A cloud information discovery tool for EGI FedCloud
Project description
Cloud Information provider
The Cloud Information provider generates a representation of cloud resources following the GlueSchema representation.
The provider extracts information from a cloud deployment using public APIs and formats as a JSON.
Currently supported cloud middleware:
- OpenStack
Installation
Use pip:
pip install cloud-info-provider
From source
Source-based installation is not recommended for production usage, but it is
handy for testing or development purpose. Get the source by cloning this
repository and run with uv
uv run cloud-info-provider-service
Usage
cloud-info-provider-service <openstack authentication options> <site_config>
Site configuration
The cloud-info-provider uses a YAML file describe the basic information of the cloud site to represent. This file follows the specification in the fedcloud-catchall-operations for site descriptions:
---
gocdb: "<NAME OF THE SITE IN GOCDB>"
endpoint: "https://example.com:5000/v3"
# the images is ignored by the cloud-info-provider
images:
vos:
- name: "<VO name>"
auth:
project_id: "<project id for the VO>"
- name: ...
Middleware
Dynamic information is obtained with the middleware providers. Use the
--middleware option for specifying the provider to use (see the command help
for exact names).
Each dynamic provider has its own command-line options for specifying how to
connect to the underlying service. Use the --help option for a complete
listing of options.
OpenStack
The openstack provider require a working keystone endpoint and valid
credentials to access that endpoint. It uses
keystoneauth so any Keystone
authentication method available in that library can be used. The configured user
for authentication must be a member of every project configured in your shares.
Authentication options largely depend on the authentication method used, default
is username/password. For example, using OpenID Connect against a EGI Check-in
integrated endpoint:
cloud-info-provider-service --middleware openstack \
--os-auth-type v3oidcaccesstoken \
--os-identity-provider egi.eu --os-protocol oidc \
--os-access-token $ACCESS_TOKEN \
--os-auth-url https://<keystone-endpoint>:5000/v3
Other extra options for the providers (defaults should be OK):
-
--select-flavors {all,public,private}Select all (default),publicorprivateflavors. For more details see OpenStack flavors documentation. -
--all-imagesIf set, include information about all images (including snapshots), otherwise only publish images with EGI registry metadata, ignoring the others.
Support for specialized hardware (GPU & InfiniBand) through OpenStack properties
The openstack provider is able to gather additional GPU and InfiniBand
information made available through flavor's and image's metadata. To this end,
this provider allows passing CLI options (--property-*) to match the metadata
keys. As an example, the option --property-flavor-gpu-vendor gpu:vendor will
seek for gpu-vendor key in the flavor definition (properties field), while
--property-image-gpu-driver gpu:driver:version will fetch the value associated
with the gpu:driver:version key in the list of images obtained.
For the InfiniBand case, there is an additional option
(--property-flavor-infiniband-value) that also checks the value obtained from
the metadata. Only if they match, InfiniBand is considered as supported.
Use the --help option for the whole list of available GPU and InfiniBand
properties.
CAs
The provider will use your python default CAs for checking and connecting to
your endpoints and GOCDB, so please make sure those CAs include the IGTF CAs.
The location of the CAs depending on how you installed the different python
packages (using deb/rpm packages or pip).
For debian-based systems (e.g. Ubuntu), use the following:
cd /usr/local/share/ca-certificates
for f in /etc/grid-security/certificates/*.pem ; do
ln -s $f $(basename $f .pem).crt
done
update-ca-certificates
For RH-based systems (e.g. CentOS), you can include the IGTF CAs with:
cd /etc/pki/ca-trust/source/anchors
ln -s /etc/grid-security/certificates/*.pem .
update-ca-trust extract
Otherwise, you need to add the IGTF CAs to the internal requests bundle:
cat /etc/grid-security/certificates/*.pem >> $(python -m requests.certs)
Creating releases
- Create a PR to update the changelog to reflect the changes since last version
and any other needed changes for the release
- Version should follow SemVer like 0.42.0
- Once merged, create a release with a tag
vX.Y.Z, fill in as description of the release the changelog. As soon as the tag is pushed to the repository, packages will be available at GitHub.
Acknowledgement
This work received funding from the EOSC-hub project (Horizon 2020) under Grant number 777536.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cloud_info_provider-1.1.0.tar.gz.
File metadata
- Download URL: cloud_info_provider-1.1.0.tar.gz
- Upload date:
- Size: 129.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
439fb260501daba75691bc4c4131a8e7f0f75a3f9df978ef0c136d39e7fecac5
|
|
| MD5 |
bc1ea4ccccbe3ad4e3cb2bc2dc3aad3f
|
|
| BLAKE2b-256 |
75bdb5ea54f2276411568b88fd4bb3304741f59fb02821eacdea6e9f427988b8
|
Provenance
The following attestation bundles were made for cloud_info_provider-1.1.0.tar.gz:
Publisher:
publish.yml on EGI-Federation/cloud-info-provider
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cloud_info_provider-1.1.0.tar.gz -
Subject digest:
439fb260501daba75691bc4c4131a8e7f0f75a3f9df978ef0c136d39e7fecac5 - Sigstore transparency entry: 1205752732
- Sigstore integration time:
-
Permalink:
EGI-Federation/cloud-info-provider@3f9712db945b97043eadde90733e549fffffd4e0 -
Branch / Tag:
refs/tags/v1.1.0 - Owner: https://github.com/EGI-Federation
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@3f9712db945b97043eadde90733e549fffffd4e0 -
Trigger Event:
push
-
Statement type:
File details
Details for the file cloud_info_provider-1.1.0-py3-none-any.whl.
File metadata
- Download URL: cloud_info_provider-1.1.0-py3-none-any.whl
- Upload date:
- Size: 36.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
aa49a1f707db0972a7b7dca9c4226dabb003705574741d5fcb31730593fe85de
|
|
| MD5 |
3ae4866656324f2f5b46a4160456a684
|
|
| BLAKE2b-256 |
9dde26a2657298178f3935fc03c0d3abdfe15365107147275f991b1da7127c9a
|
Provenance
The following attestation bundles were made for cloud_info_provider-1.1.0-py3-none-any.whl:
Publisher:
publish.yml on EGI-Federation/cloud-info-provider
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cloud_info_provider-1.1.0-py3-none-any.whl -
Subject digest:
aa49a1f707db0972a7b7dca9c4226dabb003705574741d5fcb31730593fe85de - Sigstore transparency entry: 1205752752
- Sigstore integration time:
-
Permalink:
EGI-Federation/cloud-info-provider@3f9712db945b97043eadde90733e549fffffd4e0 -
Branch / Tag:
refs/tags/v1.1.0 - Owner: https://github.com/EGI-Federation
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@3f9712db945b97043eadde90733e549fffffd4e0 -
Trigger Event:
push
-
Statement type: