-
Notifications
You must be signed in to change notification settings - Fork 13
/
cloud.go
1001 lines (889 loc) · 31.8 KB
/
cloud.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
// Copyright © 2016-2017 Genome Research Limited
// Author: Sendu Bala <sb10@sanger.ac.uk>.
//
// This file is part of wr.
//
// wr is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// wr is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with wr. If not, see <http://www.gnu.org/licenses/>.
/*
Package cloud provides functions to interact with cloud providers, used to
create cloud resources so that you can spawn servers, then delete those
resources when you're done.
Currently implemented providers are OpenStack, with AWS planned for the future.
The implementation of each supported provider is in its own .go file.
It's a pseudo plug-in system in that it is designed so that you can easily add a
go file that implements the methods of the provideri interface, to support a
new cloud provider. On the other hand, there is no dynamic loading of these go
files; they are all imported (they all belong to the cloud package), and the
correct one used at run time. To "register" a new provideri implementation you
must add a case for it to New() and RequiredEnv() and rebuild. The spawn()
method must create a file at the path sentinelFilePath once the system has
finalised its boot up and is fully ready to use.
Please note that the methods in this package are NOT safe to be used by more
than 1 process at a time.
import "github.com/VertebrateResequencing/wr/cloud"
// deploy
provider, err := cloud.New("openstack", "wr-production-username", "/home/username/.wr-production/created_cloud_resources")
err = provider.Deploy(&cloud.DeployConfig{
RequiredPorts: []int{22},
GatewayIP: "192.168.0.1",
CIDR: "192.168.0.0/18",
DNSNameServers: [...]string{"8.8.4.4", "8.8.8.8"},
})
// spawn a server
flavor := provider.CheapestServerFlavor(1, 1024, "")
server, err = provider.Spawn("Ubuntu Xenial", "ubuntu", flavor.ID, 20, 120 * time.Second, true)
server.WaitUntilReady()
// simplistic way of making the most of the server by running as many
// commands as possible:
for _, cmd := range myCmds {
if server.HasSpaceFor(1, 1024, 1) > 0 {
server.Allocate(1, 1024, 1)
go func() {
server.RunCmd(cmd, false)
server.Release(1, 1024, 1)
}()
} else {
break
}
}
// destroy everything created
provider.TearDown()
*/
package cloud
import (
"bytes"
"encoding/gob"
"errors"
"fmt"
"github.com/pkg/sftp"
"github.com/satori/go.uuid"
"golang.org/x/crypto/ssh"
"io"
"log"
"os"
"path/filepath"
"regexp"
"strings"
"sync"
"time"
)
// Err* constants are found in the returned Errors under err.Err, so you can
// cast and check if it's a certain type of error. ErrMissingEnv gets appended
// to with missing environment variable names, so check based on prefix.
var (
ErrBadProvider = "unknown provider name"
ErrMissingEnv = "missing environment variables: "
ErrBadResourceName = "your resource name prefix contains disallowed characters"
ErrNoFlavor = "no server flavor can meet your resource requirements"
ErrBadFlavor = "no server flavor with that id exists"
ErrBadRegex = "your flavor regular expression was not valid"
)
// sshTimeOut is how long we wait for ssh to work when an ssh request is made to
// a server.
var sshTimeOut = 5 * time.Minute
// sentinelFilePath is the file that provideri implementers must create on each
// spawn()ed server once it is fully ready to use.
const sentinelFilePath = "/tmp/.wr_cloud_sentinel"
// sentinelInitScript can be used as user data to the cloud-init mechanism to
// create sentinelFilePath.
var sentinelInitScript = []byte("#!/bin/bash\ntouch " + sentinelFilePath)
// sentinelTimeOut is how long we wait for sentinelFilePath to be created before
// we give up and return an error from Spawn().
var sentinelTimeOut = 10 * time.Minute
// defaultDNSNameServers holds some public (google) dns name server addresses
// for use when creating cloud subnets that need internet access.
var defaultDNSNameServers = [...]string{"8.8.4.4", "8.8.8.8"}
// defaultCIDR is a useful range allowing 16382 servers to be spawned, with a
// defaultGateWayIP at the start of that range
const defaultGateWayIP = "192.168.0.1"
const defaultCIDR = "192.168.0.0/18"
// Error records an error and the operation and provider caused it.
