-
Notifications
You must be signed in to change notification settings - Fork 12
/
cloud.go
655 lines (579 loc) · 23.9 KB
/
cloud.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
// Copyright © 2016-2017 Genome Research Limited
// Author: Sendu Bala <sb10@sanger.ac.uk>.
//
// This file is part of wr.
//
// wr is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// wr is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with wr. If not, see <http://www.gnu.org/licenses/>.
/*
Package cloud provides functions to interact with cloud providers, used to
create cloud resources so that you can spawn servers, then delete those
resources when you're done.
Currently implemented providers are OpenStack, with AWS planned for the future.
The implementation of each supported provider is in its own .go file.
It's a pseudo plug-in system in that it is designed so that you can easily add a
go file that implements the methods of the provideri interface, to support a
new cloud provider. On the other hand, there is no dynamic loading of these go
files; they are all imported (they all belong to the cloud package), and the
correct one used at run time. To "register" a new provideri implementation you
must add a case for it to New() and RequiredEnv() and rebuild. The spawn()
method must create a file at the path sentinelFilePath once the system has
finalised its boot up and is fully ready to use. The system should be configured
to allow user fuse mounts.
Please note that the methods in this package are NOT safe to be used by more
than 1 process at a time.
import "github.com/VertebrateResequencing/wr/cloud"
// deploy
provider, err := cloud.New("openstack", "wr-production-username", "/home/username/.wr-production/created_cloud_resources")
err = provider.Deploy(&cloud.DeployConfig{
RequiredPorts: []int{22},
GatewayIP: "192.168.0.1",
CIDR: "192.168.0.0/18",
DNSNameServers: [...]string{"8.8.4.4", "8.8.8.8"},
})
// spawn a server
flavor := provider.CheapestServerFlavor(1, 1024, "")
server, err = provider.Spawn("Ubuntu Xenial", "ubuntu", flavor.ID, 20, 120 * time.Second, true)
server.WaitUntilReady()
// simplistic way of making the most of the server by running as many
// commands as possible:
for _, cmd := range myCmds {
if server.HasSpaceFor(1, 1024, 1) > 0 {
server.Allocate(1, 1024, 1)
go func() {
server.RunCmd(cmd, false)
server.Release(1, 1024, 1)
}()
} else {
break
}
}
// destroy everything created
provider.TearDown()
*/
package cloud
import (
"encoding/gob"
"errors"
"fmt"
"github.com/satori/go.uuid"
"os"
"regexp"
"strings"
"sync"
"time"
)
// Err* constants are found in the returned Errors under err.Err, so you can
// cast and check if it's a certain type of error. ErrMissingEnv gets appended
// to with missing environment variable names, so check based on prefix.
var (
ErrBadProvider = "unknown provider name"
ErrMissingEnv = "missing environment variables: "
ErrBadResourceName = "your resource name prefix contains disallowed characters"
ErrNoFlavor = "no server flavor can meet your resource requirements"
ErrBadFlavor = "no server flavor with that id exists"
ErrBadRegex = "your flavor regular expression was not valid"
)
// sshTimeOut is how long we wait for ssh to work when an ssh request is made to
// a server.
var sshTimeOut = 5 * time.Minute
// sentinelFilePath is the file that provideri implementers must create on each
// spawn()ed server once it is fully ready to use.
const sentinelFilePath = "/tmp/.wr_cloud_sentinel"
// sentinelInitScript can be used as user data to the cloud-init mechanism to
// create sentinelFilePath. We also try to turn off requiretty in /etc/sudoers,
// to allow postCreationScripts passed to WaitUntilReady() to be run with sudo.
// And we try to enable user_allow_other in fuse.conf to allow user mounts to
// work.
var sentinelInitScript = []byte("#!/bin/bash\nsed -i 's/^Defaults\\s*requiretty/Defaults\\t!requiretty/' /etc/sudoers\nsed -i '/user_allow_other/s/^#//g' /etc/fuse.conf\nchmod o+r /etc/fuse.conf\ntouch " + sentinelFilePath)
// sentinelTimeOut is how long we wait for sentinelFilePath to be created before
// we give up and return an error from Spawn().
var sentinelTimeOut = 10 * time.Minute
// defaultDNSNameServers holds some public (google) dns name server addresses
// for use when creating cloud subnets that need internet access.
