Statistics
| Branch: | Tag: | Revision:

root / lib / bootstrap.py @ b9eeeb02

History | View | Annotate | Download (12.3 kB)

1
#
2
#
3

    
4
# Copyright (C) 2006, 2007, 2008 Google Inc.
5
#
6
# This program is free software; you can redistribute it and/or modify
7
# it under the terms of the GNU General Public License as published by
8
# the Free Software Foundation; either version 2 of the License, or
9
# (at your option) any later version.
10
#
11
# This program is distributed in the hope that it will be useful, but
12
# WITHOUT ANY WARRANTY; without even the implied warranty of
13
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
# General Public License for more details.
15
#
16
# You should have received a copy of the GNU General Public License
17
# along with this program; if not, write to the Free Software
18
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
# 02110-1301, USA.
20

    
21

    
22
"""Functions to bootstrap a new cluster.
23

24
"""
25

    
26
import os
27
import os.path
28
import sha
29
import re
30
import logging
31

    
32
from ganeti import rpc
33
from ganeti import ssh
34
from ganeti import utils
35
from ganeti import errors
36
from ganeti import config
37
from ganeti import constants
38
from ganeti import objects
39
from ganeti import ssconf
40

    
41

    
42
def _InitSSHSetup(node):
43
  """Setup the SSH configuration for the cluster.
44

45

46
  This generates a dsa keypair for root, adds the pub key to the
47
  permitted hosts and adds the hostkey to its own known hosts.
48

49
  Args:
50
    node: the name of this host as a fqdn
51

52
  """
53
  priv_key, pub_key, auth_keys = ssh.GetUserFiles(constants.GANETI_RUNAS)
54

    
55
  for name in priv_key, pub_key:
56
    if os.path.exists(name):
57
      utils.CreateBackup(name)
58
    utils.RemoveFile(name)
59

    
60
  result = utils.RunCmd(["ssh-keygen", "-t", "dsa",
61
                         "-f", priv_key,
62
                         "-q", "-N", ""])
63
  if result.failed:
64
    raise errors.OpExecError("Could not generate ssh keypair, error %s" %
65
                             result.output)
66

    
67
  f = open(pub_key, 'r')
68
  try:
69
    utils.AddAuthorizedKey(auth_keys, f.read(8192))
70
  finally:
71
    f.close()
72

    
73

    
74
def _InitGanetiServerSetup(ss):
75
  """Setup the necessary configuration for the initial node daemon.
76

77
  This creates the nodepass file containing the shared password for
78
  the cluster and also generates the SSL certificate.
79

80
  Args:
81
    ss: A WritableSimpleStore
82

83
  """
84
  # Create pseudo random password
85
  randpass = utils.GenerateSecret()
86
  # and write it into sstore
87
  ss.SetKey(ss.SS_NODED_PASS, randpass)
88

    
89
  result = utils.RunCmd(["openssl", "req", "-new", "-newkey", "rsa:1024",
90
                         "-days", str(365*5), "-nodes", "-x509",
91
                         "-keyout", constants.SSL_CERT_FILE,
92
                         "-out", constants.SSL_CERT_FILE, "-batch"])
93
  if result.failed:
94
    raise errors.OpExecError("could not generate server ssl cert, command"
95
                             " %s had exitcode %s and error message %s" %
96
                             (result.cmd, result.exit_code, result.output))
97

    
98
  os.chmod(constants.SSL_CERT_FILE, 0400)
99

    
100
  result = utils.RunCmd([constants.NODE_INITD_SCRIPT, "restart"])
101

    
102
  if result.failed:
103
    raise errors.OpExecError("Could not start the node daemon, command %s"
104
                             " had exitcode %s and error %s" %
105
                             (result.cmd, result.exit_code, result.output))
106

    
107

    
108
def InitCluster(cluster_name, hypervisor_type, mac_prefix, def_bridge,
109
                master_netdev, file_storage_dir,
110
                secondary_ip=None,
111
                vg_name=None):
112
  """Initialise the cluster.
113

114
  """
115
  if config.ConfigWriter.IsCluster():
116
    raise errors.OpPrereqError("Cluster is already initialised")
117

    
118
  if hypervisor_type == constants.HT_XEN_HVM31:
119
    if not os.path.exists(constants.VNC_PASSWORD_FILE):
120
      raise errors.OpPrereqError("Please prepare the cluster VNC"
121
                                 "password file %s" %
122
                                 constants.VNC_PASSWORD_FILE)
123

    
124
  hostname = utils.HostInfo()
125

    
126
  if hostname.ip.startswith("127."):
127
    raise errors.OpPrereqError("This host's IP resolves to the private"
128
                               " range (%s). Please fix DNS or %s." %
129
                               (hostname.ip, constants.ETC_HOSTS))
130

    
131
  if not utils.TcpPing(hostname.ip, constants.DEFAULT_NODED_PORT,
132
                       source=constants.LOCALHOST_IP_ADDRESS):
133
    raise errors.OpPrereqError("Inconsistency: this host's name resolves"
134
                               " to %s,\nbut this ip address does not"
135
                               " belong to this host."
136
                               " Aborting." % hostname.ip)
137

    
138
  clustername = utils.HostInfo(cluster_name)
139

    
140
  if utils.TcpPing(clustername.ip, constants.DEFAULT_NODED_PORT,
141
                   timeout=5):
142
    raise errors.OpPrereqError("Cluster IP already active. Aborting.")
143

    
144
  if secondary_ip:
145
    if not utils.IsValidIP(secondary_ip):
146
      raise errors.OpPrereqError("Invalid secondary ip given")
147
    if (secondary_ip != hostname.ip and
148
        (not utils.TcpPing(secondary_ip, constants.DEFAULT_NODED_PORT,
149
                           source=constants.LOCALHOST_IP_ADDRESS))):
150
      raise errors.OpPrereqError("You gave %s as secondary IP,"
151
                                 " but it does not belong to this host." %
152
                                 secondary_ip)
153
  else:
154
    secondary_ip = hostname.ip
155

    
156
  if vg_name is not None:
157
    # Check if volume group is valid
158
    vgstatus = utils.CheckVolumeGroupSize(utils.ListVolumeGroups(), vg_name,
159
                                          constants.MIN_VG_SIZE)
160
    if vgstatus:
161
      raise errors.OpPrereqError("Error: %s\nspecify --no-lvm-storage if"
162
                                 " you are not using lvm" % vgstatus)
163

    
164
  file_storage_dir = os.path.normpath(file_storage_dir)
165

    
166
  if not os.path.isabs(file_storage_dir):
167
    raise errors.OpPrereqError("The file storage directory you passed is"
168
                               " not an absolute path.")
169

    
170
  if not os.path.exists(file_storage_dir):
171
    try:
172
      os.makedirs(file_storage_dir, 0750)
173
    except OSError, err:
174
      raise errors.OpPrereqError("Cannot create file storage directory"
175
                                 " '%s': %s" %
176
                                 (file_storage_dir, err))
177

    
178
  if not os.path.isdir(file_storage_dir):
179
    raise errors.OpPrereqError("The file storage directory '%s' is not"
180
                               " a directory." % file_storage_dir)
181

    
182
  if not re.match("^[0-9a-z]{2}:[0-9a-z]{2}:[0-9a-z]{2}$", mac_prefix):
183
    raise errors.OpPrereqError("Invalid mac prefix given '%s'" % mac_prefix)
184

    
185
  if hypervisor_type not in constants.HYPER_TYPES:
186
    raise errors.OpPrereqError("Invalid hypervisor type given '%s'" %
187
                               hypervisor_type)
188

    
189
  result = utils.RunCmd(["ip", "link", "show", "dev", master_netdev])
190
  if result.failed:
191
    raise errors.OpPrereqError("Invalid master netdev given (%s): '%s'" %
192
                               (master_netdev,
193
                                result.output.strip()))
194

    
195
  if not (os.path.isfile(constants.NODE_INITD_SCRIPT) and
196
          os.access(constants.NODE_INITD_SCRIPT, os.X_OK)):
197
    raise errors.OpPrereqError("Init.d script '%s' missing or not"
198
                               " executable." % constants.NODE_INITD_SCRIPT)
199

    
200
  # set up the simple store
201
  ss = ssconf.WritableSimpleStore()
202
  ss.SetKey(ss.SS_HYPERVISOR, hypervisor_type)
203
  ss.SetKey(ss.SS_MASTER_NODE, hostname.name)
204
  ss.SetKey(ss.SS_MASTER_IP, clustername.ip)
205
  ss.SetKey(ss.SS_MASTER_NETDEV, master_netdev)
206
  ss.SetKey(ss.SS_CLUSTER_NAME, clustername.name)
207
  ss.SetKey(ss.SS_FILE_STORAGE_DIR, file_storage_dir)
208
  ss.SetKey(ss.SS_CONFIG_VERSION, constants.CONFIG_VERSION)
209

    
210
  # set up the inter-node password and certificate
211
  _InitGanetiServerSetup(ss)
212

    
213
  # set up ssh config and /etc/hosts
214
  f = open(constants.SSH_HOST_RSA_PUB, 'r')
215
  try:
216
    sshline = f.read()
217
  finally:
218
    f.close()
219
  sshkey = sshline.split(" ")[1]
220

    
221
  utils.AddHostToEtcHosts(hostname.name)
222
  _InitSSHSetup(hostname.name)
223

    
224
  # init of cluster config file
225
  cluster_config = objects.Cluster(
226
    serial_no=1,
227
    rsahostkeypub=sshkey,
228
    highest_used_port=(constants.FIRST_DRBD_PORT - 1),
229
    mac_prefix=mac_prefix,
230
    volume_group_name=vg_name,
231
    default_bridge=def_bridge,
232
    tcpudp_port_pool=set(),
233
    )
234
  master_node_config = objects.Node(name=hostname.name,
235
                                    primary_ip=hostname.ip,
236
                                    secondary_ip=secondary_ip)
237
  cfg = config.ConfigWriter()
238
  cfg.InitConfig(cluster_config, master_node_config)
239

