open-nomad/client/allocdir/alloc_dir.go

525 lines
15 KiB
Go
Raw Normal View History

package allocdir
import (
"archive/tar"
"fmt"
"io"
"io/ioutil"
2017-01-05 23:57:58 +00:00
"log"
"os"
"path/filepath"
2016-01-27 22:20:10 +00:00
"time"
2016-07-06 00:08:58 +00:00
"gopkg.in/tomb.v1"
"github.com/hashicorp/go-multierror"
"github.com/hashicorp/nomad/nomad/structs"
2016-07-06 00:08:58 +00:00
"github.com/hpcloud/tail/watch"
)
const (
// idUnsupported is what the uid/gid will be set to on platforms (eg
// Windows) that don't support integer ownership identifiers.
idUnsupported = -1
)
var (
// The name of the directory that is shared across tasks in a task group.
SharedAllocName = "alloc"
2016-02-25 04:06:43 +00:00
// Name of the directory where logs of Tasks are written
LogDirName = "logs"
// SharedDataDir is one of the shared allocation directories. It is
// included in snapshots.
SharedDataDir = "data"
// The set of directories that exist inside eache shared alloc directory.
SharedAllocDirs = []string{LogDirName, "tmp", SharedDataDir}
// The name of the directory that exists inside each task directory
// regardless of driver.
TaskLocal = "local"
2016-02-04 23:35:04 +00:00
// TaskSecrets is the name of the secret directory inside each task
// directory
TaskSecrets = "secrets"
2016-02-04 23:35:04 +00:00
// TaskDirs is the set of directories created in each tasks directory.
TaskDirs = map[string]os.FileMode{"tmp": os.ModeSticky | 0777}
)
type AllocDir struct {
// AllocDir is the directory used for storing any state
// of this allocation. It will be purged on alloc destroy.
AllocDir string
// The shared directory is available to all tasks within the same task
// group.
SharedDir string
// TaskDirs is a mapping of task names to their non-shared directory.
TaskDirs map[string]*TaskDir
2017-01-05 23:57:58 +00:00
logger *log.Logger
}
2016-01-14 21:47:46 +00:00
// AllocFileInfo holds information about a file inside the AllocDir
2016-01-14 01:18:10 +00:00
type AllocFileInfo struct {
2016-01-27 22:20:10 +00:00
Name string
IsDir bool
Size int64
FileMode string
ModTime time.Time
}
// AllocDirFS exposes file operations on the alloc dir
2016-01-14 21:35:42 +00:00
type AllocDirFS interface {
List(path string) ([]*AllocFileInfo, error)
Stat(path string) (*AllocFileInfo, error)
2016-07-06 00:08:58 +00:00
ReadAt(path string, offset int64) (io.ReadCloser, error)
Snapshot(w io.Writer) error
BlockUntilExists(path string, t *tomb.Tomb) (chan error, error)
2016-07-06 00:08:58 +00:00
ChangeEvents(path string, curOffset int64, t *tomb.Tomb) (*watch.FileChanges, error)
2016-01-14 21:35:42 +00:00
}
// NewAllocDir initializes the AllocDir struct with allocDir as base path for
// the allocation directory.
2017-01-05 23:57:58 +00:00
func NewAllocDir(logger *log.Logger, allocDir string) *AllocDir {
return &AllocDir{
AllocDir: allocDir,
SharedDir: filepath.Join(allocDir, SharedAllocName),
TaskDirs: make(map[string]*TaskDir),
2017-01-05 23:57:58 +00:00
logger: logger,
}
}
// NewTaskDir creates a new TaskDir and adds it to the AllocDirs TaskDirs map.
