A 10-hour challenge.
Problem: Design and implement a microservice that interacts with a major cloud provider's API (AWS, Azure, or GCP) to automate the provisioning of compute resources (It could be VMs, K8s clusters, Functions, etc.). The microservice should:
- Securely authenticate with the cloud provider using appropriate credentials and authentication mechanisms.
- Receive requests to create and manage compute resources through OSB APIs (Open Service Broker API).
- Translate OSB API requests into the specific API calls required by the chosen cloud provider.
- Provision the requested compute resources on the cloud platform.
- Expose OSB API endpoints for:
- Provisioning new instances
- Deprovisioning (deleting) instances
- Binding services (e.g., associating storage or networking)
- Unbinding services
- Managing instance lifecycle (start, stop, restart)
Technical Considerations:
- Language: Java or C#
- Cloud Provider: Your choice (AWS, Azure, or GCP)
- API Framework: Your choice (Spring Boot, Micronaut, etc.)
- API Specification: OSB APIs (v2.15 or later)
- Bonus Points:
- Include unit and integration tests
- Demonstrate clean code principles (SOLID, DRY)
- Use modern patterns and best practices
- Focus on production-ready code quality
- Consider error handling, scalability, and security
Deliverables:
- Public Repository: Please create a public GitHub (or similar) repository containing your source code.
- Documentation: Include a README (or separate document) that details your design choices, the technologies used, how to run the microservice, and any assumptions made. Also, include clear instructions on how to interact with your OSB API endpoints.
Timeframe: You have a total of 10 hours to complete this challenge.
This microservice implements a simple Cloud Service Broker exposing an Open Service Broker API (OSB API) compliant interface. It allows provisioning and managing of virtual machines (VMs) using Amazon Web Services (AWS) as the underlying infrastructure provider, however it is designed to be capable of being easily extended by implementing the appropriate classes for other cloud providers.
- OSB API Compliance: The API surface tries to strictly adhere to the OSB API specification. Since this is a 10-hour challenge, only a small part of the specification is implemented.
- Layered Architecture:
- API: Exposes RESTful endpoints according to OSB API spec using ASP.NET controllers.
- Abstractions: Defines common interfaces for different cloud providers and
exceptions (
IVmInstanceService
,InvalidConfigurationException
,ServiceInstanceException
). - Infrastructure: Provides implementations of OSB-related services (like
OsbService
) and general classes used by the microservice, like anExceptionHandlerMiddleware
. - Specific implementations: Provides infrastructure-specific logic for interfacing with cloud provider APIs
(
AwsVmInstanceService
).
- Dependency Injection: Leverages the .NET Core DI framework to decouple components, improving testability and making the microservice composable by design.
- AWS Integration: Employs the AWS SDK for .NET to interact with the EC2 service for managing VM instances.
- Error handling: Minimal error handling is implemented for Provisioning and Fetching at the AWS implementation level. This choice has been made to demonstrate some logic of error translation between provider-specific (AWS) errors and platform-generic errors.
- Unit tests: the whole project has been implemented in TDD: this results in a nearly-100% coverage.
- .NET 8: Backend framework
- ASP.NET Core: Framework for building web APIs
- Swagger/OpenAPI: API documentation (access
/swagger
endpoint once running) - AWS SDK for .NET: AWS API integration
- Moq: Unit testing library
- FluentAssertions: Assertion library to improve readability of tests
- AutoFixture: Library to simplify the creation of test data
- The service is stateless, relying on passed identifiers like
instanceId
. In a production-ready system, this would be backed by persistent storage to manage instance state and mapping between internal resource identifiers and the service instance ID provided by the OSB client. - Only a subset of the OSB API is implemented (Provision, Deprovision, Fetch).
- Only AWS is supported as a backing infrastructure provider.
