2015-06-01 15:49:10 +00:00
|
|
|
package structs
|
|
|
|
|
2015-06-05 22:21:17 +00:00
|
|
|
import (
|
|
|
|
"bytes"
|
2015-11-21 20:34:01 +00:00
|
|
|
"crypto/sha1"
|
2015-09-15 17:46:10 +00:00
|
|
|
"errors"
|
2015-06-05 22:41:03 +00:00
|
|
|
"fmt"
|
2015-11-21 20:34:01 +00:00
|
|
|
"io"
|
2015-11-16 22:25:19 +00:00
|
|
|
"reflect"
|
2015-10-11 19:50:16 +00:00
|
|
|
"regexp"
|
2015-12-18 20:26:28 +00:00
|
|
|
"strconv"
|
2015-09-16 00:38:23 +00:00
|
|
|
"strings"
|
2015-06-05 22:41:03 +00:00
|
|
|
"time"
|
2015-06-05 22:21:17 +00:00
|
|
|
|
2015-12-01 00:51:56 +00:00
|
|
|
"github.com/gorhill/cronexpr"
|
2015-06-05 22:21:17 +00:00
|
|
|
"github.com/hashicorp/go-msgpack/codec"
|
2015-09-15 17:46:10 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2015-10-11 19:50:16 +00:00
|
|
|
"github.com/hashicorp/go-version"
|
2015-11-27 03:26:00 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/args"
|
2015-12-18 20:26:28 +00:00
|
|
|
"github.com/mitchellh/copystructure"
|
2015-06-05 22:21:17 +00:00
|
|
|
)
|
|
|
|
|
2015-06-05 22:41:03 +00:00
|
|
|
var (
|
2015-12-18 20:17:13 +00:00
|
|
|
ErrNoLeader = fmt.Errorf("No cluster leader")
|
|
|
|
ErrNoRegionPath = fmt.Errorf("No path to region")
|
2015-06-05 22:41:03 +00:00
|
|
|
)
|
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
type MessageType uint8
|
|
|
|
|
|
|
|
const (
|
2015-07-07 16:51:42 +00:00
|
|
|
NodeRegisterRequestType MessageType = iota
|
|
|
|
NodeDeregisterRequestType
|
2015-07-04 01:41:36 +00:00
|
|
|
NodeUpdateStatusRequestType
|
2015-09-07 02:55:38 +00:00
|
|
|
NodeUpdateDrainRequestType
|
2015-07-07 16:51:42 +00:00
|
|
|
JobRegisterRequestType
|
|
|
|
JobDeregisterRequestType
|
2015-07-23 22:52:38 +00:00
|
|
|
EvalUpdateRequestType
|
|
|
|
EvalDeleteRequestType
|
2015-08-04 21:04:33 +00:00
|
|
|
AllocUpdateRequestType
|
2015-08-26 01:00:14 +00:00
|
|
|
AllocClientUpdateRequestType
|
2015-06-01 15:49:10 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// IgnoreUnknownTypeFlag is set along with a MessageType
|
|
|
|
// to indicate that the message type can be safely ignored
|
|
|
|
// if it is not recognized. This is for future proofing, so
|
|
|
|
// that new commands can be added in a way that won't cause
|
|
|
|
// old servers to crash when the FSM attempts to process them.
|
|
|
|
IgnoreUnknownTypeFlag MessageType = 128
|
|
|
|
)
|
2015-06-05 22:21:17 +00:00
|
|
|
|
2015-06-05 22:41:03 +00:00
|
|
|
// RPCInfo is used to describe common information about query
|
|
|
|
type RPCInfo interface {
|
|
|
|
RequestRegion() string
|
|
|
|
IsRead() bool
|
|
|
|
AllowStaleRead() bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// QueryOptions is used to specify various flags for read queries
|
|
|
|
type QueryOptions struct {
|
2015-07-03 23:04:24 +00:00
|
|
|
// The target region for this query
|
|
|
|
Region string
|
|
|
|
|
2015-06-07 18:18:59 +00:00
|
|
|
// If set, wait until query exceeds given index. Must be provided
|
|
|
|
// with MaxQueryTime.
|
|
|
|
MinQueryIndex uint64
|
|
|
|
|
|
|
|
// Provided with MinQueryIndex to wait for change.
|
|
|
|
MaxQueryTime time.Duration
|
|
|
|
|
2015-06-05 22:41:03 +00:00
|
|
|
// If set, any follower can service the request. Results
|
|
|
|
// may be arbitrarily stale.
|
|
|
|
AllowStale bool
|
2015-12-22 22:44:33 +00:00
|
|
|
|
|
|
|
// If set, used as prefix for resource list searches
|
|
|
|
Prefix string
|
2015-06-05 22:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (q QueryOptions) RequestRegion() string {
|
|
|
|
return q.Region
|
|
|
|
}
|
|
|
|
|
|
|
|
// QueryOption only applies to reads, so always true
|
|
|
|
func (q QueryOptions) IsRead() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (q QueryOptions) AllowStaleRead() bool {
|
|
|
|
return q.AllowStale
|
|
|
|
}
|
|
|
|
|
|
|
|
type WriteRequest struct {
|
2015-07-03 23:04:24 +00:00
|
|
|
// The target region for this write
|
2015-06-05 22:41:03 +00:00
|
|
|
Region string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w WriteRequest) RequestRegion() string {
|
|
|
|
// The target region for this request
|
|
|
|
return w.Region
|
|
|
|
}
|
|
|
|
|
|
|
|
// WriteRequest only applies to writes, always false
|
|
|
|
func (w WriteRequest) IsRead() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w WriteRequest) AllowStaleRead() bool {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// QueryMeta allows a query response to include potentially
|
|
|
|
// useful metadata about a query
|
|
|
|
type QueryMeta struct {
|
|
|
|
// This is the index associated with the read
|
|
|
|
Index uint64
|
|
|
|
|
|
|
|
// If AllowStale is used, this is time elapsed since
|
|
|
|
// last contact between the follower and leader. This
|
|
|
|
// can be used to gauge staleness.
|
|
|
|
LastContact time.Duration
|
|
|
|
|
|
|
|
// Used to indicate if there is a known leader node
|
|
|
|
KnownLeader bool
|
|
|
|
}
|
|
|
|
|
2016-01-13 18:19:53 +00:00
|
|
|
// WriteMeta allows a write response to include potentially
|
2015-07-03 23:04:24 +00:00
|
|
|
// useful metadata about the write
|
|
|
|
type WriteMeta struct {
|
|
|
|
// This is the index associated with the write
|
|
|
|
Index uint64
|
|
|
|
}
|
2015-06-07 18:18:59 +00:00
|
|
|
|
2015-09-07 03:31:32 +00:00
|
|
|
// NodeRegisterRequest is used for Node.Register endpoint
|
2015-06-07 18:18:59 +00:00
|
|
|
// to register a node as being a schedulable entity.
|
2015-07-07 16:51:42 +00:00
|
|
|
type NodeRegisterRequest struct {
|
2015-07-03 23:04:24 +00:00
|
|
|
Node *Node
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:31:32 +00:00
|
|
|
// NodeDeregisterRequest is used for Node.Deregister endpoint
|
2015-07-04 01:41:36 +00:00
|
|
|
// to deregister a node as being a schedulable entity.
|
2015-07-07 16:51:42 +00:00
|
|
|
type NodeDeregisterRequest struct {
|
2015-07-04 01:41:36 +00:00
|
|
|
NodeID string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:31:32 +00:00
|
|
|
// NodeUpdateStatusRequest is used for Node.UpdateStatus endpoint
|
2015-07-04 01:41:36 +00:00
|
|
|
// to update the status of a node.
|
2015-07-07 16:51:42 +00:00
|
|
|
type NodeUpdateStatusRequest struct {
|
2015-07-04 01:41:36 +00:00
|
|
|
NodeID string
|
|
|
|
Status string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-09-07 02:55:38 +00:00
|
|
|
// NodeUpdateDrainRequest is used for updatin the drain status
|
|
|
|
type NodeUpdateDrainRequest struct {
|
|
|
|
NodeID string
|
|
|
|
Drain bool
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-08-16 01:20:35 +00:00
|
|
|
// NodeEvaluateRequest is used to re-evaluate the ndoe
|
|
|
|
type NodeEvaluateRequest struct {
|
|
|
|
NodeID string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-07-06 21:23:15 +00:00
|
|
|
// NodeSpecificRequest is used when we just need to specify a target node
|
|
|
|
type NodeSpecificRequest struct {
|
|
|
|
NodeID string
|
2015-08-16 01:20:35 +00:00
|
|
|
QueryOptions
|
2015-07-06 21:23:15 +00:00
|
|
|
}
|
|
|
|
|
2015-07-07 16:51:42 +00:00
|
|
|
// JobRegisterRequest is used for Job.Register endpoint
|
|
|
|
// to register a job as being a schedulable entity.
|
|
|
|
type JobRegisterRequest struct {
|
|
|
|
Job *Job
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
// JobDeregisterRequest is used for Job.Deregister endpoint
|
|
|
|
// to deregister a job as being a schedulable entity.
|
|
|
|
type JobDeregisterRequest struct {
|
2015-07-23 22:15:48 +00:00
|
|
|
JobID string
|
2015-07-07 16:51:42 +00:00
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-08-16 01:11:26 +00:00
|
|
|
// JobEvaluateRequest is used when we just need to re-evaluate a target job
|
|
|
|
type JobEvaluateRequest struct {
|
|
|
|
JobID string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-07-23 21:41:18 +00:00
|
|
|
// JobSpecificRequest is used when we just need to specify a target job
|
|
|
|
type JobSpecificRequest struct {
|
2015-07-23 22:15:48 +00:00
|
|
|
JobID string
|
2015-08-15 19:59:10 +00:00
|
|
|
QueryOptions
|
2015-07-23 21:41:18 +00:00
|
|
|
}
|
|
|
|
|
2015-09-06 19:18:45 +00:00
|
|
|
// JobListRequest is used to parameterize a list request
|
|
|
|
type JobListRequest struct {
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2015-09-06 21:28:29 +00:00
|
|
|
// NodeListRequest is used to parameterize a list request
|
|
|
|
type NodeListRequest struct {
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2015-08-06 21:51:15 +00:00
|
|
|
// EvalUpdateRequest is used for upserting evaluations.
|
2015-07-23 22:52:38 +00:00
|
|
|
type EvalUpdateRequest struct {
|
2015-08-15 21:22:21 +00:00
|
|
|
Evals []*Evaluation
|
|
|
|
EvalToken string
|
2015-07-23 22:52:38 +00:00
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
|
|
|
// EvalDeleteRequest is used for deleting an evaluation.
|
|
|
|
type EvalDeleteRequest struct {
|
2015-08-15 23:07:22 +00:00
|
|
|
Evals []string
|
|
|
|
Allocs []string
|
2015-07-23 22:52:38 +00:00
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-07-23 23:00:19 +00:00
|
|
|
// EvalSpecificRequest is used when we just need to specify a target evaluation
|
|
|
|
type EvalSpecificRequest struct {
|
|
|
|
EvalID string
|
2015-08-16 01:20:35 +00:00
|
|
|
QueryOptions
|
2015-07-23 23:00:19 +00:00
|
|
|
}
|
|
|
|
|
2015-08-12 22:25:31 +00:00
|
|
|
// EvalAckRequest is used to Ack/Nack a specific evaluation
|
|
|
|
type EvalAckRequest struct {
|
|
|
|
EvalID string
|
|
|
|
Token string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-07-24 04:58:51 +00:00
|
|
|
// EvalDequeueRequest is used when we want to dequeue an evaluation
|
|
|
|
type EvalDequeueRequest struct {
|
|
|
|
Schedulers []string
|
|
|
|
Timeout time.Duration
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-09-06 23:01:16 +00:00
|
|
|
// EvalListRequest is used to list the evaluations
|
|
|
|
type EvalListRequest struct {
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2015-07-27 22:31:49 +00:00
|
|
|
// PlanRequest is used to submit an allocation plan to the leader
|
|
|
|
type PlanRequest struct {
|
|
|
|
Plan *Plan
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-08-04 21:04:33 +00:00
|
|
|
// AllocUpdateRequest is used to submit changes to allocations, either
|
|
|
|
// to cause evictions or to assign new allocaitons. Both can be done
|
|
|
|
// within a single transaction
|
|
|
|
type AllocUpdateRequest struct {
|
|
|
|
// Alloc is the list of new allocations to assign
|
|
|
|
Alloc []*Allocation
|
2015-08-26 01:12:51 +00:00
|
|
|
WriteRequest
|
2015-08-04 21:04:33 +00:00
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// AllocListRequest is used to request a list of allocations
|
|
|
|
type AllocListRequest struct {
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:46:45 +00:00
|
|
|
// AllocSpecificRequest is used to query a specific allocation
|
|
|
|
type AllocSpecificRequest struct {
|
|
|
|
AllocID string
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2016-02-01 21:57:35 +00:00
|
|
|
// AllocsGetcRequest is used to query a set of allocations
|
|
|
|
type AllocsGetRequest struct {
|
|
|
|
AllocIDs []string
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2016-01-13 18:19:53 +00:00
|
|
|
// PeriodicForceReqeuest is used to force a specific periodic job.
|
|
|
|
type PeriodicForceRequest struct {
|
|
|
|
JobID string
|
|
|
|
WriteRequest
|
|
|
|
}
|
|
|
|
|
2015-08-15 19:59:10 +00:00
|
|
|
// GenericRequest is used to request where no
|
|
|
|
// specific information is needed.
|
|
|
|
type GenericRequest struct {
|
|
|
|
QueryOptions
|
|
|
|
}
|
|
|
|
|
2015-07-04 01:41:36 +00:00
|
|
|
// GenericResponse is used to respond to a request where no
|
|
|
|
// specific response information is needed.