type Error struct {
Provider string // the provider's Name
Op string // name of the method
Err string // one of our Err* vars
}
func (e Error) Error() string {
return "cloud(" + e.Provider + ") " + e.Op + "(): " + e.Err
}
// Resources struct contains provider-specific details of every resource that
// we created, in a format understood by TearDown(), so that we can delete
// those resources when they're no longer needed. There are also fields for
// important things the user needs to know.
type Resources struct {
ResourceName string // the resource name prefix that resources were created with
Details map[string]string // whatever key values the provider needs to describe what it created
PrivateKey string // PEM format string of the key user would need to ssh in to any created servers
Servers map[string]*Server // the serverID => *Server mapping of any servers Spawn()ed with an external ip
}
// Quota struct describes the limit on what resources you are allowed to use (0
// values mean that resource is unlimited), and how much you have already used.
type Quota struct {
MaxRAM int // total MBs allowed
MaxCores int // total CPU cores allowed
MaxInstances int // max number of instances allowed
MaxVolume int // max GBs of volume storage that can be allocated
UsedRAM int
UsedCores int
UsedInstances int
UsedVolume int
}
// provideri must be satisfied to add support for a particular cloud provider.
type provideri interface {
requiredEnv() []string // return the environment variables required to function
initialize() error // do any initial config set up such as authentication
deploy(resources *Resources, requiredPorts []int, gatewayIP, cidr string, dnsNameServers []string) error // achieve the aims of Deploy(), recording what you create in resources.Details and resources.PrivateKey
inCloud() bool // achieve the aims of InCloud()
getQuota() (*Quota, error) // achieve the aims of GetQuota()
flavors() map[string]Flavor // return a map of all server flavors, with their flavor ids as keys
spawn(resources *Resources, os string, flavor string, diskGB int, externalIP bool) (serverID string, serverIP string, adminPass string, err error) // achieve the aims of Spawn(), creating sentinelFilePath once the new server is ready to use.
checkServer(serverID string) (working bool, err error) // achieve the aims of CheckServer()
destroyServer(serverID string) error // achieve the aims of DestroyServer()
tearDown(resources *Resources) error // achieve the aims of TearDown()
}
// Provider gives you access to all of the methods you'll need to interact with
// a cloud provider.
type Provider struct {
impl provideri
Name string
savePath string
resources *Resources
inCloud bool
madeHeadNode bool
}
// DeployConfig are the configuration options that you supply to Deploy().
// RequiredPorts is the slice of port numbers that your application needs to be
// able to communicate to any servers you spawn (eg. [22] for ssh) through. If a
// network and subnet need to be created, the GatewayIP and CIDR options will be
// used; they default to 192.168.0.1 and 192.168.0.0:18 respectively, allowing
// for 16381 servers to be Spawn()d later, with a maximum ip of 192.168.63.254.
// DNSNameServers is a slice of DNS name server IPs. It defaults to Google's:
// []string{"8.8.4.4", "8.8.8.8"}.
type DeployConfig struct {
RequiredPorts []int
GatewayIP string
CIDR string
DNSNameServers []string
}
// Flavor describes a "flavor" of server, which is a certain (virtual) hardware
// configuration
type Flavor struct {
ID string
Name string
Cores int
RAM int // MB
Disk int // GB
}
// Server provides details of the server that Spawn() created for you, and some
// methods that let you keep track of how you use that server.
type Server struct {
ID string
IP string // ip address that you could SSH to
OS string // the name of the Operating System image
UserName string // the username needed to log in to the server
AdminPass string
Flavor Flavor
Disk int // GB of available disk space
TTD time.Duration // amount of idle time allowed before destruction
IsHeadNode bool
usedRAM int
usedCores int
usedDisk int
onDeathrow bool
mutex sync.RWMutex
cancelDestruction chan bool
destroyed bool
provider *Provider
sshclient *ssh.Client
}
// Allocate records that the given resources have now been used up on this
// server.
func (s *Server) Allocate(cores, ramMB, diskGB int) {
s.mutex.Lock()
defer s.mutex.Unlock()
s.usedCores += cores
s.usedRAM += ramMB
s.usedDisk += diskGB
// if the host has initiated its countdown to destruction, cancel that
if s.onDeathrow {
s.cancelDestruction <- true
}
}
// Release records that the given resources have now been freed.
func (s *Server) Release(cores, ramMB, diskGB int) {
s.mutex.Lock()
defer s.mutex.Unlock()
s.usedCores -= cores
s.usedRAM -= ramMB
s.usedDisk -= diskGB
// if the server is now doing nothing, we'll initiate a countdown to
// destroying the host
if s.usedCores <= 0 && s.TTD.Seconds() > 0 {
go func() {
s.mutex.Lock()
if s.onDeathrow {
s.mutex.Unlock()
return
}
s.cancelDestruction = make(chan bool, 4) // *** the 4 is a hack to prevent deadlock, should find proper fix...
s.onDeathrow = true
s.mutex.Unlock()
timeToDie := time.After(s.TTD)
for {
select {
case <-s.cancelDestruction:
s.onDeathrow = false
return
case <-timeToDie:
// destroy the server
s.onDeathrow = false
s.Destroy()
return
}
}
}()
}
}
// HasSpaceFor considers the current usage (according to prior Allocation calls)
// and tells you how many of a cmd needing the given resources can run on this
// server.
func (s *Server) HasSpaceFor(cores, ramMB, diskGB int) int {
s.mutex.RLock()
defer s.mutex.RUnlock()
if (s.Flavor.Cores-s.usedCores < cores) || (s.Flavor.RAM-s.usedRAM < ramMB) || (s.Disk-s.usedDisk < diskGB) {
return 0
}
canDo := (s.Flavor.Cores - s.usedCores) / cores
if canDo > 1 {
var n int
if ramMB > 0 {
n = (s.Flavor.RAM - s.usedRAM) / ramMB
if n < canDo {
canDo = n
}
}
if diskGB > 0 {
n = (s.Disk - s.usedDisk) / diskGB
if n < canDo {
canDo = n
}
}
}
return canDo
}
// SSHClient returns an ssh.Client object that could be used to ssh to the
// server. Requires that port 22 is accessible for SSH.
func (s *Server) SSHClient() (*ssh.Client, error) {
s.mutex.Lock()
defer s.mutex.Unlock()
if s.sshclient == nil {
if s.provider.PrivateKey() == "" {
log.Printf("resource file %s did not contain the ssh key\n", s.provider.savePath)
return nil, errors.New("missing ssh key")
}
// parse private key and make config
key, err := ssh.ParsePrivateKey([]byte(s.provider.PrivateKey()))
if err != nil {
log.Printf("failure to parse the private key: %s\n", err)
return nil, err
}
sshConfig := &ssh.ClientConfig{
User: s.UserName,
Auth: []ssh.AuthMethod{
ssh.PublicKeys(key),
},
}
// dial in to the server, allowing certain errors that indicate that the
// network or server isn't really ready for ssh yet; wait for up to
// 5mins for success
hostAndPort := s.IP + ":22"
s.sshclient, err = ssh.Dial("tcp", hostAndPort, sshConfig)
if err != nil {
limit := time.After(sshTimeOut)
ticker := time.NewTicker(1 * time.Second)
ticks := 0
DIAL:
for {
select {
case <-ticker.C:
s.sshclient, err = ssh.Dial("tcp", hostAndPort, sshConfig)
if err != nil && (strings.HasSuffix(err.Error(), "connection timed out") || strings.HasSuffix(err.Error(), "no route to host") || strings.HasSuffix(err.Error(), "connection refused")) {
continue DIAL
}
// if it worked, we stop trying; if it failed again with a
// different error, we keep trying for at least 15 seconds
// to allow for the vagueries of OS start ups (eg. CentOS
// brings up sshd and starts rejecting connections before
// the centos user gets added)
ticks++
if err == nil || ticks == 15 {
ticker.Stop()
break DIAL
} else {
continue DIAL
}
case <-limit:
ticker.Stop()
err = errors.New("giving up waiting for ssh to work")
break DIAL
}
}
if err != nil {
return nil, err
}
}
}
return s.sshclient, nil
}
// RunCmd runs the given command on the server, optionally in the background.
// You get the command's STDOUT and STDERR as a strings.
func (s *Server) RunCmd(cmd string, background bool) (stdout, stderr string, err error) {
sshClient, err := s.SSHClient()
if err != nil {
return
}
// create a session
session, err := sshClient.NewSession()
if err != nil {
return
}
defer session.Close()
// run the command, returning stdout
if background {
cmd = "sh -c 'nohup " + cmd + " > /dev/null 2>&1 &'"
}
var o bytes.Buffer
var e bytes.Buffer
session.Stdout = &o
session.Stderr = &e
err = session.Run(cmd)
if o.Len() > 0 {
stdout = o.String()
}
if e.Len() > 0 {
stderr = e.String()
}
if err != nil {
err = fmt.Errorf("cloud RunCmd(%s) failed: %s", cmd, err.Error())
}
return
}
// UploadFile uploads a local file to the given location on the server.
func (s *Server) UploadFile(source string, dest string) (err error) {
sshClient, err := s.SSHClient()
if err != nil {
return
}
client, err := sftp.NewClient(sshClient)
if err != nil {
return
}
defer client.Close()
// create all parent dirs of dest
err = s.MkDir(dest)
if err != nil {
return
}
// open source, create dest
sourceFile, err := os.Open(source)
if err != nil {
return
}
defer sourceFile.Close()
destFile, err := client.Create(dest)
if err != nil {
return
}
// copy the file content over
_, err = io.Copy(destFile, sourceFile)
return
}
// CreateFile creates a new file with the given content on the server.
func (s *Server) CreateFile(content string, dest string) (err error) {
sshClient, err := s.SSHClient()
if err != nil {
return
}
client, err := sftp.NewClient(sshClient)
if err != nil {
return
}
defer client.Close()
// create all parent dirs of dest
err = s.MkDir(dest)
if err != nil {
return
}
// create dest
destFile, err := client.Create(dest)
if err != nil {
return
}
// write the content
_, err = io.WriteString(destFile, content)
return
}
// DownloadFile downloads a file from the server and stores it locally. The
// directory for your local file must already exist.
func (s *Server) DownloadFile(source string, dest string) (err error) {
sshClient, err := s.SSHClient()
if err != nil {
return
}
client, err := sftp.NewClient(sshClient)
if err != nil {
return
}
defer client.Close()
// open source, create dest
sourceFile, err := client.Open(source)
if err != nil {
return
}
defer sourceFile.Close()
destFile, err := os.Create(dest)
if err != nil {
return
}
// copy the file content over
_, err = io.Copy(destFile, sourceFile)
return
}
// MkDir creates a directory (and it's parents as necessary) on the server.
func (s *Server) MkDir(dest string) (err error) {
//*** it would be nice to do this with client.Mkdir, but that doesn't do
// the equivalent of mkdir -p, and errors out if dirs already exist... for
// now it's easier to just call mkdir
dir := filepath.Dir(dest)
if dir != "." {
_, _, err = s.RunCmd("mkdir -p "+dir, false)
if err != nil {
return
}
}
return
}
// Destroy immediately destroys the server.
func (s *Server) Destroy() error {
s.mutex.Lock()
defer s.mutex.Unlock()
if s.destroyed {
return nil
}
// if the server has initiated its countdown to destruction, cancel that
if s.onDeathrow {
s.cancelDestruction <- true
}
err := s.provider.DestroyServer(s.ID)
if err != nil {
ok, _ := s.provider.CheckServer(s.ID)
if ok {
return err
}
}
s.destroyed = true
return nil
}
// Destroyed tells you if a server was destroyed using Destroy() or the
// automatic destruction due to being idle. It is NOT the opposite of Alive(),
// since it does not check if the server is still usable.
func (s *Server) Destroyed() bool {
s.mutex.Lock()
defer s.mutex.Unlock()
return s.destroyed
}
// Alive tells you if a server is usable.
func (s *Server) Alive() bool {
s.mutex.Lock()
defer s.mutex.Unlock()
if s.destroyed {
return false
}
ok, _ := s.provider.CheckServer(s.ID)
return ok
}
// RequiredEnv returns the environment variables that are needed by the given
// provider before New() will work for it. See New() for possible providerNames.
func RequiredEnv(providerName string) (vars []string, err error) {
var p *Provider
switch providerName {
case "openstack":
p = &Provider{impl: new(openstackp)}
case "aws":
//p = &Provider{impl: new(aws)}
}
if p == nil {
err = Error{providerName, "RequiredEnv", ErrBadProvider}
} else {
vars = p.impl.requiredEnv()
}
return
}
// New creates a new Provider to interact with the given cloud provider.
// Possible names so far are "openstack" ("aws" is planned). You must provide a
// resource name that will be used to name any created cloud resources. You must
// also provide a file path prefix to save details of created resources to (the
// actual file created will be suffixed with your resourceName). Note that the
// file could contain created private key details, so should be kept accessible
// only by you.
func New(name string, resourceName string, savePath string) (p *Provider, err error) {
switch name {
case "openstack":
p = &Provider{impl: new(openstackp)}
case "aws":
//p = &Provider{impl: new(aws)}
}
if p == nil {
err = Error{name, "New", ErrBadProvider}
} else {
p.Name = name
p.savePath = savePath + "." + resourceName
// load any resources we previously saved, or get an empty set to work
// with
p.resources, err = p.loadResources(resourceName)
if err != nil {
return
}
var missingEnv []string
for _, envKey := range p.impl.requiredEnv() {
if os.Getenv(envKey) == "" {
missingEnv = append(missingEnv, envKey)
}
}
if len(missingEnv) > 0 {
err = Error{name, "New", ErrMissingEnv + strings.Join(missingEnv, ", ")}
} else {
err = p.impl.initialize()
if err == nil {
p.inCloud = p.impl.inCloud()
}
}
}
return
}
// Deploy triggers the creation of required cloud resources such as networks,
// ssh keys, security profiles and so on, such that you can subsequently Spawn()
// and ssh to your created server successfully. If a resource we need already
// exists with the resourceName you supplied to New(), we assume it belongs to
// us and we don't create another (so it is safe to call Deploy multiple times
// with the same args to New() and Deploy(): you don't need to check if you have
// already deployed). Deploy() saves the resources it created to disk, which are
// what TearDown() will delete when you call it. (They are saved to disk so that
// TearDown() can work if you call it in a different session to when you
// Deploy()ed, and so that PrivateKey() can work if you call it in a different
// session to the Deploy() call that actually created the ssh key.)
func (p *Provider) Deploy(config *DeployConfig) (err error) {
gatewayIP := config.GatewayIP
if gatewayIP == "" {
gatewayIP = defaultGateWayIP
}
cidr := config.CIDR
if cidr == "" {
cidr = defaultCIDR
}
dnsNameServers := config.DNSNameServers
if dnsNameServers == nil {
dnsNameServers = defaultDNSNameServers[:]
}
// impl.deploy should overwrite any existing values in p.resources with
// updated values, but should leave other things - such as an existing
// PrivateKey when we have not just made a new one - alone
err = p.impl.deploy(p.resources, config.RequiredPorts, gatewayIP, cidr, dnsNameServers)
if err != nil {
return
}
// save updated resources to disk
err = p.saveResources()
if len(p.resources.Servers) > 0 {
p.madeHeadNode = true
}
return
}
// InCloud tells you if your process is currently running on a cloud server
// where the *Server related methods will all work correctly. (That is, if this
// returns true, you are on the same network as any server you Spawn().)
func (p *Provider) InCloud() bool {
return p.inCloud
}
// GetQuota returns details of the maximum resources the user can request, and
// the current resources used.
func (p *Provider) GetQuota() (quota *Quota, err error) {
return p.impl.getQuota()
}
// CheapestServerFlavor returns details of the smallest (cheapest) server
// "flavor" available that satisfies your minimum ram (MB) and CPU (core count)
// requirements, and that also matches the given regex (empty string for the
// regex means not limited by regex). Use the ID property of the return value
// for passing to Spawn(). If no flavor meets your requirements you will get an
// error matching ErrNoFlavor. You don't test for size of disk here, because
// during Spawn() you will request a certain amount of disk space, and if that
// is larger than the flavor's root disk a larger volume will be created
// automatically.
func (p *Provider) CheapestServerFlavor(cores, ramMB int, regex string) (fr Flavor, err error) {
// from all available flavours, pick the one that has the lowest ram, disk
// and cpus that meet our minimums, and also matches the regex
var r *regexp.Regexp
if regex != "" {
r, err = regexp.Compile(regex)
if err != nil {
err = Error{"openstack", "cheapestServerFlavor", ErrBadRegex}
return
}
}
for _, f := range p.impl.flavors() {
if regex != "" {
if !r.MatchString(f.Name) {
continue
}
}
if f.Cores >= cores && f.RAM >= ramMB {
if fr.ID == "" {
fr = f
} else if f.Cores < fr.Cores {
fr = f
} else if f.Cores == fr.Cores {
if f.RAM < fr.RAM {
fr = f
} else if f.RAM == fr.RAM && f.Disk < fr.Disk {
fr = f
}
}
}
}
if err == nil && fr.ID == "" {
err = Error{"openstack", "cheapestServerFlavor", ErrNoFlavor}
}
return
}
// Spawn creates a new server using an OS image with a name prefixed with the
// given os name, with the given flavor ID (that you could get from
// CheapestServerFlavor().ID) and at least the given amount of disk space
// (creating a temporary volume of the required size if the flavor's root disk
// is too small). If you supply a non-zero value for the ttd argument, then this
// amount of time after the last s.Release() call you make (or after the last
// cmd you started with s.RunCmd exits) that causes the server to be considered
// idle, the server will be destroyed. If you need an external IP so that you
// can ssh to the server externally, supply true as the last argument. Returns a
// *Server so you can s.Destroy it later, find out its ip address so you can ssh
// to it, and get its admin password in case you need to sudo on the server. You
// will need to know the username that you can log in with on your chosen OS
// image. If you call Spawn() while running on a cloud server, then the newly
// spawned server will be in the same network and security group as the current
// server. If you get an err, you will want to call server.Destroy() as this is
// not done for you. NB: the server will likely not be ready to use yet, having
// not completed its boot up; call server.WaitUntilReady() before trying to use
// the server for anything.
func (p *Provider) Spawn(os string, osUser string, flavorID string, diskGB int, ttd time.Duration, externalIP bool) (server *Server, err error) {
f, found := p.impl.flavors()[flavorID]
if !found {
err = Error{"openstack", "Spawn", ErrBadFlavor}
return
}
serverID, serverIP, adminPass, err := p.impl.spawn(p.resources, os, flavorID, diskGB, externalIP)
maxDisk := f.Disk
if diskGB > maxDisk {
maxDisk = diskGB
}
server = &Server{
ID: serverID,
IP: serverIP,
OS: os,
AdminPass: adminPass,
UserName: osUser,
Flavor: f,
Disk: maxDisk,
TTD: ttd,
provider: p,
}
if err == nil && externalIP {
// if this is the first server created, note it is the "head node"
if !p.madeHeadNode {
server.IsHeadNode = true
p.madeHeadNode = true
}
// update resources and save to disk
p.resources.Servers[serverID] = server
err = p.saveResources()
}
return
}
// WaitUntilReady waits for the server to become fully ready: the boot process
// will have completed and ssh will work. This is not part of provider.Spawn()
// because you may not want or be able to ssh to your server, and so that you
// can Spawn() another server while waiting for this one to become ready. If you
// get an err, you will want to call server.Destroy() as this is not done for
// you. postCreationScript is the optional []byte content of a script that will
// be run on the server (using sudo) once it is ready, and it will complete
// before this function returns; empty slice means do nothing.
func (s *Server) WaitUntilReady(postCreationScript ...[]byte) (err error) {
// wait for ssh to come up
_, err = s.SSHClient()
if err != nil {
return
}
// wait for sentinelFilePath to exist, indicating that the server is
// really ready to use
limit := time.After(sentinelTimeOut)
ticker := time.NewTicker(1 * time.Second)
SENTINEL:
for {
select {
case <-ticker.C:
_, _, fileErr := s.RunCmd("file "+sentinelFilePath, false)
if fileErr == nil {
ticker.Stop()
s.RunCmd("sudo rm "+sentinelFilePath, false)
break SENTINEL
}
continue SENTINEL
case <-limit:
ticker.Stop()
err = errors.New("cloud server never became ready to use")
return
}
}
// run the postCreationScript
if len(postCreationScript[0]) > 0 {
pcsPath := "/tmp/.postCreationScript"
err = s.CreateFile(string(postCreationScript[0]), pcsPath)
if err != nil {
err = fmt.Errorf("cloud server start up script failed to upload: %s", err)
return
}
_, _, err = s.RunCmd("chmod u+x "+pcsPath, false)
if err != nil {
err = fmt.Errorf("cloud server start up script could not be made executable: %s", err)
return
}
// *** currently we have no timeout on this, probably want one...
var stderr string
_, stderr, err = s.RunCmd("sudo "+pcsPath, false)
if err != nil {
err = fmt.Errorf("cloud server start up script failed: %s", err.Error())
if len(stderr) > 0 {
err = fmt.Errorf("%s\nSTDERR:\n%s", err.Error(), stderr)
}
return
}
s.RunCmd("rm "+pcsPath, false)
}
return
}
// CheckServer asks the provider if the status of the given server (id retrieved
// via Spawn() or Servers()) indicates it is working fine. (If it's not and
// was previously thought to be a spawned server with an external IP, then it
// will be removed from the results of Servers().)
func (p *Provider) CheckServer(serverID string) (working bool, err error) {
working, err = p.impl.checkServer(serverID)
if err == nil && !working {
// update resources and save to disk
if _, present := p.resources.Servers[serverID]; present {
delete(p.resources.Servers, serverID)
err = p.saveResources()
}
}
return
}
// DestroyServer destroys a server given its id, that you would have gotten from
// the ID property of Spawn()'s return value.
func (p *Provider) DestroyServer(serverID string) (err error) {
err = p.impl.destroyServer(serverID)
if err == nil {
// update resources and save to disk
delete(p.resources.Servers, serverID)
err = p.saveResources()
}
return
}
// Servers returns a mapping of serverID => *Server for all servers that were
// Spawn()ed with an external IP (including those spawned in past sessions where
// the same arguments to New() were used). You should use s.Alive() before
// trying to use one of these servers. Do not alter the return value!
func (p *Provider) Servers() map[string]*Server {
return p.resources.Servers
}
// HeadNode returns the first server created under this deployment that had an
// external IP. Returns nil if no such server was recorded.
func (p *Provider) HeadNode() *Server {
for _, server := range p.resources.Servers {
if server.IsHeadNode {
return server
}
}
return nil
}
// PrivateKey returns a PEM format string of the private key that was created
// by Deploy() (on its first invocation with the same arguments to New()).
func (p *Provider) PrivateKey() string {
return p.resources.PrivateKey
}
// TearDown deletes all resources recorded during Deploy() or loaded from a
// previous session during New(). It also deletes any servers with names
// prefixed with the resourceName given to the initial New() call. If currently
// running on a cloud server, however, it will not delete anything needed by
// this server, including the resource file that contains the private key.
func (p *Provider) TearDown() (err error) {
err = p.impl.tearDown(p.resources)
if err != nil {
return
}
// delete our savePath unless our resources still contains the private key,
// indicating it is still in the cloud and could be needed in the future
if p.resources.PrivateKey == "" {
err = p.deleteResourceFile()
}
return
}
// saveResources saves our resources to our savePath, overwriting any existing
// content. This is not thread safe!
func (p *Provider) saveResources() (err error) {
file, err := os.OpenFile(p.savePath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
if err == nil {
defer file.Close()
encoder := gob.NewEncoder(file)
encoder.Encode(p.resources)
}
return
}
// loadResources loads our resources from our savePath, or returns an empty
// set of resources if savePath doesn't exist.
func (p *Provider) loadResources(resourceName string) (resources *Resources, err error) {
resources = &Resources{ResourceName: resourceName, Details: make(map[string]string), Servers: make(map[string]*Server)}
if _, serr := os.Stat(p.savePath); os.IsNotExist(serr) {
return
}
file, err := os.Open(p.savePath)
if err == nil {
defer file.Close()
decoder := gob.NewDecoder(file)
err = decoder.Decode(resources)
if err == nil {
// add in the ref to ourselves to each of our servers
for _, server := range resources.Servers {
server.provider = p
}
}
}
return
}
// deleteResourceFile deletes our savePath.
func (p *Provider) deleteResourceFile() (err error) {
err = os.Remove(p.savePath)
return
}
// uniqueResourceName takes the given prefix and appends a unique string to it
// (a uuid).
func uniqueResourceName(prefix string) (unique string) {
return prefix + "-" + uuid.NewV4().String()