"github.com/pivotal-cf-experimental/destiny/iaas" "github.com/pivotal-cf-experimental/destiny/turbulence" "github.com/pivotal-cf-experimental/gomegamatchers" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" ) var _ = Describe("Manifest", func() { Describe("NewTLSManifest", func() { It("generates a valid Etcd BOSH-Lite manifest", func() { manifest, err := etcd.NewTLSManifest(etcd.Config{ DirectorUUID: "some-director-uuid", Name: "etcd-some-random-guid", IPRange: "10.244.4.0/27", }, iaas.NewWardenConfig()) Expect(err).NotTo(HaveOccurred()) Expect(manifest.DirectorUUID).To(Equal("some-director-uuid")) Expect(manifest.Name).To(Equal("etcd-some-random-guid")) Expect(manifest.Releases).To(HaveLen(2)) Expect(manifest.Releases).To(ContainElement(core.Release{ Name: "etcd", Version: "latest", })) Expect(manifest.Releases).To(ContainElement(core.Release{ Name: "consul",
import ( . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" "github.com/pivotal-cf-experimental/destiny/core" "github.com/pivotal-cf-experimental/destiny/iaas" ) var _ = Describe("Warden Config", func() { var ( wardenConfig iaas.WardenConfig ) BeforeEach(func() { wardenConfig = iaas.NewWardenConfig() }) Describe("NetworkSubnet", func() { It("returns a network subnet specific to Warden", func() { subnetCloudProperties := wardenConfig.NetworkSubnet("") Expect(subnetCloudProperties).To(Equal(core.NetworkSubnetCloudProperties{ Name: "random", })) }) }) Describe("Compilation", func() { It("returns an empty compilation cloud properties for Warden", func() { compilationCloudProperties := wardenConfig.Compilation("ignored") Expect(compilationCloudProperties).To(Equal(core.CompilationCloudProperties{}))
func DeployTurbulence(client bosh.Client, config Config) (turbulence.Manifest, error) { info, err := client.Info() if err != nil { return turbulence.Manifest{}, err } guid, err := NewGUID() if err != nil { return turbulence.Manifest{}, err } manifestConfig := turbulence.Config{ DirectorUUID: info.UUID, Name: "turbulence-consul-" + guid, BOSH: turbulence.ConfigBOSH{ Target: config.BOSH.Target, Username: config.BOSH.Username, Password: config.BOSH.Password, DirectorCACert: config.BOSH.DirectorCACert, }, } var iaasConfig iaas.Config switch info.CPI { case "aws_cpi": awsConfig := iaas.AWSConfig{ AccessKeyID: config.AWS.AccessKeyID, SecretAccessKey: config.AWS.SecretAccessKey, DefaultKeyName: config.AWS.DefaultKeyName, DefaultSecurityGroups: config.AWS.DefaultSecurityGroups, Region: config.AWS.Region, RegistryHost: config.Registry.Host, RegistryPassword: config.Registry.Password, RegistryPort: config.Registry.Port, RegistryUsername: config.Registry.Username, } manifestConfig.BOSH.PersistentDiskType = config.BOSH.Errand.DefaultPersistentDiskType manifestConfig.BOSH.VMType = config.BOSH.Errand.DefaultVMType if len(config.AWS.Subnets) > 0 { subnet := config.AWS.Subnets[0] var cidrBlock string cidrPool := NewCIDRPool(subnet.Range, 24, 27) cidrBlock, err = cidrPool.Last() if err != nil { return turbulence.Manifest{}, err } awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: cidrBlock, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.IPRange = cidrBlock } else { return turbulence.Manifest{}, errors.New("aws.subnet is required for AWS IAAS deployment") } iaasConfig = awsConfig case "warden_cpi": var cidrBlock string cidrPool := NewCIDRPool("10.244.4.0", 24, 27) cidrBlock, err = cidrPool.Last() if err != nil { return turbulence.Manifest{}, err } manifestConfig.IPRange = cidrBlock iaasConfig = iaas.NewWardenConfig() default: return turbulence.Manifest{}, errors.New("unknown infrastructure type") } turbulenceManifest, err := turbulence.NewManifest(manifestConfig, iaasConfig) if err != nil { return turbulence.Manifest{}, err } yaml, err := turbulenceManifest.ToYAML() if err != nil { return turbulence.Manifest{}, err } yaml, err = client.ResolveManifestVersions(yaml) if err != nil { return turbulence.Manifest{}, err } turbulenceManifest, err = turbulence.FromYAML(yaml) if err != nil { return turbulence.Manifest{}, err } _, err = client.Deploy(yaml) if err != nil { return turbulence.Manifest{}, err } return turbulenceManifest, nil }
func deployConsul(deploymentPrefix string, count int, client bosh.Client, config Config, releaseVersion string, manifestGenerator ManifestGenerator) (manifest consul.ManifestV2, kv consulclient.HTTPKV, err error) { guid, err := NewGUID() if err != nil { return } info, err := client.Info() if err != nil { return } manifestConfig := consul.ConfigV2{ DirectorUUID: info.UUID, Name: fmt.Sprintf("consul-%s-%s", deploymentPrefix, guid), TurbulenceHost: config.TurbulenceHost, WindowsClients: config.WindowsClients, } var iaasConfig iaas.Config switch info.CPI { case "aws_cpi": manifestConfig.PersistentDiskType = config.BOSH.Errand.DefaultPersistentDiskType manifestConfig.VMType = config.BOSH.Errand.DefaultVMType awsConfig := buildAWSConfig(config) if len(config.AWS.Subnets) > 0 { subnet := config.AWS.Subnets[0] var cidrBlock string cidrPool := NewCIDRPool(subnet.Range, 24, 27) cidrBlock, err = cidrPool.Get(ginkgoConfig.GinkgoConfig.ParallelNode) if err != nil { return } awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: cidrBlock, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.AZs = append(manifestConfig.AZs, consul.ConfigAZ{IPRange: cidrBlock, Nodes: count, Name: "z1"}) } else { err = errors.New("AWSSubnet is required for AWS IAAS deployment") return } iaasConfig = awsConfig case "warden_cpi": iaasConfig = iaas.NewWardenConfig() var cidrBlock string cidrPool := NewCIDRPool("10.244.4.0", 24, 27) cidrBlock, err = cidrPool.Get(ginkgoConfig.GinkgoConfig.ParallelNode) if err != nil { return } manifestConfig.AZs = []consul.ConfigAZ{ { IPRange: cidrBlock, Nodes: count, Name: "z1", }, } default: err = errors.New("unknown infrastructure type") return } manifest, err = manifestGenerator(manifestConfig, iaasConfig) if err != nil { return } for i := range manifest.Releases { if manifest.Releases[i].Name == "consul" { manifest.Releases[i].Version = releaseVersion } } yaml, err := manifest.ToYAML() if err != nil { return } yaml, err = client.ResolveManifestVersions(yaml) if err != nil { return } err = consul.FromYAML(yaml, &manifest) if err != nil { return } _, err = client.Deploy(yaml) if err != nil { return } err = VerifyDeploymentRelease(client, manifestConfig.Name, releaseVersion) if err != nil { return } kv = consulclient.NewHTTPKV(fmt.Sprintf("http://%s:6769", manifest.InstanceGroups[1].Networks[0].StaticIPs[0])) return }
func DeployMultiAZConsulMigration(client bosh.Client, config Config, deploymentName string) (consul.ManifestV2, error) { info, err := client.Info() if err != nil { return consul.ManifestV2{}, err } manifestConfig := consul.ConfigV2{ DirectorUUID: info.UUID, Name: deploymentName, WindowsClients: config.WindowsClients, } var iaasConfig iaas.Config switch info.CPI { case "aws_cpi": manifestConfig.PersistentDiskType = config.BOSH.Errand.DefaultPersistentDiskType manifestConfig.VMType = config.BOSH.Errand.DefaultVMType awsConfig := buildAWSConfig(config) if len(config.AWS.CloudConfigSubnets) >= 2 { subnet := config.AWS.CloudConfigSubnets[0] awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: subnet.Range, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.AZs = append(manifestConfig.AZs, consul.ConfigAZ{Name: "z1", IPRange: subnet.Range, Nodes: 2}) subnet = config.AWS.CloudConfigSubnets[1] awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: subnet.Range, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.AZs = append(manifestConfig.AZs, consul.ConfigAZ{Name: "z2", IPRange: subnet.Range, Nodes: 1}) } else { return consul.ManifestV2{}, errors.New("AWSSubnet is required for AWS IAAS deployment") } iaasConfig = awsConfig case "warden_cpi": iaasConfig = iaas.NewWardenConfig() var cidrBlock string cidrPool := NewCIDRPool("10.244.4.0", 24, 27) cidrBlock, err = cidrPool.Get(0) if err != nil { return consul.ManifestV2{}, err } var cidrBlock2 string cidrPool2 := NewCIDRPool("10.244.5.0", 24, 27) cidrBlock2, err = cidrPool2.Get(0) if err != nil { return consul.ManifestV2{}, err } manifestConfig.AZs = []consul.ConfigAZ{ { Name: "z1", IPRange: cidrBlock, Nodes: 2, }, { Name: "z2", IPRange: cidrBlock2, Nodes: 1, }, } default: return consul.ManifestV2{}, errors.New("unknown infrastructure type") } manifest, err := consul.NewManifestV2(manifestConfig, iaasConfig) if err != nil { return consul.ManifestV2{}, err } consulInstanceGroup, err := manifest.GetInstanceGroup("consul") if err != nil { return consul.ManifestV2{}, err } consulInstanceGroup.MigratedFrom = []core.InstanceGroupMigratedFrom{ { Name: "consul_z1", AZ: "z1", }, { Name: "consul_z2", AZ: "z2", }, } consulTestConsumerInstanceGroup, err := manifest.GetInstanceGroup("test_consumer") if err != nil { return consul.ManifestV2{}, err } consulTestConsumerInstanceGroup.MigratedFrom = []core.InstanceGroupMigratedFrom{ { Name: "consul_test_consumer", AZ: "z1", }, } for i := range manifest.Releases { if manifest.Releases[i].Name == "consul" { manifest.Releases[i].Version = ConsulReleaseVersion() } } manifestYAML, err := manifest.ToYAML() if err != nil { return consul.ManifestV2{}, err } _, err = client.Deploy(manifestYAML) if err != nil { return consul.ManifestV2{}, err } if err := VerifyDeploymentRelease(client, manifestConfig.Name, ConsulReleaseVersion()); err != nil { return consul.ManifestV2{}, err } return manifest, nil }
func DeployMultiAZConsul(deploymentPrefix string, client bosh.Client, config Config) (manifest consul.Manifest, err error) { guid, err := NewGUID() if err != nil { return } info, err := client.Info() if err != nil { return } manifestConfig := consul.Config{ DirectorUUID: info.UUID, Name: fmt.Sprintf("consul-%s-%s", deploymentPrefix, guid), } var iaasConfig iaas.Config switch info.CPI { case "aws_cpi": awsConfig := buildAWSConfig(config) if len(config.AWS.Subnets) >= 2 { subnet := config.AWS.CloudConfigSubnets[0] awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: subnet.Range, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.Networks = append(manifestConfig.Networks, consul.ConfigNetwork{IPRange: subnet.Range, Nodes: 2}) subnet = config.AWS.CloudConfigSubnets[1] awsConfig.Subnets = append(awsConfig.Subnets, iaas.AWSConfigSubnet{ID: subnet.ID, Range: subnet.Range, AZ: subnet.AZ, SecurityGroup: subnet.SecurityGroup}) manifestConfig.Networks = append(manifestConfig.Networks, consul.ConfigNetwork{IPRange: subnet.Range, Nodes: 1}) } else { err = errors.New("AWSSubnet is required for AWS IAAS deployment") return } iaasConfig = awsConfig case "warden_cpi": iaasConfig = iaas.NewWardenConfig() manifestConfig.Networks = []consul.ConfigNetwork{ {IPRange: "10.244.4.0/24", Nodes: 2}, {IPRange: "10.244.5.0/24", Nodes: 1}, } default: err = errors.New("unknown infrastructure type") return } manifest, err = consul.NewManifest(manifestConfig, iaasConfig) if err != nil { return } for i := range manifest.Releases { if manifest.Releases[i].Name == "consul" { manifest.Releases[i].Version = ConsulReleaseVersion() } } yaml, err := manifest.ToYAML() if err != nil { return } yaml, err = client.ResolveManifestVersions(yaml) if err != nil { return } err = consul.FromYAML(yaml, &manifest) if err != nil { return } _, err = client.Deploy(yaml) if err != nil { return } err = VerifyDeploymentRelease(client, manifestConfig.Name, ConsulReleaseVersion()) if err != nil { return } return }