8267

    
8268
  def ExpandNames(self):
8269
    self.needed_locks = {
8270
      locking.LEVEL_NODE: [self.op.node_name],
8271
      }
8272

    
8273
  def _CheckFaultyDisks(self, instance, node_name):
8274
    """Ensure faulty disks abort the opcode or at least warn."""
8275
    try:
8276
      if _FindFaultyInstanceDisks(self.cfg, self.rpc, instance,
8277
                                  node_name, True):
8278
        raise errors.OpPrereqError("Instance '%s' has faulty disks on"
8279
                                   " node '%s'" % (instance.name, node_name),
8280
                                   errors.ECODE_STATE)
8281
    except errors.OpPrereqError, err:
8282
      if self.op.ignore_consistency:
8283
        self.proc.LogWarning(str(err.args[0]))
8284
      else:
8285
        raise
8286

    
8287
  def CheckPrereq(self):
8288
    """Check prerequisites.
8289

8290
    """
8291
    # Check whether any instance on this node has faulty disks
8292
    for inst in _GetNodeInstances(self.cfg, self.op.node_name):
8293
      if not inst.admin_up:
8294
        continue
8295
      check_nodes = set(inst.all_nodes)
8296
      check_nodes.discard(self.op.node_name)
8297
      for inst_node_name in check_nodes:
8298
        self._CheckFaultyDisks(inst, inst_node_name)
8299

    
8300
  def Exec(self, feedback_fn):
8301
    feedback_fn("Repairing storage unit '%s' on %s ..." %
8302
                (self.op.name, self.op.node_name))
8303

    
8304
    st_args = _GetStorageTypeArgs(self.cfg, self.op.storage_type)
8305
    result = self.rpc.call_storage_execute(self.op.node_name,
8306
                                           self.op.storage_type, st_args,
8307
                                           self.op.name,
8308
                                           constants.SO_FIX_CONSISTENCY)
8309
    result.Raise("Failed to repair storage unit '%s' on %s" %
8310
                 (self.op.name, self.op.node_name))
8311

    
8312

    
8313
class LUNodeEvacuationStrategy(NoHooksLU):
8314
  """Computes the node evacuation strategy.
8315

8316
  """
8317
  _OP_PARAMS = [
8318
    ("nodes", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
8319
    ("remote_node", None, ht.TMaybeString),
8320
    ("iallocator", None, ht.TMaybeString),
8321
    ]
8322
  REQ_BGL = False
8323

    
8324
  def CheckArguments(self):
8325
    _CheckIAllocatorOrNode(self, "iallocator", "remote_node")
8326

    
8327
  def ExpandNames(self):
8328
    self.op.nodes = _GetWantedNodes(self, self.op.nodes)
8329
    self.needed_locks = locks = {}
8330
    if self.op.remote_node is None:
8331
      locks[locking.LEVEL_NODE] = locking.ALL_SET
8332
    else:
8333
      self.op.remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
8334
      locks[locking.LEVEL_NODE] = self.op.nodes + [self.op.remote_node]
8335

    
8336
  def Exec(self, feedback_fn):
8337
    if self.op.remote_node is not None:
8338
      instances = []
8339
      for node in self.op.nodes:
8340
        instances.extend(_GetNodeSecondaryInstances(self.cfg, node))
8341
      result = []
8342
      for i in instances:
8343
        if i.primary_node == self.op.remote_node:
8344
          raise errors.OpPrereqError("Node %s is the primary node of"
8345
                                     " instance %s, cannot use it as"
8346
                                     " secondary" %
8347
                                     (self.op.remote_node, i.name),
8348
                                     errors.ECODE_INVAL)
8349
        result.append([i.name, self.op.remote_node])
8350
    else:
8351
      ial = IAllocator(self.cfg, self.rpc,
8352
                       mode=constants.IALLOCATOR_MODE_MEVAC,
8353
                       evac_nodes=self.op.nodes)
8354
      ial.Run(self.op.iallocator, validate=True)
8355
      if not ial.success:
8356
        raise errors.OpExecError("No valid evacuation solution: %s" % ial.info,
8357
                                 errors.ECODE_NORES)
8358
      result = ial.result
8359
    return result
8360

    
8361

    
8362
class LUGrowDisk(LogicalUnit):
8363
  """Grow a disk of an instance.
8364

8365
  """
8366
  HPATH = "disk-grow"
8367
  HTYPE = constants.HTYPE_INSTANCE
8368
  _OP_PARAMS = [
8369
    _PInstanceName,
8370
    ("disk", ht.NoDefault, ht.TInt),
8371
    ("amount", ht.NoDefault, ht.TInt),
8372
    ("wait_for_sync", True, ht.TBool),
8373
    ]
8374
  REQ_BGL = False
8375

    
8376
  def ExpandNames(self):
8377
    self._ExpandAndLockInstance()
8378
    self.needed_locks[locking.LEVEL_NODE] = []
8379
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8380

    
8381
  def DeclareLocks(self, level):
8382
    if level == locking.LEVEL_NODE:
8383
      self._LockInstancesNodes()
8384

    
8385
  def BuildHooksEnv(self):
8386
    """Build hooks env.
8387

8388
    This runs on the master, the primary and all the secondaries.
8389

8390
    """
8391
    env = {
8392
      "DISK": self.op.disk,
8393
      "AMOUNT": self.op.amount,
8394
      }
8395
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
8396
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
8397
    return env, nl, nl
8398

    
8399
  def CheckPrereq(self):
8400
    """Check prerequisites.
8401

8402
    This checks that the instance is in the cluster.
8403

8404
    """
8405
    instance = self.cfg.GetInstanceInfo(self.op.instance_name)
8406
    assert instance is not None, \
8407
      "Cannot retrieve locked instance %s" % self.op.instance_name
8408
    nodenames = list(instance.all_nodes)
8409
    for node in nodenames:
8410
      _CheckNodeOnline(self, node)
8411

    
8412
    self.instance = instance
8413

    
8414
    if instance.disk_template not in constants.DTS_GROWABLE:
8415
      raise errors.OpPrereqError("Instance's disk layout does not support"
8416
                                 " growing.", errors.ECODE_INVAL)
8417

    
8418
    self.disk = instance.FindDisk(self.op.disk)
8419

    
8420
    if instance.disk_template != constants.DT_FILE:
8421
      # TODO: check the free disk space for file, when that feature will be
8422
      # supported
8423
      _CheckNodesFreeDisk(self, nodenames, self.op.amount)
8424

    
8425
  def Exec(self, feedback_fn):
8426
    """Execute disk grow.
8427

8428
    """
8429
    instance = self.instance
8430
    disk = self.disk
8431

    
8432
    disks_ok, _ = _AssembleInstanceDisks(self, self.instance, disks=[disk])
8433
    if not disks_ok:
8434
      raise errors.OpExecError("Cannot activate block device to grow")
8435

    
8436
    for node in instance.all_nodes:
8437
      self.cfg.SetDiskID(disk, node)
8438
      result = self.rpc.call_blockdev_grow(node, disk, self.op.amount)
8439
      result.Raise("Grow request failed to node %s" % node)
8440

    
8441
      # TODO: Rewrite code to work properly
8442
      # DRBD goes into sync mode for a short amount of time after executing the
8443
      # "resize" command. DRBD 8.x below version 8.0.13 contains a bug whereby
8444
      # calling "resize" in sync mode fails. Sleeping for a short amount of
8445
      # time is a work-around.
8446
      time.sleep(5)
8447

    
8448
    disk.RecordGrow(self.op.amount)
8449
    self.cfg.Update(instance, feedback_fn)
8450
    if self.op.wait_for_sync:
8451
      disk_abort = not _WaitForSync(self, instance, disks=[disk])
8452
      if disk_abort:
8453
        self.proc.LogWarning("Warning: disk sync-ing has not returned a good"
8454
                             " status.\nPlease check the instance.")
8455
      if not instance.admin_up:
8456
        _SafeShutdownInstanceDisks(self, instance, disks=[disk])
8457
    elif not instance.admin_up:
8458
      self.proc.LogWarning("Not shutting down the disk even if the instance is"
8459
                           " not supposed to be running because no wait for"
8460
                           " sync mode was requested.")
8461

    
8462

    
8463
class LUQueryInstanceData(NoHooksLU):
8464
  """Query runtime instance data.
8465

8466
  """
8467
  _OP_PARAMS = [
8468
    ("instances", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
8469
    ("static", False, ht.TBool),
8470
    ]
8471
  REQ_BGL = False
8472

    
8473
  def ExpandNames(self):
8474
    self.needed_locks = {}
8475
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
8476

    
8477
    if self.op.instances:
8478
      self.wanted_names = []
8479
      for name in self.op.instances:
8480
        full_name = _ExpandInstanceName(self.cfg, name)
8481
        self.wanted_names.append(full_name)
8482
      self.needed_locks[locking.LEVEL_INSTANCE] = self.wanted_names
8483
    else:
8484
      self.wanted_names = None
8485
      self.needed_locks[locking.LEVEL_INSTANCE] = locking.ALL_SET
8486

    
8487
    self.needed_locks[locking.LEVEL_NODE] = []
8488
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8489

    
8490
  def DeclareLocks(self, level):
8491
    if level == locking.LEVEL_NODE:
8492
      self._LockInstancesNodes()
8493

    
8494
  def CheckPrereq(self):
8495
    """Check prerequisites.
8496

8497
    This only checks the optional instance list against the existing names.
8498

8499
    """
8500
    if self.wanted_names is None:
8501
      self.wanted_names = self.acquired_locks[locking.LEVEL_INSTANCE]
8502

    
8503
    self.wanted_instances = [self.cfg.GetInstanceInfo(name) for name
8504
                             in self.wanted_names]
8505

    
8506
  def _ComputeBlockdevStatus(self, node, instance_name, dev):
8507
    """Returns the status of a block device
8508

8509
    """
8510
    if self.op.static or not node:
8511
      return None
8512

    
8513
    self.cfg.SetDiskID(dev, node)
8514

    
8515
    result = self.rpc.call_blockdev_find(node, dev)
8516
    if result.offline:
8517
      return None
8518

    
8519
    result.Raise("Can't compute disk status for %s" % instance_name)
8520

    
8521
    status = result.payload
8522
    if status is None:
8523
      return None
8524

    
8525
    return (status.dev_path, status.major, status.minor,
8526
            status.sync_percent, status.estimated_time,
8527
            status.is_degraded, status.ldisk_status)
8528

    
8529
  def _ComputeDiskStatus(self, instance, snode, dev):
8530
    """Compute block device status.
8531

8532
    """
8533
    if dev.dev_type in constants.LDS_DRBD:
8534
      # we change the snode then (otherwise we use the one passed in)
8535
      if dev.logical_id[0] == instance.primary_node:
8536
        snode = dev.logical_id[1]
8537
      else:
8538
        snode = dev.logical_id[0]
8539

    
8540
    dev_pstatus = self._ComputeBlockdevStatus(instance.primary_node,
8541
                                              instance.name, dev)
8542
    dev_sstatus = self._ComputeBlockdevStatus(snode, instance.name, dev)
8543

    
8544
    if dev.children:
8545
      dev_children = [self._ComputeDiskStatus(instance, snode, child)
8546
                      for child in dev.children]
8547
    else:
8548
      dev_children = []
8549

    
8550
    data = {
8551
      "iv_name": dev.iv_name,
8552
      "dev_type": dev.dev_type,
8553
      "logical_id": dev.logical_id,
8554
      "physical_id": dev.physical_id,
8555
      "pstatus": dev_pstatus,
8556
      "sstatus": dev_sstatus,
8557
      "children": dev_children,
8558
      "mode": dev.mode,
8559
      "size": dev.size,
8560
      }
8561

    
8562
    return data
8563

    
8564
  def Exec(self, feedback_fn):
8565
    """Gather and return data"""
8566
    result = {}
8567

    
8568
    cluster = self.cfg.GetClusterInfo()
8569

    
8570
    for instance in self.wanted_instances:
8571
      if not self.op.static:
8572
        remote_info = self.rpc.call_instance_info(instance.primary_node,
8573
                                                  instance.name,
8574
                                                  instance.hypervisor)
8575
        remote_info.Raise("Error checking node %s" % instance.primary_node)
8576
        remote_info = remote_info.payload
8577
        if remote_info and "state" in remote_info:
8578
          remote_state = "up"
8579
        else:
8580
          remote_state = "down"
8581
      else:
8582
        remote_state = None
8583
      if instance.admin_up:
8584
        config_state = "up"
8585
      else:
8586
        config_state = "down"
8587

