package PVE::CLI::pct;
-
+
use strict;
use warnings;
-use POSIX;
use Fcntl;
use File::Copy 'copy';
+use POSIX;
-use PVE::SafeSyslog;
-use PVE::Tools qw(extract_param);
+use PVE::CLIHandler;
use PVE::Cluster;
+use PVE::CpuSet;
+use PVE::Exception qw(raise_param_exc);
+use PVE::GuestHelpers;
use PVE::INotify;
-use PVE::RPCEnvironment;
use PVE::JSONSchema qw(get_standard_option);
-use PVE::CLIHandler;
-use PVE::API2::LXC;
+use PVE::LXC::CGroup;
+use PVE::RPCEnvironment;
+use PVE::SafeSyslog;
+use PVE::Tools qw(extract_param);
+
use PVE::API2::LXC::Config;
-use PVE::API2::LXC::Status;
use PVE::API2::LXC::Snapshot;
-
-use Data::Dumper;
+use PVE::API2::LXC::Status;
+use PVE::API2::LXC;
use base qw(PVE::CLIHandler);
my $upid_exit = sub {
my $upid = shift;
my $status = PVE::Tools::upid_read_status($upid);
- exit($status eq 'OK' ? 0 : -1);
+ exit(PVE::Tools::upid_status_is_error($status) ? -1 : 0);
};
+sub setup_environment {
+ PVE::RPCEnvironment->setup_default_cli_env();
+}
+
+__PACKAGE__->register_method ({
+ name => 'status',
+ path => 'status',
+ method => 'GET',
+ description => "Show CT status.",
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid }),
+ verbose => {
+ description => "Verbose output format",
+ type => 'boolean',
+ optional => 1,
+ }
+ },
+ },
+ returns => { type => 'null'},
+ code => sub {
+ my ($param) = @_;
+
+ # test if CT exists
+ my $conf = PVE::LXC::Config->load_config ($param->{vmid});
+
+ my $vmstatus = PVE::LXC::vmstatus($param->{vmid});
+ my $stat = $vmstatus->{$param->{vmid}};
+ if ($param->{verbose}) {
+ foreach my $k (sort (keys %$stat)) {
+ my $v = $stat->{$k};
+ next if !defined($v);
+ print "$k: $v\n";
+ }
+ } else {
+ my $status = $stat->{status} || 'unknown';
+ print "status: $status\n";
+ }
+
+ return undef;
+ }});
+
+sub param_mapping {
+ my ($name) = @_;
+
+ my $mapping = {
+ 'create_vm' => [
+ PVE::CLIHandler::get_standard_mapping('pve-password'),
+ 'ssh-public-keys',
+ ],
+ };
+
+ return $mapping->{$name};
+}
+
__PACKAGE__->register_method ({
name => 'unlock',
path => 'unlock',
my $vmid = $param->{vmid};
- PVE::LXC::Config->lock_config($vmid, sub {
- my $conf = PVE::LXC::Config->load_config($vmid);
- delete $conf->{lock};
- PVE::LXC::Config->write_config($vmid, $conf);
- });
+ PVE::LXC::Config->remove_lock($vmid);
return undef;
}});
method => 'GET',
description => "Launch a console for the specified container.",
parameters => {
- additionalProperties => 0,
+ additionalProperties => 0,
properties => {
vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid_running }),
+ escape => {
+ description => "Escape sequence prefix. For example to use <Ctrl+b q> as the escape sequence pass '^b'.",
+ default => '^a',
+ type => 'string',
+ pattern => '\^?[a-z]',
+ optional => 1,
+ },
},
},
returns => { type => 'null' },
# test if container exists on this node
my $conf = PVE::LXC::Config->load_config($param->{vmid});
- my $cmd = PVE::LXC::get_console_command($param->{vmid}, $conf);
+ my $cmd = PVE::LXC::get_console_command($param->{vmid}, $conf, $param->{escape});
exec(@$cmd);
}});
method => 'GET',
description => "Launch a shell for the specified container.",
parameters => {
- additionalProperties => 0,
+ additionalProperties => 0,
properties => {
vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid_running }),
},
my $vmid = $param->{vmid};
- # test if container exists on this node
- PVE::LXC::Config->load_config($vmid);
-
- die "Error: container '$vmid' not running!\n" if !PVE::LXC::check_running($vmid);
+ PVE::LXC::Config->load_config($vmid); # test if container exists on this node
+ die "container '$vmid' not running!\n" if !PVE::LXC::check_running($vmid);
exec('lxc-attach', '-n', $vmid);
}});
method => 'GET',
description => "Launch a command inside the specified container.",
parameters => {
- additionalProperties => 0,
+ additionalProperties => 0,
properties => {
vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid_running }),
'extra-args' => get_standard_option('extra-args'),
},
},
returns => { type => 'null' },
-
code => sub {
my ($param) = @_;
- # test if container exists on this node
- PVE::LXC::Config->load_config($param->{vmid});
+ my $vmid = $param->{vmid};
+ PVE::LXC::Config->load_config($vmid); # test if container exists on this node
+ die "container '$vmid' not running!\n" if !PVE::LXC::check_running($vmid);
- if (!@{$param->{'extra-args'}}) {
- die "missing command";
- }
- exec('lxc-attach', '-n', $param->{vmid}, '--', @{$param->{'extra-args'}});
+ die "missing command" if !@{$param->{'extra-args'}};
+
+ exec('lxc-attach', '-n', $vmid, '--', @{$param->{'extra-args'}});
}});
__PACKAGE__->register_method ({
optional => 1,
type => 'string',
description => "A volume on which to run the filesystem check",
- enum => [PVE::LXC::Config->mountpoint_names()],
+ enum => [PVE::LXC::Config->valid_volume_keys()],
},
},
},
returns => { type => 'null' },
code => sub {
-
my ($param) = @_;
+
my $vmid = $param->{'vmid'};
my $device = defined($param->{'device'}) ? $param->{'device'} : 'rootfs';
my $conf = PVE::LXC::Config->load_config($vmid);
my $storage_cfg = PVE::Storage::config();
- defined($conf->{$device}) || die "cannot run command on unexisting mountpoint $device\n";
+ defined($conf->{$device}) || die "cannot run command on non-existing mount point $device\n";
+
+ my $mount_point = PVE::LXC::Config->parse_volume($device, $conf->{$device});
- my $mount_point = $device eq 'rootfs' ? PVE::LXC::parse_ct_rootfs($conf->{$device}) :
- PVE::LXC::parse_ct_mountpoint($conf->{$device});
+ die "cannot run fsck when container is running\n"
+ if PVE::LXC::check_running($vmid);
my $volid = $mount_point->{volume};
die "unable to run fsck for '$volid' (format == $format)\n"
if $format ne 'raw';
- $path = PVE::Storage::path($storage_cfg, $volid);
+ $path = PVE::Storage::map_volume($storage_cfg, $volid);
} else {
if (($volid =~ m|^/.+|) && (-b $volid)) {
}
push(@$command, $path);
-
- PVE::LXC::check_running($vmid) &&
- die "cannot run fsck on active container\n";
-
PVE::Tools::run_command($command);
+
+ PVE::Storage::unmap_volume($storage_cfg, $volid) if $storage_id;
};
PVE::LXC::Config->lock_config($vmid, $do_fsck);
my $conf = PVE::LXC::Config->set_lock($vmid, 'mounted');
PVE::LXC::mount_all($vmid, $storecfg, $conf);
});
+
+ print "mounted CT $vmid in '/var/lib/lxc/$vmid/rootfs'\n";
return undef;
}});
return undef;
}});
+__PACKAGE__->register_method({
+ name => 'df',
+ path => 'df',
+ method => 'GET',
+ description => "Get the container's current disk usage.",
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid }),
+ },
+ },
+ returns => { type => 'null' },
+ code => sub {
+ my ($param) = @_;
+
+ my $rpcenv = PVE::RPCEnvironment::get();
