public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Daniel Kral <d.kral@proxmox.com>
To: pve-devel@lists.proxmox.com
Subject: [pve-devel] [PATCH ha-manager v3 13/15] api: introduce ha rules api endpoints
Date: Fri,  4 Jul 2025 20:16:53 +0200	[thread overview]
Message-ID: <20250704181659.465441-15-d.kral@proxmox.com> (raw)
In-Reply-To: <20250704181659.465441-1-d.kral@proxmox.com>

Add CRUD API endpoints for HA rules, which assert whether the given
properties for the rules are valid and will not make the existing rule
set infeasible.

Disallowing changes to the rule set via the API, which would make this
and other rules infeasible, makes it safer for users of the HA Manager
to not disrupt the behavior that other rules already enforce.

This functionality can obviously not safeguard manual changes to the
rules config file itself, but manual changes that result in infeasible
rules will be dropped on the next canonalize(...) call by the HA
Manager anyway with a log message.

Signed-off-by: Daniel Kral <d.kral@proxmox.com>
---
 debian/pve-ha-manager.install |   1 +
 src/PVE/API2/HA/Makefile      |   2 +-
 src/PVE/API2/HA/Rules.pm      | 391 ++++++++++++++++++++++++++++++++++
 3 files changed, 393 insertions(+), 1 deletion(-)
 create mode 100644 src/PVE/API2/HA/Rules.pm

diff --git a/debian/pve-ha-manager.install b/debian/pve-ha-manager.install
index 7462663..b4eff27 100644
--- a/debian/pve-ha-manager.install
+++ b/debian/pve-ha-manager.install
@@ -16,6 +16,7 @@
 /usr/share/man/man8/pve-ha-lrm.8.gz
 /usr/share/perl5/PVE/API2/HA/Groups.pm
 /usr/share/perl5/PVE/API2/HA/Resources.pm
+/usr/share/perl5/PVE/API2/HA/Rules.pm
 /usr/share/perl5/PVE/API2/HA/Status.pm
 /usr/share/perl5/PVE/CLI/ha_manager.pm
 /usr/share/perl5/PVE/HA/CRM.pm
diff --git a/src/PVE/API2/HA/Makefile b/src/PVE/API2/HA/Makefile
index 5686efc..86c1013 100644
--- a/src/PVE/API2/HA/Makefile
+++ b/src/PVE/API2/HA/Makefile
@@ -1,4 +1,4 @@
-SOURCES=Resources.pm Groups.pm Status.pm
+SOURCES=Resources.pm Groups.pm Rules.pm Status.pm
 
