]>
Commit | Line | Data |
---|---|---|
3efd9988 | 1 | import argparse |
f64942e4 | 2 | import os |
3efd9988 | 3 | import logging |
eafe8130 | 4 | import time |
3efd9988 FG |
5 | |
6 | from textwrap import dedent | |
7 | ||
8 | from ceph_volume import decorators, terminal, process | |
9 | from ceph_volume.api import lvm as api | |
f6b5b4d7 | 10 | from ceph_volume.util import system, encryption, disk, arg_validators, str_to_int, merge_dict |
f64942e4 AA |
11 | from ceph_volume.util.device import Device |
12 | from ceph_volume.systemd import systemctl | |
3efd9988 FG |
13 | |
14 | logger = logging.getLogger(__name__) | |
b32b8144 | 15 | mlogger = terminal.MultiLogger(__name__) |
3efd9988 FG |
16 | |
17 | ||
18 | def wipefs(path): | |
19 | """ | |
20 | Removes the filesystem from an lv or partition. | |
eafe8130 TL |
21 | |
22 | Environment variables supported:: | |
23 | ||
24 | * ``CEPH_VOLUME_WIPEFS_TRIES``: Defaults to 8 | |
25 | * ``CEPH_VOLUME_WIPEFS_INTERVAL``: Defaults to 5 | |
26 | ||
3efd9988 | 27 | """ |
eafe8130 TL |
28 | tries = str_to_int( |
29 | os.environ.get('CEPH_VOLUME_WIPEFS_TRIES', 8) | |
30 | ) | |
31 | interval = str_to_int( | |
32 | os.environ.get('CEPH_VOLUME_WIPEFS_INTERVAL', 5) | |
33 | ) | |
34 | ||
35 | for trying in range(tries): | |
36 | stdout, stderr, exit_code = process.call([ | |
37 | 'wipefs', | |
38 | '--all', | |
39 | path | |
40 | ]) | |
41 | if exit_code != 0: | |
42 | # this could narrow the retry by poking in the stderr of the output | |
43 | # to verify that 'probing initialization failed' appears, but | |
44 | # better to be broad in this retry to prevent missing on | |
45 | # a different message that needs to be retried as well | |
46 | terminal.warning( | |
47 | 'failed to wipefs device, will try again to workaround probable race condition' | |
48 | ) | |
49 | time.sleep(interval) | |
50 | else: | |
51 | return | |
52 | raise RuntimeError("could not complete wipefs on device: %s" % path) | |
3efd9988 FG |
53 | |
54 | ||
55 | def zap_data(path): | |
56 | """ | |
57 | Clears all data from the given path. Path should be | |
58 | an absolute path to an lv or partition. | |
59 | ||
60 | 10M of data is written to the path to make sure that | |
61 | there is no trace left of any previous Filesystem. | |
62 | """ | |
63 | process.run([ | |
64 | 'dd', | |
65 | 'if=/dev/zero', | |
66 | 'of={path}'.format(path=path), | |
67 | 'bs=1M', | |
68 | 'count=10', | |
92f5a8d4 | 69 | 'conv=fsync' |
3efd9988 FG |
70 | ]) |
71 | ||
72 | ||
f64942e4 AA |
73 | def find_associated_devices(osd_id=None, osd_fsid=None): |
74 | """ | |
75 | From an ``osd_id`` and/or an ``osd_fsid``, filter out all the LVs in the | |
76 | system that match those tag values, further detect if any partitions are | |
77 | part of the OSD, and then return the set of LVs and partitions (if any). | |
78 | """ | |
79 | lv_tags = {} | |
80 | if osd_id: | |
81 | lv_tags['ceph.osd_id'] = osd_id | |
82 | if osd_fsid: | |
83 | lv_tags['ceph.osd_fsid'] = osd_fsid | |
f64942e4 | 84 | |
f6b5b4d7 TL |
85 | lvs = api.get_lvs(tags=lv_tags) |
86 | if not lvs: | |
87 | raise RuntimeError('Unable to find any LV for zapping OSD: ' | |
88 | '%s' % osd_id or osd_fsid) | |
f64942e4 | 89 | |
f6b5b4d7 | 90 | devices_to_zap = ensure_associated_lvs(lvs, lv_tags) |
f64942e4 AA |
91 | return [Device(path) for path in set(devices_to_zap) if path] |
92 | ||
93 | ||
f6b5b4d7 | 94 | def ensure_associated_lvs(lvs, lv_tags={}): |
f64942e4 AA |
95 | """ |
96 | Go through each LV and ensure if backing devices (journal, wal, block) | |
97 | are LVs or partitions, so that they can be accurately reported. | |
98 | """ | |
99 | # look for many LVs for each backing type, because it is possible to | |
100 | # receive a filtering for osd.1, and have multiple failed deployments | |
101 | # leaving many journals with osd.1 - usually, only a single LV will be | |
102 | # returned | |
f6b5b4d7 TL |
103 | |
104 | journal_lvs = api.get_lvs(tags=merge_dict(lv_tags, {'ceph.type': 'journal'})) | |
105 | db_lvs = api.get_lvs(tags=merge_dict(lv_tags, {'ceph.type': 'db'})) | |
106 | wal_lvs = api.get_lvs(tags=merge_dict(lv_tags, {'ceph.type': 'wal'})) | |
107 | backing_devices = [(journal_lvs, 'journal'), (db_lvs, 'db'), | |
108 | (wal_lvs, 'wal')] | |
f64942e4 AA |
109 | |
110 | verified_devices = [] | |
111 | ||
112 | for lv in lvs: | |
113 | # go through each lv and append it, otherwise query `blkid` to find | |
114 | # a physical device. Do this for each type (journal,db,wal) regardless | |
115 | # if they have been processed in the previous LV, so that bad devices | |
116 | # with the same ID can be caught | |
117 | for ceph_lvs, _type in backing_devices: | |
118 | if ceph_lvs: | |
119 | verified_devices.extend([l.lv_path for l in ceph_lvs]) | |
120 | continue | |
121 | ||
122 | # must be a disk partition, by querying blkid by the uuid we are | |
123 | # ensuring that the device path is always correct | |
124 | try: | |
125 | device_uuid = lv.tags['ceph.%s_uuid' % _type] | |
126 | except KeyError: | |
127 | # Bluestore will not have ceph.journal_uuid, and Filestore | |
128 | # will not not have ceph.db_uuid | |
129 | continue | |
130 | ||
131 | osd_device = disk.get_device_from_partuuid(device_uuid) | |
132 | if not osd_device: | |
133 | # if the osd_device is not found by the partuuid, then it is | |
134 | # not possible to ensure this device exists anymore, so skip it | |
135 | continue | |
136 | verified_devices.append(osd_device) | |
137 | ||
138 | verified_devices.append(lv.lv_path) | |
139 | ||
140 | # reduce the list from all the duplicates that were added | |
141 | return list(set(verified_devices)) | |
142 | ||
143 | ||
3efd9988 FG |
144 | class Zap(object): |
145 | ||
146 | help = 'Removes all data and filesystems from a logical volume or partition.' | |
147 | ||
148 | def __init__(self, argv): | |
149 | self.argv = argv | |
150 | ||
1adf2230 AA |
151 | def unmount_lv(self, lv): |
152 | if lv.tags.get('ceph.cluster_name') and lv.tags.get('ceph.osd_id'): | |
153 | lv_path = "/var/lib/ceph/osd/{}-{}".format(lv.tags['ceph.cluster_name'], lv.tags['ceph.osd_id']) | |
3a9019d9 | 154 | else: |
1adf2230 AA |
155 | lv_path = lv.lv_path |
156 | dmcrypt_uuid = lv.lv_uuid | |
157 | dmcrypt = lv.encrypted | |
158 | if system.path_is_mounted(lv_path): | |
159 | mlogger.info("Unmounting %s", lv_path) | |
160 | system.unmount(lv_path) | |
3a9019d9 | 161 | if dmcrypt and dmcrypt_uuid: |
1adf2230 | 162 | self.dmcrypt_close(dmcrypt_uuid) |
3efd9988 | 163 | |
f64942e4 AA |
164 | def zap_lv(self, device): |
165 | """ | |
166 | Device examples: vg-name/lv-name, /dev/vg-name/lv-name | |
167 | Requirements: Must be a logical volume (LV) | |
168 | """ | |
a4b75251 TL |
169 | lv = api.get_single_lv(filters={'lv_name': device.lv_name, 'vg_name': |
170 | device.vg_name}) | |
33c7a0ef | 171 | pv = api.get_single_pv(filters={'lv_uuid': lv.lv_uuid}) |
f64942e4 AA |
172 | self.unmount_lv(lv) |
173 | ||
174 | wipefs(device.abspath) | |
175 | zap_data(device.abspath) | |
176 | ||
177 | if self.args.destroy: | |
f6b5b4d7 TL |
178 | lvs = api.get_lvs(filters={'vg_name': device.vg_name}) |
179 | if lvs == []: | |
180 | mlogger.info('No LVs left, exiting', device.vg_name) | |
181 | return | |
182 | elif len(lvs) <= 1: | |
183 | mlogger.info('Only 1 LV left in VG, will proceed to destroy ' | |
184 | 'volume group %s', device.vg_name) | |
f64942e4 | 185 | api.remove_vg(device.vg_name) |
33c7a0ef | 186 | api.remove_pv(pv.pv_name) |
f64942e4 | 187 | else: |
f6b5b4d7 TL |
188 | mlogger.info('More than 1 LV left in VG, will proceed to ' |
189 | 'destroy LV only') | |
190 | mlogger.info('Removing LV because --destroy was given: %s', | |
191 | device.abspath) | |
f64942e4 AA |
192 | api.remove_lv(device.abspath) |
193 | elif lv: | |
194 | # just remove all lvm metadata, leaving the LV around | |
195 | lv.clear_tags() | |
196 | ||
197 | def zap_partition(self, device): | |
198 | """ | |
199 | Device example: /dev/sda1 | |
200 | Requirements: Must be a partition | |
201 | """ | |
202 | if device.is_encrypted: | |
203 | # find the holder | |
204 | holders = [ | |
205 | '/dev/%s' % holder for holder in device.sys_api.get('holders', []) | |
206 | ] | |
207 | for mapper_uuid in os.listdir('/dev/mapper'): | |
208 | mapper_path = os.path.join('/dev/mapper', mapper_uuid) | |
209 | if os.path.realpath(mapper_path) in holders: | |
210 | self.dmcrypt_close(mapper_uuid) | |
211 | ||
212 | if system.device_is_mounted(device.abspath): | |
213 | mlogger.info("Unmounting %s", device.abspath) | |
214 | system.unmount(device.abspath) | |
215 | ||
216 | wipefs(device.abspath) | |
217 | zap_data(device.abspath) | |
218 | ||
219 | if self.args.destroy: | |
220 | mlogger.info("Destroying partition since --destroy was used: %s" % device.abspath) | |
221 | disk.remove_partition(device) | |
222 | ||
223 | def zap_lvm_member(self, device): | |
224 | """ | |
225 | An LVM member may have more than one LV and or VG, for example if it is | |
226 | a raw device with multiple partitions each belonging to a different LV | |
227 | ||
228 | Device example: /dev/sda | |
229 | Requirements: An LV or VG present in the device, making it an LVM member | |
230 | """ | |
231 | for lv in device.lvs: | |
92f5a8d4 TL |
232 | if lv.lv_name: |
233 | mlogger.info('Zapping lvm member {}. lv_path is {}'.format(device.abspath, lv.lv_path)) | |
234 | self.zap_lv(Device(lv.lv_path)) | |
235 | else: | |
a4b75251 | 236 | vg = api.get_single_vg(filters={'vg_name': lv.vg_name}) |
92f5a8d4 TL |
237 | if vg: |
238 | mlogger.info('Found empty VG {}, removing'.format(vg.vg_name)) | |
239 | api.remove_vg(vg.vg_name) | |
240 | ||
f64942e4 AA |
241 | |
242 | ||
243 | def zap_raw_device(self, device): | |
244 | """ | |
245 | Any whole (raw) device passed in as input will be processed here, | |
246 | checking for LVM membership and partitions (if any). | |
247 | ||
248 | Device example: /dev/sda | |
249 | Requirements: None | |
250 | """ | |
251 | if not self.args.destroy: | |
252 | # the use of dd on a raw device causes the partition table to be | |
253 | # destroyed | |
254 | mlogger.warning( | |
255 | '--destroy was not specified, but zapping a whole device will remove the partition table' | |
256 | ) | |
257 | ||
258 | # look for partitions and zap those | |
259 | for part_name in device.sys_api.get('partitions', {}).keys(): | |
260 | self.zap_partition(Device('/dev/%s' % part_name)) | |
261 | ||
262 | wipefs(device.abspath) | |
263 | zap_data(device.abspath) | |
264 | ||
1adf2230 | 265 | @decorators.needs_root |
f64942e4 AA |
266 | def zap(self, devices=None): |
267 | devices = devices or self.args.devices | |
268 | ||
269 | for device in devices: | |
270 | mlogger.info("Zapping: %s", device.abspath) | |
20effc67 | 271 | if device.is_mapper and not device.is_mpath: |
1adf2230 AA |
272 | terminal.error("Refusing to zap the mapper device: {}".format(device)) |
273 | raise SystemExit(1) | |
f64942e4 AA |
274 | if device.is_lvm_member: |
275 | self.zap_lvm_member(device) | |
276 | if device.is_lv: | |
277 | self.zap_lv(device) | |
278 | if device.is_partition: | |
279 | self.zap_partition(device) | |
280 | if device.is_device: | |
281 | self.zap_raw_device(device) | |
282 | ||
283 | if self.args.devices: | |
284 | terminal.success( | |
285 | "Zapping successful for: %s" % ", ".join([str(d) for d in self.args.devices]) | |
286 | ) | |
287 | else: | |
eafe8130 | 288 | identifier = self.args.osd_id or self.args.osd_fsid |
f64942e4 | 289 | terminal.success( |
eafe8130 | 290 | "Zapping successful for OSD: %s" % identifier |
f64942e4 AA |
291 | ) |
292 | ||
293 | @decorators.needs_root | |
294 | def zap_osd(self): | |
f91f0fd5 | 295 | if self.args.osd_id and not self.args.no_systemd: |
f64942e4 AA |
296 | osd_is_running = systemctl.osd_is_active(self.args.osd_id) |
297 | if osd_is_running: | |
298 | mlogger.error("OSD ID %s is running, stop it with:" % self.args.osd_id) | |
299 | mlogger.error("systemctl stop ceph-osd@%s" % self.args.osd_id) | |
300 | raise SystemExit("Unable to zap devices associated with OSD ID: %s" % self.args.osd_id) | |
301 | devices = find_associated_devices(self.args.osd_id, self.args.osd_fsid) | |
302 | self.zap(devices) | |
1adf2230 AA |
303 | |
304 | def dmcrypt_close(self, dmcrypt_uuid): | |
305 | dmcrypt_path = "/dev/mapper/{}".format(dmcrypt_uuid) | |
306 | mlogger.info("Closing encrypted path %s", dmcrypt_path) | |
307 | encryption.dmcrypt_close(dmcrypt_path) | |
3efd9988 FG |
308 | |
309 | def main(self): | |
310 | sub_command_help = dedent(""" | |
1adf2230 | 311 | Zaps the given logical volume(s), raw device(s) or partition(s) for reuse by ceph-volume. |
b32b8144 FG |
312 | If given a path to a logical volume it must be in the format of vg/lv. Any |
313 | filesystems present on the given device, vg/lv, or partition will be removed and | |
314 | all data will be purged. | |
315 | ||