func (d *AllocDir) NewTaskDir(name string) *TaskDir {
2017-01-05 23:57:58 +00:00
td := newTaskDir(d.logger, d.AllocDir, name)
d.TaskDirs[name] = td
return td
}
// Snapshot creates an archive of the files and directories in the data dir of
// the allocation and the task local directories
func (d *AllocDir) Snapshot(w io.Writer) error {
allocDataDir := filepath.Join(d.SharedDir, SharedDataDir)
rootPaths := []string{allocDataDir}
for _, taskdir := range d.TaskDirs {
rootPaths = append(rootPaths, taskdir.LocalDir)
}
tw := tar.NewWriter(w)
defer tw.Close()
walkFn := func(path string, fileInfo os.FileInfo, err error) error {
// Ignore if the file is a symlink
if fileInfo.Mode() == os.ModeSymlink {
return nil
}
// Include the path of the file name relative to the alloc dir
// so that we can put the files in the right directories
relPath, err := filepath.Rel(d.AllocDir, path)
if err != nil {
return err
}
hdr, err := tar.FileInfoHeader(fileInfo, "")
if err != nil {
return fmt.Errorf("error creating file header: %v", err)
}
hdr.Name = relPath
tw.WriteHeader(hdr)
// If it's a directory we just write the header into the tar
if fileInfo.IsDir() {
return nil
}
// Write the file into the archive
file, err := os.Open(path)
if err != nil {
return err
}
defer file.Close()
if _, err := io.Copy(tw, file); err != nil {
return err
}
return nil
}
// Walk through all the top level directories and add the files and
// directories in the archive
for _, path := range rootPaths {
if err := filepath.Walk(path, walkFn); err != nil {
return err
}
}
return nil
}
// Move other alloc directory's shared path and local dir to this alloc dir.
func (d *AllocDir) Move(other *AllocDir, tasks []*structs.Task) error {
// Move the data directory
otherDataDir := filepath.Join(other.SharedDir, SharedDataDir)
dataDir := filepath.Join(d.SharedDir, SharedDataDir)
if fileInfo, err := os.Stat(otherDataDir); fileInfo != nil && err == nil {
os.Remove(dataDir) // remove an empty data dir if it exists
if err := os.Rename(otherDataDir, dataDir); err != nil {
return fmt.Errorf("error moving data dir: %v", err)
}
}
// Move the task directories
for _, task := range tasks {
otherTaskDir := filepath.Join(other.AllocDir, task.Name)
otherTaskLocal := filepath.Join(otherTaskDir, TaskLocal)
fileInfo, err := os.Stat(otherTaskLocal)
if fileInfo != nil && err == nil {
// TaskDirs haven't been built yet, so create it
newTaskDir := filepath.Join(d.AllocDir, task.Name)
if err := os.MkdirAll(newTaskDir, 0777); err != nil {
return fmt.Errorf("error creating task %q dir: %v", task.Name, err)
}
localDir := filepath.Join(newTaskDir, TaskLocal)
os.Remove(localDir) // remove an empty local dir if it exists
if err := os.Rename(otherTaskLocal, localDir); err != nil {
return fmt.Errorf("error moving task %q local dir: %v", task.Name, err)
}
}
}
return nil
}
// Tears down previously build directory structure.
func (d *AllocDir) Destroy() error {
2015-09-25 23:49:14 +00:00
// Unmount all mounted shared alloc dirs.
var mErr multierror.Error
if err := d.UnmountAll(); err != nil {
mErr.Errors = append(mErr.Errors, err)
}
if err := os.RemoveAll(d.AllocDir); err != nil {
mErr.Errors = append(mErr.Errors, fmt.Errorf("failed to remove alloc dir %q: %v", d.AllocDir, err))
}
return mErr.ErrorOrNil()
}
// UnmountAll linked/mounted directories in task dirs.
func (d *AllocDir) UnmountAll() error {
var mErr multierror.Error
for _, dir := range d.TaskDirs {
// Check if the directory has the shared alloc mounted.
if pathExists(dir.SharedTaskDir) {
if err := unlinkDir(dir.SharedTaskDir); err != nil {
mErr.Errors = append(mErr.Errors,
fmt.Errorf("failed to unmount shared alloc dir %q: %v", dir.SharedTaskDir, err))
} else if err := os.RemoveAll(dir.SharedTaskDir); err != nil {
mErr.Errors = append(mErr.Errors,
fmt.Errorf("failed to delete shared alloc dir %q: %v", dir.SharedTaskDir, err))
}
2015-09-25 23:49:14 +00:00
}
if pathExists(dir.SecretsDir) {
if err := removeSecretDir(dir.SecretsDir); err != nil {
mErr.Errors = append(mErr.Errors,
fmt.Errorf("failed to remove the secret dir %q: %v", dir.SecretsDir, err))
}
}
// Unmount dev/ and proc/ have been mounted.
if err := dir.unmountSpecialDirs(); err != nil {
mErr.Errors = append(mErr.Errors, err)
}
2015-09-25 23:49:14 +00:00
}
return mErr.ErrorOrNil()
}
// Build the directory tree for an allocation.
func (d *AllocDir) Build() error {
// Make the alloc directory, owned by the nomad process.
if err := os.MkdirAll(d.AllocDir, 0755); err != nil {
return fmt.Errorf("Failed to make the alloc directory %v: %v", d.AllocDir, err)
}
2016-05-15 16:41:34 +00:00
// Make the shared directory and make it available to all user/groups.
2016-03-28 21:33:53 +00:00
if err := os.MkdirAll(d.SharedDir, 0777); err != nil {
return err
}
2015-09-25 23:49:14 +00:00
// Make the shared directory have non-root permissions.
if err := dropDirPermissions(d.SharedDir, os.ModePerm); err != nil {
2015-09-25 23:49:14 +00:00
return err
}
// Create shared subdirs
for _, dir := range SharedAllocDirs {
p := filepath.Join(d.SharedDir, dir)
2016-03-28 21:33:53 +00:00
if err := os.MkdirAll(p, 0777); err != nil {
return err
}
if err := dropDirPermissions(p, os.ModePerm); err != nil {
return err
}
}
return nil
}
// List returns the list of files at a path relative to the alloc dir
2016-01-14 01:18:10 +00:00
func (d *AllocDir) List(path string) ([]*AllocFileInfo, error) {
2016-12-18 23:48:30 +00:00
if escapes, err := structs.PathEscapesAllocDir("", path); err != nil {
return nil, fmt.Errorf("Failed to check if path escapes alloc directory: %v", err)
} else if escapes {
return nil, fmt.Errorf("Path escapes the alloc directory")
}
p := filepath.Join(d.AllocDir, path)
finfos, err := ioutil.ReadDir(p)
if err != nil {
2016-01-14 19:47:05 +00:00
return []*AllocFileInfo{}, err
}
2016-01-14 01:18:10 +00:00
files := make([]*AllocFileInfo, len(finfos))
for idx, info := range finfos {
2016-01-14 01:18:10 +00:00
files[idx] = &AllocFileInfo{
2016-01-27 22:20:10 +00:00
Name: info.Name(),
IsDir: info.IsDir(),
Size: info.Size(),
FileMode: info.Mode().String(),
ModTime: info.ModTime(),
}
}
return files, err
}
// Stat returns information about the file at a path relative to the alloc dir
2016-01-14 01:18:10 +00:00
func (d *AllocDir) Stat(path string) (*AllocFileInfo, error) {
2016-12-18 23:48:30 +00:00
if escapes, err := structs.PathEscapesAllocDir("", path); err != nil {
return nil, fmt.Errorf("Failed to check if path escapes alloc directory: %v", err)
} else if escapes {
return nil, fmt.Errorf("Path escapes the alloc directory")
}
2016-01-13 05:28:07 +00:00
p := filepath.Join(d.AllocDir, path)
info, err := os.Stat(p)
2016-01-12 23:25:51 +00:00
if err != nil {
return nil, err
}
2016-01-14 01:18:10 +00:00
return &AllocFileInfo{
2016-01-27 22:20:10 +00:00
Size: info.Size(),
Name: info.Name(),
IsDir: info.IsDir(),
FileMode: info.Mode().String(),
ModTime: info.ModTime(),
2016-01-12 23:25:51 +00:00
}, nil
2016-01-13 05:28:07 +00:00
}
2016-01-12 23:25:51 +00:00
2016-07-06 00:08:58 +00:00
// ReadAt returns a reader for a file at the path relative to the alloc dir
func (d *AllocDir) ReadAt(path string, offset int64) (io.ReadCloser, error) {
2016-12-18 23:48:30 +00:00
if escapes, err := structs.PathEscapesAllocDir("", path); err != nil {
return nil, fmt.Errorf("Failed to check if path escapes alloc directory: %v", err)
} else if escapes {
return nil, fmt.Errorf("Path escapes the alloc directory")
}
2016-01-13 05:28:07 +00:00
p := filepath.Join(d.AllocDir, path)
2016-10-24 18:14:05 +00:00
// Check if it is trying to read into a secret directory
for _, dir := range d.TaskDirs {
if filepath.HasPrefix(p, dir.SecretsDir) {
2016-10-24 18:14:05 +00:00
return nil, fmt.Errorf("Reading secret file prohibited: %s", path)
}
}
2016-01-13 05:28:07 +00:00
f, err := os.Open(p)
if err != nil {
2016-01-14 21:35:42 +00:00
return nil, err
2016-01-13 06:06:42 +00:00
}
if _, err := f.Seek(offset, 0); err != nil {
return nil, fmt.Errorf("can't seek to offset %q: %v", offset, err)
}
2016-07-06 00:08:58 +00:00
return f, nil
}
2016-07-10 22:56:13 +00:00
// BlockUntilExists blocks until the passed file relative the allocation
// directory exists. The block can be cancelled with the passed tomb.
func (d *AllocDir) BlockUntilExists(path string, t *tomb.Tomb) (chan error, error) {
2016-12-18 23:48:30 +00:00
if escapes, err := structs.PathEscapesAllocDir("", path); err != nil {
return nil, fmt.Errorf("Failed to check if path escapes alloc directory: %v", err)
} else if escapes {
return nil, fmt.Errorf("Path escapes the alloc directory")
}
2016-07-06 00:08:58 +00:00
// Get the path relative to the alloc directory
p := filepath.Join(d.AllocDir, path)
2016-07-10 22:56:13 +00:00
watcher := getFileWatcher(p)
2016-07-18 16:48:29 +00:00
returnCh := make(chan error, 1)
go func() {
returnCh <- watcher.BlockUntilExists(t)
close(returnCh)
}()
return returnCh, nil
2016-07-06 00:08:58 +00:00
}
2016-07-10 22:56:13 +00:00
// ChangeEvents watches for changes to the passed path relative to the
// allocation directory. The offset should be the last read offset. The tomb is
// used to clean up the watch.
2016-07-06 00:08:58 +00:00
func (d *AllocDir) ChangeEvents(path string, curOffset int64, t *tomb.Tomb) (*watch.FileChanges, error) {
2016-12-18 23:48:30 +00:00
if escapes, err := structs.PathEscapesAllocDir("", path); err != nil {
return nil, fmt.Errorf("Failed to check if path escapes alloc directory: %v", err)
} else if escapes {
return nil, fmt.Errorf("Path escapes the alloc directory")
}
2016-07-06 00:08:58 +00:00
// Get the path relative to the alloc directory
p := filepath.Join(d.AllocDir, path)
2016-07-10 22:56:13 +00:00
watcher := getFileWatcher(p)
return watcher.ChangeEvents(t, curOffset)
}
2016-07-06 00:08:58 +00:00
2016-07-10 22:56:13 +00:00
// getFileWatcher returns a FileWatcher for the given path.
func getFileWatcher(path string) watch.FileWatcher {
2016-08-12 01:59:48 +00:00
return watch.NewPollingFileWatcher(path)
2016-07-06 00:08:58 +00:00
}
// fileCopy from src to dst setting the permissions and owner (if uid & gid are
// both greater than 0)
func fileCopy(src, dst string, uid, gid int, perm os.FileMode) error {
// Do a simple copy.
