2015-01-19 15:23:46 +00:00
/ *
Copyright 2015 The Camlistore Authors
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
package gce
import (
"bytes"
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"html/template"
"io"
"io/ioutil"
"log"
2015-02-11 21:50:21 +00:00
"math/rand"
2015-01-19 15:23:46 +00:00
"net/http"
"os"
2015-02-11 21:50:21 +00:00
"path"
2015-01-19 15:23:46 +00:00
"path/filepath"
"regexp"
"strings"
"sync"
"time"
"camlistore.org/pkg/auth"
"camlistore.org/pkg/blob"
"camlistore.org/pkg/blobserver"
"camlistore.org/pkg/blobserver/localdisk"
"camlistore.org/pkg/httputil"
"camlistore.org/pkg/osutil"
"camlistore.org/pkg/sorted"
"camlistore.org/pkg/sorted/leveldb"
"camlistore.org/third_party/code.google.com/p/xsrftoken"
2015-12-15 15:15:53 +00:00
2015-11-11 16:54:18 +00:00
"golang.org/x/net/context"
2015-08-18 08:19:49 +00:00
"golang.org/x/oauth2"
"golang.org/x/oauth2/google"
compute "google.golang.org/api/compute/v1"
2015-11-11 16:54:18 +00:00
"google.golang.org/cloud/compute/metadata"
2015-01-19 15:23:46 +00:00
)
const (
// duration after which a progress state is dropped from the progress map
progressStateExpiration = 7 * 24 * time . Hour
cookieExpiration = 24 * time . Hour
)
var (
helpGenCert = ` A self-signed HTTPS certificate will be generated for the chosen domain name (or for "localhost" if left blank) and set as the default. You will be able to set another HTTPS certificate for Camlistore afterwards. `
helpDomainName = "http://en.wikipedia.org/wiki/Fully_qualified_domain_name"
helpMachineTypes = "https://cloud.google.com/compute/docs/machine-types"
helpZones = "https://cloud.google.com/compute/docs/zones#available"
helpSSH = "https://cloud.google.com/compute/docs/console#sshkeys"
2015-01-30 16:34:52 +00:00
machineValues = [ ] string {
"g1-small" ,
"n1-highcpu-2" ,
}
2015-02-11 21:50:21 +00:00
backupZones = map [ string ] [ ] string {
"us-central1" : [ ] string { "-a" , "-b" , "-f" } ,
"europe-west1" : [ ] string { "-b" , "-c" , "-d" } ,
"asia-east1" : [ ] string { "-a" , "-b" , "-c" } ,
}
2015-01-19 15:23:46 +00:00
)
2015-12-07 17:09:11 +00:00
// helpChangeCert returns the template string used for helping with TLS
// certificate files, while sidestepping failInTests panics from osutil.
func helpChangeCert ( ) string {
return ` in your project console, navigate to "Storage", "Cloud Storage", "Storage browser", "%s-camlistore", "config". Delete " ` + filepath . Base ( osutil . DefaultTLSKey ( ) ) + ` ", " ` + filepath . Base ( osutil . DefaultTLSCert ( ) ) + ` ", and replace them by uploading your own files (with the same names). `
}
2015-01-19 15:23:46 +00:00
// DeployHandler serves a wizard that helps with the deployment of Camlistore on Google
// Compute Engine. It must be initialized with NewDeployHandler.
type DeployHandler struct {
2015-12-27 21:52:35 +00:00
scheme string // URL scheme for the URLs served by this handler. Defaults to "https".
2015-01-19 15:23:46 +00:00
host string // URL host for the URLs served by this handler.
prefix string // prefix is the pattern for which this handler is registered as an http.Handler.
help map [ string ] template . HTML // various help bits used in the served pages, keyed by relevant names.
xsrfKey string // for XSRF protection.
2015-02-02 14:11:22 +00:00
piggyGIF string // path to the piggy gif file, defaults to /static/piggy.gif
2015-01-19 15:23:46 +00:00
mux * http . ServeMux
tplMu sync . RWMutex
tpl * template . Template
// Our wizard's credentials, acting on behalf of the user.
// Obtained from the environment for now.
clientID string
clientSecret string
// stores the user submitted configuration as a JSON-encoded InstanceConf
instConf blobserver . Storage
// key is blobRef of the relevant InstanceConf, value is the current state of
2015-01-23 19:30:33 +00:00
// the instance creation process, as JSON-encoded creationState
2015-01-19 15:23:46 +00:00
instState sorted . KeyValue
recordStateErrMu sync . RWMutex
// recordStateErr maps the blobRef of the relevant InstanceConf to the error
// that occurred when recording the creation state.
recordStateErr map [ string ] error
2015-02-11 21:50:21 +00:00
zonesMu sync . RWMutex
// maps a region to all its zones suffixes (e.g. "asia-east1" -> "-a","-b"). updated in the
// background every 24 hours. defaults to backupZones.
zones map [ string ] [ ] string
regions [ ] string
2015-11-13 18:39:29 +00:00
logger * log . Logger // should not be nil.
2015-01-19 15:23:46 +00:00
}
2015-04-14 22:41:52 +00:00
// Config is the set of parameters to initialize the DeployHandler.
type Config struct {
2015-11-11 16:54:18 +00:00
ClientID string ` json:"clientID" ` // handler's credentials for OAuth. Required.
ClientSecret string ` json:"clientSecret" ` // handler's credentials for OAuth. Required.
Project string ` json:"project" ` // any Google Cloud project we can query to get the valid Google Cloud zones. Optional. Set from metadata on GCE.
ServiceAccount string ` json:"serviceAccount" ` // JSON file with credentials to Project. Optional. Unused on GCE.
DataDir string ` json:"dataDir" ` // where to store the instances configurations and states. Optional.
2015-04-14 22:41:52 +00:00
}
2015-11-11 16:54:18 +00:00
// NewDeployHandlerFromConfig initializes a DeployHandler from cfg.
// Host and prefix have the same meaning as for NewDeployHandler. cfg should not be nil.
2015-12-27 21:52:35 +00:00
func NewDeployHandlerFromConfig ( host , prefix string , cfg * Config ) ( * DeployHandler , error ) {
2015-11-11 16:54:18 +00:00
if cfg == nil {
panic ( "NewDeployHandlerFromConfig: nil config" )
2015-04-14 22:41:52 +00:00
}
if cfg . ClientID == "" {
return nil , errors . New ( "oauth2 clientID required in config" )
}
if cfg . ClientSecret == "" {
return nil , errors . New ( "oauth2 clientSecret required in config" )
}
os . Setenv ( "CAMLI_GCE_CLIENTID" , cfg . ClientID )
os . Setenv ( "CAMLI_GCE_CLIENTSECRET" , cfg . ClientSecret )
os . Setenv ( "CAMLI_GCE_PROJECT" , cfg . Project )
os . Setenv ( "CAMLI_GCE_SERVICE_ACCOUNT" , cfg . ServiceAccount )
os . Setenv ( "CAMLI_GCE_DATA" , cfg . DataDir )
return NewDeployHandler ( host , prefix )
}
2015-01-19 15:23:46 +00:00
// NewDeployHandler initializes a DeployHandler that serves at https://host/prefix/ and returns it.
// A Google account client ID should be set in CAMLI_GCE_CLIENTID with its corresponding client
// secret in CAMLI_GCE_CLIENTSECRET.
2015-12-27 21:52:35 +00:00
func NewDeployHandler ( host , prefix string ) ( * DeployHandler , error ) {
2015-01-19 15:23:46 +00:00
clientID := os . Getenv ( "CAMLI_GCE_CLIENTID" )
if clientID == "" {
return nil , errors . New ( "Need an oauth2 client ID defined in CAMLI_GCE_CLIENTID" )
}
clientSecret := os . Getenv ( "CAMLI_GCE_CLIENTSECRET" )
if clientSecret == "" {
return nil , errors . New ( "Need an oauth2 client secret defined in CAMLI_GCE_CLIENTSECRET" )
}
2015-12-07 17:09:11 +00:00
tpl , err := template . New ( "root" ) . Parse ( noTheme + tplHTML ( ) )
2015-01-19 15:23:46 +00:00
if err != nil {
return nil , fmt . Errorf ( "could not parse template: %v" , err )
}
host = strings . TrimSuffix ( host , "/" )
prefix = strings . TrimSuffix ( prefix , "/" )
2015-12-27 21:52:35 +00:00
scheme := "https"
2015-01-19 15:23:46 +00:00
xsrfKey := os . Getenv ( "CAMLI_GCE_XSRFKEY" )
if xsrfKey == "" {
xsrfKey = auth . RandToken ( 20 )
log . Printf ( "xsrf key not provided as env var CAMLI_GCE_XSRFKEY, so generating one instead: %v" , xsrfKey )
}
instConf , instState , err := dataStores ( )
if err != nil {
return nil , fmt . Errorf ( "could not initialize conf or state storage: %v" , err )
}
h := & DeployHandler {
host : host ,
xsrfKey : xsrfKey ,
instConf : instConf ,
instState : instState ,
recordStateErr : make ( map [ string ] error ) ,
scheme : scheme ,
prefix : prefix ,
help : map [ string ] template . HTML {
2015-01-28 14:44:17 +00:00
"createProject" : template . HTML ( googURLPattern . ReplaceAllString ( HelpCreateProject , toHyperlink ) ) ,
"enableAPIs" : template . HTML ( HelpEnableAPIs ) ,
"genCert" : template . HTML ( helpGenCert ) ,
"domainName" : template . HTML ( helpDomainName ) ,
"machineTypes" : template . HTML ( helpMachineTypes ) ,
"zones" : template . HTML ( helpZones ) ,
"ssh" : template . HTML ( helpSSH ) ,
2015-12-07 17:09:11 +00:00
"changeCert" : template . HTML ( helpChangeCert ( ) ) ,
2015-01-28 14:44:17 +00:00
"changeSSH" : template . HTML ( HelpManageSSHKeys ) ,
"changeHTTPCreds" : template . HTML ( HelpManageHTTPCreds ) ,
2015-01-19 15:23:46 +00:00
} ,
clientID : clientID ,
clientSecret : clientSecret ,
tpl : tpl ,
2015-02-02 14:11:22 +00:00
piggyGIF : "/static/piggy.gif" ,
2015-01-19 15:23:46 +00:00
}
mux := http . NewServeMux ( )
mux . HandleFunc ( prefix + "/callback" , func ( w http . ResponseWriter , r * http . Request ) {
h . serveCallback ( w , r )
} )
mux . HandleFunc ( prefix + "/instance" , func ( w http . ResponseWriter , r * http . Request ) {
h . serveInstanceState ( w , r )
} )
mux . HandleFunc ( prefix + "/" , func ( w http . ResponseWriter , r * http . Request ) {
h . serveRoot ( w , r )
} )
h . mux = mux
2015-11-13 18:39:29 +00:00
h . SetLogger ( log . New ( os . Stderr , "GCE DEPLOYER: " , log . LstdFlags ) )
2015-02-11 21:50:21 +00:00
h . zones = backupZones
// TODO(mpl): use time.AfterFunc and avoid having a goroutine running all the time almost
// doing nothing.
refreshZonesFn := func ( ) {
for {
if err := h . refreshZones ( ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "error while refreshing zones: %v" , err )
2015-02-11 21:50:21 +00:00
}
time . Sleep ( 24 * time . Hour )
}
}
go refreshZonesFn ( )
2015-01-19 15:23:46 +00:00
return h , nil
}
func ( h * DeployHandler ) ServeHTTP ( w http . ResponseWriter , r * http . Request ) {
if h . mux == nil {
http . Error ( w , "handler not properly initialized" , http . StatusInternalServerError )
return
}
h . mux . ServeHTTP ( w , r )
}
2015-12-27 21:52:35 +00:00
func ( h * DeployHandler ) SetScheme ( scheme string ) { h . scheme = scheme }
// authenticatedClient returns the GCE project running the /launch/
// app (e.g. "camlistore-website" usually for the main instance) and
// an authenticated OAuth2 client acting as that service account.
// This is only used for refreshing the list of valid zones to give to
// the user in a drop-down.
// If we're not running on GCE (e.g. dev mode on localhost) and have
// no other way to get the info, the error value is is errNoRefresh.
2015-11-11 16:54:18 +00:00
func ( h * DeployHandler ) authenticatedClient ( ) ( project string , hc * http . Client , err error ) {
project = os . Getenv ( "CAMLI_GCE_PROJECT" )
accountFile := os . Getenv ( "CAMLI_GCE_SERVICE_ACCOUNT" )
if project != "" && accountFile != "" {
data , errr := ioutil . ReadFile ( accountFile )
err = errr
if err != nil {
return
}
jwtConf , errr := google . JWTConfigFromJSON ( data , "https://www.googleapis.com/auth/compute.readonly" )
err = errr
if err != nil {
return
}
hc = jwtConf . Client ( context . Background ( ) )
return
}
if ! metadata . OnGCE ( ) {
err = errNoRefresh
return
}
project , _ = metadata . ProjectID ( )
hc , err = google . DefaultClient ( oauth2 . NoContext )
return project , hc , err
}
var errNoRefresh error = errors . New ( "not on GCE, and at least one of CAMLI_GCE_PROJECT or CAMLI_GCE_SERVICE_ACCOUNT not defined." )
2015-02-11 21:50:21 +00:00
func ( h * DeployHandler ) refreshZones ( ) error {
h . zonesMu . Lock ( )
defer h . zonesMu . Unlock ( )
defer func ( ) {
h . regions = make ( [ ] string , 0 , len ( h . zones ) )
for r , _ := range h . zones {
h . regions = append ( h . regions , r )
}
} ( )
2015-11-11 16:54:18 +00:00
project , hc , err := h . authenticatedClient ( )
2015-02-11 21:50:21 +00:00
if err != nil {
2015-11-11 16:54:18 +00:00
if err == errNoRefresh {
h . zones = backupZones
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Cannot refresh zones because %v. Using hard-coded ones instead." )
2015-11-11 16:54:18 +00:00
return nil
}
2015-02-11 21:50:21 +00:00
return err
}
2015-11-11 16:54:18 +00:00
s , err := compute . New ( hc )
2015-02-11 21:50:21 +00:00
if err != nil {
return err
}
rl , err := compute . NewRegionsService ( s ) . List ( project ) . Do ( )
if err != nil {
return fmt . Errorf ( "could not get a list of regions: %v" , err )
}
h . zones = make ( map [ string ] [ ] string )
for _ , r := range rl . Items {
zones := make ( [ ] string , 0 , len ( r . Zones ) )
for _ , z := range r . Zones {
zone := path . Base ( z )
if zone == "europe-west1-a" {
// Because even though the docs mark it as deprecated, it still shows up here, go figure.
continue
}
zone = strings . Replace ( zone , r . Name , "" , 1 )
zones = append ( zones , zone )
}
h . zones [ r . Name ] = zones
}
return nil
}
func ( h * DeployHandler ) zoneValues ( ) [ ] string {
h . zonesMu . RLock ( )
defer h . zonesMu . RUnlock ( )
return h . regions
}
2015-01-19 15:23:46 +00:00
func ( h * DeployHandler ) serveRoot ( w http . ResponseWriter , r * http . Request ) {
if r . Method == "POST" {
h . serveSetup ( w , r )
return
}
_ , err := r . Cookie ( "user" )
if err != nil {
http . SetCookie ( w , newCookie ( ) )
}
h . tplMu . RLock ( )
defer h . tplMu . RUnlock ( )
if err := h . tpl . ExecuteTemplate ( w , "withform" , & TemplateData {
2015-01-30 16:34:52 +00:00
Prefix : h . prefix ,
Help : h . help ,
2015-02-11 21:50:21 +00:00
ZoneValues : h . zoneValues ( ) ,
2015-01-30 16:34:52 +00:00
MachineValues : machineValues ,
2015-01-19 15:23:46 +00:00
} ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Print ( err )
2015-01-19 15:23:46 +00:00
}
}
func ( h * DeployHandler ) serveSetup ( w http . ResponseWriter , r * http . Request ) {
if r . FormValue ( "mode" ) != "setupproject" {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , errors . New ( "bad form" ) )
2015-01-19 15:23:46 +00:00
return
}
ck , err := r . Cookie ( "user" )
if err != nil {
h . serveFormError ( w , errors . New ( "Cookie expired, or CSRF attempt. Please reload and retry." ) )
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Cookie expired, or CSRF attempt on form." )
2015-01-19 15:23:46 +00:00
return
}
2015-02-11 21:50:21 +00:00
instConf , err := h . confFromForm ( r )
2015-01-19 15:23:46 +00:00
if err != nil {
h . serveFormError ( w , err )
return
}
br , err := h . storeInstanceConf ( instConf )
if err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , fmt . Errorf ( "could not store instance configuration: %v" , err ) )
2015-01-19 15:23:46 +00:00
return
}
xsrfToken := xsrftoken . Generate ( h . xsrfKey , ck . Value , br . String ( ) )
state := fmt . Sprintf ( "%s:%x" , br . String ( ) , xsrfToken )
redirectURL := h . oAuthConfig ( ) . AuthCodeURL ( state )
http . Redirect ( w , r , redirectURL , http . StatusFound )
return
}
func ( h * DeployHandler ) serveCallback ( w http . ResponseWriter , r * http . Request ) {
ck , err := r . Cookie ( "user" )
if err != nil {
http . Error ( w ,
2015-12-27 21:52:35 +00:00
fmt . Sprintf ( "Cookie expired, or CSRF attempt. Restart from %s://%s%s" , h . scheme , h . host , h . prefix ) ,
2015-01-19 15:23:46 +00:00
http . StatusBadRequest )
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Cookie expired, or CSRF attempt on callback." )
2015-01-19 15:23:46 +00:00
return
}
code := r . FormValue ( "code" )
if code == "" {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , errors . New ( "No oauth code parameter in callback URL" ) )
2015-01-19 15:23:46 +00:00
return
}
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "successful authentication: %v" , r . URL . RawQuery )
2015-01-19 15:23:46 +00:00
br , tk , err := fromState ( r )
if err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , err )
2015-01-19 15:23:46 +00:00
return
}
if ! xsrftoken . Valid ( tk , h . xsrfKey , ck . Value , br . String ( ) ) {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , fmt . Errorf ( "Invalid xsrf token: %q" , tk ) )
2015-01-19 15:23:46 +00:00
return
}
oAuthConf := h . oAuthConfig ( )
tok , err := oAuthConf . Exchange ( oauth2 . NoContext , code )
if err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , fmt . Errorf ( "could not obtain a token: %v" , err ) )
2015-01-19 15:23:46 +00:00
return
}
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "successful authorization with token: %v" , tok )
2015-01-19 15:23:46 +00:00
instConf , err := h . instanceConf ( br )
if err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , err )
2015-01-19 15:23:46 +00:00
return
}
depl := & Deployer {
2015-02-02 14:11:22 +00:00
Client : oAuthConf . Client ( oauth2 . NoContext , tok ) ,
Conf : instConf ,
2015-11-13 18:39:29 +00:00
Logger : h . logger ,
2015-01-19 15:23:46 +00:00
}
2015-01-23 19:30:33 +00:00
if found := h . serveOldInstance ( w , br , depl ) ; found {
2015-01-19 15:23:46 +00:00
return
}
if err := h . recordState ( br , & creationState {
InstConf : br ,
} ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , err )
2015-01-19 15:23:46 +00:00
return
}
go func ( ) {
2015-12-15 15:15:53 +00:00
inst , err := depl . Create ( context . TODO ( ) )
2015-01-19 15:23:46 +00:00
state := & creationState {
InstConf : br ,
}
if err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "could not create instance: %v" , err )
2015-01-27 17:06:07 +00:00
switch e := err . ( type ) {
case instanceExistsError :
state . Err = fmt . Sprintf ( "%v %v" , e , helpDeleteInstance )
case projectIDError :
state . Err = fmt . Sprintf ( "%v" , e )
default :
state . Err = fmt . Sprintf ( "%v. %v" , err , fileIssue ( br . String ( ) ) )
}
2015-01-19 15:23:46 +00:00
} else {
state . InstAddr = addr ( inst )
state . Success = true
2015-02-02 14:11:22 +00:00
state . CertFingerprintSHA1 = depl . certFingerprints [ "SHA-1" ]
state . CertFingerprintSHA256 = depl . certFingerprints [ "SHA-256" ]
2015-01-19 15:23:46 +00:00
}
if err := h . recordState ( br , state ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not record creation state for %v: %v" , br , err )
2015-01-19 15:23:46 +00:00
h . recordStateErrMu . Lock ( )
defer h . recordStateErrMu . Unlock ( )
h . recordStateErr [ br . String ( ) ] = err
}
} ( )
h . serveProgress ( w , br )
}
2015-01-23 19:30:33 +00:00
// serveOldInstance looks on GCE for an instance such as defined in depl.Conf, and if
// found, serves the appropriate page depending on whether the instance is usable. It does
// not serve anything if the instance is not found.
