X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/e39622cf761732fcc7c9b9709c90560e3f3a8546..cf0171de6e0f875748cc80026c9ea8a11147c750:/services/api/app/models/node.rb diff --git a/services/api/app/models/node.rb b/services/api/app/models/node.rb index 7dd6f9a708..d200bb8011 100644 --- a/services/api/app/models/node.rb +++ b/services/api/app/models/node.rb @@ -1,52 +1,79 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + +require 'tempfile' + class Node < ArvadosModel - include AssignUuid + include HasUuid include KindAndEtag include CommonApiTemplate - serialize :info, Hash + + # Posgresql JSONB columns should NOT be declared as serialized, Rails 5 + # already know how to properly treat them. + attribute :properties, :jsonbHash, default: {} + attribute :info, :jsonbHash, default: {} + before_validation :ensure_ping_secret - after_update :dnsmasq_update + after_update :dns_server_update - MAX_SLOTS = 64 + # Only a controller can figure out whether or not the current API tokens + # have access to the associated Job. They're expected to set + # job_readable=true if the Job UUID can be included in the API response. + belongs_to(:job, foreign_key: :job_uuid, primary_key: :uuid) + attr_accessor :job_readable - @@confdir = if Rails.configuration.respond_to? :dnsmasq_conf_dir - Rails.configuration.dnsmasq_conf_dir - elsif File.exists? '/etc/dnsmasq.d/.' - '/etc/dnsmasq.d' - else - nil - end - @@domain = Rails.configuration.compute_node_domain rescue `hostname --domain`.strip - @@nameservers = Rails.configuration.compute_node_nameservers + UNUSED_NODE_IP = '127.40.4.0' - api_accessible :superuser, :extend => :common do |t| + api_accessible :user, :extend => :common do |t| t.add :hostname t.add :domain t.add :ip_address - t.add :first_ping_at t.add :last_ping_at - t.add :info t.add :slot_number t.add :status - t.add lambda { |x| @@nameservers }, :as => :nameservers + t.add :api_job_uuid, as: :job_uuid + t.add :crunch_worker_state + t.add :properties + end + api_accessible :superuser, :extend => :user do |t| + t.add :first_ping_at + t.add :info + t.add lambda { |x| Rails.configuration.Containers.SLURM.Managed.ComputeNodeNameservers.keys }, :as => :nameservers end - def info - @info ||= Hash.new - super + after_initialize do + @bypass_arvados_authorization = false end def domain - super || @@domain + super || Rails.configuration.Containers.SLURM.Managed.ComputeNodeDomain + end + + def api_job_uuid + job_readable ? job_uuid : nil + end + + def crunch_worker_state + return 'down' if slot_number.nil? + case self.info.andand['slurm_state'] + when 'alloc', 'comp', 'mix', 'drng' + 'busy' + when 'idle' + 'idle' + else + 'down' + end end def status if !self.last_ping_at - if Time.now - self.created_at > 5.minutes + if db_current_time - self.created_at > 5.minutes 'startup-fail' else 'pending' end - elsif Time.now - self.last_ping_at > 1.hours + elsif db_current_time - self.last_ping_at > 1.hours 'missing' else 'running' @@ -56,11 +83,13 @@ class Node < ArvadosModel def ping(o) raise "must have :ip and :ping_secret" unless o[:ip] and o[:ping_secret] - if o[:ping_secret] != self.info[:ping_secret] - logger.info "Ping: secret mismatch: received \"#{o[:ping_secret]}\" != \"#{self.info[:ping_secret]}\"" - return nil + if o[:ping_secret] != self.info['ping_secret'] + logger.info "Ping: secret mismatch: received \"#{o[:ping_secret]}\" != \"#{self.info['ping_secret']}\"" + raise ArvadosModel::UnauthorizedError.new("Incorrect ping_secret") end - self.last_ping_at = Time.now + + current_time = db_current_time + self.last_ping_at = current_time @bypass_arvados_authorization = true @@ -68,118 +97,186 @@ class Node < ArvadosModel if self.ip_address.nil? logger.info "#{self.uuid} ip_address= #{o[:ip]}" self.ip_address = o[:ip] - self.first_ping_at = Time.now + self.first_ping_at = current_time end # Record instance ID if not already known if o[:ec2_instance_id] - if !self.info[:ec2_instance_id] - self.info[:ec2_instance_id] = o[:ec2_instance_id] - `ec2-create-tags #{o[:ec2_instance_id]} --tag 'Name=#{self.uuid}'` - elsif self.info[:ec2_instance_id] != o[:ec2_instance_id] + if !self.info['ec2_instance_id'] + self.info['ec2_instance_id'] = o[:ec2_instance_id] + elsif self.info['ec2_instance_id'] != o[:ec2_instance_id] logger.debug "Multiple nodes have credentials for #{self.uuid}" - raise "#{self.uuid} is already running at #{self.info[:ec2_instance_id]} so rejecting ping from #{o[:ec2_instance_id]}" + raise "#{self.uuid} is already running at #{self.info['ec2_instance_id']} so rejecting ping from #{o[:ec2_instance_id]}" end end - # Assign hostname - if self.slot_number.nil? - try_slot = 0 - begin - self.slot_number = try_slot - begin - self.save! - break - rescue ActiveRecord::RecordNotUnique - try_slot += 1 - end - raise "No available node slots" if try_slot == MAX_SLOTS - end while true - self.hostname = self.class.hostname_for_slot(self.slot_number) - if info[:ec2_instance_id] - `ec2-create-tags #{self.info[:ec2_instance_id]} --tag 'hostname=#{self.hostname}'` + assign_slot + + # Record other basic stats + ['total_cpu_cores', 'total_ram_mb', 'total_scratch_mb'].each do |key| + if value = (o[key] or o[key.to_sym]) + self.properties[key] = value.to_i + else + self.properties.delete(key) end end save! end - def start!(ping_url_method) - ensure_permission_to_update - ping_url = ping_url_method.call({ uuid: self.uuid, ping_secret: self.info[:ping_secret] }) - ec2_args = ["--user-data '#{ping_url}'", - "-t c1.xlarge -n 1", - "-g", Rails.configuration.compute_node_security_group, - Rails.configuration.compute_node_ami - ] - ec2run_cmd = ["ec2-run-instances", - "--client-token", self.uuid, - ec2_args].flatten.join(' ') - ec2spot_cmd = ["ec2-request-spot-instances", - "-p #{Rails.configuration.compute_node_spot_bid} --type one-time", - ec2_args].flatten.join(' ') - self.info[:ec2_run_command] = ec2run_cmd - self.info[:ec2_spot_command] = ec2spot_cmd - self.info[:ec2_start_command] = ec2spot_cmd - logger.info "#{self.uuid} ec2_start_command= #{ec2spot_cmd.inspect}" - result = `#{ec2spot_cmd} 2>&1` - self.info[:ec2_start_result] = result - logger.info "#{self.uuid} ec2_start_result= #{result.inspect}" - result.match(/INSTANCE\s*(i-[0-9a-f]+)/) do |m| - instance_id = m[1] - self.info[:ec2_instance_id] = instance_id - `ec2-create-tags #{instance_id} --tag 'Name=#{self.uuid}'` - end - result.match(/SPOTINSTANCEREQUEST\s*(sir-[0-9a-f]+)/) do |m| - sir_id = m[1] - self.info[:ec2_sir_id] = sir_id - `ec2-create-tags #{sir_id} --tag 'Name=#{self.uuid}'` + def assign_slot + return if self.slot_number.andand > 0 + while true + self.slot_number = self.class.available_slot_number + if self.slot_number.nil? + raise "No available node slots" + end + begin + save! + return assign_hostname + rescue ActiveRecord::RecordNotUnique + # try again + end end - self.save! end protected + def assign_hostname + if self.hostname.nil? and Rails.configuration.Containers.SLURM.Managed.AssignNodeHostname + self.hostname = self.class.hostname_for_slot(self.slot_number) + end + end + + def self.available_slot_number + # Join the sequence 1..max with the nodes table. Return the first + # (i.e., smallest) value that doesn't match the slot_number of any + # existing node. + connection.exec_query('SELECT n FROM generate_series(1, $1) AS slot(n) + LEFT JOIN nodes ON n=slot_number + WHERE slot_number IS NULL + LIMIT 1', + # query label: + 'Node.available_slot_number', + # [col_id, val] for $1 vars: + [[nil, Rails.configuration.Containers.MaxComputeVMs]], + ).rows.first.andand.first + end + def ensure_ping_secret - self.info[:ping_secret] ||= rand(2**256).to_s(36) + self.info['ping_secret'] ||= rand(2**256).to_s(36) end - def dnsmasq_update - if self.hostname_changed? or self.ip_address_changed? - if self.hostname and self.ip_address - self.class.dnsmasq_update(self.hostname, self.ip_address) + def dns_server_update + if ip_address_changed? && ip_address + Node.where('id != ? and ip_address = ?', + id, ip_address).each do |stale_node| + # One or more(!) stale node records have the same IP address + # as the new node. Clear the ip_address field on the stale + # nodes. Otherwise, we (via SLURM) might inadvertently connect + # to the new node using the old node's hostname. + stale_node.update_attributes!