316 | If the logical volume, raw device or partition is being used for any ceph related | |
317 | mount points they will be unmounted. | |
3efd9988 FG |
318 | |
319 | However, the lv or partition will be kept intact. | |
320 | ||
321 | Example calls for supported scenarios: | |
322 | ||
323 | Zapping a logical volume: | |
324 | ||
325 | ceph-volume lvm zap {vg name/lv name} | |
326 | ||
327 | Zapping a partition: | |
328 | ||
329 | ceph-volume lvm zap /dev/sdc1 | |
330 | ||
1adf2230 AA |
331 | Zapping many raw devices: |
332 | ||
333 | ceph-volume lvm zap /dev/sda /dev/sdb /db/sdc | |
334 | ||
f64942e4 AA |
335 | Zapping devices associated with an OSD ID: |
336 | ||
337 | ceph-volume lvm zap --osd-id 1 | |
338 | ||
339 | Optionally include the OSD FSID | |
340 | ||
341 | ceph-volume lvm zap --osd-id 1 --osd-fsid 55BD4219-16A7-4037-BC20-0F158EFCC83D | |
342 | ||
b32b8144 FG |
343 | If the --destroy flag is given and you are zapping a raw device or partition |
344 | then all vgs and lvs that exist on that raw device or partition will be destroyed. | |
345 | ||
346 | This is especially useful if a raw device or partition was used by ceph-volume lvm create | |
347 | or ceph-volume lvm prepare commands previously and now you want to reuse that device. | |
348 | ||
349 | For example: | |
350 | ||
351 | ceph-volume lvm zap /dev/sda --destroy | |
352 | ||
353 | If the --destroy flag is given and you are zapping an lv then the lv is still | |
354 | kept intact for reuse. | |
355 | ||
3efd9988 FG |
356 | """) |
357 | parser = argparse.ArgumentParser( | |
358 | prog='ceph-volume lvm zap', | |
359 | formatter_class=argparse.RawDescriptionHelpFormatter, | |
360 | description=sub_command_help, | |
361 | ) | |
362 | ||
363 | parser.add_argument( | |
1adf2230 AA |
364 | 'devices', |
365 | metavar='DEVICES', | |
366 | nargs='*', | |
33c7a0ef | 367 | type=arg_validators.ValidZapDevice(gpt_ok=True), |
1adf2230 AA |
368 | default=[], |
369 | help='Path to one or many lv (as vg/lv), partition (as /dev/sda1) or device (as /dev/sda)' | |
b32b8144 | 370 | ) |
f64942e4 | 371 | |
b32b8144 FG |
372 | parser.add_argument( |
373 | '--destroy', | |
374 | action='store_true', | |
375 | default=False, | |
376 | help='Destroy all volume groups and logical volumes if you are zapping a raw device or partition', | |
3efd9988 | 377 | ) |
f64942e4 AA |
378 | |
379 | parser.add_argument( | |
380 | '--osd-id', | |
20effc67 | 381 | type=arg_validators.valid_osd_id, |
f64942e4 AA |
382 | help='Specify an OSD ID to detect associated devices for zapping', |
383 | ) | |
384 | ||
385 | parser.add_argument( | |
386 | '--osd-fsid', | |
387 | help='Specify an OSD FSID to detect associated devices for zapping', | |
388 | ) | |
389 | ||
f91f0fd5 TL |
390 | parser.add_argument( |
391 | '--no-systemd', | |
392 | dest='no_systemd', | |
393 | action='store_true', | |
394 | help='Skip systemd unit checks', | |
395 | ) | |
396 | ||
3efd9988 FG |
397 | if len(self.argv) == 0: |
398 | print(sub_command_help) | |
399 | return | |
f64942e4 AA |
400 | |
401 | self.args = parser.parse_args(self.argv) | |
402 | ||
403 | if self.args.osd_id or self.args.osd_fsid: | |
404 | self.zap_osd() | |
405 | else: | |
406 | self.zap() |