+
+ # JSONSchema's format_size is exact, this uses floating point numbers
+ my $format = sub {
+ my ($size) = @_;
+ return $size if $size < 1024.;
+ $size /= 1024.;
+ return sprintf('%.1fK', ${size}) if $size < 1024.;
+ $size /= 1024.;
+ return sprintf('%.1fM', ${size}) if $size < 1024.;
+ $size /= 1024.;
+ return sprintf('%.1fG', ${size}) if $size < 1024.;
+ $size /= 1024.;
+ return sprintf('%.1fT', ${size}) if $size < 1024.;
+ };
+
+ my $vmid = extract_param($param, 'vmid');
+ PVE::LXC::Config->lock_config($vmid, sub {
+ my $pid = eval { PVE::LXC::find_lxc_pid($vmid) };
+ my ($conf, $rootdir, $storecfg, $mounted);
+ if ($@ || !$pid) {
+ $conf = PVE::LXC::Config->set_lock($vmid, 'mounted');
+ $rootdir = "/var/lib/lxc/$vmid/rootfs";
+ $storecfg = PVE::Storage::config();
+ PVE::LXC::mount_all($vmid, $storecfg, $conf);
+ $mounted = 1;
+ } else {
+ $conf = PVE::LXC::Config->load_config($vmid);
+ $rootdir = "/proc/$pid/root";
+ }
+
+ my @list = [qw(MP Volume Size Used Avail Use% Path)];
+ my @len = map { length($_) } @{$list[0]};
+
+ eval {
+ PVE::LXC::Config->foreach_volume($conf, sub {
+ my ($name, $mp) = @_;
+ my $path = $mp->{mp};
+
+ my $df = PVE::Tools::df("$rootdir/$path", 3);
+ my $total = $format->($df->{total});
+ my $used = $format->($df->{used});
+ my $avail = $format->($df->{avail});
+
+ my $pc = sprintf('%.1f', $df->{used}/$df->{total});
+
+ my $entry = [ $name, $mp->{volume}, $total, $used, $avail, $pc, $path ];
+ push @list, $entry;
+
+ foreach my $i (0..5) {
+ $len[$i] = length($entry->[$i])
+ if $len[$i] < length($entry->[$i]);
+ }
+ });
+
+ my $format = "%-$len[0]s %-$len[1]s %$len[2]s %$len[3]s %$len[4]s %$len[5]s %s\n";
+ printf($format, @$_) foreach @list;
+ };
+ warn $@ if $@;
+
+ if ($mounted) {
+ PVE::LXC::umount_all($vmid, $storecfg, $conf, 0);
+ PVE::LXC::Config->remove_lock($vmid, 'mounted');
+ }
+ });
+ return undef;
+ }});
+
# File creation with specified ownership and permissions.
# User and group can be names or decimal numbers.
# Permissions are explicit (not affected by umask) and can be numeric with the
if ($user =~ /^\d+$/) {
$uid = int($user);
} else {
- $uid = getpwnam($user) or die "failed to get uid for: $user\n"
+ $uid = getpwnam($user);
+ die "failed to get uid for: $user\n" if !defined($uid);
}
}
if (defined($group)) {
if ($group =~ /^\d+$/) {
$gid = int($group);
} else {
- $gid = getgrnam($group) or die "failed to get gid for: $group\n"
+ $gid = getgrnam($group);
+ die "failed to get gid for: $group\n" if !defined($gid);
}
}
return $fd;
}
+__PACKAGE__->register_method ({
+ name => 'rescan',
+ path => 'rescan',
+ method => 'POST',
+ description => "Rescan all storages and update disk sizes and unused disk images.",
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ vmid => get_standard_option('pve-vmid', {
+ optional => 1,
+ completion => \&PVE::LXC::complete_ctid,
+ }),
+ dryrun => {
+ type => 'boolean',
+ optional => 1,
+ default => 0,
+ description => 'Do not actually write changes out to conifg.',
+ },
+ },
+ },
+ returns => { type => 'null'},
+ code => sub {
+ my ($param) = @_;
+
+ my $dryrun = $param->{dryrun};
+
+ print "NOTE: running in dry-run mode, won't write changes out!\n" if $dryrun;
+
+ PVE::LXC::rescan($param->{vmid}, 0, $dryrun);
+
+ return undef;
+ }});
+
__PACKAGE__->register_method({
name => 'pull',
