open-nomad/command/job_run.go

303 lines
8.7 KiB
Go
Raw Normal View History

2015-09-16 01:22:51 +00:00
package command
import (
"encoding/json"
2015-09-16 01:22:51 +00:00
"fmt"
2016-08-17 23:49:05 +00:00
"os"
2016-06-08 23:48:02 +00:00
"regexp"
"strconv"
2015-09-16 01:22:51 +00:00
"strings"
2015-12-10 22:07:34 +00:00
"time"
2015-09-16 01:22:51 +00:00
"github.com/hashicorp/nomad/api"
2017-02-06 19:48:28 +00:00
"github.com/hashicorp/nomad/helper"
"github.com/posener/complete"
2015-09-16 01:22:51 +00:00
)
2016-06-08 23:48:02 +00:00
var (
// enforceIndexRegex is a regular expression which extracts the enforcement error
enforceIndexRegex = regexp.MustCompile(`\((Enforcing job modify index.*)\)`)
)
2018-03-21 00:37:28 +00:00
type JobRunCommand struct {
2015-09-16 01:22:51 +00:00
Meta
2016-08-16 10:49:14 +00:00
JobGetter
2015-09-16 01:22:51 +00:00
}
2018-03-21 00:37:28 +00:00
func (c *JobRunCommand) Help() string {
2015-09-16 01:22:51 +00:00
helpText := `
2018-03-21 00:37:28 +00:00
Usage: nomad job run [options] <path>
2018-03-21 00:46:24 +00:00
Alias: nomad run
2015-09-16 01:22:51 +00:00
2015-09-23 01:17:30 +00:00
Starts running a new job or updates an existing job using
the specification located at <path>. This is the main command
2015-09-23 01:17:30 +00:00
used to interact with Nomad.
2015-09-16 01:22:51 +00:00
If the supplied path is "-", the jobfile is read from stdin. Otherwise
2016-08-11 13:34:31 +00:00
it is read from the file at the supplied path or downloaded and
read from URL specified.
2015-09-18 04:09:34 +00:00
Upon successful job submission, this command will immediately
enter an interactive monitor. This is useful to watch Nomad's
internals make scheduling decisions and place the submitted work
onto nodes. The monitor will end once job placement is done. It
is safe to exit the monitor early using ctrl+c.
On successful job submission and scheduling, exit code 0 will be
returned. If there are job placement issues encountered
(unsatisfiable constraints, resource exhaustion, etc), then the
exit code will be 2. Any other errors, including client connection
issues or internal errors, are indicated by exit code 1.
If the job has specified the region, the -region flag and NOMAD_REGION
environment variable are overridden and the job's region is used.
The run command will set the consul_token of the job based on the following
precedence, going from highest to lowest: the -consul-token flag, the
$CONSUL_HTTP_TOKEN environment variable and finally the value in the job file.
2016-08-17 04:32:25 +00:00
The run command will set the vault_token of the job based on the following
precedence, going from highest to lowest: the -vault-token flag, the
$VAULT_TOKEN environment variable and finally the value in the job file.
2015-09-16 01:22:51 +00:00
General Options:
` + generalOptionsUsage() + `
Run Options:
2016-06-08 23:48:02 +00:00
-check-index
If set, the job is only registered or updated if the passed
2016-07-20 15:53:59 +00:00
job modify index matches the server side version. If a check-index value of
zero is passed, the job is only registered if it does not yet exist. If a
non-zero value is passed, it ensures that the job is being updated from a
known state. The use of this flag is most common in conjunction with plan
command.
2016-06-08 23:48:02 +00:00
2015-09-18 04:09:34 +00:00
-detach
2016-07-20 15:53:59 +00:00
Return immediately instead of entering monitor mode. After job submission,
the evaluation ID will be printed to the screen, which can be used to
examine the evaluation using the eval-status command.
2017-09-19 14:47:10 +00:00
-output
Output the JSON that would be submitted to the HTTP API without submitting
the job.
-policy-override
Sets the flag to force override any soft mandatory Sentinel policies.
-consul-token
If set, the passed Consul token is stored in the job before sending to the
Nomad servers. This allows passing the Consul token without storing it in
the job file. This overrides the token found in $CONSUL_HTTP_TOKEN environment
variable and that found in the job.
