Пример #1
0
def main():
    """
    DistMigration load new kernel for kexec reboot

    Loads the new kernel/initrd after migration for system reboot
    """
    root_path = Defaults.get_system_root_path()

    target_kernel = os.sep.join([root_path, Defaults.get_target_kernel()])
    target_initrd = os.sep.join([root_path, Defaults.get_target_initrd()])
    kexec_boot_data = '/var/tmp/kexec'
    Path.create(kexec_boot_data)
    shutil.copy(target_initrd, kexec_boot_data)
    try:
        log.info('Running kernel load service')
        log.info('Loading the target kernel')
        Command.run([
            'kexec', '--load', target_kernel, '--initrd',
            os.sep.join([kexec_boot_data,
                         os.path.basename(target_initrd)]), '--command-line',
            _get_cmdline(os.path.basename(target_kernel))
        ])
    except Exception as issue:
        log.error('Kernel load service raised exception: {0}', format(issue))
        raise DistMigrationKernelRebootException(
            'Failed to load kernel/initrd into memory: {0}'.format(issue))
Пример #2
0
def main():
    """
    DistMigration setup baseproduct for migration

    Creates a backup of the system products data and prepares
    the baseproduct to be suitable for the distribution migration.
    In case of an error the backup information is used by the
    zypper migration plugin to restore the original product
    data such that the plugin's rollback mechanism is not
    negatively influenced.
    """
    try:
        # Note:
        # zypper implements a handling for the distro_target attribute.
        # If present in the repository metadata, zypper compares the
        # value with the baseproduct <target> setup in /etc/products.d.
        # If they mismatch zypper refuses to create the repo. In the
        # process of a migration from distribution [A] to [B] this mismatch
        # always applies by design and prevents the zypper migration
        # plugin to work. In SCC or RMT the repositories doesn't
        # contain the distro_target attribute which is the reason
        # why we don't see this problem there. SMT however creates repos
        # including distro_target. The current workaround solution is
        # to delete the target specification in the baseproduct
        # registration if present.
        log.info('Updating Base Product to be suitable for migration')
        SUSEBaseProduct().delete_target_registration()
    except Exception as issue:
        message = 'Base Product update failed with: {0}'.format(issue)
        log.error(message)
        raise DistMigrationProductSetupException(message)
Пример #3
0
def is_mounted(mount_point):
    log.info('Checking {0} is mounted'.format(mount_point))
    if os.path.exists(mount_point):
        mountpoint_call = Command.run(['mountpoint', '-q', mount_point],
                                      raise_on_error=False)
        if mountpoint_call.returncode == 0:
            return True
    return False
Пример #4
0
def main():
    """
    DistMigration ssh access for migration user

    Copy the authoritation key found to the migration user
    directory in order to access through ssh
    """
    ssh_keys_glob_paths = Defaults.get_ssh_keys_paths()
    migration_ssh_file = Defaults.get_migration_ssh_file()
    system_ssh_host_keys_glob_path = \
        Defaults.get_system_ssh_host_keys_glob_path()
    sshd_config_path = Defaults.get_system_sshd_config_path()
    try:
        log.info('Running ssh keys service')
        ssh_keys_paths = []
        for glob_path in ssh_keys_glob_paths:
            ssh_keys_paths.extend(glob.glob(glob_path))

        keys_list = []
        for ssh_keys_path in ssh_keys_paths:
            log.info('Getting keys from {0}'.format(ssh_keys_path))
            with open(ssh_keys_path) as authorized_keys_file:
                keys_list.append(authorized_keys_file.read())

        authorized_keys_content = ''.join(keys_list)
        log.info('Save keys to {0}'.format(migration_ssh_file))
        with open(migration_ssh_file, 'w') as authorized_migration_file:
            authorized_migration_file.write(authorized_keys_content)