|
|
|
|
type GenericResponse struct {
|
2015-07-03 23:04:24 +00:00
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
2015-08-15 19:59:10 +00:00
|
|
|
const (
|
|
|
|
ProtocolVersion = "protocol"
|
|
|
|
APIMajorVersion = "api.major"
|
|
|
|
APIMinorVersion = "api.minor"
|
|
|
|
)
|
|
|
|
|
|
|
|
// VersionResponse is used for the Status.Version reseponse
|
|
|
|
type VersionResponse struct {
|
2015-08-15 20:08:06 +00:00
|
|
|
Build string
|
|
|
|
Versions map[string]int
|
2015-08-15 19:59:10 +00:00
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-08-06 18:48:44 +00:00
|
|
|
// JobRegisterResponse is used to respond to a job registration
|
|
|
|
type JobRegisterResponse struct {
|
|
|
|
EvalID string
|
|
|
|
EvalCreateIndex uint64
|
|
|
|
JobModifyIndex uint64
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-08-06 21:17:18 +00:00
|
|
|
// JobDeregisterResponse is used to respond to a job deregistration
|
|
|
|
type JobDeregisterResponse struct {
|
|
|
|
EvalID string
|
|
|
|
EvalCreateIndex uint64
|
|
|
|
JobModifyIndex uint64
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-08-06 23:39:20 +00:00
|
|
|
// NodeUpdateResponse is used to respond to a node update
|
|
|
|
type NodeUpdateResponse struct {
|
2015-08-23 00:37:50 +00:00
|
|
|
HeartbeatTTL time.Duration
|
2015-08-06 23:39:20 +00:00
|
|
|
EvalIDs []string
|
|
|
|
EvalCreateIndex uint64
|
|
|
|
NodeModifyIndex uint64
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:00:12 +00:00
|
|
|
// NodeDrainUpdateResponse is used to respond to a node drain update
|
|
|
|
type NodeDrainUpdateResponse struct {
|
|
|
|
EvalIDs []string
|
|
|
|
EvalCreateIndex uint64
|
|
|
|
NodeModifyIndex uint64
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-08-23 02:17:49 +00:00
|
|
|
// NodeAllocsResponse is used to return allocs for a single node
|
|
|
|
type NodeAllocsResponse struct {
|
|
|
|
Allocs []*Allocation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2016-01-29 14:29:52 +00:00
|
|
|
// NodeClientAllocsResponse is used to return allocs meta data for a single node
|
|
|
|
type NodeClientAllocsResponse struct {
|
|
|
|
Allocs map[string]uint64
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-07-06 21:23:15 +00:00
|
|
|
// SingleNodeResponse is used to return a single node
|
|
|
|
type SingleNodeResponse struct {
|
|
|
|
Node *Node
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 21:28:29 +00:00
|
|
|
// JobListResponse is used for a list request
|
|
|
|
type NodeListResponse struct {
|
|
|
|
Nodes []*NodeListStub
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-07-23 21:41:18 +00:00
|
|
|
// SingleJobResponse is used to return a single job
|
|
|
|
type SingleJobResponse struct {
|
|
|
|
Job *Job
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 19:18:45 +00:00
|
|
|
// JobListResponse is used for a list request
|
|
|
|
type JobListResponse struct {
|
|
|
|
Jobs []*JobListStub
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:46:45 +00:00
|
|
|
// SingleAllocResponse is used to return a single allocation
|
|
|
|
type SingleAllocResponse struct {
|
|
|
|
Alloc *Allocation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2016-02-01 21:57:35 +00:00
|
|
|
// AllocsGetResponse is used to return a set of allocations
|
|
|
|
type AllocsGetResponse struct {
|
|
|
|
Allocs []*Allocation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 19:18:45 +00:00
|
|
|
// JobAllocationsResponse is used to return the allocations for a job
|
|
|
|
type JobAllocationsResponse struct {
|
2015-09-06 23:14:41 +00:00
|
|
|
Allocations []*AllocListStub
|
2015-09-06 19:18:45 +00:00
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
// JobEvaluationsResponse is used to return the evaluations for a job
|
|
|
|
type JobEvaluationsResponse struct {
|
|
|
|
Evaluations []*Evaluation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-07-23 23:00:19 +00:00
|
|
|
// SingleEvalResponse is used to return a single evaluation
|
|
|
|
type SingleEvalResponse struct {
|
|
|
|
Eval *Evaluation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-08-12 22:25:31 +00:00
|
|
|
// EvalDequeueResponse is used to return from a dequeue
|
|
|
|
type EvalDequeueResponse struct {
|
|
|
|
Eval *Evaluation
|
|
|
|
Token string
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-07-27 22:31:49 +00:00
|
|
|
// PlanResponse is used to return from a PlanRequest
|
|
|
|
type PlanResponse struct {
|
|
|
|
Result *PlanResult
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// AllocListResponse is used for a list request
|
|
|
|
type AllocListResponse struct {
|
|
|
|
Allocations []*AllocListStub
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 23:01:16 +00:00
|
|
|
// EvalListResponse is used for a list request
|
|
|
|
type EvalListResponse struct {
|
|
|
|
Evaluations []*Evaluation
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2015-09-06 23:14:41 +00:00
|
|
|
// EvalAllocationsResponse is used to return the allocations for an evaluation
|
|
|
|
type EvalAllocationsResponse struct {
|
|
|
|
Allocations []*AllocListStub
|
|
|
|
QueryMeta
|
|
|
|
}
|
|
|
|
|
2016-01-13 18:19:53 +00:00
|
|
|
// PeriodicForceResponse is used to respond to a periodic job force launch
|
|
|
|
type PeriodicForceResponse struct {
|
|
|
|
EvalID string
|
|
|
|
EvalCreateIndex uint64
|
|
|
|
WriteMeta
|
|
|
|
}
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
const (
|
|
|
|
NodeStatusInit = "initializing"
|
|
|
|
NodeStatusReady = "ready"
|
|
|
|
NodeStatusDown = "down"
|
|
|
|
)
|
|
|
|
|
2015-08-13 23:40:51 +00:00
|
|
|
// ShouldDrainNode checks if a given node status should trigger an
|
2015-08-06 23:39:20 +00:00
|
|
|
// evaluation. Some states don't require any further action.
|
2015-08-13 23:40:51 +00:00
|
|
|
func ShouldDrainNode(status string) bool {
|
2015-08-06 23:39:20 +00:00
|
|
|
switch status {
|
2015-09-07 02:47:02 +00:00
|
|
|
case NodeStatusInit, NodeStatusReady:
|
2015-08-06 23:39:20 +00:00
|
|
|
return false
|
2015-09-07 02:47:02 +00:00
|
|
|
case NodeStatusDown:
|
2015-08-06 23:39:20 +00:00
|
|
|
return true
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unhandled node status %s", status))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ValidNodeStatus is used to check if a node status is valid
|
|
|
|
func ValidNodeStatus(status string) bool {
|
|
|
|
switch status {
|
2015-09-07 02:47:02 +00:00
|
|
|
case NodeStatusInit, NodeStatusReady, NodeStatusDown:
|
2015-08-06 23:39:20 +00:00
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-03 23:04:24 +00:00
|
|
|
// Node is a representation of a schedulable client node
|
|
|
|
type Node struct {
|
|
|
|
// ID is a unique identifier for the node. It can be constructed
|
|
|
|
// by doing a concatenation of the Name and Datacenter as a simple
|
|
|
|
// approach. Alternatively a UUID may be used.
|
|
|
|
ID string
|
|
|
|
|
2015-06-07 18:18:59 +00:00
|
|
|
// Datacenter for this node
|
|
|
|
Datacenter string
|
|
|
|
|
2015-06-07 19:14:41 +00:00
|
|
|
// Node name
|
2015-07-03 23:04:24 +00:00
|
|
|
Name string
|
2015-06-07 18:18:59 +00:00
|
|
|
|
2016-01-27 19:06:48 +00:00
|
|
|
// HTTPAddr is the address on which the Nomad client is listening for http
|
|
|
|
// requests
|
2016-01-26 22:31:52 +00:00
|
|
|
HTTPAddr string
|
|
|
|
|
2015-06-07 18:18:59 +00:00
|
|
|
// Attributes is an arbitrary set of key/value
|
|
|
|
// data that can be used for constraints. Examples
|
2015-08-28 08:30:47 +00:00
|
|
|
// include "kernel.name=linux", "arch=386", "driver.docker=1",
|
2015-07-03 23:04:24 +00:00
|
|
|
// "docker.runtime=1.8.3"
|
2015-07-06 20:01:10 +00:00
|
|
|
Attributes map[string]string
|
2015-06-07 18:18:59 +00:00
|
|
|
|
|
|
|
// Resources is the available resources on the client.
|
|
|
|
// For example 'cpu=2' 'memory=2048'
|
2015-07-06 20:01:10 +00:00
|
|
|
Resources *Resources
|
2015-06-07 18:18:59 +00:00
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Reserved is the set of resources that are reserved,
|
|
|
|
// and should be subtracted from the total resources for
|
|
|
|
// the purposes of scheduling. This may be provide certain
|
|
|
|
// high-watermark tolerances or because of external schedulers
|
|
|
|
// consuming resources.
|
|
|
|
Reserved *Resources
|
|
|
|
|
2015-06-07 18:18:59 +00:00
|
|
|
// Links are used to 'link' this client to external
|
|
|
|
// systems. For example 'consul=foo.dc1' 'aws=i-83212'
|
|
|
|
// 'ami=ami-123'
|
2015-07-06 20:01:10 +00:00
|
|
|
Links map[string]string
|
2015-06-07 18:18:59 +00:00
|
|
|
|
|
|
|
// Meta is used to associate arbitrary metadata with this
|
|
|
|
// client. This is opaque to Nomad.
|
|
|
|
Meta map[string]string
|
|
|
|
|
2015-07-04 00:37:01 +00:00
|
|
|
// NodeClass is an opaque identifier used to group nodes
|
|
|
|
// together for the purpose of determining scheduling pressure.
|
|
|
|
NodeClass string
|
|
|
|
|
2016-01-21 01:30:02 +00:00
|
|
|
// ComputedClass is a unique id that identifies nodes with a common set of
|
|
|
|
// attributes and capabilities.
|
2016-01-30 01:46:44 +00:00
|
|
|
ComputedClass string
|
2016-01-21 01:30:02 +00:00
|
|
|
|
2015-09-07 02:47:02 +00:00
|
|
|
// Drain is controlled by the servers, and not the client.
|
|
|
|
// If true, no jobs will be scheduled to this node, and existing
|
|
|
|
// allocations will be drained.
|
|
|
|
Drain bool
|
|
|
|
|
2015-07-03 23:04:24 +00:00
|
|
|
// Status of this node
|
|
|
|
Status string
|
2015-07-04 00:50:54 +00:00
|
|
|
|
2015-08-15 20:08:06 +00:00
|
|
|
// StatusDescription is meant to provide more human useful information
|
|
|
|
StatusDescription string
|
|
|
|
|
2015-07-04 00:50:54 +00:00
|
|
|
// Raft Indexes
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
2015-06-07 18:18:59 +00:00
|
|
|
}
|
|
|
|
|
2016-02-10 21:44:53 +00:00
|
|
|
func (n *Node) Copy() *Node {
|
2016-02-11 01:54:43 +00:00
|
|
|
if n == nil {
|
2016-02-10 21:44:53 +00:00
|
|
|
return nil
|
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
nn := new(Node)
|
|
|
|
*nn = *n
|
|
|
|
nn.Attributes = CopyMapStringString(nn.Attributes)
|
|
|
|
nn.Resources = nn.Resources.Copy()
|
|
|
|
nn.Reserved = nn.Reserved.Copy()
|
|
|
|
nn.Links = CopyMapStringString(nn.Links)
|
|
|
|
nn.Meta = CopyMapStringString(nn.Meta)
|
|
|
|
return nn
|
2016-02-10 21:44:53 +00:00
|
|
|
}
|
|
|
|
|
2015-08-23 00:17:13 +00:00
|
|
|
// TerminalStatus returns if the current status is terminal and
|
|
|
|
// will no longer transition.
|
|
|
|
func (n *Node) TerminalStatus() bool {
|
|
|
|
switch n.Status {
|
|
|
|
case NodeStatusDown:
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// Stub returns a summarized version of the node
|
|
|
|
func (n *Node) Stub() *NodeListStub {
|
|
|
|
return &NodeListStub{
|
|
|
|
ID: n.ID,
|
|
|
|
Datacenter: n.Datacenter,
|
|
|
|
Name: n.Name,
|
|
|
|
NodeClass: n.NodeClass,
|
2015-09-07 02:47:02 +00:00
|
|
|
Drain: n.Drain,
|
2015-09-06 22:34:28 +00:00
|
|
|
Status: n.Status,
|
|
|
|
StatusDescription: n.StatusDescription,
|
|
|
|
CreateIndex: n.CreateIndex,
|
|
|
|
ModifyIndex: n.ModifyIndex,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NodeListStub is used to return a subset of job information
|
|
|
|
// for the job list
|
|
|
|
type NodeListStub struct {
|
|
|
|
ID string
|
|
|
|
Datacenter string
|
|
|
|
Name string
|
|
|
|
NodeClass string
|
2015-09-07 02:47:02 +00:00
|
|
|
Drain bool
|
2015-09-06 22:34:28 +00:00
|
|
|
Status string
|
|
|
|
StatusDescription string
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
}
|
|
|
|
|
2015-06-07 18:18:59 +00:00
|
|
|
// Resources is used to define the resources available
|
|
|
|
// on a client
|
|
|
|
type Resources struct {
|
2015-09-23 18:14:32 +00:00
|
|
|
CPU int
|
2015-09-15 00:43:42 +00:00
|
|
|
MemoryMB int `mapstructure:"memory"`
|
|
|
|
DiskMB int `mapstructure:"disk"`
|
2015-07-03 23:57:48 +00:00
|
|
|
IOPS int
|
2016-01-21 19:25:14 +00:00
|
|
|
Networks []*NetworkResource
|
2015-06-07 18:18:59 +00:00
|
|
|
}
|
|
|
|
|
2016-02-02 20:00:26 +00:00
|
|
|
// DefaultResources returns the minimum resources a task can use and be valid.
|
|
|
|
func DefaultResources() *Resources {
|
|
|
|
return &Resources{
|
|
|
|
CPU: 100,
|
|
|
|
MemoryMB: 10,
|
2016-02-12 02:15:55 +00:00
|
|
|
DiskMB: 300,
|
2016-02-03 00:13:25 +00:00
|
|
|
IOPS: 0,
|
2016-02-02 20:00:26 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-02 20:07:16 +00:00
|
|
|
// Merge merges this resource with another resource.
|
2016-02-02 20:00:26 +00:00
|
|
|
func (r *Resources) Merge(other *Resources) {
|
|
|
|
if other.CPU != 0 {
|
|
|
|
r.CPU = other.CPU
|
|
|
|
}
|
|
|
|
if other.MemoryMB != 0 {
|
|
|
|
r.MemoryMB = other.MemoryMB
|
|
|
|
}
|
|
|
|
if other.DiskMB != 0 {
|
|
|
|
r.DiskMB = other.DiskMB
|
|
|
|
}
|
|
|
|
if other.IOPS != 0 {
|
|
|
|
r.IOPS = other.IOPS
|
|
|
|
}
|
|
|
|
if len(other.Networks) != 0 {
|
|
|
|
r.Networks = other.Networks
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-02 20:07:16 +00:00
|
|
|
// MeetsMinResources returns an error if the resources specified are less than
|
|
|
|
// the minimum allowed.
|
2016-02-02 20:00:26 +00:00
|
|
|
func (r *Resources) MeetsMinResources() error {
|
|
|
|
var mErr multierror.Error
|
2016-02-16 18:25:45 +00:00
|
|
|
if r.CPU < 20 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum CPU value is 20; got %d", r.CPU))
|
2016-02-02 20:00:26 +00:00
|
|
|
}
|
|
|
|
if r.MemoryMB < 10 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum MemoryMB value is 10; got %d", r.MemoryMB))
|
|
|
|
}
|
|
|
|
if r.DiskMB < 10 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum DiskMB value is 10; got %d", r.DiskMB))
|
|
|
|
}
|
2016-02-02 21:26:12 +00:00
|
|
|
if r.IOPS < 0 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum IOPS value is 0; got %d", r.IOPS))
|
2016-02-02 20:00:26 +00:00
|
|
|
}
|
2016-02-02 20:07:16 +00:00
|
|
|
for i, n := range r.Networks {
|
|
|
|
if err := n.MeetsMinResources(); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("network resource at index %d failed: %v", i, err))
|
|
|
|
}
|
|
|
|
}
|
2016-02-02 20:00:26 +00:00
|
|
|
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-09-13 21:30:45 +00:00
|
|
|
// Copy returns a deep copy of the resources
|
|
|
|
func (r *Resources) Copy() *Resources {
|
2016-02-11 01:54:43 +00:00
|
|
|
if r == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-13 21:30:45 +00:00
|
|
|
newR := new(Resources)
|
|
|
|
*newR = *r
|
|
|
|
n := len(r.Networks)
|
|
|
|
newR.Networks = make([]*NetworkResource, n)
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
newR.Networks[i] = r.Networks[i].Copy()
|
|
|
|
}
|
|
|
|
return newR
|
|
|
|
}
|
|
|
|
|
2015-09-13 22:04:36 +00:00
|
|
|
// NetIndex finds the matching net index using device name
|
2015-09-13 00:04:09 +00:00
|
|
|
func (r *Resources) NetIndex(n *NetworkResource) int {
|
2015-08-05 00:23:42 +00:00
|
|
|
for idx, net := range r.Networks {
|
2015-09-13 22:04:36 +00:00
|
|
|
if net.Device == n.Device {
|
2015-09-12 23:21:57 +00:00
|
|
|
return idx
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -1
|
|
|
|
}
|
|
|
|
|
2015-08-05 00:32:57 +00:00
|
|
|
// Superset checks if one set of resources is a superset
|
2015-09-13 21:59:34 +00:00
|
|
|
// of another. This ignores network resources, and the NetworkIndex
|
|
|
|
// should be used for that.
|
2015-09-14 01:38:11 +00:00
|
|
|
func (r *Resources) Superset(other *Resources) (bool, string) {
|
2015-08-05 00:32:57 +00:00
|
|
|
if r.CPU < other.CPU {
|
2015-09-14 01:38:11 +00:00
|
|
|
return false, "cpu exhausted"
|
2015-08-05 00:32:57 +00:00
|
|
|
}
|
|
|
|
if r.MemoryMB < other.MemoryMB {
|
2015-09-14 01:38:11 +00:00
|
|
|
return false, "memory exhausted"
|
2015-08-05 00:32:57 +00:00
|
|
|
}
|
|
|
|
if r.DiskMB < other.DiskMB {
|
2015-09-14 01:38:11 +00:00
|
|
|
return false, "disk exhausted"
|
2015-08-05 00:32:57 +00:00
|
|
|
}
|
|
|
|
if r.IOPS < other.IOPS {
|
2015-09-14 01:38:11 +00:00
|
|
|
return false, "iops exhausted"
|
2015-08-05 00:32:57 +00:00
|
|
|
}
|
2015-09-14 01:38:11 +00:00
|
|
|
return true, ""
|
2015-08-05 00:32:57 +00:00
|
|
|
}
|
|
|
|
|
2015-08-05 00:41:02 +00:00
|
|
|
// Add adds the resources of the delta to this, potentially
|
|
|
|
// returning an error if not possible.
|
|
|
|
func (r *Resources) Add(delta *Resources) error {
|
|
|
|
if delta == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
r.CPU += delta.CPU
|
|
|
|
r.MemoryMB += delta.MemoryMB
|
|
|
|
r.DiskMB += delta.DiskMB
|
|
|
|
r.IOPS += delta.IOPS
|
|
|
|
|
2015-09-12 23:33:41 +00:00
|
|
|
for _, n := range delta.Networks {
|
|
|
|
// Find the matching interface by IP or CIDR
|
2015-09-13 00:04:09 +00:00
|
|
|
idx := r.NetIndex(n)
|
2015-08-05 00:41:02 +00:00
|
|
|
if idx == -1 {
|
2015-09-13 23:40:53 +00:00
|
|
|
r.Networks = append(r.Networks, n.Copy())
|
2015-09-12 23:33:41 +00:00
|
|
|
} else {
|
|
|
|
r.Networks[idx].Add(n)
|
2015-08-05 00:41:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-15 00:43:42 +00:00
|
|
|
func (r *Resources) GoString() string {
|
|
|
|
return fmt.Sprintf("*%#v", *r)
|
|
|
|
}
|
|
|
|
|
2015-11-14 02:09:42 +00:00
|
|
|
type Port struct {
|
|
|
|
Label string
|
|
|
|
Value int `mapstructure:"static"`
|
|
|
|
}
|
|
|
|
|
2015-09-24 06:56:25 +00:00
|
|
|
// NetworkResource is used to represent available network
|
2015-07-03 23:57:48 +00:00
|
|
|
// resources
|
2015-06-07 18:18:59 +00:00
|
|
|
type NetworkResource struct {
|
2015-11-14 02:09:42 +00:00
|
|
|
Device string // Name of the device
|
|
|
|
CIDR string // CIDR block of addresses
|
|
|
|
IP string // IP address
|
|
|
|
MBits int // Throughput
|
|
|
|
ReservedPorts []Port // Reserved ports
|
|
|
|
DynamicPorts []Port // Dynamically assigned ports
|
2015-07-03 23:57:48 +00:00
|
|
|
}
|
|
|
|
|
2016-02-02 20:07:16 +00:00
|
|
|
// MeetsMinResources returns an error if the resources specified are less than
|
|
|
|
// the minimum allowed.
|
|
|
|
func (n *NetworkResource) MeetsMinResources() error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
if n.MBits < 1 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum MBits value is 1; got %d", n.MBits))
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-09-13 21:30:45 +00:00
|
|
|
// Copy returns a deep copy of the network resource
|
|
|
|
func (n *NetworkResource) Copy() *NetworkResource {
|
2016-02-11 01:54:43 +00:00
|
|
|
if n == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-13 21:30:45 +00:00
|
|
|
newR := new(NetworkResource)
|
|
|
|
*newR = *n
|
2015-09-14 01:38:11 +00:00
|
|
|
if n.ReservedPorts != nil {
|
2015-11-14 02:09:42 +00:00
|
|
|
newR.ReservedPorts = make([]Port, len(n.ReservedPorts))
|
2015-09-14 01:38:11 +00:00
|
|
|
copy(newR.ReservedPorts, n.ReservedPorts)
|
|
|
|
}
|
2015-11-24 00:32:30 +00:00
|
|
|
if n.DynamicPorts != nil {
|
|
|
|
newR.DynamicPorts = make([]Port, len(n.DynamicPorts))
|
|
|
|
copy(newR.DynamicPorts, n.DynamicPorts)
|
|
|
|
}
|
2015-09-13 21:30:45 +00:00
|
|
|
return newR
|
|
|
|
}
|
|
|
|
|
2015-08-05 00:41:02 +00:00
|
|
|
// Add adds the resources of the delta to this, potentially
|
|
|
|
// returning an error if not possible.
|
|
|
|
func (n *NetworkResource) Add(delta *NetworkResource) {
|
|
|
|
if len(delta.ReservedPorts) > 0 {
|
|
|
|
n.ReservedPorts = append(n.ReservedPorts, delta.ReservedPorts...)
|
|
|
|
}
|
|
|
|
n.MBits += delta.MBits
|
2015-09-22 20:33:16 +00:00
|
|
|
n.DynamicPorts = append(n.DynamicPorts, delta.DynamicPorts...)
|
2015-08-05 00:41:02 +00:00
|
|
|
}
|
|
|
|
|
2015-09-15 01:27:37 +00:00
|
|
|
func (n *NetworkResource) GoString() string {
|
|
|
|
return fmt.Sprintf("*%#v", *n)
|
|
|
|
}
|
|
|
|
|
2015-11-20 03:08:21 +00:00
|
|
|
func (n *NetworkResource) MapLabelToValues(port_map map[string]int) map[string]int {
|
2015-11-15 09:13:42 +00:00
|
|
|
labelValues := make(map[string]int)
|
|
|
|
ports := append(n.ReservedPorts, n.DynamicPorts...)
|
|
|
|
for _, port := range ports {
|
2015-11-20 03:08:21 +00:00
|
|
|
if mapping, ok := port_map[port.Label]; ok {
|
|
|
|
labelValues[port.Label] = mapping
|
|
|
|
} else {
|
|
|
|
labelValues[port.Label] = port.Value
|
|
|
|
}
|
2015-11-15 09:13:42 +00:00
|
|
|
}
|
|
|
|
return labelValues
|
|
|
|
}
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
const (
|
2015-08-15 19:38:58 +00:00
|
|
|
// JobTypeNomad is reserved for internal system tasks and is
|
|
|
|
// always handled by the CoreScheduler.
|
|
|
|
JobTypeCore = "_core"
|
2015-07-03 23:57:48 +00:00
|
|
|
JobTypeService = "service"
|
|
|
|
JobTypeBatch = "batch"
|
2015-10-14 23:43:06 +00:00
|
|
|
JobTypeSystem = "system"
|
2015-07-03 23:57:48 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2016-01-08 04:08:14 +00:00
|
|
|
JobStatusPending = "pending" // Pending means the job is waiting on scheduling
|
|
|
|
JobStatusRunning = "running" // Running means the job has non-terminal allocations
|
|
|
|
JobStatusDead = "dead" // Dead means all evaluation's and allocations are terminal
|
2015-07-03 23:57:48 +00:00
|
|
|
)
|
|
|
|
|
2015-08-06 18:48:44 +00:00
|
|
|
const (
|
|
|
|
// JobMinPriority is the minimum allowed priority
|
|
|
|
JobMinPriority = 1
|
|
|
|
|
|
|
|
// JobDefaultPriority is the default priority if not
|
|
|
|
// not specified.
|
|
|
|
JobDefaultPriority = 50
|
|
|
|
|
|
|
|
// JobMaxPriority is the maximum allowed priority
|
|
|
|
JobMaxPriority = 100
|
2015-08-15 22:15:00 +00:00
|
|
|
|
|
|
|
// Ensure CoreJobPriority is higher than any user
|
|
|
|
// specified job so that it gets priority. This is important
|
|
|
|
// for the system to remain healthy.
|
|
|
|
CoreJobPriority = JobMaxPriority * 2
|
2015-08-06 18:48:44 +00:00
|
|
|
)
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Job is the scope of a scheduling request to Nomad. It is the largest
|
|
|
|
// scoped object, and is a named collection of task groups. Each task group
|
|
|
|
// is further composed of tasks. A task group (TG) is the unit of scheduling
|
|
|
|
// however.
|
|
|
|
type Job struct {
|
2015-09-15 17:46:10 +00:00
|
|
|
// Region is the Nomad region that handles scheduling this job
|
|
|
|
Region string
|
|
|
|
|
|
|
|
// ID is a unique identifier for the job per region. It can be
|
|
|
|
// specified hierarchically like LineOfBiz/OrgName/Team/Project
|
2015-07-23 22:15:48 +00:00
|
|
|
ID string
|
|
|
|
|
2015-12-18 20:26:28 +00:00
|
|
|
// ParentID is the unique identifier of the job that spawned this job.
|
|
|
|
ParentID string
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Name is the logical name of the job used to refer to it. This is unique
|
|
|
|
// per region, but not unique globally.
|
|
|
|
Name string
|
|
|
|
|
|
|
|
// Type is used to control various behaviors about the job. Most jobs
|
|
|
|
// are service jobs, meaning they are expected to be long lived.
|
|
|
|
// Some jobs are batch oriented meaning they run and then terminate.
|
|
|
|
// This can be extended in the future to support custom schedulers.
|
|
|
|
Type string
|
|
|
|
|
|
|
|
// Priority is used to control scheduling importance and if this job
|
|
|
|
// can preempt other jobs.
|
|
|
|
Priority int
|
|
|
|
|
|
|
|
// AllAtOnce is used to control if incremental scheduling of task groups
|
|
|
|
// is allowed or if we must do a gang scheduling of the entire job. This
|
|
|
|
// can slow down larger jobs if resources are not available.
|
2015-09-15 00:43:42 +00:00
|
|
|
AllAtOnce bool `mapstructure:"all_at_once"`
|
2015-07-03 23:57:48 +00:00
|
|
|
|
2015-08-13 21:02:39 +00:00
|
|
|
// Datacenters contains all the datacenters this job is allowed to span
|
|
|
|
Datacenters []string
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Constraints can be specified at a job level and apply to
|
|
|
|
// all the task groups and tasks.
|
|
|
|
Constraints []*Constraint
|
|
|
|
|
|
|
|
// TaskGroups are the collections of task groups that this job needs
|
|
|
|
// to run. Each task group is an atomic unit of scheduling and placement.
|
|
|
|
TaskGroups []*TaskGroup
|
|
|
|
|
2015-09-07 22:08:50 +00:00
|
|
|
// Update is used to control the update strategy
|
|
|
|
Update UpdateStrategy
|
|
|
|
|
2015-12-01 00:51:56 +00:00
|
|
|
// Periodic is used to define the interval the job is run at.
|
2015-12-01 16:40:32 +00:00
|
|
|
Periodic *PeriodicConfig
|
2015-12-01 00:51:56 +00:00
|
|
|
|
2015-12-15 03:20:57 +00:00
|
|
|
// GC is used to mark the job as available for garbage collection after it
|
|
|
|
// has no outstanding evaluations or allocations.
|
2015-12-15 21:07:25 +00:00
|
|
|
GC bool
|
2015-12-15 03:20:57 +00:00
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Meta is used to associate arbitrary metadata with this
|
|
|
|
// job. This is opaque to Nomad.
|
|
|
|
Meta map[string]string
|
|
|
|
|
|
|
|
// Job status
|
|
|
|
Status string
|
2015-07-04 00:50:54 +00:00
|
|
|
|
2015-08-15 20:08:06 +00:00
|
|
|
// StatusDescription is meant to provide more human useful information
|
|
|
|
StatusDescription string
|
|
|
|
|
2015-07-04 00:50:54 +00:00
|
|
|
// Raft Indexes
|
2016-01-12 17:50:33 +00:00
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
JobModifyIndex uint64
|
2015-07-03 23:57:48 +00:00
|
|
|
}
|
|
|
|
|
2015-12-15 03:20:57 +00:00
|
|
|
// InitFields is used to initialize fields in the Job. This should be called
|
|
|
|
// when registering a Job.
|
|
|
|
func (j *Job) InitFields() {
|
2015-12-18 20:17:13 +00:00
|
|
|
for _, tg := range j.TaskGroups {
|
|
|
|
tg.InitFields(j)
|
|
|
|
}
|
2015-12-16 01:30:50 +00:00
|
|
|
|
|
|
|
// If the job is batch then make it GC.
|
|
|
|
if j.Type == JobTypeBatch {
|
|
|
|
j.GC = true
|
|
|
|
}
|
2015-12-15 03:20:57 +00:00
|
|
|
}
|
|
|
|
|
2015-12-18 20:26:28 +00:00
|
|
|
// Copy returns a deep copy of the Job. It is expected that callers use recover.
|
|
|
|
// This job can panic if the deep copy failed as it uses reflection.