path => 'pull',
},
perms => {
type => 'string',
- description => 'File permissions to use.',
+ description => "File permissions to use (octal by default, prefix with '0x' for hexadecimal).",
optional => 1,
},
},
my $dest = extract_param($param, 'destination');
my $perms = extract_param($param, 'perms');
+ # assume octal as default
+ $perms = "0$perms" if defined($perms) && $perms !~m/^0/;
my $user = extract_param($param, 'user');
my $group = extract_param($param, 'group');
},
perms => {
type => 'string',
- description => 'File permissions to use.',
+ description => "File permissions to use (octal by default, prefix with '0x' for hexadecimal).",
optional => 1,
},
},
my $dest = extract_param($param, 'destination');
my $perms = extract_param($param, 'perms');
+ # assume octal as default
+ $perms = "0$perms" if defined($perms) && $perms !~m/^0/;
my $user = extract_param($param, 'user');
my $group = extract_param($param, 'group');
my $code = sub {
my $running = PVE::LXC::check_running($vmid);
- die "can only push files to a running VM" if !$running;
+ die "can only push files to a running CT\n" if !$running;
my $conf = PVE::LXC::Config->load_config($vmid);
my $unprivileged = $conf->{unprivileged};
return PVE::LXC::Config->lock_config($vmid, $code);
}});
-our $cmddef = {
- list=> [ 'PVE::API2::LXC', 'vmlist', [], { node => $nodename }, sub {
- my $res = shift;
- return if !scalar(@$res);
- my $format = "%-10s %-10s %-12s %-20s\n";
- printf($format, 'VMID', 'Status', 'Lock', 'Name');
- foreach my $d (sort {$a->{vmid} <=> $b->{vmid} } @$res) {
- printf($format, $d->{vmid}, $d->{status}, $d->{lock}, $d->{name});
- }
- }],
- config => [ "PVE::API2::LXC::Config", 'vm_config', ['vmid'],
- { node => $nodename }, sub {
- my $config = shift;
- foreach my $k (sort (keys %$config)) {
- next if $k eq 'digest';
- my $v = $config->{$k};
- if ($k eq 'description') {
- $v = PVE::Tools::encode_text($v);
- }
- print "$k: $v\n";
- }
- }],
- set => [ 'PVE::API2::LXC::Config', 'update_vm', ['vmid'], { node => $nodename }],
+__PACKAGE__->register_method ({
+ name => 'cpusets',
+ path => 'cpusets',
+ method => 'GET',
+ description => "Print the list of assigned CPU sets.",
+ parameters => {
+ additionalProperties => 0,
+ properties => {},
+ },
+ returns => { type => 'null'},
+ code => sub {
+ my ($param) = @_;
- resize => [ "PVE::API2::LXC", 'resize_vm', ['vmid', 'disk', 'size'], { node => $nodename } ],
-
- create => [ 'PVE::API2::LXC', 'create_vm', ['vmid', 'ostemplate'], { node => $nodename }, $upid_exit ],
- restore => [ 'PVE::API2::LXC', 'create_vm', ['vmid', 'ostemplate'], { node => $nodename, restore => 1 }, $upid_exit ],
+ my $ctlist = PVE::LXC::config_list();
- start => [ 'PVE::API2::LXC::Status', 'vm_start', ['vmid'], { node => $nodename }, $upid_exit],
- suspend => [ 'PVE::API2::LXC::Status', 'vm_suspend', ['vmid'], { node => $nodename }, $upid_exit],
- resume => [ 'PVE::API2::LXC::Status', 'vm_resume', ['vmid'], { node => $nodename }, $upid_exit],
- shutdown => [ 'PVE::API2::LXC::Status', 'vm_shutdown', ['vmid'], { node => $nodename }, $upid_exit],
- stop => [ 'PVE::API2::LXC::Status', 'vm_stop', ['vmid'], { node => $nodename }, $upid_exit],
-
- clone => [ "PVE::API2::LXC", 'clone_vm', ['vmid', 'newid'], { node => $nodename }, $upid_exit ],
- migrate => [ "PVE::API2::LXC", 'migrate_vm', ['vmid', 'target'], { node => $nodename }, $upid_exit],
-
- console => [ __PACKAGE__, 'console', ['vmid']],
- enter => [ __PACKAGE__, 'enter', ['vmid']],
- unlock => [ __PACKAGE__, 'unlock', ['vmid']],
- exec => [ __PACKAGE__, 'exec', ['vmid', 'extra-args']],
- fsck => [ __PACKAGE__, 'fsck', ['vmid']],
+ my $len = 0;
+ my $id_len = 0;
+ my $res = {};
- mount => [ __PACKAGE__, 'mount', ['vmid']],
- unmount => [ __PACKAGE__, 'unmount', ['vmid']],
- push => [ __PACKAGE__, 'push', ['vmid', 'file', 'destination']],
- pull => [ __PACKAGE__, 'pull', ['vmid', 'path', 'destination']],
-
- destroy => [ 'PVE::API2::LXC', 'destroy_vm', ['vmid'],
- { node => $nodename }, $upid_exit ],
+ foreach my $vmid (sort keys %$ctlist) {
+ my $cgroup = PVE::LXC::CGroup->new($vmid);
- snapshot => [ "PVE::API2::LXC::Snapshot", 'snapshot', ['vmid', 'snapname'],
- { node => $nodename } , $upid_exit ],
+ my ($cpuset, $path);
+ if (defined($path = $cgroup->get_path('cpuset', 1))) {
+ $cpuset = eval { PVE::CpuSet->new_from_path($path, 1); };
+ } elsif (defined($path = $cgroup->get_path(undef, 1))) {
+ $cpuset = eval { PVE::CpuSet->new_from_path($path, 1); };
+ } else {
+ # Container not running.
+ next;
+ }
+ if (my $err = $@) {
+ warn $err;
+ next;
+ }
- delsnapshot => [ "PVE::API2::LXC::Snapshot", 'delsnapshot', ['vmid', 'snapname'], { node => $nodename } , $upid_exit ],
+ my @cpuset_members = $cpuset->members();
- listsnapshot => [ "PVE::API2::LXC::Snapshot", 'list', ['vmid'], { node => $nodename },
- sub {
- my $res = shift;
- foreach my $e (@$res) {
- my $headline = $e->{description} || 'no-description';
- $headline =~ s/\n.*//sg;
- my $parent = $e->{parent} // 'no-parent';
- printf("%-20s %-20s %s\n", $e->{name}, $parent, $headline);
- }
- }],
+ my $line = ': ';
- rollback => [ "PVE::API2::LXC::Snapshot", 'rollback', ['vmid', 'snapname'], { node => $nodename } , $upid_exit ],
+ my $last = $cpuset_members[-1];
- template => [ "PVE::API2::LXC", 'template', ['vmid'], { node => $nodename }],
-};
+ for (my $id = 0; $id <= $last; $id++) {
+ my $empty = ' ' x length("$id");
+ $line .= ' ' . ($cpuset->has($id) ? $id : $empty);
+ }
+ $len = length($line) if length($line) > $len;
+ $id_len = length($vmid) if length($vmid) > $id_len;
+ $res->{$vmid} = $line;
+ }
-1;
+ my @vmlist = sort keys %$res;
+
+ if (scalar(@vmlist)) {
+ my $header = '-' x ($len + $id_len) . "\n";
+
+ print $header;
+ foreach my $vmid (@vmlist) {
+ print sprintf("%${id_len}i%s\n", $vmid, $res->{$vmid});
+ }
+ print $header;
-__END__
+ } else {
+ print "no running containers\n";
+ }
-=head1 NAME
+ return undef;
+ }});
-pct - Tool to manage Linux Containers (LXC) on Proxmox VE
+__PACKAGE__->register_method ({
+ name => 'fstrim',
+ path => 'fstrim',
+ method => 'POST',
+ description => "Run fstrim on a chosen CT and its mountpoints.",
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid }),
+ 'ignore-mountpoints' => {
+ description => 'Skip all mountpoints, only do fstrim on the container root.',
+ optional => 1,
+ type => 'boolean',
+ },
+ },
+ },
+ returns => { type => 'null' },
+ code => sub {
-=head1 SYNOPSIS
+ my ($param) = @_;
+ my $vmid = $param->{'vmid'};
-=include synopsis
+ my $rootdir = "/var/lib/lxc/$vmid/rootfs";
-=head1 DESCRIPTION
+ my $storecfg = PVE::Storage::config();
+ my $conf = PVE::LXC::Config->set_lock($vmid, 'fstrim');
+ eval {
