PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/modules/nspawn.py |
""" Manage nspawn containers .. versionadded:: 2015.8.0 `systemd-nspawn(1)`__ is a tool used to manage lightweight namespace containers. This execution module provides several functions to help manage these containers. .. __: http://www.freedesktop.org/software/systemd/man/systemd-nspawn.html Minions running systemd >= 219 will place new containers in ``/var/lib/machines``, while those running systemd < 219 will place them in ``/var/lib/container``. .. note: ``nsenter(1)`` is required to run commands within containers. It should already be present on any systemd host, as part of the **util-linux** package. """ import errno import functools import logging import os import re import shutil import tempfile import time import salt.defaults.exitcodes import salt.utils.args import salt.utils.functools import salt.utils.path import salt.utils.systemd from salt.exceptions import CommandExecutionError, SaltInvocationError log = logging.getLogger(__name__) __func_alias__ = { "list_": "list", } __virtualname__ = "nspawn" SEED_MARKER = "/nspawn.initial_seed" WANT = "/etc/systemd/system/multi-user.target.wants/systemd-nspawn@{0}.service" EXEC_DRIVER = "nsenter" def __virtual__(): """ Only work on systems that have been booted with systemd """ if __grains__["kernel"] == "Linux" and salt.utils.systemd.booted(__context__): if salt.utils.systemd.version() is None: log.error("nspawn: Unable to determine systemd version") else: return __virtualname__ return ( False, "The nspawn execution module failed to load: " "only work on systems that have been booted with systemd.", ) def _sd_version(): """ Returns __context__.get('systemd.version', 0), avoiding duplication of the call to dict.get and making it easier to change how we handle this context var in the future """ return salt.utils.systemd.version(__context__) def _ensure_exists(wrapped): """ Decorator to ensure that the named container exists. """ @functools.wraps(wrapped) def check_exists(name, *args, **kwargs): if not exists(name): raise CommandExecutionError(f"Container '{name}' does not exist") return wrapped(name, *args, **salt.utils.args.clean_kwargs(**kwargs)) return check_exists def _root(name="", all_roots=False): """ Return the container root directory. Starting with systemd 219, new images go into /var/lib/machines. """ if _sd_version() >= 219: if all_roots: return [ os.path.join(x, name) for x in ("/var/lib/machines", "/var/lib/container") ] else: return os.path.join("/var/lib/machines", name) else: ret = os.path.join("/var/lib/container", name) if all_roots: return [ret] else: return ret def _make_container_root(name): """ Make the container root directory """ path = _root(name) if os.path.exists(path): __context__["retcode"] = salt.defaults.exitcodes.SALT_BUILD_FAIL raise CommandExecutionError(f"Container {name} already exists") else: try: os.makedirs(path) return path except OSError as exc: raise CommandExecutionError( f"Unable to make container root directory {name}: {exc}" ) def _build_failed(dst, name): try: __context__["retcode"] = salt.defaults.exitcodes.SALT_BUILD_FAIL shutil.rmtree(dst) except OSError as exc: if exc.errno != errno.ENOENT: raise CommandExecutionError(f"Unable to cleanup container root dir {dst}") raise CommandExecutionError(f"Container {name} failed to build") def _bootstrap_arch(name, **kwargs): """ Bootstrap an Arch Linux container """ if not salt.utils.path.which("pacstrap"): raise CommandExecutionError( "pacstrap not found, is the arch-install-scripts package installed?" ) dst = _make_container_root(name) cmd = f"pacstrap -c -d {dst} base" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: _build_failed(dst, name) return ret def _bootstrap_debian(name, **kwargs): """ Bootstrap a Debian Linux container """ version = kwargs.get("version", False) if not version: if __grains__["os"].lower() == "debian": version = __grains__["osrelease"] else: version = "stable" release_blacklist = [ "hamm", "slink", "potato", "woody", "sarge", "etch", "lenny", "squeeze", "wheezy", ] if version in release_blacklist: raise CommandExecutionError( 'Unsupported Debian version "{}". ' 'Only "stable" or "jessie" and newer are supported'.format(version) ) dst = _make_container_root(name) cmd = f"debootstrap --arch=amd64 {version} {dst}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: _build_failed(dst, name) return ret def _bootstrap_fedora(name, **kwargs): """ Bootstrap a Fedora container """ dst = _make_container_root(name) if not kwargs.get("version", False): if __grains__["os"].lower() == "fedora": version = __grains__["osrelease"] else: version = "21" else: version = "21" cmd = ( "yum -y --releasever={} --nogpg --installroot={} " '--disablerepo="*" --enablerepo=fedora install systemd passwd yum ' "fedora-release vim-minimal".format(version, dst) ) ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: _build_failed(dst, name) return ret def _bootstrap_ubuntu(name, **kwargs): """ Bootstrap a Ubuntu Linux container """ version = kwargs.get("version", False) if not version: if __grains__["os"].lower() == "ubuntu": version = __grains__["oscodename"] else: version = "xenial" dst = _make_container_root(name) cmd = f"debootstrap --arch=amd64 {version} {dst}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: _build_failed(dst, name) return ret def _clear_context(): """ Clear any lxc variables set in __context__ """ for var in [x for x in __context__ if x.startswith("nspawn.")]: log.trace("Clearing __context__['%s']", var) __context__.pop(var, None) def _ensure_running(name): """ Raise an exception if the container does not exist """ if state(name) != "running": return True else: return start(name) def _ensure_systemd(version): """ Raises an exception if the systemd version is not greater than the passed version. """ try: version = int(version) except ValueError: raise CommandExecutionError(f"Invalid version '{version}'") try: installed = _sd_version() log.debug("nspawn: detected systemd %s", installed) except (IndexError, ValueError): raise CommandExecutionError("nspawn: Unable to get systemd version") if installed < version: raise CommandExecutionError( "This function requires systemd >= {} (Detected version: {}).".format( version, installed ) ) def _machinectl(cmd, output_loglevel="debug", ignore_retcode=False, use_vt=False): """ Helper function to run machinectl """ prefix = "machinectl --no-legend --no-pager" return __salt__["cmd.run_all"]( f"{prefix} {cmd}", output_loglevel=output_loglevel, ignore_retcode=ignore_retcode, use_vt=use_vt, ) @_ensure_exists def _run( name, cmd, output=None, no_start=False, stdin=None, python_shell=True, preserve_state=False, output_loglevel="debug", ignore_retcode=False, use_vt=False, keep_env=None, ): """ Common logic for nspawn.run functions """ orig_state = state(name) exc = None try: ret = __salt__["container_resource.run"]( name, cmd, container_type=__virtualname__, exec_driver=EXEC_DRIVER, output=output, no_start=no_start, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, ignore_retcode=ignore_retcode, use_vt=use_vt, keep_env=keep_env, ) finally: # Make sure we stop the container if necessary, even if an exception # was raised. if preserve_state and orig_state == "stopped" and state(name) != "stopped": stop(name) if output in (None, "all"): return ret else: return ret[output] @_ensure_exists def pid(name): """ Returns the PID of a container name Container name CLI Example: .. code-block:: bash salt myminion nspawn.pid arch1 """ try: return int(info(name).get("PID")) except (TypeError, ValueError) as exc: raise CommandExecutionError(f"Unable to get PID for container '{name}': {exc}") def run( name, cmd, no_start=False, preserve_state=True, stdin=None, python_shell=True, output_loglevel="debug", use_vt=False, ignore_retcode=False, keep_env=None, ): """ Run :mod:`cmd.run <salt.modules.cmdmod.run>` within a container name Name of the container in which to run the command cmd Command to run no_start : False If the container is not running, don't start it preserve_state : True After running the command, return the container to its previous state stdin : None Standard input to be used for the command output_loglevel : debug Level at which to log the output from the command. Set to ``quiet`` to suppress logging. use_vt : False Use SaltStack's utils.vt to stream output to