func ( h * DeployHandler ) serveOldInstance ( w http . ResponseWriter , br blob . Ref , depl * Deployer ) ( found bool ) {
2015-12-29 05:35:57 +00:00
inst , err := depl . Get ( )
if err != nil {
// TODO(mpl,bradfitz): log or do something more
// drastic if the error is something other than
// instance not found.
return false
}
var sigs map [ string ] string
cert , _ , err := depl . getInstalledTLS ( )
if err == nil {
sigs , err = httputil . CertFingerprints ( cert )
2015-01-23 19:30:33 +00:00
if err != nil {
2015-12-29 05:35:57 +00:00
err = fmt . Errorf ( "could not get fingerprints of certificate: %v" , err )
2015-02-02 14:11:22 +00:00
}
2015-12-29 05:35:57 +00:00
}
if err != nil {
h . logger . Printf ( "Instance (%v, %v, %v) already exists, but error getting its certificate: %v" ,
depl . Conf . Project , depl . Conf . Name , depl . Conf . Zone , err )
h . serveErrorPage ( w ,
fmt . Errorf ( "Instance already running at %v. You need to manually delete the old one before creating a new one." , addr ( inst ) ) ,
helpDeleteInstance ,
)
return true
}
var existPassword string
for _ , item := range inst . Metadata . Items {
if item . Key == "camlistore-password" {
existPassword = * ( item . Value )
2015-01-23 19:30:33 +00:00
}
2015-12-29 05:35:57 +00:00
}
if depl . Conf . Password != "" && existPassword != depl . Conf . Password {
h . logger . Printf ( "Instance (%v, %v, %v) already exists, but with different password" ,
depl . Conf . Project , depl . Conf . Name , depl . Conf . Zone )
h . serveErrorPage ( w ,
fmt . Errorf ( "Instance already running at %v. You need to manually delete the old one before creating a new one." , addr ( inst ) ) ,
helpDeleteInstance ,
)
2015-01-23 19:30:33 +00:00
return true
}
2015-12-29 05:35:57 +00:00
h . logger . Printf ( "Reusing existing instance for (%v, %v, %v)" , depl . Conf . Project , depl . Conf . Name , depl . Conf . Zone )
if err := h . recordState ( br , & creationState {
InstConf : br ,
InstAddr : addr ( inst ) ,
CertFingerprintSHA1 : sigs [ "SHA-1" ] ,
CertFingerprintSHA256 : sigs [ "SHA-256" ] ,
Exists : true ,
} ) ; err != nil {
h . logger . Printf ( "Could not record creation state for %v: %v" , br , err )
h . serveErrorPage ( w , fmt . Errorf ( "An error occurred while recording the state of your instance. %v" , fileIssue ( br . String ( ) ) ) )
return true
}
h . serveProgress ( w , br )
return true
2015-01-23 19:30:33 +00:00
}
2015-01-19 15:23:46 +00:00
func ( h * DeployHandler ) serveFormError ( w http . ResponseWriter , err error , hints ... string ) {
var topHints [ ] string
for _ , v := range hints {
topHints = append ( topHints , v )
}
2015-11-13 18:39:29 +00:00
h . logger . Print ( err )
2015-01-19 15:23:46 +00:00
h . tplMu . RLock ( )
defer h . tplMu . RUnlock ( )
if tplErr := h . tpl . ExecuteTemplate ( w , "withform" , & TemplateData {
2015-01-30 16:34:52 +00:00
Prefix : h . prefix ,
Help : h . help ,
Err : err ,
Hints : topHints ,
2015-02-11 21:50:21 +00:00
ZoneValues : h . zoneValues ( ) ,
2015-01-30 16:34:52 +00:00
MachineValues : machineValues ,
2015-01-19 15:23:46 +00:00
} ) ; tplErr != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not serve form error %q because: %v" , err , tplErr )
2015-01-19 15:23:46 +00:00
}
}
2015-01-23 19:30:33 +00:00
func fileIssue ( br string ) string {
return fmt . Sprintf ( "Please file an issue with your instance key (%v) at https://camlistore.org/issue" , br )
}
2015-01-19 15:23:46 +00:00
// serveInstanceState serves the state of the requested Google Cloud Engine VM creation
// process. If the operation was successful, it serves a success page. If it failed, it
// serves an error page. If it isn't finished yet, it replies with "running".
func ( h * DeployHandler ) serveInstanceState ( w http . ResponseWriter , r * http . Request ) {
if r . Method != "GET" {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , fmt . Errorf ( "Wrong method: %v" , r . Method ) )
2015-01-19 15:23:46 +00:00
return
}
br := r . URL . Query ( ) . Get ( "instancekey" )
stateValue , err := h . instState . Get ( br )
if err != nil {
http . Error ( w , "unknown instance" , http . StatusNotFound )
return
}
var state creationState
if err := json . Unmarshal ( [ ] byte ( stateValue ) , & state ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . serveError ( w , r , fmt . Errorf ( "could not json decode instance state: %v" , err ) )
2015-01-19 15:23:46 +00:00
return
}
2015-01-23 19:30:33 +00:00
if state . Err != "" {
2015-01-19 15:23:46 +00:00
// No need to log that error here since we're already doing it in serveCallback
2015-01-28 14:44:17 +00:00
// TODO(mpl): fix overescaping of double quotes.
2015-11-13 18:39:29 +00:00
h . serveErrorPage ( w , fmt . Errorf ( "An error occurred while creating your instance: %q. " , state . Err ) )
2015-01-19 15:23:46 +00:00
return
}
2015-01-23 19:30:33 +00:00
if state . Success || state . Exists {
2015-01-19 15:23:46 +00:00
conf , err := h . instanceConf ( state . InstConf )
if err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not get parameters for success message: %v" , err )
h . serveErrorPage ( w , fmt . Errorf ( "Your instance was created and should soon be up at https://%s but there might have been a problem in the creation process. %v" , state . Err , fileIssue ( br ) ) )
2015-01-19 15:23:46 +00:00
return
}
h . serveSuccess ( w , & TemplateData {
2015-02-02 14:11:22 +00:00
Prefix : h . prefix ,
Help : h . help ,
InstanceIP : state . InstAddr ,
ProjectConsoleURL : fmt . Sprintf ( "%s/project/%s/compute" , ConsoleURL , conf . Project ) ,
Conf : conf ,
CertFingerprintSHA1 : state . CertFingerprintSHA1 ,
CertFingerprintSHA256 : state . CertFingerprintSHA256 ,
2015-02-11 21:50:21 +00:00
ZoneValues : h . zoneValues ( ) ,
2015-02-02 14:11:22 +00:00
MachineValues : machineValues ,
2015-01-19 15:23:46 +00:00
} )
return
}
h . recordStateErrMu . RLock ( )
defer h . recordStateErrMu . RUnlock ( )
if _ , ok := h . recordStateErr [ br ] ; ok {
// No need to log that error here since we're already doing it in serveCallback
2015-11-13 18:39:29 +00:00
h . serveErrorPage ( w , fmt . Errorf ( "An error occurred while recording the state of your instance. %v" , fileIssue ( br ) ) )
2015-01-19 15:23:46 +00:00
return
}
fmt . Fprintf ( w , "running" )
}
// serveProgress serves a page with some javascript code that regularly queries
// the server about the progress of the requested Google Cloud Engine VM creation.
// The server replies through serveInstanceState.
func ( h * DeployHandler ) serveProgress ( w http . ResponseWriter , instanceKey blob . Ref ) {
h . tplMu . RLock ( )
defer h . tplMu . RUnlock ( )
if err := h . tpl . ExecuteTemplate ( w , "withform" , & TemplateData {
Prefix : h . prefix ,
InstanceKey : instanceKey . String ( ) ,
2015-02-02 14:11:22 +00:00
PiggyGIF : h . piggyGIF ,
2015-01-19 15:23:46 +00:00
} ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not serve progress: %v" , err )
2015-01-19 15:23:46 +00:00
}
}
2015-11-13 18:39:29 +00:00
func ( h * DeployHandler ) serveErrorPage ( w http . ResponseWriter , err error , hints ... string ) {
2015-01-19 15:23:46 +00:00
var topHints [ ] string
for _ , v := range hints {
topHints = append ( topHints , v )
}
2015-11-13 18:39:29 +00:00
h . logger . Print ( err )
2015-01-19 15:23:46 +00:00
h . tplMu . RLock ( )
defer h . tplMu . RUnlock ( )
if tplErr := h . tpl . ExecuteTemplate ( w , "noform" , & TemplateData {
Prefix : h . prefix ,
Err : err ,
Hints : topHints ,
} ) ; tplErr != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not serve error %q because: %v" , err , tplErr )
2015-01-19 15:23:46 +00:00
}
}
func ( h * DeployHandler ) serveSuccess ( w http . ResponseWriter , data * TemplateData ) {
h . tplMu . RLock ( )
defer h . tplMu . RUnlock ( )
if err := h . tpl . ExecuteTemplate ( w , "noform" , data ) ; err != nil {
2015-11-13 18:39:29 +00:00
h . logger . Printf ( "Could not serve success: %v" , err )
2015-01-19 15:23:46 +00:00
}
}
func newCookie ( ) * http . Cookie {
expiration := cookieExpiration
return & http . Cookie {
Name : "user" ,
Value : auth . RandToken ( 15 ) ,
Expires : time . Now ( ) . Add ( expiration ) ,
}
}
func formValueOrDefault ( r * http . Request , formField , defValue string ) string {
val := r . FormValue ( formField )
if val == "" {
return defValue
}
return val
}
2015-02-11 21:50:21 +00:00
func ( h * DeployHandler ) confFromForm ( r * http . Request ) ( * InstanceConf , error ) {
2015-01-19 15:23:46 +00:00
project := r . FormValue ( "project" )
if project == "" {
return nil , errors . New ( "missing project parameter" )
}
2015-12-28 23:15:11 +00:00
var zone string
zoneReg := formValueOrDefault ( r , "zone" , DefaultRegion )
if LooksLikeRegion ( zoneReg ) {
region := zoneReg
zone = h . randomZone ( region )
} else if strings . Count ( zoneReg , "-" ) == 2 {
zone = zoneReg
} else {
return nil , errors . New ( "invalid zone or region" )
2015-02-11 21:50:21 +00:00
}
2015-01-19 15:23:46 +00:00
return & InstanceConf {
2015-12-28 23:15:11 +00:00
Name : formValueOrDefault ( r , "name" , DefaultInstanceName ) ,
2015-01-19 15:23:46 +00:00
Project : project ,
2015-12-28 23:15:11 +00:00
Machine : formValueOrDefault ( r , "machine" , DefaultMachineType ) ,
2015-02-11 21:50:21 +00:00
Zone : zone ,
2015-01-19 15:23:46 +00:00
Hostname : formValueOrDefault ( r , "hostname" , "localhost" ) ,
SSHPub : formValueOrDefault ( r , "sshPub" , "" ) ,
2015-12-29 05:35:57 +00:00
Password : r . FormValue ( "password" ) ,
2015-01-19 15:23:46 +00:00
Ctime : time . Now ( ) ,
2015-10-20 23:46:33 +00:00
WIP : r . FormValue ( "WIP" ) == "1" ,
2015-01-19 15:23:46 +00:00
} , nil
}
2015-02-11 21:50:21 +00:00
// randomZone picks one of the zone suffixes for region and returns it
// appended to region, as a fully-qualified zone name.
// If the given region is invalid, the default Zone is returned instead.
func ( h * DeployHandler ) randomZone ( region string ) string {
h . zonesMu . RLock ( )
defer h . zonesMu . RUnlock ( )
zones , ok := h . zones [ region ]
if ! ok {
2015-12-28 02:43:17 +00:00
return fallbackZone
2015-02-11 21:50:21 +00:00
}
return region + zones [ rand . Intn ( len ( zones ) ) ]
}
2015-11-13 18:39:29 +00:00
func ( h * DeployHandler ) SetLogger ( lg * log . Logger ) {
h . logger = lg
}
func ( h * DeployHandler ) serveError ( w http . ResponseWriter , r * http . Request , err error ) {
if h . logger != nil {
h . logger . Printf ( "%v" , err )
}
httputil . ServeError ( w , r , err )
2015-01-19 15:23:46 +00:00
}
func ( h * DeployHandler ) oAuthConfig ( ) * oauth2 . Config {
oauthConfig := NewOAuthConfig ( h . clientID , h . clientSecret )
2015-12-27 21:52:35 +00:00
oauthConfig . RedirectURL = fmt . Sprintf ( "%s://%s%s/callback" , h . scheme , h . host , h . prefix )
2015-01-19 15:23:46 +00:00
return oauthConfig
}
// fromState parses the oauth state parameter from r to extract the blobRef of the
// instance configuration and the xsrftoken that were stored during serveSetup.
