348 lines
14 KiB
Ruby
348 lines
14 KiB
Ruby
require 'rufus-scheduler'
|
|
require "uri"
|
|
|
|
require "commands/status"
|
|
require "commands/server"
|
|
require "commands/bootstrap_templates"
|
|
require "commands/knife_commands"
|
|
|
|
require "providers/provider_factory"
|
|
|
|
require "db/mongo/models/server"
|
|
|
|
require "workers/create_server_worker"
|
|
require "workers/bootstrap_worker"
|
|
|
|
module Devops
|
|
module Version2_0
|
|
module Handler
|
|
class Server
|
|
|
|
extend StatusCommands
|
|
extend ServerCommands
|
|
extend BootstrapTemplatesCommands
|
|
|
|
scheduler = Rufus::Scheduler.new
|
|
|
|
def self.get_servers
|
|
lambda {
|
|
check_privileges("server", "r")
|
|
fields = []
|
|
if params.key?("fields") and params["fields"].is_a?(Array)
|
|
Server.fields.each do |k|
|
|
fields.push k if params["fields"].include?(k)
|
|
end
|
|
end
|
|
reserved = (params.key?("reserved") ? true : nil)
|
|
json settings.mongo.servers(nil, nil, nil, reserved, fields).map {|s| s.to_hash}
|
|
}
|
|
end
|
|
|
|
def self.get_chef_servers
|
|
lambda {
|
|
check_privileges("server", "r")
|
|
json KnifeCommands.chef_node_list
|
|
}
|
|
end
|
|
|
|
def self.get_provider_servers
|
|
lambda {
|
|
check_privileges("server", "r")
|
|
json ::Provider::ProviderFactory.get(params[:provider]).servers
|
|
}
|
|
end
|
|
|
|
def self.get_server
|
|
lambda {
|
|
check_privileges("server", "r")
|
|
json Server.get_server_by_key(params[:name], params[:key]).to_hash
|
|
}
|
|
end
|
|
|
|
def self.delete_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
key = (body.nil? ? nil : body["key"])
|
|
s = Server.get_server_by_key(params[:id], key)
|
|
### Authorization
|
|
settings.mongo.check_project_auth s.project, s.deploy_env, request.env['REMOTE_USER']
|
|
info, r = delete_server(s, settings.mongo, logger)
|
|
create_response(info, r)
|
|
}
|
|
end
|
|
|
|
def self.create_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body
|
|
user = request.env['REMOTE_USER']
|
|
project_name = check_string(body["project"], "Parameter 'project' must be a not empty string")
|
|
env_name = check_string(body["deploy_env"], "Parameter 'deploy_env' must be a not empty string")
|
|
server_name = check_string(body["name"], "Parameter 'name' should be null or not empty string", true)
|
|
without_bootstrap = body["without_bootstrap"]
|
|
halt_response("Parameter 'without_bootstrap' should be a null or true") unless without_bootstrap.nil? or without_bootstrap == true
|
|
force = body["force"]
|
|
halt_response("Parameter 'force' should be a null or true") unless force.nil? or force == true
|
|
groups = check_array(body["groups"], "Parameter 'groups' should be null or not empty array of string", String, true)
|
|
key_name = check_string(body["key"], "Parameter 'key' should be null or not empty string", true)
|
|
new_key = settings.mongo.key(key_name) unless key_name.nil?
|
|
|
|
p = settings.mongo.check_project_auth(project_name, env_name, user)
|
|
env = p.deploy_env(env_name)
|
|
|
|
provider = ::Provider::ProviderFactory.get(env.provider)
|
|
Server.check_chef_node_name(server_name, provider) unless server_name.nil?
|
|
unless groups.nil?
|
|
buf = groups - provider.groups.keys
|
|
halt_response("Invalid security groups '#{buf.join("', '")}' for provider '#{provider.name}'") if buf.empty?
|
|
end
|
|
|
|
servers = extract_servers(provider, p, env, body, user, settings.mongo)
|
|
if body.key?("trace")
|
|
stream() do |out|
|
|
begin
|
|
status = []
|
|
servers.each do |s|
|
|
res = create_server_proc.call(out, s, provider, settings.mongo)
|
|
status.push res
|
|
end
|
|
out << create_status(status)
|
|
rescue IOError => e
|
|
logger.error e.message
|
|
end
|
|
end
|
|
else
|
|
dir = DevopsService.config[:report_dir_v2]
|
|
files = []
|
|
uri = URI.parse(request.url)
|
|
servers.each do |s|
|
|
h = s.to_hash
|
|
h["options"] = s.options
|
|
jid = CreateServerWorker.perform_async(dir, env.provider, h, request.env['REMOTE_USER'], DevopsService.config)
|
|
logger.info "Job '#{jid}' has been started"
|
|
uri.path = "#{DevopsService.config[:url_prefix]}/v2.0/report/" + jid
|
|
files.push uri.to_s
|
|
end
|
|
sleep 1
|
|
json files
|
|
end
|
|
}
|
|
end
|
|
|
|
def self.pause_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
key = (body.nil? ? nil : body["key"])
|
|
s = Server.get_server_by_key(params[:node_name], key)
|
|
## Authorization
|
|
settings.mongo.check_project_auth s.project, s.deploy_env, request.env['REMOTE_USER']
|
|
provider = ::Provider::ProviderFactory.get(s.provider)
|
|
r = provider.pause_server s
|
|
if r.nil?
|
|
create_response("Server with instance ID '#{s.id}' and node name '#{params[:node_name]}' is paused")
|
|
else
|
|
halt_response("Server with instance ID '#{s.id}' and node name '#{params[:node_name]}' can not be paused, It in state '#{r}'", 409)
|
|
end
|
|
}
|
|
end
|
|
|
|
def self.unpause_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
key = (body.nil? ? nil : body["key"])
|
|
s = Server.get_server_by_key(params[:node_name], key)
|
|
## Authorization
|
|
settings.mongo.check_project_auth s.project, s.deploy_env, request.env['REMOTE_USER']
|
|
provider = ::Provider::ProviderFactory.get(s.provider)
|
|
r = provider.unpause_server s
|
|
if r.nil?
|
|
create_response("Server with instance ID '#{s.id}' and node name '#{params[:node_name]}' is unpaused")
|
|
else
|
|
halt_response("Server with instance ID '#{s.id}' and node name '#{params[:node_name]}' can not be unpaused, It in state '#{r}'", 409)
|
|
end
|
|
|
|
}
|
|
end
|
|
|
|
def self.reserve_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
key = (body.nil? ? nil : body["key"])
|
|
s = Server.get_server_by_key(params[:node_name], key)
|
|
user = request.env['REMOTE_USER']
|
|
settings.mongo.check_project_auth s.project, s.deploy_env, user
|
|
halt_response(400, "Server '#{params[:node_name]}' already reserved") unless s.reserved_by.nil?
|
|
s.reserved_by = user
|
|
settings.mongo.server_update(s)
|
|
create_response("Server '#{params[:node_name]}' has been reserved")
|
|
|
|
}
|
|
end
|
|
|
|
def self.unreserve_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
key = (body.nil? ? nil : body["key"])
|
|
s = Server.get_server_by_key(params[:node_name], key)
|
|
settings.mongo.check_project_auth s.project, s.deploy_env, request.env['REMOTE_USER']
|
|
halt_response(400, "Server '#{params[:node_name]}' is not reserved") if s.reserved_by.nil?
|
|
s.reserved_by = nil
|
|
settings.mongo.server_update(s)
|
|
create_response("Server '#{params[:node_name]}' has been unreserved")
|
|
}
|
|
end
|
|
|
|
# TODO: check bootstrap template name
|
|
def self.bootstrap_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body(Hash, true)
|
|
id = check_string(body["instance_id"], "Parameter 'instance_id' must be a not empty string")
|
|
name = check_string(body["name"], "Parameter 'name' should be a not empty string", true)
|
|
rl = check_array(body["run_list"], "Parameter 'run_list' should be a not empty array of string", String, true)
|
|
unless rl.nil?
|
|
validator = Validators::Helpers::RunList.new(rl)
|
|
halt_response(validator.message) unless validator.valid?
|
|
end
|
|
t = check_string(body["bootstrap_template"], "Parameter 'bootstrap_template' should be a not empty string", true)
|
|
s = settings.mongo.server_by_instance_id(id)
|
|
|
|
p = settings.mongo.check_project_auth s.project, s.deploy_env, request.env['REMOTE_USER']
|
|
d = p.deploy_env s.deploy_env
|
|
|
|
provider = ::Provider::ProviderFactory.get(s.provider)
|
|
|
|
Server.check_chef_node_name(name, provider) unless name.nil?
|
|
s.options = {
|
|
:run_list => rl || d.run_list,
|
|
}
|
|
unless t.nil?