        system_ssh_host_keys = glob.glob(system_ssh_host_keys_glob_path)
        sshd_config_host_keys_entries = []
        log.info('Copying host ssh keys')
        for system_ssh_host_key in system_ssh_host_keys:
            if not system_ssh_host_key.endswith('ssh_host_key'):
                shutil.copy(system_ssh_host_key, '/etc/ssh/')

                if not system_ssh_host_key.endswith('.pub'):
                    live_private_ssh_host_key_path = os.sep.join([
                        os.path.dirname(sshd_config_path),
                        os.path.basename(system_ssh_host_key)
                    ])
                    entry = 'HostKey {0}'.format(
                        live_private_ssh_host_key_path)
                    sshd_config_host_keys_entries.append(entry)

        with open(sshd_config_path, 'a') as live_sshd_config_file:
            # write one newline to be sure any subsequent
            # HostKey entry starts correctly
            live_sshd_config_file.write(os.linesep)
            live_sshd_config_file.write(
                os.linesep.join(sshd_config_host_keys_entries))
        log.info('Restarting sshd')
        Command.run(['systemctl', 'restart', 'sshd'])
    except Exception as issue:
        log.error('SSH key/identity setup failed with: {0}. {1}'.format(
            issue, 'Continue without ssh access'))
Пример #5
0
    def backup_products_metadata(self):
        """
        Back up the products information.

        In case migration fails and the migration rolls back to the
        previous state. The rollback restores this info back in place.
        """
        log.info('Creating backup of Product data')
        Command.run([
            'rsync', '-zav', '--delete', self.products_metadata + os.sep,
            '/tmp/products.d.backup/'
        ])
Пример #6
0
def main():
    """
    DistMigration run zypper based migration

    Call zypper migration plugin and migrate the system.
    The output of the call is logged on the system to migrate
    """
    root_path = Defaults.get_system_root_path()

    try:
        log.info('Running migrate service')
        migration_config = MigrationConfig()
        if migration_config.is_zypper_migration_plugin_requested():
            bash_command = ' '.join([
                'zypper', 'migration', '--non-interactive',
                '--gpg-auto-import-keys', '--no-selfupdate',
                '--auto-agree-with-licenses', '--allow-vendor-change',
                '--strict-errors-dist-migration', '--replacefiles',
                '--product',
                migration_config.get_migration_product(), '--root', root_path,
                '&>>',
                Defaults.get_migration_log_file()
            ])
            Command.run(['bash', '-c', bash_command])
        else:
            bash_command = ' '.join([
                'zypper', '--non-interactive', '--gpg-auto-import-keys',
                '--root', root_path, 'dup', '--auto-agree-with-licenses',
                '--allow-vendor-change', '--replacefiles', '&>>',
                Defaults.get_migration_log_file()
            ])
            zypper_call = Command.run(['bash', '-c', bash_command],
                                      raise_on_error=False)
            if zypper_has_failed(zypper_call.returncode):
                raise DistMigrationCommandException(
                    '{0} failed with: {1}: {2}'.format(bash_command,
                                                       zypper_call.output,
                                                       zypper_call.error))
    except Exception as issue:
        etc_issue_path = os.sep.join([root_path, 'etc/issue'])
        log_path_migrated_system = os.sep + os.path.relpath(
            Defaults.get_migration_log_file(), root_path)
        with open(etc_issue_path, 'w') as issue_file:
            issue_file.write(
                'Migration has failed, for further details see {0}'.format(
                    log_path_migrated_system))
        log.error('migrate service failed with {0}'.format(issue))
        raise DistMigrationZypperException(
            'Migration failed with {0}'.format(issue))
    def update_migration_config_file(self):
        """
        Update the default migration configuration with custom values
        """
        if os.path.exists(self.migration_custom_file):
            with open(self.migration_custom_file, 'r') as custom_config:
                new_config = yaml.safe_load(custom_config)
                self.config_data.update(new_config)

            self._write_config_file()

            message = dedent('''
                The migration file '{0}' has been updated with '{1}' info
            ''')
            log.info(
                message.format(
                    self.migration_config_file, self.migration_custom_file
                ).lstrip()
            )
def main():
    """
    DistMigration activate host network setup

