2017-09-12 11:30:39 -04:00
|
|
|
package oci
|
2017-02-13 05:35:14 -05:00
|
|
|
|
|
|
|
import (
|
2018-04-11 05:20:40 -04:00
|
|
|
"context"
|
2017-02-13 05:35:14 -05:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2018-04-11 05:20:40 -04:00
|
|
|
"time"
|
2017-02-13 05:35:14 -05:00
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
core "github.com/oracle/oci-go-sdk/core"
|
2017-02-13 05:35:14 -05:00
|
|
|
)
|
|
|
|
|
2017-09-12 11:30:39 -04:00
|
|
|
// driverOCI implements the Driver interface and communicates with Oracle
|
|
|
|
// OCI.
|
|
|
|
type driverOCI struct {
|
2018-04-11 05:20:40 -04:00
|
|
|
computeClient core.ComputeClient
|
|
|
|
vcnClient core.VirtualNetworkClient
|
|
|
|
cfg *Config
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
// NewDriverOCI Creates a new driverOCI with a connected compute client and a connected vcn client.
|
2017-09-12 11:30:39 -04:00
|
|
|
func NewDriverOCI(cfg *Config) (Driver, error) {
|
2018-04-11 05:20:40 -04:00
|
|
|
coreClient, err := core.NewComputeClientWithConfigurationProvider(cfg.ConfigProvider)
|
2017-02-13 05:35:14 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-04-11 05:20:40 -04:00
|
|
|
|
|
|
|
vcnClient, err := core.NewVirtualNetworkClientWithConfigurationProvider(cfg.ConfigProvider)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &driverOCI{
|
|
|
|
computeClient: coreClient,
|
|
|
|
vcnClient: vcnClient,
|
|
|
|
cfg: cfg,
|
|
|
|
}, nil
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateInstance creates a new compute instance.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) CreateInstance(publicKey string) (string, error) {
|
2018-04-11 05:20:40 -04:00
|
|
|
metadata := map[string]string{
|
|
|
|
"ssh_authorized_keys": publicKey,
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
2018-03-28 16:27:41 -04:00
|
|
|
if d.cfg.UserData != "" {
|
2018-04-11 05:20:40 -04:00
|
|
|
metadata["user_data"] = d.cfg.UserData
|
2018-03-28 16:27:41 -04:00
|
|
|
}
|
2018-04-11 05:20:40 -04:00
|
|
|
|
|
|
|
instance, err := d.computeClient.LaunchInstance(context.TODO(), core.LaunchInstanceRequest{LaunchInstanceDetails: core.LaunchInstanceDetails{
|
|
|
|
AvailabilityDomain: &d.cfg.AvailabilityDomain,
|
|
|
|
CompartmentId: &d.cfg.CompartmentID,
|
|
|
|
ImageId: &d.cfg.BaseImageID,
|
|
|
|
Shape: &d.cfg.Shape,
|
|
|
|
SubnetId: &d.cfg.SubnetID,
|
|
|
|
Metadata: metadata,
|
|
|
|
}})
|
|
|
|
|
2017-02-13 05:35:14 -05:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
return *instance.Id, nil
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateImage creates a new custom image.
|
2018-04-11 05:20:40 -04:00
|
|
|
func (d *driverOCI) CreateImage(id string) (core.Image, error) {
|
|
|
|
res, err := d.computeClient.CreateImage(context.TODO(), core.CreateImageRequest{CreateImageDetails: core.CreateImageDetails{
|
|
|
|
CompartmentId: &d.cfg.CompartmentID,
|
|
|
|
InstanceId: &id,
|
|
|
|
DisplayName: &d.cfg.ImageName,
|
|
|
|
}})
|
|
|
|
|
2017-02-13 05:35:14 -05:00
|
|
|
if err != nil {
|
2018-04-11 05:20:40 -04:00
|
|
|
return core.Image{}, err
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
return res.Image, nil
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteImage deletes a custom image.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) DeleteImage(id string) error {
|
2018-04-11 05:20:40 -04:00
|
|
|
_, err := d.computeClient.DeleteImage(context.TODO(), core.DeleteImageRequest{ImageId: &id})
|
|
|
|
return err
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
2018-02-13 08:20:26 -05:00
|
|
|
// GetInstanceIP returns the public or private IP corresponding to the given instance id.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) GetInstanceIP(id string) (string, error) {
|
2018-04-11 05:20:40 -04:00
|
|
|
vnics, err := d.computeClient.ListVnicAttachments(context.TODO(), core.ListVnicAttachmentsRequest{
|
|
|
|
InstanceId: &id,
|
|
|
|
CompartmentId: &d.cfg.CompartmentID,
|
|
|
|
})
|
2017-02-13 05:35:14 -05:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
if len(vnics.Items) == 0 {
|
2017-02-13 05:35:14 -05:00
|
|
|
return "", errors.New("instance has zero VNICs")
|
|
|
|
}
|
|
|
|
|
2018-04-11 05:20:40 -04:00
|
|
|
vnic, err := d.vcnClient.GetVnic(context.TODO(), core.GetVnicRequest{VnicId: vnics.Items[0].VnicId})
|
2017-02-13 05:35:14 -05:00
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("Error getting VNIC details: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-02-13 08:20:26 -05:00
|
|
|
if d.cfg.UsePrivateIP {
|
2018-04-11 05:20:40 -04:00
|
|
|
return *vnic.PrivateIp, nil
|
2018-02-13 08:20:26 -05:00
|
|
|
}
|
2018-04-11 05:20:40 -04:00
|
|
|
|
|
|
|
if vnic.PublicIp == nil {
|
|
|
|
return "", fmt.Errorf("Error getting VNIC Public Ip for: %s", id)
|
|
|
|
}
|
|
|
|
|
|
|
|
return *vnic.PublicIp, nil
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
2018-05-24 13:47:37 -04:00
|
|
|
func (d *driverOCI) GetInstanceInitialCredentials(id string) (string, string, error) {
|
|
|
|
credentials, err := d.computeClient.GetWindowsInstanceInitialCredentials(context.TODO(), core.GetWindowsInstanceInitialCredentialsRequest{
|
|
|
|
InstanceId: &id,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return *credentials.InstanceCredentials.Username, *credentials.InstanceCredentials.Password, err
|
|
|
|
}
|
|
|
|
|
2017-02-13 05:35:14 -05:00
|
|
|
// TerminateInstance terminates a compute instance.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) TerminateInstance(id string) error {
|
2018-04-11 05:20:40 -04:00
|
|
|
_, err := d.computeClient.TerminateInstance(context.TODO(), core.TerminateInstanceRequest{
|
|
|
|
InstanceId: &id,
|
|
|
|
})
|
|
|
|
return err
|
2017-02-13 05:35:14 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// WaitForImageCreation waits for a provisioning custom image to reach the
|
|
|
|
// "AVAILABLE" state.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) WaitForImageCreation(id string) error {
|
2018-04-11 05:20:40 -04:00
|
|
|
return waitForResourceToReachState(
|
|
|
|
func(string) (string, error) {
|
|
|
|
image, err := d.computeClient.GetImage(context.TODO(), core.GetImageRequest{ImageId: &id})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return string(image.LifecycleState), nil
|
|
|
|
},
|
2017-02-13 05:35:14 -05:00
|
|
|
id,
|
|
|
|
[]string{"PROVISIONING"},
|
|
|
|
"AVAILABLE",
|
2018-04-11 05:20:40 -04:00
|
|
|
0, //Unlimited Retries
|
|
|
|
5*time.Second, //5 second wait between retries
|
2017-02-13 05:35:14 -05:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WaitForInstanceState waits for an instance to reach the a given terminal
|
|
|
|
// state.
|
2017-09-12 11:30:39 -04:00
|
|
|
func (d *driverOCI) WaitForInstanceState(id string, waitStates []string, terminalState string) error {
|
2018-04-11 05:20:40 -04:00
|
|
|
return waitForResourceToReachState(
|
|
|
|
func(string) (string, error) {
|
|
|
|
instance, err := d.computeClient.GetInstance(context.TODO(), core.GetInstanceRequest{InstanceId: &id})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return string(instance.LifecycleState), nil
|
|
|
|
},
|
2017-02-13 05:35:14 -05:00
|
|
|
id,
|
|
|
|
waitStates,
|
|
|
|
terminalState,
|
2018-04-11 05:20:40 -04:00
|
|
|
0, //Unlimited Retries
|
|
|
|
5*time.Second, //5 second wait between retries
|
2017-02-13 05:35:14 -05:00
|
|
|
)
|
|
|
|
}
|
2018-04-11 05:20:40 -04:00
|
|
|
|
|
|
|
// WaitForResourceToReachState checks the response of a request through a
|
|
|
|
// polled get and waits until the desired state or until the max retried has
|
|
|
|
// been reached.
|
|
|
|
func waitForResourceToReachState(getResourceState func(string) (string, error), id string, waitStates []string, terminalState string, maxRetries int, waitDuration time.Duration) error {
|
|
|
|
for i := 0; maxRetries == 0 || i < maxRetries; i++ {
|
|
|
|
state, err := getResourceState(id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if stringSliceContains(waitStates, state) {
|
|
|
|
time.Sleep(waitDuration)
|
|
|
|
continue
|
|
|
|
} else if state == terminalState {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return fmt.Errorf("Unexpected resource state %q, expecting a waiting state %s or terminal state %q ", state, waitStates, terminalState)
|
|
|
|
}
|
|
|
|
return fmt.Errorf("Maximum number of retries (%d) exceeded; resource did not reach state %q", maxRetries, terminalState)
|
|
|
|
}
|
|
|
|
|
|
|
|
// stringSliceContains loops through a slice of strings returning a boolean
|
|
|
|
// based on whether a given value is contained in the slice.
|
|
|
|
func stringSliceContains(slice []string, value string) bool {
|
|
|
|
for _, elem := range slice {
|
|
|
|
if elem == value {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|