    
8588
      disks = [self._ComputeDiskStatus(instance, None, device)
8589
               for device in instance.disks]
8590

    
8591
      idict = {
8592
        "name": instance.name,
8593
        "config_state": config_state,
8594
        "run_state": remote_state,
8595
        "pnode": instance.primary_node,
8596
        "snodes": instance.secondary_nodes,
8597
        "os": instance.os,
8598
        # this happens to be the same format used for hooks
8599
        "nics": _NICListToTuple(self, instance.nics),
8600
        "disk_template": instance.disk_template,
8601
        "disks": disks,
8602
        "hypervisor": instance.hypervisor,
8603
        "network_port": instance.network_port,
8604
        "hv_instance": instance.hvparams,
8605
        "hv_actual": cluster.FillHV(instance, skip_globals=True),
8606
        "be_instance": instance.beparams,
8607
        "be_actual": cluster.FillBE(instance),
8608
        "os_instance": instance.osparams,
8609
        "os_actual": cluster.SimpleFillOS(instance.os, instance.osparams),
8610
        "serial_no": instance.serial_no,
8611
        "mtime": instance.mtime,
8612
        "ctime": instance.ctime,
8613
        "uuid": instance.uuid,
8614
        }
8615

    
8616
      result[instance.name] = idict
8617

    
8618
    return result
8619

    
8620

    
8621
class LUSetInstanceParams(LogicalUnit):
8622
  """Modifies an instances's parameters.
8623

8624
  """
8625
  HPATH = "instance-modify"
8626
  HTYPE = constants.HTYPE_INSTANCE
8627
  _OP_PARAMS = [
8628
    _PInstanceName,
8629
    ("nics", ht.EmptyList, ht.TList),
8630
    ("disks", ht.EmptyList, ht.TList),
8631
    ("beparams", ht.EmptyDict, ht.TDict),
8632
    ("hvparams", ht.EmptyDict, ht.TDict),
8633
    ("disk_template", None, ht.TMaybeString),
8634
    ("remote_node", None, ht.TMaybeString),
8635
    ("os_name", None, ht.TMaybeString),
8636
    ("force_variant", False, ht.TBool),
8637
    ("osparams", None, ht.TOr(ht.TDict, ht.TNone)),
8638
    _PForce,
8639
    ]
8640
  REQ_BGL = False
8641

    
8642
  def CheckArguments(self):
8643
    if not (self.op.nics or self.op.disks or self.op.disk_template or
8644
            self.op.hvparams or self.op.beparams or self.op.os_name):
8645
      raise errors.OpPrereqError("No changes submitted", errors.ECODE_INVAL)
8646

    
8647
    if self.op.hvparams:
8648
      _CheckGlobalHvParams(self.op.hvparams)
8649

    
8650
    # Disk validation
8651
    disk_addremove = 0
8652
    for disk_op, disk_dict in self.op.disks:
8653
      utils.ForceDictType(disk_dict, constants.IDISK_PARAMS_TYPES)
8654
      if disk_op == constants.DDM_REMOVE:
8655
        disk_addremove += 1
8656
        continue
8657
      elif disk_op == constants.DDM_ADD:
8658
        disk_addremove += 1
8659
      else:
8660
        if not isinstance(disk_op, int):
8661
          raise errors.OpPrereqError("Invalid disk index", errors.ECODE_INVAL)
8662
        if not isinstance(disk_dict, dict):
8663
          msg = "Invalid disk value: expected dict, got '%s'" % disk_dict
8664
          raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
8665

    
8666
      if disk_op == constants.DDM_ADD:
8667
        mode = disk_dict.setdefault('mode', constants.DISK_RDWR)
8668
        if mode not in constants.DISK_ACCESS_SET:
8669
          raise errors.OpPrereqError("Invalid disk access mode '%s'" % mode,
8670
                                     errors.ECODE_INVAL)
8671
        size = disk_dict.get('size', None)
8672
        if size is None:
8673
          raise errors.OpPrereqError("Required disk parameter size missing",
8674
                                     errors.ECODE_INVAL)
8675
        try:
8676
          size = int(size)
8677
        except (TypeError, ValueError), err:
8678
          raise errors.OpPrereqError("Invalid disk size parameter: %s" %
8679
                                     str(err), errors.ECODE_INVAL)
8680
        disk_dict['size'] = size
8681
      else:
8682
        # modification of disk
8683
        if 'size' in disk_dict:
8684
          raise errors.OpPrereqError("Disk size change not possible, use"
8685
                                     " grow-disk", errors.ECODE_INVAL)
8686

    
8687
    if disk_addremove > 1:
8688
      raise errors.OpPrereqError("Only one disk add or remove operation"
8689
                                 " supported at a time", errors.ECODE_INVAL)
8690

    
8691
    if self.op.disks and self.op.disk_template is not None:
8692
      raise errors.OpPrereqError("Disk template conversion and other disk"
8693
                                 " changes not supported at the same time",
8694
                                 errors.ECODE_INVAL)
8695

    
8696
    if self.op.disk_template:
8697
      _CheckDiskTemplate(self.op.disk_template)
8698
      if (self.op.disk_template in constants.DTS_NET_MIRROR and
8699
          self.op.remote_node is None):
8700
        raise errors.OpPrereqError("Changing the disk template to a mirrored"
8701
                                   " one requires specifying a secondary node",
8702
                                   errors.ECODE_INVAL)
8703

    
8704
    # NIC validation
8705
    nic_addremove = 0
8706
    for nic_op, nic_dict in self.op.nics:
8707
      utils.ForceDictType(nic_dict, constants.INIC_PARAMS_TYPES)
8708
      if nic_op == constants.DDM_REMOVE:
8709
        nic_addremove += 1
8710
        continue
8711
      elif nic_op == constants.DDM_ADD:
8712
        nic_addremove += 1
8713
      else:
8714
        if not isinstance(nic_op, int):
8715
          raise errors.OpPrereqError("Invalid nic index", errors.ECODE_INVAL)
8716
        if not isinstance(nic_dict, dict):
8717
          msg = "Invalid nic value: expected dict, got '%s'" % nic_dict
8718
          raise errors.OpPrereqError(msg, errors.ECODE_INVAL)
8719

    
8720
      # nic_dict should be a dict
8721
      nic_ip = nic_dict.get('ip', None)
8722
      if nic_ip is not None:
8723
        if nic_ip.lower() == constants.VALUE_NONE:
8724
          nic_dict['ip'] = None
8725
        else:
8726
          if not netutils.IPAddress.IsValid(nic_ip):
8727
            raise errors.OpPrereqError("Invalid IP address '%s'" % nic_ip,
8728
                                       errors.ECODE_INVAL)
8729

    
8730
      nic_bridge = nic_dict.get('bridge', None)
8731
      nic_link = nic_dict.get('link', None)
8732
      if nic_bridge and nic_link:
8733
        raise errors.OpPrereqError("Cannot pass 'bridge' and 'link'"
8734
                                   " at the same time", errors.ECODE_INVAL)
8735
      elif nic_bridge and nic_bridge.lower() == constants.VALUE_NONE:
8736
        nic_dict['bridge'] = None
8737
      elif nic_link and nic_link.lower() == constants.VALUE_NONE:
8738
        nic_dict['link'] = None
8739

    
8740
      if nic_op == constants.DDM_ADD:
8741
        nic_mac = nic_dict.get('mac', None)
8742
        if nic_mac is None:
8743
          nic_dict['mac'] = constants.VALUE_AUTO
8744

    
8745
      if 'mac' in nic_dict:
8746
        nic_mac = nic_dict['mac']
8747
        if nic_mac not in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
8748
          nic_mac = utils.NormalizeAndValidateMac(nic_mac)
8749

    
8750
        if nic_op != constants.DDM_ADD and nic_mac == constants.VALUE_AUTO:
8751
          raise errors.OpPrereqError("'auto' is not a valid MAC address when"
8752
                                     " modifying an existing nic",
8753
                                     errors.ECODE_INVAL)
8754

    
8755
    if nic_addremove > 1:
8756
      raise errors.OpPrereqError("Only one NIC add or remove operation"
8757
                                 " supported at a time", errors.ECODE_INVAL)
8758

    
8759
  def ExpandNames(self):
8760
    self._ExpandAndLockInstance()
8761
    self.needed_locks[locking.LEVEL_NODE] = []
8762
    self.recalculate_locks[locking.LEVEL_NODE] = constants.LOCKS_REPLACE
8763

    
8764
  def DeclareLocks(self, level):
8765
    if level == locking.LEVEL_NODE:
8766
      self._LockInstancesNodes()
8767
      if self.op.disk_template and self.op.remote_node:
8768
        self.op.remote_node = _ExpandNodeName(self.cfg, self.op.remote_node)
8769
        self.needed_locks[locking.LEVEL_NODE].append(self.op.remote_node)
8770

    
8771
  def BuildHooksEnv(self):
8772
    """Build hooks env.
8773

8774
    This runs on the master, primary and secondaries.
8775

8776
    """
8777
    args = dict()
8778
    if constants.BE_MEMORY in self.be_new:
8779
      args['memory'] = self.be_new[constants.BE_MEMORY]
8780
    if constants.BE_VCPUS in self.be_new:
8781
      args['vcpus'] = self.be_new[constants.BE_VCPUS]
8782
    # TODO: export disk changes. Note: _BuildInstanceHookEnv* don't export disk
8783
    # information at all.
8784
    if self.op.nics:
8785
      args['nics'] = []
8786
      nic_override = dict(self.op.nics)
8787
      for idx, nic in enumerate(self.instance.nics):
8788
        if idx in nic_override:
8789
          this_nic_override = nic_override[idx]
8790
        else:
8791
          this_nic_override = {}
8792
        if 'ip' in this_nic_override:
8793
          ip = this_nic_override['ip']
8794
        else:
8795
          ip = nic.ip
8796
        if 'mac' in this_nic_override:
8797
          mac = this_nic_override['mac']
8798
        else:
8799
          mac = nic.mac
8800
        if idx in self.nic_pnew:
8801
          nicparams = self.nic_pnew[idx]
8802
        else:
8803
          nicparams = self.cluster.SimpleFillNIC(nic.nicparams)
8804
        mode = nicparams[constants.NIC_MODE]
8805
        link = nicparams[constants.NIC_LINK]
8806
        args['nics'].append((ip, mac, mode, link))
8807
      if constants.DDM_ADD in nic_override:
8808
        ip = nic_override[constants.DDM_ADD].get('ip', None)
8809
        mac = nic_override[constants.DDM_ADD]['mac']
8810
        nicparams = self.nic_pnew[constants.DDM_ADD]
8811
        mode = nicparams[constants.NIC_MODE]
8812
        link = nicparams[constants.NIC_LINK]
8813
        args['nics'].append((ip, mac, mode, link))
8814
      elif constants.DDM_REMOVE in nic_override:
8815
        del args['nics'][-1]
8816

    
8817
    env = _BuildInstanceHookEnvByObject(self, self.instance, override=args)
8818
    if self.op.disk_template:
8819
      env["NEW_DISK_TEMPLATE"] = self.op.disk_template
8820
    nl = [self.cfg.GetMasterNode()] + list(self.instance.all_nodes)
8821
    return env, nl, nl
8822

    
8823
  def CheckPrereq(self):
8824
    """Check prerequisites.
8825

8826
    This only checks the instance list against the existing names.
8827

8828
    """
8829
    # checking the new params on the primary/secondary nodes
8830

    
8831
    instance = self.instance = self.cfg.GetInstanceInfo(self.op.instance_name)
8832
    cluster = self.cluster = self.cfg.GetClusterInfo()
8833
    assert self.instance is not None, \
8834
      "Cannot retrieve locked instance %s" % self.op.instance_name
8835
    pnode = instance.primary_node
8836
    nodelist = list(instance.all_nodes)
8837

    
8838
    # OS change
8839
    if self.op.os_name and not self.op.force:
8840
      _CheckNodeHasOS(self, instance.primary_node, self.op.os_name,
8841
                      self.op.force_variant)
8842
      instance_os = self.op.os_name
8843
    else:
8844
      instance_os = instance.os
8845

    
8846
    if self.op.disk_template:
8847
      if instance.disk_template == self.op.disk_template:
8848
        raise errors.OpPrereqError("Instance already has disk template %s" %
8849
                                   instance.disk_template, errors.ECODE_INVAL)
8850

    
8851
      if (instance.disk_template,
8852
          self.op.disk_template) not in self._DISK_CONVERSIONS:
8853
        raise errors.OpPrereqError("Unsupported disk template conversion from"
8854
                                   " %s to %s" % (instance.disk_template,
8855
                                                  self.op.disk_template),
8856
                                   errors.ECODE_INVAL)
8857
      _CheckInstanceDown(self, instance, "cannot change disk template")
8858
      if self.op.disk_template in constants.DTS_NET_MIRROR:
8859
        if self.op.remote_node == pnode:
8860
          raise errors.OpPrereqError("Given new secondary node %s is the same"
8861
                                     " as the primary node of the instance" %
8862
                                     self.op.remote_node, errors.ECODE_STATE)
8863
        _CheckNodeOnline(self, self.op.remote_node)
8864
        _CheckNodeNotDrained(self, self.op.remote_node)
8865
        disks = [{"size": d.size} for d in instance.disks]
8866
        required = _ComputeDiskSize(self.op.disk_template, disks)
8867
        _CheckNodesFreeDisk(self, [self.op.remote_node], required)
8868

    
8869
    # hvparams processing
8870
    if self.op.hvparams:
8871
      hv_type = instance.hypervisor
8872
      i_hvdict = _GetUpdatedParams(instance.hvparams, self.op.hvparams)
8873
      utils.ForceDictType(i_hvdict, constants.HVS_PARAMETER_TYPES)
8874
      hv_new = cluster.SimpleFillHV(hv_type, instance.os, i_hvdict)
8875

    
8876
      # local check
8877
      hypervisor.GetHypervisor(hv_type).CheckParameterSyntax(hv_new)
8878
      _CheckHVParams(self, nodelist, instance.hypervisor, hv_new)
8879
      self.hv_new = hv_new # the new actual values
8880
      self.hv_inst = i_hvdict # the new dict (without defaults)
8881
    else:
8882
      self.hv_new = self.hv_inst = {}
8883

    
8884
    # beparams processing
8885
    if self.op.beparams:
8886
      i_bedict = _GetUpdatedParams(instance.beparams, self.op.beparams,
8887
                                   use_none=True)
8888
      utils.ForceDictType(i_bedict, constants.BES_PARAMETER_TYPES)
8889
      be_new = cluster.SimpleFillBE(i_bedict)
8890
      self.be_new = be_new # the new actual values
8891
      self.be_inst = i_bedict # the new dict (without defaults)
8892
    else:
8893
      self.be_new = self.be_inst = {}
8894

    
8895
    # osparams processing
8896
    if self.op.osparams:
8897
      i_osdict = _GetUpdatedParams(instance.osparams, self.op.osparams)
8898
      _CheckOSParams(self, True, nodelist, instance_os, i_osdict)
8899
      self.os_inst = i_osdict # the new dict (without defaults)
8900
    else:
8901
      self.os_inst = {}
8902

    
8903
    self.warn = []
8904

    
8905
    if constants.BE_MEMORY in self.op.beparams and not self.op.force:
8906
      mem_check_list = [pnode]
8907
      if be_new[constants.BE_AUTO_BALANCE]:
8908
        # either we changed auto_balance to yes or it was from before
8909
        mem_check_list.extend(instance.secondary_nodes)
8910
      instance_info = self.rpc.call_instance_info(pnode, instance.name,
8911
                                                  instance.hypervisor)
8912
      nodeinfo = self.rpc.call_node_info(mem_check_list, self.cfg.GetVGName(),
8913
                                         instance.hypervisor)
8914
      pninfo = nodeinfo[pnode]
8915
      msg = pninfo.fail_msg
8916
      if msg:
8917
        # Assume the primary node is unreachable and go ahead
8918
        self.warn.append("Can't get info from primary node %s: %s" %
8919
                         (pnode,  msg))
8920
      elif not isinstance(pninfo.payload.get('memory_free', None), int):
8921
        self.warn.append("Node data from primary node %s doesn't contain"
8922
                         " free memory information" % pnode)
8923
      elif instance_info.fail_msg:
8924
        self.warn.append("Can't get instance runtime information: %s" %
8925
                        instance_info.fail_msg)
8926
      else:
8927
        if instance_info.payload:
8928
          current_mem = int(instance_info.payload['memory'])
8929
        else:
8930
          # Assume instance not running
8931
          # (there is a slight race condition here, but it's not very probable,
8932
          # and we have no other way to check)
8933
          current_mem = 0
8934
        miss_mem = (be_new[constants.BE_MEMORY] - current_mem -
8935
                    pninfo.payload['memory_free'])
8936
        if miss_mem > 0:
8937
          raise errors.OpPrereqError("This change will prevent the instance"
8938
                                     " from starting, due to %d MB of memory"
8939
                                     " missing on its primary node" % miss_mem,
8940
                                     errors.ECODE_NORES)
8941

    
8942
      if be_new[constants.BE_AUTO_BALANCE]:
8943
        for node, nres in nodeinfo.items():
8944
          if node not in instance.secondary_nodes:
8945
            continue
8946
          msg = nres.fail_msg
8947
          if msg:
8948
            self.warn.append("Can't get info from secondary node %s: %s" %
8949
                             (node, msg))
8950
          elif not isinstance(nres.payload.get('memory_free', None), int):
8951
            self.warn.append("Secondary node %s didn't return free"
8952
                             " memory information" % node)
8953
          elif be_new[constants.BE_MEMORY] > nres.payload['memory_free']:
8954
            self.warn.append("Not enough memory to failover instance to"
8955
                             " secondary node %s" % node)
8956

    
8957
    # NIC processing
8958
    self.nic_pnew = {}
8959
    self.nic_pinst = {}
8960
    for nic_op, nic_dict in self.op.nics:
8961
      if nic_op == constants.DDM_REMOVE:
8962
        if not instance.nics:
8963
          raise errors.OpPrereqError("Instance has no NICs, cannot remove",
8964
                                     errors.ECODE_INVAL)
8965
        continue
8966
      if nic_op != constants.DDM_ADD:
8967
        # an existing nic
8968
        if not instance.nics:
8969
          raise errors.OpPrereqError("Invalid NIC index %s, instance has"
8970
                                     " no NICs" % nic_op,
8971
                                     errors.ECODE_INVAL)
8972
        if nic_op < 0 or nic_op >= len(instance.nics):
8973
          raise errors.OpPrereqError("Invalid NIC index %s, valid values"
8974
                                     " are 0 to %d" %
8975
                                     (nic_op, len(instance.nics) - 1),
8976
                                     errors.ECODE_INVAL)
8977
        old_nic_params = instance.nics[nic_op].nicparams
8978
        old_nic_ip = instance.nics[nic_op].ip
8979
      else:
8980
        old_nic_params = {}
8981
        old_nic_ip = None
8982

    
8983
      update_params_dict = dict([(key, nic_dict[key])
8984
                                 for key in constants.NICS_PARAMETERS
8985
                                 if key in nic_dict])
8986

    
8987
      if 'bridge' in nic_dict:
8988
        update_params_dict[constants.NIC_LINK] = nic_dict['bridge']
8989

    
8990
      new_nic_params = _GetUpdatedParams(old_nic_params,
8991
                                         update_params_dict)
8992
      utils.ForceDictType(new_nic_params, constants.NICS_PARAMETER_TYPES)
8993
      new_filled_nic_params = cluster.SimpleFillNIC(new_nic_params)
8994
      objects.NIC.CheckParameterSyntax(new_filled_nic_params)
8995
      self.nic_pinst[nic_op] = new_nic_params
8996
      self.nic_pnew[nic_op] = new_filled_nic_params
8997
      new_nic_mode = new_filled_nic_params[constants.NIC_MODE]
8998

    
8999
      if new_nic_mode == constants.NIC_MODE_BRIDGED:
9000
        nic_bridge = new_filled_nic_params[constants.NIC_LINK]
9001
        msg = self.rpc.call_bridges_exist(pnode, [nic_bridge]).fail_msg
9002
        if msg:
9003
          msg = "Error checking bridges on node %s: %s" % (pnode, msg)
9004
          if self.op.force:
9005
            self.warn.append(msg)
9006
          else:
9007
            raise errors.OpPrereqError(msg, errors.ECODE_ENVIRON)
9008
      if new_nic_mode == constants.NIC_MODE_ROUTED:
9009
        if 'ip' in nic_dict:
9010
          nic_ip = nic_dict['ip']
9011
        else:
9012
          nic_ip = old_nic_ip
9013
        if nic_ip is None:
9014
          raise errors.OpPrereqError('Cannot set the nic ip to None'
9015
                                     ' on a routed nic', errors.ECODE_INVAL)
9016
      if 'mac' in nic_dict:
9017
        nic_mac = nic_dict['mac']
9018
        if nic_mac is None:
9019
          raise errors.OpPrereqError('Cannot set the nic mac to None',
9020
                                     errors.ECODE_INVAL)
9021
        elif nic_mac in (constants.VALUE_AUTO, constants.VALUE_GENERATE):
9022
          # otherwise generate the mac
9023
          nic_dict['mac'] = self.cfg.GenerateMAC(self.proc.GetECId())
9024
        else:
9025
          # or validate/reserve the current one
9026
          try:
9027
            self.cfg.ReserveMAC(nic_mac, self.proc.GetECId())
9028
          except errors.ReservationError:
9029
            raise errors.OpPrereqError("MAC address %s already in use"
9030
                                       " in cluster" % nic_mac,
9031
                                       errors.ECODE_NOTUNIQUE)
9032

    
9033
    # DISK processing
9034
    if self.op.disks and instance.disk_template == constants.DT_DISKLESS:
9035
      raise errors.OpPrereqError("Disk operations not supported for"
9036
                                 " diskless instances",
9037
                                 errors.ECODE_INVAL)
9038
    for disk_op, _ in self.op.disks:
9039
      if disk_op == constants.DDM_REMOVE:
9040
        if len(instance.disks) == 1:
9041
          raise errors.OpPrereqError("Cannot remove the last disk of"
9042
                                     " an instance", errors.ECODE_INVAL)
9043
        _CheckInstanceDown(self, instance, "cannot remove disks")
9044

    
9045
      if (disk_op == constants.DDM_ADD and
9046
          len(instance.nics) >= constants.MAX_DISKS):
9047
        raise errors.OpPrereqError("Instance has too many disks (%d), cannot"
9048
                                   " add more" % constants.MAX_DISKS,
9049
                                   errors.ECODE_STATE)
9050
      if disk_op not in (constants.DDM_ADD, constants.DDM_REMOVE):
9051
        # an existing disk
9052
        if disk_op < 0 or disk_op >= len(instance.disks):
9053
          raise errors.OpPrereqError("Invalid disk index %s, valid values"
9054
                                     " are 0 to %d" %
9055
                                     (disk_op, len(instance.disks)),
9056
                                     errors.ECODE_INVAL)
9057

    
9058
    return
9059

    
9060
  def _ConvertPlainToDrbd(self, feedback_fn):
9061
    """Converts an instance from plain to drbd.
9062

9063
    """
9064
    feedback_fn("Converting template to drbd")
9065
    instance = self.instance
9066
    pnode = instance.primary_node
9067
    snode = self.op.remote_node
9068

    
9069
    # create a fake disk info for _GenerateDiskTemplate
9070
    disk_info = [{"size": d.size, "mode": d.mode} for d in instance.disks]
9071
    new_disks = _GenerateDiskTemplate(self, self.op.disk_template,
9072
                                      instance.name, pnode, [snode],
9073
                                      disk_info, None, None, 0)
9074
    info = _GetInstanceInfoText(instance)
9075
    feedback_fn("Creating aditional volumes...")
9076
    # first, create the missing data and meta devices
9077
    for disk in new_disks:
9078
      # unfortunately this is... not too nice
9079
      _CreateSingleBlockDev(self, pnode, instance, disk.children[1],
9080
                            info, True)
9081
      for child in disk.children:
9082
        _CreateSingleBlockDev(self, snode, instance, child, info, True)
9083
    # at this stage, all new LVs have been created, we can rename the
9084
    # old ones
9085
    feedback_fn("Renaming original volumes...")
9086
    rename_list = [(o, n.children[0].logical_id)
9087
                   for (o, n) in zip(instance.disks, new_disks)]
9088
    result = self.rpc.call_blockdev_rename(pnode, rename_list)
9089
    result.Raise("Failed to rename original LVs")
9090