+ my $path = "";
+ PVE::LXC::mount_all($vmid, $storecfg, $conf);
+ PVE::LXC::Config->foreach_volume($conf, sub {
+ my ($name, $mp) = @_;
+ $path = $mp->{mp};
+ return if $param->{'ignore-mountpoints'} && $name =~ /^mp\d+/;
+ my $cmd = ["fstrim", "-v", "$rootdir$path"];
+ PVE::Tools::run_command($cmd, noerr => 1);
+ });
+ };
+ warn $@ if $@;
+
+ PVE::LXC::umount_all($vmid, $storecfg, $conf, 0);
+ PVE::LXC::Config->remove_lock($vmid, 'fstrim');
+
+ return undef;
+ }});
+
+
+__PACKAGE__->register_method({
+ name => 'remote_migrate_vm',
+ path => 'remote_migrate_vm',
+ method => 'POST',
+ description => "Migrate container to a remote cluster. Creates a new migration task. EXPERIMENTAL feature!",
+ permissions => {
+ check => ['perm', '/vms/{vmid}', [ 'VM.Migrate' ]],
+ },
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ node => get_standard_option('pve-node'),
+ vmid => get_standard_option('pve-vmid', { completion => \&PVE::QemuServer::complete_vmid }),
+ 'target-vmid' => get_standard_option('pve-vmid', { optional => 1 }),
+ 'target-endpoint' => get_standard_option('proxmox-remote', {
+ description => "Remote target endpoint",
+ }),
+ online => {
+ type => 'boolean',
+ description => "Use online/live migration.",
+ optional => 1,
+ },
+ restart => {
+ type => 'boolean',
+ description => "Use restart migration",
+ optional => 1,
+ },
+ timeout => {
+ type => 'integer',
+ description => "Timeout in seconds for shutdown for restart migration",
+ optional => 1,
+ default => 180,
+ },
+ delete => {
+ type => 'boolean',
+ description => "Delete the original CT and related data after successful migration. By default the original CT is kept on the source cluster in a stopped state.",
+ optional => 1,
+ default => 0,
+ },
+ 'target-storage' => get_standard_option('pve-targetstorage', {
+ completion => \&PVE::QemuServer::complete_migration_storage,
+ optional => 0,
+ }),
+ 'target-bridge' => {
+ type => 'string',
+ description => "Mapping from source to target bridges. Providing only a single bridge ID maps all source bridges to that bridge. Providing the special value '1' will map each source bridge to itself.",
+ format => 'bridge-pair-list',
+ },
+ bwlimit => {
+ description => "Override I/O bandwidth limit (in KiB/s).",
+ optional => 1,
+ type => 'integer',
+ minimum => '0',
+ default => 'migrate limit from datacenter or storage config',
+ },
+ },
+ },
+ returns => {
+ type => 'string',
+ description => "the task ID.",
+ },
+ code => sub {
+ my ($param) = @_;
-pct is a tool to manages Linux Containers (LXC). You can create
-and destroy containers, and control execution
-(start/stop/suspend/resume). Besides that, you can use pct to set
-parameters in the associated config file, like network configuration or
-memory.
+ my $rpcenv = PVE::RPCEnvironment::get();
+ my $authuser = $rpcenv->get_user();
-=head1 EXAMPLES
+ my $source_vmid = $param->{vmid};
+ my $target_endpoint = $param->{'target-endpoint'};
+ my $target_vmid = $param->{'target-vmid'} // $source_vmid;
-Create a container based on a Debian template
-(provided you downloaded the template via the webgui before)
+ my $remote = PVE::JSONSchema::parse_property_string('proxmox-remote', $target_endpoint);
-pct create 100 /var/lib/vz/template/cache/debian-8.0-standard_8.0-1_amd64.tar.gz
+ # TODO: move this as helper somewhere appropriate?
+ my $conn_args = {
+ protocol => 'https',
+ host => $remote->{host},
+ port => $remote->{port} // 8006,
+ apitoken => $remote->{apitoken},
+ };
-Start a container
+ $conn_args->{cached_fingerprints} = { uc($remote->{fingerprint}) => 1 }
+ if defined($remote->{fingerprint});
-pct start 100
+ my $api_client = PVE::APIClient::LWP->new(%$conn_args);
+ my $resources = $api_client->get("/cluster/resources", { type => 'vm' });
+ if (grep { defined($_->{vmid}) && $_->{vmid} eq $target_vmid } @$resources) {
+ raise_param_exc({ target_vmid => "Guest with ID '$target_vmid' already exists on remote cluster" });
+ }
-Start a login session via getty
+ my $storages = $api_client->get("/nodes/localhost/storage", { enabled => 1 });
-pct console 100
+ my $storecfg = PVE::Storage::config();
+ my $target_storage = $param->{'target-storage'};
+ my $storagemap = eval { PVE::JSONSchema::parse_idmap($target_storage, 'pve-storage-id') };
+ raise_param_exc({ 'target-storage' => "failed to parse storage map: $@" })
+ if $@;
+
+ my $check_remote_storage = sub {
+ my ($storage) = @_;
+ my $found = [ grep { $_->{storage} eq $storage } @$storages ];
+ die "remote: storage '$storage' does not exist!\n"
+ if !@$found;
+
+ $found = @$found[0];
+
+ my $content_types = [ PVE::Tools::split_list($found->{content}) ];
+ die "remote: storage '$storage' cannot store CT rootdir\n"
+ if !grep { $_ eq 'rootdir' } @$content_types;
+ };
-Enter the lxc namespace and run a shell as root user
+ foreach my $target_sid (values %{$storagemap->{entries}}) {
+ $check_remote_storage->($target_sid);
+ }
-pct enter 100
+ $check_remote_storage->($storagemap->{default})
+ if $storagemap->{default};
-Display the configuration
+ return PVE::API2::LXC->remote_migrate_vm($param);
+ }});
-pct config 100
+our $cmddef = {
+ list=> [ 'PVE::API2::LXC', 'vmlist', [], { node => $nodename }, sub {
+ my $res = shift;
+ return if !scalar(@$res);
+ my $format = "%-10s %-10s %-12s %-20s\n";
+ printf($format, 'VMID', 'Status', 'Lock', 'Name');
+ foreach my $d (sort {$a->{vmid} <=> $b->{vmid} } @$res) {
+ my $lock = $d->{lock} || '';
+ printf($format, $d->{vmid}, $d->{status}, $lock, $d->{name});
+ }
+ }],
+ config => [ "PVE::API2::LXC::Config", 'vm_config', ['vmid'], { node => $nodename }, sub {
+ my $config = shift;
+ for my $k (sort (keys %$config)) {
+ next if $k eq 'digest' || $k eq 'lxc';
+ my $v = $config->{$k};
+ if ($k eq 'description') {
+ $v = PVE::Tools::encode_text($v);
+ }
+ print "$k: $v\n";
+ }
+ if (defined(my $lxc_list = $config->{'lxc'})) {
+ for my $lxc_opt (@$lxc_list) {
+ print "$lxc_opt->[0]: $lxc_opt->[1]\n"
+ }
+ }
+ }],
-Add a network interface called eth0, bridged to the host bridge vmbr0,
-set the address and gateway, while it's running
+ pending => [ "PVE::API2::LXC", "vm_pending", ['vmid'], { node => $nodename }, \&PVE::GuestHelpers::format_pending ],
+ set => [ 'PVE::API2::LXC::Config', 'update_vm', ['vmid'], { node => $nodename }],
-pct set 100 -net0 name=eth0,bridge=vmbr0,ip=192.168.15.147/24,gw=192.168.15.1
