2021-07-09 22:08:38 +00:00
|
|
|
import json
|
|
|
|
import ipaddress
|
2021-01-02 23:10:01 +00:00
|
|
|
|
|
|
|
from flask import Blueprint
|
|
|
|
from flask import current_app
|
2021-07-09 22:08:38 +00:00
|
|
|
from flask import request, make_response
|
2021-01-02 23:10:01 +00:00
|
|
|
from werkzeug.exceptions import abort
|
|
|
|
|
2021-01-04 19:32:52 +00:00
|
|
|
from capsulflask.db import get_model
|
|
|
|
from capsulflask.shared import my_exec_info_message, authorized_as_hub
|
2021-01-02 23:10:01 +00:00
|
|
|
|
2021-01-03 01:07:43 +00:00
|
|
|
bp = Blueprint("hub", __name__, url_prefix="/hub")
|
2021-01-02 23:10:01 +00:00
|
|
|
|
|
|
|
def authorized_for_host(id):
|
2021-01-04 19:32:52 +00:00
|
|
|
if request.headers.get('Authorization'):
|
|
|
|
auth_header_value = request.headers.get('Authorization').replace("Bearer ", "")
|
|
|
|
return get_model().authorized_for_host(id, auth_header_value)
|
|
|
|
return False
|
2021-01-02 23:10:01 +00:00
|
|
|
|
2021-01-04 19:32:52 +00:00
|
|
|
@bp.route("/heartbeat-task", methods=("POST",))
|
|
|
|
def ping_all_hosts_task():
|
|
|
|
if authorized_as_hub(request.headers):
|
|
|
|
all_hosts = get_model().get_all_hosts()
|
2021-01-04 23:20:03 +00:00
|
|
|
current_app.logger.debug(f"pinging {len(all_hosts)} hosts...")
|
2021-01-04 19:32:52 +00:00
|
|
|
authorization_header = f"Bearer {current_app.config['HUB_TOKEN']}"
|
2021-02-16 05:51:59 +00:00
|
|
|
results = current_app.config["HTTP_CLIENT"].do_multi_http_sync(all_hosts, "/spoke/heartbeat", None, authorization_header=authorization_header)
|
2021-01-04 19:32:52 +00:00
|
|
|
for i in range(len(all_hosts)):
|
|
|
|
host = all_hosts[i]
|
|
|
|
result = results[i]
|
2021-01-04 23:20:03 +00:00
|
|
|
current_app.logger.debug(f"response from {host.id} ({host.url}): {result.status_code} {result.body}")
|
2021-01-04 19:32:52 +00:00
|
|
|
if result.status_code == 200:
|
|
|
|
get_model().host_heartbeat(host.id)
|
|
|
|
|
|
|
|
return "ok"
|
|
|
|
else:
|
2021-01-04 23:20:03 +00:00
|
|
|
current_app.logger.warning(f"/hub/heartbeat-task returned 401: invalid hub token")
|
2021-01-04 19:32:52 +00:00
|
|
|
return abort(401, "invalid hub token")
|
|
|
|
|
|
|
|
|
|
|
|
@bp.route("/heartbeat/<string:host_id>", methods=("POST",))
|
2021-01-04 01:17:30 +00:00
|
|
|
def heartbeat(host_id):
|
|
|
|
if authorized_for_host(host_id):
|
2021-01-04 19:32:52 +00:00
|
|
|
return "ok"
|
2021-01-02 23:10:01 +00:00
|
|
|
else:
|
2021-01-04 23:20:03 +00:00
|
|
|
current_app.logger.warning(f"/hub/heartbeat/{host_id} returned 401: invalid token")
|
2021-01-04 01:17:30 +00:00
|
|
|
return abort(401, "invalid host id or token")
|
|
|
|
|
2021-01-04 19:32:52 +00:00
|
|
|
@bp.route("/claim-operation/<int:operation_id>/<string:host_id>", methods=("POST",))
|
2021-01-04 01:17:30 +00:00
|
|
|
def claim_operation(operation_id: int, host_id: str):
|
|
|
|
if authorized_for_host(host_id):
|
2021-07-09 22:08:38 +00:00
|
|
|
payload_json = get_model().get_payload_json_from_host_operation(operation_id, host_id)
|
|
|
|
if payload_json is None:
|
|
|
|
error_message = f"{host_id} can't claim operation {operation_id} because host_operation row not found"
|
|
|
|
current_app.logger.error(error_message)
|
|
|
|
return abort(404, error_message)