|
|
|
|
func (j *Job) Copy() *Job {
|
2016-02-11 01:54:43 +00:00
|
|
|
if j == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
nj := new(Job)
|
|
|
|
*nj = *j
|
|
|
|
nj.Datacenters = CopySliceString(nj.Datacenters)
|
2016-02-11 17:08:20 +00:00
|
|
|
nj.Constraints = CopySliceConstraints(nj.Constraints)
|
2015-12-18 20:26:28 +00:00
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
tgs := make([]*TaskGroup, len(nj.TaskGroups))
|
|
|
|
for i, tg := range nj.TaskGroups {
|
|
|
|
tgs[i] = tg.Copy()
|
|
|
|
}
|
|
|
|
nj.TaskGroups = tgs
|
|
|
|
|
|
|
|
nj.Periodic = nj.Periodic.Copy()
|
|
|
|
nj.Meta = CopyMapStringString(nj.Meta)
|
|
|
|
return nj
|
2015-12-18 20:26:28 +00:00
|
|
|
}
|
|
|
|
|
2015-09-15 17:46:10 +00:00
|
|
|
// Validate is used to sanity check a job input
|
|
|
|
func (j *Job) Validate() error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
if j.Region == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job region"))
|
|
|
|
}
|
|
|
|
if j.ID == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job ID"))
|
2015-09-16 00:38:23 +00:00
|
|
|
} else if strings.Contains(j.ID, " ") {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Job ID contains a space"))
|
2015-09-15 17:46:10 +00:00
|
|
|
}
|
|
|
|
if j.Name == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job name"))
|
|
|
|
}
|
|
|
|
if j.Type == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job type"))
|
|
|
|
}
|
|
|
|
if j.Priority < JobMinPriority || j.Priority > JobMaxPriority {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Job priority must be between [%d, %d]", JobMinPriority, JobMaxPriority))
|
|
|
|
}
|
|
|
|
if len(j.Datacenters) == 0 {
|
2015-09-25 19:27:31 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job datacenters"))
|
2015-09-15 17:46:10 +00:00
|
|
|
}
|
|
|
|
if len(j.TaskGroups) == 0 {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing job task groups"))
|
|
|
|
}
|
2015-10-11 19:50:16 +00:00
|
|
|
for idx, constr := range j.Constraints {
|
|
|
|
if err := constr.Validate(); err != nil {
|
|
|
|
outer := fmt.Errorf("Constraint %d validation failed: %s", idx+1, err)
|
|
|
|
mErr.Errors = append(mErr.Errors, outer)
|
|
|
|
}
|
|
|
|
}
|
2015-09-15 17:46:10 +00:00
|
|
|
|
|
|
|
// Check for duplicate task groups
|
|
|
|
taskGroups := make(map[string]int)
|
|
|
|
for idx, tg := range j.TaskGroups {
|
|
|
|
if tg.Name == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Job task group %d missing name", idx+1))
|
|
|
|
} else if existing, ok := taskGroups[tg.Name]; ok {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Job task group %d redefines '%s' from group %d", idx+1, tg.Name, existing+1))
|
|
|
|
} else {
|
|
|
|
taskGroups[tg.Name] = idx
|
|
|
|
}
|
2015-10-16 21:15:01 +00:00
|
|
|
|
|
|
|
if j.Type == "system" && tg.Count != 1 {
|
|
|
|
mErr.Errors = append(mErr.Errors,
|
|
|
|
fmt.Errorf("Job task group %d has count %d. Only count of 1 is supported with system scheduler",
|
|
|
|
idx+1, tg.Count))
|
|
|
|
}
|
2015-09-15 18:23:03 +00:00
|
|
|
}
|
2015-09-15 17:46:10 +00:00
|
|
|
|
2015-09-15 18:23:03 +00:00
|
|
|
// Validate the task group
|
|
|
|
for idx, tg := range j.TaskGroups {
|
2015-09-15 17:46:10 +00:00
|
|
|
if err := tg.Validate(); err != nil {
|
2015-09-21 00:08:57 +00:00
|
|
|
outer := fmt.Errorf("Task group %d validation failed: %s", idx+1, err)
|
|
|
|
mErr.Errors = append(mErr.Errors, outer)
|
2015-09-15 17:46:10 +00:00
|
|
|
}
|
|
|
|
}
|
2015-12-01 00:51:56 +00:00
|
|
|
|
|
|
|
// Validate periodic is only used with batch jobs.
|
2015-12-04 23:10:08 +00:00
|
|
|
if j.IsPeriodic() {
|
|
|
|
if j.Type != JobTypeBatch {
|
|
|
|
mErr.Errors = append(mErr.Errors,
|
|
|
|
fmt.Errorf("Periodic can only be used with %q scheduler", JobTypeBatch))
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := j.Periodic.Validate(); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2015-12-01 00:51:56 +00:00
|
|
|
}
|
|
|
|
|
2015-09-15 17:46:10 +00:00
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-08-23 23:49:48 +00:00
|
|
|
// LookupTaskGroup finds a task group by name
|
2015-08-30 02:14:47 +00:00
|
|
|
func (j *Job) LookupTaskGroup(name string) *TaskGroup {
|
2015-08-23 23:49:48 +00:00
|
|
|
for _, tg := range j.TaskGroups {
|
|
|
|
if tg.Name == name {
|
|
|
|
return tg
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// Stub is used to return a summary of the job
|
|
|
|
func (j *Job) Stub() *JobListStub {
|
|
|
|
return &JobListStub{
|
|
|
|
ID: j.ID,
|
2016-01-07 22:43:55 +00:00
|
|
|
ParentID: j.ParentID,
|
2015-09-06 22:34:28 +00:00
|
|
|
Name: j.Name,
|
|
|
|
Type: j.Type,
|
|
|
|
Priority: j.Priority,
|
|
|
|
Status: j.Status,
|
|
|
|
StatusDescription: j.StatusDescription,
|
|
|
|
CreateIndex: j.CreateIndex,
|
|
|
|
ModifyIndex: j.ModifyIndex,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-01 16:40:32 +00:00
|
|
|
// IsPeriodic returns whether a job is periodic.
|
|
|
|
func (j *Job) IsPeriodic() bool {
|
|
|
|
return j.Periodic != nil
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// JobListStub is used to return a subset of job information
|
|
|
|
// for the job list
|
|
|
|
type JobListStub struct {
|
|
|
|
ID string
|
2016-01-07 22:43:55 +00:00
|
|
|
ParentID string
|
2015-09-06 22:34:28 +00:00
|
|
|
Name string
|
|
|
|
Type string
|
|
|
|
Priority int
|
|
|
|
Status string
|
|
|
|
StatusDescription string
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
}
|
|
|
|
|
2015-09-07 22:08:50 +00:00
|
|
|
// UpdateStrategy is used to modify how updates are done
|
|
|
|
type UpdateStrategy struct {
|
|
|
|
// Stagger is the amount of time between the updates
|
|
|
|
Stagger time.Duration
|
|
|
|
|
|
|
|
// MaxParallel is how many updates can be done in parallel
|
2015-09-20 21:18:21 +00:00
|
|
|
MaxParallel int `mapstructure:"max_parallel"`
|
2015-09-07 22:08:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Rolling returns if a rolling strategy should be used
|
|
|
|
func (u *UpdateStrategy) Rolling() bool {
|
|
|
|
return u.Stagger > 0 && u.MaxParallel > 0
|
|
|
|
}
|
|
|
|
|
2015-12-01 00:51:56 +00:00
|
|
|
const (
|
|
|
|
// PeriodicSpecCron is used for a cron spec.
|
|
|
|
PeriodicSpecCron = "cron"
|
2015-12-18 20:26:28 +00:00
|
|
|
|
|
|
|
// PeriodicSpecTest is only used by unit tests. It is a sorted, comma
|
2015-12-21 21:55:26 +00:00
|
|
|
// seperated list of unix timestamps at which to launch.
|
2015-12-16 21:46:09 +00:00
|
|
|
PeriodicSpecTest = "_internal_test"
|
2015-12-01 00:51:56 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Periodic defines the interval a job should be run at.
|
|
|
|
type PeriodicConfig struct {
|
|
|
|
// Enabled determines if the job should be run periodically.
|
|
|
|
Enabled bool
|
|
|
|
|
|
|
|
// Spec specifies the interval the job should be run as. It is parsed based
|
|
|
|
// on the SpecType.
|
|
|
|
Spec string
|
|
|
|
|
|
|
|
// SpecType defines the format of the spec.
|
|
|
|
SpecType string
|
2016-01-07 19:19:46 +00:00
|
|
|
|
|
|
|
// ProhibitOverlap enforces that spawned jobs do not run in parallel.
|
|
|
|
ProhibitOverlap bool `mapstructure:"prohibit_overlap"`
|
2015-12-01 00:51:56 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (p *PeriodicConfig) Copy() *PeriodicConfig {
|
|
|
|
if p == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
np := new(PeriodicConfig)
|
|
|
|
*np = *p
|
|
|
|
return np
|
|
|
|
}
|
|
|
|
|
2015-12-01 00:51:56 +00:00
|
|
|
func (p *PeriodicConfig) Validate() error {
|
|
|
|
if !p.Enabled {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-12-01 00:56:44 +00:00
|
|
|
if p.Spec == "" {
|
|
|
|
return fmt.Errorf("Must specify a spec")
|
2015-12-01 00:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
switch p.SpecType {
|
|
|
|
case PeriodicSpecCron:
|
|
|
|
// Validate the cron spec
|
|
|
|
if _, err := cronexpr.Parse(p.Spec); err != nil {
|
|
|
|
return fmt.Errorf("Invalid cron spec %q: %v", p.Spec, err)
|
|
|
|
}
|
2015-12-18 20:26:28 +00:00
|
|
|
case PeriodicSpecTest:
|
|
|
|
// No-op
|
2015-12-01 00:51:56 +00:00
|
|
|
default:
|
2015-12-24 01:50:50 +00:00
|
|
|
return fmt.Errorf("Unknown periodic specification type %q", p.SpecType)
|
2015-12-01 00:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next returns the closest time instant matching the spec that is after the
|
|
|
|
// passed time. If no matching instance exists, the zero value of time.Time is
|
|
|
|
// returned. The `time.Location` of the returned value matches that of the
|
|
|
|
// passed time.
|
|
|
|
func (p *PeriodicConfig) Next(fromTime time.Time) time.Time {
|
|
|
|
switch p.SpecType {
|
|
|
|
case PeriodicSpecCron:
|
|
|
|
if e, err := cronexpr.Parse(p.Spec); err == nil {
|
|
|
|
return e.Next(fromTime)
|
|
|
|
}
|
2015-12-18 20:26:28 +00:00
|
|
|
case PeriodicSpecTest:
|
|
|
|
split := strings.Split(p.Spec, ",")
|
|
|
|
if len(split) == 1 && split[0] == "" {
|
|
|
|
return time.Time{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse the times
|
|
|
|
times := make([]time.Time, len(split))
|
|
|
|
for i, s := range split {
|
|
|
|
unix, err := strconv.Atoi(s)
|
|
|
|
if err != nil {
|
|
|
|
return time.Time{}
|
|
|
|
}
|
|
|
|
|
2015-12-21 21:55:26 +00:00
|
|
|
times[i] = time.Unix(int64(unix), 0)
|
2015-12-18 20:26:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Find the next match
|
|
|
|
for _, next := range times {
|
|
|
|
if fromTime.Before(next) {
|
|
|
|
return next
|
|
|
|
}
|
|
|
|
}
|
2015-12-01 00:51:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return time.Time{}
|
|
|
|
}
|
|
|
|
|
2016-01-07 22:24:25 +00:00
|
|
|
const (
|
|
|
|
// PeriodicLaunchSuffix is the string appended to the periodic jobs ID
|
|
|
|
// when launching derived instances of it.
|
|
|
|
PeriodicLaunchSuffix = "/periodic-"
|
|
|
|
)
|
|
|
|
|
2015-12-19 01:51:30 +00:00
|
|
|
// PeriodicLaunch tracks the last launch time of a periodic job.
|
|
|
|
type PeriodicLaunch struct {
|
|
|
|
ID string // ID of the periodic job.
|
|
|
|
Launch time.Time // The last launch time.
|
2015-12-16 21:46:09 +00:00
|
|
|
|
|
|
|
// Raft Indexes
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
2015-12-19 01:51:30 +00:00
|
|
|
}
|
|
|
|
|
2015-12-18 20:17:13 +00:00
|
|
|
var (
|
|
|
|
defaultServiceJobRestartPolicy = RestartPolicy{
|
2016-02-02 23:08:07 +00:00
|
|
|
Delay: 15 * time.Second,
|
|
|
|
Attempts: 2,
|
|
|
|
Interval: 1 * time.Minute,
|
|
|
|
Mode: RestartPolicyModeDelay,
|
2015-12-18 20:17:13 +00:00
|
|
|
}
|
|
|
|
defaultBatchJobRestartPolicy = RestartPolicy{
|
2016-02-02 23:08:07 +00:00
|
|
|
Delay: 15 * time.Second,
|
|
|
|
Attempts: 15,
|
|
|
|
Interval: 7 * 24 * time.Hour,
|
|
|
|
Mode: RestartPolicyModeDelay,
|
2015-12-18 20:17:13 +00:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// RestartPolicyModeDelay causes an artificial delay till the next interval is
|
|
|
|
// reached when the specified attempts have been reached in the interval.
|
|
|
|
RestartPolicyModeDelay = "delay"
|
|
|
|
|
|
|
|
// RestartPolicyModeFail causes a job to fail if the specified number of
|
|
|
|
// attempts are reached within an interval.
|
|
|
|
RestartPolicyModeFail = "fail"
|
|
|
|
)
|
|
|
|
|
|
|
|
// RestartPolicy configures how Tasks are restarted when they crash or fail.
|
2015-10-30 22:51:39 +00:00
|
|
|
type RestartPolicy struct {
|
2015-12-18 20:17:13 +00:00
|
|
|
// Attempts is the number of restart that will occur in an interval.
|
2015-10-30 22:51:39 +00:00
|
|
|
Attempts int
|
2015-12-18 20:17:13 +00:00
|
|
|
|
|
|
|
// Interval is a duration in which we can limit the number of restarts
|
|
|
|
// within.
|
2015-10-30 22:51:39 +00:00
|
|
|
Interval time.Duration
|
2015-12-18 20:17:13 +00:00
|
|
|
|
|
|
|
// Delay is the time between a failure and a restart.
|
|
|
|
Delay time.Duration
|
|
|
|
|
|
|
|
// Mode controls what happens when the task restarts more than attempt times
|
|
|
|
// in an interval.
