2015-08-23 22:30:16 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
2015-08-30 01:16:49 +00:00
|
|
|
"crypto/md5"
|
|
|
|
"encoding/hex"
|
2015-08-29 22:46:10 +00:00
|
|
|
"fmt"
|
2015-08-23 22:30:16 +00:00
|
|
|
"log"
|
2015-08-30 01:16:49 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2015-08-23 22:30:16 +00:00
|
|
|
"sync"
|
2015-11-03 17:24:26 +00:00
|
|
|
"time"
|
2015-08-23 22:30:16 +00:00
|
|
|
|
2016-02-07 01:08:12 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2015-08-30 01:16:49 +00:00
|
|
|
"github.com/hashicorp/nomad/client/config"
|
2015-08-23 23:49:48 +00:00
|
|
|
"github.com/hashicorp/nomad/client/driver"
|
2015-08-23 22:30:16 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2016-02-07 01:08:12 +00:00
|
|
|
"github.com/mitchellh/hashstructure"
|
2015-11-14 06:07:13 +00:00
|
|
|
|
|
|
|
cstructs "github.com/hashicorp/nomad/client/driver/structs"
|
2015-08-23 22:30:16 +00:00
|
|
|
)
|
|
|
|
|
2016-02-17 05:00:49 +00:00
|
|
|
const (
|
|
|
|
// killBackoffBaseline is the baseline time for exponential backoff while
|
|
|
|
// killing a task.
|
|
|
|
killBackoffBaseline = 5 * time.Second
|
|
|
|
|
|
|
|
// killBackoffLimit is the the limit of the exponential backoff for killing
|
|
|
|
// the task.
|
2016-03-03 00:27:01 +00:00
|
|
|
killBackoffLimit = 2 * time.Minute
|
2016-02-17 05:00:49 +00:00
|
|
|
|
|
|
|
// killFailureLimit is how many times we will attempt to kill a task before
|
|
|
|
// giving up and potentially leaking resources.
|
2016-03-03 00:27:01 +00:00
|
|
|
killFailureLimit = 5
|
2016-02-17 05:00:49 +00:00
|
|
|
)
|
|
|
|
|
2015-08-23 22:32:46 +00:00
|
|
|
// TaskRunner is used to wrap a task within an allocation and provide the execution context.
|
|
|
|
type TaskRunner struct {
|
2015-11-05 19:12:31 +00:00
|
|
|
config *config.Config
|
|
|
|
updater TaskStateUpdater
|
|
|
|
logger *log.Logger
|
|
|
|
ctx *driver.ExecContext
|
2015-12-14 22:53:49 +00:00
|
|
|
alloc *structs.Allocation
|
2015-12-18 20:17:13 +00:00
|
|
|
restartTracker *RestartTracker
|
2015-11-24 20:34:26 +00:00
|
|
|
consulService *ConsulService
|
2015-08-23 22:30:16 +00:00
|
|
|
|
2016-02-10 21:44:53 +00:00
|
|
|
task *structs.Task
|
|
|
|
updateCh chan *structs.Allocation
|
|
|
|
handle driver.DriverHandle
|
|
|
|
handleLock sync.Mutex
|
2015-08-23 22:30:16 +00:00
|
|
|
|
|
|
|
destroy bool
|
|
|
|
destroyCh chan struct{}
|
|
|
|
destroyLock sync.Mutex
|
2015-08-30 02:42:35 +00:00
|
|
|
waitCh chan struct{}
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|
|
|
|
|
2015-08-30 01:16:49 +00:00
|
|
|
// taskRunnerState is used to snapshot the state of the task runner
|
|
|
|
type taskRunnerState struct {
|
2016-02-25 03:06:30 +00:00
|
|
|
Version string
|
2015-08-30 02:14:47 +00:00
|
|
|
Task *structs.Task
|
|
|
|
HandleID string
|
2015-08-30 01:16:49 +00:00
|
|
|
}
|
|
|
|
|
2015-11-14 06:07:13 +00:00
|
|
|
// TaskStateUpdater is used to signal that tasks state has changed.
|
2016-02-02 19:09:29 +00:00
|
|
|
type TaskStateUpdater func(taskName, state string, event *structs.TaskEvent)
|
2015-08-30 02:42:35 +00:00
|
|
|
|
2015-08-23 22:32:46 +00:00
|
|
|
// NewTaskRunner is used to create a new task context
|
2015-08-30 02:42:35 +00:00
|
|
|
func NewTaskRunner(logger *log.Logger, config *config.Config,
|
|
|
|
updater TaskStateUpdater, ctx *driver.ExecContext,
|
2016-02-02 01:47:53 +00:00
|
|
|
alloc *structs.Allocation, task *structs.Task,
|
2016-02-04 00:16:48 +00:00
|
|
|
consulService *ConsulService) *TaskRunner {
|
|
|
|
|
2016-02-05 20:07:56 +00:00
|
|
|
// Merge in the task resources
|
|
|
|
task.Resources = alloc.TaskResources[task.Name]
|
|
|
|
|
2016-02-04 00:16:48 +00:00
|
|
|
// Build the restart tracker.
|
|
|
|
tg := alloc.Job.LookupTaskGroup(alloc.TaskGroup)
|
|
|
|
if tg == nil {
|
|
|
|
logger.Printf("[ERR] client: alloc '%s' for missing task group '%s'", alloc.ID, alloc.TaskGroup)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
restartTracker := newRestartTracker(tg.RestartPolicy, alloc.Job.Type)
|
2015-11-03 17:24:26 +00:00
|
|
|
|
2015-08-23 22:32:46 +00:00
|
|
|
tc := &TaskRunner{
|
2015-11-05 19:12:31 +00:00
|
|
|
config: config,
|
|
|
|
updater: updater,
|
|
|
|
logger: logger,
|
2015-11-06 00:38:19 +00:00
|
|
|
restartTracker: restartTracker,
|
2015-11-24 20:34:26 +00:00
|
|
|
consulService: consulService,
|
2015-11-05 19:12:31 +00:00
|
|
|
ctx: ctx,
|
2015-12-14 22:53:49 +00:00
|
|
|
alloc: alloc,
|
2015-11-05 19:12:31 +00:00
|
|
|
task: task,
|
2016-03-03 00:27:01 +00:00
|
|
|
updateCh: make(chan *structs.Allocation, 64),
|
2015-11-05 19:12:31 +00:00
|
|
|
destroyCh: make(chan struct{}),
|
|
|
|
waitCh: make(chan struct{}),
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|
2016-02-19 22:49:43 +00:00
|
|
|
|
|
|
|
// Set the state to pending.
|
|
|
|
tc.updater(task.Name, structs.TaskStatePending, structs.NewTaskEvent(structs.TaskReceived))
|
2015-08-23 22:30:16 +00:00
|
|
|
return tc
|
|
|
|
}
|
|
|
|
|
2015-08-29 22:46:10 +00:00
|
|
|
// WaitCh returns a channel to wait for termination
|
|
|
|
func (r *TaskRunner) WaitCh() <-chan struct{} {
|
|
|
|
return r.waitCh
|
|
|
|
}
|
|
|
|
|
2015-08-30 01:16:49 +00:00
|
|
|
// stateFilePath returns the path to our state file
|
|
|
|
func (r *TaskRunner) stateFilePath() string {
|
|
|
|
// Get the MD5 of the task name
|
|
|
|
hashVal := md5.Sum([]byte(r.task.Name))
|
|
|
|
hashHex := hex.EncodeToString(hashVal[:])
|
|
|
|
dirName := fmt.Sprintf("task-%s", hashHex)
|
|
|
|
|
|
|
|
// Generate the path
|
2015-12-14 22:53:49 +00:00
|
|
|
path := filepath.Join(r.config.StateDir, "alloc", r.alloc.ID,
|
2015-08-30 01:16:49 +00:00
|
|
|
dirName, "state.json")
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
|
|
|
|
// RestoreState is used to restore our state
|
|
|
|
func (r *TaskRunner) RestoreState() error {
|
|
|
|
// Load the snapshot
|
|
|
|
var snap taskRunnerState
|
|
|
|
if err := restoreState(r.stateFilePath(), &snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Restore fields
|
|
|
|
r.task = snap.Task
|
|
|
|
|
2015-08-30 02:14:47 +00:00
|
|
|
// Restore the driver
|
|
|
|
if snap.HandleID != "" {
|
|
|
|
driver, err := r.createDriver()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
handle, err := driver.Open(r.ctx, snap.HandleID)
|
2015-11-09 23:55:31 +00:00
|
|
|
|
|
|
|
// In the case it fails, we relaunch the task in the Run() method.
|
2015-08-30 02:14:47 +00:00
|
|
|
if err != nil {
|
|
|
|
r.logger.Printf("[ERR] client: failed to open handle to task '%s' for alloc '%s': %v",
|
2015-12-14 22:53:49 +00:00
|
|
|
r.task.Name, r.alloc.ID, err)
|
2015-11-09 23:55:31 +00:00
|
|
|
return nil
|
2015-08-30 02:14:47 +00:00
|
|
|
}
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Lock()
|
2015-08-30 02:14:47 +00:00
|
|
|
r.handle = handle
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Unlock()
|
2015-08-30 02:14:47 +00:00
|
|
|
}
|
2015-08-30 01:16:49 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SaveState is used to snapshot our state
|
|
|
|
func (r *TaskRunner) SaveState() error {
|
|
|
|
snap := taskRunnerState{
|
2016-02-25 03:06:30 +00:00
|
|
|
Task: r.task,
|
|
|
|
Version: r.config.Version,
|
2015-08-30 01:16:49 +00:00
|
|
|
}
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Lock()
|
2015-08-30 02:14:47 +00:00
|
|
|
if r.handle != nil {
|
|
|
|
snap.HandleID = r.handle.ID()
|
|
|
|
}
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Unlock()
|
2015-08-30 01:16:49 +00:00
|
|
|
return persistState(r.stateFilePath(), &snap)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DestroyState is used to cleanup after ourselves
|
|
|
|
func (r *TaskRunner) DestroyState() error {
|
|
|
|
return os.RemoveAll(r.stateFilePath())
|
|
|
|
}
|
|
|
|
|
2015-11-14 06:07:13 +00:00
|
|
|
// setState is used to update the state of the task runner
|
|
|
|
func (r *TaskRunner) setState(state string, event *structs.TaskEvent) {
|
|
|
|
// Persist our state to disk.
|
2015-11-12 23:53:42 +00:00
|
|
|
if err := r.SaveState(); err != nil {
|
|
|
|
r.logger.Printf("[ERR] client: failed to save state of Task Runner: %v", r.task.Name)
|
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
|
|
|
// Indicate the task has been updated.
|
2016-02-02 19:09:29 +00:00
|
|
|
r.updater(r.task.Name, state, event)
|
2016-02-02 01:47:53 +00:00
|
|
|
}
|
|
|
|
|
2015-08-30 02:14:47 +00:00
|
|
|
// createDriver makes a driver for the task
|
|
|
|
func (r *TaskRunner) createDriver() (driver.Driver, error) {
|
2016-03-02 00:08:21 +00:00
|
|
|
taskEnv, err := driver.GetTaskEnv(r.ctx.AllocDir, r.config.Node, r.task, r.alloc)
|
2016-01-11 17:58:26 +00:00
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("failed to create driver '%s' for alloc %s: %v",
|
|
|
|
r.task.Driver, r.alloc.ID, err)
|
|
|
|
r.logger.Printf("[ERR] client: %s", err)
|
|
|
|
return nil, err
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
driverCtx := driver.NewDriverContext(r.task.Name, r.config, r.config.Node, r.logger, taskEnv)
|
2015-09-10 01:06:23 +00:00
|
|
|
driver, err := driver.NewDriver(r.task.Driver, driverCtx)
|
2015-08-23 23:49:48 +00:00
|
|
|
if err != nil {
|
2015-08-30 02:14:47 +00:00
|
|
|
err = fmt.Errorf("failed to create driver '%s' for alloc %s: %v",
|
2015-12-14 22:53:49 +00:00
|
|
|
r.task.Driver, r.alloc.ID, err)
|
2015-08-30 02:14:47 +00:00
|
|
|
r.logger.Printf("[ERR] client: %s", err)
|
2016-01-11 17:58:26 +00:00
|
|
|
return nil, err
|
2015-08-30 02:14:47 +00:00
|
|
|
}
|
|
|
|
return driver, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run is a long running routine used to manage the task
|
|
|
|
func (r *TaskRunner) Run() {
|
|
|
|
defer close(r.waitCh)
|
|
|
|
r.logger.Printf("[DEBUG] client: starting task context for '%s' (alloc '%s')",
|
2015-12-14 22:53:49 +00:00
|
|
|
r.task.Name, r.alloc.ID)
|
2015-08-30 02:14:47 +00:00
|
|
|
|
2015-11-16 20:26:11 +00:00
|
|
|
r.run()
|
2015-11-14 06:07:13 +00:00
|
|
|
return
|
|
|
|
}
|
2015-08-23 23:49:48 +00:00
|
|
|
|
2015-11-16 20:26:11 +00:00
|
|
|
func (r *TaskRunner) run() {
|
2015-08-23 22:30:16 +00:00
|
|
|
for {
|
2016-02-29 00:56:05 +00:00
|
|
|
// Start the task if not yet started or it is being forced. This logic
|
|
|
|
// is necessary because in the case of a restore the handle already
|
|
|
|
// exists.
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Lock()
|
|
|
|
handleEmpty := r.handle == nil
|
|
|
|
r.handleLock.Unlock()
|
2016-02-29 00:56:05 +00:00
|
|
|
if handleEmpty {
|
|
|
|
startErr := r.startTask()
|
|
|
|
r.restartTracker.SetStartError(startErr)
|
|
|
|
if startErr != nil {
|
|
|
|
r.setState(structs.TaskStateDead, structs.NewTaskEvent(structs.TaskDriverFailure).SetDriverError(startErr))
|
|
|
|
goto RESTART
|
2015-08-29 22:46:10 +00:00
|
|
|
}
|
2015-11-16 20:26:11 +00:00
|
|
|
}
|
|
|
|
|
2016-02-29 00:56:05 +00:00
|
|
|
// Mark the task as started and register it with Consul.
|
|
|
|
r.setState(structs.TaskStateRunning, structs.NewTaskEvent(structs.TaskStarted))
|
2015-12-14 22:53:49 +00:00
|
|
|
r.consulService.Register(r.task, r.alloc)
|
2015-11-18 08:50:45 +00:00
|
|
|
|
2015-11-16 20:26:11 +00:00
|
|
|
// Wait for updates
|
2016-02-29 00:56:05 +00:00
|
|
|
WAIT:
|
2015-11-16 20:26:11 +00:00
|
|
|
for {
|
|
|
|
select {
|
2016-02-29 00:56:05 +00:00
|
|
|
case waitRes := <-r.handle.WaitCh():
|
|
|
|
// De-Register the services belonging to the task from consul
|
|
|
|
r.consulService.Deregister(r.task, r.alloc)
|
|
|
|
|
|
|
|
if waitRes == nil {
|
|
|
|
panic("nil wait")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Log whether the task was successful or not.
|
|
|
|
r.restartTracker.SetWaitResult(waitRes)
|
|
|
|
r.setState(structs.TaskStateDead, r.waitErrorToEvent(waitRes))
|
|
|
|
if !waitRes.Successful() {
|
|
|
|
r.logger.Printf("[INFO] client: task %q for alloc %q failed: %v", r.task.Name, r.alloc.ID, waitRes)
|
|
|
|
} else {
|
|
|
|
r.logger.Printf("[INFO] client: task %q for alloc %q completed successfully", r.task.Name, r.alloc.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
break WAIT
|
2015-11-16 20:26:11 +00:00
|
|
|
case update := <-r.updateCh:
|
2016-02-04 03:43:44 +00:00
|
|
|
if err := r.handleUpdate(update); err != nil {
|
|
|
|
r.logger.Printf("[ERR] client: update to task %q failed: %v", r.task.Name, err)
|
2015-11-16 20:26:11 +00:00
|
|
|
}
|
|
|
|
case <-r.destroyCh:
|
2016-02-17 05:00:49 +00:00
|
|
|
// Kill the task using an exponential backoff in-case of failures.
|
|
|
|
destroySuccess, err := r.handleDestroy()
|
|
|
|
if !destroySuccess {
|
|
|
|
// We couldn't successfully destroy the resource created.
|
|
|
|
r.logger.Printf("[ERR] client: failed to kill task %q. Resources may have been leaked: %v", r.task.Name, err)
|
2015-11-17 20:03:59 +00:00
|
|
|
}
|
|
|
|
|
2016-02-17 05:00:49 +00:00
|
|
|
// Store that the task has been destroyed and any associated error.
|
2016-02-29 00:56:05 +00:00
|
|
|
r.setState(structs.TaskStateDead, structs.NewTaskEvent(structs.TaskKilled).SetKillError(err))
|
|
|
|
r.consulService.Deregister(r.task, r.alloc)
|
|
|
|
return
|
2015-08-29 22:46:10 +00:00
|
|
|
}
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-02-29 00:56:05 +00:00
|
|
|
RESTART:
|
|
|
|
state, when := r.restartTracker.GetState()
|
|
|
|
switch state {
|
|
|
|
case structs.TaskNotRestarting, structs.TaskTerminated:
|
2015-12-14 22:53:49 +00:00
|
|
|
r.logger.Printf("[INFO] client: Not restarting task: %v for alloc: %v ", r.task.Name, r.alloc.ID)
|
2016-02-29 00:56:05 +00:00
|
|
|
if state == structs.TaskNotRestarting {
|
|
|
|
r.setState(structs.TaskStateDead, structs.NewTaskEvent(structs.TaskNotRestarting))
|
|
|
|
}
|
|
|
|
return
|
|
|
|
case structs.TaskRestarting:
|
|
|
|
r.logger.Printf("[INFO] client: Restarting task %q for alloc %q in %v", r.task.Name, r.alloc.ID, when)
|
|
|
|
r.setState(structs.TaskStatePending, structs.NewTaskEvent(structs.TaskRestarting).SetRestartDelay(when))
|
|
|
|
default:
|
|
|
|
r.logger.Printf("[ERR] client: restart tracker returned unknown state: %q", state)
|
2015-11-16 20:26:11 +00:00
|
|
|
return
|
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2015-11-16 20:26:11 +00:00
|
|
|
// Sleep but watch for destroy events.
|
|
|
|
select {
|
|
|
|
case <-time.After(when):
|
|
|
|
case <-r.destroyCh:
|
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2015-11-16 20:26:11 +00:00
|
|
|
// Destroyed while we were waiting to restart, so abort.
|
|
|
|
r.destroyLock.Lock()
|
2016-02-29 00:56:05 +00:00
|
|
|
destroyed := r.destroy
|
2015-11-16 20:26:11 +00:00
|
|
|
r.destroyLock.Unlock()
|
|
|
|
if destroyed {
|
|
|
|
r.logger.Printf("[DEBUG] client: Not restarting task: %v because it's destroyed by user", r.task.Name)
|
|
|
|
r.setState(structs.TaskStateDead, structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
return
|
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-02-29 00:56:05 +00:00
|
|
|
// Clear the handle so a new driver will be created.