- Minimal error handling
- The service catalog reads available services from
appsettings.json
, but in a real-world application a more elaborated implementation (such as a database-backed catalog) should be considered. - No integration tests or live tests were performed. I don't have a billed AWS account available... :)
- No logging has been implemented. Obviously logging is an important part of a production-ready application, but for a 10-hour challenge I didn't want to spend time including it.
- Authentication is not implemented for this demo but should be considered for production (API key, OAuth2, etc.).
- Prerequisites:
- .NET 8 SDK
- AWS Credentials: Properly configure access key, secret key and region either through environment variables, or in
the
appsettings.json
file in theAwsConfiguration
section:{ "AwsConfiguration": { "AccessKey": "your-access-key", "SecretKey": "your-secret-key", "Region": "your-region" } }
- Building the Project:
dotnet build
- Running the Microservice:
dotnet run --launch-profile https --project FractalishMicroservice.App
- Prerequisites:
- Docker
- AWS Credentials: Properly passed to the container through environment variables:
AwsConfiguration__AccessKey="your-access-key" AwsConfiguration__SecretKey="your-access-key" AwsConfiguration__Region="your-region"
- Building the Project:
In the root directory of the solution, run
docker build -f FractalishMicroservice.App/Dockerfile .
- Running the Microservice:
- Run the just-created container image and make sure to pass the AwsConfiguration environment variables.
Base URL: https://localhost:7048/v2/
(make sure to allow insecure connections in your browser if running it
locally), or whichever port you have mapped if running in a Docker container.
Authentication is not implemented for this demo but should be considered for production.
Retrieve the service catalog to determine available service offerings and plans. This should be done by the platform
(eg: your marketplace) before attempting to create any instance. At the moment, the service catalog reads available
services from appsettings.json
, but in a real-world application a more elaborated implementation (such as a
database-backed catalog) should be considered.
GET /v2/catalog
Example Response:
{
"services": [
{
"id": "example-service-offering-1",
"name": "Example Service Offering 1",
"description": "A very simple offering",
"bindable": true,
"plans": [
{
"id": "example-plan-1",
"name": "Basic Plan",
"description": "Basic service plan with limited resources."
},
{
"id": "example-plan-2",
"name": "Premium Plan",
"description": "Premium service plan with more resources."
}
]
}
]
}
Request Body Parameters:
instance_id
: (path) A GUID identifying the service instance. This is provided by the client.service_id
: The ID of the service from the catalog (e.g., "example-service-id").plan_id
: The ID of the plan to provision (e.g., "example-plan-id").organization_guid
: An ID representing the owning organization.space_guid
: An ID representing the target space within an organization.
Example Request:
PUT /v2/service_instances/your-instance-guid-here
Content-Type: application/json
{
"service_id": "example-service-id",
"plan_id": "example-plan-id",
"organization_guid": "your-org-guid",
"space_guid": "your-space-guid"
}
Response:
200 OK
Content-Type: application/json
{
"operation": "your-created-vm-instance-id" // In this demo, this is the created AWS instance ID. In a real-world
// scenario this should be a platform-generate unique ID representing
// the running asyncronous operation.
}
Remarks
In this demo, since the catalog is mocked in appsettings.json
, no checks are performed on instance_id
and
plan_id
and they should correspond to VM images and plans available for the AWS account used.
Deprovision an instance.
Request:
DELETE /v2/service_instances/your-instance-guid-here
instance_id
: (path) A GUID identifying the service instance.
Response:
200 OK
Remarks
instance_id
should be the ID provided by the client when provisioning, however in this demo this is the AWS instance
ID.
Retrieve the state and other relevant information for a provisioned instance.
Request:
GET /v2/service_instances/your-instance-guid-here
instance_id
: (path) A GUID identifying the service instance. This should be the ID provided by the client when provisioning, however in this demo this is the AWS instance ID.
Response:
{
"service_id": "example-service-id",
"plan_id": "example-plan-id",
"parameters": {
"state": "Running"
}
}
Remarks
In this demo, some response data is mocked.