 .PHONY: install
 install:
diff --git a/src/PVE/API2/HA/Rules.pm b/src/PVE/API2/HA/Rules.pm
new file mode 100644
index 0000000..2e5e382
--- /dev/null
+++ b/src/PVE/API2/HA/Rules.pm
@@ -0,0 +1,391 @@
+package PVE::API2::HA::Rules;
+
+use strict;
+use warnings;
+
+use HTTP::Status qw(:constants);
+
+use Storable qw(dclone);
+
+use PVE::Cluster qw(cfs_read_file);
+use PVE::Exception;
+use PVE::Tools qw(extract_param);
+use PVE::JSONSchema qw(get_standard_option);
+
+use PVE::HA::Config;
+use PVE::HA::Groups;
+use PVE::HA::Rules;
+
+use base qw(PVE::RESTHandler);
+
+my $get_api_ha_rule = sub {
+    my ($rules, $ruleid, $rule_errors) = @_;
+
+    die "no such ha rule '$ruleid'\n" if !$rules->{ids}->{$ruleid};
+
+    my $rule_cfg = dclone($rules->{ids}->{$ruleid});
+
+    $rule_cfg->{rule} = $ruleid;
+    $rule_cfg->{digest} = $rules->{digest};
+    $rule_cfg->{order} = $rules->{order}->{$ruleid};
+
+    # set optional rule parameter's default values
+    PVE::HA::Rules->set_rule_defaults($rule_cfg);
+
+    if ($rule_cfg->{resources}) {
+        $rule_cfg->{resources} =
+            PVE::HA::Rules->encode_value($rule_cfg->{type}, 'resources', $rule_cfg->{resources});
+    }
+
+    if ($rule_cfg->{nodes}) {
+        $rule_cfg->{nodes} =
+            PVE::HA::Rules->encode_value($rule_cfg->{type}, 'nodes', $rule_cfg->{nodes});
+    }
+
+    if ($rule_errors) {
+        $rule_cfg->{errors} = $rule_errors;
+    }
+
+    return $rule_cfg;
+};
+
+my $assert_resources_are_configured = sub {
+    my ($resources) = @_;
+
+    my $unconfigured_resources = [];
+
+    for my $resource (sort keys %$resources) {
+        push @$unconfigured_resources, $resource
+            if !PVE::HA::Config::service_is_configured($resource);
+    }
+
+    die "cannot use unmanaged resource(s) " . join(', ', @$unconfigured_resources) . ".\n"
+        if @$unconfigured_resources;
+};
+
+my $assert_nodes_do_exist = sub {
+    my ($nodes) = @_;
+
+    my $nonexistant_nodes = [];
+
+    for my $node (sort keys %$nodes) {
+        push @$nonexistant_nodes, $node
+            if !PVE::Cluster::check_node_exists($node, 1);
+    }
+
+    die "cannot use non-existant node(s) " . join(', ', @$nonexistant_nodes) . ".\n"
+        if @$nonexistant_nodes;
+};
+
+my $get_full_rules_config = sub {
+    my ($rules) = @_;
+
+    # set optional rule parameter's default values
+    for my $rule (values %{ $rules->{ids} }) {
+        PVE::HA::Rules->set_rule_defaults($rule);
+    }
+
+    # TODO PVE 10: Remove group migration when HA groups have been fully migrated to location rules
+    my $groups = PVE::HA::Config::read_group_config();
+    my $resources = PVE::HA::Config::read_and_check_resources_config();
+
+    PVE::HA::Groups::migrate_groups_to_rules($rules, $groups, $resources);
+
+    return $rules;
+};
+
+my $check_feasibility = sub {
+    my ($rules) = @_;
+
+    $rules = dclone($rules);
+
+    $rules = $get_full_rules_config->($rules);
+
+    return PVE::HA::Rules->check_feasibility($rules);
+};
+
+my $assert_feasibility = sub {
+    my ($rules, $ruleid) = @_;
+
+    my $global_errors = $check_feasibility->($rules);
+    my $rule_errors = $global_errors->{$ruleid};
+
+    return if !$rule_errors;
+
+    # stringify error messages
+    for my $opt (keys %$rule_errors) {
+        $rule_errors->{$opt} = join(', ', @{ $rule_errors->{$opt} });
+    }
+
+    my $param = {
+        code => HTTP_BAD_REQUEST,
+        errors => $rule_errors,
+    };
+
+    my $exc = PVE::Exception->new("Rule '$ruleid' is invalid.\n", %$param);
+
+    my ($pkg, $filename, $line) = caller;
+
+    $exc->{filename} = $filename;
+    $exc->{line} = $line;
+
+    die $exc;
+};
+
+__PACKAGE__->register_method({
+    name => 'index',
+    path => '',
+    method => 'GET',
+    description => "Get HA rules.",
+    permissions => {
+        check => ['perm', '/', ['Sys.Audit']],
+    },
+    parameters => {
+        additionalProperties => 0,
+        properties => {
+            type => {
+                type => 'string',
+                description => "Limit the returned list to the specified rule type.",
+                enum => PVE::HA::Rules->lookup_types(),
+                optional => 1,
+            },
+            resource => {
+                type => 'string',
+                description =>
+                    "Limit the returned list to rules affecting the specified resource.",
+                completion => \&PVE::HA::Tools::complete_sid,
+                optional => 1,
+            },
+        },
+    },
+    returns => {
+        type => 'array',
+        items => {
+            type => 'object',
+            properties => {
+                rule => { type => 'string' },
+            },
+            links => [{ rel => 'child', href => '{rule}' }],
+        },
+    },
+    code => sub {
+        my ($param) = @_;
+
+        my $type = extract_param($param, 'type');
+        my $state = extract_param($param, 'state');
+        my $resource = extract_param($param, 'resource');
+
+        my $rules = PVE::HA::Config::read_rules_config();
+        $rules = $get_full_rules_config->($rules);
+
+        my $global_errors = $check_feasibility->($rules);
+
+        my $res = [];
+
+        PVE::HA::Rules::foreach_rule(
+            $rules,
+            sub {
+                my ($rule, $ruleid) = @_;
+
+                my $rule_errors = $global_errors->{$ruleid};
+                my $rule_cfg = $get_api_ha_rule->($rules, $ruleid, $rule_errors);
+
+                push @$res, $rule_cfg;