func fromState ( r * http . Request ) ( br blob . Ref , xsrfToken string , err error ) {
params := strings . Split ( r . FormValue ( "state" ) , ":" )
if len ( params ) != 2 {
return br , "" , fmt . Errorf ( "Invalid format for state parameter: %q, wanted blobRef:xsrfToken" , r . FormValue ( "state" ) )
}
br , ok := blob . Parse ( params [ 0 ] )
if ! ok {
return br , "" , fmt . Errorf ( "Invalid blobRef in state parameter: %q" , params [ 0 ] )
}
token , err := hex . DecodeString ( params [ 1 ] )
if err != nil {
return br , "" , fmt . Errorf ( "can't decode hex xsrftoken %q: %v" , params [ 1 ] , err )
}
return br , string ( token ) , nil
}
func ( h * DeployHandler ) storeInstanceConf ( conf * InstanceConf ) ( blob . Ref , error ) {
contents , err := json . Marshal ( conf )
if err != nil {
return blob . Ref { } , fmt . Errorf ( "could not json encode instance config: %v" , err )
}
hash := blob . NewHash ( )
_ , err = io . Copy ( hash , bytes . NewReader ( contents ) )
if err != nil {
return blob . Ref { } , fmt . Errorf ( "could not hash blob contents: %v" , err )
}
br := blob . RefFromHash ( hash )
if _ , err := blobserver . Receive ( h . instConf , br , bytes . NewReader ( contents ) ) ; err != nil {
return blob . Ref { } , fmt . Errorf ( "could not store instance config blob: %v" , err )
}
return br , nil
}
func ( h * DeployHandler ) instanceConf ( br blob . Ref ) ( * InstanceConf , error ) {
rc , _ , err := h . instConf . Fetch ( br )
if err != nil {
return nil , fmt . Errorf ( "could not fetch conf at %v: %v" , br , err )
}
defer rc . Close ( )
contents , err := ioutil . ReadAll ( rc )
if err != nil {
return nil , fmt . Errorf ( "could not read conf in blob %v: %v" , br , err )
}
var instConf InstanceConf
if err := json . Unmarshal ( contents , & instConf ) ; err != nil {
return nil , fmt . Errorf ( "could not json decode instance config: %v" , err )
}
return & instConf , nil
}
func ( h * DeployHandler ) recordState ( br blob . Ref , state * creationState ) error {
val , err := json . Marshal ( state )
if err != nil {
return fmt . Errorf ( "could not json encode instance state: %v" , err )
}
if err := h . instState . Set ( br . String ( ) , string ( val ) ) ; err != nil {
return fmt . Errorf ( "could not record instance state: %v" , err )
}
return nil
}
func addr ( inst * compute . Instance ) string {
if inst == nil {
return ""
}
if len ( inst . NetworkInterfaces ) == 0 || inst . NetworkInterfaces [ 0 ] == nil {
return ""
}
if len ( inst . NetworkInterfaces [ 0 ] . AccessConfigs ) == 0 || inst . NetworkInterfaces [ 0 ] . AccessConfigs [ 0 ] == nil {
return ""
}
return inst . NetworkInterfaces [ 0 ] . AccessConfigs [ 0 ] . NatIP
}
// creationState keeps information all along the creation process of the instance. The
// fields are only exported because we json encode them.
type creationState struct {
2015-02-02 14:11:22 +00:00
Err string ` json:",omitempty" ` // if non blank, creation failed.
InstConf blob . Ref // key to the user provided instance configuration.
InstAddr string // ip address of the instance.
CertFingerprintSHA1 string // SHA-1 prefix fingerprint of the self-signed HTTPS certificate.
CertFingerprintSHA256 string // SHA-256 prefix fingerprint of the self-signed HTTPS certificate.
Success bool // whether new instance creation was successful.
Exists bool // true if an instance with same zone, same project name, and same instance name already exists.
2015-01-19 15:23:46 +00:00
}
// dataStores returns the blobserver that stores the instances configurations, and the kv
// store for the instances states.
func dataStores ( ) ( blobserver . Storage , sorted . KeyValue , error ) {
dataDir := os . Getenv ( "CAMLI_GCE_DATA" )
if dataDir == "" {
2015-11-11 16:54:18 +00:00
var err error
dataDir , err = ioutil . TempDir ( "" , "camli-gcedeployer-data" )
if err != nil {
return nil , nil , err
}
2015-01-19 15:23:46 +00:00
log . Printf ( "data dir not provided as env var CAMLI_GCE_DATA, so defaulting to %v" , dataDir )
}
blobsDir := filepath . Join ( dataDir , "instance-conf" )
if err := os . MkdirAll ( blobsDir , 0700 ) ; err != nil {
return nil , nil , err
}
instConf , err := localdisk . New ( blobsDir )
if err != nil {
return nil , nil , err
}
instState , err := leveldb . NewStorage ( filepath . Join ( dataDir , "instance-state" ) )
if err != nil {
return nil , nil , err
}
return instConf , instState , nil
}
// AddTemplateTheme allows to enhance the aesthetics of the default template. To that
// effect, text can provide the template definitions for "header", "banner", "toplinks", and
// "footer".
func ( h * DeployHandler ) AddTemplateTheme ( text string ) error {
2015-12-07 17:09:11 +00:00
tpl , err := template . New ( "root" ) . Parse ( text + tplHTML ( ) )
2015-01-19 15:23:46 +00:00
if err != nil {
return err
}
h . tplMu . Lock ( )
defer h . tplMu . Unlock ( )
h . tpl = tpl
return nil
}
// TemplateData is the data passed for templates of tplHTML.
type TemplateData struct {
2015-02-02 14:11:22 +00:00
Title string
Help map [ string ] template . HTML // help bits within the form.
Hints [ ] string // helping hints printed in case of an error.
Err error
Prefix string // handler prefix.
InstanceKey string // instance creation identifier, for the JS code to regularly poll for progress.
PiggyGIF string // URI to the piggy gif for progress animation.
Conf * InstanceConf // Configuration requested by the user
InstanceIP string // instance IP address that we display after successful creation.
CertFingerprintSHA1 string // SHA-1 fingerprint of the self-signed HTTPS certificate.
CertFingerprintSHA256 string // SHA-256 fingerprint of the self-signed HTTPS certificate.
ProjectConsoleURL string
ZoneValues [ ] string
MachineValues [ ] string
2015-01-19 15:23:46 +00:00
}
const toHyperlink = ` <a href="$1$3">$1$3</a> `
var googURLPattern = regexp . MustCompile ( ` (https://([a-zA-Z0-9\-\.]+)?\.google.com)([a-zA-Z0-9\-\_/]+)? ` )
// empty definitions for "banner", "toplinks", and "footer" to avoid error on
// ExecuteTemplate when the definitions have not been added with AddTemplateTheme.
