404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.129.209.135: ~ $
# (c) Copyright IBM Corp. 2020 All Rights Reserved
#
# Author: Aman Kumar Sinha <amansi26@in.ibm.com>
#
# This file is part of cloud-init. See LICENSE file for license information.

"""Refresh IPv6 interface and RMC:
Ensure Network Manager is not managing IPv6 interface"""

import errno
from logging import Logger

from cloudinit import log as logging
from cloudinit import netinfo, subp, util
from cloudinit.cloud import Cloud
from cloudinit.config import Config
from cloudinit.config.schema import MetaSchema
from cloudinit.distros import ALL_DISTROS
from cloudinit.settings import PER_ALWAYS

MODULE_DESCRIPTION = """\
This module is IBM PowerVM Hypervisor specific

Reliable Scalable Cluster Technology (RSCT) is a set of software components
that together provide a comprehensive clustering environment(RAS features)
for IBM PowerVM based virtual machines. RSCT includes the Resource
Monitoring and Control (RMC) subsystem. RMC is a generalized framework used
for managing, monitoring, and manipulating resources. RMC runs as a daemon
process on individual machines and needs creation of unique node id and
restarts during VM boot.
More details refer
https://www.ibm.com/support/knowledgecenter/en/SGVKBA_3.2/admin/bl503_ovrv.htm

This module handles
- Refreshing RMC
- Disabling NetworkManager from handling IPv6 interface, as IPv6 interface
  is used for communication between RMC daemon and PowerVM hypervisor.
"""

meta: MetaSchema = {
    "id": "cc_refresh_rmc_and_interface",
    "name": "Refresh IPv6 Interface and RMC",
    "title": "Ensure Network Manager is not managing IPv6 interface",
    "description": MODULE_DESCRIPTION,
    "distros": [ALL_DISTROS],
    "frequency": PER_ALWAYS,
    "examples": [],
    "activate_by_schema_keys": [],
}

# This module is undocumented in our schema docs
__doc__ = ""

LOG = logging.getLogger(__name__)
# Ensure that /opt/rsct/bin has been added to standard PATH of the
# distro. The symlink to rmcctrl is /usr/sbin/rsct/bin/rmcctrl .
RMCCTRL = "rmcctrl"


def handle(
    name: str, cfg: Config, cloud: Cloud, log: Logger, args: list
) -> None:
    if not subp.which(RMCCTRL):
        LOG.debug("No '%s' in path, disabled", RMCCTRL)
        return

    LOG.debug(
        "Making the IPv6 up explicitly. "
        "Ensuring IPv6 interface is not being handled by NetworkManager "
        "and it is  restarted to re-establish the communication with "
        "the hypervisor"
    )

    ifaces = find_ipv6_ifaces()

    # Setting NM_CONTROLLED=no for IPv6 interface
    # making it down and up

    if len(ifaces) == 0:
        LOG.debug("Did not find any interfaces with ipv6 addresses.")
    else:
        for iface in ifaces:
            refresh_ipv6(iface)
            disable_ipv6(sysconfig_path(iface))
        restart_network_manager()


def find_ipv6_ifaces():
    info = netinfo.netdev_info()
    ifaces = []
    for iface, data in info.items():
        if iface == "lo":
            LOG.debug("Skipping localhost interface")
        if len(data.get("ipv4", [])) != 0:
            # skip this interface, as it has ipv4 addrs
            continue
        ifaces.append(iface)
    return ifaces


def refresh_ipv6(interface):
    # IPv6 interface is explicitly brought up, subsequent to which the
    # RMC services are restarted to re-establish the communication with
    # the hypervisor.
    subp.subp(["ip", "link", "set", interface, "down"])
    subp.subp(["ip", "link", "set", interface, "up"])


def sysconfig_path(iface):
    return "/etc/sysconfig/network-scripts/ifcfg-" + iface


def restart_network_manager():
    subp.subp(["systemctl", "restart", "NetworkManager"])


def disable_ipv6(iface_file):
    # Ensuring that the communication b/w the hypervisor and VM is not
    # interrupted due to NetworkManager. For this purpose, as part of
    # this function, the NM_CONTROLLED is explicitly set to No for IPV6
    # interface and NetworkManager is restarted.
    try:
        contents = util.load_file(iface_file)
    except IOError as e:
        if e.errno == errno.ENOENT:
            LOG.debug("IPv6 interface file %s does not exist\n", iface_file)
        else:
            raise e

    if "IPV6INIT" not in contents:
        LOG.debug("Interface file %s did not have IPV6INIT", iface_file)
        return

    LOG.debug("Editing interface file %s ", iface_file)

