1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
16 "git.curoverse.com/arvados.git/lib/cloud"
17 "git.curoverse.com/arvados.git/lib/dispatchcloud/container"
18 "git.curoverse.com/arvados.git/lib/dispatchcloud/scheduler"
19 "git.curoverse.com/arvados.git/lib/dispatchcloud/ssh_executor"
20 "git.curoverse.com/arvados.git/lib/dispatchcloud/worker"
21 "git.curoverse.com/arvados.git/sdk/go/arvados"
22 "git.curoverse.com/arvados.git/sdk/go/auth"
23 "git.curoverse.com/arvados.git/sdk/go/httpserver"
24 "github.com/Sirupsen/logrus"
25 "github.com/prometheus/client_golang/prometheus"
26 "github.com/prometheus/client_golang/prometheus/promhttp"
27 "golang.org/x/crypto/ssh"
31 defaultPollInterval = time.Second
32 defaultStaleLockTimeout = time.Minute
37 Instances() []worker.InstanceView
40 type dispatcher struct {
41 Cluster *arvados.Cluster
42 InstanceSetID cloud.InstanceSetID
44 logger logrus.FieldLogger
45 reg *prometheus.Registry
46 instanceSet cloud.InstanceSet
48 queue scheduler.ContainerQueue
49 httpHandler http.Handler
57 // Start starts the dispatcher. Start can be called multiple times
58 // with no ill effect.
59 func (disp *dispatcher) Start() {
60 disp.setupOnce.Do(disp.setup)
63 // ServeHTTP implements service.Handler.
64 func (disp *dispatcher) ServeHTTP(w http.ResponseWriter, r *http.Request) {
66 disp.httpHandler.ServeHTTP(w, r)
69 // CheckHealth implements service.Handler.
70 func (disp *dispatcher) CheckHealth() error {
75 // Stop dispatching containers and release resources. Typically used
77 func (disp *dispatcher) Close() {
80 case disp.stop <- struct{}{}:
86 // Make a worker.Executor for the given instance.
87 func (disp *dispatcher) newExecutor(inst cloud.Instance) worker.Executor {
88 exr := ssh_executor.New(inst)
89 exr.SetSigners(disp.sshKey)
93 func (disp *dispatcher) typeChooser(ctr *arvados.Container) (arvados.InstanceType, error) {
94 return ChooseInstanceType(disp.Cluster, ctr)
97 func (disp *dispatcher) setup() {
102 func (disp *dispatcher) initialize() {
103 arvClient := arvados.NewClientFromEnv()
104 if disp.InstanceSetID == "" {
105 if strings.HasPrefix(arvClient.AuthToken, "v2/") {
106 disp.InstanceSetID = cloud.InstanceSetID(strings.Split(arvClient.AuthToken, "/")[1])
108 // Use some other string unique to this token
109 // that doesn't reveal the token itself.
110 disp.InstanceSetID = cloud.InstanceSetID(fmt.Sprintf("%x", md5.Sum([]byte(arvClient.AuthToken))))
113 disp.stop = make(chan struct{}, 1)
114 disp.stopped = make(chan struct{})
115 disp.logger = logrus.StandardLogger()
117 if key, err := ssh.ParsePrivateKey(disp.Cluster.Dispatch.PrivateKey); err != nil {
118 disp.logger.Fatalf("error parsing configured Dispatch.PrivateKey: %s", err)
123 instanceSet, err := newInstanceSet(disp.Cluster, disp.InstanceSetID)
125 disp.logger.Fatalf("error initializing driver: %s", err)
127 disp.instanceSet = &instanceSetProxy{instanceSet}
128 disp.reg = prometheus.NewRegistry()
129 disp.pool = worker.NewPool(disp.logger, disp.reg, disp.instanceSet, disp.newExecutor, disp.Cluster)
130 disp.queue = container.NewQueue(disp.logger, disp.reg, disp.typeChooser, arvClient)
132 if disp.Cluster.ManagementToken == "" {
133 disp.httpHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
134 http.Error(w, "Management API authentication is not configured", http.StatusForbidden)
137 mux := http.NewServeMux()
138 mux.HandleFunc("/arvados/v1/dispatch/containers", disp.apiContainers)
139 mux.HandleFunc("/arvados/v1/dispatch/instances", disp.apiInstances)
140 metricsH := promhttp.HandlerFor(disp.reg, promhttp.HandlerOpts{
141 ErrorLog: disp.logger,
143 mux.Handle("/metrics", metricsH)
144 mux.Handle("/metrics.json", metricsH)
145 disp.httpHandler = auth.RequireLiteralToken(disp.Cluster.ManagementToken, mux)
149 func (disp *dispatcher) run() {
150 defer close(disp.stopped)
151 defer disp.instanceSet.Stop()
153 staleLockTimeout := time.Duration(disp.Cluster.Dispatch.StaleLockTimeout)
154 if staleLockTimeout == 0 {
155 staleLockTimeout = defaultStaleLockTimeout
157 pollInterval := time.Duration(disp.Cluster.Dispatch.PollInterval)
158 if pollInterval <= 0 {
159 pollInterval = defaultPollInterval
161 sched := scheduler.New(disp.logger, disp.queue, disp.pool, staleLockTimeout, pollInterval)
168 // Management API: all active and queued containers.
169 func (disp *dispatcher) apiContainers(w http.ResponseWriter, r *http.Request) {
170 if r.Method != "GET" {
171 httpserver.Error(w, "method not allowed", http.StatusMethodNotAllowed)
175 Items []container.QueueEnt
177 qEntries, _ := disp.queue.Entries()
178 for _, ent := range qEntries {
179 resp.Items = append(resp.Items, ent)
181 json.NewEncoder(w).Encode(resp)
184 // Management API: all active instances (cloud VMs).
185 func (disp *dispatcher) apiInstances(w http.ResponseWriter, r *http.Request) {
186 if r.Method != "GET" {
187 httpserver.Error(w, "method not allowed", http.StatusMethodNotAllowed)
191 Items []worker.InstanceView
193 resp.Items = disp.pool.Instances()
194 json.NewEncoder(w).Encode(resp)