This repository has been archived by the owner on Jan 26, 2022. It is now read-only.
/
memcached_node.rb
385 lines (320 loc) · 10.2 KB
/
memcached_node.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
# Copyright (c) 2009-2011 VMware, Inc.
# This code is based on Redis as a Service.
require "erb"
require "fileutils"
require "logger"
require 'socket'
require "uuidtools"
require 'dalli'
require "thread"
require "nats/client"
require "warden/client"
require 'vcap/common'
require 'vcap/component'
require "memcached_service/common"
require "memcached_service/memcached_error"
module VCAP
module Services
module Memcached
class Node < VCAP::Services::Base::Node
class ProvisionedService < VCAP::Services::Base::Warden::Service
end
end
end
end
end
class VCAP::Services::Memcached::Node
include VCAP::Services::Memcached
include VCAP::Services::Memcached::Common
include VCAP::Services::Base::Utils
include VCAP::Services::Base::Warden::NodeUtils
class SASLAdmin
class SASLOperationError < StandardError
SASL_OPS_USER_ALREADY_EXISTS = 'Failed to create user. Specified user has already exists.'
SASL_OPS_ILLEGAL_INPUT = 'Illegal input.'
SASL_OPS_UNKNOWN_ERROR = 'Failed to create user. Unknown error.'
end
def initialize(logger)
@logger = logger
end
def user_list
list_str = `sasldblistusers2`.split
list_str.delete('userPassword')
users = list_str.map do |e|
separator = e.index('@') - 1
e.slice(0..separator)
end
return users
end
def create_user(user, password)
if user.nil? || user.empty?
raise SASLOperationError::SASL_OPS_ILLEGAL_INPUT
end
users = user_list()
if users.include?(user)
raise SASLOperationError::SASL_OPS_USER_ALREADY_EXISTS
end
ret = `echo '#{password}' | saslpasswd2 -a memcached -c #{user} -p`
if ret == ''
return true
end
raise SASLOperationError::SASL_OPS_UNKNOWN_ERROR
end
def delete_user(user)
if user.nil? || user.empty?
raise SASLOperationError::SASL_OPS_ILLEGAL_INPUT
end
ret = `saslpasswd2 -d #{user}`
end
end
attr_accessor :local_db
def initialize(options)
super(options)
ProvisionedService.init(options)
@base_dir = options[:base_dir]
@local_db = options[:local_db]
@service_start_timeout = options[:service_start_timeout] || 3
init_ports(options[:port_range])
@sasl_admin = SASLAdmin.new(@logger)
@default_version = "1.4"
@supported_versions = ["1.4"]
end
def migrate_saved_instances_on_startup
ProvisionedService.all.each do |p_service|
if p_service.version.to_s.empty?
p_service.version = @default_version
@logger.warn("Unable to set version for: #{p_service.inspect}") unless p_service.save
end
end
end
def pre_send_announcement
migrate_saved_instances_on_startup
start_provisioned_instances
warden_node_init(@options)
end
def service_instances
ProvisionedService.all
end
def start_provisioned_instances
start_all_instances
@capacity_lock.synchronize{ @capacity -= ProvisionedService.all.size }
end
def shutdown
super
@logger.info("Shutting down instances..")
stop_all_instances
true
end
def announcement
@capacity_lock.synchronize do
{ :available_capacity => @capacity, :capacity_unit => capacity_unit }
end
end
def provision(plan, credentials = nil, version=nil)
@logger.info("Provision request: plan=#{plan}, version=#{version}")
#raise MemcachedError.new(MemcachedError::MEMCACHED_INVALID_PLAN, plan) unless plan == @plan
raise ServiceError.new(ServiceError::UNSUPPORTED_VERSION, version) unless @supported_versions.include?(version)
credentials = {} if credentials.nil?
provision_options = {}
provision_options["plan"] = plan
provision_options["version"] = version
provision_options["name"] = credentials["name"] || UUIDTools::UUID.random_create.to_s
provision_options["user"] = credentials["user"] || UUIDTools::UUID.random_create.to_s
provision_options["password"] = credentials["password"] || UUIDTools::UUID.random_create.to_s
provision_options["port"] = new_port(credentials["port"] || nil)
p_service = create_provisioned_instance(provision_options)
@logger.info("Starting: #{p_service.inspect}")
p_service.run do
@sasl_admin.create_user(p_service.user, p_service.password) if @sasl_enabled
end
response = get_credentials(p_service)
@logger.debug("Provision response: #{response}")
response
rescue => e
@logger.error("Error provisioning instance: #{e}")
p_service.delete unless p_service.nil?
raise MemcachedError.new(MemcachedError::MEMCACHED_START_INSTANCE_FAILED, e)
end
def create_provisioned_instance(provision_options)
ProvisionedService.create(provision_options)
end
def unprovision(name, bindings = [])
p_service = ProvisionedService.get(name)
raise ServiceError.new(ServiceError::NOT_FOUND, name) if p_service.nil?
port = p_service.port
raise "Could not cleanup instance #{name}" unless p_service.delete
free_port(port);
@sasl_admin.delete_user(p_service.user) if @sasl_enabled
@logger.info("Successfully fulfilled unprovision request: #{name}.")
true
end
def bind(name, bind_opts = nil, credential = nil)
p_service = ProvisionedService.get(name)
raise ServiceError.new(ServiceError::NOT_FOUND, name) if p_service.nil?
