forked from wrenn/wrenn
Replaces the hardcoded CP_HOST_AGENT_ADDR single-agent setup with a DB-driven registration system supporting multiple host agents (BYOC). Key changes: - Host agents register via one-time token, receive a 7-day JWT + 60-day refresh token; heartbeat loop auto-refreshes on 401/403 and pauses all sandboxes if refresh fails - HostClientPool: lazy Connect RPC client cache keyed by host ID, replacing the single static agent client throughout the API and service layers - RoundRobinScheduler: picks an online host for each new sandbox via ListActiveHosts; extensible for future scheduling strategies - HostMonitor (replaces Reconciler): passive heartbeat staleness check marks hosts unreachable and sandboxes missing after 90s; active reconciliation per online host restores missing-but-alive sandboxes and stops orphans - Graceful host delete: returns 409 with affected sandbox list without ?force=true; force-delete destroys sandboxes then evicts pool client - Snapshot delete broadcasts to all online hosts (templates have no host_id) - sandbox.Manager.PauseAll: pauses all running VMs on CP connectivity loss - New migration: host_refresh_tokens table with token rotation (issue-then- revoke ordering to prevent lockout on mid-rotation crash) - New sandbox status 'missing' (reversible, unlike 'stopped') and host status 'unreachable'; both reflected in OpenAPI spec - Fix: refresh token auth failure now returns 401 (was 400 via generic 'invalid' substring match in serviceErrToHTTP)
84 lines
2.2 KiB
Go
84 lines
2.2 KiB
Go
package id
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"fmt"
|
|
)
|
|
|
|
func hex8() string {
|
|
b := make([]byte, 4)
|
|
if _, err := rand.Read(b); err != nil {
|
|
panic(fmt.Sprintf("crypto/rand failed: %v", err))
|
|
}
|
|
return hex.EncodeToString(b)
|
|
}
|
|
|
|
// NewSandboxID generates a new sandbox ID in the format "sb-" + 8 hex chars.
|
|
func NewSandboxID() string {
|
|
return "sb-" + hex8()
|
|
}
|
|
|
|
// NewSnapshotName generates a snapshot name in the format "template-" + 8 hex chars.
|
|
func NewSnapshotName() string {
|
|
return "template-" + hex8()
|
|
}
|
|
|
|
// NewUserID generates a new user ID in the format "usr-" + 8 hex chars.
|
|
func NewUserID() string {
|
|
return "usr-" + hex8()
|
|
}
|
|
|
|
// NewTeamID generates a new team ID in the format "team-" + 8 hex chars.
|
|
func NewTeamID() string {
|
|
return "team-" + hex8()
|
|
}
|
|
|
|
// NewTeamSlug generates a unique team slug in the format "xxxxxx-yyyyyy"
|
|
// where each part is 3 random bytes encoded as hex (6 hex chars each).
|
|
func NewTeamSlug() string {
|
|
b := make([]byte, 6)
|
|
if _, err := rand.Read(b); err != nil {
|
|
panic(fmt.Sprintf("crypto/rand failed: %v", err))
|
|
}
|
|
return hex.EncodeToString(b[:3]) + "-" + hex.EncodeToString(b[3:])
|
|
}
|
|
|
|
// NewAPIKeyID generates a new API key ID in the format "key-" + 8 hex chars.
|
|
func NewAPIKeyID() string {
|
|
return "key-" + hex8()
|
|
}
|
|
|
|
// NewHostID generates a new host ID in the format "host-" + 8 hex chars.
|
|
func NewHostID() string {
|
|
return "host-" + hex8()
|
|
}
|
|
|
|
// NewHostTokenID generates a new host token audit ID in the format "htok-" + 8 hex chars.
|
|
func NewHostTokenID() string {
|
|
return "htok-" + hex8()
|
|
}
|
|
|
|
// NewRegistrationToken generates a 64-char hex token (32 bytes of entropy).
|
|
func NewRegistrationToken() string {
|
|
b := make([]byte, 32)
|
|
if _, err := rand.Read(b); err != nil {
|
|
panic(fmt.Sprintf("crypto/rand failed: %v", err))
|
|
}
|
|
return hex.EncodeToString(b)
|
|
}
|
|
|
|
// NewRefreshTokenID generates a new refresh token record ID in the format "hrt-" + 8 hex chars.
|
|
func NewRefreshTokenID() string {
|
|
return "hrt-" + hex8()
|
|
}
|
|
|
|
// NewRefreshToken generates a 64-char hex token (32 bytes of entropy) for use as a host refresh token.
|
|
func NewRefreshToken() string {
|
|
b := make([]byte, 32)
|
|
if _, err := rand.Read(b); err != nil {
|
|
panic(fmt.Sprintf("crypto/rand failed: %v", err))
|
|
}
|
|
return hex.EncodeToString(b)
|
|
}
|