    Setup and activate the network as it is setup on the host
    to become migrated. This includes the import of the resolver
    and network configuration from the migration host
    """
    root_path = Defaults.get_system_root_path()

    resolv_conf = os.sep.join([root_path, 'etc', 'resolv.conf'])
    if not os.path.exists(resolv_conf):
        raise DistMigrationNameResolverException(
            'Could not find {0} on migration host'.format(resolv_conf))

    shutil.copy(resolv_conf, '/etc/resolv.conf')

    sysconfig_network_providers = os.sep.join(
        [root_path, 'etc', 'sysconfig', 'network', 'providers'])
    sysconfig_network_setup = os.sep.join(
        [root_path, 'etc', 'sysconfig', 'network', '*'])
    try:
        log.info('Running setup host network service')
        system_mount = Fstab()
        system_mount.read(Defaults.get_system_mount_info_file())
        Command.run([
            'mount', '--bind', sysconfig_network_providers,
            '/etc/sysconfig/network/providers'
        ])
        system_mount.add_entry(sysconfig_network_providers,
                               '/etc/sysconfig/network/providers')
        for network_setup in glob.glob(sysconfig_network_setup):
            if os.path.isfile(network_setup):
                shutil.copy(network_setup, '/etc/sysconfig/network')
        Command.run(['systemctl', 'reload', 'network'])
        system_mount.export(Defaults.get_system_mount_info_file())
    except Exception as issue:
        log.error(
            'Preparation of migration host network failed with {0}'.format(
                issue))
        raise DistMigrationHostNetworkException(
            'Preparation of migration host network failed with {0}'.format(
                issue))
Пример #9
0
def read_system_fstab(root_path):
    log.info('Reading fstab from associated disks')
    lsblk_call = Command.run(['lsblk', '-p', '-n', '-r', '-o', 'NAME,TYPE'])
    for entry in lsblk_call.output.split(os.linesep):
        block_record = entry.split()
        if len(block_record) >= 2:
            block_type = block_record[1]
            if block_type == 'part' or block_type.startswith('raid'):
                try:
                    Command.run(['mount', block_record[0], root_path],
                                raise_on_error=False)
                    fstab_file = os.sep.join([root_path, 'etc', 'fstab'])
                    if os.path.exists(fstab_file):
                        fstab = Fstab()
                        fstab.read(fstab_file)
                        return (fstab, lsblk_call.output)
                finally:
                    log.info('Umount {0}'.format(root_path))
                    Command.run(['umount', root_path], raise_on_error=False)
    return (None, lsblk_call.output)
Пример #10
0
def main():
    """
    DistMigration update grub to migrated version

    Setup and update grub with content from the migrated system
    Uninstall live migration packages such that they are no longer
    part of the now migrated system.
    """
    root_path = Defaults.get_system_root_path()
    grub_config_file = Defaults.get_grub_config_file()