|
|
|
|
Mode string
|
2015-10-30 22:51:39 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (r *RestartPolicy) Copy() *RestartPolicy {
|
|
|
|
if r == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
nrp := new(RestartPolicy)
|
|
|
|
*nrp = *r
|
|
|
|
return nrp
|
|
|
|
}
|
|
|
|
|
2015-10-30 22:51:39 +00:00
|
|
|
func (r *RestartPolicy) Validate() error {
|
2015-12-18 20:17:13 +00:00
|
|
|
switch r.Mode {
|
|
|
|
case RestartPolicyModeDelay, RestartPolicyModeFail:
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("Unsupported restart mode: %q", r.Mode)
|
|
|
|
}
|
|
|
|
|
2016-02-02 22:32:30 +00:00
|
|
|
// Check for ambiguous/confusing settings
|
|
|
|
if r.Attempts == 0 && r.Mode != RestartPolicyModeFail {
|
|
|
|
return fmt.Errorf("Restart policy %q with %d attempts is ambiguous", r.Mode, r.Attempts)
|
|
|
|
}
|
|
|
|
|
2015-11-17 07:56:11 +00:00
|
|
|
if r.Interval == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
2015-10-30 22:51:39 +00:00
|
|
|
if time.Duration(r.Attempts)*r.Delay > r.Interval {
|
|
|
|
return fmt.Errorf("Nomad can't restart the TaskGroup %v times in an interval of %v with a delay of %v", r.Attempts, r.Interval, r.Delay)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewRestartPolicy(jobType string) *RestartPolicy {
|
2015-11-02 21:35:51 +00:00
|
|
|
switch jobType {
|
2015-11-06 20:38:25 +00:00
|
|
|
case JobTypeService, JobTypeSystem:
|
2015-11-03 01:00:17 +00:00
|
|
|
rp := defaultServiceJobRestartPolicy
|
|
|
|
return &rp
|
2015-11-02 21:35:51 +00:00
|
|
|
case JobTypeBatch:
|
2015-11-03 21:54:29 +00:00
|
|
|
rp := defaultBatchJobRestartPolicy
|
2015-11-03 01:00:17 +00:00
|
|
|
return &rp
|
2015-10-30 22:51:39 +00:00
|
|
|
}
|
2015-11-03 01:00:17 +00:00
|
|
|
return nil
|
2015-10-30 22:51:39 +00:00
|
|
|
}
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// TaskGroup is an atomic unit of placement. Each task group belongs to
|
|
|
|
// a job and may contain any number of tasks. A task group support running
|
|
|
|
// in many replicas using the same configuration..
|
|
|
|
type TaskGroup struct {
|
|
|
|
// Name of the task group
|
|
|
|
Name string
|
|
|
|
|
|
|
|
// Count is the number of replicas of this task group that should
|
|
|
|
// be scheduled.
|
|
|
|
Count int
|
|
|
|
|
|
|
|
// Constraints can be specified at a task group level and apply to
|
|
|
|
// all the tasks contained.
|
|
|
|
Constraints []*Constraint
|
|
|
|
|
2015-10-30 22:51:39 +00:00
|
|
|
//RestartPolicy of a TaskGroup
|
|
|
|
RestartPolicy *RestartPolicy
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Tasks are the collection of tasks that this task group needs to run
|
|
|
|
Tasks []*Task
|
|
|
|
|
|
|
|
// Meta is used to associate arbitrary metadata with this
|
|
|
|
// task group. This is opaque to Nomad.
|
|
|
|
Meta map[string]string
|
|
|
|
}
|
|
|
|
|
2016-02-04 05:22:18 +00:00
|
|
|
func (tg *TaskGroup) Copy() *TaskGroup {
|
2016-02-11 01:54:43 +00:00
|
|
|
if tg == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
ntg := new(TaskGroup)
|
|
|
|
*ntg = *tg
|
2016-02-11 17:08:20 +00:00
|
|
|
ntg.Constraints = CopySliceConstraints(ntg.Constraints)
|
2016-02-11 01:54:43 +00:00
|
|
|
|
|
|
|
ntg.RestartPolicy = ntg.RestartPolicy.Copy()
|
|
|
|
|
|
|
|
tasks := make([]*Task, len(ntg.Tasks))
|
|
|
|
for i, t := range ntg.Tasks {
|
|
|
|
tasks[i] = t.Copy()
|
2016-02-04 05:22:18 +00:00
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
ntg.Tasks = tasks
|
2016-02-04 05:22:18 +00:00
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
ntg.Meta = CopyMapStringString(ntg.Meta)
|
|
|
|
return ntg
|
2016-02-04 05:22:18 +00:00
|
|
|
}
|
|
|
|
|
2015-12-18 20:17:13 +00:00
|
|
|
// InitFields is used to initialize fields in the TaskGroup.
|
|
|
|
func (tg *TaskGroup) InitFields(job *Job) {
|
|
|
|
// Set the default restart policy.
|
|
|
|
if tg.RestartPolicy == nil {
|
|
|
|
tg.RestartPolicy = NewRestartPolicy(job.Type)
|
|
|
|
}
|
|
|
|
|
2015-11-27 03:26:00 +00:00
|
|
|
for _, task := range tg.Tasks {
|
2015-12-18 20:17:13 +00:00
|
|
|
task.InitFields(job, tg)
|
2015-11-27 03:26:00 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-15 17:46:10 +00:00
|
|
|
// Validate is used to sanity check a task group
|
|
|
|
func (tg *TaskGroup) Validate() error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
if tg.Name == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing task group name"))
|
|
|
|
}
|
2015-09-15 18:23:03 +00:00
|
|
|
if tg.Count <= 0 {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Task group count must be positive"))
|
2015-09-15 17:46:10 +00:00
|
|
|
}
|
|
|
|
if len(tg.Tasks) == 0 {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing tasks for task group"))
|
|
|
|
}
|
2015-10-11 19:50:16 +00:00
|
|
|
for idx, constr := range tg.Constraints {
|
|
|
|
if err := constr.Validate(); err != nil {
|
|
|
|
outer := fmt.Errorf("Constraint %d validation failed: %s", idx+1, err)
|
|
|
|
mErr.Errors = append(mErr.Errors, outer)
|
|
|
|
}
|
|
|
|
}
|
2015-09-15 17:46:10 +00:00
|
|
|
|
2015-11-11 23:10:39 +00:00
|
|
|
if tg.RestartPolicy != nil {
|
|
|
|
if err := tg.RestartPolicy.Validate(); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Task Group %v should have a restart policy", tg.Name))
|
2015-10-30 22:51:39 +00:00
|
|
|
}
|
|
|
|
|
2015-09-15 17:46:10 +00:00
|
|
|
// Check for duplicate tasks
|
|
|
|
tasks := make(map[string]int)
|
|
|
|
for idx, task := range tg.Tasks {
|
|
|
|
if task.Name == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Task %d missing name", idx+1))
|
|
|
|
} else if existing, ok := tasks[task.Name]; ok {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Task %d redefines '%s' from task %d", idx+1, task.Name, existing+1))
|
|
|
|
} else {
|
|
|
|
tasks[task.Name] = idx
|
|
|
|
}
|
2015-09-15 18:23:03 +00:00
|
|
|
}
|
2015-09-15 17:46:10 +00:00
|
|
|
|
2015-09-15 18:23:03 +00:00
|
|
|
// Validate the tasks
|
|
|
|
for idx, task := range tg.Tasks {
|
2015-09-15 17:46:10 +00:00
|
|
|
if err := task.Validate(); err != nil {
|
2015-09-21 00:08:57 +00:00
|
|
|
outer := fmt.Errorf("Task %d validation failed: %s", idx+1, err)
|
|
|
|
mErr.Errors = append(mErr.Errors, outer)
|
2015-09-15 17:46:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-09-07 19:23:34 +00:00
|
|
|
// LookupTask finds a task by name
|
|
|
|
func (tg *TaskGroup) LookupTask(name string) *Task {
|
|
|
|
for _, t := range tg.Tasks {
|
|
|
|
if t.Name == name {
|
|
|
|
return t
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-15 00:43:42 +00:00
|
|
|
func (tg *TaskGroup) GoString() string {
|
|
|
|
return fmt.Sprintf("*%#v", *tg)
|
|
|
|
}
|
|
|
|
|
2015-11-17 21:36:59 +00:00
|
|
|
const (
|
|
|
|
ServiceCheckHTTP = "http"
|
|
|
|
ServiceCheckTCP = "tcp"
|
|
|
|
ServiceCheckDocker = "docker"
|
|
|
|
ServiceCheckScript = "script"
|
|
|
|
)
|
|
|
|
|
2015-11-17 07:20:35 +00:00
|
|
|
// The ServiceCheck data model represents the consul health check that
|
|
|
|
// Nomad registers for a Task
|
|
|
|
type ServiceCheck struct {
|
2015-11-17 21:42:24 +00:00
|
|
|
Name string // Name of the check, defaults to id
|
|
|
|
Type string // Type of the check - tcp, http, docker and script
|
|
|
|
Script string // Script to invoke for script check
|
2015-11-18 21:02:25 +00:00
|
|
|
Path string // path of the health check url for http type check
|
2015-11-17 22:25:23 +00:00
|
|
|
Protocol string // Protocol to use if check is http, defaults to http
|
2015-11-17 21:42:24 +00:00
|
|
|
Interval time.Duration // Interval of the check
|
|
|
|
Timeout time.Duration // Timeout of the response from the check before consul fails the check
|
2015-11-17 07:20:35 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (sc *ServiceCheck) Copy() *ServiceCheck {
|
|
|
|
if sc == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
nsc := new(ServiceCheck)
|
|
|
|
*nsc = *sc
|
|
|
|
return nsc
|
|
|
|
}
|
|
|
|
|
2015-11-17 21:36:59 +00:00
|
|
|
func (sc *ServiceCheck) Validate() error {
|
|
|
|
t := strings.ToLower(sc.Type)
|
2015-11-18 21:02:25 +00:00
|
|
|
if t != ServiceCheckTCP && t != ServiceCheckHTTP {
|
2016-01-08 02:03:44 +00:00
|
|
|
return fmt.Errorf("service check must be either http or tcp type")
|
2015-11-18 21:02:25 +00:00
|
|
|
}
|
|
|
|
if sc.Type == ServiceCheckHTTP && sc.Path == "" {
|
2016-01-08 02:03:44 +00:00
|
|
|
return fmt.Errorf("service checks of http type must have a valid http path")
|
2015-11-17 22:25:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if sc.Type == ServiceCheckScript && sc.Script == "" {
|
2016-01-08 02:03:44 +00:00
|
|
|
return fmt.Errorf("service checks of script type must have a valid script path")
|
|
|
|
}
|
|
|
|
|
|
|
|
if sc.Interval <= 0 {
|
|
|
|
return fmt.Errorf("service checks must have positive time intervals")
|
2015-11-17 22:25:23 +00:00
|
|
|
}
|
2015-11-17 21:36:59 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-12-14 23:57:56 +00:00
|
|
|
func (sc *ServiceCheck) Hash(serviceID string) string {
|
2015-11-21 20:34:01 +00:00
|
|
|
h := sha1.New()
|
2015-12-14 23:57:56 +00:00
|
|
|
io.WriteString(h, serviceID)
|
2015-11-21 20:34:01 +00:00
|
|
|
io.WriteString(h, sc.Name)
|
|
|
|
io.WriteString(h, sc.Type)
|
|
|
|
io.WriteString(h, sc.Script)
|
|
|
|
io.WriteString(h, sc.Path)
|
|
|
|
io.WriteString(h, sc.Path)
|
|
|
|
io.WriteString(h, sc.Protocol)
|
|
|
|
io.WriteString(h, sc.Interval.String())
|
|
|
|
io.WriteString(h, sc.Timeout.String())
|
|
|
|
return fmt.Sprintf("%x", h.Sum(nil))
|
|
|
|
}
|
|
|
|
|
2015-12-11 22:03:52 +00:00
|
|
|
const (
|
2015-12-14 19:14:22 +00:00
|
|
|
NomadConsulPrefix = "nomad-registered-service"
|
2015-12-11 22:03:52 +00:00
|
|
|
)
|
|
|
|
|
2015-11-17 07:20:35 +00:00
|
|
|
// The Service model represents a Consul service defintion
|
|
|
|
type Service struct {
|
2015-11-26 01:44:57 +00:00
|
|
|
Name string // Name of the service, defaults to id
|
|
|
|
Tags []string // List of tags for the service
|
|
|
|
PortLabel string `mapstructure:"port"` // port for the service
|
|
|
|
Checks []*ServiceCheck // List of checks associated with the service
|
2015-11-17 07:20:35 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (s *Service) Copy() *Service {
|
|
|
|
if s == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
ns := new(Service)
|
|
|
|
*ns = *s
|
|
|
|
ns.Tags = CopySliceString(ns.Tags)
|
|
|
|
|
2016-02-11 17:08:20 +00:00
|
|
|
var checks []*ServiceCheck
|
|
|
|
if l := len(ns.Checks); l != 0 {
|
|
|
|
checks = make([]*ServiceCheck, len(ns.Checks))
|
|
|
|
for i, c := range ns.Checks {
|
|
|
|
checks[i] = c.Copy()
|
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
}
|
|
|
|
ns.Checks = checks
|
|
|
|
return ns
|
|
|
|
}
|
|
|
|
|
2015-12-11 00:04:04 +00:00
|
|
|
// InitFields interpolates values of Job, Task Group and Task in the Service
|
|
|
|
// Name. This also generates check names, service id and check ids.
|
|
|
|
func (s *Service) InitFields(job string, taskGroup string, task string) {
|
|
|
|
s.Name = args.ReplaceEnv(s.Name, map[string]string{
|
|
|
|
"JOB": job,
|
|
|
|
"TASKGROUP": taskGroup,
|
|
|
|
"TASK": task,
|
|
|
|
"BASE": fmt.Sprintf("%s-%s-%s", job, taskGroup, task),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
for _, check := range s.Checks {
|
|
|
|
if check.Name == "" {
|
2015-12-11 00:47:43 +00:00
|
|
|
check.Name = fmt.Sprintf("service: %q check", s.Name)
|
2015-12-11 00:04:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate checks if the Check definition is valid
|
2015-11-17 21:36:59 +00:00
|
|
|
func (s *Service) Validate() error {
|
|
|
|
var mErr multierror.Error
|
2016-02-05 22:42:35 +00:00
|
|
|
|
|
|
|
// Ensure the name does not have a period in it.
|
|
|
|
// RFC-2782: https://tools.ietf.org/html/rfc2782
|
|
|
|
if strings.Contains(s.Name, ".") {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("service name can't contain periods: %q", s.Name))
|
|
|
|
}
|
|
|
|
|
2015-11-17 21:36:59 +00:00
|
|
|
for _, c := range s.Checks {
|
|
|
|
if err := c.Validate(); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-12-11 00:04:04 +00:00
|
|
|
// Hash calculates the hash of the check based on it's content and the service
|
|
|
|
// which owns it
|
2015-11-23 07:27:59 +00:00
|
|
|
func (s *Service) Hash() string {
|
|
|
|
h := sha1.New()
|
|
|
|
io.WriteString(h, s.Name)
|
|
|
|
io.WriteString(h, strings.Join(s.Tags, ""))
|
|
|
|
io.WriteString(h, s.PortLabel)
|
|
|
|
return fmt.Sprintf("%x", h.Sum(nil))
|
|
|
|
}
|
|
|
|
|
2015-12-23 00:10:30 +00:00
|
|
|
const (
|
|
|
|
// DefaultKillTimeout is the default timeout between signaling a task it
|
|
|
|
// will be killed and killing it.
|
|
|
|
DefaultKillTimeout = 5 * time.Second
|
|
|
|
)
|
|
|
|
|
2016-02-05 07:28:01 +00:00
|
|
|
// LogConfig provides configuration for log rotation
|
|
|
|
type LogConfig struct {
|
|
|
|
MaxFiles int `mapstructure:"max_files"`
|
|
|
|
MaxFileSizeMB int `mapstructure:"max_file_size"`
|
|
|
|
}
|
|
|
|
|
2016-02-11 00:44:31 +00:00
|
|
|
func DefaultLogConfig() *LogConfig {
|
|
|
|
return &LogConfig{
|
|
|
|
MaxFiles: 10,
|
|
|
|
MaxFileSizeMB: 10,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-11 22:44:35 +00:00
|
|
|
// Validate returns an error if the log config specified are less than
|
2016-02-05 07:28:01 +00:00
|
|
|
// the minimum allowed.