|
2016-02-29 18:45:08 +00:00
|
|
|
r.handleLock.Lock()
|
2016-02-29 00:56:05 +00:00
|
|
|
r.handle = nil
|
2016-02-29 18:45:08 +00:00
|
|
|
r.handleLock.Unlock()
|
2015-11-16 20:26:11 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
}
|
|
|
|
|
2016-02-29 00:56:05 +00:00
|
|
|
func (r *TaskRunner) startTask() error {
|
|
|
|
// Create a driver
|
|
|
|
driver, err := r.createDriver()
|
|
|
|
if err != nil {
|
|
|
|
r.logger.Printf("[ERR] client: failed to create driver of task '%s' for alloc '%s': %v",
|
|
|
|
r.task.Name, r.alloc.ID, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start the job
|
|
|
|
handle, err := driver.Start(r.ctx, r.task)
|
|
|
|
if err != nil {
|
|
|
|
r.logger.Printf("[ERR] client: failed to start task '%s' for alloc '%s': %v",
|
|
|
|
r.task.Name, r.alloc.ID, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
r.handleLock.Lock()
|
|
|
|
r.handle = handle
|
|
|
|
r.handleLock.Unlock()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-04 03:43:44 +00:00
|
|
|
// handleUpdate takes an updated allocation and updates internal state to
|
|
|
|
// reflect the new config for the task.
|
|
|
|
func (r *TaskRunner) handleUpdate(update *structs.Allocation) error {
|
|
|
|
// Extract the task group from the alloc.
|
|
|
|
tg := update.Job.LookupTaskGroup(update.TaskGroup)
|
|
|
|
if tg == nil {
|
|
|
|
return fmt.Errorf("alloc '%s' missing task group '%s'", update.ID, update.TaskGroup)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Extract the task.
|
2016-02-07 01:08:12 +00:00
|
|
|
var updatedTask *structs.Task
|
2016-02-04 03:43:44 +00:00
|
|
|
for _, t := range tg.Tasks {
|
|
|
|
if t.Name == r.task.Name {
|
2016-02-07 01:08:12 +00:00
|
|
|
updatedTask = t
|
2016-02-04 03:43:44 +00:00
|
|
|
}
|
|
|
|
}
|
2016-02-07 01:08:12 +00:00
|
|
|
if updatedTask == nil {
|
2016-02-04 03:43:44 +00:00
|
|
|
return fmt.Errorf("task group %q doesn't contain task %q", tg.Name, r.task.Name)
|
|
|
|
}
|
2016-02-05 20:07:56 +00:00
|
|
|
|
|
|
|
// Merge in the task resources
|
2016-02-07 01:08:12 +00:00
|
|
|
updatedTask.Resources = update.TaskResources[updatedTask.Name]
|
2016-02-04 03:43:44 +00:00
|
|
|
|
|
|
|
// Update will update resources and store the new kill timeout.
|
2016-02-07 01:08:12 +00:00
|
|
|
var mErr multierror.Error
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Lock()
|
2016-02-04 03:43:44 +00:00
|
|
|
if r.handle != nil {
|
2016-02-07 01:08:12 +00:00
|
|
|
if err := r.handle.Update(updatedTask); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("updating task resources failed: %v", err))
|
2016-02-04 03:43:44 +00:00
|
|
|
}
|
|
|
|
}
|
2016-02-10 21:44:53 +00:00
|
|
|
r.handleLock.Unlock()
|
2016-02-04 03:43:44 +00:00
|
|
|
|
|
|
|
// Update the restart policy.
|
|
|
|
if r.restartTracker != nil {
|
|
|
|
r.restartTracker.SetPolicy(tg.RestartPolicy)
|
|
|
|
}
|
|
|
|
|
2016-02-07 01:08:12 +00:00
|
|
|
// Hash services returns the hash of the task's services
|
|
|
|
hashServices := func(task *structs.Task) uint64 {
|
|
|
|
h, err := hashstructure.Hash(task.Services, nil)
|
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("hashing services failed %#v: %v", task.Services, err))
|
|
|
|
}
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
|
|
|
// Re-register the task to consul if any of the services have changed.
|
|
|
|
if hashServices(updatedTask) != hashServices(r.task) {
|
|
|
|
if err := r.consulService.Register(updatedTask, update); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("updating services with consul failed: %v", err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store the updated alloc.
|
2016-02-04 03:43:44 +00:00
|
|
|
r.alloc = update
|
2016-02-07 01:08:12 +00:00
|
|
|
r.task = updatedTask
|
|
|
|
return mErr.ErrorOrNil()
|
2016-02-04 03:43:44 +00:00
|
|
|
}
|
|
|
|
|
2016-02-17 05:00:49 +00:00
|
|
|
// handleDestroy kills the task handle. In the case that killing fails,
|
|
|
|
// handleDestroy will retry with an exponential backoff and will give up at a
|
|
|
|
// given limit. It returns whether the task was destroyed and the error
|
|
|
|
// associated with the last kill attempt.
|
|
|
|
func (r *TaskRunner) handleDestroy() (destroyed bool, err error) {
|
|
|
|
// Cap the number of times we attempt to kill the task.
|
|
|
|
for i := 0; i < killFailureLimit; i++ {
|
|
|
|
if err = r.handle.Kill(); err != nil {
|
|
|
|
// Calculate the new backoff
|
|
|
|
backoff := (1 << (2 * uint64(i))) * killBackoffBaseline
|
|
|
|
if backoff > killBackoffLimit {
|
|
|
|
backoff = killBackoffLimit
|
|
|
|
}
|
|
|
|
|
|
|
|
r.logger.Printf("[ERR] client: failed to kill task '%s' for alloc %q. Retrying in %v: %v",
|
|
|
|
r.task.Name, r.alloc.ID, backoff, err)
|
|
|
|
time.Sleep(time.Duration(backoff))
|
|
|
|
} else {
|
|
|
|
// Kill was successful
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-11-14 06:07:13 +00:00
|
|
|
// Helper function for converting a WaitResult into a TaskTerminated event.
|
|
|
|
func (r *TaskRunner) waitErrorToEvent(res *cstructs.WaitResult) *structs.TaskEvent {
|
2015-11-16 22:46:18 +00:00
|
|
|
return structs.NewTaskEvent(structs.TaskTerminated).
|
|
|
|
SetExitCode(res.ExitCode).
|
|
|
|
SetSignal(res.Signal).
|
|
|
|
SetExitMessage(res.Err)
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update is used to update the task of the context
|
2016-02-04 03:43:44 +00:00
|
|
|
func (r *TaskRunner) Update(update *structs.Allocation) {
|
2015-08-23 22:30:16 +00:00
|
|
|
select {
|
2015-08-23 22:36:06 +00:00
|
|
|
case r.updateCh <- update:
|
2015-08-23 22:30:16 +00:00
|
|
|
default:
|
2015-08-29 22:46:10 +00:00
|
|
|
r.logger.Printf("[ERR] client: dropping task update '%s' (alloc '%s')",
|
2016-02-04 03:43:44 +00:00
|
|
|
r.task.Name, r.alloc.ID)
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Destroy is used to indicate that the task context should be destroyed
|
2015-08-23 22:36:06 +00:00
|
|
|
func (r *TaskRunner) Destroy() {
|
|
|
|
r.destroyLock.Lock()
|
|
|
|
defer r.destroyLock.Unlock()
|
2015-08-23 22:30:16 +00:00
|
|
|
|
2015-08-23 22:36:06 +00:00
|
|
|
if r.destroy {
|
2015-08-23 22:30:16 +00:00
|
|
|
return
|
|
|
|
}
|
2015-08-23 22:36:06 +00:00
|
|
|
r.destroy = true
|
|
|
|
close(r.destroyCh)
|
2015-08-23 22:30:16 +00:00
|
|
|
}
|