var defaultDNSNameServers = [...]string{"8.8.4.4", "8.8.8.8"}
// defaultCIDR is a useful range allowing 16382 servers to be spawned, with a
// defaultGateWayIP at the start of that range.
const defaultGateWayIP = "192.168.0.1"
const defaultCIDR = "192.168.0.0/18"
// touchStampFormat is the time format expected by `touch -t`.
const touchStampFormat = "200601021504.05"
// Error records an error and the operation and provider caused it.
type Error struct {
Provider string // the provider's Name
Op string // name of the method
Err string // one of our Err* vars
}
func (e Error) Error() string {
return "cloud(" + e.Provider + ") " + e.Op + "(): " + e.Err
}
// Resources struct contains provider-specific details of every resource that
// we created, in a format understood by TearDown(), so that we can delete
// those resources when they're no longer needed. There are also fields for
// important things the user needs to know.
type Resources struct {
ResourceName string // the resource name prefix that resources were created with
Details map[string]string // whatever key values the provider needs to describe what it created
PrivateKey string // PEM format string of the key user would need to ssh in to any created servers
Servers map[string]*Server // the serverID => *Server mapping of any servers Spawn()ed with an external ip
}
// Quota struct describes the limit on what resources you are allowed to use (0
// values mean that resource is unlimited), and how much you have already used.
type Quota struct {
MaxRAM int // total MBs allowed
MaxCores int // total CPU cores allowed
MaxInstances int // max number of instances allowed
MaxVolume int // max GBs of volume storage that can be allocated
UsedRAM int
UsedCores int
UsedInstances int
UsedVolume int
}
// provideri must be satisfied to add support for a particular cloud provider.
type provideri interface {
requiredEnv() []string // return the environment variables required to function
initialize() error // do any initial config set up such as authentication
deploy(resources *Resources, requiredPorts []int, gatewayIP, cidr string, dnsNameServers []string) error // achieve the aims of Deploy(), recording what you create in resources.Details and resources.PrivateKey
inCloud() bool // achieve the aims of InCloud()
getQuota() (*Quota, error) // achieve the aims of GetQuota()
flavors() map[string]Flavor // return a map of all server flavors, with their flavor ids as keys
spawn(resources *Resources, os string, flavor string, diskGB int, externalIP bool) (serverID string, serverIP string, adminPass string, err error) // achieve the aims of Spawn(), creating sentinelFilePath once the new server is ready to use.
checkServer(serverID string) (working bool, err error) // achieve the aims of CheckServer()
destroyServer(serverID string) error // achieve the aims of DestroyServer()
tearDown(resources *Resources) error // achieve the aims of TearDown()
}
// Provider gives you access to all of the methods you'll need to interact with
// a cloud provider.
type Provider struct {
impl provideri
Name string
savePath string
resources *Resources
inCloud bool
madeHeadNode bool
Debug bool
sync.RWMutex
}
// DeployConfig are the configuration options that you supply to Deploy().
// RequiredPorts is the slice of port numbers that your application needs to be
// able to communicate to any servers you spawn (eg. [22] for ssh) through. If a
// network and subnet need to be created, the GatewayIP and CIDR options will be
// used; they default to 192.168.0.1 and 192.168.0.0:18 respectively, allowing
// for 16381 servers to be Spawn()d later, with a maximum ip of 192.168.63.254.
// DNSNameServers is a slice of DNS name server IPs. It defaults to Google's:
// []string{"8.8.4.4", "8.8.8.8"}.
type DeployConfig struct {
RequiredPorts []int
GatewayIP string
CIDR string
DNSNameServers []string
}
// RequiredEnv returns the environment variables that are needed by the given
// provider before New() will work for it. See New() for possible providerNames.
func RequiredEnv(providerName string) (vars []string, err error) {
var p *Provider
switch providerName {
case "openstack":
p = &Provider{impl: new(openstackp)}
case "aws":
//p = &Provider{impl: new(aws)}
}
if p == nil {
err = Error{providerName, "RequiredEnv", ErrBadProvider}
} else {
vars = p.impl.requiredEnv()
}
return
}
// New creates a new Provider to interact with the given cloud provider.
// Possible names so far are "openstack" ("aws" is planned). You must provide a
// resource name that will be used to name any created cloud resources. You must
// also provide a file path prefix to save details of created resources to (the
// actual file created will be suffixed with your resourceName). Note that the
// file could contain created private key details, so should be kept accessible
// only by you.
func New(name string, resourceName string, savePath string) (p *Provider, err error) {
switch name {
case "openstack":
p = &Provider{impl: new(openstackp)}
case "aws":
//p = &Provider{impl: new(aws)}
}
if p == nil {
err = Error{name, "New", ErrBadProvider}
} else {
p.Name = name
p.savePath = savePath + "." + resourceName
// load any resources we previously saved, or get an empty set to work
// with
p.resources, err = p.loadResources(resourceName)
if err != nil {
return
}
var missingEnv []string
for _, envKey := range p.impl.requiredEnv() {
if os.Getenv(envKey) == "" {
missingEnv = append(missingEnv, envKey)
}
}
if len(missingEnv) > 0 {
err = Error{name, "New", ErrMissingEnv + strings.Join(missingEnv, ", ")}
} else {
err = p.impl.initialize()
if err == nil {
p.inCloud = p.impl.inCloud()
}
}
}
return
}
// Deploy triggers the creation of required cloud resources such as networks,
// ssh keys, security profiles and so on, such that you can subsequently Spawn()
// and ssh to your created server successfully. If a resource we need already
// exists with the resourceName you supplied to New(), we assume it belongs to
// us and we don't create another (so it is safe to call Deploy multiple times
// with the same args to New() and Deploy(): you don't need to check if you have
// already deployed). Deploy() saves the resources it created to disk, which are
// what TearDown() will delete when you call it. (They are saved to disk so that
// TearDown() can work if you call it in a different session to when you
// Deploy()ed, and so that PrivateKey() can work if you call it in a different
// session to the Deploy() call that actually created the ssh key.)
func (p *Provider) Deploy(config *DeployConfig) (err error) {
gatewayIP := config.GatewayIP
if gatewayIP == "" {
gatewayIP = defaultGateWayIP
}
cidr := config.CIDR
if cidr == "" {
cidr = defaultCIDR
}
dnsNameServers := config.DNSNameServers
if dnsNameServers == nil {
dnsNameServers = defaultDNSNameServers[:]
}
// impl.deploy should overwrite any existing values in p.resources with
// updated values, but should leave other things - such as an existing
// PrivateKey when we have not just made a new one - alone
err = p.impl.deploy(p.resources, config.RequiredPorts, gatewayIP, cidr, dnsNameServers)
if err != nil {
return
}
// save updated resources to disk
err = p.saveResources()
p.Lock()
defer p.Unlock()
if len(p.resources.Servers) > 0 {
p.madeHeadNode = true
}
return
}
// InCloud tells you if your process is currently running on a cloud server
// where the *Server related methods will all work correctly. (That is, if this
// returns true, you are on the same network as any server you Spawn().)
func (p *Provider) InCloud() bool {
return p.inCloud
}
// GetQuota returns details of the maximum resources the user can request, and
// the current resources used.
func (p *Provider) GetQuota() (quota *Quota, err error) {
return p.impl.getQuota()
}
// CheapestServerFlavor returns details of the smallest (cheapest) server
// "flavor" available that satisfies your minimum ram (MB) and CPU (core count)
// requirements, and that also matches the given regex (empty string for the
// regex means not limited by regex). Use the ID property of the return value
// for passing to Spawn(). If no flavor meets your requirements you will get an
// error matching ErrNoFlavor. You don't test for size of disk here, because
// during Spawn() you will request a certain amount of disk space, and if that
// is larger than the flavor's root disk a larger volume will be created
// automatically.