|
2016-02-11 22:44:35 +00:00
|
|
|
func (l *LogConfig) Validate() error {
|
2016-02-05 07:28:01 +00:00
|
|
|
var mErr multierror.Error
|
2016-02-11 22:44:35 +00:00
|
|
|
if l.MaxFiles < 1 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum number of files is 1; got %d", l.MaxFiles))
|
2016-02-05 07:28:01 +00:00
|
|
|
}
|
2016-02-11 22:44:35 +00:00
|
|
|
if l.MaxFileSizeMB < 1 {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("minimum file size is 1MB; got %d", l.MaxFileSizeMB))
|
2016-02-05 07:28:01 +00:00
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Task is a single process typically that is executed as part of a task group.
|
|
|
|
type Task struct {
|
|
|
|
// Name of the task
|
|
|
|
Name string
|
|
|
|
|
|
|
|
// Driver is used to control which driver is used
|
|
|
|
Driver string
|
|
|
|
|
|
|
|
// Config is provided to the driver to initialize
|
2015-11-14 02:09:42 +00:00
|
|
|
Config map[string]interface{}
|
2015-07-03 23:57:48 +00:00
|
|
|
|
2015-09-30 16:18:43 +00:00
|
|
|
// Map of environment variables to be used by the driver
|
|
|
|
Env map[string]string
|
|
|
|
|
2015-11-17 07:20:35 +00:00
|
|
|
// List of service definitions exposed by the Task
|
2015-11-18 08:50:45 +00:00
|
|
|
Services []*Service
|
2015-11-17 06:37:09 +00:00
|
|
|
|
2015-07-03 23:57:48 +00:00
|
|
|
// Constraints can be specified at a task level and apply only to
|
|
|
|
// the particular task.
|
|
|
|
Constraints []*Constraint
|
|
|
|
|
|
|
|
// Resources is the resources needed by this task
|
|
|
|
Resources *Resources
|
|
|
|
|
|
|
|
// Meta is used to associate arbitrary metadata with this
|
|
|
|
// task. This is opaque to Nomad.
|
|
|
|
Meta map[string]string
|
2015-12-23 00:10:30 +00:00
|
|
|
|
|
|
|
// KillTimeout is the time between signaling a task that it will be
|
|
|
|
// killed and killing it.
|
|
|
|
KillTimeout time.Duration `mapstructure:"kill_timeout"`
|
2016-02-05 07:28:01 +00:00
|
|
|
|
|
|
|
// LogConfig provides configuration for log rotation
|
|
|
|
LogConfig *LogConfig `mapstructure:"logs"`
|
2015-07-03 23:57:48 +00:00
|
|
|
}
|
|
|
|
|
2016-02-10 21:44:53 +00:00
|
|
|
func (t *Task) Copy() *Task {
|
2016-02-11 01:54:43 +00:00
|
|
|
if t == nil {
|
2016-02-10 21:44:53 +00:00
|
|
|
return nil
|
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
nt := new(Task)
|
|
|
|
*nt = *t
|
|
|
|
nt.Env = CopyMapStringString(nt.Env)
|
|
|
|
|
|
|
|
services := make([]*Service, len(nt.Services))
|
|
|
|
for i, s := range nt.Services {
|
|
|
|
services[i] = s.Copy()
|
|
|
|
}
|
|
|
|
nt.Services = services
|
2016-02-11 17:08:20 +00:00
|
|
|
nt.Constraints = CopySliceConstraints(nt.Constraints)
|
2016-02-11 01:54:43 +00:00
|
|
|
|
|
|
|
nt.Resources = nt.Resources.Copy()
|
|
|
|
nt.Meta = CopyMapStringString(nt.Meta)
|
|
|
|
|
|
|
|
if i, err := copystructure.Copy(nt.Config); err != nil {
|
|
|
|
nt.Config = i.(map[string]interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
return nt
|
2016-02-10 21:44:53 +00:00
|
|
|
}
|
|
|
|
|
2015-12-18 20:17:13 +00:00
|
|
|
// InitFields initializes fields in the task.
|
|
|
|
func (t *Task) InitFields(job *Job, tg *TaskGroup) {
|
|
|
|
t.InitServiceFields(job.Name, tg.Name)
|
2015-12-23 00:10:30 +00:00
|
|
|
|
|
|
|
// Set the default timeout if it is not specified.
|
|
|
|
if t.KillTimeout == 0 {
|
|
|
|
t.KillTimeout = DefaultKillTimeout
|
|
|
|
}
|
2015-12-18 20:17:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// InitServiceFields interpolates values of Job, Task Group
|
2015-12-11 00:04:04 +00:00
|
|
|
// and Tasks in all the service Names of a Task. This also generates the service
|
|
|
|
// id, check id and check names.
|
2015-12-18 20:17:13 +00:00
|
|
|
func (t *Task) InitServiceFields(job string, taskGroup string) {
|
2015-11-27 03:26:00 +00:00
|
|
|
for _, service := range t.Services {
|
2015-12-11 00:04:04 +00:00
|
|
|
service.InitFields(job, taskGroup, t.Name)
|
2015-11-27 03:26:00 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-15 00:43:42 +00:00
|
|
|
func (t *Task) GoString() string {
|
|
|
|
return fmt.Sprintf("*%#v", *t)
|
|
|
|
}
|
|
|
|
|
2015-11-25 02:39:38 +00:00
|
|
|
func (t *Task) FindHostAndPortFor(portLabel string) (string, int) {
|
|
|
|
for _, network := range t.Resources.Networks {
|
|
|
|
if p, ok := network.MapLabelToValues(nil)[portLabel]; ok {
|
|
|
|
return network.IP, p
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return "", 0
|
|
|
|
}
|
|
|
|
|
2015-11-12 23:28:22 +00:00
|
|
|
// Set of possible states for a task.
|
|
|
|
const (
|
|
|
|
TaskStatePending = "pending" // The task is waiting to be run.
|
|
|
|
TaskStateRunning = "running" // The task is currently running.
|
|
|
|
TaskStateDead = "dead" // Terminal state of task.
|
|
|
|
)
|
|
|
|
|
|
|
|
// TaskState tracks the current state of a task and events that caused state
|
|
|
|
// transistions.
|
|
|
|
type TaskState struct {
|
|
|
|
// The current state of the task.
|
|
|
|
State string
|
|
|
|
|
|
|
|
// Series of task events that transistion the state of the task.
|
|
|
|
Events []*TaskEvent
|
|
|
|
}
|
|
|
|
|
2016-02-02 01:47:53 +00:00
|
|
|
func (ts *TaskState) Copy() *TaskState {
|
2016-02-11 01:54:43 +00:00
|
|
|
if ts == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2016-02-02 01:47:53 +00:00
|
|
|
copy := new(TaskState)
|
|
|
|
copy.State = ts.State
|
|
|
|
copy.Events = make([]*TaskEvent, len(ts.Events))
|
|
|
|
for i, e := range ts.Events {
|
|
|
|
copy.Events[i] = e.Copy()
|
|
|
|
}
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
2015-11-12 23:28:22 +00:00
|
|
|
const (
|
|
|
|
// A Driver failure indicates that the task could not be started due to a
|
|
|
|
// failure in the driver.
|
2015-11-14 22:13:32 +00:00
|
|
|
TaskDriverFailure = "Driver Failure"
|
2015-11-12 23:28:22 +00:00
|
|
|
|
2016-02-19 22:49:43 +00:00
|
|
|
// Task Received signals that the task has been pulled by the client at the
|
|
|
|
// given timestamp.
|
|
|
|
TaskReceived = "Received"
|
|
|
|
|
2015-11-12 23:28:22 +00:00
|
|
|
// Task Started signals that the task was started and its timestamp can be
|
|
|
|
// used to determine the running length of the task.
|
2015-11-14 22:13:32 +00:00
|
|
|
TaskStarted = "Started"
|
2015-11-12 23:28:22 +00:00
|
|
|
|
|
|
|
// Task terminated indicates that the task was started and exited.
|
2015-11-14 22:13:32 +00:00
|
|
|
TaskTerminated = "Terminated"
|
2015-11-12 23:28:22 +00:00
|
|
|
|
|
|
|
// Task Killed indicates a user has killed the task.
|
2015-11-14 22:13:32 +00:00
|
|
|
TaskKilled = "Killed"
|
2015-11-12 23:28:22 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// TaskEvent is an event that effects the state of a task and contains meta-data
|
|
|
|
// appropriate to the events type.
|
|
|
|
type TaskEvent struct {
|
2015-11-14 22:13:32 +00:00
|
|
|
Type string
|
2015-11-12 23:28:22 +00:00
|
|
|
Time int64 // Unix Nanosecond timestamp
|
|
|
|
|
|
|
|
// Driver Failure fields.
|
2015-11-14 06:07:13 +00:00
|
|
|
DriverError string // A driver error occured while starting the task.
|
2015-11-12 23:28:22 +00:00
|
|
|
|
|
|
|
// Task Terminated Fields.
|
|
|
|
ExitCode int // The exit code of the task.
|
|
|
|
Signal int // The signal that terminated the task.
|
|
|
|
Message string // A possible message explaining the termination of the task.
|
2015-11-14 06:07:13 +00:00
|
|
|
|
|
|
|
// Task Killed Fields.
|
|
|
|
KillError string // Error killing the task.
|
|
|
|
}
|
|
|
|
|
2016-02-02 01:47:53 +00:00
|
|
|
func (te *TaskEvent) Copy() *TaskEvent {
|
2016-02-11 01:54:43 +00:00
|
|
|
if te == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2016-02-02 01:47:53 +00:00
|
|
|
copy := new(TaskEvent)
|
|
|
|
*copy = *te
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
2015-11-14 22:13:32 +00:00
|
|
|
func NewTaskEvent(event string) *TaskEvent {
|
2015-11-14 06:07:13 +00:00
|
|
|
return &TaskEvent{
|
|
|
|
Type: event,
|
|
|
|
Time: time.Now().UnixNano(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *TaskEvent) SetDriverError(err error) *TaskEvent {
|
|
|
|
if err != nil {
|
|
|
|
e.DriverError = err.Error()
|
|
|
|
}
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *TaskEvent) SetExitCode(c int) *TaskEvent {
|
|
|
|
e.ExitCode = c
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *TaskEvent) SetSignal(s int) *TaskEvent {
|
|
|
|
e.Signal = s
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
2015-11-16 22:46:18 +00:00
|
|
|
func (e *TaskEvent) SetExitMessage(err error) *TaskEvent {
|
|
|
|
if err != nil {
|
|
|
|
e.Message = err.Error()
|
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *TaskEvent) SetKillError(err error) *TaskEvent {
|
|
|
|
if err != nil {
|
|
|
|
e.KillError = err.Error()
|
|
|
|
}
|
|
|
|
return e
|
2015-11-12 23:28:22 +00:00
|
|
|
}
|
|
|
|
|
2015-09-15 17:46:10 +00:00
|
|
|
// Validate is used to sanity check a task group
|
|
|
|
func (t *Task) Validate() error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
if t.Name == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing task name"))
|
|
|
|
}
|
|
|
|
if t.Driver == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing task driver"))
|
|
|
|
}
|
2016-02-02 20:00:26 +00:00
|
|
|
if t.KillTimeout.Nanoseconds() < 0 {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("KillTimeout must be a positive value"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate the resources.
|
2015-09-15 17:46:10 +00:00
|
|
|
if t.Resources == nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing task resources"))
|
2016-02-02 21:50:30 +00:00
|
|
|
} else if err := t.Resources.MeetsMinResources(); err != nil {
|
2016-02-02 20:00:26 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
2016-01-04 19:41:31 +00:00
|
|
|
}
|
2016-02-02 20:00:26 +00:00
|
|
|
|
2016-02-05 07:28:01 +00:00
|
|
|
// Validate the log config
|
|
|
|
if t.LogConfig == nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing Log Config"))
|
2016-02-11 22:44:35 +00:00
|
|
|
} else if err := t.LogConfig.Validate(); err != nil {
|
2016-02-05 07:28:01 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
|
2015-10-11 19:50:16 +00:00
|
|
|
for idx, constr := range t.Constraints {
|
|
|
|
if err := constr.Validate(); err != nil {
|
|
|
|
outer := fmt.Errorf("Constraint %d validation failed: %s", idx+1, err)
|
|
|
|
mErr.Errors = append(mErr.Errors, outer)
|
|
|
|
}
|
|
|
|
}
|
2015-11-17 21:36:59 +00:00
|
|
|
|
|
|
|
for _, service := range t.Services {
|
|
|
|
if err := service.Validate(); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
}
|
2016-02-11 20:30:47 +00:00
|
|
|
|
2016-02-12 06:33:41 +00:00
|
|
|
if t.LogConfig != nil && t.Resources != nil {
|
2016-02-12 23:26:11 +00:00
|
|
|
logUsage := (t.LogConfig.MaxFiles * t.LogConfig.MaxFileSizeMB)
|
|
|
|
if t.Resources.DiskMB <= logUsage {
|
|
|
|
mErr.Errors = append(mErr.Errors,
|
|
|
|
fmt.Errorf("log storage (%d MB) exceeds requested disk capacity (%d MB)",
|
|
|
|
logUsage, t.Resources.DiskMB))
|
2016-02-12 06:33:41 +00:00
|
|
|
}
|
2016-02-11 20:30:47 +00:00
|
|
|
}
|
2015-09-15 17:46:10 +00:00
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-10-26 20:47:56 +00:00
|
|
|
const (
|
|
|
|
ConstraintDistinctHosts = "distinct_hosts"
|
|
|
|
ConstraintRegex = "regexp"
|
|
|
|
ConstraintVersion = "version"
|
|
|
|
)
|
|
|
|
|
2015-10-27 21:31:14 +00:00
|
|
|
// Constraints are used to restrict placement options.
|
2015-07-03 23:57:48 +00:00
|
|
|
type Constraint struct {
|
|
|
|
LTarget string // Left-hand target
|
|
|
|
RTarget string // Right-hand target
|
|
|
|
Operand string // Constraint operand (<=, <, =, !=, >, >=), contains, near
|
2016-01-26 21:45:03 +00:00
|
|
|
str string // Memoized string
|
2015-06-07 18:18:59 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (c *Constraint) Copy() *Constraint {
|
|
|
|
if c == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
nc := new(Constraint)
|
|
|
|
*nc = *c
|
|
|
|
return nc
|
|
|
|
}
|
|
|
|
|
2015-08-14 04:46:33 +00:00
|
|
|
func (c *Constraint) String() string {
|
2016-01-26 21:45:03 +00:00
|
|
|
if c.str != "" {
|
|
|
|
return c.str
|
|
|
|
}
|
|
|
|
c.str = fmt.Sprintf("%s %s %s", c.LTarget, c.Operand, c.RTarget)
|
|
|
|
return c.str
|
2015-08-14 04:46:33 +00:00
|
|
|
}
|
|
|
|
|
2015-10-11 19:50:16 +00:00
|
|
|
func (c *Constraint) Validate() error {
|
|
|
|
var mErr multierror.Error
|
|
|
|
if c.Operand == "" {
|
|
|
|
mErr.Errors = append(mErr.Errors, errors.New("Missing constraint operand"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform additional validation based on operand
|
|
|
|
switch c.Operand {
|
2015-10-26 20:47:56 +00:00
|
|
|
case ConstraintRegex:
|
2015-10-11 19:50:16 +00:00
|
|
|
if _, err := regexp.Compile(c.RTarget); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Regular expression failed to compile: %v", err))
|
|
|
|
}
|
2015-10-26 20:47:56 +00:00
|
|
|
case ConstraintVersion:
|
2015-10-11 19:50:16 +00:00
|
|
|
if _, err := version.NewConstraint(c.RTarget); err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, fmt.Errorf("Version constraint is invalid: %v", err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-07-04 00:11:53 +00:00
|
|
|
const (
|
2015-08-25 23:52:56 +00:00
|
|
|
AllocDesiredStatusRun = "run" // Allocation should run
|
|
|
|
AllocDesiredStatusStop = "stop" // Allocation should stop
|
|
|
|
AllocDesiredStatusEvict = "evict" // Allocation should stop, and was evicted
|
|
|
|
AllocDesiredStatusFailed = "failed" // Allocation failed to be done
|
2015-08-25 23:18:37 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
AllocClientStatusPending = "pending"
|
|
|
|
AllocClientStatusRunning = "running"
|
|
|
|
AllocClientStatusDead = "dead"
|
|
|
|
AllocClientStatusFailed = "failed"
|
2015-07-04 00:11:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Allocation is used to allocate the placement of a task group to a node.
