Github user neykov commented on a diff in the pull request:

    https://github.com/apache/brooklyn-server/pull/529#discussion_r97816042
  
    --- Diff: 
locations/jclouds/src/main/java/org/apache/brooklyn/location/jclouds/BasicLocationNetworkInfoCustomizer.java
 ---
    @@ -0,0 +1,472 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + *
    + *     http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing,
    + * software distributed under the License is distributed on an
    + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
    + * KIND, either express or implied.  See the License for the
    + * specific language governing permissions and limitations
    + * under the License.
    + */
    +
    +package org.apache.brooklyn.location.jclouds;
    +
    +import java.util.Iterator;
    +import java.util.Map;
    +
    +import org.apache.brooklyn.api.entity.Entity;
    +import org.apache.brooklyn.api.entity.EntityInitializer;
    +import org.apache.brooklyn.api.entity.EntityLocal;
    +import org.apache.brooklyn.api.sensor.AttributeSensor;
    +import org.apache.brooklyn.config.ConfigKey;
    +import org.apache.brooklyn.core.config.ConfigKeys;
    +import org.apache.brooklyn.core.entity.Attributes;
    +import org.apache.brooklyn.core.entity.BrooklynConfigKeys;
    +import org.apache.brooklyn.core.location.LocationConfigKeys;
    +import org.apache.brooklyn.core.mgmt.BrooklynTaskTags;
    +import org.apache.brooklyn.core.sensor.Sensors;
    +import org.apache.brooklyn.location.winrm.WinRmMachineLocation;
    +import org.apache.brooklyn.util.core.config.ConfigBag;
    +import org.apache.brooklyn.util.core.task.Tasks;
    +import org.apache.brooklyn.util.exceptions.Exceptions;
    +import org.apache.brooklyn.util.guava.Maybe;
    +import org.apache.brooklyn.util.net.Networking;
    +import org.apache.brooklyn.util.time.Duration;
    +import org.jclouds.compute.domain.NodeMetadata;
    +import org.jclouds.domain.LoginCredentials;
    +import org.slf4j.Logger;
    +import org.slf4j.LoggerFactory;
    +
    +import com.google.common.annotations.Beta;
    +import com.google.common.base.MoreObjects;
    +import com.google.common.base.Optional;
    +import com.google.common.base.Predicate;
    +import com.google.common.base.Stopwatch;
    +import com.google.common.base.Supplier;
    +import com.google.common.base.Suppliers;
    +import com.google.common.collect.ImmutableList;
    +import com.google.common.collect.Iterables;
    +import com.google.common.net.HostAndPort;
    +
    +/**
    + * BasicLocationNetworkInfoCustomizer provides the default implementation 
of
    + * {@link LocationNetworkInfoCustomizer}. It exposes options to have 
JcloudsLocation
    + * prefer to contact VMs on private addresses and can be injected on a
    + * per-entity basis. For example:
    + * <pre>
    + * services:
    + * - type: server
    + *   location: the-same-private-network-as-brooklyn
    + *   brooklyn.initializers:
    + *   - type: 
org.apache.brooklyn.location.jclouds.BasicLocationNetworkInfoCustomizer
    + *     brooklyn.config:
    + *       mode: ONLY_PRIVATE
    + * - type: server
    + *   location: another-cloud
    + *   # implicit use of PREFER_PUBLIC.
    + * </pre>
    + * Would result in the first entity being managed on the instance's 
private address (and deployment
    + * failing if this was not possible) and the second being managed on its 
public address. Graceful
    + * fallback is possible by replacing ONLY_PRIVATE with PREFER_PRIVATE. 
There are PUBLIC variants of
    + * each of these.
    + * <p>
    + * BasicLocationNetworkInfoCustomizer is the default location network info 
customizer used by
    + * {@link JcloudsLocation} when {@link 
JcloudsLocationConfig#LOCATION_NETWORK_INFO_CUSTOMIZER}
    + * is unset.
    + * <p>
    + * When used as an {@link EntityInitializer} the instance inserts itself 
into the entity's
    + * provisioning properties under the {@link 
JcloudsLocationConfig#LOCATION_NETWORK_INFO_CUSTOMIZER}
    + * subkey.
    + * <p>
    + * This class is annotated @Beta and is likely to change in the future.
    + */
    +@Beta
    +public class BasicLocationNetworkInfoCustomizer extends 
BasicJcloudsLocationCustomizer implements LocationNetworkInfoCustomizer {
    +
    +    private static final Logger LOG = 
LoggerFactory.getLogger(BasicLocationNetworkInfoCustomizer.class);
    +
    +    public enum NetworkMode {
    +        /**
    +         * Check each node's {@link NodeMetadata#getPublicAddresses() 
public addresses}
    +         * for reachability before its {@link 
NodeMetadata#getPrivateAddresses() private addresses}.
    +         */
    +        PREFER_PUBLIC,
    +        /**
    +         * Check each node's {@link NodeMetadata#getPrivateAddresses() 
private addresses}
    +         * for reachability before its {@link 
NodeMetadata#getPublicAddresses() public addresses}.
    +         */
    +        PREFER_PRIVATE,
    +        /**
    +         * Check only a node's {@link NodeMetadata#getPublicAddresses() 
public addresses} for reachability.
    +         */
    +        ONLY_PUBLIC,
    +        /**
    +         * Check only a node's {@link NodeMetadata#getPrivateAddresses()}  
private addresses} for reachability.
    +         */
    +        ONLY_PRIVATE
    +    }
    +
    +    public static final ConfigKey<NetworkMode> MODE = 
ConfigKeys.newConfigKey(NetworkMode.class,
    +            "mode", "Operation mode", NetworkMode.PREFER_PUBLIC);
    +
    +    @Beta
    +    public static final ConfigKey<Boolean> CHECK_CREDENTIALS = 
ConfigKeys.newBooleanConfigKey(
    +            "checkCredentials",
    +            "Indicates that credentials should be tested when determining 
endpoint reachability.",
    +            Boolean.TRUE);
    +
    +    public static final ConfigKey<Boolean> PUBLISH_NETWORKS = 
ConfigKeys.newBooleanConfigKey(
    +            "publishNetworks",
    +            "Indicates that the customizer should publish addresses as 
sensors on each entity",
    +            Boolean.TRUE);
    +
    +    // 
--------------------------------------------------------------------------------------
    +
    +    public BasicLocationNetworkInfoCustomizer() {
    +        super();
    +    }
    +
    +    public BasicLocationNetworkInfoCustomizer(Map<?, ?> params) {
    +        super(params);
    +    }
    +
    +    public BasicLocationNetworkInfoCustomizer(final ConfigBag params) {
    +        super(params);
    +    }
    +
    +    // 
--------------------------------------------------------------------------------------
    +
    +    /**
    +     * Overrides the behaviour of {@link 
BasicJcloudsLocationCustomizer#apply(EntityLocal)} to set
    +     * the instance as the value of {@link 
JcloudsLocationConfig#LOCATION_NETWORK_INFO_CUSTOMIZER},
    +     * rather than in its provisioning properties.
    +     */
    +    @Override
    +    public void apply(EntityLocal entity) {
    +        ConfigKey<Object> subkey = 
BrooklynConfigKeys.PROVISIONING_PROPERTIES.subKey(JcloudsLocationConfig.LOCATION_NETWORK_INFO_CUSTOMIZER.getName());
    +        entity.config().set(subkey, this);
    +        LOG.debug("{} set itself as the location network info customizer 
on {}", this, entity);
    +    }
    +
    +    // 
--------------------------------------------------------------------------------------
    +
    +    /**
    +     * Combines the given resolve options with the customiser's 
configuration to determine the
    +     * best address and credential pair for management. In particular, if 
the resolve options
    +     * allow it will check that the credential is actually valid for the 
address.
    +     */
    +    @Override
    +    public ManagementAddressResolveResult resolve(
    +            JcloudsLocation location, NodeMetadata node, ConfigBag config, 
ManagementAddressResolveOptions options) {
    +        LOG.debug("{} resolving management parameters for {}, node={}, 
config={}, options={}",
    +                new Object[]{this, location, node, config, options});
    +        Stopwatch timer = Stopwatch.createStarted();
    +        // Should only be null in tests.
    +        final Entity contextEntity = getContextEntity(config);
    +        if (shouldPublishNetworks() && options.publishNetworkSensors() && 
contextEntity != null) {
    +            publishNetworks(node, contextEntity);
    +        }
    +        HostAndPort hapChoice = null;
    +        LoginCredentials credChoice = null;
    +
    +        Iterable<HostAndPort> managementCandidates = 
getManagementCandidates(location, node, config, options);
    +        Iterable<LoginCredentials> credentialCandidates = 
getCredentialCandidates(location, node, options, config);
    +
    +        // Try each pair of address and credential until one succeeds.
    +        if (options.expectReachable() && 
options.pollForFirstReachableAddress() && shouldCheckCredentials()) {
    +            for (HostAndPort hap : managementCandidates) {
    +                for (LoginCredentials cred : credentialCandidates) {
    +                    LOG.trace("Testing host={} with credential={}", hap, 
cred);
    +                    if (checkCredential(location, hap, cred, config, 
options.isWindows())) {
    +                        hapChoice = hap;
    +                        credChoice = cred;
    +                        break;
    +                    }
    +                }
    +                if (hapChoice != null) break;
    +            }
    +        }
    +
    +        if (hapChoice == null) {
    +            LOG.trace("Choosing first management candidate given node={} 
and mode={}", node, getMode());
    +            hapChoice = Iterables.getFirst(managementCandidates, null);
    +        }
    +        if (hapChoice == null) {
    +            LOG.trace("Choosing first address of node={} in mode={}", 
node, getMode());
    +            final Iterator<String> hit = 
getNodeAddressesWithMode(node).iterator();
    +            if (hit.hasNext()) HostAndPort.fromHost(hit.next());
    +        }
    +        if (hapChoice == null) {
    +            throw new IllegalStateException("Exhausted all options when 
determining address for " + location);
    +        }
    +
    +        if (credChoice == null) {
    +            credChoice = Iterables.getFirst(credentialCandidates, null);
    +            if (credChoice == null) {
    +                throw new IllegalStateException("Exhausted all options 
when determining credential for " + location);
    +            }
    +        }
    +
    +        if (contextEntity != null) {
    +            contextEntity.sensors().set(Attributes.ADDRESS, 
hapChoice.getHostText());
    +        }
    +        ManagementAddressResolveResult result = new 
ManagementAddressResolveResult(hapChoice, credChoice);
    +        LOG.debug("{} resolved management parameters for {} in {}: {}",
    +                new Object[]{this, location, Duration.of(timer), result});
    +        return result;
    +    }
    +
    +    private boolean shouldPublishNetworks() {
    +        return Boolean.TRUE.equals(config().get(PUBLISH_NETWORKS));
    +    }
    +
    +    // TODO: Separate this into second part?
    +    void publishNetworks(NodeMetadata node, Entity entity) {
    +        // todo hostnames?
    +        int i = 0;
    +        for (String address : node.getPrivateAddresses()) {
    +            final AttributeSensor<String> sensor = 
Sensors.newStringSensor("host.address.private." + i++);
    +            if (entity.sensors().get(sensor) == null) {
    +                entity.sensors().set(sensor, address);
    +            }
    +        }
    +        i = 0;
    +        for (String address : node.getPublicAddresses()) {
    +            final AttributeSensor<String> sensor = 
Sensors.newStringSensor("host.address.public." + i++);
    +            if (entity.sensors().get(sensor) == null) {
    +                entity.sensors().set(sensor, address);
    +            }
    +        }
    +    }
    +
    +    // 
--------------------------------------------------------------------------------------
    +
    +    /**
    +     * Returns the hosts and ports that should be considered when 
determining the address
    +     * to use when connecting to the location by assessing the following 
criteria:
    +     * <ol>
    +     *     <li>Use the hostAndPortOverride set in options.</li>
    +     *     <li>If the machine is connectable, user credentials are given 
and the machine is provisioned
    +     *     in AWS then use {@link 
JcloudsLocation#getHostnameAws(NodeMetadata, Optional, Supplier, 
ConfigBag)}.</li>
    +     *     <li>If the machine is connectable and 
pollForFirstReachableAddress is set in options then use all
    +     *     {@link #getReachableAddresses reachable} addresses.</li>
    +     *     <li>Use the first address that is resolvable with {@link 
#isAddressResolvable}.</li>
    +     *     <li>Use the first address in the node's public then private 
addresses.</li>
    +     * </ol>
    +     */
    +    protected Iterable<HostAndPort> getManagementCandidates(
    +            JcloudsLocation location, NodeMetadata node, ConfigBag config, 
ManagementAddressResolveOptions options) {
    +        final Optional<HostAndPort> hostAndPortOverride = 
options.getHostAndPortOverride();
    +        boolean lookupAwsHostname = 
Boolean.TRUE.equals(config.get(JcloudsLocation.LOOKUP_AWS_HOSTNAME));
    +        String provider = config.get(JcloudsLocation.CLOUD_PROVIDER);
    +        if (provider == null) provider = location.getProvider();
    +        int defaultPort;
    +        if (options.isWindows()) {
    +            defaultPort = config.get(WinRmMachineLocation.USE_HTTPS_WINRM) 
? 5986 : 5985;
    +        } else {
    +            defaultPort = node.getLoginPort();
    +        }
    +
    +        // Will normally have come from port forwarding.
    +        if (hostAndPortOverride.isPresent()) {
    --- End diff --
    
    If it's port forwarding then presumably it'd be the external interface. 
What if the user has specified `PREFER_PRIVATE`?


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to