2015-09-06 22:37:21 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2019-04-28 21:33:25 +00:00
|
|
|
"context"
|
2019-04-01 12:56:02 +00:00
|
|
|
"encoding/json"
|
2016-09-22 04:28:12 +00:00
|
|
|
"fmt"
|
2019-04-28 21:33:25 +00:00
|
|
|
"io"
|
|
|
|
"net"
|
2015-09-06 22:37:21 +00:00
|
|
|
"net/http"
|
2019-04-28 21:33:25 +00:00
|
|
|
"strconv"
|
2015-09-06 22:37:21 +00:00
|
|
|
"strings"
|
|
|
|
|
2016-11-29 00:05:56 +00:00
|
|
|
"github.com/golang/snappy"
|
2019-04-28 21:33:25 +00:00
|
|
|
"github.com/gorilla/websocket"
|
2020-03-18 11:27:32 +00:00
|
|
|
"github.com/hashicorp/go-msgpack/codec"
|
2018-02-06 18:53:00 +00:00
|
|
|
cstructs "github.com/hashicorp/nomad/client/structs"
|
2015-09-06 22:37:21 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2019-04-28 21:33:25 +00:00
|
|
|
"github.com/hashicorp/nomad/plugins/drivers"
|
2015-09-06 22:37:21 +00:00
|
|
|
)
|
|
|
|
|
2016-05-28 00:28:17 +00:00
|
|
|
const (
|
2016-09-22 04:28:12 +00:00
|
|
|
allocNotFoundErr = "allocation not found"
|
|
|
|
resourceNotFoundErr = "resource not found"
|
2016-05-28 00:28:17 +00:00
|
|
|
)
|
|
|
|
|
2015-09-06 22:37:21 +00:00
|
|
|
func (s *HTTPServer) AllocsRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
if req.Method != "GET" {
|
|
|
|
return nil, CodedError(405, ErrInvalidMethod)
|
|
|
|
}
|
|
|
|
|
|
|
|
args := structs.AllocListRequest{}
|
|
|
|
if s.parse(resp, req, &args.Region, &args.QueryOptions) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2020-10-09 05:21:41 +00:00
|
|
|
// Parse resources and task_states field selection
|
2020-10-14 19:23:25 +00:00
|
|
|
resources, err := parseBool(req, "resources")
|
|
|
|
if err != nil {
|
2020-10-09 05:21:41 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2020-10-14 19:23:25 +00:00
|
|
|
taskStates, err := parseBool(req, "task_states")
|
|
|
|
if err != nil {
|
2020-10-09 05:21:41 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-10-14 19:23:25 +00:00
|
|
|
if resources != nil || taskStates != nil {
|
|
|
|
args.Fields = structs.NewAllocStubFields()
|
|
|
|
if resources != nil {
|
|
|
|
args.Fields.Resources = *resources
|
|
|
|
}
|
|
|
|
if taskStates != nil {
|
|
|
|
args.Fields.TaskStates = *taskStates
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:37:21 +00:00
|
|
|
var out structs.AllocListResponse
|
|
|
|
if err := s.agent.RPC("Alloc.List", &args, &out); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
setMeta(resp, &out.QueryMeta)
|
2015-09-07 17:03:10 +00:00
|
|
|
if out.Allocations == nil {
|
|
|
|
out.Allocations = make([]*structs.AllocListStub, 0)
|
|
|
|
}
|
2017-11-17 20:53:26 +00:00
|
|
|
for _, alloc := range out.Allocations {
|
|
|
|
alloc.SetEventDisplayMessages()
|
|
|
|
}
|
2015-09-06 22:37:21 +00:00
|
|
|
return out.Allocations, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *HTTPServer) AllocSpecificRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2019-04-01 14:21:03 +00:00
|
|
|
reqSuffix := strings.TrimPrefix(req.URL.Path, "/v1/allocation/")
|
|
|
|
|
|
|
|
// tokenize the suffix of the path to get the alloc id and find the action
|
|
|
|
// invoked on the alloc id
|
|
|
|
tokens := strings.Split(reqSuffix, "/")
|
|
|
|
if len(tokens) > 2 || len(tokens) < 1 {
|
|
|
|
return nil, CodedError(404, resourceNotFoundErr)
|
|
|
|
}
|
|
|
|
allocID := tokens[0]
|
|
|
|
|
|
|
|
if len(tokens) == 1 {
|
|
|
|
return s.allocGet(allocID, resp, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch tokens[1] {
|
|
|
|
case "stop":
|
|
|
|
return s.allocStop(allocID, resp, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, CodedError(404, resourceNotFoundErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *HTTPServer) allocGet(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2015-09-06 22:49:44 +00:00
|
|
|
if req.Method != "GET" {
|
2015-09-06 22:37:21 +00:00
|
|
|
return nil, CodedError(405, ErrInvalidMethod)
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:49:44 +00:00
|
|
|
args := structs.AllocSpecificRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
}
|
|
|
|
if s.parse(resp, req, &args.Region, &args.QueryOptions) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var out structs.SingleAllocResponse
|
|
|
|
if err := s.agent.RPC("Alloc.GetAlloc", &args, &out); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-09-06 22:37:21 +00:00
|
|
|
|
2015-09-06 22:49:44 +00:00
|
|
|
setMeta(resp, &out.QueryMeta)
|
|
|
|
if out.Alloc == nil {
|
|
|
|
return nil, CodedError(404, "alloc not found")
|
|
|
|
}
|
2016-11-29 00:05:56 +00:00
|
|
|
|
2016-12-14 20:50:08 +00:00
|
|
|
// Decode the payload if there is any
|
2020-08-20 15:07:13 +00:00
|
|
|
|
2016-11-29 00:05:56 +00:00
|
|
|
alloc := out.Alloc
|
2016-12-14 20:50:08 +00:00
|
|
|
if alloc.Job != nil && len(alloc.Job.Payload) != 0 {
|
|
|
|
decoded, err := snappy.Decode(nil, alloc.Job.Payload)
|
2016-11-29 00:05:56 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
alloc = alloc.Copy()
|
2016-12-14 20:50:08 +00:00
|
|
|
alloc.Job.Payload = decoded
|
2016-11-29 00:05:56 +00:00
|
|
|
}
|
2017-11-17 20:53:26 +00:00
|
|
|
alloc.SetEventDisplayMessages()
|
2016-11-29 00:05:56 +00:00
|
|
|
|
2020-08-20 15:07:13 +00:00
|
|
|
// Handle 0.12 ports upgrade path
|
2020-11-15 17:52:50 +00:00
|
|
|
alloc = alloc.Copy()
|
2020-11-11 21:21:47 +00:00
|
|
|
alloc.AllocatedResources.Canonicalize()
|
2020-08-20 15:07:13 +00:00
|
|
|
|
2016-11-29 00:05:56 +00:00
|
|
|
return alloc, nil
|
2015-09-06 22:37:21 +00:00
|
|
|
}
|
2016-05-24 23:41:35 +00:00
|
|
|
|
2019-04-01 14:21:03 +00:00
|
|
|
func (s *HTTPServer) allocStop(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
if !(req.Method == "POST" || req.Method == "PUT") {
|
|
|
|
return nil, CodedError(405, ErrInvalidMethod)
|
|
|
|
}
|
2016-05-24 23:41:35 +00:00
|
|
|
|
2019-04-01 14:21:03 +00:00
|
|
|
sr := &structs.AllocStopRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
}
|
|
|
|
s.parseWriteRequest(req, &sr.WriteRequest)
|
|
|
|
|
|
|
|
var out structs.AllocStopResponse
|
2019-06-20 20:52:40 +00:00
|
|
|
rpcErr := s.agent.RPC("Alloc.Stop", &sr, &out)
|
|
|
|
|
|
|
|
if rpcErr != nil {
|
|
|
|
if structs.IsErrUnknownAllocation(rpcErr) {
|
|
|
|
rpcErr = CodedError(404, allocNotFoundErr)
|
|
|
|
}
|
2019-06-21 16:20:06 +00:00
|
|
|
return nil, rpcErr
|
2019-06-20 20:52:40 +00:00
|
|
|
}
|
|
|
|
|
2019-06-21 16:20:06 +00:00
|
|
|
setIndex(resp, out.Index)
|
|
|
|
return &out, nil
|
2019-04-01 14:21:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *HTTPServer) ClientAllocRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2016-05-24 23:41:35 +00:00
|
|
|
reqSuffix := strings.TrimPrefix(req.URL.Path, "/v1/client/allocation/")
|
|
|
|
|
|
|
|
// tokenize the suffix of the path to get the alloc id and find the action
|
|
|
|
// invoked on the alloc id
|
|
|
|
tokens := strings.Split(reqSuffix, "/")
|
2016-09-22 04:28:12 +00:00
|
|
|
if len(tokens) != 2 {
|
|
|
|
return nil, CodedError(404, resourceNotFoundErr)
|
2016-05-24 23:41:35 +00:00
|
|
|
}
|
|
|
|
allocID := tokens[0]
|
2016-09-22 04:28:12 +00:00
|
|
|
switch tokens[1] {
|
|
|
|
case "stats":
|
|
|
|
return s.allocStats(allocID, resp, req)
|
2019-04-28 21:33:25 +00:00
|
|
|
case "exec":
|
|
|
|
return s.allocExec(allocID, resp, req)
|
2016-09-22 04:28:12 +00:00
|
|
|
case "snapshot":
|
2018-02-06 18:53:00 +00:00
|
|
|
if s.agent.client == nil {
|
|
|
|
return nil, clientNotRunning
|
|
|
|
}
|
2017-10-07 00:54:09 +00:00
|
|
|
return s.allocSnapshot(allocID, resp, req)
|
2019-04-01 12:56:02 +00:00
|
|
|
case "restart":
|
|
|
|
return s.allocRestart(allocID, resp, req)
|
2016-12-12 06:33:12 +00:00
|
|
|
case "gc":
|
|
|
|
return s.allocGC(allocID, resp, req)
|
2019-04-03 10:46:15 +00:00
|
|
|
case "signal":
|
|
|
|
return s.allocSignal(allocID, resp, req)
|
2016-09-22 04:28:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil, CodedError(404, resourceNotFoundErr)
|
|
|
|
}
|
|
|
|
|
2016-12-12 06:33:12 +00:00
|
|
|
func (s *HTTPServer) ClientGCRequest(resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2018-02-06 18:53:00 +00:00
|
|
|
// Get the requested Node ID
|
|
|
|
requestedNode := req.URL.Query().Get("node_id")
|
|
|
|
|
|
|
|
// Build the request and parse the ACL token
|
|
|
|
args := structs.NodeSpecificRequest{
|
|
|
|
NodeID: requestedNode,
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
|
|
|
|
|
|
|
// Determine the handler to use
|
|
|
|
useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForNode(requestedNode)
|
|
|
|
|
|
|
|
// Make the RPC
|
|
|
|
var reply structs.GenericResponse
|
|
|
|
var rpcErr error
|
|
|
|
if useLocalClient {
|
|
|
|
rpcErr = s.agent.Client().ClientRPC("Allocations.GarbageCollectAll", &args, &reply)
|
|
|
|
} else if useClientRPC {
|
|
|
|
rpcErr = s.agent.Client().RPC("ClientAllocations.GarbageCollectAll", &args, &reply)
|
|
|
|
} else if useServerRPC {
|
|
|
|
rpcErr = s.agent.Server().RPC("ClientAllocations.GarbageCollectAll", &args, &reply)
|
|
|
|
} else {
|
|
|
|
rpcErr = CodedError(400, "No local Node and node_id not provided")
|
|
|
|
}
|
|
|
|
|
|
|
|
if rpcErr != nil {
|
|
|
|
if structs.IsErrNoNodeConn(rpcErr) {
|
|
|
|
rpcErr = CodedError(404, rpcErr.Error())
|
|
|
|
}
|
2017-10-04 22:08:58 +00:00
|
|
|
}
|
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
return nil, rpcErr
|
2016-12-12 06:33:12 +00:00
|
|
|
}
|
|
|
|
|
2019-04-01 12:56:02 +00:00
|
|
|
func (s *HTTPServer) allocRestart(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Build the request and parse the ACL token
|
|
|
|
args := structs.AllocRestartRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
TaskName: "",
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
|
|
|
|
|
|
|
// Explicitly parse the body separately to disallow overriding AllocID in req Body.
|
|
|
|
var reqBody struct {
|
|
|
|
TaskName string
|
|
|
|
}
|
|
|
|
err := json.NewDecoder(req.Body).Decode(&reqBody)
|
2019-06-12 13:19:37 +00:00
|
|
|
if err != nil && err != io.EOF {
|
2019-04-01 12:56:02 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if reqBody.TaskName != "" {
|
|
|
|
args.TaskName = reqBody.TaskName
|
|
|
|
}
|
|
|
|
|
|
|
|
// Determine the handler to use
|
|
|
|
useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForAlloc(allocID)
|
|
|
|
|
|
|
|
// Make the RPC
|
|
|
|
var reply structs.GenericResponse
|
|
|
|
var rpcErr error
|
|
|
|
if useLocalClient {
|
|
|
|
rpcErr = s.agent.Client().ClientRPC("Allocations.Restart", &args, &reply)
|
|
|
|
} else if useClientRPC {
|
|
|
|
rpcErr = s.agent.Client().RPC("ClientAllocations.Restart", &args, &reply)
|
|
|
|
} else if useServerRPC {
|
|
|
|
rpcErr = s.agent.Server().RPC("ClientAllocations.Restart", &args, &reply)
|
|
|
|
} else {
|
|
|
|
rpcErr = CodedError(400, "No local Node and node_id not provided")
|
|
|
|
}
|
|
|
|
|
|
|
|
if rpcErr != nil {
|
|
|
|
if structs.IsErrNoNodeConn(rpcErr) || structs.IsErrUnknownAllocation(rpcErr) {
|
|
|
|
rpcErr = CodedError(404, rpcErr.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return reply, rpcErr
|
|
|
|
}
|
|
|
|
|
2016-12-12 06:33:12 +00:00
|
|
|
func (s *HTTPServer) allocGC(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2018-02-06 18:53:00 +00:00
|
|
|
// Build the request and parse the ACL token
|
|
|
|
args := structs.AllocSpecificRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
2017-10-06 00:33:05 +00:00
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
// Determine the handler to use
|
|
|
|
useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForAlloc(allocID)
|
2017-10-06 00:33:05 +00:00
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
// Make the RPC
|
|
|
|
var reply structs.GenericResponse
|
|
|
|
var rpcErr error
|
|
|
|
if useLocalClient {
|
|
|
|
rpcErr = s.agent.Client().ClientRPC("Allocations.GarbageCollect", &args, &reply)
|
|
|
|
} else if useClientRPC {
|
|
|
|
rpcErr = s.agent.Client().RPC("ClientAllocations.GarbageCollect", &args, &reply)
|
|
|
|
} else if useServerRPC {
|
|
|
|
rpcErr = s.agent.Server().RPC("ClientAllocations.GarbageCollect", &args, &reply)
|
|
|
|
} else {
|
|
|
|
rpcErr = CodedError(400, "No local Node and node_id not provided")
|
2017-10-06 00:33:05 +00:00
|
|
|
}
|
2017-10-19 00:06:46 +00:00
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
if rpcErr != nil {
|
2018-02-13 23:50:51 +00:00
|
|
|
if structs.IsErrNoNodeConn(rpcErr) || structs.IsErrUnknownAllocation(rpcErr) {
|
2018-02-06 18:53:00 +00:00
|
|
|
rpcErr = CodedError(404, rpcErr.Error())
|
|
|
|
}
|
2017-10-28 00:00:11 +00:00
|
|
|
}
|
2018-02-06 18:53:00 +00:00
|
|
|
|
|
|
|
return nil, rpcErr
|
2016-12-12 06:33:12 +00:00
|
|
|
}
|
|
|
|
|
2019-04-03 10:46:15 +00:00
|
|
|
func (s *HTTPServer) allocSignal(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
if !(req.Method == "POST" || req.Method == "PUT") {
|
|
|
|
return nil, CodedError(405, ErrInvalidMethod)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the request and parse the ACL token
|
|
|
|
args := structs.AllocSignalRequest{}
|
|
|
|
err := decodeBody(req, &args)
|
|
|
|
if err != nil {
|
|
|
|
return nil, CodedError(400, fmt.Sprintf("Failed to decode body: %v", err))
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
|
|
|
args.AllocID = allocID
|
|
|
|
|
|
|
|
// Determine the handler to use
|
|
|
|
useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForAlloc(allocID)
|
|
|
|
|
|
|
|
// Make the RPC
|
|
|
|
var reply structs.GenericResponse
|
|
|
|
var rpcErr error
|
|
|
|
if useLocalClient {
|
|
|
|
rpcErr = s.agent.Client().ClientRPC("Allocations.Signal", &args, &reply)
|
|
|
|
} else if useClientRPC {
|
|
|
|
rpcErr = s.agent.Client().RPC("ClientAllocations.Signal", &args, &reply)
|
|
|
|
} else if useServerRPC {
|
|
|
|
rpcErr = s.agent.Server().RPC("ClientAllocations.Signal", &args, &reply)
|
|
|
|
} else {
|
|
|
|
rpcErr = CodedError(400, "No local Node and node_id not provided")
|
|
|
|
}
|
|
|
|
|
|
|
|
if rpcErr != nil {
|
|
|
|
if structs.IsErrNoNodeConn(rpcErr) || structs.IsErrUnknownAllocation(rpcErr) {
|
|
|
|
rpcErr = CodedError(404, rpcErr.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return reply, rpcErr
|
|
|
|
}
|
|
|
|
|
2017-10-07 00:54:09 +00:00
|
|
|
func (s *HTTPServer) allocSnapshot(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
var secret string
|
|
|
|
s.parseToken(req, &secret)
|
|
|
|
if !s.agent.Client().ValidateMigrateToken(allocID, secret) {
|
2017-10-10 00:23:26 +00:00
|
|
|
return nil, structs.ErrPermissionDenied
|
2017-10-03 17:53:32 +00:00
|
|
|
}
|
|
|
|
|
2016-09-22 04:28:12 +00:00
|
|
|
allocFS, err := s.agent.Client().GetAllocFS(allocID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf(allocNotFoundErr)
|
|
|
|
}
|
|
|
|
if err := allocFS.Snapshot(resp); err != nil {
|
|
|
|
return nil, fmt.Errorf("error making snapshot: %v", err)
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
2016-05-24 23:41:35 +00:00
|
|
|
|
2016-09-22 04:28:12 +00:00
|
|
|
func (s *HTTPServer) allocStats(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
2017-10-06 00:33:05 +00:00
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
// Build the request and parse the ACL token
|
|
|
|
task := req.URL.Query().Get("task")
|
|
|
|
args := cstructs.AllocStatsRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
Task: task,
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
2017-10-06 00:33:05 +00:00
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
// Determine the handler to use
|
|
|
|
useLocalClient, useClientRPC, useServerRPC := s.rpcHandlerForAlloc(allocID)
|
|
|
|
|
|
|
|
// Make the RPC
|
|
|
|
var reply cstructs.AllocStatsResponse
|
|
|
|
var rpcErr error
|
|
|
|
if useLocalClient {
|
|
|
|
rpcErr = s.agent.Client().ClientRPC("Allocations.Stats", &args, &reply)
|
|
|
|
} else if useClientRPC {
|
|
|
|
rpcErr = s.agent.Client().RPC("ClientAllocations.Stats", &args, &reply)
|
|
|
|
} else if useServerRPC {
|
|
|
|
rpcErr = s.agent.Server().RPC("ClientAllocations.Stats", &args, &reply)
|
|
|
|
} else {
|
|
|
|
rpcErr = CodedError(400, "No local Node and node_id not provided")
|
2017-10-06 00:33:05 +00:00
|
|
|
}
|
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
if rpcErr != nil {
|
2018-02-13 23:50:51 +00:00
|
|
|
if structs.IsErrNoNodeConn(rpcErr) || structs.IsErrUnknownAllocation(rpcErr) {
|
2018-02-06 18:53:00 +00:00
|
|
|
rpcErr = CodedError(404, rpcErr.Error())
|
|
|
|
}
|
2016-05-27 21:15:51 +00:00
|
|
|
}
|
|
|
|
|
2018-02-06 18:53:00 +00:00
|
|
|
return reply.Stats, rpcErr
|
2016-05-24 23:41:35 +00:00
|
|
|
}
|
2019-04-28 21:33:25 +00:00
|
|
|
|
|
|
|
func (s *HTTPServer) allocExec(allocID string, resp http.ResponseWriter, req *http.Request) (interface{}, error) {
|
|
|
|
// Build the request and parse the ACL token
|
|
|
|
task := req.URL.Query().Get("task")
|
|
|
|
cmdJsonStr := req.URL.Query().Get("command")
|
|
|
|
var command []string
|
|
|
|
err := json.Unmarshal([]byte(cmdJsonStr), &command)
|
|
|
|
if err != nil {
|
|
|
|
// this shouldn't happen, []string is always be serializable to json
|
|
|
|
