Welcome, guest | Sign In | My Account | Store | Cart

Notice! PyPM is being replaced with the ActiveState Platform, which enhances PyPM’s build and deploy capabilities. Create your free Platform account to download ActivePython or customize Python with the packages you require and get automatic updates.

Download
ActivePython
INSTALL>
pypm install inqbus.ocf.agents

How to install inqbus.ocf.agents

  1. Download and install ActivePython
  2. Open Command Prompt
  3. Type pypm install inqbus.ocf.agents
 Python 2.7Python 3.2Python 3.3
Windows (32-bit)
Windows (64-bit)
Mac OS X (10.5+)
0.11 Available View build log
0.1 Available View build log
Linux (32-bit)
0.11 Available View build log
0.1 Available View build log
Linux (64-bit)
0.11 Available View build log
0.1 Available View build log
 
License
GPL
Lastest release
version 0.11 on Dec 5th, 2011

Overview

OCF compatible resource agent classes programmed in python. Usually OCF-Agents are written as unix shell-script. We are running lots of high avaible python processes which are controlled by pacemaker. Using shell for controlling Python processes feels awkward, so we builded a python integration framework for OCF compatible agents.

What do you get

This package gives you some generic OCF agent classes for PID controlled daemons:

  • pidagent
  • openvpn

based on the inqbus.ocf.generic framework.

The inqbus.ocf.generic framework keeps away from you the gory details you have to go into writing an OCF compatible resource agent. Powerfull base classes bring to you:

  • A good test coverage of the agent code (How to test a shell script?)
  • Support of the complete set of OCF exitcodes and their respective business logik
  • OCF Paramter classes for integer, string, etc. values
  • Predefined generic OCF handlers (meta-data, validate)
  • The generation of the XML meta data is done for you automagically
  • Easy addition of handlers for e.g. start/stop/status
  • Inheritance of resource agents: encapsulate agent business logic and share it among similiar reasource agents

Inqbus.ocf.agents in addition brings the following functionality

  • the business logic for controlling the PID file
  • checking for the running state of the PID
  • starting and stopping the daemon (with checking for zombies and staggered kill signals to bring a process really down if it has to die)
  • checking for the PID status

in the base class PIDBaseAgent.

What is missing

We did not implement any business logic for the actions:

  • notify
  • demote
  • promote
  • master/slave
  • reload

but inqbus.ocf.generic framework can represent any OCF action that is specified yet or in the future - just implement a handler for the desired action:

class MyAgent(Agent):

    def config(self):
        """
        Register my actions
        """
        self.handlers['notify'] = Handler(MyAgent.do_notify, 10)
        self.handlers['future'] = Handler(MyAgent.do_future, 10)

Implementation

The PIDAgent and Openvpn classes are derived from PIDBaseAgent with minimal programming efford:

from pidbaseagent import PIDBaseAgent
from inqbus.ocf.generic.parameter import OCFString

class PIDAgent(PIDBaseAgent):

    def add_params(self):
        self.add_parameter(OCFString("executable",
                            longdesc="Path to the executable",
                            shortdesc="executable",
                            required= True) )
        self.add_parameter(OCFString( "pid_file",
                            longdesc="Path to the pid file",
                            shortdesc="executable",
                            required= True) )

    def get_pid_file(self):
        """tell the base class to find the PID file in the parameter 'pid_file'"""
        return self.params.pid_file.value

    def get_executable(self):
        """tell the base class how to find the executable path in the parameter 'executable'"""
        return self.params.executable.value

def main():
    """Entry point for the reasource agent shellscript"""
    import sys
    PIDAgent().run(sys.argv)

if __name__ == "__main__" : main()
    """Entry point for the command line"""

To use the inqbus.ocf.agents agent classes you need to set only one symlink per agent class into your Pacemaker (or other OCF HA) system.

Building arbitrary resource agent classes e.g. for IP addresses is easy utilizing the inqbus.ocf.generic <http://pypi.python.org/inqbus.ocf.generic>_ framework.

Documentation

Note

The dokumentation is not uploaded to packages.python.org yet. Please stay tuned.

This file and the source files for openvpn and the PIDAgent classes serve as a simple introduction to inqbus.ocf.agents. For more in depth documentation on writing your own reasource agents with the inqbus.ocf framework, have a look at

Requirements

Python >=2.7 or Python 3.x

Installation

We recomment a buildout based installation into a virtual environment but you may install inqbus.ocf.agents via pip or easy_install as well.

Installation via buildout

Note

This installation guide asumes /opt/ocf as installation directory. Please adjust the installation directory to your needs.

Build a virtual environment:

:/opt$ virtualenv --no-site-packages ocf
:/opt$ cd ocf
:/opt/ocf$ source bin/activate
(ocf):/opt/ocf$

Install the make environment buildout and initialize it:

(ocf):/opt/ocf$ easy_install zc.buildout
(ocf):/opt/ocf$ ./bin/buildout init

Create a buildout.cfg:

[buildout]
parts = app
        pidagent
        openvpn

# Buildout directories to use.
eggs-directory          = eggs

###############################################################################
# Download links for packages
# -----------------------------------------------------------------------------
# Add additional egg download sources here.
# Note that pypi.propertyshelf.com and mypypi.inqbus.de require authentication.
find-links = http://mypypi.inqbus.de/privateEggs

###############################################################################
# Extensions
# -----------------------------------------------------------------------------
# Load several extensions.
extensions = lovely.buildouthttp