# Memcached has no user level security, just return provisioned credentials.
get_credentials(p_service)
end
def unbind(credentials)
# Memcached has no user level security, so has no operation for unbinding.
{}
end
def restore(instance_id, backup_dir)
# No restore command for memcached
{}
end
def get_credentials(p_service)
host_ip = get_host
credentials = {
"name" => p_service.name,
"hostname" => host_ip,
"host" => host_ip,
"port" => p_service.port,
"user" => p_service.user,
"password" => p_service.password
}
end
def varz_details
varz = super
varz[:provisioned_instances_num] = 0
varz[:max_instances_num] = @options[:capacity] / capacity_unit
varz[:provisioned_instances] = ProvisionedService.all.map do |p_service|
stat = {}
stat['name'] = p_service.name
stat['version'] = p_service.version
stat['plan'] = @plan
stat['port'] = p_service.port
stat['info'] = p_service.get_instance_stats
varz[:provisioned_instances_num] += 1
stat
end
varz
rescue => e
@logger.warn("Error while getting varz details: #{e}")
{}
end
end
class VCAP::Services::Memcached::Node::ProvisionedService
include DataMapper::Resource
include VCAP::Services::Memcached
property :name, String, :key => true
property :port, Integer, :unique => true
property :user, String, :required => true
property :password, String, :required => true
# property plan is deprecated. The instances in one node have same plan.
property :plan, Integer, :required => true
property :version, String, :required => false
property :container, String
property :ip, String
private_class_method :new
SERVICE_PORT = 27017
class << self
def init(args)
super(args)
@@memcached_timeout = args[:memcached_timeout] || 2
@@memcached_memory = args[:memcached_memory]
@@max_clients = args[:max_clients] || 500
@@sasl_enabled = args[:sasl_enabled] || false
end
def create(args)
raise "Parameter missing" unless args['port']
p_service = new
p_service.name = args['name']
p_service.port = args['port']
p_service.plan = 1
p_service.user = args['user']
p_service.password = args['password']
p_service.version = args['version']
p_service.prepare_filesystem(1)
p_service
end
end
def connect
conn = nil
return conn unless running?
Timeout::timeout(@@memcached_timeout) do
conn = Dalli::Client.new("#{self[:ip]}\:#{SERVICE_PORT}", username: self[:user], password: self[:password])
end
rescue => e
logger.error("Failed to connect to instance: #{self[:ip]}\:#{SERVICE_PORT} - #{e.inspect}")
raise MemcachedError.new(MemcachedError::MEMCACHED_CONNECT_INSTANCE_FAILED, @self[:ip])
ensure
return conn
end
def get_instance_stats
logger.debug("Get Stats: memcached instance: #{self[:ip]}\:#{SERVICE_PORT}")
return [] unless running?
conn = connect
info = nil
Timeout::timeout(@@memcached_timeout) do
info = conn.stats
end
rescue => e
logger.error("Failed to get stats for instance: #{self[:ip]}\:#{SERVICE_PORT} - #{e.inspect}")
raise e
ensure
begin
conn.close if conn
return info[info.keys.first]
rescue => e
end
end
def bin_dir
self.class.bin_dir["memcached"]
end
def start_script
# memcached -m memory_size -p port_num -c connection -v -S
cmd_components = [
"#{service_script}",
"start",
"#{base_dir}",
"#{log_dir}",
"#{common_dir}",
"#{bin_dir}",
"-m #{@@memcached_memory}",
"-p #{SERVICE_PORT}",
"-c #{@@max_clients}",
"-v",
@@sasl_enabled ? "-S" : ""
]
cmd_components.join(" ")
end
def start_options
options = super
options[:start_script] = {:script => start_script, :use_spawn => true}
options[:service_port] = SERVICE_PORT
options
end
def finish_first_start?
conn = nil
Timeout::timeout(@@memcached_timeout) do
conn = Dalli::Client.new("#{self[:ip]}\:#{SERVICE_PORT}")
conn.get("foobar")
return true
end
rescue => e
return false
ensure
begin
conn.close if conn
rescue => e
end
end
def finish_start?
# No user check is the same with first start check
return finish_first_start? unless @@sasl_enabled
conn = nil
begin
Timeout::timeout(@@memcached_timeout) do
conn = Dalli::Client.new("#{self[:ip]}\:#{SERVICE_PORT}", username: self[:user], password: self[:password])
conn.get("foobar")
end
rescue => e
return false
ensure
begin
conn.close if conn
rescue => e
end
end
end
end