(ip_address: nil) end end + if hostname_was && hostname_changed? + self.class.dns_server_update(hostname_was, UNUSED_NODE_IP) + end + if hostname && (hostname_changed? || ip_address_changed?) + self.class.dns_server_update(hostname, ip_address || UNUSED_NODE_IP) + end end - def self.dnsmasq_update(hostname, ip_address) - return unless @@confdir + def self.dns_server_update hostname, ip_address + ok = true + ptr_domain = ip_address. split('.').reverse.join('.').concat('.in-addr.arpa') - hostfile = File.join @@confdir, hostname - File.open hostfile, 'w' do |f| - f.puts "address=/#{hostname}/#{ip_address}" - f.puts "address=/#{hostname}.#{@@domain}/#{ip_address}" if @@domain - f.puts "ptr-record=#{ptr_domain},#{hostname}" + + template_vars = { + hostname: hostname, + uuid_prefix: Rails.configuration.ClusterID, + ip_address: ip_address, + ptr_domain: ptr_domain, + } + + if (!Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir.to_s.empty? and + !Rails.configuration.Containers.SLURM.Managed.DNSServerConfTemplate.to_s.empty?) + tmpfile = nil + begin + begin + template = IO.read(Rails.configuration.Containers.SLURM.Managed.DNSServerConfTemplate) + rescue IOError, SystemCallError => e + logger.error "Reading #{Rails.configuration.Containers.SLURM.Managed.DNSServerConfTemplate}: #{e.message}" + raise + end + + hostfile = File.join Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir, "#{hostname}.conf" + Tempfile.open(["#{hostname}-", ".conf.tmp"], + Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir) do |f| + tmpfile = f.path + f.puts template % template_vars + end + File.rename tmpfile, hostfile + rescue IOError, SystemCallError => e + logger.error "Writing #{hostfile}: #{e.message}" + ok = false + ensure + if tmpfile and File.file? tmpfile + # Cleanup remaining temporary file. + File.unlink tmpfile + end + end end - File.open(File.join(@@confdir, 'restart.txt'), 'w') do |f| - # this should trigger a dnsmasq restart + + if !Rails.configuration.Containers.SLURM.Managed.DNSServerUpdateCommand.empty? + cmd = Rails.configuration.Containers.SLURM.Managed.DNSServerUpdateCommand % template_vars + if not system cmd + logger.error "dns_server_update_command #{cmd.inspect} failed: #{$?}" + ok = false + end + end + + if (!Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir.to_s.empty? and + !Rails.configuration.Containers.SLURM.Managed.DNSServerReloadCommand.to_s.empty?) + restartfile = File.join(Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir, 'restart.txt') + begin + File.open(restartfile, 'w') do |f| + # Typically, this is used to trigger a dns server restart + f.puts Rails.configuration.Containers.SLURM.Managed.DNSServerReloadCommand + end + rescue IOError, SystemCallError => e + logger.error "Unable to write #{restartfile}: #{e.message}" + ok = false + end end + + ok end def self.hostname_for_slot(slot_number) - "compute#{slot_number}" + config = Rails.configuration.Containers.SLURM.Managed.AssignNodeHostname + + return nil if !config + + sprintf(config, {:slot_number => slot_number}) end # At startup, make sure all DNS entries exist. Otherwise, slurmctld # will refuse to start. - if @@confdir and - !File.exists? (File.join(@@confdir, hostname_for_slot(MAX_SLOTS-1))) - (0..MAX_SLOTS-1).each do |slot_number| + if (!Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir.to_s.empty? and + !Rails.configuration.Containers.SLURM.Managed.DNSServerConfTemplate.to_s.empty? and + !Rails.configuration.Containers.SLURM.Managed.AssignNodeHostname.empty?) + + (0..Rails.configuration.Containers.MaxComputeVMs-1).each do |slot_number| hostname = hostname_for_slot(slot_number) - hostfile = File.join @@confdir, hostname - if !File.exists? hostfile - dnsmasq_update(hostname, '127.40.4.0') + hostfile = File.join Rails.configuration.Containers.SLURM.Managed.DNSServerConfDir, "#{hostname}.conf" + if !File.exist? hostfile + n = Node.where(:slot_number => slot_number).first + if n.nil? or n.ip_address.nil? + dns_server_update(hostname, UNUSED_NODE_IP) + else + dns_server_update(hostname, n.ip_address) + end end end end