    # Dropping any NM_CONTROLLED or IPV6 lines from IPv6 interface file.
    lines = contents.splitlines()
    lines = [line for line in lines if not search(line)]
    lines.append("NM_CONTROLLED=no")

    with open(iface_file, "w") as fp:
        fp.write("\n".join(lines) + "\n")


def search(contents):
    # Search for any NM_CONTROLLED or IPV6 lines in IPv6 interface file.
    return (
        contents.startswith("IPV6ADDR")
        or contents.startswith("IPADDR6")
        or contents.startswith("IPV6INIT")
        or contents.startswith("NM_CONTROLLED")
    )


def refresh_rmc():
    # To make a healthy connection between RMC daemon and hypervisor we
    # refresh RMC. With refreshing RMC we are ensuring that making IPv6
    # down and up shouldn't impact communication between RMC daemon and
    # hypervisor.
    # -z : stop Resource Monitoring & Control subsystem and all resource
    # managers, but the command does not return control to the user
    # until the subsystem and all resource managers are stopped.
    # -s : start Resource Monitoring & Control subsystem.
    try:
        subp.subp([RMCCTRL, "-z"])
        subp.subp([RMCCTRL, "-s"])
    except Exception:
        util.logexc(LOG, "Failed to refresh the RMC subsystem.")
        raise

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
schemas Folder 0755
__init__.py File 14 B 0644
cc_ansible.py File 8.37 KB 0644
cc_apk_configure.py File 5.75 KB 0644
cc_apt_configure.py File 32.46 KB 0644
cc_apt_pipelining.py File 2.82 KB 0644
cc_bootcmd.py File 2.87 KB 0644
cc_byobu.py File 3.67 KB 0644
cc_ca_certs.py File 8.06 KB 0644
cc_chef.py File 13.79 KB 0644
cc_disable_ec2_metadata.py File 2.04 KB 0644
cc_disk_setup.py File 32.34 KB 0644
cc_fan.py File 3.11 KB 0644
cc_final_message.py File 3.41 KB 0644
cc_growpart.py File 19.42 KB 0644
cc_grub_dpkg.py File 5.49 KB 0644
cc_install_hotplug.py File 3.81 KB 0644
cc_keyboard.py File 2.08 KB 0644
cc_keys_to_console.py File 3.63 KB 0644
cc_landscape.py File 4.86 KB 0644
cc_locale.py File 1.88 KB 0644
cc_lxd.py File 17.96 KB 0644
cc_mcollective.py File 6.2 KB 0644
cc_migrator.py File 3.51 KB 0644
cc_mounts.py File 19.03 KB 0644
cc_ntp.py File 19.7 KB 0644
cc_package_update_upgrade_install.py File 4.42 KB 0644
cc_phone_home.py File 5.5 KB 0644
cc_power_state_change.py File 7.65 KB 0644
cc_puppet.py File 13.74 KB 0644
cc_refresh_rmc_and_interface.py File 5.48 KB 0644
cc_reset_rmc.py File 4.53 KB 0644
cc_resizefs.py File 10.56 KB 0644
cc_resolv_conf.py File 5.01 KB 0644
cc_rh_subscription.py File 17.05 KB 0644
cc_rightscale_userdata.py File 4.3 KB 0644
cc_rsyslog.py File 9.77 KB 0644
cc_runcmd.py File 2.92 KB 0644
cc_salt_minion.py File 5.54 KB 0644
cc_scripts_per_boot.py File 1.68 KB 0644
cc_scripts_per_instance.py File 1.83 KB 0644
cc_scripts_per_once.py File 1.78 KB 0644
cc_scripts_user.py File 1.87 KB 0644
cc_scripts_vendor.py File 2.31 KB 0644
cc_seed_random.py File 4.81 KB 0644
cc_set_hostname.py File 4.89 KB 0644
cc_set_passwords.py File 11.05 KB 0644
cc_snap.py File 6.39 KB 0644
cc_spacewalk.py File 3.52 KB 0644
cc_ssh.py File 14.03 KB 0644
cc_ssh_authkey_fingerprints.py File 4.24 KB 0644
cc_ssh_import_id.py File 5.82 KB 0644
cc_timezone.py File 1.44 KB 0644
cc_ubuntu_advantage.py File 16.88 KB 0644
cc_ubuntu_autoinstall.py File 4.56 KB 0644
cc_ubuntu_drivers.py File 4.63 KB 0644
cc_update_etc_hosts.py File 5.11 KB 0644
cc_update_hostname.py File 3.63 KB 0644
cc_users_groups.py File 7.6 KB 0644
cc_wireguard.py File 9.28 KB 0644
cc_write_files.py File 6.75 KB 0644
cc_write_files_deferred.py File 1.68 KB 0644
cc_yum_add_repo.py File 7.47 KB 0644
cc_zypper_add_repo.py File 6.68 KB 0644
modules.py File 11.43 KB 0644
schema.py File 43.14 KB 0644