    
9091
    feedback_fn("Initializing DRBD devices...")
9092
    # all child devices are in place, we can now create the DRBD devices
9093
    for disk in new_disks:
9094
      for node in [pnode, snode]:
9095
        f_create = node == pnode
9096
        _CreateSingleBlockDev(self, node, instance, disk, info, f_create)
9097

    
9098
    # at this point, the instance has been modified
9099
    instance.disk_template = constants.DT_DRBD8
9100
    instance.disks = new_disks
9101
    self.cfg.Update(instance, feedback_fn)
9102

    
9103
    # disks are created, waiting for sync
9104
    disk_abort = not _WaitForSync(self, instance)
9105
    if disk_abort:
9106
      raise errors.OpExecError("There are some degraded disks for"
9107
                               " this instance, please cleanup manually")
9108

    
9109
  def _ConvertDrbdToPlain(self, feedback_fn):
9110
    """Converts an instance from drbd to plain.
9111

9112
    """
9113
    instance = self.instance
9114
    assert len(instance.secondary_nodes) == 1
9115
    pnode = instance.primary_node
9116
    snode = instance.secondary_nodes[0]
9117
    feedback_fn("Converting template to plain")
9118

    
9119
    old_disks = instance.disks
9120
    new_disks = [d.children[0] for d in old_disks]
9121

    
9122
    # copy over size and mode
9123
    for parent, child in zip(old_disks, new_disks):
9124
      child.size = parent.size
9125
      child.mode = parent.mode
9126

    
9127
    # update instance structure
9128
    instance.disks = new_disks
9129
    instance.disk_template = constants.DT_PLAIN
9130
    self.cfg.Update(instance, feedback_fn)
9131

    
9132
    feedback_fn("Removing volumes on the secondary node...")
9133
    for disk in old_disks:
9134
      self.cfg.SetDiskID(disk, snode)
9135
      msg = self.rpc.call_blockdev_remove(snode, disk).fail_msg
9136
      if msg:
9137
        self.LogWarning("Could not remove block device %s on node %s,"
9138
                        " continuing anyway: %s", disk.iv_name, snode, msg)
9139

    
9140
    feedback_fn("Removing unneeded volumes on the primary node...")
9141
    for idx, disk in enumerate(old_disks):
9142
      meta = disk.children[1]
9143
      self.cfg.SetDiskID(meta, pnode)
9144
      msg = self.rpc.call_blockdev_remove(pnode, meta).fail_msg
9145
      if msg:
9146
        self.LogWarning("Could not remove metadata for disk %d on node %s,"
9147
                        " continuing anyway: %s", idx, pnode, msg)
9148

    
9149

    
9150
  def Exec(self, feedback_fn):
9151
    """Modifies an instance.
9152

9153
    All parameters take effect only at the next restart of the instance.
9154

9155
    """
9156
    # Process here the warnings from CheckPrereq, as we don't have a
9157
    # feedback_fn there.
9158
    for warn in self.warn:
9159
      feedback_fn("WARNING: %s" % warn)
9160

    
9161
    result = []
9162
    instance = self.instance
9163
    # disk changes
9164
    for disk_op, disk_dict in self.op.disks:
9165
      if disk_op == constants.DDM_REMOVE:
9166
        # remove the last disk
9167
        device = instance.disks.pop()
9168
        device_idx = len(instance.disks)
9169
        for node, disk in device.ComputeNodeTree(instance.primary_node):
9170
          self.cfg.SetDiskID(disk, node)
9171
          msg = self.rpc.call_blockdev_remove(node, disk).fail_msg
9172
          if msg:
9173
            self.LogWarning("Could not remove disk/%d on node %s: %s,"
9174
                            " continuing anyway", device_idx, node, msg)
9175
        result.append(("disk/%d" % device_idx, "remove"))
9176
      elif disk_op == constants.DDM_ADD:
9177
        # add a new disk
9178
        if instance.disk_template == constants.DT_FILE:
9179
          file_driver, file_path = instance.disks[0].logical_id
9180
          file_path = os.path.dirname(file_path)
9181
        else:
9182
          file_driver = file_path = None
9183
        disk_idx_base = len(instance.disks)
9184
        new_disk = _GenerateDiskTemplate(self,
9185
                                         instance.disk_template,
9186
                                         instance.name, instance.primary_node,
9187
                                         instance.secondary_nodes,
9188
                                         [disk_dict],
9189
                                         file_path,
9190
                                         file_driver,
9191
                                         disk_idx_base)[0]
9192
        instance.disks.append(new_disk)
9193
        info = _GetInstanceInfoText(instance)
9194

    
9195
        logging.info("Creating volume %s for instance %s",
9196
                     new_disk.iv_name, instance.name)
9197
        # Note: this needs to be kept in sync with _CreateDisks
9198
        #HARDCODE
9199
        for node in instance.all_nodes:
9200
          f_create = node == instance.primary_node
9201
          try:
9202
            _CreateBlockDev(self, node, instance, new_disk,
9203
                            f_create, info, f_create)
9204
          except errors.OpExecError, err:
9205
            self.LogWarning("Failed to create volume %s (%s) on"
9206
                            " node %s: %s",
9207
                            new_disk.iv_name, new_disk, node, err)
9208
        result.append(("disk/%d" % disk_idx_base, "add:size=%s,mode=%s" %
9209
                       (new_disk.size, new_disk.mode)))
9210
      else:
9211
        # change a given disk
9212
        instance.disks[disk_op].mode = disk_dict['mode']
9213
        result.append(("disk.mode/%d" % disk_op, disk_dict['mode']))
9214

    
9215
    if self.op.disk_template:
9216
      r_shut = _ShutdownInstanceDisks(self, instance)
9217
      if not r_shut:
9218
        raise errors.OpExecError("Cannot shutdow instance disks, unable to"
9219
                                 " proceed with disk template conversion")
9220
      mode = (instance.disk_template, self.op.disk_template)
9221
      try:
9222
        self._DISK_CONVERSIONS[mode](self, feedback_fn)
9223
      except:
9224
        self.cfg.ReleaseDRBDMinors(instance.name)
9225
        raise
9226
      result.append(("disk_template", self.op.disk_template))
9227

    
9228
    # NIC changes
9229
    for nic_op, nic_dict in self.op.nics:
9230
      if nic_op == constants.DDM_REMOVE:
9231
        # remove the last nic
9232
        del instance.nics[-1]
9233
        result.append(("nic.%d" % len(instance.nics), "remove"))
9234
      elif nic_op == constants.DDM_ADD:
9235
        # mac and bridge should be set, by now
9236
        mac = nic_dict['mac']
9237
        ip = nic_dict.get('ip', None)
9238
        nicparams = self.nic_pinst[constants.DDM_ADD]
9239
        new_nic = objects.NIC(mac=mac, ip=ip, nicparams=nicparams)
9240
        instance.nics.append(new_nic)
9241
        result.append(("nic.%d" % (len(instance.nics) - 1),
9242
                       "add:mac=%s,ip=%s,mode=%s,link=%s" %
9243
                       (new_nic.mac, new_nic.ip,
9244
                        self.nic_pnew[constants.DDM_ADD][constants.NIC_MODE],
9245
                        self.nic_pnew[constants.DDM_ADD][constants.NIC_LINK]
9246
                       )))
9247
      else:
9248
        for key in 'mac', 'ip':
9249
          if key in nic_dict:
9250
            setattr(instance.nics[nic_op], key, nic_dict[key])
9251
        if nic_op in self.nic_pinst:
9252
          instance.nics[nic_op].nicparams = self.nic_pinst[nic_op]
9253
        for key, val in nic_dict.iteritems():
9254
          result.append(("nic.%s/%d" % (key, nic_op), val))
9255

    
9256
    # hvparams changes
9257
    if self.op.hvparams:
9258
      instance.hvparams = self.hv_inst
9259
      for key, val in self.op.hvparams.iteritems():
9260
        result.append(("hv/%s" % key, val))
9261

    
9262
    # beparams changes
9263
    if self.op.beparams:
9264
      instance.beparams = self.be_inst
9265
      for key, val in self.op.beparams.iteritems():
9266
        result.append(("be/%s" % key, val))
9267

    
9268
    # OS change
9269
    if self.op.os_name:
9270
      instance.os = self.op.os_name
9271

    
9272
    # osparams changes
9273
    if self.op.osparams:
9274
      instance.osparams = self.os_inst
9275
      for key, val in self.op.osparams.iteritems():
9276
        result.append(("os/%s" % key, val))
9277

    
9278
    self.cfg.Update(instance, feedback_fn)
9279

    
9280
    return result
9281

    
9282
  _DISK_CONVERSIONS = {
9283
    (constants.DT_PLAIN, constants.DT_DRBD8): _ConvertPlainToDrbd,
9284
    (constants.DT_DRBD8, constants.DT_PLAIN): _ConvertDrbdToPlain,
9285
    }
9286

    
9287

    
9288
class LUQueryExports(NoHooksLU):
9289
  """Query the exports list
9290

9291
  """
9292
  _OP_PARAMS = [
9293
    ("nodes", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
9294
    ("use_locking", False, ht.TBool),
9295
    ]
9296
  REQ_BGL = False
9297

    
9298
  def ExpandNames(self):
9299
    self.needed_locks = {}
9300
    self.share_locks[locking.LEVEL_NODE] = 1
9301
    if not self.op.nodes:
9302
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
9303
    else:
9304
      self.needed_locks[locking.LEVEL_NODE] = \
9305
        _GetWantedNodes(self, self.op.nodes)
9306

    
9307
  def Exec(self, feedback_fn):
9308
    """Compute the list of all the exported system images.
9309

9310
    @rtype: dict
9311
    @return: a dictionary with the structure node->(export-list)
9312
        where export-list is a list of the instances exported on
9313
        that node.
9314

9315
    """
9316
    self.nodes = self.acquired_locks[locking.LEVEL_NODE]
9317
    rpcresult = self.rpc.call_export_list(self.nodes)
9318
    result = {}
9319
    for node in rpcresult:
9320
      if rpcresult[node].fail_msg:
9321
        result[node] = False
9322
      else:
9323
        result[node] = rpcresult[node].payload
9324

    
9325
    return result
9326

    
9327

    
9328
class LUPrepareExport(NoHooksLU):
9329
  """Prepares an instance for an export and returns useful information.
9330

9331
  """
9332
  _OP_PARAMS = [
9333
    _PInstanceName,
9334
    ("mode", ht.NoDefault, ht.TElemOf(constants.EXPORT_MODES)),
9335
    ]
9336
  REQ_BGL = False
9337

    
9338
  def ExpandNames(self):
9339
    self._ExpandAndLockInstance()
9340

    
9341
  def CheckPrereq(self):
9342
    """Check prerequisites.
9343

9344
    """
9345
    instance_name = self.op.instance_name
9346

    
9347
    self.instance = self.cfg.GetInstanceInfo(instance_name)
9348
    assert self.instance is not None, \
9349
          "Cannot retrieve locked instance %s" % self.op.instance_name
9350
    _CheckNodeOnline(self, self.instance.primary_node)
9351

    
9352
    self._cds = _GetClusterDomainSecret()
9353

    
9354
  def Exec(self, feedback_fn):
9355
    """Prepares an instance for an export.
9356

9357
    """
9358
    instance = self.instance
9359

    
9360
    if self.op.mode == constants.EXPORT_MODE_REMOTE:
9361
      salt = utils.GenerateSecret(8)
9362

    
9363
      feedback_fn("Generating X509 certificate on %s" % instance.primary_node)
9364
      result = self.rpc.call_x509_cert_create(instance.primary_node,
9365
                                              constants.RIE_CERT_VALIDITY)
9366
      result.Raise("Can't create X509 key and certificate on %s" % result.node)
9367

    
9368
      (name, cert_pem) = result.payload
9369

    
9370
      cert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM,
9371
                                             cert_pem)
9372

    
9373
      return {
9374
        "handshake": masterd.instance.ComputeRemoteExportHandshake(self._cds),
9375
        "x509_key_name": (name, utils.Sha1Hmac(self._cds, name, salt=salt),
9376
                          salt),
9377
        "x509_ca": utils.SignX509Certificate(cert, self._cds, salt),
9378
        }
9379

    
9380
    return None
9381

    
9382

    
9383
class LUExportInstance(LogicalUnit):
9384
  """Export an instance to an image in the cluster.
9385