console. keep_env : None If not passed, only a sane default PATH environment variable will be set. If ``True``, all environment variables from the container's host will be kept. Otherwise, a comma-separated list (or Python list) of environment variable names can be passed, and those environment variables will be kept. CLI Example: .. code-block:: bash salt myminion nspawn.run mycontainer 'ip addr show' """ return _run( name, cmd, output=None, no_start=no_start, preserve_state=preserve_state, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, use_vt=use_vt, ignore_retcode=ignore_retcode, keep_env=keep_env, ) def run_stdout( name, cmd, no_start=False, preserve_state=True, stdin=None, python_shell=True, output_loglevel="debug", use_vt=False, ignore_retcode=False, keep_env=None, ): """ Run :mod:`cmd.run_stdout <salt.modules.cmdmod.run_stdout>` within a container name Name of the container in which to run the command cmd Command to run no_start : False If the container is not running, don't start it preserve_state : True After running the command, return the container to its previous state stdin : None Standard input to be used for the command output_loglevel : debug Level at which to log the output from the command. Set to ``quiet`` to suppress logging. use_vt : False Use SaltStack's utils.vt to stream output to console. Assumes ``output=all``. keep_env : None If not passed, only a sane default PATH environment variable will be set. If ``True``, all environment variables from the container's host will be kept. Otherwise, a comma-separated list (or Python list) of environment variable names can be passed, and those environment variables will be kept. CLI Example: .. code-block:: bash salt myminion nspawn.run_stdout mycontainer 'ip addr show' """ return _run( name, cmd, output="stdout", no_start=no_start, preserve_state=preserve_state, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, use_vt=use_vt, ignore_retcode=ignore_retcode, keep_env=keep_env, ) def run_stderr( name, cmd, no_start=False, preserve_state=True, stdin=None, python_shell=True, output_loglevel="debug", use_vt=False, ignore_retcode=False, keep_env=None, ): """ Run :mod:`cmd.run_stderr <salt.modules.cmdmod.run_stderr>` within a container name Name of the container in which to run the command cmd Command to run no_start : False If the container is not running, don't start it preserve_state : True After running the command, return the container to its previous state stdin : None Standard input to be used for the command output_loglevel : debug Level at which to log the output from the command. Set to ``quiet`` to suppress logging. use_vt : False Use SaltStack's utils.vt to stream output to console. Assumes ``output=all``. keep_env : None If not passed, only a sane default PATH environment variable will be set. If ``True``, all environment variables from the container's host will be kept. Otherwise, a comma-separated list (or Python list) of environment variable names can be passed, and those environment variables will be kept. CLI Example: .. code-block:: bash salt myminion nspawn.run_stderr mycontainer 'ip addr show' """ return _run( name, cmd, output="stderr", no_start=no_start, preserve_state=preserve_state, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, use_vt=use_vt, ignore_retcode=ignore_retcode, keep_env=keep_env, ) def retcode( name, cmd, no_start=False, preserve_state=True, stdin=None, python_shell=True, output_loglevel="debug", use_vt=False, ignore_retcode=False, keep_env=None, ): """ Run :mod:`cmd.retcode <salt.modules.cmdmod.retcode>` within a container name Name of the container in which to run the command cmd Command to run no_start : False If the container is not running, don't start it preserve_state : True After running the command, return the container to its previous state stdin : None Standard input to be used for the command output_loglevel : debug Level at which to log the output from the command. Set to ``quiet`` to suppress logging. use_vt : False Use SaltStack's utils.vt to stream output to console. Assumes ``output=all``. keep_env : None If not passed, only a sane default PATH environment variable will be set. If ``True``, all