|
|
|
|
type Allocation struct {
|
|
|
|
// ID of the allocation (UUID)
|
|
|
|
ID string
|
|
|
|
|
2015-08-15 20:08:06 +00:00
|
|
|
// ID of the evaluation that generated this allocation
|
|
|
|
EvalID string
|
|
|
|
|
2015-08-11 23:34:06 +00:00
|
|
|
// Name is a logical name of the allocation.
|
|
|
|
Name string
|
|
|
|
|
2015-07-04 00:11:53 +00:00
|
|
|
// NodeID is the node this is being placed on
|
|
|
|
NodeID string
|
|
|
|
|
|
|
|
// Job is the parent job of the task group being allocated.
|
|
|
|
// This is copied at allocation time to avoid issues if the job
|
|
|
|
// definition is updated.
|
2015-07-23 22:15:48 +00:00
|
|
|
JobID string
|
|
|
|
Job *Job
|
2015-07-04 00:11:53 +00:00
|
|
|
|
2015-08-23 23:30:57 +00:00
|
|
|
// TaskGroup is the name of the task group that should be run
|
|
|
|
TaskGroup string
|
|
|
|
|
2015-09-12 23:22:18 +00:00
|
|
|
// Resources is the total set of resources allocated as part
|
2015-07-04 00:11:53 +00:00
|
|
|
// of this allocation of the task group.
|
|
|
|
Resources *Resources
|
|
|
|
|
2015-09-12 23:22:18 +00:00
|
|
|
// TaskResources is the set of resources allocated to each
|
|
|
|
// task. These should sum to the total Resources.
|
|
|
|
TaskResources map[string]*Resources
|
|
|
|
|
2015-12-15 02:05:58 +00:00
|
|
|
// Services is a map of service names to service ids
|
2015-12-14 22:53:49 +00:00
|
|
|
Services map[string]string
|
|
|
|
|
2015-07-04 00:37:01 +00:00
|
|
|
// Metrics associated with this allocation
|
|
|
|
Metrics *AllocMetric
|
|
|
|
|
2015-08-25 23:18:37 +00:00
|
|
|
// Desired Status of the allocation on the client
|
|
|
|
DesiredStatus string
|
2015-07-04 00:50:54 +00:00
|
|
|
|
2015-08-25 23:18:37 +00:00
|
|
|
// DesiredStatusDescription is meant to provide more human useful information
|
|
|
|
DesiredDescription string
|
|
|
|
|
|
|
|
// Status of the allocation on the client
|
|
|
|
ClientStatus string
|
|
|
|
|
|
|
|
// ClientStatusDescription is meant to provide more human useful information
|
2015-08-25 23:26:34 +00:00
|
|
|
ClientDescription string
|
2015-08-15 20:08:06 +00:00
|
|
|
|
2015-11-12 23:28:22 +00:00
|
|
|
// TaskStates stores the state of each task,
|
|
|
|
TaskStates map[string]*TaskState
|
|
|
|
|
2015-07-04 00:50:54 +00:00
|
|
|
// Raft Indexes
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
2016-02-02 02:15:12 +00:00
|
|
|
|
|
|
|
// AllocModifyIndex is not updated when the client updates allocations. This
|
|
|
|
// lets the client pull only the allocs updated by the server.
|
2016-02-01 21:57:35 +00:00
|
|
|
AllocModifyIndex uint64
|
2016-02-09 05:58:05 +00:00
|
|
|
|
|
|
|
// CreateTime is the time the allocation has finished scheduling and been
|
|
|
|
// verified by the plan applier.
|
|
|
|
CreateTime int64
|
2015-07-04 00:11:53 +00:00
|
|
|
}
|
|
|
|
|
2016-02-02 01:47:53 +00:00
|
|
|
func (a *Allocation) Copy() *Allocation {
|
2016-02-11 01:54:43 +00:00
|
|
|
if a == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
na := new(Allocation)
|
|
|
|
*na = *a
|
|
|
|
|
|
|
|
na.Job = na.Job.Copy()
|
|
|
|
na.Resources = na.Resources.Copy()
|
|
|
|
|
|
|
|
tr := make(map[string]*Resources, len(na.TaskResources))
|
|
|
|
for task, resource := range na.TaskResources {
|
|
|
|
tr[task] = resource.Copy()
|
|
|
|
}
|
|
|
|
na.TaskResources = tr
|
|
|
|
|
|
|
|
s := make(map[string]string, len(na.Services))
|
|
|
|
for service, id := range na.Services {
|
|
|
|
s[service] = id
|
2016-02-02 01:47:53 +00:00
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
na.Services = s
|
2016-02-02 01:47:53 +00:00
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
na.Metrics = na.Metrics.Copy()
|
|
|
|
|
|
|
|
ts := make(map[string]*TaskState, len(na.TaskStates))
|
|
|
|
for task, state := range na.TaskStates {
|
|
|
|
ts[task] = state.Copy()
|
|
|
|
}
|
|
|
|
na.TaskStates = ts
|
|
|
|
return na
|
2015-07-04 00:11:53 +00:00
|
|
|
}
|
|
|
|
|
2015-12-15 03:20:57 +00:00
|
|
|
// TerminalStatus returns if the desired or actual status is terminal and
|
|
|
|
// will no longer transition.
|
2015-08-15 23:07:22 +00:00
|
|
|
func (a *Allocation) TerminalStatus() bool {
|
2015-12-16 22:34:17 +00:00
|
|
|
// First check the desired state and if that isn't terminal, check client
|
|
|
|
// state.
|
2015-08-25 23:18:37 +00:00
|
|
|
switch a.DesiredStatus {
|
2015-08-26 00:36:52 +00:00
|
|
|
case AllocDesiredStatusStop, AllocDesiredStatusEvict, AllocDesiredStatusFailed:
|
2015-08-15 23:07:22 +00:00
|
|
|
return true
|
|
|
|
default:
|
2015-12-16 22:34:17 +00:00
|
|
|
}
|
2015-12-15 03:20:57 +00:00
|
|
|
|
2015-12-16 22:34:17 +00:00
|
|
|
switch a.ClientStatus {
|
|
|
|
case AllocClientStatusDead, AllocClientStatusFailed:
|
2015-12-15 03:20:57 +00:00
|
|
|
return true
|
2015-12-16 22:34:17 +00:00
|
|
|
default:
|
|
|
|
return false
|
2015-08-15 23:07:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// Stub returns a list stub for the allocation
|
|
|
|
func (a *Allocation) Stub() *AllocListStub {
|
|
|
|
return &AllocListStub{
|
|
|
|
ID: a.ID,
|
|
|
|
EvalID: a.EvalID,
|
|
|
|
Name: a.Name,
|
|
|
|
NodeID: a.NodeID,
|
|
|
|
JobID: a.JobID,
|
|
|
|
TaskGroup: a.TaskGroup,
|
|
|
|
DesiredStatus: a.DesiredStatus,
|
|
|
|
DesiredDescription: a.DesiredDescription,
|
|
|
|
ClientStatus: a.ClientStatus,
|
|
|
|
ClientDescription: a.ClientDescription,
|
2015-11-12 23:28:22 +00:00
|
|
|
TaskStates: a.TaskStates,
|
2015-09-06 22:34:28 +00:00
|
|
|
CreateIndex: a.CreateIndex,
|
|
|
|
ModifyIndex: a.ModifyIndex,
|
2016-02-09 05:58:05 +00:00
|
|
|
CreateTime: a.CreateTime,
|
2015-09-06 22:34:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-15 02:05:58 +00:00
|
|
|
// PopulateServiceIDs generates the service IDs for all the service definitions
|
|
|
|
// in that Allocation
|
2015-12-14 23:57:56 +00:00
|
|
|
func (a *Allocation) PopulateServiceIDs() {
|
2015-12-15 17:14:32 +00:00
|
|
|
// Make a copy of the old map which contains the service names and their
|
|
|
|
// generated IDs
|
|
|
|
oldIDs := make(map[string]string)
|
|
|
|
for k, v := range a.Services {
|
|
|
|
oldIDs[k] = v
|
|
|
|
}
|
|
|
|
|
2015-12-14 22:53:49 +00:00
|
|
|
a.Services = make(map[string]string)
|
|
|
|
tg := a.Job.LookupTaskGroup(a.TaskGroup)
|
|
|
|
for _, task := range tg.Tasks {
|
|
|
|
for _, service := range task.Services {
|
2015-12-15 17:14:32 +00:00
|
|
|
// If the ID for a service name is already generated then we re-use
|
|
|
|
// it
|
|
|
|
if ID, ok := oldIDs[service.Name]; ok {
|
|
|
|
a.Services[service.Name] = ID
|
|
|
|
} else {
|
|
|
|
// If the service hasn't been generated an ID, we generate one.
|
|
|
|
// We add a prefix to the Service ID so that we can know that this service
|
|
|
|
// is managed by Nomad since Consul can also have service which are not
|
|
|
|
// managed by Nomad
|
|
|
|
a.Services[service.Name] = fmt.Sprintf("%s-%s", NomadConsulPrefix, GenerateUUID())
|
|
|
|
}
|
2015-12-14 22:53:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 22:34:28 +00:00
|
|
|
// AllocListStub is used to return a subset of alloc information
|
|
|
|
type AllocListStub struct {
|
|
|
|
ID string
|
|
|
|
EvalID string
|
|
|
|
Name string
|
|
|
|
NodeID string
|
|
|
|
JobID string
|
|
|
|
TaskGroup string
|
|
|
|
DesiredStatus string
|
|
|
|
DesiredDescription string
|
|
|
|
ClientStatus string
|
|
|
|
ClientDescription string
|
2015-11-12 23:28:22 +00:00
|
|
|
TaskStates map[string]*TaskState
|
2015-09-06 22:34:28 +00:00
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
2016-02-09 05:58:05 +00:00
|
|
|
CreateTime int64
|
2015-09-06 22:34:28 +00:00
|
|
|
}
|
|
|
|
|
2015-07-04 00:37:01 +00:00
|
|
|
// AllocMetric is used to track various metrics while attempting
|
|
|
|
// to make an allocation. These are used to debug a job, or to better
|
|
|
|
// understand the pressure within the system.
|
|
|
|
type AllocMetric struct {
|
|
|
|
// NodesEvaluated is the number of nodes that were evaluated
|
|
|
|
NodesEvaluated int
|
|
|
|
|
2015-10-27 21:31:14 +00:00
|
|
|
// NodesFiltered is the number of nodes filtered due to a constraint
|
2015-07-04 00:37:01 +00:00
|
|
|
NodesFiltered int
|
|
|
|
|
2016-01-04 20:07:33 +00:00
|
|
|
// NodesAvailable is the number of nodes available for evaluation per DC.
|
|
|
|
NodesAvailable map[string]int
|
|
|
|
|
2015-07-04 00:37:01 +00:00
|
|
|
// ClassFiltered is the number of nodes filtered by class
|
|
|
|
ClassFiltered map[string]int
|
|
|
|
|
|
|
|
// ConstraintFiltered is the number of failures caused by constraint
|
|
|
|
ConstraintFiltered map[string]int
|
|
|
|
|
2015-09-24 06:56:25 +00:00
|
|
|
// NodesExhausted is the number of nodes skipped due to being
|
2015-07-04 00:37:01 +00:00
|
|
|
// exhausted of at least one resource
|
|
|
|
NodesExhausted int
|
|
|
|
|
|
|
|
// ClassExhausted is the number of nodes exhausted by class
|
|
|
|
ClassExhausted map[string]int
|
|
|
|
|
2015-09-23 00:37:33 +00:00
|
|
|
// DimensionExhausted provides the count by dimension or reason
|
|
|
|
DimensionExhausted map[string]int
|
2015-09-13 23:48:01 +00:00
|
|
|
|
2015-07-04 00:37:01 +00:00
|
|
|
// Scores is the scores of the final few nodes remaining
|
|
|
|
// for placement. The top score is typically selected.
|
2015-08-14 04:46:33 +00:00
|
|
|
Scores map[string]float64
|
2015-07-04 00:37:01 +00:00
|
|
|
|
|
|
|
// AllocationTime is a measure of how long the allocation
|
|
|
|
// attempt took. This can affect performance and SLAs.
|
|
|
|
AllocationTime time.Duration
|
2015-08-16 17:03:21 +00:00
|
|
|
|
|
|
|
// CoalescedFailures indicates the number of other
|
|
|
|
// allocations that were coalesced into this failed allocation.
|
|
|
|
// This is to prevent creating many failed allocations for a
|
|
|
|
// single task group.