+ resize => [ "PVE::API2::LXC", 'resize_vm', ['vmid', 'disk', 'size'], { node => $nodename } ],
-Reduce the memory of the container to 512MB
+ create => [ 'PVE::API2::LXC', 'create_vm', ['vmid', 'ostemplate'], { node => $nodename }, $upid_exit ],
+ restore => [ 'PVE::API2::LXC', 'create_vm', ['vmid', 'ostemplate'], { node => $nodename, restore => 1 }, $upid_exit ],
+ destroy => [ 'PVE::API2::LXC', 'destroy_vm', ['vmid'], { node => $nodename }, $upid_exit ],
-pct set -memory 512 100
+ start => [ 'PVE::API2::LXC::Status', 'vm_start', ['vmid'], { node => $nodename }, $upid_exit],
+ suspend => [ 'PVE::API2::LXC::Status', 'vm_suspend', ['vmid'], { node => $nodename }, $upid_exit],
+ resume => [ 'PVE::API2::LXC::Status', 'vm_resume', ['vmid'], { node => $nodename }, $upid_exit],
+ shutdown => [ 'PVE::API2::LXC::Status', 'vm_shutdown', ['vmid'], { node => $nodename }, $upid_exit],
+ stop => [ 'PVE::API2::LXC::Status', 'vm_stop', ['vmid'], { node => $nodename }, $upid_exit],
+ reboot => [ 'PVE::API2::LXC::Status', 'vm_reboot', ['vmid'], { node => $nodename }, $upid_exit],
-=head1 FILES
+ clone => [ "PVE::API2::LXC", 'clone_vm', ['vmid', 'newid'], { node => $nodename }, $upid_exit ],
+ migrate => [ "PVE::API2::LXC", 'migrate_vm', ['vmid', 'target'], { node => $nodename }, $upid_exit],
+ 'move-volume' => [ "PVE::API2::LXC", 'move_volume', ['vmid', 'volume', 'storage', 'target-vmid', 'target-volume'], { node => $nodename }, $upid_exit ],
+ move_volume => { alias => 'move-volume' },
+ 'remote-migrate' => [ __PACKAGE__, 'remote_migrate_vm', ['vmid', 'target-vmid', 'target-endpoint'], { node => $nodename }, $upid_exit ],
-/etc/pve/lxc/<vmid>.conf
+ snapshot => [ "PVE::API2::LXC::Snapshot", 'snapshot', ['vmid', 'snapname'], { node => $nodename } , $upid_exit ],
+ delsnapshot => [ "PVE::API2::LXC::Snapshot", 'delsnapshot', ['vmid', 'snapname'], { node => $nodename } , $upid_exit ],
+ listsnapshot => [ "PVE::API2::LXC::Snapshot", 'list', ['vmid'], { node => $nodename }, \&PVE::GuestHelpers::print_snapshot_tree ],
+ rollback => [ "PVE::API2::LXC::Snapshot", 'rollback', ['vmid', 'snapname'], { node => $nodename } , $upid_exit ],
+ template => [ "PVE::API2::LXC", 'template', ['vmid'], { node => $nodename }],
-Configuration file for the container <vmid>
+ status => [ __PACKAGE__, 'status', ['vmid']],
+ console => [ __PACKAGE__, 'console', ['vmid']],
+ enter => [ __PACKAGE__, 'enter', ['vmid']],
+ unlock => [ __PACKAGE__, 'unlock', ['vmid']],
+ exec => [ __PACKAGE__, 'exec', ['vmid', 'extra-args']],
+ fsck => [ __PACKAGE__, 'fsck', ['vmid']],
-=head1 SEE ALSO
+ mount => [ __PACKAGE__, 'mount', ['vmid']],
+ unmount => [ __PACKAGE__, 'unmount', ['vmid']],
+ push => [ __PACKAGE__, 'push', ['vmid', 'file', 'destination']],
+ pull => [ __PACKAGE__, 'pull', ['vmid', 'path', 'destination']],
-L<B<qm(1)>>, L<B<pvesh(1)>>
+ df => [ __PACKAGE__, 'df', ['vmid']],
+ rescan => [ __PACKAGE__, 'rescan', []],
+ cpusets => [ __PACKAGE__, 'cpusets', []],
+ fstrim => [ __PACKAGE__, 'fstrim', ['vmid']],
+};
-=include pve_copyright
+1;