environment variables from the container's host will be kept. Otherwise, a comma-separated list (or Python list) of environment variable names can be passed, and those environment variables will be kept. CLI Example: .. code-block:: bash salt myminion nspawn.retcode mycontainer 'ip addr show' """ return _run( name, cmd, output="retcode", no_start=no_start, preserve_state=preserve_state, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, use_vt=use_vt, ignore_retcode=ignore_retcode, keep_env=keep_env, ) def run_all( name, cmd, no_start=False, preserve_state=True, stdin=None, python_shell=True, output_loglevel="debug", use_vt=False, ignore_retcode=False, keep_env=None, ): """ Run :mod:`cmd.run_all <salt.modules.cmdmod.run_all>` within a container .. note:: While the command is run within the container, it is initiated from the host. Therefore, the PID in the return dict is from the host, not from the container. name Name of the container in which to run the command cmd Command to run no_start : False If the container is not running, don't start it preserve_state : True After running the command, return the container to its previous state stdin : None Standard input to be used for the command output_loglevel : debug Level at which to log the output from the command. Set to ``quiet`` to suppress logging. use_vt : False Use SaltStack's utils.vt to stream output to console. Assumes ``output=all``. keep_env : None If not passed, only a sane default PATH environment variable will be set. If ``True``, all environment variables from the container's host will be kept. Otherwise, a comma-separated list (or Python list) of environment variable names can be passed, and those environment variables will be kept. CLI Example: .. code-block:: bash salt myminion nspawn.run_all mycontainer 'ip addr show' """ return _run( name, cmd, output="all", no_start=no_start, preserve_state=preserve_state, stdin=stdin, python_shell=python_shell, output_loglevel=output_loglevel, use_vt=use_vt, ignore_retcode=ignore_retcode, keep_env=keep_env, ) def bootstrap_container(name, dist=None, version=None): """ Bootstrap a container from package servers, if dist is None the os the minion is running as will be created, otherwise the needed bootstrapping tools will need to be available on the host. CLI Example: .. code-block:: bash salt myminion nspawn.bootstrap_container <name> """ if not dist: dist = __grains__["os"].lower() log.debug("nspawn.bootstrap: no dist provided, defaulting to '%s'", dist) try: return globals()[f"_bootstrap_{dist}"](name, version=version) except KeyError: raise CommandExecutionError(f'Unsupported distribution "{dist}"') def _needs_install(name): ret = 0 has_minion = retcode(name, "command -v salt-minion") # we assume that installing is when no minion is running # but testing the executable presence is not enougth for custom # installs where the bootstrap can do much more than installing # the bare salt binaries. if has_minion: processes = run_stdout(name, "ps aux") if "salt-minion" not in processes: ret = 1 else: retcode(name, "salt-call --local service.stop salt-minion") else: ret = 1 return ret def bootstrap_salt( name, config=None, approve_key=True, install=True, pub_key=None, priv_key=None, bootstrap_url=None, force_install=False, unconditional_install=False, bootstrap_delay=None, bootstrap_args=None, bootstrap_shell=None, ): """ Bootstrap a container from package servers, if dist is None the os the minion is running as will be created, otherwise the needed bootstrapping tools will need to be available on the host. CLI Example: .. code-block:: bash salt '*' nspawn.bootstrap_salt arch1 """ if bootstrap_delay is not None: try: time.sleep(bootstrap_delay) except TypeError: # Bad input, but assume since a value was passed that # a delay was desired, and sleep for 5 seconds time.sleep(5) c_info = info(name) if not c_info: return None # default set here as we cannot set them # in def as it can come from a chain of procedures. if bootstrap_args: # custom bootstrap args can be totally customized, and user could # have inserted the placeholder for the config directory. # For example, some salt bootstrap script do not use at all -c if "{0}" not