1 class Node < ArvadosModel
4 include CommonApiTemplate
6 serialize :properties, Hash
7 before_validation :ensure_ping_secret
8 after_update :dns_server_update
10 # Only a controller can figure out whether or not the current API tokens
11 # have access to the associated Job. They're expected to set
12 # job_readable=true if the Job UUID can be included in the API response.
13 belongs_to(:job, foreign_key: :job_uuid, primary_key: :uuid)
14 attr_accessor :job_readable
16 api_accessible :user, :extend => :common do |t|
23 t.add :api_job_uuid, as: :job_uuid
24 t.add :crunch_worker_state
27 api_accessible :superuser, :extend => :user do |t|
30 t.add lambda { |x| Rails.configuration.compute_node_nameservers }, :as => :nameservers
34 super || Rails.configuration.compute_node_domain
38 job_readable ? job_uuid : nil
41 def crunch_worker_state
42 return 'down' if slot_number.nil?
43 case self.info.andand['slurm_state']
55 if db_current_time - self.created_at > 5.minutes
60 elsif db_current_time - self.last_ping_at > 1.hours
68 raise "must have :ip and :ping_secret" unless o[:ip] and o[:ping_secret]
70 if o[:ping_secret] != self.info['ping_secret']
71 logger.info "Ping: secret mismatch: received \"#{o[:ping_secret]}\" != \"#{self.info['ping_secret']}\""
72 raise ArvadosModel::UnauthorizedError.new("Incorrect ping_secret")
75 current_time = db_current_time
76 self.last_ping_at = current_time
78 @bypass_arvados_authorization = true
81 if self.ip_address.nil?
82 logger.info "#{self.uuid} ip_address= #{o[:ip]}"
83 self.ip_address = o[:ip]
84 self.first_ping_at = current_time
87 # Record instance ID if not already known
88 if o[:ec2_instance_id]
89 if !self.info['ec2_instance_id']
90 self.info['ec2_instance_id'] = o[:ec2_instance_id]
91 elsif self.info['ec2_instance_id'] != o[:ec2_instance_id]
92 logger.debug "Multiple nodes have credentials for #{self.uuid}"
93 raise "#{self.uuid} is already running at #{self.info['ec2_instance_id']} so rejecting ping from #{o[:ec2_instance_id]}"
98 if self.slot_number.nil?
101 self.slot_number = try_slot
105 rescue ActiveRecord::RecordNotUnique
108 raise "No available node slots" if try_slot == Rails.configuration.max_compute_nodes
113 if self.hostname.nil? and Rails.configuration.assign_node_hostname
114 self.hostname = self.class.hostname_for_slot(self.slot_number)
117 # Record other basic stats
118 ['total_cpu_cores', 'total_ram_mb', 'total_scratch_mb'].each do |key|
119 if value = (o[key] or o[key.to_sym])
120 self.properties[key] = value.to_i
122 self.properties.delete(key)
131 def ensure_ping_secret
132 self.info['ping_secret'] ||= rand(2**256).to_s(36)
135 def dns_server_update
136 if self.hostname_changed? or self.ip_address_changed?
137 if not self.ip_address.nil?
138 stale_conflicting_nodes = Node.where('id != ? and ip_address = ? and last_ping_at < ?',self.id,self.ip_address,10.minutes.ago)
139 if not stale_conflicting_nodes.empty?
140 # One or more stale compute node records have the same IP address as the new node.
141 # Clear the ip_address field on the stale nodes.
142 stale_conflicting_nodes.each do |stale_node|
143 stale_node.ip_address = nil
148 if self.hostname and self.ip_address
149 self.class.dns_server_update(self.hostname, self.ip_address)
154 def self.dns_server_update hostname, ip_address
157 ptr_domain = ip_address.
158 split('.').reverse.join('.').concat('.in-addr.arpa')
162 uuid_prefix: Rails.configuration.uuid_prefix,
163 ip_address: ip_address,
164 ptr_domain: ptr_domain,
167 if Rails.configuration.dns_server_conf_dir and Rails.configuration.dns_server_conf_template
170 template = IO.read(Rails.configuration.dns_server_conf_template)
172 logger.error "Reading #{Rails.configuration.dns_server_conf_template}: #{e.message}"
176 hostfile = File.join Rails.configuration.dns_server_conf_dir, "#{hostname}.conf"
177 File.open hostfile+'.tmp', 'w' do |f|
178 f.puts template % template_vars
180 File.rename hostfile+'.tmp', hostfile
182 logger.error "Writing #{hostfile}: #{e.message}"
187 if Rails.configuration.dns_server_update_command
188 cmd = Rails.configuration.dns_server_update_command % template_vars
190 logger.error "dns_server_update_command #{cmd.inspect} failed: #{$?}"
195 if Rails.configuration.dns_server_conf_dir and Rails.configuration.dns_server_reload_command
196 restartfile = File.join(Rails.configuration.dns_server_conf_dir, 'restart.txt')
198 File.open(restartfile, 'w') do |f|
199 # Typically, this is used to trigger a dns server restart
200 f.puts Rails.configuration.dns_server_reload_command
203 logger.error "Unable to write #{restartfile}: #{e.message}"
211 def self.hostname_for_slot(slot_number)
212 config = Rails.configuration.assign_node_hostname
214 return nil if !config
216 sprintf(config, {:slot_number => slot_number})
219 # At startup, make sure all DNS entries exist. Otherwise, slurmctld
220 # will refuse to start.
221 if Rails.configuration.dns_server_conf_dir and Rails.configuration.dns_server_conf_template and Rails.configuration.assign_node_hostname
222 (0..Rails.configuration.max_compute_nodes-1).each do |slot_number|
223 hostname = hostname_for_slot(slot_number)
224 hostfile = File.join Rails.configuration.dns_server_conf_dir, "#{hostname}.conf"
225 if !File.exists? hostfile
226 n = Node.where(:slot_number => slot_number).first
227 if n.nil? or n.ip_address.nil?
228 dns_server_update(hostname, '127.40.4.0')
230 dns_server_update(hostname, n.ip_address)
236 def permission_to_update
237 @bypass_arvados_authorization or super
240 def permission_to_create
241 current_user and current_user.is_admin