lib/dcmgr/node_modules/hva_collector.rb in wakame-vdc-dcmgr-10.12.0 vs lib/dcmgr/node_modules/hva_collector.rb in wakame-vdc-dcmgr-11.06.0

- old
+ new

@@ -4,10 +4,11 @@ module Dcmgr module NodeModules class HvaCollector < Isono::NodeModules::Base include Isono::NodeModules + include Dcmgr::Logger initialize_hook do rpc = RpcChannel.new(node) app = Isono::Rack::ObjectMethod.new(myinstance) rpc.register_endpoint('hva-collector', Isono::Rack.build do @@ -21,20 +22,18 @@ terminate_hook do end def get_instance(instance_id) - Models::Instance.lock! inst = Models::Instance[instance_id] raise "UnknownInstanceID" if inst.nil? ret = inst.to_hash ret end def update_instance(instance_id, data) - Models::Instance.lock! inst = Models::Instance[instance_id] raise "UnknownInstanceID" if inst.nil? if data[:state] == :terminated inst.terminated_at = data[:terminated_at] # Instance#destroy do not really delete row. @@ -46,67 +45,87 @@ # do not respond model object. nil end def get_netfilter_groups_of_instance(instance_id) - Models::Instance.lock! inst = Models::Instance[instance_id] raise "UnknownInstanceID" if inst.nil? inst.netfilter_groups.map { |g| g.to_hash } end - def get_group_instance_ipv4s(instance_id) - Models::Instance.lock! + #Returns an array containing the ip addresses of all instances in the same security group. + # _set_ determines which ip addresses are returned. There are 3 possible values + # :inside is the default value. This returns all inside ip addresses + # :outside returns all the outside addresses for instances that are natted. + # :all returns all ip addresses regardless of whether they're natted or not + def get_group_instance_ipv4s(instance_id,set = :inside) inst = Models::Instance[instance_id] raise "UnknownInstanceID" if inst.nil? + raise "Unknown ip set." unless [:inside,:all,:outside].member?(set) - ipv4s = inst.netfilter_groups.map { |netfilter_group| - next if netfilter_group.nil? - netfilter_group.instance_netfilter_groups.map { |instance_netfilter_group| - next if instance_netfilter_group.nil? - instance_netfilter_group.instance_dataset.lives.all.map { |instance| - next if instance.nil? - instance.ips.map { |ip| - next if ip.nil? - ip.ipv4 + inst.netfilter_groups.compact.map { |netfilter_group| + netfilter_group.instances_dataset.lives.all.compact.map { |instance| + instance.ips.compact.map { |ip| + case set + when :all + ip + when :inside + ip.map {|i| unless i.is_natted? then i.ipv4 else nil end}.compact + when :outside + ip.map {|i| if i.is_natted? then i.ipv4 else nil end}.compact + end } } - } - }.flatten.uniq.compact - ipv4s + }.flatten.uniq.compact end # def get_instances_of_account_netfilter_group(account_id, netfilter_group_id) def get_instances_of_account_netfilter_group(account_id, netfilter_group_name) - Models::NetfilterGroup.lock! ng_map = Models::NetfilterGroup.find(:account_id => account_id, :name => netfilter_group_name) raise "UnknownNetfilterGroupID" if ng_map.nil? - inst_maps = ng_map.instance_netfilter_groups.map { |instance_netfilter_group| - instance_netfilter_group.instance_dataset.lives.all.map { |inst| inst.to_hash } - }.flatten.uniq.compact + inst_maps = ng_map.instances_dataset.lives.all.map { |inst| inst.to_hash }.flatten.uniq.compact inst_maps end def get_network(network_id) - Models::Network.lock! network = Models::Network[network_id] raise "UnknownNetworkID" if network.nil? network.to_hash end + #Returns the current iplease for nic with uuid _nic_uuid_ + def get_iplease_for_nic(nic_uuid) + nic = Models::Taggable.find(nic_uuid) + Models::IpLease.find(:instance_nic_id => nic[:id])[:ipv4] + end + + def get_nat_leases(nic_uuid) + #TODO: get this to work with non canonical uuid + nic = Models::Taggable.find(nic_uuid) + + leases = Models::IpLease.filter({:instance_nic_id => nic[:id]} & ~{:network_id => nic[:network_id]}) + leases.map {|l| l[:ipv4]} + end + + def is_natted_ip?(ip) + lease = Models::IpLease.find(:ipv4 => ip) + + return false if lease.nil? + + #lease.instance_nic.network_id != lease.network_id + lease.is_natted? + end + def get_networks - Models::Network.lock! networks = Models::Network.all networks.map { |network| network.to_hash } end def get_dhcp_conf(network_name) - Models::Network.lock! - build_network_segment = proc { |network| gwaddr = network.ipaddress h = { :uuid => network.canonical_uuid, :ipv4_first => gwaddr.network.first.to_s, @@ -119,21 +138,21 @@ :metadata_server => network.metadata_server, :mac2addr => [], :addr2host=> [], } - network.ip_lease_dataset.filter(:type=>Models::IpLease::TYPE_AUTO).each { |ip| + network.ip_lease_dataset.filter(:alloc_type=>Models::IpLease::TYPE_AUTO).each { |ip| # ignore IPs unbound to vnic. next if ip.instance_nic.nil? || ip.instance_nic.instance.nil? h[:mac2addr] << { :mac_addr => ip.instance_nic.pretty_mac_addr, :ipaddr => ip.ipv4 } h[:addr2host] << { :hostname => ip.instance_nic.instance.fqdn_hostname, - :ipaddr => ip.ipv4 + :ipaddr => network.nat_network.nil? ? ip.ipv4 : ip.nat_outside_lease.ipv4 } } h } @@ -155,26 +174,27 @@ } h end def get_instances_of_netfilter_group(netfilter_group_id) - Models::NetfilterGroup.lock! g = Models::NetfilterGroup[netfilter_group_id] raise "UnknownNetfilterGroupID" if g.nil? - inst_maps = g.instance_netfilter_groups.map { |instance_netfilter_group| - instance_netfilter_group.instance_dataset.lives.all.map { |inst| inst.to_hash } - }.flatten.uniq.compact - inst_maps + g.instances.map {|i| i.to_hash }.flatten.uniq.compact end def get_alive_instances(node_id) - Models::HostPool.lock! hp = Models::HostPool.find(:node_id => node_id) - raise "UnknownNodeID", node_id if hp.nil? + if hp.nil? + logger.error("The node ID is not bound to HostPool yet: #{node_id}") + return [] + end hps = Models::HostPool.where(:account_id => hp.account_id).all inst_on_hp = hps.map { |hp| inst_on_hp = hp.instances_dataset.lives.all.map { |inst| - inst.to_hash + inst_map = inst.to_hash + # Does the hva have instance? + next unless inst_map[:host_pool][:node_id] == node_id + inst_map } }.flatten.uniq.compact inst_on_hp end