srcFile, err := os.Open(src)
if err != nil {
return fmt.Errorf("Couldn't open src file %v: %v", src, err)
}
2016-09-24 05:17:53 +00:00
defer srcFile.Close()
dstFile, err := os.OpenFile(dst, os.O_WRONLY|os.O_CREATE, perm)
if err != nil {
return fmt.Errorf("Couldn't create destination file %v: %v", dst, err)
}
2016-09-24 05:17:53 +00:00
defer dstFile.Close()
if _, err := io.Copy(dstFile, srcFile); err != nil {
return fmt.Errorf("Couldn't copy %q to %q: %v", src, dst, err)
}
if uid != idUnsupported && gid != idUnsupported {
if err := dstFile.Chown(uid, gid); err != nil {
return fmt.Errorf("Couldn't copy %q to %q: %v", src, dst, err)
}
}
return nil
}
// pathExists is a helper function to check if the path exists.
func pathExists(path string) bool {
if _, err := os.Stat(path); err != nil {
if os.IsNotExist(err) {
return false
}
}
return true
}
// pathEmpty returns true if a path exists, is listable, and is empty. If the
// path does not exist or is not listable an error is returned.
func pathEmpty(path string) (bool, error) {
f, err := os.Open(path)
if err != nil {
return false, err
}
defer f.Close()
entries, err := f.Readdir(1)
if err != nil && err != io.EOF {
return false, err
}
return len(entries) == 0, nil
}
2016-11-08 18:57:29 +00:00
// createDir creates a directory structure inside the basepath. This functions
// preserves the permissions of each of the subdirectories in the relative path
// by looking up the permissions in the host.
func createDir(basePath, relPath string) error {
filePerms, err := splitPath(relPath)
2016-11-08 18:57:29 +00:00
if err != nil {
return err
}
2016-11-08 20:55:15 +00:00
// We are going backwards since we create the root of the directory first
// and then create the entire nested structure.
2016-11-08 18:57:29 +00:00
for i := len(filePerms) - 1; i >= 0; i-- {
fi := filePerms[i]
destDir := filepath.Join(basePath, fi.Name)
if err := os.MkdirAll(destDir, fi.Perm); err != nil {
return err
}
if fi.Uid != idUnsupported && fi.Gid != idUnsupported {
if err := os.Chown(destDir, fi.Uid, fi.Gid); err != nil {
return err
}
}
2016-11-08 18:57:29 +00:00
}
return nil
}
// fileInfo holds the path and the permissions of a file
type fileInfo struct {
Name string
Perm os.FileMode
// Uid and Gid are unsupported on Windows
Uid int
Gid int
2016-11-08 18:57:29 +00:00
}
2016-11-08 20:55:15 +00:00
// splitPath stats each subdirectory of a path. The first element of the array
// is the file passed to this function, and the last element is the root of the
2016-11-08 20:55:15 +00:00
// path.
func splitPath(path string) ([]fileInfo, error) {
2016-11-08 18:57:29 +00:00
var mode os.FileMode
fi, err := os.Stat(path)
2016-11-08 20:55:15 +00:00
// If the path is not present in the host then we respond with the most
// flexible permission.
uid, gid := idUnsupported, idUnsupported
2016-11-08 18:57:29 +00:00
if err != nil {
mode = os.ModePerm
} else {
uid, gid = getOwner(fi)
mode = fi.Mode()
2016-11-08 18:57:29 +00:00
}
var dirs []fileInfo
dirs = append(dirs, fileInfo{Name: path, Perm: mode, Uid: uid, Gid: gid})
2016-11-08 18:57:29 +00:00
currentDir := path
for {
dir := filepath.Dir(filepath.Clean(currentDir))
if dir == currentDir {
break
}
2016-11-08 20:55:15 +00:00
// We try to find the permission of the file in the host. If the path is not
// present in the host then we respond with the most flexible permission.
uid, gid := idUnsupported, idUnsupported
fi, err := os.Stat(dir)
2016-11-08 18:57:29 +00:00
if err != nil {
mode = os.ModePerm
} else {
uid, gid = getOwner(fi)
mode = fi.Mode()
2016-11-08 18:57:29 +00:00
}
dirs = append(dirs, fileInfo{Name: dir, Perm: mode, Uid: uid, Gid: gid})
2016-11-08 18:57:29 +00:00
currentDir = dir
}
return dirs, nil
}