2023-04-10 15:36:59 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2022-06-07 14:18:19 +00:00
|
|
|
package allocrunner
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/hashicorp/nomad/client/allocrunner/interfaces"
|
|
|
|
"github.com/hashicorp/nomad/client/serviceregistration/checks"
|
|
|
|
"github.com/hashicorp/nomad/client/serviceregistration/checks/checkstore"
|
2023-10-04 14:31:59 +00:00
|
|
|
"github.com/hashicorp/nomad/client/taskenv"
|
2022-06-07 14:18:19 +00:00
|
|
|
"github.com/hashicorp/nomad/helper"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// checksHookName is the name of this hook as appears in logs
|
|
|
|
checksHookName = "checks_hook"
|
|
|
|
)
|
|
|
|
|
|
|
|
// observers maintains a map from check_id -> observer for a particular check. Each
|
|
|
|
// observer in the map must share the same context.
|
|
|
|
type observers map[structs.CheckID]*observer
|
|
|
|
|
|
|
|
// An observer is used to execute a particular check on its interval and update the
|
|
|
|
// check store with those results.
|
|
|
|
type observer struct {
|
|
|
|
ctx context.Context
|
|
|
|
cancel context.CancelFunc
|
|
|
|
checker checks.Checker
|
|
|
|
checkStore checkstore.Shim
|
|
|
|
|
|
|
|
qc *checks.QueryContext
|
|
|
|
check *structs.ServiceCheck
|
|
|
|
allocID string
|
|
|
|
}
|
|
|
|
|
|
|
|
// start checking our check on its interval
|
|
|
|
func (o *observer) start() {
|
|
|
|
// compromise between immediate (too early) and waiting full interval (slow)
|
|
|
|
firstWait := o.check.Interval / 2
|
|
|
|
|
|
|
|
timer, cancel := helper.NewSafeTimer(firstWait)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
|
|
|
|
// exit the observer
|
|
|
|
case <-o.ctx.Done():
|
|
|
|
return
|
|
|
|
|
|
|
|
// time to execute the check
|
|
|
|
case <-timer.C:
|
|
|
|
query := checks.GetCheckQuery(o.check)
|
|
|
|
result := o.checker.Do(o.ctx, o.qc, query)
|
|
|
|
|
2022-07-21 14:54:27 +00:00
|
|
|
// and put the results into the store (already logged)
|
2022-06-07 14:18:19 +00:00
|
|
|
_ = o.checkStore.Set(o.allocID, result)
|
|
|
|
|
|
|
|
// setup timer for next interval
|
|
|
|
timer.Reset(o.check.Interval)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// stop checking our check - this will also interrupt an in-progress execution
|
|
|
|
func (o *observer) stop() {
|
|
|
|
o.cancel()
|
|
|
|
}
|
|
|
|
|
|
|
|
// checksHook manages checks of Nomad service registrations, at both the group and
|
|
|
|
// task level, by storing / removing them from the Client state store.
|
|
|
|
//
|
|
|
|
// Does not manage Consul service checks; see groupServiceHook instead.
|
|
|
|
type checksHook struct {
|
|
|
|
logger hclog.Logger
|
|
|
|
network structs.NetworkStatus
|
|
|
|
shim checkstore.Shim
|
|
|
|
checker checks.Checker
|
|
|
|
allocID string
|
2023-10-04 14:31:59 +00:00
|
|
|
taskEnv *taskenv.TaskEnv
|
2022-06-07 14:18:19 +00:00
|
|
|
|
|
|
|
// fields that get re-initialized on allocation update
|
|
|
|
lock sync.RWMutex
|
|
|
|
ctx context.Context
|
|
|
|
stop func()
|
|
|
|
observers observers
|
|
|
|
alloc *structs.Allocation
|
|
|
|
}
|
|
|
|
|
|
|
|
func newChecksHook(
|
|
|
|
logger hclog.Logger,
|
|
|
|
alloc *structs.Allocation,
|
|
|
|
shim checkstore.Shim,
|
|
|
|
network structs.NetworkStatus,
|
2023-10-04 14:31:59 +00:00
|
|
|
taskEnv *taskenv.TaskEnv,
|
2022-06-07 14:18:19 +00:00
|
|
|
) *checksHook {
|
|
|
|
h := &checksHook{
|
|
|
|
logger: logger.Named(checksHookName),
|
|
|
|
allocID: alloc.ID,
|
|
|
|
alloc: alloc,
|
|
|
|
shim: shim,
|
|
|
|
network: network,
|
|
|
|
checker: checks.New(logger),
|
2023-10-04 14:31:59 +00:00
|
|
|
taskEnv: taskEnv,
|
2022-06-07 14:18:19 +00:00
|
|
|
}
|
|
|
|
h.initialize(alloc)
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
|
|
|
// initialize the dynamic fields of checksHook, which is to say setup all the
|
|
|
|
// observers and query context things associated with the alloc.
|
|
|
|
//
|
|
|
|
// Should be called during initial setup only.
|
|
|
|
func (h *checksHook) initialize(alloc *structs.Allocation) {
|
|
|
|
h.lock.Lock()
|
|
|
|
defer h.lock.Unlock()
|
|
|
|
|
|
|
|
tg := alloc.Job.LookupTaskGroup(alloc.TaskGroup)
|
|
|
|
if tg == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// fresh context and stop function for this allocation
|
|
|
|
h.ctx, h.stop = context.WithCancel(context.Background())
|
|
|
|
|
|
|
|
// fresh set of observers
|
|
|
|
h.observers = make(observers)
|
|
|
|
|
|
|
|
// set the initial alloc
|
|
|
|
h.alloc = alloc
|
|
|
|
}
|
|
|
|
|
|
|
|
// observe will create the observer for each service in services.