2016-08-17 04:32:25 +00:00
-vault-token
If set, the passed Vault token is stored in the job before sending to the
Nomad servers. This allows passing the Vault token without storing it in
the job file. This overrides the token found in $VAULT_TOKEN environment
variable and that found in the job.
2017-09-19 14:47:10 +00:00
-verbose
Display full information.
`
2015-09-16 01:22:51 +00:00
return strings.TrimSpace(helpText)
}
2018-03-21 00:37:28 +00:00
func (c *JobRunCommand) Synopsis() string {
2015-09-23 01:17:55 +00:00
return "Run a new job or update an existing job"
2015-09-16 01:22:51 +00:00
}
2018-03-21 00:37:28 +00:00
func (c *JobRunCommand) AutocompleteFlags() complete.Flags {
2017-08-23 21:56:21 +00:00
return mergeAutocompleteFlags(c.Meta.AutocompleteFlags(FlagSetClient),
complete.Flags{
2017-09-19 14:47:10 +00:00
"-check-index": complete.PredictNothing,
"-detach": complete.PredictNothing,
"-verbose": complete.PredictNothing,
"-consul-token": complete.PredictNothing,
2017-09-19 14:47:10 +00:00
"-vault-token": complete.PredictAnything,
"-output": complete.PredictNothing,
"-policy-override": complete.PredictNothing,
2017-08-23 21:56:21 +00:00
})
}
2018-03-21 00:37:28 +00:00
func (c *JobRunCommand) AutocompleteArgs() complete.Predictor {
return complete.PredictOr(complete.PredictFiles("*.nomad"), complete.PredictFiles("*.hcl"))
}
func (c *JobRunCommand) Name() string { return "job run" }
2018-03-21 00:37:28 +00:00
func (c *JobRunCommand) Run(args []string) int {
2017-09-19 14:47:10 +00:00
var detach, verbose, output, override bool
var checkIndexStr, consulToken, vaultToken string
flags := c.Meta.FlagSet(c.Name(), FlagSetClient)
2015-09-16 01:22:51 +00:00
flags.Usage = func() { c.Ui.Output(c.Help()) }
2015-09-18 04:09:34 +00:00
flags.BoolVar(&detach, "detach", false, "")
flags.BoolVar(&verbose, "verbose", false, "")
flags.BoolVar(&output, "output", false, "")
2017-09-19 14:47:10 +00:00
flags.BoolVar(&override, "policy-override", false, "")
2016-06-08 23:48:02 +00:00
flags.StringVar(&checkIndexStr, "check-index", "", "")
flags.StringVar(&consulToken, "consul-token", "", "")
2016-08-17 04:32:25 +00:00
flags.StringVar(&vaultToken, "vault-token", "", "")
2015-09-16 01:22:51 +00:00
if err := flags.Parse(args); err != nil {
return 1
}
// Truncate the id unless full length is requested
length := shortId
if verbose {
length = fullId
}
2016-07-21 10:40:47 +00:00
// Check that we got exactly one argument
2015-09-16 01:22:51 +00:00
args = flags.Args()
if len(args) != 1 {
c.Ui.Error("This command takes one argument: <path>")
c.Ui.Error(commandErrorText(c))
2016-08-10 14:30:19 +00:00
return 1
}
2016-08-10 14:30:19 +00:00
// Get Job struct from Jobfile
2017-02-06 19:48:28 +00:00
job, err := c.JobGetter.ApiJob(args[0])
2015-09-16 01:22:51 +00:00
if err != nil {
2016-08-10 14:30:19 +00:00
c.Ui.Error(fmt.Sprintf("Error getting job struct: %s", err))
2015-09-16 01:22:51 +00:00
return 1
}
2017-02-06 19:48:28 +00:00
// Get the HTTP client
client, err := c.Meta.Client()
if err != nil {
c.Ui.Error(fmt.Sprintf("Error initializing client: %s", err))
return 1
}
2017-02-06 19:48:28 +00:00
// Force the region to be that of the job.
if r := job.Region; r != nil {
client.SetRegion(*r)
}
2017-09-07 23:56:15 +00:00
// Force the namespace to be that of the job.