|
|
|
|
|
2021-07-11 17:18:58 +00:00
|
|
|
# right now if there is a can_claim_handler there needs to be a corresponding on_claimed_handler.
|
|
|
|
# this is sole-ly due to laziness in error handling.
|
2021-07-09 22:08:38 +00:00
|
|
|
can_claim_handlers = {
|
|
|
|
"create": can_claim_create,
|
|
|
|
}
|
2021-07-11 17:18:58 +00:00
|
|
|
on_claimed_handlers = {
|
|
|
|
"create": on_create_claimed,
|
|
|
|
}
|
2021-07-09 22:08:38 +00:00
|
|
|
error_message = ""
|
|
|
|
payload = None
|
|
|
|
payload_is_dict = False
|
|
|
|
payload_has_type = False
|
|
|
|
payload_has_valid_type = False
|
|
|
|
try:
|
|
|
|
payload = json.loads(payload_json)
|
|
|
|
payload_is_dict = isinstance(payload, dict)
|
|
|
|
payload_has_type = payload_is_dict and 'type' in payload
|
|
|
|
payload_has_valid_type = payload_has_type and payload['type'] in can_claim_handlers
|
|
|
|
|
|
|
|
if not payload_is_dict:
|
|
|
|
error_message = "invalid json: expected an object"
|
|
|
|
elif not payload_has_type:
|
|
|
|
error_message = "invalid json: 'type' field is required"
|
|
|
|
elif not payload_has_valid_type:
|
|
|
|
error_message = f"invalid json: expected type \"{payload['type']}\" to be one of [{', '.join(can_claim_handlers.keys())}]"
|
|
|
|
except:
|
|
|
|
error_message = "could not parse payload as json"
|
|
|
|
|
2021-07-11 17:18:58 +00:00
|
|
|
if error_message != "":
|
2021-07-09 22:08:38 +00:00
|
|
|
error_message = f"{host_id} can't claim operation {operation_id} because {error_message}"
|
|
|
|
current_app.logger.error(error_message)
|
|
|
|
return abort(400, error_message)
|
|
|
|
|
|
|
|
# we will only return this payload as json if claiming succeeds, so might as well do this now...
|
|
|
|
payload['assignment_status'] = 'assigned'
|
|
|
|
|
|
|
|
# invoke the appropriate can_claim_handler for this operation type
|
|
|
|
result_tuple = can_claim_handlers[payload['type']](payload, host_id)
|
2021-07-11 17:18:58 +00:00
|
|
|
modified_payload = result_tuple[0]
|
2021-07-09 22:08:38 +00:00
|
|
|
error_message = result_tuple[1]
|
|
|
|
|
2021-07-11 17:18:58 +00:00
|
|
|
if error_message != "":
|
2021-07-09 22:08:38 +00:00
|
|
|
error_message = f"{host_id} can't claim operation {operation_id} because {error_message}"
|
|
|
|
current_app.logger.error(error_message)
|
|
|
|
return abort(400, error_message)
|
|
|
|
|
2021-01-04 01:17:30 +00:00
|
|
|
claimed = get_model().claim_operation(operation_id, host_id)
|
|
|
|
if claimed:
|
2021-07-11 17:18:58 +00:00
|
|
|
modified_payload_json = json.dumps(modified_payload)
|
|
|
|
get_model().update_operation(operation_id, modified_payload_json)
|
|
|
|
on_claimed_handlers[payload['type']](modified_payload, host_id)
|
2021-07-09 22:08:38 +00:00
|
|
|
|
2021-07-11 17:18:58 +00:00
|
|
|
response = make_response(modified_payload_json)
|
|
|
|
response.headers.set("Content-Type", "application/json")
|
2021-07-09 22:08:38 +00:00
|
|
|
|
|
|
|
return response
|
2021-01-04 01:17:30 +00:00
|
|
|
else:
|
2021-07-09 22:08:38 +00:00
|
|
|
return abort(409, f"operation was already assigned to another host")
|
2021-01-04 01:17:30 +00:00
|
|
|
else:
|
2021-01-04 23:20:03 +00:00
|
|
|
current_app.logger.warning(f"/hub/claim-operation/{operation_id}/{host_id} returned 401: invalid token")
|
2021-01-02 23:10:01 +00:00
|
|
|
return abort(401, "invalid host id or token")
|
|
|
|
|
2021-07-09 22:08:38 +00:00
|
|
|
def can_claim_create(payload, host_id) -> (str, str):
|
|
|
|
|
|
|
|
hosts = get_model().list_hosts_with_networks(host_id)
|
|
|
|
|
|
|
|
if host_id not in hosts:
|
|
|
|
return "", f"the host \"{host_id}\" does not appear to have any networks."
|
|
|
|
|
2021-07-11 17:18:58 +00:00
|
|
|
networks = hosts[host_id]['networks']
|
2021-07-09 22:08:38 +00:00
|
|
|
|
|
|
|
vms_by_host_and_network = get_model().non_deleted_vms_by_host_and_network(host_id)
|
|
|
|
|
|
|
|
vms_by_network = dict()
|
|
|
|
if host_id in vms_by_host_and_network:
|
|
|
|
vms_by_network = vms_by_host_and_network[host_id]
|
|
|
|
|
|
|
|
allocated_ipv4_address = None
|
|
|
|
allocated_network_name = None
|
|
|
|
for network in networks:
|
|
|
|
vms = []
|
|
|
|
if network["network_name"] in vms_by_network:
|
|
|
|
vms = vms_by_network[network["network_name"]]
|
|
|
|
|
|
|
|
claimed_ipv4s = dict()
|
|
|
|
for vm in vms:
|
|
|
|
claimed_ipv4s[vm['public_ipv4']] = True
|
|
|
|
|
2021-07-12 16:29:33 +00:00
|
|
|
|
2021-07-09 22:08:38 +00:00
|
|
|
ipv4_network = ipaddress.ip_network(network["public_ipv4_cidr_block"], False)
|
2021-07-12 19:38:56 +00:00
|
|
|
ipv4_first_usable_ip = network["public_ipv4_first_usable_ip"]
|
|
|
|
ipv4_last_usable_ip = network["public_ipv4_last_usable_ip"]
|
|
|
|
|
2021-07-09 22:08:38 +00:00
|
|
|
for ipv4_address in ipv4_network:
|
2021-07-12 19:38:56 +00:00
|
|
|
within_usable_range = ipv4_first_usable_ip <= str(ipv4_address) and str(ipv4_address) <= ipv4_last_usable_ip
|
|
|
|
if within_usable_range and str(ipv4_address) not in claimed_ipv4s:
|
2021-07-09 22:08:38 +00:00
|
|
|
allocated_ipv4_address = str(ipv4_address)
|
|
|
|
break
|
|
|
|
|
|
|
|
if allocated_ipv4_address is not None:
|
|
|
|
allocated_network_name = network["network_name"]
|
|
|
|
break
|
|
|
|
|
|
|
|
if allocated_network_name is None or allocated_ipv4_address is None:
|
|
|
|
return "", f"host \"{host_id}\" does not have any avaliable IP addresses on any of its networks."
|
|
|
|
|
2021-07-12 21:10:28 +00:00
|
|
|
# payload["network_name"] = allocated_network_name
|
|
|
|
# hard-code the network name for now until we can fix the phantom dhcp lease issues.
|
|
|
|
|
2021-07-18 10:03:57 +00:00
|
|
|
payload["network_name"] = 'public3'
|
2021-07-11 17:18:58 +00:00
|
|
|
payload["public_ipv4"] = allocated_ipv4_address
|
|
|
|
|
|
|
|
return payload, ""
|
|
|
|
|
|
|
|
def on_create_claimed(payload, host_id):
|
|
|
|
get_model().create_vm(
|
|
|
|
email=payload['email'],
|
|
|
|
id=payload['id'],
|
|
|
|
size=payload['size'],
|
|
|
|
os=payload['os'],
|
|
|
|
host=host_id,
|
2021-07-12 21:10:28 +00:00
|
|
|
network_name=payload['network_name'],
|
2021-07-11 17:18:58 +00:00
|
|
|
public_ipv4=payload['public_ipv4'],
|
2021-07-18 11:26:46 +00:00
|
|
|
ssh_authorized_keys=list(map(lambda x: x["name"], payload['ssh_authorized_keys'])),
|
2021-07-13 22:42:28 +00:00
|
|
|
)
|