    try:
        log.info('Running grub setup service')
        migration_packages = ['SLE*-Migration', 'suse-migration-*-activation']
        log.info('Uninstalling migration: {0}{1}'.format(
            os.linesep,
            Command.run([
                'chroot', root_path, 'zypper', '--non-interactive',
                '--no-gpg-checks', 'remove'
            ] + migration_packages,
                        raise_on_error=False).output))
        log.info('Creating new grub menu: {0}{1}'.format(
            os.linesep,
            Command.run([
                'chroot', root_path, 'grub2-mkconfig', '-o',
                '{0}{1}'.format(os.sep, grub_config_file)
            ]).error))
    except Exception as issue:
        message = 'Update grub failed with {0}'.format(issue)
        log.error(message)
        raise DistMigrationGrubConfigException(message)
Пример #11
0
def _get_cmdline(kernel_name):
    log.info('Getting cmdline for {0}'.format(kernel_name))
    grub_config_file_path = os.sep.join(
        [Defaults.get_system_root_path(),
         Defaults.get_grub_config_file()])
    if not os.path.exists(grub_config_file_path):
        log.error('kernel load service was not able to find'
                  '{0}'.format(grub_config_file_path))
        raise DistMigrationKernelRebootException(
            'Could not find {0} to load the kernel options'.format(
                grub_config_file_path))
    with open(grub_config_file_path) as grub_config_file:
        grub_content = grub_config_file.read()
    pattern = r'(?<=linux)[ \t]+{0}([{1}|boot/{1}].*)'.format(
        os.sep, kernel_name)
    cmd_line = re.findall(pattern, grub_content)[0]
    cmd_line = cmd_line.split()
    cmd_line_options = []
    for option in cmd_line:
        if kernel_name not in option:
            cmd_line_options.append(option)
    return ' '.join(cmd_line_options)
Пример #12
0
def mount_system(root_path, fstab):
    log.info('Mount system in {0}'.format(root_path))
    mount_list = []
    system_mount = Fstab()
    for fstab_entry in fstab.get_devices():
        try:
            mountpoint = ''.join([root_path, fstab_entry.mountpoint])
            log.info('Mounting {0}'.format(mountpoint))
            Command.run([
                'mount', '-o', fstab_entry.options, fstab_entry.device,
                mountpoint
            ])
            system_mount.add_entry(fstab_entry.device, mountpoint,
                                   fstab_entry.fstype)
            mount_list.append(mountpoint)
        except Exception as issue:
            log.error(
                'Mounting system for upgrade failed with {0}'.format(issue))
            for mountpoint in reversed(mount_list):
                Command.run(['umount', mountpoint])
            raise DistMigrationSystemMountException(
                'Mounting system for upgrade failed with {0}'.format(issue))
    system_mount.export(Defaults.get_system_mount_info_file())
def main():
    """
    DistMigration post mount actions

    Preserve custom data file(s) e.g udev rules from the system
    to be migrated to the live migration system and activate
    those file changes to become effective
    """
    root_path = Defaults.get_system_root_path()

    migration_config = MigrationConfig()
    system_udev_rules = migration_config.get_preserve_udev_rules_list()
    if system_udev_rules:
        for rule_file in system_udev_rules:
            target_rule_dir = os.path.dirname(rule_file)
            source_rule_file = os.path.normpath(
                os.sep.join([root_path, rule_file]))
            log.info('Copy udev rule: {0} to: {1}'.format(
                source_rule_file, target_rule_dir))
            shutil.copy(source_rule_file, target_rule_dir)
        Command.run(['udevadm', 'control', '--reload'])
        Command.run(
            ['udevadm', 'trigger', '--type=subsystems', '--action=add'])
        Command.run(['udevadm', 'trigger', '--type=devices', '--action=add'])
def log_network_details():
    """
    Provide detailed information about the current network setup

    The method must be called in an active and online network state to provide
    most useful information about the network interfaces and its setup.
    """
    log.info('All Network Interfaces {0}{1}'.format(
        os.linesep,
        Command.run(['ip', 'a'], raise_on_error=False).output))
    log.info('Routing Tables {0}{1}'.format(
        os.linesep,
        Command.run(['ip', 'r'], raise_on_error=False).output))
    log.info('DNS Resolver {0}{1}'.format(
        os.linesep,
        Command.run(['cat', '/etc/resolv.conf'], raise_on_error=False).output))
    bonding_paths = '/proc/net/bonding/bond*'
    if os.path.exists(os.path.dirname(bonding_paths)):
        log.info('Network Bonding {0}{1}'.format(
            os.linesep,
            Command.run(['cat', bonding_paths], raise_on_error=False).output))
Пример #15
0
def main():
    """
    DistMigration mount system to upgrade