9386
  """
9387
  HPATH = "instance-export"
9388
  HTYPE = constants.HTYPE_INSTANCE
9389
  _OP_PARAMS = [
9390
    _PInstanceName,
9391
    ("target_node", ht.NoDefault, ht.TOr(ht.TNonEmptyString, ht.TList)),
9392
    ("shutdown", True, ht.TBool),
9393
    _PShutdownTimeout,
9394
    ("remove_instance", False, ht.TBool),
9395
    ("ignore_remove_failures", False, ht.TBool),
9396
    ("mode", constants.EXPORT_MODE_LOCAL, ht.TElemOf(constants.EXPORT_MODES)),
9397
    ("x509_key_name", None, ht.TOr(ht.TList, ht.TNone)),
9398
    ("destination_x509_ca", None, ht.TMaybeString),
9399
    ]
9400
  REQ_BGL = False
9401

    
9402
  def CheckArguments(self):
9403
    """Check the arguments.
9404

9405
    """
9406
    self.x509_key_name = self.op.x509_key_name
9407
    self.dest_x509_ca_pem = self.op.destination_x509_ca
9408

    
9409
    if self.op.remove_instance and not self.op.shutdown:
9410
      raise errors.OpPrereqError("Can not remove instance without shutting it"
9411
                                 " down before")
9412

    
9413
    if self.op.mode == constants.EXPORT_MODE_REMOTE:
9414
      if not self.x509_key_name:
9415
        raise errors.OpPrereqError("Missing X509 key name for encryption",
9416
                                   errors.ECODE_INVAL)
9417

    
9418
      if not self.dest_x509_ca_pem:
9419
        raise errors.OpPrereqError("Missing destination X509 CA",
9420
                                   errors.ECODE_INVAL)
9421

    
9422
  def ExpandNames(self):
9423
    self._ExpandAndLockInstance()
9424

    
9425
    # Lock all nodes for local exports
9426
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9427
      # FIXME: lock only instance primary and destination node
9428
      #
9429
      # Sad but true, for now we have do lock all nodes, as we don't know where
9430
      # the previous export might be, and in this LU we search for it and
9431
      # remove it from its current node. In the future we could fix this by:
9432
      #  - making a tasklet to search (share-lock all), then create the
9433
      #    new one, then one to remove, after
9434
      #  - removing the removal operation altogether
9435
      self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
9436

    
9437
  def DeclareLocks(self, level):
9438
    """Last minute lock declaration."""
9439
    # All nodes are locked anyway, so nothing to do here.
9440

    
9441
  def BuildHooksEnv(self):
9442
    """Build hooks env.
9443

9444
    This will run on the master, primary node and target node.
9445

9446
    """
9447
    env = {
9448
      "EXPORT_MODE": self.op.mode,
9449
      "EXPORT_NODE": self.op.target_node,
9450
      "EXPORT_DO_SHUTDOWN": self.op.shutdown,
9451
      "SHUTDOWN_TIMEOUT": self.op.shutdown_timeout,
9452
      # TODO: Generic function for boolean env variables
9453
      "REMOVE_INSTANCE": str(bool(self.op.remove_instance)),
9454
      }
9455

    
9456
    env.update(_BuildInstanceHookEnvByObject(self, self.instance))
9457

    
9458
    nl = [self.cfg.GetMasterNode(), self.instance.primary_node]
9459

    
9460
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9461
      nl.append(self.op.target_node)
9462

    
9463
    return env, nl, nl
9464

    
9465
  def CheckPrereq(self):
9466
    """Check prerequisites.
9467

9468
    This checks that the instance and node names are valid.
9469

9470
    """
9471
    instance_name = self.op.instance_name
9472

    
9473
    self.instance = self.cfg.GetInstanceInfo(instance_name)
9474
    assert self.instance is not None, \
9475
          "Cannot retrieve locked instance %s" % self.op.instance_name
9476
    _CheckNodeOnline(self, self.instance.primary_node)
9477

    
9478
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9479
      self.op.target_node = _ExpandNodeName(self.cfg, self.op.target_node)
9480
      self.dst_node = self.cfg.GetNodeInfo(self.op.target_node)
9481
      assert self.dst_node is not None
9482

    
9483
      _CheckNodeOnline(self, self.dst_node.name)
9484
      _CheckNodeNotDrained(self, self.dst_node.name)
9485

    
9486
      self._cds = None
9487
      self.dest_disk_info = None
9488
      self.dest_x509_ca = None
9489

    
9490
    elif self.op.mode == constants.EXPORT_MODE_REMOTE:
9491
      self.dst_node = None
9492

    
9493
      if len(self.op.target_node) != len(self.instance.disks):
9494
        raise errors.OpPrereqError(("Received destination information for %s"
9495
                                    " disks, but instance %s has %s disks") %
9496
                                   (len(self.op.target_node), instance_name,
9497
                                    len(self.instance.disks)),
9498
                                   errors.ECODE_INVAL)
9499

    
9500
      cds = _GetClusterDomainSecret()
9501

    
9502
      # Check X509 key name
9503
      try:
9504
        (key_name, hmac_digest, hmac_salt) = self.x509_key_name
9505
      except (TypeError, ValueError), err:
9506
        raise errors.OpPrereqError("Invalid data for X509 key name: %s" % err)
9507

    
9508
      if not utils.VerifySha1Hmac(cds, key_name, hmac_digest, salt=hmac_salt):
9509
        raise errors.OpPrereqError("HMAC for X509 key name is wrong",
9510
                                   errors.ECODE_INVAL)
9511

    
9512
      # Load and verify CA
9513
      try:
9514
        (cert, _) = utils.LoadSignedX509Certificate(self.dest_x509_ca_pem, cds)
9515
      except OpenSSL.crypto.Error, err:
9516
        raise errors.OpPrereqError("Unable to load destination X509 CA (%s)" %
9517
                                   (err, ), errors.ECODE_INVAL)
9518

    
9519
      (errcode, msg) = utils.VerifyX509Certificate(cert, None, None)
9520
      if errcode is not None:
9521
        raise errors.OpPrereqError("Invalid destination X509 CA (%s)" %
9522
                                   (msg, ), errors.ECODE_INVAL)
9523

    
9524
      self.dest_x509_ca = cert
9525

    
9526
      # Verify target information
9527
      disk_info = []
9528
      for idx, disk_data in enumerate(self.op.target_node):
9529
        try:
9530
          (host, port, magic) = \
9531
            masterd.instance.CheckRemoteExportDiskInfo(cds, idx, disk_data)
9532
        except errors.GenericError, err:
9533
          raise errors.OpPrereqError("Target info for disk %s: %s" %
9534
                                     (idx, err), errors.ECODE_INVAL)
9535

    
9536
        disk_info.append((host, port, magic))
9537

    
9538
      assert len(disk_info) == len(self.op.target_node)
9539
      self.dest_disk_info = disk_info
9540

    
9541
    else:
9542
      raise errors.ProgrammerError("Unhandled export mode %r" %
9543
                                   self.op.mode)
9544

    
9545
    # instance disk type verification
9546
    # TODO: Implement export support for file-based disks
9547
    for disk in self.instance.disks:
9548
      if disk.dev_type == constants.LD_FILE:
9549
        raise errors.OpPrereqError("Export not supported for instances with"
9550
                                   " file-based disks", errors.ECODE_INVAL)
9551

    
9552
  def _CleanupExports(self, feedback_fn):
9553
    """Removes exports of current instance from all other nodes.
9554

9555
    If an instance in a cluster with nodes A..D was exported to node C, its
9556
    exports will be removed from the nodes A, B and D.
9557

9558
    """
9559
    assert self.op.mode != constants.EXPORT_MODE_REMOTE
9560

    
9561
    nodelist = self.cfg.GetNodeList()
9562
    nodelist.remove(self.dst_node.name)
9563

    
9564
    # on one-node clusters nodelist will be empty after the removal
9565
    # if we proceed the backup would be removed because OpQueryExports
9566
    # substitutes an empty list with the full cluster node list.
9567
    iname = self.instance.name
9568
    if nodelist:
9569
      feedback_fn("Removing old exports for instance %s" % iname)
9570
      exportlist = self.rpc.call_export_list(nodelist)
9571
      for node in exportlist:
9572
        if exportlist[node].fail_msg:
9573
          continue
9574
        if iname in exportlist[node].payload:
9575
          msg = self.rpc.call_export_remove(node, iname).fail_msg
9576
          if msg:
9577
            self.LogWarning("Could not remove older export for instance %s"
9578
                            " on node %s: %s", iname, node, msg)
9579

    
9580
  def Exec(self, feedback_fn):
9581
    """Export an instance to an image in the cluster.
9582

9583
    """
9584
    assert self.op.mode in constants.EXPORT_MODES
9585

    
9586
    instance = self.instance
9587
    src_node = instance.primary_node
9588

    
9589
    if self.op.shutdown:
9590
      # shutdown the instance, but not the disks
9591
      feedback_fn("Shutting down instance %s" % instance.name)
9592
      result = self.rpc.call_instance_shutdown(src_node, instance,
9593
                                               self.op.shutdown_timeout)
9594
      # TODO: Maybe ignore failures if ignore_remove_failures is set
9595
      result.Raise("Could not shutdown instance %s on"
9596
                   " node %s" % (instance.name, src_node))
9597

    
9598
    # set the disks ID correctly since call_instance_start needs the
9599
    # correct drbd minor to create the symlinks
9600
    for disk in instance.disks:
9601
      self.cfg.SetDiskID(disk, src_node)
9602

    
9603
    activate_disks = (not instance.admin_up)
9604

    
9605
    if activate_disks:
9606
      # Activate the instance disks if we'exporting a stopped instance
9607
      feedback_fn("Activating disks for %s" % instance.name)
9608
      _StartInstanceDisks(self, instance, None)
9609

    
9610
    try:
9611
      helper = masterd.instance.ExportInstanceHelper(self, feedback_fn,
9612
                                                     instance)
9613

    
9614
      helper.CreateSnapshots()
9615
      try:
9616
        if (self.op.shutdown and instance.admin_up and
9617
            not self.op.remove_instance):
9618
          assert not activate_disks
9619
          feedback_fn("Starting instance %s" % instance.name)
9620
          result = self.rpc.call_instance_start(src_node, instance, None, None)
9621
          msg = result.fail_msg
9622
          if msg:
9623
            feedback_fn("Failed to start instance: %s" % msg)
9624
            _ShutdownInstanceDisks(self, instance)
9625
            raise errors.OpExecError("Could not start instance: %s" % msg)
9626

    
9627
        if self.op.mode == constants.EXPORT_MODE_LOCAL:
9628
          (fin_resu, dresults) = helper.LocalExport(self.dst_node)
9629
        elif self.op.mode == constants.EXPORT_MODE_REMOTE:
9630
          connect_timeout = constants.RIE_CONNECT_TIMEOUT
9631
          timeouts = masterd.instance.ImportExportTimeouts(connect_timeout)
9632

    
9633
          (key_name, _, _) = self.x509_key_name
9634

    
9635
          dest_ca_pem = \
9636
            OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_PEM,
9637
                                            self.dest_x509_ca)
9638

    
9639
          (fin_resu, dresults) = helper.RemoteExport(self.dest_disk_info,
9640
                                                     key_name, dest_ca_pem,
9641
                                                     timeouts)
9642
      finally:
9643
        helper.Cleanup()
9644

    
9645
      # Check for backwards compatibility
9646
      assert len(dresults) == len(instance.disks)
9647
      assert compat.all(isinstance(i, bool) for i in dresults), \
9648
             "Not all results are boolean: %r" % dresults
9649

    
9650
    finally:
9651
      if activate_disks:
9652
        feedback_fn("Deactivating disks for %s" % instance.name)
9653
        _ShutdownInstanceDisks(self, instance)
9654

    
9655
    if not (compat.all(dresults) and fin_resu):
9656
      failures = []
9657
      if not fin_resu:
9658
        failures.append("export finalization")
9659
      if not compat.all(dresults):
9660
        fdsk = utils.CommaJoin(idx for (idx, dsk) in enumerate(dresults)
9661
                               if not dsk)
9662
        failures.append("disk export: disk(s) %s" % fdsk)
9663

    
9664
      raise errors.OpExecError("Export failed, errors in %s" %
9665
                               utils.CommaJoin(failures))
9666

    
9667
    # At this point, the export was successful, we can cleanup/finish
9668

    
9669
    # Remove instance if requested
9670
    if self.op.remove_instance:
9671
      feedback_fn("Removing instance %s" % instance.name)
9672
      _RemoveInstance(self, feedback_fn, instance,
9673
                      self.op.ignore_remove_failures)
9674