var noTheme = `
{ { define "header" } }
< head >
< title > Camlistore on Google Cloud < / title >
< / head >
{ { end } }
{ { define "banner" } }
{ { end } }
{ { define "toplinks" } }
{ { end } }
{ { define "footer" } }
{ { end } }
`
2015-12-07 17:09:11 +00:00
func tplHTML ( ) string {
return `
2015-01-19 15:23:46 +00:00
{ { define "progress" } }
{ { if . InstanceKey } }
< script >
// start of progress animation/message
var availWidth = window . innerWidth ;
var availHeight = window . innerHeight ;
var w = availWidth * 0.8 ;
var h = availHeight * 0.8 ;
var piggyWidth = 84 ;
var piggyHeight = 56 ;
var borderWidth = 18 ;
var maskDiv = document . createElement ( ' div ' ) ;
maskDiv . style . zIndex = 2 ;
var dialogDiv = document . createElement ( ' div ' ) ;
dialogDiv . style . position = ' fixed ' ;
dialogDiv . style . width = w ;
dialogDiv . style . height = h ;
dialogDiv . style . left = ( availWidth - w ) / 2 ;
dialogDiv . style . top = ( availHeight - h ) / 2 ;
dialogDiv . style . borderWidth = borderWidth ;
dialogDiv . style . textAlign = ' center ' ;
var imgDiv = document . createElement ( ' div ' ) ;
imgDiv . style . marginRight = 3 ;
imgDiv . style . position = ' relative ' ;
imgDiv . style . left = w / 2 - ( piggyWidth / 2 ) ;
imgDiv . style . top = h * 0.33 ;
imgDiv . style . display = ' block ' ;
imgDiv . style . height = piggyHeight ;
imgDiv . style . width = piggyWidth ;
imgDiv . style . overflow = ' hidden ' ;
var img = document . createElement ( ' img ' ) ;
2015-02-02 14:11:22 +00:00
img . src = { { . PiggyGIF } } ;
2015-01-19 15:23:46 +00:00
var msg = document . createElement ( ' span ' ) ;
2015-01-27 17:06:07 +00:00
msg . innerHTML = ' Please wait ( up to a couple of minutes ) while we create your instance ... ' ;
2015-01-19 15:23:46 +00:00
msg . style . boxSizing = ' border - box ' ;
msg . style . color = ' # 444 ' ;
msg . style . display = ' block ' ;
msg . style . fontFamily = ' Open Sans , sans - serif ' ;
msg . style . fontSize = ' 24 px ' ;
msg . style . fontStyle = ' normal ' ;
msg . style . fontVariant = ' normal ' ;
msg . style . fontWeight = ' normal ' ;
msg . style . textAlign = ' center ' ;
msg . style . position = ' relative ' ;
msg . style . top = h * 0.33 + piggyHeight ;
msg . style . height = ' auto ' ;
msg . style . width = ' auto ' ;
imgDiv . appendChild ( img ) ;
dialogDiv . appendChild ( imgDiv ) ;
dialogDiv . appendChild ( msg ) ;
maskDiv . appendChild ( dialogDiv ) ;
document . getElementsByTagName ( ' body ' ) [ 0 ] . appendChild ( maskDiv ) ;
// end of progress animation code
var progress = setInterval ( function ( ) { getInstanceState ( ' { { . Prefix } } / instance ? instancekey = { { . InstanceKey } } ' ) } , 2000 ) ;
function getInstanceState ( progressURL ) {
var xmlhttp = new XMLHttpRequest ( ) ;
xmlhttp . open ( "GET" , progressURL , false ) ;
xmlhttp . send ( ) ;
console . log ( xmlhttp . responseText ) ;
if ( xmlhttp . responseText != "running" ) {
clearInterval ( progress ) ;
window . document . open ( ) ;
window . document . write ( xmlhttp . responseText ) ;
window . document . close ( ) ;
history . pushState ( null , ' Camlistore on Google Cloud ' , progressURL ) ;
}
}
< / script >
{ { end } }
{ { end } }
{ { define "messages" } }
< div class = ' content ' >
< h1 > < a href = "{{.Prefix}}" > Camlistore on Google Cloud < / a > < / h1 >
{ { if . InstanceIP } }
2015-04-29 20:58:53 +00:00
< p > Success . Your Camlistore instance should be up at < a href = "https://{{.InstanceIP}}" > https : //{{.InstanceIP}}</a>. It can take a couple of minutes to be ready.</p>
2015-12-27 21:52:35 +00:00
< p > Please save the information on this page . < / p >
2015-02-02 14:11:22 +00:00
< h4 > First connection < / h4 >
2015-01-28 14:44:17 +00:00
< p >
2015-02-02 14:11:22 +00:00
A self - signed HTTPS certificate was automatically generated with "{{.Conf.Hostname}}" as the common name . < br >
2015-12-27 21:52:35 +00:00
You will need to add an exception for it in your browser when you get a security warning the first time you connect . When you add a trusted certificate , verify that its certificate fingerprint matches one of :
2015-02-02 14:11:22 +00:00
< table >
< tr > < td align = right > SHA - 1 < / td > < td > < code style = "color:blue" > { { . CertFingerprintSHA1 } } < / code > < / td > < / tr >
< tr > < td align = right > SHA - 256 < / td > < td > < code style = "color:blue" > { { . CertFingerprintSHA256 } } < / code > < / td > < / tr >
< / table >
2015-01-31 22:55:53 +00:00
< / p >
2015-02-02 14:11:22 +00:00
< h4 > Further configuration < / h4 >
2015-01-31 22:55:53 +00:00
< p >
2015-02-02 14:11:22 +00:00
Manage your instance at < a href = "{{.ProjectConsoleURL}}" > { { . ProjectConsoleURL } } < / a > .
2015-01-28 14:44:17 +00:00
< / p >
2015-02-02 14:11:22 +00:00
2015-01-19 15:23:46 +00:00
< p >
2015-02-02 14:11:22 +00:00
To change your login and password , go to the < a href = "{{.ProjectConsoleURL}}/instancesDetail/zones/{{.Conf.Zone}}/instances/camlistore-server" > camlistore - server instance < / a > page . Set camlistore - username and / or camlistore - password in the custom metadata section . Then < a href = "https://{{.InstanceIP}}/status" > restart < / a > Camlistore .
2015-01-19 15:23:46 +00:00
< / p >
2015-02-02 14:11:22 +00:00
2015-01-19 15:23:46 +00:00
< p >
2015-12-07 17:09:11 +00:00
If you want to use your own HTTPS certificate and key , go to < a href = "https://console.developers.google.com/project/{{.Conf.Project}}/storage/browser/{{.Conf.Project}}-camlistore/config/" > the storage browser < / a > . Delete "<b>` + certFilename() + `</b>" , "<b>` + keyFilename() + `</b>" , and replace them by uploading your own files ( with the same names ) . Then < a href = "https://{{.InstanceIP}}/status" > restart < / a > Camlistore .