    Searches on all partitions for a fstab file. The first
    fstab file found is used as the system to upgrade.
    Filesystems relevant for an upgrade process are read from
    that fstab in order and mounted such that the system rootfs
    is available for a zypper based migration process.
    """
    root_path = Defaults.get_system_root_path()
    Path.create(root_path)
    log.info('Running mount system service')

    if is_mounted(root_path):
        # root_path is already a mount point, better not continue
        # The condition is not handled as an error because the
        # existing mount point under this service created root_path
        # is considered to represent the system to upgrade and
        # not something else. Thus if already mounted, let's use
        # what is there.
        return

    log.info('Mount system service: {0} is mounted'.format(root_path))
    # Check if booted via loopback grub
    isoscan_loop_mount = '/run/initramfs/isoscan'
    if is_mounted(isoscan_loop_mount):
        # The system to become migrated was booted via a grub
        # loopback menuentry. This means the disk is blocked by
        # that readonly loopback mount and needs to be
        # remounted for read write access first
        log.info(
            'Mount system service: {0} is mounted'.format(isoscan_loop_mount))
        Command.run(['mount', '-o', 'remount,rw', isoscan_loop_mount])

    fstab, storage_info = read_system_fstab(root_path)
    if not fstab:
        log.error('Could not find system in fstab on {0}'.format(storage_info))
        raise DistMigrationSystemNotFoundException(
            'Could not find system with fstab on {0}'.format(storage_info))

    mount_system(root_path, fstab)

    initialize_logging()
    MigrationConfig().update_migration_config_file()
Пример #16
0
def main():
    """
    DistMigration reboot with new kernel

    After the migration process is finished, the system reboots
    unless the debug option is set.

    Before reboot a reverse umount of the filesystems that got mounted
    by the mount_system service is performed and thus releases the
    upgraded system from the migration host. If for whatever reason
    a filesystem is busy and can't be umounted, this condition is not
    handled as an error. The reason is that the cleanup should not
    prevent us from continuing with the reboot process. The risk on
    reboot of the migration host with a potential active mount
    is something we accept
    """
    try:
        log.info(
            'Systemctl Status Information: {0}{1}'.format(
                os.linesep, Command.run(
                    ['systemctl', 'status', '-l', '--all'], raise_on_error=False
                ).output
            )
        )
        if MigrationConfig().is_debug_requested():
            log.info('Reboot skipped due to debug flag set')
        else:
            log.info('Umounting system')
            system_mount = Fstab()
            system_mount.read(
                Defaults.get_system_mount_info_file()
            )
            for mount in reversed(system_mount.get_devices()):
                log.info(
                    'Umounting {0}: {1}'.format(
                        mount.mountpoint, Command.run(
                            ['umount', '--lazy', mount.mountpoint],
                            raise_on_error=False
                        )
                    )
                )
            log.info(
                # reboot is performed through systemd. The call through
                # systemd checks if there is a kexec loaded kernel and
                # transparently turns 'systemctl reboot' into
                # 'systemctl kexec'. Thus both ways, soft and hard
                # reboot are managed in one call.
                'Reboot system: {0}{1}'.format(
                    os.linesep, Command.run(
                        ['systemctl', 'reboot']
                    )
                )
            )
    except Exception:
        # Uhh, we don't want to be here, but we also don't
        # want to be stuck in the migration live system.
        # Keep fingers crossed:
        log.warning('Reboot system: [Force Reboot]')
        Command.run(
            ['systemctl', '--force', 'reboot']
        )
Пример #17
0
def main():
    """
    DistMigration prepare for migration