    
9675
    if self.op.mode == constants.EXPORT_MODE_LOCAL:
9676
      self._CleanupExports(feedback_fn)
9677

    
9678
    return fin_resu, dresults
9679

    
9680

    
9681
class LURemoveExport(NoHooksLU):
9682
  """Remove exports related to the named instance.
9683

9684
  """
9685
  _OP_PARAMS = [
9686
    _PInstanceName,
9687
    ]
9688
  REQ_BGL = False
9689

    
9690
  def ExpandNames(self):
9691
    self.needed_locks = {}
9692
    # We need all nodes to be locked in order for RemoveExport to work, but we
9693
    # don't need to lock the instance itself, as nothing will happen to it (and
9694
    # we can remove exports also for a removed instance)
9695
    self.needed_locks[locking.LEVEL_NODE] = locking.ALL_SET
9696

    
9697
  def Exec(self, feedback_fn):
9698
    """Remove any export.
9699

9700
    """
9701
    instance_name = self.cfg.ExpandInstanceName(self.op.instance_name)
9702
    # If the instance was not found we'll try with the name that was passed in.
9703
    # This will only work if it was an FQDN, though.
9704
    fqdn_warn = False
9705
    if not instance_name:
9706
      fqdn_warn = True
9707
      instance_name = self.op.instance_name
9708

    
9709
    locked_nodes = self.acquired_locks[locking.LEVEL_NODE]
9710
    exportlist = self.rpc.call_export_list(locked_nodes)
9711
    found = False
9712
    for node in exportlist:
9713
      msg = exportlist[node].fail_msg
9714
      if msg:
9715
        self.LogWarning("Failed to query node %s (continuing): %s", node, msg)
9716
        continue
9717
      if instance_name in exportlist[node].payload:
9718
        found = True
9719
        result = self.rpc.call_export_remove(node, instance_name)
9720
        msg = result.fail_msg
9721
        if msg:
9722
          logging.error("Could not remove export for instance %s"
9723
                        " on node %s: %s", instance_name, node, msg)
9724

    
9725
    if fqdn_warn and not found:
9726
      feedback_fn("Export not found. If trying to remove an export belonging"
9727
                  " to a deleted instance please use its Fully Qualified"
9728
                  " Domain Name.")
9729

    
9730

    
9731
class TagsLU(NoHooksLU): # pylint: disable-msg=W0223
9732
  """Generic tags LU.
9733

9734
  This is an abstract class which is the parent of all the other tags LUs.
9735

9736
  """
9737

    
9738
  def ExpandNames(self):
9739
    self.needed_locks = {}
9740
    if self.op.kind == constants.TAG_NODE:
9741
      self.op.name = _ExpandNodeName(self.cfg, self.op.name)
9742
      self.needed_locks[locking.LEVEL_NODE] = self.op.name
9743
    elif self.op.kind == constants.TAG_INSTANCE:
9744
      self.op.name = _ExpandInstanceName(self.cfg, self.op.name)
9745
      self.needed_locks[locking.LEVEL_INSTANCE] = self.op.name
9746

    
9747
    # FIXME: Acquire BGL for cluster tag operations (as of this writing it's
9748
    # not possible to acquire the BGL based on opcode parameters)
9749

    
9750
  def CheckPrereq(self):
9751
    """Check prerequisites.
9752

9753
    """
9754
    if self.op.kind == constants.TAG_CLUSTER:
9755
      self.target = self.cfg.GetClusterInfo()
9756
    elif self.op.kind == constants.TAG_NODE:
9757
      self.target = self.cfg.GetNodeInfo(self.op.name)
9758
    elif self.op.kind == constants.TAG_INSTANCE:
9759
      self.target = self.cfg.GetInstanceInfo(self.op.name)
9760
    else:
9761
      raise errors.OpPrereqError("Wrong tag type requested (%s)" %
9762
                                 str(self.op.kind), errors.ECODE_INVAL)
9763

    
9764

    
9765
class LUGetTags(TagsLU):
9766
  """Returns the tags of a given object.
9767

9768
  """
9769
  _OP_PARAMS = [
9770
    ("kind", ht.NoDefault, ht.TElemOf(constants.VALID_TAG_TYPES)),
9771
    # Name is only meaningful for nodes and instances
9772
    ("name", ht.NoDefault, ht.TMaybeString),
9773
    ]
9774
  REQ_BGL = False
9775

    
9776
  def ExpandNames(self):
9777
    TagsLU.ExpandNames(self)
9778

    
9779
    # Share locks as this is only a read operation
9780
    self.share_locks = dict.fromkeys(locking.LEVELS, 1)
9781

    
9782
  def Exec(self, feedback_fn):
9783
    """Returns the tag list.
9784

9785
    """
9786
    return list(self.target.GetTags())
9787

    
9788

    
9789
class LUSearchTags(NoHooksLU):
9790
  """Searches the tags for a given pattern.
9791

9792
  """
9793
  _OP_PARAMS = [
9794
    ("pattern", ht.NoDefault, ht.TNonEmptyString),
9795
    ]
9796
  REQ_BGL = False
9797

    
9798
  def ExpandNames(self):
9799
    self.needed_locks = {}
9800

    
9801
  def CheckPrereq(self):
9802
    """Check prerequisites.
9803

9804
    This checks the pattern passed for validity by compiling it.
9805

9806
    """
9807
    try:
9808
      self.re = re.compile(self.op.pattern)
9809
    except re.error, err:
9810
      raise errors.OpPrereqError("Invalid search pattern '%s': %s" %
9811
                                 (self.op.pattern, err), errors.ECODE_INVAL)
9812

    
9813
  def Exec(self, feedback_fn):
9814
    """Returns the tag list.
9815

9816
    """
9817
    cfg = self.cfg
9818
    tgts = [("/cluster", cfg.GetClusterInfo())]
9819
    ilist = cfg.GetAllInstancesInfo().values()
9820
    tgts.extend([("/instances/%s" % i.name, i) for i in ilist])
9821
    nlist = cfg.GetAllNodesInfo().values()
9822
    tgts.extend([("/nodes/%s" % n.name, n) for n in nlist])
9823
    results = []
9824
    for path, target in tgts:
9825
      for tag in target.GetTags():
9826
        if self.re.search(tag):
9827
          results.append((path, tag))
9828
    return results
9829

    
9830

    
9831
class LUAddTags(TagsLU):
9832
  """Sets a tag on a given object.
9833

9834
  """
9835
  _OP_PARAMS = [
9836
    ("kind", ht.NoDefault, ht.TElemOf(constants.VALID_TAG_TYPES)),
9837
    # Name is only meaningful for nodes and instances
9838
    ("name", ht.NoDefault, ht.TMaybeString),
9839
    ("tags", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
9840
    ]
9841
  REQ_BGL = False
9842

    
9843
  def CheckPrereq(self):
9844
    """Check prerequisites.
9845

9846
    This checks the type and length of the tag name and value.
9847

9848
    """
9849
    TagsLU.CheckPrereq(self)
9850
    for tag in self.op.tags:
9851
      objects.TaggableObject.ValidateTag(tag)
9852

    
9853
  def Exec(self, feedback_fn):
9854
    """Sets the tag.
9855

9856
    """
9857
    try:
9858
      for tag in self.op.tags:
9859
        self.target.AddTag(tag)
9860
    except errors.TagError, err:
9861
      raise errors.OpExecError("Error while setting tag: %s" % str(err))
9862
    self.cfg.Update(self.target, feedback_fn)
9863

    
9864

    
9865
class LUDelTags(TagsLU):
9866
  """Delete a list of tags from a given object.
9867

9868
  """
9869
  _OP_PARAMS = [
9870
    ("kind", ht.NoDefault, ht.TElemOf(constants.VALID_TAG_TYPES)),
9871
    # Name is only meaningful for nodes and instances
9872
    ("name", ht.NoDefault, ht.TMaybeString),
9873
    ("tags", ht.NoDefault, ht.TListOf(ht.TNonEmptyString)),
9874
    ]
9875
  REQ_BGL = False
9876

    
9877
  def CheckPrereq(self):
9878
    """Check prerequisites.
9879

9880
    This checks that we have the given tag.
9881

9882
    """
9883
    TagsLU.CheckPrereq(self)
9884
    for tag in self.op.tags:
9885
      objects.TaggableObject.ValidateTag(tag)
9886
    del_tags = frozenset(self.op.tags)
9887
    cur_tags = self.target.GetTags()
9888

    
9889
    diff_tags = del_tags - cur_tags
9890
    if diff_tags:
9891
      diff_names = ("'%s'" % i for i in sorted(diff_tags))
9892
      raise errors.OpPrereqError("Tag(s) %s not found" %
9893
                                 (utils.CommaJoin(diff_names), ),
9894
                                 errors.ECODE_NOENT)
9895

    
9896
  def Exec(self, feedback_fn):
9897
    """Remove the tag from the object.
9898

9899
    """
9900
    for tag in self.op.tags:
9901
      self.target.RemoveTag(tag)
9902
    self.cfg.Update(self.target, feedback_fn)
9903

    
9904

    
9905
class LUTestDelay(NoHooksLU):
9906
  """Sleep for a specified amount of time.
9907

9908
  This LU sleeps on the master and/or nodes for a specified amount of
9909
  time.
9910

9911
  """
9912
  _OP_PARAMS = [
9913
    ("duration", ht.NoDefault, ht.TFloat),
9914
    ("on_master", True, ht.TBool),
9915
    ("on_nodes", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
9916
    ("repeat", 0, ht.TPositiveInt)
9917
    ]
9918
  REQ_BGL = False
9919

    
9920
  def ExpandNames(self):
9921
    """Expand names and set required locks.
9922

9923
    This expands the node list, if any.
9924

9925
    """
9926
    self.needed_locks = {}
9927
    if self.op.on_nodes:
9928
      # _GetWantedNodes can be used here, but is not always appropriate to use
9929
      # this way in ExpandNames. Check LogicalUnit.ExpandNames docstring for
9930
      # more information.
9931
      self.op.on_nodes = _GetWantedNodes(self, self.op.on_nodes)
9932
      self.needed_locks[locking.LEVEL_NODE] = self.op.on_nodes
9933

    
9934
  def _TestDelay(self):
9935
    """Do the actual sleep.
9936

9937
    """
9938
    if self.op.on_master:
9939
      if not utils.TestDelay(self.op.duration):
9940
        raise errors.OpExecError("Error during master delay test")
9941
    if self.op.on_nodes:
9942
      result = self.rpc.call_test_delay(self.op.on_nodes, self.op.duration)
9943
      for node, node_result in result.items():
9944
        node_result.Raise("Failure during rpc call to node %s" % node)
9945

    
9946
  def Exec(self, feedback_fn):
9947
    """Execute the test delay opcode, with the wanted repetitions.
9948

9949
    """
9950
    if self.op.repeat == 0:
9951
      self._TestDelay()
9952
    else:
9953
      top_value = self.op.repeat - 1
9954
      for i in range(self.op.repeat):
9955
        self.LogInfo("Test delay iteration %d/%d" % (i, top_value))
9956
        self._TestDelay()
9957

    
9958

    
9959
class LUTestJobqueue(NoHooksLU):
9960
  """Utility LU to test some aspects of the job queue.
9961

9962
  """
9963
  _OP_PARAMS = [
9964
    ("notify_waitlock", False, ht.TBool),
9965
    ("notify_exec", False, ht.TBool),
9966
    ("log_messages", ht.EmptyList, ht.TListOf(ht.TString)),
9967
    ("fail", False, ht.TBool),
9968
    ]
9969
  REQ_BGL = False
9970

    
9971
  # Must be lower than default timeout for WaitForJobChange to see whether it
9972
  # notices changed jobs
9973
  _CLIENT_CONNECT_TIMEOUT = 20.0
9974
  _CLIENT_CONFIRM_TIMEOUT = 60.0
9975

    
9976
  @classmethod
9977
  def _NotifyUsingSocket(cls, cb, errcls):
9978
    """Opens a Unix socket and waits for another program to connect.
9979

9980
    @type cb: callable
9981
    @param cb: Callback to send socket name to client
9982
    @type errcls: class
9983
    @param errcls: Exception class to use for errors
9984

9985
    """
9986
    # Using a temporary directory as there's no easy way to create temporary
9987
    # sockets without writing a custom loop around tempfile.mktemp and
9988
    # socket.bind
9989
    tmpdir = tempfile.mkdtemp()
9990
    try:
9991
      tmpsock = utils.PathJoin(tmpdir, "sock")
9992

    
9993
      logging.debug("Creating temporary socket at %s", tmpsock)
9994
      sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
9995
      try:
9996
        sock.bind(tmpsock)
9997
        sock.listen(1)
9998

    
9999
        # Send details to client
10000
        cb(tmpsock)
10001

    
10002
        # Wait for client to connect before continuing
10003
        sock.settimeout(cls._CLIENT_CONNECT_TIMEOUT)
10004
        try:
10005
          (conn, _) = sock.accept()
10006
        except socket.error, err:
10007
          raise errcls("Client didn't connect in time (%s)" % err)
10008
      finally:
10009
        sock.close()
10010
    finally:
10011
      # Remove as soon as client is connected
10012
      shutil.rmtree(tmpdir)
10013

    
10014
    # Wait for client to close
10015
    try:
10016
      try:
10017
        # pylint: disable-msg=E1101
10018
        # Instance of '_socketobject' has no ... member
10019
        conn.settimeout(cls._CLIENT_CONFIRM_TIMEOUT)
10020
        conn.recv(1)
10021
      except socket.error, err:
10022
        raise errcls("Client failed to confirm notification (%s)" % err)
10023
    finally:
10024
      conn.close()
10025

    
10026
  def _SendNotification(self, test, arg, sockname):
10027
    """Sends a notification to the client.
10028

10029
    @type test: string
10030
    @param test: Test name
10031
    @param arg: Test argument (depends on test)
10032
    @type sockname: string
10033
    @param sockname: Socket path
10034

10035
    """
10036
    self.Log(constants.ELOG_JQUEUE_TEST, (sockname, test, arg))
10037

    
10038
  def _Notify(self, prereq, test, arg):
10039
    """Notifies the client of a test.
10040

10041
    @type prereq: bool
10042
    @param prereq: Whether this is a prereq-phase test
10043
    @type test: string
10044
    @param test: Test name
10045
    @param arg: Test argument (depends on test)
10046

10047
    """
10048
    if prereq:
10049
      errcls = errors.OpPrereqError
10050
    else:
10051
      errcls = errors.OpExecError
10052

    
10053
    return self._NotifyUsingSocket(compat.partial(self._SendNotification,
10054
                                                  test, arg),
10055
                                   errcls)
10056

    
10057
  def CheckArguments(self):
10058
    self.checkargs_calls = getattr(self, "checkargs_calls", 0) + 1
10059
    self.expandnames_calls = 0
10060

    
10061
  def ExpandNames(self):
10062
    checkargs_calls = getattr(self, "checkargs_calls", 0)
10063
    if checkargs_calls < 1:
10064
      raise errors.ProgrammerError("CheckArguments was not called")
10065

    
10066
    self.expandnames_calls += 1
10067

    
10068
    if self.op.notify_waitlock:
10069
      self._Notify(True, constants.JQT_EXPANDNAMES, None)
10070

    
10071
    self.LogInfo("Expanding names")
10072

    
10073
    # Get lock on master node (just to get a lock, not for a particular reason)
10074
    self.needed_locks = {
10075
      locking.LEVEL_NODE: self.cfg.GetMasterNode(),
10076
      }
10077

    
10078
  def Exec(self, feedback_fn):
10079
    if self.expandnames_calls < 1:
10080
      raise errors.ProgrammerError("ExpandNames was not called")
10081

    
10082
    if self.op.notify_exec:
10083
      self._Notify(False, constants.JQT_EXEC, None)
10084

    
10085
    self.LogInfo("Executing")
10086

    
10087
    if self.op.log_messages:
10088
      self._Notify(False, constants.JQT_STARTMSG, len(self.op.log_messages))
10089
      for idx, msg in enumerate(self.op.log_messages):
10090
        self.LogInfo("Sending log message %s", idx + 1)
10091
        feedback_fn(constants.JQT_MSGPREFIX + msg)
10092
        # Report how many test messages have been sent
10093
        self._Notify(False, constants.JQT_LOGMSG, idx + 1)
10094

    
10095
    if self.op.fail:
10096
      raise errors.OpExecError("Opcode failure was requested")
10097

    
10098
    return True
10099

    
10100

    
10101
class IAllocator(object):
10102
  """IAllocator framework.
10103

10104
  An IAllocator instance has three sets of attributes:
10105
    - cfg that is needed to query the cluster
10106
    - input data (all members of the _KEYS class attribute are required)
10107
    - four buffer attributes (in|out_data|text), that represent the
10108
      input (to the external script) in text and data structure format,
10109
      and the output from it, again in two formats
10110
    - the result variables from the script (success, info, nodes) for
10111
      easy usage
10112

10113
  """
10114
  # pylint: disable-msg=R0902
10115
  # lots of instance attributes
10116
  _ALLO_KEYS = [
10117
    "name", "mem_size", "disks", "disk_template",
10118
    "os", "tags", "nics", "vcpus", "hypervisor",
10119
    ]
10120
  _RELO_KEYS = [
10121
    "name", "relocate_from",
10122
    ]
10123
  _EVAC_KEYS = [
10124
    "evac_nodes",
10125
    ]
10126

    
10127
  def __init__(self, cfg, rpc, mode, **kwargs):
10128
    self.cfg = cfg
10129
    self.rpc = rpc
10130
    # init buffer variables
10131
    self.in_text = self.out_text = self.in_data = self.out_data = None
10132
    # init all input fields so that pylint is happy
10133
    self.mode = mode
10134
    self.mem_size = self.disks = self.disk_template = None
10135
    self.os = self.tags = self.nics = self.vcpus = None
10136
    self.hypervisor = None
10137
    self.relocate_from = None
10138
    self.name = None
10139
    self.evac_nodes = None
10140
    # computed fields
10141
    self.required_nodes = None
10142
    # init result fields
10143
    self.success = self.info = self.result = None
10144
    if self.mode == constants.IALLOCATOR_MODE_ALLOC:
10145
      keyset = self._ALLO_KEYS
10146
      fn = self._AddNewInstance
10147
    elif self.mode == constants.IALLOCATOR_MODE_RELOC:
10148
      keyset = self._RELO_KEYS
10149
      fn = self._AddRelocateInstance
10150
    elif self.mode == constants.IALLOCATOR_MODE_MEVAC:
10151
      keyset = self._EVAC_KEYS
10152
      fn = self._AddEvacuateNodes
10153
    else:
10154
      raise errors.ProgrammerError("Unknown mode '%s' passed to the"
10155
                                   " IAllocator" % self.mode)
10156
    for key in kwargs:
10157
      if key not in keyset:
10158
        raise errors.ProgrammerError("Invalid input parameter '%s' to"
10159
                                     " IAllocator" % key)
10160
      setattr(self, key, kwargs[key])
10161

    
10162
    for key in keyset:
10163
      if key not in kwargs:
10164
        raise errors.ProgrammerError("Missing input parameter '%s' to"
10165
                                     " IAllocator" % key)
10166
    self._BuildInputData(fn)
10167

    
10168
  def _ComputeClusterData(self):
10169
    """Compute the generic allocator input data.
10170

10171
    This is the data that is independent of the actual operation.
10172

10173
    """
10174
    cfg = self.cfg
10175
    cluster_info = cfg.GetClusterInfo()
10176
    # cluster data
10177
    data = {
10178
      "version": constants.IALLOCATOR_VERSION,
10179
      "cluster_name": cfg.GetClusterName(),
10180
      "cluster_tags": list(cluster_info.GetTags()),
10181
      "enabled_hypervisors": list(cluster_info.enabled_hypervisors),
10182
      # we don't have job IDs
10183
      }
10184
    iinfo = cfg.GetAllInstancesInfo().values()
10185
    i_list = [(inst, cluster_info.FillBE(inst)) for inst in iinfo]
10186

    
10187
    # node data
10188
    node_list = cfg.GetNodeList()
10189

    
10190
    if self.mode == constants.IALLOCATOR_MODE_ALLOC:
10191
      hypervisor_name = self.hypervisor
10192
    elif self.mode == constants.IALLOCATOR_MODE_RELOC:
10193
      hypervisor_name = cfg.GetInstanceInfo(self.name).hypervisor
10194
    elif self.mode == constants.IALLOCATOR_MODE_MEVAC:
10195
      hypervisor_name = cluster_info.enabled_hypervisors[0]
10196

    
10197
    node_data = self.rpc.call_node_info(node_list, cfg.GetVGName(),
10198
                                        hypervisor_name)
10199
    node_iinfo = \
10200
      self.rpc.call_all_instances_info(node_list,
10201
                                       cluster_info.enabled_hypervisors)
10202

    
10203
    data["nodegroups"] = self._ComputeNodeGroupData(cfg)
10204

    
10205
    data["nodes"] = self._ComputeNodeData(cfg, node_data, node_iinfo, i_list)
10206

    
10207
    data["instances"] = self._ComputeInstanceData(cluster_info, i_list)
10208

    
10209
    self.in_data = data
10210

    
10211
  @staticmethod
10212
  def _ComputeNodeGroupData(cfg):
10213
    """Compute node groups data.
10214

10215
    """
10216
    ng = {}
10217
    for guuid, gdata in cfg.GetAllNodeGroupsInfo().items():
10218
      ng[guuid] = { "name": gdata.name }
10219
    return ng
10220

    
10221
  @staticmethod
10222
  def _ComputeNodeData(cfg, node_data, node_iinfo, i_list):
10223
    """Compute global node data.
10224

10225
    """
10226
    node_results = {}
10227
    for nname, nresult in node_data.items():
10228
      # first fill in static (config-based) values
10229
      ninfo = cfg.GetNodeInfo(nname)
10230
      pnr = {
10231
        "tags": list(ninfo.GetTags()),
10232
        "primary_ip": ninfo.primary_ip,
10233
        "secondary_ip": ninfo.secondary_ip,
10234
        "offline": ninfo.offline,
10235
        "drained": ninfo.drained,
10236
        "master_candidate": ninfo.master_candidate,
10237
        }
10238

    
10239
      if not (ninfo.offline or ninfo.drained):
10240
        nresult.Raise("Can't get data for node %s" % nname)
10241
        node_iinfo[nname].Raise("Can't get node instance info from node %s" %
10242
                                nname)
10243
        remote_info = nresult.payload
10244

    
10245
        for attr in ['memory_total', 'memory_free', 'memory_dom0',
10246
                     'vg_size', 'vg_free', 'cpu_total']:
10247
          if attr not in remote_info:
10248
            raise errors.OpExecError("Node '%s' didn't return attribute"
10249
                                     " '%s'" % (nname, attr))
10250
          if not isinstance(remote_info[attr], int):
10251
            raise errors.OpExecError("Node '%s' returned invalid value"
10252
                                     " for '%s': %s" %
10253
                                     (nname, attr, remote_info[attr]))
10254
        # compute memory used by primary instances
10255
        i_p_mem = i_p_up_mem = 0
10256
        for iinfo, beinfo in i_list:
10257
          if iinfo.primary_node == nname:
10258
            i_p_mem += beinfo[constants.BE_MEMORY]
10259
            if iinfo.name not in node_iinfo[nname].payload:
10260
              i_used_mem = 0
10261
            else:
10262
              i_used_mem = int(node_iinfo[nname].payload[iinfo.name]['memory'])
10263
            i_mem_diff = beinfo[constants.BE_MEMORY] - i_used_mem
10264
            remote_info['memory_free'] -= max(0, i_mem_diff)
10265

    
10266
            if iinfo.admin_up:
10267
              i_p_up_mem += beinfo[constants.BE_MEMORY]
10268

    
10269
        # compute memory used by instances
10270
        pnr_dyn = {
10271
          "total_memory": remote_info['memory_total'],
10272
          "reserved_memory": remote_info['memory_dom0'],
10273
          "free_memory": remote_info['memory_free'],
10274
          "total_disk": remote_info['vg_size'],
10275
          "free_disk": remote_info['vg_free'],
10276
          "total_cpus": remote_info['cpu_total'],
10277
          "i_pri_memory": i_p_mem,
10278
          "i_pri_up_memory": i_p_up_mem,
10279
          }
10280
        pnr.update(pnr_dyn)
10281

    
10282
      node_results[nname] = pnr
10283

    
10284
    return node_results
10285

    
10286
  @staticmethod
10287
  def _ComputeInstanceData(cluster_info, i_list):
10288
    """Compute global instance data.
10289

10290
    """
10291
    instance_data = {}
10292
    for iinfo, beinfo in i_list:
10293
      nic_data = []
10294
      for nic in iinfo.nics:
10295
        filled_params = cluster_info.SimpleFillNIC(nic.nicparams)
10296
        nic_dict = {"mac": nic.mac,
10297
                    "ip": nic.ip,
10298
                    "mode": filled_params[constants.NIC_MODE],
10299
                    "link": filled_params[constants.NIC_LINK],
10300
                   }
10301
        if filled_params[constants.NIC_MODE] == constants.NIC_MODE_BRIDGED:
10302
          nic_dict["bridge"] = filled_params[constants.NIC_LINK]
10303
        nic_data.append(nic_dict)
10304
      pir = {
10305
        "tags": list(iinfo.GetTags()),
10306
        "admin_up": iinfo.admin_up,
10307
        "vcpus": beinfo[constants.BE_VCPUS],
10308
        "memory": beinfo[constants.BE_MEMORY],
10309
        "os": iinfo.os,
10310
        "nodes": [iinfo.primary_node] + list(iinfo.secondary_nodes),
10311
        "nics": nic_data,
10312
        "disks": [{"size": dsk.size, "mode": dsk.mode} for dsk in iinfo.disks],
10313
        "disk_template": iinfo.disk_template,
10314
        "hypervisor": iinfo.hypervisor,
10315
        }
10316
      pir["disk_space_total"] = _ComputeDiskSize(iinfo.disk_template,
10317
                                                 pir["disks"])
10318
      instance_data[iinfo.name] = pir
10319

    
10320
    return instance_data
10321

    
10322
  def _AddNewInstance(self):
10323
    """Add new instance data to allocator structure.
10324

10325
    This in combination with _AllocatorGetClusterData will create the
10326
    correct structure needed as input for the allocator.
10327

10328
    The checks for the completeness of the opcode must have already been
10329
    done.
10330

10331
    """
10332
    disk_space = _ComputeDiskSize(self.disk_template, self.disks)
10333

    
10334
    if self.disk_template in constants.DTS_NET_MIRROR:
10335
      self.required_nodes = 2
10336
    else:
10337
      self.required_nodes = 1
10338
    request = {
10339
      "name": self.name,
10340
      "disk_template": self.disk_template,
10341
      "tags": self.tags,
10342
      "os": self.os,
10343
      "vcpus": self.vcpus,
10344
      "memory": self.mem_size,
10345
      "disks": self.disks,
10346
      "disk_space_total": disk_space,
10347
      "nics": self.nics,
10348
      "required_nodes": self.required_nodes,
10349
      }
10350
    return request
10351

    
10352
  def _AddRelocateInstance(self):
10353
    """Add relocate instance data to allocator structure.
10354

10355
    This in combination with _IAllocatorGetClusterData will create the
10356
    correct structure needed as input for the allocator.
10357

10358
    The checks for the completeness of the opcode must have already been
10359
    done.
10360

10361
    """
10362
    instance = self.cfg.GetInstanceInfo(self.name)
10363
    if instance is None:
10364
      raise errors.ProgrammerError("Unknown instance '%s' passed to"
10365
                                   " IAllocator" % self.name)
10366

    
10367
    if instance.disk_template not in constants.DTS_NET_MIRROR:
10368
      raise errors.OpPrereqError("Can't relocate non-mirrored instances",
10369
                                 errors.ECODE_INVAL)
10370

    
10371
    if len(instance.secondary_nodes) != 1:
10372
      raise errors.OpPrereqError("Instance has not exactly one secondary node",
10373
                                 errors.ECODE_STATE)
10374

    
10375
    self.required_nodes = 1
10376
    disk_sizes = [{'size': disk.size} for disk in instance.disks]
10377
    disk_space = _ComputeDiskSize(instance.disk_template, disk_sizes)
10378

    
10379
    request = {
10380
      "name": self.name,
10381
      "disk_space_total": disk_space,
10382
      "required_nodes": self.required_nodes,
10383
      "relocate_from": self.relocate_from,
10384
      }
10385
    return request
10386

    
10387
  def _AddEvacuateNodes(self):
10388
    """Add evacuate nodes data to allocator structure.
10389

10390
    """
10391
    request = {
10392
      "evac_nodes": self.evac_nodes
10393
      }
10394
    return request
10395

    
10396
  def _BuildInputData(self, fn):
10397
    """Build input data structures.
10398

10399
    """
10400
    self._ComputeClusterData()
10401

    
10402
    request = fn()
10403
    request["type"] = self.mode
10404
    self.in_data["request"] = request
10405

    
10406
    self.in_text = serializer.Dump(self.in_data)
10407

    
10408
  def Run(self, name, validate=True, call_fn=None):
10409
    """Run an instance allocator and return the results.
10410

10411
    """
10412
    if call_fn is None:
10413
      call_fn = self.rpc.call_iallocator_runner
10414

    
10415
    result = call_fn(self.cfg.GetMasterNode(), name, self.in_text)
10416
    result.Raise("Failure while running the iallocator script")
10417

    
10418
    self.out_text = result.payload
10419
    if validate:
10420
      self._ValidateResult()
10421

    
10422
  def _ValidateResult(self):
10423
    """Process the allocator results.
10424

10425
    This will process and if successful save the result in
10426
    self.out_data and the other parameters.
10427

10428
    """
10429
    try:
10430
      rdict = serializer.Load(self.out_text)
10431
    except Exception, err:
10432
      raise errors.OpExecError("Can't parse iallocator results: %s" % str(err))
10433

    
10434
    if not isinstance(rdict, dict):
10435
      raise errors.OpExecError("Can't parse iallocator results: not a dict")
10436

    
10437
    # TODO: remove backwards compatiblity in later versions
10438
    if "nodes" in rdict and "result" not in rdict:
10439
      rdict["result"] = rdict["nodes"]
10440
      del rdict["nodes"]
10441

    
10442
    for key in "success", "info", "result":
10443
      if key not in rdict:
10444
        raise errors.OpExecError("Can't parse iallocator results:"
10445
                                 " missing key '%s'" % key)
10446
      setattr(self, key, rdict[key])
10447

    
10448
    if not isinstance(rdict["result"], list):
10449
      raise errors.OpExecError("Can't parse iallocator results: 'result' key"
10450
                               " is not a list")
10451
    self.out_data = rdict
10452

    
10453

    
10454
class LUTestAllocator(NoHooksLU):
10455
  """Run allocator tests.
10456

10457
  This LU runs the allocator tests
10458

10459
  """
10460
  _OP_PARAMS = [
10461
    ("direction", ht.NoDefault,
10462
     ht.TElemOf(constants.VALID_IALLOCATOR_DIRECTIONS)),
10463
    ("mode", ht.NoDefault, ht.TElemOf(constants.VALID_IALLOCATOR_MODES)),
10464
    ("name", ht.NoDefault, ht.TNonEmptyString),
10465
    ("nics", ht.NoDefault, ht.TOr(ht.TNone, ht.TListOf(
10466
      ht.TDictOf(ht.TElemOf(["mac", "ip", "bridge"]),
10467
               ht.TOr(ht.TNone, ht.TNonEmptyString))))),
10468
    ("disks", ht.NoDefault, ht.TOr(ht.TNone, ht.TList)),
10469
    ("hypervisor", None, ht.TMaybeString),
10470
    ("allocator", None, ht.TMaybeString),
10471
    ("tags", ht.EmptyList, ht.TListOf(ht.TNonEmptyString)),
10472
    ("mem_size", None, ht.TOr(ht.TNone, ht.TPositiveInt)),
10473
    ("vcpus", None, ht.TOr(ht.TNone, ht.TPositiveInt)),
10474
    ("os", None, ht.TMaybeString),
10475
    ("disk_template", None, ht.TMaybeString),
10476
    ("evac_nodes", None, ht.TOr(ht.TNone, ht.TListOf(ht.TNonEmptyString))),
10477
    ]
10478

    
10479
  def CheckPrereq(self):
10480
    """Check prerequisites.
10481

10482
    This checks the opcode parameters depending on the director and mode test.
10483

10484
    """
10485
    if self.op.mode == constants.IALLOCATOR_MODE_ALLOC:
10486
      for attr in ["mem_size", "disks", "disk_template",
10487
                   "os", "tags", "nics", "vcpus"]:
10488
        if not hasattr(self.op, attr):
10489
          raise errors.OpPrereqError("Missing attribute '%s' on opcode input" %
10490
                                     attr, errors.ECODE_INVAL)
10491
      iname = self.cfg.ExpandInstanceName(self.op.name)
10492
      if iname is not None:
10493
        raise errors.OpPrereqError("Instance '%s' already in the cluster" %
10494
                                   iname, errors.ECODE_EXISTS)
10495
      if not isinstance(self.op.nics, list):
10496
        raise errors.OpPrereqError("Invalid parameter 'nics'",
10497
                                   errors.ECODE_INVAL)
10498
      if not isinstance(self.op.disks, list):
10499
        raise errors.OpPrereqError("Invalid parameter 'disks'",
10500
                                   errors.ECODE_INVAL)
10501
      for row in self.op.disks:
10502
        if (not isinstance(row, dict) or
10503
            "size" not in row or
10504
            not isinstance(row["size"], int) or
10505
            "mode" not in row or
10506
            row["mode"] not in ['r', 'w']):
10507
          raise errors.OpPrereqError("Invalid contents of the 'disks'"
10508
                                     " parameter", errors.ECODE_INVAL)
10509
      if self.op.hypervisor is None:
10510
        self.op.hypervisor = self.cfg.GetHypervisorType()
10511
    elif self.op.mode == constants.IALLOCATOR_MODE_RELOC:
10512
      fname = _ExpandInstanceName(self.cfg, self.op.name)
10513
      self.op.name = fname
10514
      self.relocate_from = self.cfg.GetInstanceInfo(fname).secondary_nodes
10515
    elif self.op.mode == constants.IALLOCATOR_MODE_MEVAC:
10516
      if not hasattr(self.op, "evac_nodes"):
10517
        raise errors.OpPrereqError("Missing attribute 'evac_nodes' on"
10518
                                   " opcode input", errors.ECODE_INVAL)
10519
    else:
10520
      raise errors.OpPrereqError("Invalid test allocator mode '%s'" %
10521
                                 self.op.mode, errors.ECODE_INVAL)
10522

    
10523
    if self.op.direction == constants.IALLOCATOR_DIR_OUT:
10524
      if self.op.allocator is None:
10525
        raise errors.OpPrereqError("Missing allocator name",
10526
                                   errors.ECODE_INVAL)
10527
    elif self.op.direction != constants.IALLOCATOR_DIR_IN:
10528
      raise errors.OpPrereqError("Wrong allocator test '%s'" %
10529
                                 self.op.direction, errors.ECODE_INVAL)
10530

    
10531
  def Exec(self, feedback_fn):
10532
    """Run the allocator test.
10533

10534
    """
10535
    if self.op.mode == constants.IALLOCATOR_MODE_ALLOC:
10536
      ial = IAllocator(self.cfg, self.rpc,
10537
                       mode=self.op.mode,
10538
                       name=self.op.name,
10539
                       mem_size=self.op.mem_size,
10540
                       disks=self.op.disks,
10541
                       disk_template=self.op.disk_template,
10542
                       os=self.op.os,
10543
                       tags=self.op.tags,
10544
                       nics=self.op.nics,
10545
                       vcpus=self.op.vcpus,
10546
                       hypervisor=self.op.hypervisor,
10547
                       )
10548
    elif self.op.mode == constants.IALLOCATOR_MODE_RELOC:
10549
      ial = IAllocator(self.cfg, self.rpc,
10550
                       mode=self.op.mode,
10551
                       name=self.op.name,
10552
                       relocate_from=list(self.relocate_from),
10553
                       )
10554
    elif self.op.mode == constants.IALLOCATOR_MODE_MEVAC:
10555
      ial = IAllocator(self.cfg, self.rpc,
10556
                       mode=self.op.mode,
10557
                       evac_nodes=self.op.evac_nodes)
10558
    else:
10559
      raise errors.ProgrammerError("Uncatched mode %s in"
10560
                                   " LUTestAllocator.Exec", self.op.mode)
10561

    
10562
    if self.op.direction == constants.IALLOCATOR_DIR_IN:
10563
      result = ial.in_text
10564
    else:
10565
      ial.Run(self.op.allocator, validate=False)
10566
      result = ial.out_text
10567
    return result