3d8e3690ba
We also leverage systemd-networkd for managing lxc-net and replace using of custom service template for lxc-dnsmasq service with our systemd-service role. These changes are quite tighten together, so it's quite hard to split them in different patchsets. Depends-On: https://review.opendev.org/c/openstack/ansible-role-systemd_service/+/861350 Change-Id: I5ac99e2b6c6e6ccd9da18ae68e1f8801f95f4f4e
380 lines
13 KiB
Django/Jinja
380 lines
13 KiB
Django/Jinja
#!/usr/bin/env bash
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# This script was built for the express purpose of managing LXC on a
|
|
# host. The functions within this script provide for common operations
|
|
# that may be required when working with LXC in production.
|
|
|
|
# {{ ansible_managed }}
|
|
|
|
export USE_LXC_BRIDGE="true"
|
|
export LXC_BRIDGE="{{ lxc_net_bridge }}"
|
|
export LXC_ADDR="{{ lxc_net_address }}"
|
|
export LXC_NETMASK="{{ lxc_net_netmask }}"
|
|
export LXC_NETWORK="${LXC_ADDR}/${LXC_NETMASK}"
|
|
export LXC_DHCP_RANGE="{{ lxc_net_dhcp_range }}"
|
|
export LXC_DHCP_MAX="{{ lxc_net_dhcp_max }}"
|
|
export LXC_IPV6_ADDR="{{ lxc_net6_address }}"
|
|
export LXC_IPV6_MASK="{{ lxc_net6_netmask }}"
|
|
export LXC_IPV6_NETWORK="${LXC_IPV6_ADDR}/${LXC_IPV6_MASK}"
|
|
export LXC_IPV6_NAT="{{ lxc_net6_nat }}"
|
|
export LXC_DHCP_CONFILE="{{ lxc_net_dhcp_config }}"
|
|
export LXC_DNSMASQ_USER="{{ lxc_net_dnsmasq_user }}"
|
|
export VARRUN="/run/lxc"
|
|
export LXC_DOMAIN="{{ lxc_net_domain }}"
|
|
|
|
function warn {
|
|
echo -e "\e[0;35m${@}\e[0m"
|
|
}
|
|
|
|
function info {
|
|
echo -e "\e[0;33m${@}\e[0m"
|
|
}
|
|
|
|
function success {
|
|
echo -e "\e[0;32m${@}\e[0m"
|
|
}
|
|
|
|
function remove_rules {
|
|
info "Removing LXC IPtables rules."
|
|
# Remove rules from the INPUT chain
|
|
iptables ${USE_IPTABLES_LOCK} -D INPUT -i "${LXC_BRIDGE}" -p udp --dport 67 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -D INPUT -i "${LXC_BRIDGE}" -p tcp --dport 67 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -D INPUT -i "${LXC_BRIDGE}" -p udp --dport 53 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -D INPUT -i "${LXC_BRIDGE}" -p tcp --dport 53 -j ACCEPT
|
|
|
|
# Remove rules from the FORWARDING chain
|
|
iptables ${USE_IPTABLES_LOCK} -D FORWARD -i "${LXC_BRIDGE}" -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -D FORWARD -o "${LXC_BRIDGE}" -j ACCEPT
|
|
|
|
# Remove rules from the nat POSTROUTING chain
|
|
iptables ${USE_IPTABLES_LOCK} -t nat \
|
|
-D POSTROUTING \
|
|
-s "${LXC_NETWORK}" ! \
|
|
-d "${LXC_NETWORK}" \
|
|
-j MASQUERADE || true
|
|
|
|
if [ "$LXC_IPV6_NAT" = "true" ]; then
|
|
ip6tables ${USE_IPTABLES_LOCK} -t nat -D POSTROUTING -s ${LXC_IPV6_NETWORK} ! -d ${LXC_IPV6_NETWORK} -j MASQUERADE
|
|
fi
|
|
|
|
success "LXC IPtables rules removed."
|
|
}
|
|
|
|
function add_rules {
|
|
info "Creating LXC IPtables rules."
|
|
set -e
|
|
# Set ip_prwarding
|
|
sysctl -w net.ipv4.ip_forward=1 > /dev/null 2>&1
|
|
echo 0 > /proc/sys/net/ipv6/conf/${LXC_BRIDGE}/accept_dad || true
|
|
|
|
# Configure IPv6 if necessary
|
|
if [ -n "$LXC_IPV6_ADDR" ] && [ -n "$LXC_IPV6_MASK" ] && [ -n "$LXC_IPV6_NETWORK" ]; then
|
|
echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
|
|
echo 0 > /proc/sys/net/ipv6/conf/${LXC_BRIDGE}/autoconf
|
|
ip -6 addr add dev ${LXC_BRIDGE} ${LXC_IPV6_ADDR}/${LXC_IPV6_MASK} || true
|
|
if [ "$LXC_IPV6_NAT" = "true" ]; then
|
|
ip6tables $USE_IPTABLES_LOCK -t nat -A POSTROUTING -s ${LXC_IPV6_NETWORK} ! -d ${LXC_IPV6_NETWORK} -j MASQUERADE
|
|
fi
|
|
fi
|
|
|
|
# Add rules to the INPUT chain
|
|
iptables ${USE_IPTABLES_LOCK} -I INPUT -i "${LXC_BRIDGE}" -p udp --dport 67 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -I INPUT -i "${LXC_BRIDGE}" -p tcp --dport 67 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -I INPUT -i "${LXC_BRIDGE}" -p udp --dport 53 -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -I INPUT -i "${LXC_BRIDGE}" -p tcp --dport 53 -j ACCEPT
|
|
|
|
# Add rules to the FORWARDING chain
|
|
iptables ${USE_IPTABLES_LOCK} -I FORWARD -i "${LXC_BRIDGE}" -j ACCEPT
|
|
iptables ${USE_IPTABLES_LOCK} -I FORWARD -o "${LXC_BRIDGE}" -j ACCEPT
|
|
|
|
# Add rules to the nat POSTROUTING chain
|
|
iptables ${USE_IPTABLES_LOCK} -t nat \
|
|
-A POSTROUTING \
|
|
-s "${LXC_NETWORK}" ! \
|
|
-d "${LXC_NETWORK}" \
|
|
-j MASQUERADE
|
|
|
|
success "LXC IPtables rules created."
|
|
}
|
|
|
|
function cleanup {
|
|
# Clean up everything
|
|
remove_rules
|
|
|
|
# Set the lxc bridge interface down
|
|
ip link set "${LXC_BRIDGE}" down || true
|
|
|
|
# Remove the lxc bridge interface
|
|
brctl delbr "${LXC_BRIDGE}" || true
|
|
}
|
|
|
|
function pre_up {
|
|
# Create the run directory if needed.
|
|
if [[ ! -d "${VARRUN}" ]];then
|
|
mkdir -p "${VARRUN}"
|
|
fi
|
|
|
|
# Source the lxc defaults
|
|
if [[ -f "{{ system_config_dir}}/lxc" ]]; then
|
|
source "{{ system_config_dir}}/lxc"
|
|
fi
|
|
|
|
# Set the lock type where applicable
|
|
USE_IPTABLES_LOCK="-w"
|
|
iptables -w -L -n > /dev/null 2>&1 || USE_IPTABLES_LOCK=""
|
|
}
|
|
|
|
function start_dnsmasq {
|
|
set -e
|
|
info "Starting LXC dnsmasq."
|
|
|
|
# Configure IPv6 if necessary
|
|
LXC_IPV6_ARG=""
|
|
if [ -n "$LXC_IPV6_ADDR" ] && [ -n "$LXC_IPV6_MASK" ] && [ -n "$LXC_IPV6_NETWORK" ]; then
|
|
LXC_IPV6_ARG="--dhcp-range=${LXC_IPV6_ADDR},ra-only --listen-address ${LXC_IPV6_ADDR}"
|
|
fi
|
|
|
|
dnsmasq "${LXC_DOMAIN_ARG}" --user="${LXC_DNSMASQ_USER}" \
|
|
--pid-file="${VARRUN}/dnsmasq.pid" \
|
|
--conf-file="${LXC_DHCP_CONFILE}" \
|
|
--listen-address="${LXC_ADDR}" \
|
|
--dhcp-range="${LXC_DHCP_RANGE}" \
|
|
--dhcp-option="6,${LXC_ADDR}" \
|
|
--dhcp-lease-max="${LXC_DHCP_MAX}" \
|
|
--except-interface="lo" \
|
|
--interface="${LXC_BRIDGE}" \
|
|
--dhcp-leasefile="${DHCP_LEASE_FILE}" \
|
|
--dhcp-no-override \
|
|
--strict-order \
|
|
--bind-interfaces \
|
|
--no-hosts \
|
|
--dhcp-authoritative $LXC_IPV6_ARG
|
|
success "dnsmasq started."
|
|
}
|
|
|
|
function start_containers_nicely {
|
|
set -e
|
|
# Start all containers on a host
|
|
success "Starting all containers."
|
|
for container in $(lxc-ls); do
|
|
lxc-start -d -n "${container}"
|
|
done
|
|
}
|
|
|
|
function stop_containers_nicely {
|
|
# Stop all containers on a host
|
|
warn "Stopping all containers."
|
|
for container in $(lxc-ls); do
|
|
lxc-stop -n "${container}"
|
|
done
|
|
}
|
|
|
|
function stop_containers_with_fire {
|
|
# Stop all containers on a host
|
|
warn "Stopping all containers with fire."
|
|
for container in $(lxc-ls); do
|
|
lxc-stop -k -n "${container}"
|
|
done
|
|
}
|
|
|
|
function start_networks {
|
|
set -e
|
|
if [ -f "/sys/class/net/${LXC_BRIDGE}/bridge/bridge_id" ];then
|
|
success "LXC container network is already online."
|
|
else
|
|
if [ ! "$(ip link set ${LXC_BRIDGE} up)" ];then
|
|
info "Building the LXC container network."
|
|
|
|
# Create lxc bridge
|
|
brctl addbr "${LXC_BRIDGE}" || true
|
|
|
|
# Set the lxc bridge up
|
|
ip link set "${LXC_BRIDGE}" up || true
|
|
|
|
# Assign an address to the lxc bridge
|
|
ip addr add "${LXC_ADDR}"/"${LXC_NETMASK}" dev "${LXC_BRIDGE}"
|
|
|
|
add_rules
|
|
|
|
LXC_DOMAIN_ARG=""
|
|
if [ -n "$LXC_DOMAIN" ]; then
|
|
LXC_DOMAIN_ARG="-s $LXC_DOMAIN -S /$LXC_DOMAIN/"
|
|
fi
|
|
|
|
# Start DNS mask
|
|
DHCP_LEASE_FILE="/var/lib/misc/dnsmasq.${LXC_BRIDGE}.leases"
|
|
start_dnsmasq
|
|
success "LXC container network has been created."
|
|
fi
|
|
fi
|
|
}
|
|
|
|
function stop_dnsmasq {
|
|
if [[ -f "${VARRUN}/dnsmasq.pid" ]];then
|
|
PID="$(cat ${VARRUN}/dnsmasq.pid)"
|
|
if [[ "${PID}" ]];then
|
|
warn "Stopping LXC dnsmasq."
|
|
kill -9 "${PID}" || true
|
|
fi
|
|
rm -f "${VARRUN}/dnsmasq.pid"
|
|
fi
|
|
}
|
|
|
|
function stop_networks {
|
|
warn "Destroying the LXC container network."
|
|
cleanup
|
|
stop_dnsmasq
|
|
}
|
|
|
|
function remove_down_veth {
|
|
info "Getting a list of all DOWN veth interfaces"
|
|
VETHPAIRS="$(ip link list | grep veth | grep "state DOWN" | awk '/veth/ {print $2}' | sed 's/\://g')"
|
|
if [[ "$VETHPAIRS" ]];then
|
|
warn "Removing all DOWN veth interfaces"
|
|
for veth in $VETHPAIRS; do
|
|
ip link delete dev "${veth}"
|
|
done
|
|
else
|
|
success "No DOWN veth interfaces to remove"
|
|
fi
|
|
}
|
|
|
|
function flush_cache {
|
|
warn "Flushing network cache"
|
|
ip -s -s neigh flush all
|
|
}
|
|
|
|
# Run through the base app setup
|
|
pre_up
|
|
|
|
# Check function
|
|
case "$1" in
|
|
containers-start)
|
|
start_containers_nicely
|
|
;;
|
|
containers-stop)
|
|
stop_containers_nicely
|
|
;;
|
|
containers-force-stop)
|
|
stop_containers_with_fire
|
|
;;
|
|
containers-restart)
|
|
stop_containers_nicely
|
|
start_containers_nicely
|
|
;;
|
|
containers-force-restart)
|
|
stop_containers_with_fire
|
|
start_containers_nicely
|
|
;;
|
|
system-tear-down)
|
|
stop_containers_nicely
|
|
remove_down_veth
|
|
stop_networks
|
|
flush_cache
|
|
;;
|
|
system-force-tear-down)
|
|
stop_containers_with_fire
|
|
remove_down_veth
|
|
stop_networks
|
|
flush_cache
|
|
;;
|
|
system-start-up)
|
|
start_networks
|
|
start_containers_nicely
|
|
;;
|
|
system-rebuild)
|
|
stop_containers_nicely
|
|
remove_down_veth
|
|
stop_networks
|
|
flush_cache
|
|
start_networks
|
|
start_containers_nicely
|
|
;;
|
|
system-force-rebuild)
|
|
stop_containers_with_fire
|
|
remove_down_veth
|
|
stop_networks
|
|
flush_cache
|
|
start_networks
|
|
start_containers_nicely
|
|
;;
|
|
dnsmasq-start)
|
|
start_dnsmasq
|
|
;;
|
|
dnsmasq-stop)
|
|
stop_dnsmasq
|
|
;;
|
|
dnsmasq-restart)
|
|
stop_dnsmasq
|
|
start_dnsmasq
|
|
;;
|
|
iptables-create)
|
|
add_rules
|
|
;;
|
|
iptables-remove)
|
|
remove_rules
|
|
;;
|
|
iptables-recreate)
|
|
remove_rules
|
|
add_rules
|
|
;;
|
|
veth-cleanup)
|
|
remove_down_veth
|
|
;;
|
|
flush-net-cache)
|
|
flush_cache
|
|
;;
|
|
*)
|
|
info 'Management of internal LXC systems and processes:'
|
|
echo '
|
|
containers-start Start all containers.
|
|
containers-stop Stop all containers.
|
|
containers-restart Stop all containers and then Start them.
|
|
containers-force-stop Force Stop all containers.
|
|
containers-force-restart Force Stop all containers and then Start them.
|
|
system-start-up Start up everything that LXC needs to
|
|
operate, including the containers, dnsmasq,
|
|
LXC bridge, and IPtables.
|
|
system-tear-down Tear down everything LXC on this system.
|
|
This will remove all LXC IPtables rules, kill
|
|
dnsmasq, remove the LXC bridge, stop all
|
|
containers, remove DOWN veth interfaces,
|
|
and flush the net cache.
|
|
system-force-tear-down Force tear down everything LXC on this system.
|
|
This will remove all LXC IPtables rules, kill
|
|
dnsmasq, remove the LXC bridge, stop all
|
|
containers, remove DOWN veth interfaces,
|
|
and flush the net cache.
|
|
system-rebuild Rebuild the LXC network, IPtables, dnsmasq,
|
|
remove DOWN veth interfaces, flush the
|
|
net cache, and restart all containers.
|
|
system-force-rebuild Force rebuild the LXC network, IPtables, dnsmasq,
|
|
remove DOWN veth interfaces, flush the
|
|
net cache, and restart all containers.
|
|
dnsmasq-start Start the LXC dnsmasq process.
|
|
dnsmasq-stop Stop the LXC dnsmasq process.
|
|
dnsmasq-restart Restart the LXC dnsmasq process.
|
|
iptables-create Create the LXC IPtables rules for NAT.
|
|
iptables-remove Remove the LXC IPtables rules for NAT.
|
|
iptables-recreate Recreate the LXC IPtables rules for NAT.
|
|
veth-cleanup Remove all DOWN veth interfaces from a system.
|
|
flush-net-cache Flush the host network cache. This is useful if
|
|
IP addresses are being recycled on to containers
|
|
from other hosts.
|
|
'
|
|
;;
|
|
esac
|