2015-01-19 15:23:46 +00:00
< / p >
2015-02-02 14:11:22 +00:00
2015-12-27 21:52:35 +00:00
< p > Camlistore should not require system
administration but to manage / add SSH keys , go to the < a
href = "{{.ProjectConsoleURL}}/instancesDetail/zones/{{.Conf.Zone}}/instances/camlistore-server" > camlistore - server
instance < / a > page . Scroll down to the SSH Keys section . Note that the
machine can be deleted or wiped at any time without losing
information . All state is stored in Cloud Storage . The index , however ,
is stored in MySQL on the instance . The index can be rebuilt if lost
or corrupted . < / p >
2015-01-23 19:30:33 +00:00
< / p >
2015-01-19 15:23:46 +00:00
{ { end } }
{ { if . Err } }
2015-12-28 02:43:17 +00:00
< p style = "color:red" > < b > Error : < / b > { { . Err } } < / p >
2015-01-19 15:23:46 +00:00
{ { range $ hint := . Hints } }
< p style = "color:red" > { { $ hint } } < / p >
{ { end } }
{ { end } }
{ { end } }
{ { define "withform" } }
< html >
{ { template "header" . } }
< body >
{ { if . InstanceKey } }
< div style = "z-index:0; -webkit-filter: blur(5px);" >
{ { end } }
{ { template "banner" . } }
{ { template "toplinks" . } }
{ { template "progress" . } }
{ { template "messages" . } }
< form method = "post" enctype = "multipart/form-data" >
< input type = ' hidden ' name = "mode" value = "setupproject" >
2015-12-28 02:43:17 +00:00
< h3 > Deploy Camlistore < / h3 >
< p > This tool creates your own private
Camlistore instance running on < a
href = "https://cloud.google.com/" > Google Cloud Platform < / a > . Be sure to
understand < a
href = "https://cloud.google.com/compute/pricing#machinetype" > Compute Engine pricing < / a >
and
< a href = "https://cloud.google.com/storage/pricing" > Cloud Storage pricing < / a >
before proceeding . Note that Camlistore metadata adds overhead on top of the size
of any raw data added to your instance . To delete your
instance and stop paying Google for the virtual machine , visit the < a
href = "https://console.developers.google.com/" > Google Cloud console < / a >
2015-12-28 02:44:59 +00:00
and visit both the "Compute Engine" and "Storage" sections for your project .
< / p >
2015-12-28 02:43:17 +00:00
< table border = 0 cellpadding = 3 style = ' margin - top : 2 em ' >
< tr valign = top > < td align = right > < nobr > Google Project ID : < / nobr > < / td > < td margin = left > < input name = "project" size = 30 value = "" > < br >
2015-01-30 16:34:52 +00:00
< ul style = "padding-left:0;margin-left:0;font-size:75%" >
2015-12-28 02:43:17 +00:00
< li > Select a < a href = "https://console.developers.google.com/project" > Google Project < / a > in which to create the VM . If it doesn ' t already exist , < a href = "https://console.developers.google.com/project" > create it < / a > first before using this Camlistore creation tool . < / li >
2015-01-30 16:34:52 +00:00
< li > Requirements : < / li >
< ul >
< li > Enable billing . ( Billing & settings ) < / li >
< li > APIs and auth & gt APIs & gt Google Cloud Storage < / li >
< li > APIs and auth & gt APIs & gt Google Cloud Storage JSON API < / li >
< li > APIs and auth & gt APIs & gt Google Compute Engine < / li >
2015-08-24 22:30:30 +00:00
< li > APIs and auth & gt APIs & gt Google Cloud Logging API < / li >
2015-01-30 16:34:52 +00:00
< / ul >
< / ul >
< / td > < / tr >
2015-12-28 02:43:17 +00:00
< tr valign = top >
< td align = right > < nobr > Password : < / nobr > < / td >
< td > < input name = "password" size = 30 > < br / >
< span style = "font-size:75%" > < i > ( Optional ) < / i > New password for your Camlistore server ' s < b > camlistore < / b > user . < b > NOT < / b > your Google account ' s password . If blank , a random password is generated and instructions for finding it are provided on the next step . < / span >
< / td > < / tr >
< tr valign = top > < td align = right > < nobr > < a href = "{{.Help.zones}}" > Zone < / a > or Region < / nobr > : < / td > < td >
2015-12-28 23:15:11 +00:00
< input name = "zone" list = "regions" value = "` + DefaultRegion + `" >
2015-02-11 21:50:21 +00:00
< datalist id = "regions" >
2015-01-30 16:34:52 +00:00
{ { range $ k , $ v := . ZoneValues } }
< option value = { { $ v } } > { { $ v } } < / option >
{ { end } }
2015-12-28 02:43:17 +00:00
< / datalist > < br / > < span style = "font-size:75%" > If a region is specified , a random zone ( - a , - b , - c , etc ) in that region will be selected . < / span >
2015-01-30 16:34:52 +00:00
< / td > < / tr >
2015-12-28 02:43:17 +00:00
< tr valign = top > < td align = right > < a href = "{{.Help.machineTypes}}" > Machine type < / a > : < / td > < td >
2015-01-30 16:34:52 +00:00
< input name = "machine" list = "machines" value = "g1-small" >
< datalist id = "machines" >
{ { range $ k , $ v := . MachineValues } }
< option value = { { $ v } } > { { $ v } } < / option >
{ { end } }
2015-12-28 02:43:17 +00:00
< / datalist > < br / > < span style = "font-size:75%" > As of 2015 - 12 - 27 , a g1 - small is $ 13.88 ( USD ) per month , before storage usage charges . See < a href = "https://cloud.google.com/compute/pricing#machinetype" > current pricing < / a > . < / span >
2015-01-30 16:34:52 +00:00
< / td > < / tr >
2015-12-28 02:43:17 +00:00
< tr > < td > < / td > < td > < input type = ' submit ' value = "Create instance" style = ' background : # ffdb00 ; padding : 0.5 em ; font - weight : bold ' > < br > < span style = "font-size:75%" > ( it will ask for permissions ) < / span > < / td > < / tr >
2015-01-19 15:23:46 +00:00
< / table >
< / form >
< / div >
{ { template "footer" . } }
{ { if . InstanceKey } }
< / div >
{ { end } }
< / body >
< / html >
{ { end } }
{ { define "noform" } }
< html >
{ { template "header" . } }
< body >
{ { if . InstanceKey } }
< div style = "z-index:0; -webkit-filter: blur(5px);" >
{ { end } }
{ { template "banner" . } }
{ { template "toplinks" . } }
{ { template "progress" . } }
{ { template "messages" . } }
{ { template "footer" . } }
{ { if . InstanceKey } }
< / div >
{ { end } }
< / body >
< / html >
{ { end } }
`
2015-12-07 17:09:11 +00:00
}
2015-12-28 23:15:11 +00:00
// TODO(bradfitz,mpl): move this to go4.org/cloud/google/gceutil
func ZonesOfRegion ( hc * http . Client , project , region string ) ( zones [ ] string , err error ) {
s , err := compute . New ( hc )
if err != nil {
return nil , err
}
zl , err := compute . NewZonesService ( s ) . List ( project ) . Do ( )
if err != nil {
return nil , fmt . Errorf ( "could not get a list of zones: %v" , err )
}
if zl . NextPageToken != "" {
return nil , errors . New ( "TODO: more than one page of zones found; use NextPageToken" )
}
for _ , z := range zl . Items {
if path . Base ( z . Region ) != region {
continue
}
zones = append ( zones , z . Name )
}
return zones , nil
}