]>
git.proxmox.com Git - pve-cluster.git/blob - data/PVE/CLI/pvecm.pm
1 package PVE
::CLI
::pvecm
;
8 use PVE
::Tools
qw(run_command);
11 use PVE
::JSONSchema
qw(get_standard_option);
12 use PVE
::RPCEnvironment
;
15 use PVE
::API2
::ClusterConfig
;
18 use base
qw(PVE::CLIHandler);
20 $ENV{HOME
} = '/root'; # for ssh-copy-id
22 my $basedir = "/etc/pve";
23 my $clusterconf = "$basedir/corosync.conf";
24 my $libdir = "/var/lib/pve-cluster";
25 my $authfile = "/etc/corosync/authkey";
28 sub setup_environment
{
29 PVE
::RPCEnvironment-
>setup_default_cli_env();
32 __PACKAGE__-
>register_method ({
36 description
=> "Generate new cryptographic key for corosync.",
38 additionalProperties
=> 0,
42 description
=> "Output file name"
46 returns
=> { type
=> 'null' },
51 my $filename = $param->{filename
};
54 $> == 0 || die "Error: Authorization key must be generated as root user.\n";
55 my $dirname = dirname
($filename);
57 die "key file '$filename' already exists\n" if -e
$filename;
59 File
::Path
::make_path
($dirname) if $dirname;
61 run_command
(['corosync-keygen', '-l', '-k', $filename]);
66 __PACKAGE__-
>register_method ({
70 description
=> "Adds the current node to an existing cluster.",
72 additionalProperties
=> 0,
76 description
=> "Hostname (or IP) of an existing cluster member."
78 nodeid
=> get_standard_option
('corosync-nodeid'),
81 description
=> "Number of votes for this node",
87 description
=> "Do not throw error if node already exists.",
90 ring0_addr
=> get_standard_option
('corosync-ring0-addr'),
91 ring1_addr
=> get_standard_option
('corosync-ring1-addr'),
92 fingerprint
=> get_standard_option
('fingerprint-sha256', {
97 description
=> "Always use SSH to join, even if peer may do it over API.",
102 returns
=> { type
=> 'null' },
107 my $nodename = PVE
::INotify
::nodename
();
109 my $host = $param->{hostname
};
110 my $local_ip_address = remote_node_ip
($nodename);
112 PVE
::Cluster
::assert_joinable
($param->{ring0_addr
}, $param->{ring1_addr
}, $param->{force
});
116 if (!$param->{use_ssh
}) {
117 print "Please enter superuser (root) password for '$host':\n";
118 my $password = PVE
::PTY
::read_password
("Password for root\@$host: ");
120 delete $param->{use_ssh
};
121 $param->{password
} = $password;
123 my $local_cluster_lock = "/var/lock/pvecm.lock";
124 PVE
::Tools
::lock_file
($local_cluster_lock, 10, \
&PVE
::Cluster
::join, $param);
127 if (ref($err) eq 'PVE::APIClient::Exception' && defined($err->{code
}) && $err->{code
} == 501) {
128 $err = "Remote side is not able to use API for Cluster join!\n" .
129 "Pass the 'use_ssh' switch or update the remote side.\n";
133 return; # all OK, the API join endpoint successfully set us up
136 # allow fallback to old ssh only join if wished or needed
138 PVE
::Cluster
::setup_sshd_config
();
139 PVE
::Cluster
::setup_rootsshconfig
();
140 PVE
::Cluster
::setup_ssh_keys
();
142 # make sure known_hosts is on local filesystem
143 PVE
::Cluster
::ssh_unmerge_known_hosts
();
145 my $cmd = ['ssh-copy-id', '-i', '/root/.ssh/id_rsa', "root\@$host"];
146 run_command
($cmd, 'outfunc' => sub {}, 'errfunc' => sub {},
147 'errmsg' => "unable to copy ssh ID");
149 $cmd = ['ssh', $host, '-o', 'BatchMode=yes',
150 'pvecm', 'addnode', $nodename, '--force', 1];
152 push @$cmd, '--nodeid', $param->{nodeid
} if $param->{nodeid
};
153 push @$cmd, '--votes', $param->{votes
} if defined($param->{votes
});
154 push @$cmd, '--ring0_addr', $param->{ring0_addr
} // $local_ip_address;
155 push @$cmd, '--ring1_addr', $param->{ring1_addr
} if defined($param->{ring1_addr
});
157 if (system (@$cmd) != 0) {
158 my $cmdtxt = join (' ', @$cmd);
159 die "unable to add node: command failed ($cmdtxt)\n";
162 my $tmpdir = "$libdir/.pvecm_add.tmp.$$";
166 print "copy corosync auth key\n";
167 $cmd = ['rsync', '--rsh=ssh -l root -o BatchMode=yes', '-lpgoq',
168 "[$host]:$authfile $clusterconf", $tmpdir];
170 system(@$cmd) == 0 || die "can't rsync data from host '$host'\n";
172 my $corosync_conf = PVE
::Tools
::file_get_contents
("$tmpdir/corosync.conf");
173 my $corosync_authkey = PVE