|
|
|
|
// services must use only nomad service provider.
|
|
|
|
//
|
|
|
|
// Caller must hold h.lock.
|
|
|
|
func (h *checksHook) observe(alloc *structs.Allocation, services []*structs.Service) {
|
|
|
|
var ports structs.AllocatedPorts
|
|
|
|
var networks structs.Networks
|
|
|
|
if alloc.AllocatedResources != nil {
|
|
|
|
ports = alloc.AllocatedResources.Shared.Ports
|
|
|
|
networks = alloc.AllocatedResources.Shared.Networks
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, service := range services {
|
|
|
|
for _, check := range service.Checks {
|
|
|
|
|
|
|
|
// remember the initialization time
|
|
|
|
now := time.Now().UTC().Unix()
|
|
|
|
|
|
|
|
// create the deterministic check id for this check
|
|
|
|
id := structs.NomadCheckID(alloc.ID, alloc.TaskGroup, check)
|
|
|
|
|
|
|
|
// an observer for this check already exists
|
|
|
|
if _, exists := h.observers[id]; exists {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(h.ctx)
|
|
|
|
|
|
|
|
// create the observer for this check
|
|
|
|
h.observers[id] = &observer{
|
|
|
|
ctx: ctx,
|
|
|
|
cancel: cancel,
|
|
|
|
check: check.Copy(),
|
|
|
|
checkStore: h.shim,
|
|
|
|
checker: h.checker,
|
|
|
|
allocID: h.allocID,
|
|
|
|
qc: &checks.QueryContext{
|
|
|
|
ID: id,
|
|
|
|
CustomAddress: service.Address,
|
|
|
|
ServicePortLabel: service.PortLabel,
|
|
|
|
Ports: ports,
|
|
|
|
Networks: networks,
|
|
|
|
NetworkStatus: h.network,
|
|
|
|
Group: alloc.Name,
|
|
|
|
Task: service.TaskName,
|
|
|
|
Service: service.Name,
|
|
|
|
Check: check.Name,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// insert a pending result into state store for each check
|
|
|
|
result := checks.Stub(id, structs.GetCheckMode(check), now, alloc.Name, service.TaskName, service.Name, check.Name)
|
|
|
|
if err := h.shim.Set(h.allocID, result); err != nil {
|
|
|
|
h.logger.Error("failed to set initial check status", "id", h.allocID, "error", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// start the observer
|
|
|
|
go h.observers[id].start()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *checksHook) Name() string {
|
|
|
|
return checksHookName
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *checksHook) Prerun() error {
|
|
|
|
h.lock.Lock()
|
|
|
|
defer h.lock.Unlock()
|
|
|
|
|
|
|
|
group := h.alloc.Job.LookupTaskGroup(h.alloc.TaskGroup)
|
|
|
|
if group == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-10-04 14:31:59 +00:00
|
|
|
interpolatedServices := taskenv.InterpolateServices(h.taskEnv, group.NomadServices())
|
|
|
|
|
2022-06-07 14:18:19 +00:00
|
|
|
// create and start observers of nomad service checks in alloc
|
2023-10-04 14:31:59 +00:00
|
|
|
h.observe(h.alloc, interpolatedServices)
|
2022-06-07 14:18:19 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *checksHook) Update(request *interfaces.RunnerUpdateRequest) error {
|
|
|
|
h.lock.Lock()
|
|
|
|
defer h.lock.Unlock()
|
|
|
|
|
|
|
|
group := request.Alloc.Job.LookupTaskGroup(request.Alloc.TaskGroup)
|
|
|
|
if group == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// get all group and task level services using nomad provider
|
|
|
|
services := group.NomadServices()
|
|
|
|
|
|
|
|
// create a set of the updated set of checks
|
|
|
|
next := make([]structs.CheckID, 0, len(h.observers))
|
|
|
|
for _, service := range services {
|
|
|
|
for _, check := range service.Checks {
|
|
|
|
next = append(next, structs.NomadCheckID(
|
|
|
|
request.Alloc.ID,
|
|
|
|
request.Alloc.TaskGroup,
|
|
|
|
check,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// stop the observers of the checks we are removing
|
|
|
|
remove := h.shim.Difference(request.Alloc.ID, next)
|
|
|
|
for _, id := range remove {
|
|
|
|
h.observers[id].stop()
|
|
|
|
delete(h.observers, id)
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove checks that are no longer part of the allocation
|
|
|
|
if err := h.shim.Remove(request.Alloc.ID, remove); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// remember this new alloc
|
|
|
|
h.alloc = request.Alloc
|
|
|
|
|
|
|
|
// ensure we are observing new checks (idempotent)
|
|
|
|
h.observe(request.Alloc, services)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *checksHook) PreKill() {
|
|
|
|
h.lock.Lock()
|
|
|
|
defer h.lock.Unlock()
|
|
|
|
|
|
|
|
// terminate our hook context, which threads down to all observers
|
|
|
|
h.stop()
|
|
|
|
|
|
|
|
// purge all checks for this allocation from the client state store
|
|
|
|
if err := h.shim.Purge(h.allocID); err != nil {
|
|
|
|
h.logger.Error("failed to purge check results", "alloc_id", h.allocID, "error", err)
|
|
|
|
}
|
|
|
|
}
|