if n := job.Namespace; n != nil {
client.SetNamespace(*n)
}
// Check if the job is periodic or is a parameterized job
2015-12-10 22:07:34 +00:00
periodic := job.IsPeriodic()
paramjob := job.IsParameterized()
2015-12-10 22:07:34 +00:00
// Parse the Consul token
if consulToken == "" {
// Check the environment variable
consulToken = os.Getenv("CONSUL_HTTP_TOKEN")
}
if consulToken != "" {
job.ConsulToken = helper.StringToPtr(consulToken)
}
2016-08-17 04:32:25 +00:00
// Parse the Vault token
if vaultToken == "" {
// Check the environment variable
vaultToken = os.Getenv("VAULT_TOKEN")
}
if vaultToken != "" {
2017-02-06 19:48:28 +00:00
job.VaultToken = helper.StringToPtr(vaultToken)
2015-09-16 01:22:51 +00:00
}
if output {
2017-02-06 19:48:28 +00:00
req := api.RegisterJobRequest{Job: job}
2016-03-29 22:02:14 +00:00
buf, err := json.MarshalIndent(req, "", " ")
if err != nil {
c.Ui.Error(fmt.Sprintf("Error converting job: %s", err))
return 1
}
c.Ui.Output(string(buf))
return 0
}
2016-06-08 23:48:02 +00:00
// Parse the check-index
checkIndex, enforce, err := parseCheckIndex(checkIndexStr)
if err != nil {
c.Ui.Error(fmt.Sprintf("Error parsing check-index value %q: %v", checkIndexStr, err))
return 1
}
2017-09-19 14:47:10 +00:00
// Set the register options
opts := &api.RegisterOptions{}
2016-06-08 23:48:02 +00:00
if enforce {
2017-09-19 14:47:10 +00:00
opts.EnforceIndex = true
opts.ModifyIndex = checkIndex
2016-06-08 23:48:02 +00:00
}
2017-09-19 14:47:10 +00:00
if override {
opts.PolicyOverride = true
}
// Submit the job
resp, _, err := client.Jobs().RegisterOpts(job, opts, nil)
2015-09-16 01:22:51 +00:00
if err != nil {
2016-06-08 23:48:02 +00:00
if strings.Contains(err.Error(), api.RegisterEnforceIndexErrPrefix) {
// Format the error specially if the error is due to index
// enforcement
matches := enforceIndexRegex.FindStringSubmatch(err.Error())
if len(matches) == 2 {
c.Ui.Error(matches[1]) // The matched group
c.Ui.Error("Job not updated")
return 1
}
}
2015-09-16 01:22:51 +00:00
c.Ui.Error(fmt.Sprintf("Error submitting job: %s", err))
return 1
}
// Print any warnings if there are any
if resp.Warnings != "" {
c.Ui.Output(
c.Colorize().Color(fmt.Sprintf("[bold][yellow]Job Warnings:\n%s[reset]\n", resp.Warnings)))
}
evalID := resp.EvalID
// Check if we should enter monitor mode
if detach || periodic || paramjob {
2015-09-21 22:55:10 +00:00
c.Ui.Output("Job registration successful")
if periodic && !paramjob {
loc, err := job.Periodic.GetLocation()
if err == nil {
now := time.Now().In(loc)
2018-04-26 22:46:22 +00:00
next, err := job.Periodic.Next(now)
if err != nil {
c.Ui.Error(fmt.Sprintf("Error determining next launch time: %v", err))
} else {
c.Ui.Output(fmt.Sprintf("Approximate next launch time: %s (%s from now)",
formatTime(next), formatTimeDifference(now, next, time.Second)))
}
}
} else if !paramjob {
2015-12-10 22:07:34 +00:00
c.Ui.Output("Evaluation ID: " + evalID)
}
2015-09-18 04:09:34 +00:00
return 0
}
2015-09-18 04:09:34 +00:00
// Detach was not specified, so start monitoring
mon := newMonitor(c.Ui, client, length)
return mon.monitor(evalID, false)
2015-09-18 04:09:34 +00:00
2015-09-16 01:22:51 +00:00
}
2016-06-08 23:48:02 +00:00
// parseCheckIndex parses the check-index flag and returns the index, whether it
// was set and potentially an error during parsing.
func parseCheckIndex(input string) (uint64, bool, error) {
if input == "" {
return 0, false, nil
}
u, err := strconv.ParseUint(input, 10, 64)
return u, true, err
}