in bootstrap_args: bootstrap_args += " -c {0}" else: bootstrap_args = "-c {0}" if not bootstrap_shell: bootstrap_shell = "sh" orig_state = _ensure_running(name) if not orig_state: return orig_state if not force_install: needs_install = _needs_install(name) else: needs_install = True seeded = retcode(name, f"test -e '{SEED_MARKER}'") == 0 tmp = tempfile.mkdtemp() if seeded and not unconditional_install: ret = True else: ret = False cfg_files = __salt__["seed.mkconfig"]( config, tmp=tmp, id_=name, approve_key=approve_key, pub_key=pub_key, priv_key=priv_key, ) if needs_install or force_install or unconditional_install: if install: rstr = __salt__["test.random_hash"]() configdir = f"/tmp/.c_{rstr}" run(name, f"install -m 0700 -d {configdir}", python_shell=False) bs_ = __salt__["config.gather_bootstrap_script"]( bootstrap=bootstrap_url ) dest_dir = os.path.join("/tmp", rstr) for cmd in [ f"mkdir -p {dest_dir}", f"chmod 700 {dest_dir}", ]: if run_stdout(name, cmd): log.error("tmpdir %s creation failed (%s)", dest_dir, cmd) return False copy_to(name, bs_, f"{dest_dir}/bootstrap.sh", makedirs=True) copy_to(name, cfg_files["config"], os.path.join(configdir, "minion")) copy_to( name, cfg_files["privkey"], os.path.join(configdir, "minion.pem") ) copy_to( name, cfg_files["pubkey"], os.path.join(configdir, "minion.pub") ) bootstrap_args = bootstrap_args.format(configdir) cmd = "{0} {2}/bootstrap.sh {1}".format( bootstrap_shell, bootstrap_args.replace("'", "''"), dest_dir ) # log ASAP the forged bootstrap command which can be wrapped # out of the output in case of unexpected problem log.info("Running %s in LXC container '%s'", cmd, name) ret = retcode(name, cmd, output_loglevel="info", use_vt=True) == 0 else: ret = False else: minion_config = salt.config.minion_config(cfg_files["config"]) pki_dir = minion_config["pki_dir"] copy_to(name, cfg_files["config"], "/etc/salt/minion") copy_to(name, cfg_files["privkey"], os.path.join(pki_dir, "minion.pem")) copy_to(name, cfg_files["pubkey"], os.path.join(pki_dir, "minion.pub")) run( name, "salt-call --local service.enable salt-minion", python_shell=False ) ret = True shutil.rmtree(tmp) if orig_state == "stopped": stop(name) # mark seeded upon successful install if ret: run(name, f"touch '{SEED_MARKER}'", python_shell=False) return ret def list_all(): """ Lists all nspawn containers CLI Example: .. code-block:: bash salt myminion nspawn.list_all """ ret = [] if _sd_version() >= 219: for line in _machinectl("list-images")["stdout"].splitlines(): try: ret.append(line.split()[0]) except IndexError: continue else: rootdir = _root() try: for dirname in os.listdir(rootdir): if os.path.isdir(os.path.join(rootdir, dirname)): ret.append(dirname) except OSError: pass return ret def list_running(): """ Lists running nspawn containers .. note:: ``nspawn.list`` also works to list running containers CLI Example: .. code-block:: bash salt myminion nspawn.list_running salt myminion nspawn.list """ ret = [] for line in _machinectl("list")["stdout"].splitlines(): try: ret.append(line.split()[0]) except IndexError: pass return sorted(ret) # 'machinectl list' shows only running containers, so allow this to work as an # alias to nspawn.list_running list_ = salt.utils.functools.alias_function(list_running, "list_") def list_stopped(): """ Lists stopped nspawn containers CLI Example: .. code-block:: bash salt myminion nspawn.list_stopped """ return sorted(set(list_all()) - set(list_running())) def exists(name): """ Returns true if the named container exists CLI Example: .. code-block:: bash salt myminion nspawn.exists <name> """ contextkey = f"nspawn.exists.