|
|
templates = get_templates
|
|
halt_response("Invalid bootstrap template '#{t}', available values: #{templates.join(", ")}", 400) unless templates.include?(t)
|
|
s.options[:bootstrap_template] = t
|
|
end
|
|
s.chef_node_name = name || provider.create_default_chef_node_name(s)
|
|
logger.debug "Chef node name: '#{s.chef_node_name}'"
|
|
status = []
|
|
if body.key?("trace")
|
|
stream() do |out|
|
|
begin
|
|
cert = settings.mongo.key s.key
|
|
logger.debug "Bootstrap certificate path: #{cert.path}"
|
|
bootstrap s, out, cert.path, logger
|
|
str = nil
|
|
r = if check_server(s)
|
|
settings.mongo.server_set_chef_node_name s
|
|
str = "Server with id '#{s.id}' is bootstraped"
|
|
logger.info str
|
|
0
|
|
else
|
|
str = "Server with id '#{s.id}' is not bootstraped"
|
|
logger.warn str
|
|
1
|
|
end
|
|
status.push r
|
|
out << str
|
|
out << "\n"
|
|
out << create_status(status)
|
|
rescue IOError => e
|
|
logger.error e.message
|
|
end
|
|
end
|
|
else
|
|
dir = DevopsService.config[:report_dir_v2]
|
|
files = []
|
|
uri = URI.parse(request.url)
|
|
h = s.to_hash
|
|
h["options"] = s.options
|
|
h["_id"] = s.id
|
|
jid = BootstrapWorker.perform_async(dir, d.provider, h, request.env['REMOTE_USER'], DevopsService.config)
|
|
logger.info "Job '#{jid}' has been started"
|
|
uri.path = "#{DevopsService.config[:url_prefix]}/v2.0/report/" + jid
|
|
uri.query = nil
|
|
uri.fragment = nil
|
|
files.push uri.to_s
|
|
sleep 1
|
|
json files
|
|
end
|
|
}
|
|
end
|
|
|
|
def self.add_server
|
|
lambda {
|
|
check_privileges("server", "w")
|
|
body = create_object_from_json_body
|
|
project = check_string(body["project"], "Parameter 'project' must be a not empty string")
|
|
deploy_env = check_string(body["deploy_env"], "Parameter 'deploy_env' must be a not empty string")
|
|
key = check_string(body["key"], "Parameter 'key' must be a not empty string")
|
|
remote_user = check_string(body["remote_user"], "Parameter 'remote_user' must be a not empty string")
|
|
private_ip = check_string(body["private_ip"], "Parameter 'private_ip' must be a not empty string")
|
|
public_ip = check_string(body["public_ip"], "Parameter 'public_ip' should be a not empty string", true)
|
|
p = settings.mongo.check_project_auth project, deploy_env, request.env['REMOTE_USER']
|
|
|
|
d = p.deploy_env(deploy_env)
|
|
|
|
cert = settings.mongo.key(key)
|
|
provider = ::Provider::ProviderFactory.get("static")
|
|
s = Server.new
|
|
s.provider = provider.name
|
|
s.project = project
|
|
s.deploy_env = deploy_env
|
|
s.remote_user = remote_user
|
|
s.private_ip = private_ip
|
|
s.public_ip = public_ip
|
|
s.static = true
|
|
s.id = "static_#{cert.id}-#{Time.now.to_i}"
|
|
s.key = cert.id
|
|
settings.mongo.server_insert s
|
|
create_response("Server '#{s.id}' has been added")
|
|
}
|
|
end
|
|
|
|
def self.get_server_by_key id, key
|
|
key == "instance" ? settings.mongo.server_by_instance_id(id) : settings.mongo.server_by_chef_node_name(id)
|
|
end
|
|
|
|
def self.check_chef_node_name name, provider
|
|
settings.mongo.server_by_chef_node_name name
|
|
halt(400, "Server with name '#{name}' already exist")
|
|
rescue RecordNotFound => e
|
|
# server not found - OK
|
|
s = provider.servers.detect {|s| s["name"] == name}
|
|
halt(400, "#{provider.name} node with name '#{name}' already exist") unless s.nil?
|
|
s = KnifeCommands.chef_node_list.detect {|n| n == name}
|
|
halt(400, "Chef node with name '#{name}' already exist") unless s.nil?
|
|
s = KnifeCommands.chef_client_list.detect {|c| c == name}
|
|
halt(400, "Chef client with name '#{name}' already exist") unless s.nil?
|
|
end
|
|
|
|
end
|
|
|
|
class ExpireHandler
|
|
include ServerCommands
|
|
|
|
def initialize server, logger
|
|
@server = server
|
|
@logger = logger
|
|
end
|
|
|
|
def call(job)
|
|
@logger.info("Removing node '#{@server.chef_node_name}' form project '#{@server.project}' and env '#{@server.deploy_env}'")
|
|
begin
|
|
delete_server(@server, settings.mongo, @logger)
|
|
rescue => e
|
|
logger.error "ExpiredHandler error: " + e.message
|
|
end
|
|
end
|
|
end
|
|
|
|
end
|
|
end
|
|
end
|
|
|