    
240
  ssh.WriteKnownHostsFile(cfg, ss, constants.SSH_KNOWN_HOSTS_FILE)
241

    
242
  # start the master ip
243
  # TODO: Review rpc call from bootstrap
244
  rpc.call_node_start_master(hostname.name, True)
245

    
246

    
247
def FinalizeClusterDestroy(master):
248
  """Execute the last steps of cluster destroy
249

250
  This function shuts down all the daemons, completing the destroy
251
  begun in cmdlib.LUDestroyOpcode.
252

253
  """
254
  if not rpc.call_node_stop_master(master, True):
255
    logging.warning("Could not disable the master role")
256
  if not rpc.call_node_leave_cluster(master):
257
    logging.warning("Could not shutdown the node daemon and cleanup the node")
258

    
259

    
260
def SetupNodeDaemon(node, ssh_key_check):
261
  """Add a node to the cluster.
262

263
  This function must be called before the actual opcode, and will ssh
264
  to the remote node, copy the needed files, and start ganeti-noded,
265
  allowing the master to do the rest via normal rpc calls.
266

267
  Args:
268
    node: fully qualified domain name for the new node
269

270
  """
271
  ss = ssconf.SimpleStore()
272
  sshrunner = ssh.SshRunner(ss)
273
  gntpass = ss.GetNodeDaemonPassword()
274
  if not re.match('^[a-zA-Z0-9.]{1,64}$', gntpass):
275
    raise errors.OpExecError("ganeti password corruption detected")
276
  f = open(constants.SSL_CERT_FILE)
277
  try:
278
    gntpem = f.read(8192)
279
  finally:
280
    f.close()
281
  # in the base64 pem encoding, neither '!' nor '.' are valid chars,
282
  # so we use this to detect an invalid certificate; as long as the
283
  # cert doesn't contain this, the here-document will be correctly
284
  # parsed by the shell sequence below
285
  if re.search('^!EOF\.', gntpem, re.MULTILINE):
286
    raise errors.OpExecError("invalid PEM encoding in the SSL certificate")
287
  if not gntpem.endswith("\n"):
288
    raise errors.OpExecError("PEM must end with newline")
289

    
290
  # set up inter-node password and certificate and restarts the node daemon
291
  # and then connect with ssh to set password and start ganeti-noded
292
  # note that all the below variables are sanitized at this point,
293
  # either by being constants or by the checks above
294
  mycommand = ("umask 077 && "
295
               "echo '%s' > '%s' && "
296
               "cat > '%s' << '!EOF.' && \n"
297
               "%s!EOF.\n%s restart" %
298
               (gntpass, ss.KeyToFilename(ss.SS_NODED_PASS),
299
                constants.SSL_CERT_FILE, gntpem,
300
                constants.NODE_INITD_SCRIPT))
301

    
302
  result = sshrunner.Run(node, 'root', mycommand, batch=False,
303
                         ask_key=ssh_key_check,
304
                         use_cluster_key=False,
305
                         strict_host_check=ssh_key_check)
306
  if result.failed:
307
    raise errors.OpExecError("Remote command on node %s, error: %s,"
308
                             " output: %s" %
309
                             (node, result.fail_reason, result.output))
310

    
311
  return 0
312

    
313

    
314
def MasterFailover():
315
  """Failover the master node.
316

317
  This checks that we are not already the master, and will cause the
318
  current master to cease being master, and the non-master to become
319
  new master.
320

321
  """
322
  ss = ssconf.WritableSimpleStore()
323

    
324
  new_master = utils.HostInfo().name
325
  old_master = ss.GetMasterNode()
326

    
327
  if old_master == new_master:
328
    raise errors.OpPrereqError("This commands must be run on the node"
329
                               " where you want the new master to be."
330
                               " %s is already the master" %
331
                               old_master)
332
  # end checks
333

    
334
  rcode = 0
335

    
336
  logging.info("setting master to %s, old master: %s", new_master, old_master)
337

    
338
  if not rpc.call_node_stop_master(old_master, True):
339
    logging.error("could disable the master role on the old master"
340
                 " %s, please disable manually", old_master)
341

    
342
  ss.SetKey(ss.SS_MASTER_NODE, new_master)
343

    
344
  cfg = config.ConfigWriter()
345

    
346
  if not rpc.call_upload_file(cfg.GetNodeList(),
347
                              ss.KeyToFilename(ss.SS_MASTER_NODE)):
348
    logging.error("could not distribute the new simple store master file"
349
                  " to the other nodes, please check.")
350

    
351
  if not rpc.call_node_start_master(new_master, True):
352
    logging.error("could not start the master role on the new master"
353
                  " %s, please check", new_master)
354
    rcode = 1
355

    
356
  return rcode