::Tools
::file_get_contents
("$tmpdir/authkey");
175 PVE
::Cluster
::finish_join
($host, $corosync_conf, $corosync_authkey);
184 # use a synced worker so we get a nice task log when joining through CLI
185 my $rpcenv = PVE
::RPCEnvironment
::get
();
186 my $authuser = $rpcenv->get_user();
188 $rpcenv->fork_worker('clusterjoin', '', $authuser, $worker);
193 __PACKAGE__-
>register_method ({
197 description
=> "Displays the local view of the cluster status.",
199 additionalProperties
=> 0,
202 returns
=> { type
=> 'null' },
207 PVE
::Corosync
::check_conf_exists
();
209 my $cmd = ['corosync-quorumtool', '-siH'];
213 exit (-1); # should not be reached
216 __PACKAGE__-
>register_method ({
220 description
=> "Displays the local view of the cluster nodes.",
222 additionalProperties
=> 0,
225 returns
=> { type
=> 'null' },
230 PVE
::Corosync
::check_conf_exists
();
232 my $cmd = ['corosync-quorumtool', '-l'];
236 exit (-1); # should not be reached
239 __PACKAGE__-
>register_method ({
243 description
=> "Tells corosync a new value of expected votes.",
245 additionalProperties
=> 0,
249 description
=> "Expected votes",
254 returns
=> { type
=> 'null' },
259 PVE
::Corosync
::check_conf_exists
();
261 my $cmd = ['corosync-quorumtool', '-e', $param->{expected
}];
265 exit (-1); # should not be reached
269 __PACKAGE__-
>register_method ({
270 name
=> 'updatecerts',
271 path
=> 'updatecerts',
273 description
=> "Update node certificates (and generate all needed files/directories).",
275 additionalProperties
=> 0,
278 description
=> "Force generation of new SSL certifate.",
283 description
=> "Ignore errors (i.e. when cluster has no quorum).",
289 returns
=> { type
=> 'null' },
293 PVE
::Cluster
::updatecerts_and_ssh
($param->@{qw(force silent)});
298 __PACKAGE__-
>register_method ({
302 description
=> "Used by VM/CT migration - do not use manually.",
304 additionalProperties
=> 0,
306 get_migration_ip
=> {
309 description
=> 'return the migration IP, if configured',
312 migration_network
=> {
315 description
=> 'the migration network used to detect the local migration IP',
320 description
=> 'Run a command with a tcp socket as standard input.'
321 .' The IP address and port are printed via this'
322 ." command's stdandard output first, each on a separate line.",
325 'extra-args' => PVE
::JSONSchema
::get_standard_option
('extra-args'),
328 returns
=> { type
=> 'null'},
332 if (!PVE
::Cluster
::check_cfs_quorum
(1)) {
337 my $network = $param->{migration_network
};
338 if ($param->{get_migration_ip
}) {
339 die "cannot use --run-command with --get_migration_ip\n"
340 if $param->{'run-command'};
341 if (my $ip = PVE
::Cluster
::get_local_migration_ip
($network)) {
346 # do not keep tunnel open when asked for migration ip
350 if ($param->{'run-command'}) {
351 my $cmd = $param->{'extra-args'};
352 die "missing command\n"
353 if !$cmd || !scalar(@$cmd);
355 # Get an ip address to listen on, and find a free migration port
357 if (defined($network)) {
358 $ip = PVE
::Cluster
::get_local_migration_ip
($network)
359 or die "failed to get migration IP address to listen on\n";
360 $family = PVE
::Tools
::get_host_address_family
($ip);
362 my $nodename = PVE
::INotify
::nodename
();
363 ($ip, $family) = PVE
::Network
::get_ip_from_hostname
($nodename, 0);
365 my $port = PVE
::Tools
::next_migrate_port
($family, $ip);
367 PVE
::Tools
::pipe_socket_to_command
($cmd, $ip, $port);
371 print "tunnel online\n";
374 while (my $line = <STDIN
>) {
376 last if $line =~ m/^quit$/;
384 keygen
=> [ __PACKAGE__
, 'keygen', ['filename']],
385 create
=> [ 'PVE::API2::ClusterConfig', 'create', ['clustername']],
386 add
=> [ __PACKAGE__
, 'add', ['hostname']],
387 addnode
=> [ 'PVE::API2::ClusterConfig', 'addnode', ['node']],
388 delnode
=> [ 'PVE::API2::ClusterConfig', 'delnode', ['node']],
389 status
=> [ __PACKAGE__
, 'status' ],
390 nodes
=> [ __PACKAGE__
, 'nodes' ],
391 expected
=> [ __PACKAGE__
, 'expected', ['expected']],
392 updatecerts
=> [ __PACKAGE__
, 'updatecerts', []],
393 mtunnel
=> [ __PACKAGE__
, 'mtunnel', ['extra-args']],