{name}" if contextkey in __context__: return __context__[contextkey] __context__[contextkey] = name in list_all() return __context__[contextkey] @_ensure_exists def state(name): """ Return state of container (running or stopped) CLI Example: .. code-block:: bash salt myminion nspawn.state <name> """ try: cmd = f"show {name} --property=State" return _machinectl(cmd, ignore_retcode=True)["stdout"].split("=")[-1] except IndexError: return "stopped" def info(name, **kwargs): """ Return info about a container .. note:: The container must be running for ``machinectl`` to gather information about it. If the container is stopped, then this function will start it. start : False If ``True``, then the container will be started to retrieve the info. A ``Started`` key will be in the return data if the container was started. CLI Example: .. code-block:: bash salt myminion nspawn.info arch1 salt myminion nspawn.info arch1 force_start=False """ kwargs = salt.utils.args.clean_kwargs(**kwargs) start_ = kwargs.pop("start", False) if kwargs: salt.utils.args.invalid_kwargs(kwargs) if not start_: _ensure_running(name) elif name not in list_running(): start(name) # Have to parse 'machinectl status' here since 'machinectl show' doesn't # contain IP address info or OS info. *shakes fist angrily* c_info = _machinectl(f"status {name}") if c_info["retcode"] != 0: raise CommandExecutionError(f"Unable to get info for container '{name}'") # Better human-readable names. False means key should be ignored. key_name_map = { "Iface": "Network Interface", "Leader": "PID", "Service": False, "Since": "Running Since", } ret = {} kv_pair = re.compile(r"^\s+([A-Za-z]+): (.+)$") tree = re.compile(r"[|`]") lines = c_info["stdout"].splitlines() multiline = False cur_key = None for idx, line in enumerate(lines): match = kv_pair.match(line) if match: key, val = match.groups() # Get a better key name if one exists key = key_name_map.get(key, key) if key is False: continue elif key == "PID": try: val = val.split()[0] except IndexError: pass cur_key = key if multiline: multiline = False ret[key] = val else: if cur_key is None: continue if tree.search(lines[idx]): # We've reached the process tree, bail out break if multiline: ret[cur_key].append(lines[idx].strip()) else: ret[cur_key] = [ret[key], lines[idx].strip()] multiline = True return ret @_ensure_exists def enable(name): """ Set the named container to be launched at boot CLI Example: .. code-block:: bash salt myminion nspawn.enable <name> """ cmd = f"systemctl enable systemd-nspawn@{name}" if __salt__["cmd.retcode"](cmd, python_shell=False) != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False return True @_ensure_exists def disable(name): """ Set the named container to *not* be launched at boot CLI Example: .. code-block:: bash salt myminion nspawn.enable <name> """ cmd = f"systemctl disable systemd-nspawn@{name}" if __salt__["cmd.retcode"](cmd, python_shell=False) != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False return True @_ensure_exists def start(name): """ Start the named container CLI Example: .. code-block:: bash salt myminion nspawn.start <name> """ if _sd_version() >= 219: ret = _machinectl(f"start {name}") else: cmd = f"systemctl start systemd-nspawn@{name}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False return True # This function is hidden from sphinx docs @_ensure_exists def stop(name, kill=False): """ This is a compatibility function which provides the logic for nspawn.poweroff and nspawn.terminate. """ if _sd_version() >= 219: if kill: action = "terminate" else: action = "poweroff" ret = _machinectl(f"{action} {name}") else: cmd = f"systemctl stop systemd-nspawn@{name}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False return True def poweroff(name): """ Issue a clean shutdown to the container. Equivalent to running ``machinectl poweroff`` on the named container. For convenience, running ``nspawn.stop``(as shown in the CLI examples below) is equivalent to running ``nspawn.poweroff``. .. note:: ``machinectl poweroff`` is only supported in systemd >= 219. On earlier systemd versions, running this function will simply issue a clean shutdown via ``systemctl``. CLI Examples: .. code-block:: bash salt myminion nspawn.poweroff arch1 salt myminion nspawn.stop arch1 """ return stop(name, kill=False) def terminate(name): """ Kill all processes in the container without issuing a clean shutdown. Equivalent to running ``machinectl terminate`` on the named container. For convenience, running ``nspawn.stop`` and passing ``kill=True`` (as shown in the CLI examples below) is equivalent to running ``nspawn.terminate``. .. note:: ``machinectl terminate`` is only supported in systemd >= 219. On earlier systemd versions, running this function