[app]
recipe = z3c.recipe.scripts
eggs = inqbus.ocf.agents
interpreter = python_ocf

[openvpn]
recipe = collective.recipe.template
output = ${buildout:directory}/bin/openvpn.sh
inline =
    #!/bin/bash
    ${buildout:directory}/../bin/python ${buildout:directory}/bin/openvpn $*
mode = 755

[pidagent]
recipe = collective.recipe.template
output = ${buildout:directory}/bin/pidagent.sh
inline =
    #!/bin/bash
    ${buildout:directory}/../bin/python ${buildout:directory}/bin/pidagent $*
mode = 755

run buildout to install the package:

(ocf):/opt/ocf$ ./bin/buildout

Note

There will be to executable files installed for each agent. E.g. for the openvpn agent:

openvpn
    A python console script, referencing the python interpreter with an
    appropriate python path.

openvpn.sh
    A bash console wrapper around the openvpn python console script.
    This is a tribute to pacemaker which calls the agent via the bash interpreter.
    These kind of wrapper scripts you have to use as agents for pacemaker.

Configuration

First check the installation:

(ocf):/opt/ocf$ ./bin/openvpn.sh
Usage: openvpn.py <start|validate-all|stop|monitor|meta-data>

Note

You have to identify the OCF agent location of your OS to proceed. On Debian the OCF agents live under:

/usr/lib/ocf/resource.d/

Also you are free to set a provider directory for the agents. Here we asume as provider name

inqbus

Integrating the openvpn agent class into Pacemaker:

:/opt/ocf$ cd /usr/lib/ocf/resource.d/
:/usr/lib/ocf/resource.d/$ mkdir inqbus
:/usr/lib/ocf/resource.d/$ cd inqbus
:/usr/lib/ocf/resource.d/inqbus$ ln -s /opt/ocf/bin/openvpn.sh .

Note

You may repeat this last line with other resource agent classes (also available yet: pidagent):

:/usr/lib/ocf/resource.d/inqbus$ ln -s /opt/ocf/bin/pidagent.sh .

Now the configuration is complete an you can use the OCF python resource agents as the others that came with heartbeat or pacemaker.

Running the tests

The test are formulated using the nose testing framework.

Note

Please be carefull running the tests! The tests will use the TEMP-Directory and create some files in there. More agressivly the tests will bring up unix-processes since the agents are intended to do exactly that thing. PIDagent will use the harmless dummy_daemon implementation of a NOOP unix daemon that comes with this package. The OpenVPN-Agent will try to start a true openvpn-instance at localhost:1194.

To run the tests you need the source code. There are two ways to obtain it.

  1. Clone the Mercurial repository from BitBucket:

    $ hg clone https://bitbucket.org/inqbus/inqbus.ocf.agents
    
  1. Download the package from PyPI and unpack it:

    $ wget http://pypi.python.org/packages/source/i/inqbus.ocf.agents/inqbus.ocf.agents-0.1.tar.gz
    $ tar xzvf inqbus.ocf.agents-0.1.tar.gz
    
Testing with buildout

The easiest way to test is with buildout:

$ ./bin/buildout
...
$ ./bin/nose --with-coverage
...
inqbus.ocf.agents.openvpn            91%
inqbus.ocf.agents.pidagent           83%
inqbus.ocf.agents.pidbaseagent       74%
inqbus.ocf.generic.agent             88%
inqbus.ocf.generic.container         100%
inqbus.ocf.generic.exits             84%
inqbus.ocf.generic.handlers          96%
inqbus.ocf.generic.parameter         83%

The test coverage is high. We includet the ocf-tester testcases in our test suite. Maximum testcoverage is only possible if running the tests as root since most of the tests are integration tests, which steer real unix daemons. In case of the openvpn agent a real openvpn instance is brought up.

Dispite the high level of testing there is still a portion of 10 to 26% of untested code. This code mainly attributes to the many plausability exits that are not easily tested. How should we test for a broken filesystem or a process that has become a zombie? If you think you have the answer to that questions, you are warmest welcome in the development team.

Testing with ocf-tester

Independently of the python tests pacemaker comes with the ocf-tester script. You may use the dummy_daemon that comes with inqbus.ocf.agents to test the pidagent:

:/opt/ocf/buildout$ ocf-tester -n test \
-o pid_file=/tmp/dummy_daemon.pid \
-o executable=./bin/dummy_daemon \
`pwd`/bin/pidagent.sh

Bugs and Issues

This software is work in progress. Please help us to improve it: https://bitbucket.org/inqbus/inqbus.ocf.agents

Please contact volker.jaenisch@inqbus.de if you have any question.

License

This software is licensed under the New BSD License. See the LICENSE.txt file in the top distribution directory for the full license text. Changelog =========

0.1 (unreleased)
  • Initial release
0.11 (bugfix-release)
  • added "cd to config dir" paramter for openvpn agent.
  • introduced ovpn_pid_dir paramter for openvpn agent.
  • fixed some flaws in README.txt
  • fixed that temporary files are deletetd from /tmp after tests

Subscribe to package updates

Last updated Dec 5th, 2011

Download Stats

Last month:1

What does the lock icon mean?

Builds marked with a lock icon are only available via PyPM to users with a current ActivePython Business Edition subscription.

Need custom builds or support?

ActivePython Enterprise Edition guarantees priority access to technical support, indemnification, expert consulting and quality-assured language builds.

Plan on re-distributing ActivePython?

Get re-distribution rights and eliminate legal risks with ActivePython OEM Edition.