# lib/nova_plugins/hypervisor-libvirt # Configure the libvirt hypervisor # Enable with: # VIRT_DRIVER=libvirt # Dependencies: # ``functions`` file # ``nova`` configuration # ``STACK_USER`` has to be defined # install_nova_hypervisor - install any external requirements # configure_nova_hypervisor - make configuration changes, including those to other services # start_nova_hypervisor - start any external services # stop_nova_hypervisor - stop any external services # cleanup_nova_hypervisor - remove transient data and cache # Save trace setting MY_XTRACE=$(set +o | grep xtrace) set +o xtrace # Defaults # -------- # File injection is disabled by default in Nova. This will turn it back on. ENABLE_FILE_INJECTION=${ENABLE_FILE_INJECTION:-False} # Entry Points # ------------ # clean_nova_hypervisor - Clean up an installation function cleanup_nova_hypervisor { # This function intentionally left blank : } # configure_nova_hypervisor - Set config files, create data dirs, etc function configure_nova_hypervisor { if is_service_enabled neutron && is_neutron_ovs_base_plugin && ! sudo grep -q '^cgroup_device_acl' $QEMU_CONF; then # Add /dev/net/tun to cgroup_device_acls, needed for type=ethernet interfaces cat </dev/null; then sudo groupadd $LIBVIRT_GROUP fi add_user_to_group $STACK_USER $LIBVIRT_GROUP # libvirt detects various settings on startup, as we potentially changed # the system configuration (modules, filesystems), we need to restart # libvirt to detect those changes. restart_service $LIBVIRT_DAEMON iniset $NOVA_CONF DEFAULT libvirt_type "$LIBVIRT_TYPE" iniset $NOVA_CONF DEFAULT libvirt_cpu_mode "none" iniset $NOVA_CONF DEFAULT use_usb_tablet "False" iniset $NOVA_CONF DEFAULT default_ephemeral_format "ext4" iniset $NOVA_CONF DEFAULT compute_driver "libvirt.LibvirtDriver" LIBVIRT_FIREWALL_DRIVER=${LIBVIRT_FIREWALL_DRIVER:-"nova.virt.libvirt.firewall.IptablesFirewallDriver"} iniset $NOVA_CONF DEFAULT firewall_driver "$LIBVIRT_FIREWALL_DRIVER" # Power architecture currently does not support graphical consoles. if is_arch "ppc64"; then iniset $NOVA_CONF DEFAULT vnc_enabled "false" fi ENABLE_FILE_INJECTION=$(trueorfalse False $ENABLE_FILE_INJECTION) if [[ "$ENABLE_FILE_INJECTION" = "True" ]] ; then # When libguestfs is available for file injection, enable using # libguestfs to inspect the image and figure out the proper # partition to inject into. iniset $NOVA_CONF libvirt inject_partition '-1' iniset $NOVA_CONF libvirt inject_key 'true' else # File injection is being disabled by default in the near future - # disable it here for now to avoid surprises later. iniset $NOVA_CONF libvirt inject_partition '-2' fi } # install_nova_hypervisor() - Install external components function install_nova_hypervisor { if is_ubuntu; then install_package kvm install_package libvirt-bin install_package python-libvirt install_package python-guestfs elif is_fedora || is_suse; then install_package kvm install_package libvirt install_package libvirt-python install_package python-libguestfs fi # Install and configure **LXC** if specified. LXC is another approach to # splitting a system into many smaller parts. LXC uses cgroups and chroot # to simulate multiple systems. if [[ "$LIBVIRT_TYPE" == "lxc" ]]; then if is_ubuntu; then if [[ "$DISTRO" > natty ]]; then install_package cgroup-lite fi else ### FIXME(dtroyer): figure this out echo "RPM-based cgroup not implemented yet" yum_install libcgroup-tools fi fi } # start_nova_hypervisor - Start any required external services function start_nova_hypervisor { # This function intentionally left blank : } # stop_nova_hypervisor - Stop any external services function stop_nova_hypervisor { # This function intentionally left blank : } # Restore xtrace $MY_XTRACE # Local variables: # mode: shell-script # End: