[pve-devel] [PATCH v3 pve-container] Add new pct fsck command to check the mountpoints of a container
Emmanuel Kasper
e.kasper at proxmox.com
Wed Oct 14 14:47:23 CEST 2015
* the filesystem specific command will be called automatically by fsck
* the -a flag ensures that the filesystem can be fixed without any questions
* the -f flag forces a filesystem check even if the fs seems clean
(flags similar to what the fsck systemd unit uses)
---
src/PVE/CLI/pct.pm | 83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 83 insertions(+)
diff --git a/src/PVE/CLI/pct.pm b/src/PVE/CLI/pct.pm
index 8c56f89..ccb01bb 100755
--- a/src/PVE/CLI/pct.pm
+++ b/src/PVE/CLI/pct.pm
@@ -124,6 +124,88 @@ __PACKAGE__->register_method ({
exec('lxc-attach', '-n', $param->{vmid}, '--', @{$param->{'extra-args'}});
}});
+ __PACKAGE__->register_method ({
+ name => 'fsck',
+ path => 'fsck',
+ method => 'PUT',
+ description => "Run a filesystem check on a container volume",
+ parameters => {
+ additionalProperties => 0,
+ properties => {
+ vmid => get_standard_option('pve-vmid', { completion => \&PVE::LXC::complete_ctid_stopped }),
+ force => {
+ optional => 1,
+ type => 'boolean',
+ description => "Force checking, even if the filesystem seems clean",
+ default => 0,
+ },
+ device => {
+ optional => 1,
+ type => 'string',
+ description => "A volume on which to run the filesystem check",
+ enum => [PVE::LXC::mountpoint_names()],
+ },
+ },
+ },
+ returns => { type => 'null' },
+ code => sub {
+
+ my ($param) = @_;
+ my $vmid = $param->{'vmid'};
+ my $device = defined($param->{'device'}) ? $param->{'device'} : 'rootfs';
+
+ my $command = ['fsck', '-a', '-l'];
+ push(@$command, '-f') if $param->{force};
+
+ # critical path: all of this will be done while the container is locked
+ my $do_fsck = sub {
+
+ my $conf = PVE::LXC::load_config($vmid);
+ my $storage_cfg = PVE::Storage::config();
+
+ defined($conf->{$device}) || die "cannot run command on unexisting mountpoint $device\n";
+
+ my $mount_point = PVE::LXC::parse_ct_mountpoint($conf->{$device});
+ my $volid = $mount_point->{volume};
+
+ my $path;
+ my $storage_id = PVE::Storage::parse_volume_id($volid, 1);
+
+ if ($storage_id) {
+ # skip zfs datasets
+ my (undef, undef, undef, undef, undef, undef, $format) =
+ PVE::Storage::parse_volname($storage_cfg, $volid);
+ my $storage_id_cfg = PVE::Storage::storage_config($storage_cfg, $storage_id);
+
+ if (($storage_id_cfg->{'type'} eq 'zfspool') && ($format eq 'subvol')) {
+ die "cannot run command, $device does not point to a block device or volume\n";
+ }
+
+ $path = PVE::Storage::path($storage_cfg, $volid);
+
+ } else {
+ # todo: move both checks to utility function
+ # skip bind mounts
+ if ($volid =~ m|^/.+| && $volid !~ m|^/dev/.+|) {
+ die "cannot run command, $device does not point to a block device or volume\n";
+ } elsif ($volid =~ m|^/dev/.+|) {
+ # pass block devices directly
+ $path = $volid;
+ } else {
+ die "unknown storage configuration";
+ }
+ }
+
+ push(@$command, $path);
+
+ PVE::LXC::check_running($vmid) && die "cannot run command on active container\n";
+ PVE::Tools::run_command($command);
+ };
+
+ PVE::LXC::lock_container($vmid, undef, $do_fsck);
+ return undef;
+ }});
+
our $cmddef = {
list=> [ 'PVE::API2::LXC', 'vmlist', [], { node => $nodename }, sub {
my $res = shift;
@@ -165,6 +247,7 @@ our $cmddef = {
enter => [ __PACKAGE__, 'enter', ['vmid']],
unlock => [ __PACKAGE__, 'unlock', ['vmid']],
exec => [ __PACKAGE__, 'exec', ['vmid', 'extra-args']],
+ fsck => [ __PACKAGE__, 'fsck', ['vmid']],
destroy => [ 'PVE::API2::LXC', 'destroy_vm', ['vmid'],
{ node => $nodename }, $upid_exit ],
--
2.1.4
More information about the pve-devel
mailing list