forked from synadia-io/nex
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfig.go
155 lines (130 loc) · 5.02 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
package nexnode
import (
"encoding/json"
"errors"
"os"
"path/filepath"
agentapi "github.com/synadia-io/nex/internal/agent-api"
)
const defaultCNINetworkName = "fcnet"
const defaultCNIInterfaceName = "veth0"
const defaultInternalNodeHost = "192.168.127.1"
const defaultInternalNodePort = 9222
const defaultNodeMemSizeMib = 256
const defaultNodeVcpuCount = 1
var (
// docker/OCI needs to be explicitly enabled in node configuration
defaultWorkloadTypes = []string{"elf", "v8", "wasm"}
)
// Node configuration is used to configure the node process as well
// as the virtual machines it produces
type NodeConfiguration struct {
KernelFile string `json:"kernel_file"`
RootFsFile string `json:"rootfs_file"`
DefaultResourceDir string `json:"default_resource_dir"`
CNI CNIDefinition `json:"cni"`
InternalNodeHost *string `json:"internal_node_host,omitempty"`
InternalNodePort *int `json:"internal_node_port"`
KernelPath *string `json:"kernel_path"` // FIXME
MachinePoolSize int `json:"machine_pool_size"`
MachineTemplate MachineTemplate `json:"machine_template"`
RateLimiters *Limiters `json:"rate_limiters,omitempty"`
RootFsPath *string `json:"rootfs_path"` // FIXME
ValidIssuers []string `json:"valid_issuers,omitempty"`
WorkloadTypes []string `json:"workload_types,omitempty"`
Tags map[string]string `json:"tags,omitempty"`
ForensicMode bool `json:"-"`
ForceDepInstall bool `json:"-"`
Errors []error `json:"errors,omitempty"`
}
func (c *NodeConfiguration) Validate() bool {
c.Errors = make([]error, 0)
if _, err := os.Stat(c.KernelFile); errors.Is(err, os.ErrNotExist) {
c.Errors = append(c.Errors, err)
}
if _, err := os.Stat(c.RootFsFile); errors.Is(err, os.ErrNotExist) {
c.Errors = append(c.Errors, err)
}
return len(c.Errors) == 0
}
// A set of rate limiters. These fields are identical to those in firecracker rate limiter configuration
type Limiters struct {
Bandwidth *TokenBucket `json:"bandwidth,omitempty"`
Operations *TokenBucket `json:"iops,omitempty"`
}
// Defines a reference to the CNI network name, which is defined and configured in a {network}.conflist file, as per
// CNI convention
type CNIDefinition struct {
InterfaceName *string `json:"interface_name"`
NetworkName *string `json:"network_name"`
}
// Defines the CPU and memory usage of a machine to be configured when it is added to the pool
type MachineTemplate struct {
VcpuCount *int `json:"vcpu_count"`
MemSizeMib *int `json:"memsize_mib"`
}
type TokenBucket struct {
// The initial size of a token bucket.
// Minimum: 0
OneTimeBurst *int64 `json:"one_time_burst,omitempty"`
// The amount of milliseconds it takes for the bucket to refill.
// Required: true
// Minimum: 0
RefillTime *int64 `json:"refill_time"`
// The total number of tokens this bucket can hold.
// Required: true
// Minimum: 0
Size *int64 `json:"size"`
}
func DefaultNodeConfiguration() NodeConfiguration {
defaultNodePort := defaultInternalNodePort
defaultVcpuCount := defaultNodeVcpuCount
defaultMemSizeMib := defaultNodeMemSizeMib
return NodeConfiguration{
CNI: CNIDefinition{
NetworkName: agentapi.StringOrNil(defaultCNINetworkName),
InterfaceName: agentapi.StringOrNil(defaultCNIInterfaceName),
},
// CAUTION: This needs to be the IP of the node server's internal NATS --as visible to the inside of the firecracker VM--. This is not necessarily the address
// on which the internal NATS server is actually listening on inside the node.
InternalNodeHost: agentapi.StringOrNil(defaultInternalNodeHost),
InternalNodePort: &defaultNodePort,
MachinePoolSize: 1,
MachineTemplate: MachineTemplate{
VcpuCount: &defaultVcpuCount,
MemSizeMib: &defaultMemSizeMib,
},
Tags: make(map[string]string),
RateLimiters: nil,
WorkloadTypes: defaultWorkloadTypes,
}
}
// Reads the node configuration from the specified configuration file path
func LoadNodeConfiguration(configFilePath string) (*NodeConfiguration, error) {
bytes, err := os.ReadFile(configFilePath)
if err != nil {
return nil, err
}
config := DefaultNodeConfiguration()
err = json.Unmarshal(bytes, &config)
if err != nil {
return nil, err
}
if len(config.WorkloadTypes) == 0 {
config.WorkloadTypes = defaultWorkloadTypes
}
if config.KernelFile == "" && config.DefaultResourceDir != "" {
config.KernelFile = filepath.Join(config.DefaultResourceDir, "vmlinux")
} else if config.KernelFile == "" && config.DefaultResourceDir == "" {
return nil, errors.New("invalid kernel file setting")
}
if config.RootFsFile == "" && config.DefaultResourceDir != "" {
config.RootFsFile = filepath.Join(config.DefaultResourceDir, "rootfs.ext4")
} else if config.KernelFile == "" && config.DefaultResourceDir == "" {
return nil, errors.New("invalid rootfs file setting")
}
if config.Tags == nil {
config.Tags = make(map[string]string)
}
return &config, nil
}