    Prepare the migration live system to allow zypper migration to
    upgrade the system across major distribution versions. The zypper
    migration process contacts the service that provides the configured
    repositories on the system being migrated. The service must be one
    of SUSE's repository services, SCC, RMT, or SMT. This requiers
    information from the target system. This service makes the necessary
    information available inside the live system that performs the migration.
    """
    root_path = Defaults.get_system_root_path()
    suse_connect_setup = os.sep.join(
        [root_path, 'etc', 'SUSEConnect']
    )
    suse_cloud_regionsrv_setup = os.sep.join(
        [root_path, 'etc', 'regionserverclnt.cfg']
    )
    hosts_setup = os.sep.join(
        [root_path, 'etc', 'hosts']
    )
    trust_anchors = os.sep.join(
        [root_path, 'usr', 'share', 'pki', 'trust', 'anchors']
    )
    if os.path.exists(suse_connect_setup):
        shutil.copy(
            suse_connect_setup, '/etc/SUSEConnect'
        )
    if os.path.exists(suse_cloud_regionsrv_setup):
        shutil.copy(
            suse_cloud_regionsrv_setup, '/etc/regionserverclnt.cfg'
        )
    if os.path.exists(hosts_setup):
        shutil.copy(
            hosts_setup, '/etc/hosts'
        )
    if os.path.exists(trust_anchors):
        certificates = os.listdir(trust_anchors)
        if certificates:
            for cert in certificates:
                log.info(
                    'Importing certificate: {0}'.format(cert)
                )
                shutil.copy(
                    os.sep.join([trust_anchors, cert]),
                    '/usr/share/pki/trust/anchors/'
                )
            log.info('Update certificate pool')
            Command.run(
                ['update-ca-certificates']
            )

    zypp_metadata = os.sep.join(
        [root_path, 'etc', 'zypp']
    )
    zypp_plugins = os.sep.join(
        [root_path, 'usr', 'lib', 'zypp', 'plugins']
    )
    cloud_register_metadata = os.sep.join(
        [root_path, 'var', 'lib', 'cloudregister']
    )
    dev_mount_point = os.sep.join(
        [root_path, 'dev']
    )
    proc_mount_point = os.sep.join(
        [root_path, 'proc']
    )
    sys_mount_point = os.sep.join(
        [root_path, 'sys']
    )
    try:
        # log network info as network-online.target is done at this point
        log_network_details()
        log.info('Running prepare service')
        system_mount = Fstab()
        system_mount.read(
            Defaults.get_system_mount_info_file()
        )
        log.info('Bind mounting /etc/zypp')
        Command.run(
            ['mount', '--bind', zypp_metadata, '/etc/zypp']
        )
        system_mount.add_entry(
            zypp_metadata, '/etc/zypp'
        )
        log.info('Bind mounting /usr/lib/zypp/plugins')
        Command.run(
            ['mount', '--bind', zypp_plugins, '/usr/lib/zypp/plugins']
        )
        system_mount.add_entry(
            zypp_plugins, '/usr/lib/zypp/plugins'
        )
        if os.path.exists(cloud_register_metadata):
            log.info('Bind mounting /var/lib/cloudregister')
            Path.create('/var/lib/cloudregister')
            Command.run(
                [
                    'mount', '--bind', cloud_register_metadata,
                    '/var/lib/cloudregister'
                ]
            )
        log.info('Mounting kernel file systems inside {0}'.format(root_path))
        Command.run(
            ['mount', '-t', 'devtmpfs', 'devtmpfs', dev_mount_point]
        )
        system_mount.add_entry(
            'devtmpfs', dev_mount_point
        )
        Command.run(
            ['mount', '-t', 'proc', 'proc', proc_mount_point]
        )
        system_mount.add_entry(
            '/proc', proc_mount_point
        )
        Command.run(
            ['mount', '-t', 'sysfs', 'sysfs', sys_mount_point]
        )
        system_mount.add_entry(
            'sysfs', sys_mount_point
        )
        system_mount.export(
            Defaults.get_system_mount_info_file()
        )
    except Exception as issue:
        log.error(
            'Preparation of zypper metadata failed with {0}'.format(
                issue
            )
        )
        log.info('Unmounting kernel file systems, if any')
        for entry in reversed(system_mount.get_devices()):
            Command.run(
                ['umount', entry.mountpoint], raise_on_error=False
            )
        raise DistMigrationZypperMetaDataException(
            'Preparation of zypper metadata failed with {0}'.format(
                issue
            )
        )