+            },
+            {
+                type => $type,
+                sid => $resource,
+            },
+        );
+
+        return $res;
+    },
+});
+
+__PACKAGE__->register_method({
+    name => 'read_rule',
+    method => 'GET',
+    path => '{rule}',
+    description => "Read HA rule.",
+    permissions => {
+        check => ['perm', '/', ['Sys.Audit']],
+    },
+    parameters => {
+        additionalProperties => 0,
+        properties => {
+            rule => get_standard_option(
+                'pve-ha-rule-id',
+                { completion => \&PVE::HA::Tools::complete_rule },
+            ),
+        },
+    },
+    returns => {
+        type => 'object',
+        properties => {
+            rule => get_standard_option('pve-ha-rule-id'),
+            type => {
+                type => 'string',
+            },
+        },
+    },
+    code => sub {
+        my ($param) = @_;
+
+        my $ruleid = extract_param($param, 'rule');
+
+        my $rules = PVE::HA::Config::read_rules_config();
+        $rules = $get_full_rules_config->($rules);
+
+        my $global_errors = $check_feasibility->($rules);
+        my $rule_errors = $global_errors->{$ruleid};
+
+        return $get_api_ha_rule->($rules, $ruleid, $rule_errors);
+    },
+});
+
+__PACKAGE__->register_method({
+    name => 'create_rule',
+    method => 'POST',
+    path => '',
+    description => "Create HA rule.",
+    permissions => {
+        check => ['perm', '/', ['Sys.Console']],
+    },
+    protected => 1,
+    parameters => PVE::HA::Rules->createSchema(),
+    returns => {
+        type => 'null',
+    },
+    code => sub {
+        my ($param) = @_;
+
+        PVE::Cluster::check_cfs_quorum();
+        mkdir("/etc/pve/ha");
+
+        my $type = extract_param($param, 'type');
+        my $ruleid = extract_param($param, 'rule');
+
+        my $plugin = PVE::HA::Rules->lookup($type);
+
+        my $opts = $plugin->check_config($ruleid, $param, 1, 1);
+
+        PVE::HA::Config::lock_ha_domain(
+            sub {
+                my $rules = PVE::HA::Config::read_rules_config();
+
+                die "HA rule '$ruleid' already defined\n" if $rules->{ids}->{$ruleid};
+
+                $assert_resources_are_configured->($opts->{resources});
+                $assert_nodes_do_exist->($opts->{nodes}) if $opts->{nodes};
+
+                $rules->{order}->{$ruleid} = PVE::HA::Rules::get_next_ordinal($rules);
+                $rules->{ids}->{$ruleid} = $opts;
+
+                $assert_feasibility->($rules, $ruleid);
+
+                PVE::HA::Config::write_rules_config($rules);
+            },
+            "create ha rule failed",
+        );
+
+        return undef;
+    },
+});
+
+__PACKAGE__->register_method({
+    name => 'update_rule',
+    method => 'PUT',
+    path => '{rule}',
+    description => "Update HA rule.",
+    permissions => {
+        check => ['perm', '/', ['Sys.Console']],
+    },
+    protected => 1,
+    parameters => PVE::HA::Rules->updateSchema(),
+    returns => {
+        type => 'null',
+    },
+    code => sub {
+        my ($param) = @_;
+
+        my $ruleid = extract_param($param, 'rule');
+        my $digest = extract_param($param, 'digest');
+        my $delete = extract_param($param, 'delete');
+
+        if ($delete) {
+            $delete = [PVE::Tools::split_list($delete)];
+        }
+
+        PVE::HA::Config::lock_ha_domain(
+            sub {
+                my $rules = PVE::HA::Config::read_rules_config();
+
+                PVE::SectionConfig::assert_if_modified($rules, $digest);
+
+                my $rule = $rules->{ids}->{$ruleid} || die "HA rule '$ruleid' does not exist\n";
+
+                my $type = $rule->{type};
+                my $plugin = PVE::HA::Rules->lookup($type);
+                my $opts = $plugin->check_config($ruleid, $param, 0, 1);
+
+                $assert_resources_are_configured->($opts->{resources});
+                $assert_nodes_do_exist->($opts->{nodes}) if $opts->{nodes};
+
+                my $options = $plugin->private()->{options}->{$type};
+                PVE::SectionConfig::delete_from_config($rule, $options, $opts, $delete);
+
+                $rule->{$_} = $opts->{$_} for keys $opts->%*;
+
+                $assert_feasibility->($rules, $ruleid);
+
+                PVE::HA::Config::write_rules_config($rules);
+            },
+            "update HA rules failed",
+        );
+
+        return undef;
+    },
+});
+
+__PACKAGE__->register_method({
+    name => 'delete_rule',
+    method => 'DELETE',
+    path => '{rule}',
+    description => "Delete HA rule.",
+    permissions => {
+        check => ['perm', '/', ['Sys.Console']],
+    },
+    protected => 1,
+    parameters => {
+        additionalProperties => 0,
+        properties => {
+            rule => get_standard_option(
+                'pve-ha-rule-id',
+                { completion => \&PVE::HA::Tools::complete_rule },
+            ),
+        },
+    },
+    returns => {
+        type => 'null',
+    },
+    code => sub {
+        my ($param) = @_;
+
+        my $ruleid = extract_param($param, 'rule');
+
+        PVE::HA::Config::lock_ha_domain(
+            sub {
+                my $rules = PVE::HA::Config::read_rules_config();
+
+                delete $rules->{ids}->{$ruleid};
+
+                PVE::HA::Config::write_rules_config($rules);
+            },
+            "delete ha rule failed",
+        );
+
+        return undef;
+    },
+});
+
+1;
-- 
2.39.5