func (p *Provider) CheapestServerFlavor(cores, ramMB int, regex string) (fr Flavor, err error) {
// from all available flavours, pick the one that has the lowest ram, disk
// and cpus that meet our minimums, and also matches the regex
var r *regexp.Regexp
if regex != "" {
r, err = regexp.Compile(regex)
if err != nil {
err = Error{"openstack", "cheapestServerFlavor", ErrBadRegex}
return
}
}
for _, f := range p.impl.flavors() {
if regex != "" {
if !r.MatchString(f.Name) {
continue
}
}
if f.Cores >= cores && f.RAM >= ramMB {
if fr.ID == "" {
fr = f
} else if f.Cores < fr.Cores {
fr = f
} else if f.Cores == fr.Cores {
if f.RAM < fr.RAM {
fr = f
} else if f.RAM == fr.RAM && f.Disk < fr.Disk {
fr = f
}
}
}
}
if err == nil && fr.ID == "" {
err = Error{"openstack", "cheapestServerFlavor", ErrNoFlavor}
}
return
}
// Spawn creates a new server using an OS image with a name prefixed with the
// given os name, with the given flavor ID (that you could get from
// CheapestServerFlavor().ID) and at least the given amount of disk space
// (creating a temporary volume of the required size if the flavor's root disk
// is too small). If you supply a non-zero value for the ttd argument, then this
// amount of time after the last s.Release() call you make (or after the last
// cmd you started with s.RunCmd exits) that causes the server to be considered
// idle, the server will be destroyed. If you need an external IP so that you
// can ssh to the server externally, supply true as the last argument. Returns a
// *Server so you can s.Destroy it later, find out its ip address so you can ssh
// to it, and get its admin password in case you need to sudo on the server. You
// will need to know the username that you can log in with on your chosen OS
// image. If you call Spawn() while running on a cloud server, then the newly
// spawned server will be in the same network and security group as the current
// server. If you get an err, you will want to call server.Destroy() as this is
// not done for you. NB: the server will likely not be ready to use yet, having
// not completed its boot up; call server.WaitUntilReady() before trying to use
// the server for anything.
func (p *Provider) Spawn(os string, osUser string, flavorID string, diskGB int, ttd time.Duration, externalIP bool) (server *Server, err error) {
f, found := p.impl.flavors()[flavorID]
if !found {
err = Error{"openstack", "Spawn", ErrBadFlavor}
return
}
serverID, serverIP, adminPass, err := p.impl.spawn(p.resources, os, flavorID, diskGB, externalIP)
maxDisk := f.Disk
if diskGB > maxDisk {
maxDisk = diskGB
}
server = &Server{
ID: serverID,
IP: serverIP,
OS: os,
AdminPass: adminPass,
UserName: osUser,
Flavor: f,
Disk: maxDisk,
TTD: ttd,
provider: p,
debugMode: p.Debug,
}
if err == nil && externalIP {
// if this is the first server created, note it is the "head node"
p.Lock()
if !p.madeHeadNode {
server.IsHeadNode = true
p.madeHeadNode = true
}
// update resources and save to disk
p.resources.Servers[serverID] = server
p.Unlock()
err = p.saveResources()
}
return
}
// WaitUntilReady waits for the server to become fully ready: the boot process
// will have completed and ssh will work. This is not part of provider.Spawn()
// because you may not want or be able to ssh to your server, and so that you
// can Spawn() another server while waiting for this one to become ready. If you
// get an err, you will want to call server.Destroy() as this is not done for
// you. postCreationScript is the optional []byte content of a script that will
// be run on the server (as the user supplied to Spawn()) once it is ready, and
// it will complete before this function returns; empty slice means do nothing.
func (s *Server) WaitUntilReady(postCreationScript ...[]byte) (err error) {
// wait for ssh to come up
_, err = s.SSHClient()
if err != nil {
return
}
// wait for sentinelFilePath to exist, indicating that the server is
// really ready to use
limit := time.After(sentinelTimeOut)
ticker := time.NewTicker(1 * time.Second)
SENTINEL:
for {
select {
case <-ticker.C:
_, _, fileErr := s.RunCmd("file "+sentinelFilePath, false)
if fileErr == nil {
ticker.Stop()
s.RunCmd("sudo rm "+sentinelFilePath, false)
break SENTINEL
}
continue SENTINEL
case <-limit:
ticker.Stop()
err = errors.New("cloud server never became ready to use")
return
}
}
// run the postCreationScript
if len(postCreationScript[0]) > 0 {
pcsPath := "/tmp/.postCreationScript"
err = s.CreateFile(string(postCreationScript[0]), pcsPath)
if err != nil {
err = fmt.Errorf("cloud server start up script failed to upload: %s", err)
return
}
_, _, err = s.RunCmd("chmod u+x "+pcsPath, false)
if err != nil {
err = fmt.Errorf("cloud server start up script could not be made executable: %s", err)
return
}
// *** currently we have no timeout on this, probably want one...
