use strict;
use warnings;
-use POSIX;
+
use File::Path;
+use IO::Dir;
+use POSIX;
-use PVE::SafeSyslog;
-use PVE::Tools;
-use PVE::Cluster;
-use PVE::INotify;
-use PVE::RPCEnvironment;
-use PVE::JSONSchema qw(get_standard_option);
-use PVE::CLIHandler;
-use PVE::Storage;
-use PVE::Storage::Plugin;
+use PVE::GuestHelpers;
+use PVE::LXC::Config;
+use PVE::LXC::Tools;
use PVE::LXC;
-use PVE::LXCSetup;
-use Data::Dumper;
-
-use base qw(PVE::CLIHandler);
-
-$ENV{'PATH'} = '/sbin:/bin:/usr/sbin:/usr/bin';
-
-initlog ('lxc-pve-poststop-hook');
-
-die "please run as root\n" if $> != 0;
-
-PVE::INotify::inotify_init();
-
-my $rpcenv = PVE::RPCEnvironment->init('cli');
-$rpcenv->set_language($ENV{LANG});
-$rpcenv->set_user('root@pam');
-
-# we cannot use cfs_read here (permission problem)
-#$rpcenv->init_request();
-
-my $nodename = PVE::INotify::nodename();
-
-__PACKAGE__->register_method ({
- name => 'lxc-pve-poststop-hook',
- path => 'lxc-pve-poststop-hook',
- method => 'GET',
- description => "vm_stop_cleanup.",
- parameters => {
- additionalProperties => 0,
- properties => {
- name => {
- description => "The container name. This hook is only active for containers using numeric IDs, where configuration is stored on /etc/pve/lxc/<name>/config (else it is just a NOP).",
- type => 'string',
- pattern => '\S+',
- maxLength => 64,
- }
- },
- },
- returns => { type => 'null' },
-
- code => sub {
- my ($param) = @_;
-
-
- return undef if $param->{name} !~ m/^\d+$/;
-
- # Note: PVE::INotify::nodename() returns wrong value when run
- # inside container mount hook, so we cannot simply
- # use PVE::LXC::load_conf().
-
- my $config_filename = "/etc/pve/lxc/$param->{name}.conf";
-
- return undef if ! -f $config_filename;
-
- my $raw = PVE::Tools::file_get_contents($config_filename);
- my $conf = PVE::LXC::parse_pct_config($config_filename, $raw);
-
- my $storagecfg_filename = "/etc/pve/storage.cfg";
-
- return undef if ! -f $storagecfg_filename;
-
- my $storage_raw = PVE::Tools::file_get_contents($storagecfg_filename);
- my $storage_cfg = PVE::Storage::Plugin->parse_config($storagecfg_filename, $storage_raw);
-
- PVE::LXC::vm_stop_cleanup($storage_cfg, $param->{name}, $conf);
-
- return undef;
- }});
-
-
-push @ARGV, 'help' if !scalar(@ARGV);
-
-my $param = {};
-
-if ((scalar(@ARGV) == 1) && ($ARGV[0] eq 'printmanpod') ||
- ($ARGV[0] eq 'verifyapi')) {
- # OK
-} elsif ((scalar(@ARGV) == 3) && ($ARGV[1] eq 'lxc') && ($ARGV[2] eq 'post-stop')) {
- $param->{name} = $ENV{'LXC_NAME'};
- die "got wrong name" if $param->{name} ne $ARGV[0];
-
- @ARGV = ();
-} else {
- @ARGV = ('help');
-}
-
-my $cmddef = [ __PACKAGE__, 'lxc-pve-poststop-hook', [], $param];
-
-PVE::CLIHandler::handle_simple_cmd($cmddef, \@ARGV, undef, $0);
-
-exit 0;
-
-__END__
-
-=head1 NAME
-
-lxc-pve - LXC post stop hook for Proxmox VE
-
-=head1 SYNOPSIS
-
-=include synopsis
-
-=head1 DESCRIPTION
-
-This post stop hook detach loop devices and deactivate volumes for pve container.
-
-=head1 SEE ALSO
-
-lct(1)
+use PVE::Network;
+use PVE::RESTEnvironment;
+use PVE::Storage;
+use PVE::Tools;
-=include pve_copyright
+PVE::LXC::Tools::lxc_hook('post-stop', 'lxc', sub {
+ my ($vmid, $vars, undef, undef) = @_;
+
+ return undef if ! -f PVE::LXC::Config->config_file($vmid);
+
+ PVE::RESTEnvironment->setup_default_cli_env();
+
+ my $conf = PVE::LXC::Config->load_config($vmid);
+
+ my $storage_cfg = PVE::Storage::config();
+
+ PVE::Tools::run_command(['umount', '--recursive', '--', $vars->{ROOTFS_PATH}]);
+ my $staging_dir = PVE::LXC::get_staging_tempfs();
+ if (my $dh = IO::Dir->new($staging_dir)) {
+ while (defined(my $dir = $dh->read)) {
+ next if $dir eq '.' || $dir eq '..';
+ eval {
+ PVE::Tools::run_command(['umount', '--', "$staging_dir/$dir"]);
+ };
+ warn $@ if $@;
+ }
+ }
+
+ PVE::LXC::vm_stop_cleanup($storage_cfg, $vmid, $conf);
+
+ # Because netlink is not a reliable protocol it can happen that lxc's
+ # link-deletion messages get lost (or end up being too early?)
+ for my $k (keys %$conf) {
+ next if $k !~ /^net(\d+)/;
+ my $ind = $1;
+ my $net = PVE::LXC::Config->parse_lxc_network($conf->{$k});
+ next if $net->{type} ne 'veth';
+ # veth_delete tests with '-d /sys/class/net/$name' before running the command
+ PVE::Network::veth_delete("veth${vmid}i$ind");
+ }
+
+ my $config_updated = 0;
+ if ($conf->{pending}) {
+ eval {
+ PVE::LXC::Config->vmconfig_apply_pending($vmid, $conf, $storage_cfg);
+ PVE::LXC::Config->write_config($vmid, $conf);
+ };
+ warn "$@" if $@;
+ PVE::LXC::update_lxc_config($vmid, $conf);
+ $config_updated = 1;
+ }
+
+
+ my $target = $vars->{TARGET};
+ if ($target && $target eq 'reboot') {
+ # In order to make sure hot-plugged config changes aren't reverted
+ # to what the monitor initially loaded we need to stop the container
+ # and restart it.
+ # Update the config and queue a restart of the pve-container@$vmid
+ # task, note that we must not block because we're part of the
+ # service cgroup systemd waits for to die before issuing the new
+ # lxc-start command.
+ PVE::LXC::update_lxc_config($vmid, $conf) if !$config_updated;
+ # Tell the post-stop hook we want to be restarted.
+ open(my $fh, '>', "/var/lib/lxc/$vmid/reboot")
+ or die "failed to create reboot trigger file: $!\n";
+ close($fh);
+
+ # activate all volumes of the container in case pending changes added
+ # a not yet activated volume
+ my $vollist = PVE::LXC::Config->get_vm_volumes($conf);
+ PVE::Storage::activate_volumes($storage_cfg, $vollist);
+
+ # cause lxc to stop instead of rebooting
+ exit(1);
+ }
+
+ PVE::GuestHelpers::exec_hookscript($conf, $vmid, 'post-stop');
+});