return nil, fmt.Errorf("failed to marshal command into json: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ttyB := false
|
|
|
|
if tty := req.URL.Query().Get("tty"); tty != "" {
|
|
|
|
ttyB, err = strconv.ParseBool(tty)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("tty value is not a boolean: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
args := cstructs.AllocExecRequest{
|
|
|
|
AllocID: allocID,
|
|
|
|
Task: task,
|
|
|
|
Cmd: command,
|
|
|
|
Tty: ttyB,
|
|
|
|
}
|
|
|
|
s.parse(resp, req, &args.QueryOptions.Region, &args.QueryOptions)
|
|
|
|
|
|
|
|
conn, err := s.wsUpgrader.Upgrade(resp, req, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to upgrade connection: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-04-03 15:18:54 +00:00
|
|
|
if err := readWsHandshake(conn.ReadJSON, req, &args.QueryOptions); err != nil {
|
|
|
|
conn.WriteMessage(websocket.CloseMessage,
|
|
|
|
websocket.FormatCloseMessage(toWsCode(400), err.Error()))
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-04-28 21:33:25 +00:00
|
|
|
return s.execStreamImpl(conn, &args)
|
|
|
|
}
|
|
|
|
|
2020-04-03 18:20:31 +00:00
|
|
|
// readWsHandshake reads the websocket handshake message and sets
|
|
|
|
// query authentication token, if request requires a handshake
|
2020-04-03 15:18:54 +00:00
|
|
|
func readWsHandshake(readFn func(interface{}) error, req *http.Request, q *structs.QueryOptions) error {
|
|
|
|
|
2020-04-03 18:20:31 +00:00
|
|
|
// Avoid handshake if request doesn't require one
|
2020-04-03 15:18:54 +00:00
|
|
|
if hv := req.URL.Query().Get("ws_handshake"); hv == "" {
|
|
|
|
return nil
|
|
|
|
} else if h, err := strconv.ParseBool(hv); err != nil {
|
|
|
|
return fmt.Errorf("ws_handshake value is not a boolean: %v", err)
|
|
|
|
} else if !h {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var h wsHandshakeMessage
|
|
|
|
err := readFn(&h)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-04-03 18:20:31 +00:00
|
|
|
supportedWSHandshakeVersion := 1
|
|
|
|
if h.Version != supportedWSHandshakeVersion {
|
2020-04-03 15:18:54 +00:00
|
|
|
return fmt.Errorf("unexpected handshake value: %v", h.Version)
|
|
|
|
}
|
|
|
|
|
|
|
|
q.AuthToken = h.AuthToken
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type wsHandshakeMessage struct {
|
|
|
|
Version int `json:"version"`
|
|
|
|
AuthToken string `json:"auth_token"`
|
|
|
|
}
|
|
|
|
|
2019-04-28 21:33:25 +00:00
|
|
|
func (s *HTTPServer) execStreamImpl(ws *websocket.Conn, args *cstructs.AllocExecRequest) (interface{}, error) {
|
|
|
|
allocID := args.AllocID
|
|
|
|
method := "Allocations.Exec"
|
|
|
|
|
|
|
|
// Get the correct handler
|
|
|
|
localClient, remoteClient, localServer := s.rpcHandlerForAlloc(allocID)
|
|
|
|
var handler structs.StreamingRpcHandler
|
|
|
|
var handlerErr error
|
|
|
|
if localClient {
|
|
|
|
handler, handlerErr = s.agent.Client().StreamingRpcHandler(method)
|
|
|
|
} else if remoteClient {
|
|
|
|
handler, handlerErr = s.agent.Client().RemoteStreamingRpcHandler(method)
|
|
|
|
} else if localServer {
|
|
|
|
handler, handlerErr = s.agent.Server().StreamingRpcHandler(method)
|
|
|
|
}
|
|
|
|
|
|
|
|
if handlerErr != nil {
|
|
|
|
return nil, CodedError(500, handlerErr.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a pipe connecting the (possibly remote) handler to the http response
|
|
|
|
httpPipe, handlerPipe := net.Pipe()
|
|
|
|
decoder := codec.NewDecoder(httpPipe, structs.MsgpackHandle)
|
|
|
|
encoder := codec.NewEncoder(httpPipe, structs.MsgpackHandle)
|
|
|
|
|
|
|
|
// Create a goroutine that closes the pipe if the connection closes.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
go func() {
|
|
|
|
<-ctx.Done()
|
|
|
|
httpPipe.Close()
|
|
|
|
|
|
|
|
// don't close ws - wait to drain messages
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Create a channel that decodes the results
|
|
|
|
errCh := make(chan HTTPCodedError, 2)
|
|
|
|
|
|
|
|
// stream response
|
|
|
|
go func() {
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Send the request
|
|
|
|
if err := encoder.Encode(args); err != nil {
|
|
|
|
errCh <- CodedError(500, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
go forwardExecInput(encoder, ws, errCh)
|
|
|
|
|
|
|
|
for {
|
|
|
|
var res cstructs.StreamErrWrapper
|
|
|
|
err := decoder.Decode(&res)
|
|
|
|
if isClosedError(err) {
|
|
|
|
ws.WriteMessage(websocket.CloseMessage, websocket.FormatCloseMessage(websocket.CloseNormalClosure, ""))
|
|
|
|
errCh <- nil
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
errCh <- CodedError(500, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
decoder.Reset(httpPipe)
|
|
|
|
|
|
|
|
if err := res.Error; err != nil {
|
|
|
|
code := 500
|
|
|
|
if err.Code != nil {
|
|
|
|
code = int(*err.Code)
|
|
|
|
}
|
|
|
|
errCh <- CodedError(code, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ws.WriteMessage(websocket.TextMessage, res.Payload); err != nil {
|
|
|
|
errCh <- CodedError(500, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// start streaming request to streaming RPC - returns when streaming completes or errors
|
|
|
|
handler(handlerPipe)
|
|
|
|
// stop streaming background goroutines for streaming - but not websocket activity
|
|
|
|
cancel()
|
2021-05-24 13:46:45 +00:00
|
|
|
// retrieve any error and/or wait until goroutine stop and close errCh connection before
|
2019-04-28 21:33:25 +00:00
|
|
|
// closing websocket connection
|
|
|
|
codedErr := <-errCh
|
|
|
|
|
2021-05-24 13:46:45 +00:00
|
|
|
// we won't return an error on ws close, but at least make it available in
|
|
|
|
// the logs so we can trace spurious disconnects
|
|
|
|
s.logger.Debug("alloc exec channel closed with error", "error", codedErr)
|
|
|
|
|
2019-04-28 21:33:25 +00:00
|
|
|
if isClosedError(codedErr) {
|
|
|
|
codedErr = nil
|
|
|
|
} else if codedErr != nil {
|
|
|
|
ws.WriteMessage(websocket.CloseMessage,
|
|
|
|
websocket.FormatCloseMessage(toWsCode(codedErr.Code()), codedErr.Error()))
|
|
|
|
}
|
|
|
|
ws.Close()
|
|
|
|
|
|
|
|
return nil, codedErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func toWsCode(httpCode int) int {
|
|
|
|
switch httpCode {
|
|
|
|
case 500:
|
|
|
|
return websocket.CloseInternalServerErr
|
|
|
|
default:
|
|
|
|
// placeholder error code
|
|
|
|
return websocket.ClosePolicyViolation
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func isClosedError(err error) bool {
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return err == io.EOF ||
|
|
|
|
err == io.ErrClosedPipe ||
|
|
|
|
strings.Contains(err.Error(), "closed") ||
|
|
|
|
strings.Contains(err.Error(), "EOF")
|
|
|
|
}
|
|
|
|
|
|
|
|
// forwardExecInput forwards exec input (e.g. stdin) from websocket connection
|
|
|
|
// to the streaming RPC connection to client
|
|
|
|
func forwardExecInput(encoder *codec.Encoder, ws *websocket.Conn, errCh chan<- HTTPCodedError) {
|
|
|
|
for {
|
|
|
|
sf := &drivers.ExecTaskStreamingRequestMsg{}
|
|
|
|
err := ws.ReadJSON(sf)
|
|
|
|
if err == io.EOF {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
errCh <- CodedError(500, err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = encoder.Encode(sf)
|
|
|
|
if err != nil {
|
|
|
|
errCh <- CodedError(500, err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|