var stderr string
_, stderr, err = s.RunCmd(pcsPath, false)
if err != nil {
err = fmt.Errorf("cloud server start up script failed: %s", err.Error())
if len(stderr) > 0 {
err = fmt.Errorf("%s\nSTDERR:\n%s", err.Error(), stderr)
}
return
}
s.RunCmd("rm "+pcsPath, false)
s.Script = postCreationScript[0]
// because the postCreationScript may have altered PATH and other things
// that subsequent RunCmd may rely on, clear the client
s.sshclient = nil
}
return
}
// CheckServer asks the provider if the status of the given server (id retrieved
// via Spawn() or Servers()) indicates it is working fine. (If it's not and
// was previously thought to be a spawned server with an external IP, then it
// will be removed from the results of Servers().)
func (p *Provider) CheckServer(serverID string) (working bool, err error) {
working, err = p.impl.checkServer(serverID)
if err == nil && !working {
// update resources and save to disk
p.Lock()
if _, present := p.resources.Servers[serverID]; present {
delete(p.resources.Servers, serverID)
p.Unlock()
err = p.saveResources()
} else {
p.Unlock()
}
}
return
}
// DestroyServer destroys a server given its id, that you would have gotten from
// the ID property of Spawn()'s return value.
func (p *Provider) DestroyServer(serverID string) (err error) {
err = p.impl.destroyServer(serverID)
if err == nil {
// update resources and save to disk
p.Lock()
delete(p.resources.Servers, serverID)
p.Unlock()
err = p.saveResources()
}
return
}
// Servers returns a mapping of serverID => *Server for all servers that were
// Spawn()ed with an external IP (including those spawned in past sessions where
// the same arguments to New() were used). You should use s.Alive() before
// trying to use one of these servers. Do not alter the return value!
func (p *Provider) Servers() map[string]*Server {
p.RLock()
defer p.RUnlock()
return p.resources.Servers
}
// HeadNode returns the first server created under this deployment that had an
// external IP. Returns nil if no such server was recorded.
func (p *Provider) HeadNode() *Server {
p.RLock()
defer p.RUnlock()
for _, server := range p.resources.Servers {
if server.IsHeadNode {
return server
}
}
return nil
}
// PrivateKey returns a PEM format string of the private key that was created
// by Deploy() (on its first invocation with the same arguments to New()).
func (p *Provider) PrivateKey() string {
p.RLock()
defer p.RUnlock()
return p.resources.PrivateKey
}
// TearDown deletes all resources recorded during Deploy() or loaded from a
// previous session during New(). It also deletes any servers with names
// prefixed with the resourceName given to the initial New() call. If currently
// running on a cloud server, however, it will not delete anything needed by
// this server, including the resource file that contains the private key.
func (p *Provider) TearDown() (err error) {
p.RLock()
defer p.RUnlock()
err = p.impl.tearDown(p.resources)
if err != nil {
return
}
// delete our savePath unless our resources still contains the private key,
// indicating it is still in the cloud and could be needed in the future
if p.resources.PrivateKey == "" {
err = p.deleteResourceFile()
}
return
}
// saveResources saves our resources to our savePath, overwriting any existing
// content. This is not thread safe!
func (p *Provider) saveResources() (err error) {
file, err := os.OpenFile(p.savePath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
if err == nil {
defer file.Close()
encoder := gob.NewEncoder(file)
p.RLock()
defer p.RUnlock()
encoder.Encode(p.resources)
}
return
}
// loadResources loads our resources from our savePath, or returns an empty
// set of resources if savePath doesn't exist.
func (p *Provider) loadResources(resourceName string) (resources *Resources, err error) {
resources = &Resources{ResourceName: resourceName, Details: make(map[string]string), Servers: make(map[string]*Server)}
if _, serr := os.Stat(p.savePath); os.IsNotExist(serr) {
return
}
file, err := os.Open(p.savePath)
if err == nil {
defer file.Close()
decoder := gob.NewDecoder(file)
err = decoder.Decode(resources)
if err == nil {
// add in the ref to ourselves to each of our servers
for _, server := range resources.Servers {
server.provider = p
}
}
}
return
}
// deleteResourceFile deletes our savePath.
func (p *Provider) deleteResourceFile() (err error) {
err = os.Remove(p.savePath)
return
}
// uniqueResourceName takes the given prefix and appends a unique string to it
// (a uuid).
func uniqueResourceName(prefix string) (unique string) {
return prefix + "-" + uuid.NewV4().String()
}