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel


  parent reply	other threads:[~2025-07-04 18:17 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-07-04 18:16 [pve-devel] [PATCH cluster/docs/ha-manager/manager v3 00/20] HA Rules Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH cluster v3 1/1] cfs: add 'ha/rules.cfg' to observed files Daniel Kral
2025-07-16 14:02   ` [pve-devel] applied: " Thomas Lamprecht
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 01/15] tree-wide: make arguments for select_service_node explicit Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 02/15] manager: improve signature of select_service_node Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 03/15] introduce rules base plugin Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 04/15] rules: introduce node affinity rule plugin Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 05/15] config, env, hw: add rules read and parse methods Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 06/15] config: delete services from rules if services are deleted from config Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 07/15] manager: read and update rules config Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 08/15] test: ha tester: add test cases for future node affinity rules Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 09/15] resources: introduce failback property in ha resource config Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 10/15] manager: migrate ha groups to node affinity rules in-memory Daniel Kral
2025-07-22 16:38   ` Michael Köppl
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 11/15] manager: apply node affinity rules when selecting service nodes Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 12/15] test: add test cases for rules config Daniel Kral
2025-07-04 18:16 ` Daniel Kral [this message]
2025-07-04 18:16 ` [pve-devel] [PATCH ha-manager v3 14/15] cli: expose ha rules api endpoints to ha-manager cli Daniel Kral
2025-07-04 18:16 ` [pve-devel] [RFC ha-manager v3 15/15] manager: persistently migrate ha groups to ha rules Daniel Kral
2025-07-22 16:38   ` Michael Köppl
2025-07-22 16:56     ` Michael Köppl
2025-07-04 18:16 ` [pve-devel] [PATCH docs v3 1/1] ha: add documentation about ha rules and ha node affinity rules Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH manager v3 1/3] api: ha: add ha rules api endpoints Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH manager v3 2/3] ui: ha: remove ha groups from ha resource components Daniel Kral
2025-07-04 18:16 ` [pve-devel] [PATCH manager v3 3/3] ui: ha: show failback flag in resources status view Daniel Kral
2025-07-22 16:38 ` [pve-devel] [PATCH cluster/docs/ha-manager/manager v3 00/20] HA Rules Michael Köppl
2025-07-23 15:36   ` Michael Köppl
2025-07-30 10:13 ` [pve-devel] superseded: " Daniel Kral

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250704181659.465441-15-d.kral@proxmox.com \
    --to=d.kral@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal