| # |
| # |
| |
| # Copyright (C) 2012 Google Inc. |
| # All rights reserved. |
| # |
| # Redistribution and use in source and binary forms, with or without |
| # modification, are permitted provided that the following conditions are |
| # met: |
| # |
| # 1. Redistributions of source code must retain the above copyright notice, |
| # this list of conditions and the following disclaimer. |
| # |
| # 2. Redistributions in binary form must reproduce the above copyright |
| # notice, this list of conditions and the following disclaimer in the |
| # documentation and/or other materials provided with the distribution. |
| # |
| # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS |
| # IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED |
| # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR |
| # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| # PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
| # LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
| # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
| # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| |
| """Script to configure the node daemon. |
| |
| """ |
| |
| import os |
| import os.path |
| import optparse |
| import sys |
| import logging |
| |
| from ganeti import cli |
| from ganeti import constants |
| from ganeti import errors |
| from ganeti import pathutils |
| from ganeti import utils |
| from ganeti import runtime |
| from ganeti import ht |
| from ganeti import ssconf |
| from ganeti.tools import common |
| |
| |
| _DATA_CHECK = ht.TStrictDict(False, True, { |
| constants.NDS_CLUSTER_NAME: ht.TNonEmptyString, |
| constants.NDS_NODE_DAEMON_CERTIFICATE: ht.TNonEmptyString, |
| constants.NDS_HMAC: ht.TNonEmptyString, |
| constants.NDS_SSCONF: ht.TDictOf(ht.TNonEmptyString, ht.TString), |
| constants.NDS_START_NODE_DAEMON: ht.TBool, |
| constants.NDS_NODE_NAME: ht.TString, |
| }) |
| |
| |
| class SetupError(errors.GenericError): |
| """Local class for reporting errors. |
| |
| """ |
| |
| |
| def ParseOptions(): |
| """Parses the options passed to the program. |
| |
| @return: Options and arguments |
| |
| """ |
| parser = optparse.OptionParser(usage="%prog [--dry-run]", |
| prog=os.path.basename(sys.argv[0])) |
| parser.add_option(cli.DEBUG_OPT) |
| parser.add_option(cli.VERBOSE_OPT) |
| parser.add_option(cli.DRY_RUN_OPT) |
| |
| (opts, args) = parser.parse_args() |
| |
| return VerifyOptions(parser, opts, args) |
| |
| |
| def VerifyOptions(parser, opts, args): |
| """Verifies options and arguments for correctness. |
| |
| """ |
| if args: |
| parser.error("No arguments are expected") |
| |
| return opts |
| |
| |
| def VerifySsconf(data, cluster_name, _verify_fn=ssconf.VerifyKeys): |
| """Verifies ssconf names. |
| |
| @type data: dict |
| |
| """ |
| items = data.get(constants.NDS_SSCONF) |
| |
| if not items: |
| raise SetupError("Ssconf values must be specified") |
| |
| # TODO: Should all keys be required? Right now any subset of valid keys is |
| # accepted. |
| _verify_fn(items.keys()) |
| |
| if items.get(constants.SS_CLUSTER_NAME) != cluster_name: |
| raise SetupError("Cluster name in ssconf does not match") |
| |
| return items |
| |
| |
| def Main(): |
| """Main routine. |
| |
| """ |
| opts = ParseOptions() |
| |
| utils.SetupToolLogging( |
| opts.debug, opts.verbose, |
| toolname=os.path.splitext(os.path.basename(__file__))[0]) |
| |
| try: |
| getent = runtime.GetEnts() |
| |
| data = common.LoadData(sys.stdin.read(), SetupError) |
| |
| cluster_name = common.VerifyClusterName(data, SetupError, |
| constants.NDS_CLUSTER_NAME) |
| cert_pem = common.VerifyCertificateStrong(data, SetupError) |
| hmac_key = common.VerifyHmac(data, SetupError) |
| ssdata = VerifySsconf(data, cluster_name) |
| |
| logging.info("Writing ssconf files ...") |
| ssconf.WriteSsconfFiles(ssdata, dry_run=opts.dry_run) |
| |
| logging.info("Writing hmac.key ...") |
| utils.WriteFile(pathutils.CONFD_HMAC_KEY, data=hmac_key, |
| mode=pathutils.NODED_CERT_MODE, |
| uid=getent.masterd_uid, gid=getent.masterd_gid, |
| dry_run=opts.dry_run) |
| |
| logging.info("Writing node daemon certificate ...") |
| utils.WriteFile(pathutils.NODED_CERT_FILE, data=cert_pem, |
| mode=pathutils.NODED_CERT_MODE, |
| uid=getent.masterd_uid, gid=getent.masterd_gid, |
| dry_run=opts.dry_run) |
| common.GenerateClientCertificate(data, SetupError) |
| |
| if (data.get(constants.NDS_START_NODE_DAEMON) and # pylint: disable=E1103 |
| not opts.dry_run): |
| logging.info("Restarting node daemon ...") |
| |
| stop_cmd = "%s stop-all" % pathutils.DAEMON_UTIL |
| noded_cmd = "%s start %s" % (pathutils.DAEMON_UTIL, constants.NODED) |
| mond_cmd = "" |
| if constants.ENABLE_MOND: |
| mond_cmd = "%s start %s" % (pathutils.DAEMON_UTIL, constants.MOND) |
| |
| cmd = "; ".join([stop_cmd, noded_cmd, mond_cmd]) |
| |
| result = utils.RunCmd(cmd, interactive=True) |
| if result.failed: |
| raise SetupError("Could not start the node daemons, command '%s'" |
| " failed: %s" % (result.cmd, result.fail_reason)) |
| |
| logging.info("Node daemon successfully configured") |
| except Exception, err: # pylint: disable=W0703 |
| logging.debug("Caught unhandled exception", exc_info=True) |
| |
| (retcode, message) = cli.FormatError(err) |
| logging.error(message) |
| |
| return retcode |
| else: |
| return constants.EXIT_SUCCESS |