will simply issue a clean shutdown via ``systemctl``. CLI Examples: .. code-block:: bash salt myminion nspawn.terminate arch1 salt myminion nspawn.stop arch1 kill=True """ return stop(name, kill=True) # This function is hidden from sphinx docs def restart(name): """ This is a compatibility function which simply calls nspawn.reboot. """ return reboot(name) @_ensure_exists def reboot(name, kill=False): """ Reboot the container by sending a SIGINT to its init process. Equivalent to running ``machinectl reboot`` on the named container. For convenience, running ``nspawn.restart`` (as shown in the CLI examples below) is equivalent to running ``nspawn.reboot``. .. note:: ``machinectl reboot`` is only supported in systemd >= 219. On earlier systemd versions, running this function will instead restart the container via ``systemctl``. CLI Examples: .. code-block:: bash salt myminion nspawn.reboot arch1 salt myminion nspawn.restart arch1 """ if _sd_version() >= 219: if state(name) == "running": ret = _machinectl(f"reboot {name}") else: # 'machinectl reboot' will fail on a stopped container return start(name) else: # 'systemctl restart' did not work, at least in my testing. Running # 'uptime' in the container afterwards showed it had not rebooted. So, # we need stop and start the container in separate actions. # First stop the container cmd = f"systemctl stop systemd-nspawn@{name}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) # Now check if successful if ret["retcode"] != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False # Finally, start the container back up. No need to check the retcode a # second time, it'll be checked below once we exit the if/else block. cmd = f"systemctl start systemd-nspawn@{name}" ret = __salt__["cmd.run_all"](cmd, python_shell=False) if ret["retcode"] != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE return False return True @_ensure_exists def remove(name, stop=False): """ Remove the named container .. warning:: This function will remove all data associated with the container. It will not, however, remove the btrfs subvolumes created by pulling container images (:mod:`nspawn.pull_raw <salt.modules.nspawn.pull_raw>`, :mod:`nspawn.pull_tar <salt.modules.nspawn.pull_tar>`, :mod:`nspawn.pull_dkr <salt.modules.nspawn.pull_dkr>`). stop : False If ``True``, the container will be destroyed even if it is running/frozen. CLI Examples: .. code-block:: bash salt '*' nspawn.remove foo salt '*' nspawn.remove foo stop=True """ if not stop and state(name) != "stopped": raise CommandExecutionError(f"Container '{name}' is not stopped") def _failed_remove(name, exc): raise CommandExecutionError(f"Unable to remove container '{name}': {exc}") if _sd_version() >= 219: ret = _machinectl(f"remove {name}") if ret["retcode"] != 0: __context__["retcode"] = salt.defaults.exitcodes.EX_UNAVAILABLE _failed_remove(name, ret["stderr"]) else: try: shutil.rmtree(os.path.join(_root(), name)) except OSError as exc: _failed_remove(name, exc) return True # Compatibility between LXC and nspawn destroy = salt.utils.functools.alias_function(remove, "destroy") @_ensure_exists def copy_to(name, source, dest, overwrite=False, makedirs=False): """ Copy a file from the host into a container name Container name source File to be copied to the container dest Destination on the container. Must be an absolute path. overwrite : False Unless this option is set to ``True``, then if a file exists at the location specified by the ``dest`` argument, an error will be raised. makedirs : False Create the parent directory on the container if it does not already exist. CLI Example: .. code-block:: bash salt 'minion' nspawn.copy_to /tmp/foo /root/foo """ path = source try: if source.startswith("salt://"): cached_source = __salt__["cp.cache_file"](source) if not cached_source: raise CommandExecutionError(f"Unable to cache {source}") path = cached_source except AttributeError: raise SaltInvocationError(f"Invalid source file {source}") if _sd_version() >= 219: # TODO: Use machinectl copy-to pass return __salt__["container_resource.copy_to"]( name, path, dest, container_type=__virtualname__, exec_driver=EXEC_DRIVER, overwrite=overwrite, makedirs=makedirs, ) cp = salt.utils.functools.alias_function(copy_to, "cp") # Everything below requres systemd >= 219 # TODO: Write a decorator to keep these functions from being available to older # systemd versions. def _pull_image(pull_type, image, name, **kwargs): """ Common logic for machinectl pull-* commands """ _ensure_systemd(219) if exists(name): raise SaltInvocationError(f"Container '{name}' already exists") if pull_type in ("raw", "tar"): valid_kwargs = ("verify",) elif pull_type == "dkr": valid_kwargs = ("index",) else: raise SaltInvocationError(f"Unsupported image type '{pull_type}'") kwargs = salt.utils.args.clean_kwargs(**kwargs) bad_kwargs = { x: y for x, y in salt.utils.args.clean_kwargs(**kwargs).items() if x not in valid_kwargs } if bad_kwargs: salt.utils.args.invalid_kwargs(bad_kwargs) pull_opts = [] if pull_type in ("raw", "tar"): verify = kwargs.get("verify", False) if not verify: pull_opts.append("--verify=no") else: def _bad_verify(): raise SaltInvocationError( "'verify' must be one of the following: signature, checksum" ) try: verify = verify.lower() except AttributeError: _bad_verify() else: if verify not in ("signature", "checksum"): _bad_verify() pull_opts.append(f"--verify={verify}") elif pull_type == "dkr": # No need to validate the index URL, machinectl will take care of this # for us. if "index" in kwargs: pull_opts.append("--dkr-index-url={}".format(kwargs["index"])) cmd = "pull-{} {} {} {}".format(pull_type, " ".join(pull_opts), image, name) result = _machinectl(cmd, use_vt=True) if result["retcode"] != 0: msg = ( "Error occurred pulling image. Stderr from the pull command " "(if any) follows: " ) if result["stderr"]: msg += "\n\n{}".format(result["stderr"]) raise CommandExecutionError(msg) return True def pull_raw(url, name, verify=False): """ Execute a ``machinectl pull-raw`` to download a .qcow2 or raw disk image, and add it to /var/lib/machines as a new container. .. note:: **Requires systemd >= 219** url URL from which to download the container name Name for the new container verify : False Perform signature or checksum verification on the container. See the ``machinectl(1)`` man page (section titled "Image Transfer Commands") for more information on requirements for image verification. To perform signature verification, use ``verify=signature``. For checksum verification, use ``verify=checksum``. By default, no verification will be performed. CLI Examples: .. code-block:: bash salt myminion nspawn.pull_raw http://ftp.halifax.rwth-aachen.de/fedora/linux/releases/21/Cloud/Images/x86_64/Fedora-Cloud-Base-20141203-21.x86_64.raw.xz fedora21 """ return _pull_image("raw", url, name, verify=verify) def pull_tar(url, name, verify=False): """ Execute a ``machinectl pull-raw`` to download a .tar container image, and add it to /var/lib/machines as a new container. .. note:: **Requires systemd >= 219** url URL from which to download the container name Name for the new container verify : False Perform signature or checksum verification on the container. See the ``machinectl(1)`` man page (section titled "Image Transfer Commands") for more information on requirements for image verification. To perform signature verification, use ``verify=signature``. For checksum verification, use ``verify=checksum``. By default, no verification will be performed. CLI Examples: .. code-block:: bash salt myminion nspawn.pull_tar http://foo.domain.tld/containers/archlinux-2015.02.01.tar.gz arch2 """ return _pull_image("tar", url, name, verify=verify) def pull_dkr(url, name, index): """ Execute a ``machinectl pull-dkr`` to download a docker image and add it to /var/lib/machines as a new container. .. note:: **Requires systemd >= 219** url URL from which to download the container name Name for the new container index URL of the Docker index server from which to pull (must be an ``http://`` or ``https://`` URL). CLI Examples: .. code-block:: bash salt myminion nspawn.pull_dkr centos/centos6 cent6 index=https://get.docker.com salt myminion nspawn.pull_docker centos/centos6 cent6 index=https://get.docker.com """ return _pull_image("dkr", url, name, index=index) pull_docker = salt.utils.functools.alias_function(pull_dkr, "pull_docker")