|
|
|
|
CoalescedFailures int
|
2015-07-04 00:37:01 +00:00
|
|
|
}
|
|
|
|
|
2016-02-11 01:54:43 +00:00
|
|
|
func (a *AllocMetric) Copy() *AllocMetric {
|
|
|
|
if a == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
na := new(AllocMetric)
|
|
|
|
*na = *a
|
|
|
|
na.NodesAvailable = CopyMapStringInt(na.NodesAvailable)
|
|
|
|
na.ClassFiltered = CopyMapStringInt(na.ClassFiltered)
|
|
|
|
na.ConstraintFiltered = CopyMapStringInt(na.ConstraintFiltered)
|
|
|
|
na.ClassExhausted = CopyMapStringInt(na.ClassExhausted)
|
|
|
|
na.DimensionExhausted = CopyMapStringInt(na.DimensionExhausted)
|
|
|
|
na.Scores = CopyMapStringFloat64(na.Scores)
|
|
|
|
return na
|
|
|
|
}
|
|
|
|
|
2015-08-14 04:46:33 +00:00
|
|
|
func (a *AllocMetric) EvaluateNode() {
|
|
|
|
a.NodesEvaluated += 1
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *AllocMetric) FilterNode(node *Node, constraint string) {
|
|
|
|
a.NodesFiltered += 1
|
|
|
|
if node != nil && node.NodeClass != "" {
|
|
|
|
if a.ClassFiltered == nil {
|
|
|
|
a.ClassFiltered = make(map[string]int)
|
|
|
|
}
|
|
|
|
a.ClassFiltered[node.NodeClass] += 1
|
|
|
|
}
|
|
|
|
if constraint != "" {
|
|
|
|
if a.ConstraintFiltered == nil {
|
|
|
|
a.ConstraintFiltered = make(map[string]int)
|
|
|
|
}
|
|
|
|
a.ConstraintFiltered[constraint] += 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-13 23:48:01 +00:00
|
|
|
func (a *AllocMetric) ExhaustedNode(node *Node, dimension string) {
|
2015-08-14 04:46:33 +00:00
|
|
|
a.NodesExhausted += 1
|
|
|
|
if node != nil && node.NodeClass != "" {
|
|
|
|
if a.ClassExhausted == nil {
|
|
|
|
a.ClassExhausted = make(map[string]int)
|
|
|
|
}
|
|
|
|
a.ClassExhausted[node.NodeClass] += 1
|
|
|
|
}
|
2015-09-13 23:48:01 +00:00
|
|
|
if dimension != "" {
|
2015-09-23 00:37:33 +00:00
|
|
|
if a.DimensionExhausted == nil {
|
|
|
|
a.DimensionExhausted = make(map[string]int)
|
2015-09-13 23:48:01 +00:00
|
|
|
}
|
2015-09-23 00:37:33 +00:00
|
|
|
a.DimensionExhausted[dimension] += 1
|
2015-09-13 23:48:01 +00:00
|
|
|
}
|
2015-08-14 04:46:33 +00:00
|
|
|
}
|
|
|
|
|
2015-08-16 16:57:30 +00:00
|
|
|
func (a *AllocMetric) ScoreNode(node *Node, name string, score float64) {
|
2015-08-14 04:46:33 +00:00
|
|
|
if a.Scores == nil {
|
|
|
|
a.Scores = make(map[string]float64)
|
|
|
|
}
|
2015-08-16 16:57:30 +00:00
|
|
|
key := fmt.Sprintf("%s.%s", node.ID, name)
|
|
|
|
a.Scores[key] = score
|
2015-08-14 04:46:33 +00:00
|
|
|
}
|
|
|
|
|
2015-07-23 22:27:13 +00:00
|
|
|
const (
|
2016-01-31 00:16:13 +00:00
|
|
|
EvalStatusBlocked = "blocked"
|
|
|
|
EvalStatusPending = "pending"
|
|
|
|
EvalStatusComplete = "complete"
|
|
|
|
EvalStatusFailed = "failed"
|
2016-02-01 02:46:45 +00:00
|
|
|
EvalStatusCancelled = "canceled"
|
2015-07-23 22:27:13 +00:00
|
|
|
)
|
|
|
|
|
2015-08-06 18:48:44 +00:00
|
|
|
const (
|
2015-08-06 21:17:18 +00:00
|
|
|
EvalTriggerJobRegister = "job-register"
|
|
|
|
EvalTriggerJobDeregister = "job-deregister"
|
2016-01-21 22:21:58 +00:00
|
|
|
EvalTriggerPeriodicJob = "periodic-job"
|
2015-08-06 23:39:20 +00:00
|
|
|
EvalTriggerNodeUpdate = "node-update"
|
2015-08-15 22:15:00 +00:00
|
|
|
EvalTriggerScheduled = "scheduled"
|
2016-02-20 23:50:41 +00:00
|
|
|
EvalTriggerForceGC = "force-gc"
|
2015-09-07 22:08:50 +00:00
|
|
|
EvalTriggerRollingUpdate = "rolling-update"
|
2015-08-15 22:15:00 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2015-09-07 18:01:29 +00:00
|
|
|
// CoreJobEvalGC is used for the garbage collection of evaluations
|
2015-09-24 06:56:25 +00:00
|
|
|
// and allocations. We periodically scan evaluations in a terminal state,
|
2015-09-07 18:01:29 +00:00
|
|
|
// in which all the corresponding allocations are also terminal. We
|
|
|
|
// delete these out of the system to bound the state.
|
2015-08-15 22:15:00 +00:00
|
|
|
CoreJobEvalGC = "eval-gc"
|
2015-09-07 18:01:29 +00:00
|
|
|
|
|
|
|
// CoreJobNodeGC is used for the garbage collection of failed nodes.
|
|
|
|
// We periodically scan nodes in a terminal state, and if they have no
|
|
|
|
// corresponding allocations we delete these out of the system.
|
|
|
|
CoreJobNodeGC = "node-gc"
|
2015-12-15 03:20:57 +00:00
|
|
|
|
|
|
|
// CoreJobJobGC is used for the garbage collection of eligible jobs. We
|
|
|
|
// periodically scan garbage collectible jobs and check if both their
|
|
|
|
// evaluations and allocations are terminal. If so, we delete these out of
|
|
|
|
// the system.
|
|
|
|
CoreJobJobGC = "job-gc"
|
2015-08-06 18:48:44 +00:00
|
|
|
)
|
|
|
|
|
2015-07-23 22:27:13 +00:00
|
|
|
// Evaluation is used anytime we need to apply business logic as a result
|
|
|
|
// of a change to our desired state (job specification) or the emergent state
|
|
|
|
// (registered nodes). When the inputs change, we need to "evaluate" them,
|
|
|
|
// potentially taking action (allocation of work) or doing nothing if the state
|
|
|
|
// of the world does not require it.
|
|
|
|
type Evaluation struct {
|
|
|
|
// ID is a randonly generated UUID used for this evaluation. This
|
|
|
|
// is assigned upon the creation of the evaluation.
|
|
|
|
ID string
|
|
|
|
|
2015-07-24 00:31:08 +00:00
|
|
|
// Priority is used to control scheduling importance and if this job
|
|
|
|
// can preempt other jobs.
|
|
|
|
Priority int
|
|
|
|
|
|
|
|
// Type is used to control which schedulers are available to handle
|
|
|
|
// this evaluation.
|
|
|
|
Type string
|
|
|
|
|
2015-07-24 05:30:08 +00:00
|
|
|
// TriggeredBy is used to give some insight into why this Eval
|
|
|
|
// was created. (Job change, node failure, alloc failure, etc).
|
|
|
|
TriggeredBy string
|
|
|
|
|
2015-09-24 06:56:25 +00:00
|
|
|
// JobID is the job this evaluation is scoped to. Evaluations cannot
|
2015-08-06 00:55:15 +00:00
|
|
|
// be run in parallel for a given JobID, so we serialize on this.
|
|
|
|
JobID string
|
|
|
|
|
2015-08-06 18:48:44 +00:00
|
|
|
// JobModifyIndex is the modify index of the job at the time
|
|
|
|
// the evaluation was created
|
|
|
|
JobModifyIndex uint64
|
|
|
|
|
2015-08-06 23:39:20 +00:00
|
|
|
// NodeID is the node that was affected triggering the evaluation.
|
|
|
|
NodeID string
|
|
|
|
|
|
|
|
// NodeModifyIndex is the modify index of the node at the time
|
|
|
|
// the evaluation was created
|
|
|
|
NodeModifyIndex uint64
|
|
|
|
|
2015-07-23 22:27:13 +00:00
|
|
|
// Status of the evaluation
|
|
|
|
Status string
|
|
|
|
|
2015-08-15 20:08:06 +00:00
|
|
|
// StatusDescription is meant to provide more human useful information
|
|
|
|
StatusDescription string
|
|
|
|
|
2015-09-07 19:47:48 +00:00
|
|
|
// Wait is a minimum wait time for running the eval. This is used to
|
|
|
|
// support a rolling upgrade.
|
|
|
|
Wait time.Duration
|
|
|
|
|
|
|
|
// NextEval is the evaluation ID for the eval created to do a followup.
|
|
|
|
// This is used to support rolling upgrades, where we need a chain of evaluations.
|
|
|
|
NextEval string
|
|
|
|
|
|
|
|
// PreviousEval is the evaluation ID for the eval creating this one to do a followup.
|
|
|
|
// This is used to support rolling upgrades, where we need a chain of evaluations.
|
|
|
|
PreviousEval string
|
|
|
|
|
2016-01-30 01:46:44 +00:00
|
|
|
// ClassEligibility tracks computed node classes that have been explicitely
|
|
|
|
// marked as eligible or ineligible.
|
|
|
|
ClassEligibility map[string]bool
|
2016-01-28 21:43:48 +00:00
|
|
|
|
|
|
|
// EscapedComputedClass marks whether the job has constraints that are not
|
|
|
|
// captured by computed node classes.
|
2016-01-30 01:46:44 +00:00
|
|
|
EscapedComputedClass bool
|
2016-01-28 21:43:48 +00:00
|
|
|
|
2015-07-23 22:27:13 +00:00
|
|
|
// Raft Indexes
|
|
|
|
CreateIndex uint64
|
|
|
|
ModifyIndex uint64
|
|
|
|
}
|
|
|
|
|
2015-08-15 23:07:22 +00:00
|
|
|
// TerminalStatus returns if the current status is terminal and
|
|
|
|
// will no longer transition.
|
|
|
|
func (e *Evaluation) TerminalStatus() bool {
|
|
|
|
switch e.Status {
|
2016-01-31 00:16:13 +00:00
|
|
|
case EvalStatusComplete, EvalStatusFailed, EvalStatusCancelled:
|
2015-08-15 23:07:22 +00:00
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-14 00:11:20 +00:00
|
|
|
func (e *Evaluation) GoString() string {
|
|
|
|
return fmt.Sprintf("<Eval '%s' JobID: '%s'>", e.ID, e.JobID)
|
|
|
|
}
|
|
|
|
|
2015-08-15 21:16:40 +00:00
|
|
|
func (e *Evaluation) Copy() *Evaluation {
|
2016-02-11 01:54:43 +00:00
|
|
|
if e == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2015-08-15 21:16:40 +00:00
|
|
|
ne := new(Evaluation)
|
|
|
|
*ne = *e
|
|
|
|
return ne
|
|
|
|
}
|
|
|
|
|
2016-01-29 23:31:32 +00:00
|
|
|
// ShouldEnqueue checks if a given evaluation should be enqueued into the
|
|
|
|
// eval_broker
|
2015-08-06 18:28:55 +00:00
|
|
|
func (e *Evaluation) ShouldEnqueue() bool {
|
|
|
|
switch e.Status {
|
|
|
|
case EvalStatusPending:
|
|
|
|
return true
|
2016-01-31 00:16:13 +00:00
|
|
|
case EvalStatusComplete, EvalStatusFailed, EvalStatusBlocked, EvalStatusCancelled:
|
2016-01-29 23:31:32 +00:00
|
|
|
return false
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unhandled evaluation (%s) status %s", e.ID, e.Status))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ShouldBlock checks if a given evaluation should be entered into the blocked
|
|
|
|
// eval tracker.
|
|
|
|
func (e *Evaluation) ShouldBlock() bool {
|
|
|
|
switch e.Status {
|
|
|
|
case EvalStatusBlocked:
|
|
|
|
return true
|
2016-01-31 00:16:13 +00:00
|
|
|
case EvalStatusComplete, EvalStatusFailed, EvalStatusPending, EvalStatusCancelled:
|
2015-08-06 18:28:55 +00:00
|
|
|
return false
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unhandled evaluation (%s) status %s", e.ID, e.Status))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-11 23:34:06 +00:00
|
|
|
// MakePlan is used to make a plan from the given evaluation
|
|
|
|
// for a given Job
|
|
|
|
func (e *Evaluation) MakePlan(j *Job) *Plan {
|
|
|
|
p := &Plan{
|
|
|
|
EvalID: e.ID,
|
2015-08-13 23:29:28 +00:00
|
|
|
Priority: e.Priority,
|
2015-08-25 23:52:56 +00:00
|
|
|
NodeUpdate: make(map[string][]*Allocation),
|
2015-08-11 23:34:06 +00:00
|
|
|
NodeAllocation: make(map[string][]*Allocation),
|
|
|
|
}
|
2015-08-13 23:29:28 +00:00
|
|
|
if j != nil {
|
|
|
|
p.AllAtOnce = j.AllAtOnce
|
|
|
|
}
|
2015-08-11 23:34:06 +00:00
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2015-09-07 22:08:50 +00:00
|
|
|
// NextRollingEval creates an evaluation to followup this eval for rolling updates
|
|
|
|
func (e *Evaluation) NextRollingEval(wait time.Duration) *Evaluation {
|
|
|
|
return &Evaluation{
|
|
|
|
ID: GenerateUUID(),
|
|
|
|
Priority: e.Priority,
|
|
|
|
Type: e.Type,
|
|
|
|
TriggeredBy: EvalTriggerRollingUpdate,
|
|
|
|
JobID: e.JobID,
|
|
|
|
JobModifyIndex: e.JobModifyIndex,
|
|
|
|
Status: EvalStatusPending,
|
|
|
|
Wait: wait,
|
|
|
|
PreviousEval: e.ID,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-28 21:43:48 +00:00
|
|
|
// BlockedEval creates a blocked evaluation to followup this eval to place any
|
|
|
|
// failed allocations. It takes the classes marked explicitely eligible or
|
|
|
|
// ineligible and whether the job has escaped computed node classes.
|
2016-01-30 01:46:44 +00:00
|
|
|
func (e *Evaluation) BlockedEval(classEligibility map[string]bool, escaped bool) *Evaluation {
|
2016-01-28 21:43:48 +00:00
|
|
|
return &Evaluation{
|
|
|
|
ID: GenerateUUID(),
|
|
|
|
Priority: e.Priority,
|
|
|
|
Type: e.Type,
|
|
|
|
TriggeredBy: e.TriggeredBy,
|
|
|
|
JobID: e.JobID,
|
|
|
|
JobModifyIndex: e.JobModifyIndex,
|
|
|
|
Status: EvalStatusBlocked,
|
|
|
|
PreviousEval: e.ID,
|
2016-01-30 01:46:44 +00:00
|
|
|
ClassEligibility: classEligibility,
|
2016-01-28 21:43:48 +00:00
|
|
|
EscapedComputedClass: escaped,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-27 21:59:16 +00:00
|
|
|
// Plan is used to submit a commit plan for task allocations. These
|
|
|
|
// are submitted to the leader which verifies that resources have
|
|
|
|
// not been overcommitted before admiting the plan.
|
|
|
|
type Plan struct {
|
2015-07-29 00:49:45 +00:00
|
|
|
// EvalID is the evaluation ID this plan is associated with
|
|
|
|
EvalID string
|
|
|
|
|
2015-08-12 22:44:36 +00:00
|
|
|
// EvalToken is used to prevent a split-brain processing of
|
|
|
|
// an evaluation. There should only be a single scheduler running
|
|
|
|
// an Eval at a time, but this could be violated after a leadership
|
|
|
|
// transition. This unique token is used to reject plans that are
|
|
|
|
// being submitted from a different leader.
|
|
|
|
EvalToken string
|
|
|
|
|
2015-07-27 21:59:16 +00:00
|
|
|
// Priority is the priority of the upstream job
|
|
|
|
Priority int
|
|
|
|
|
2015-07-29 00:49:45 +00:00
|
|
|
// AllAtOnce is used to control if incremental scheduling of task groups
|
|
|
|
// is allowed or if we must do a gang scheduling of the entire job.
|
|
|
|
// If this is false, a plan may be partially applied. Otherwise, the
|
|
|
|
// entire plan must be able to make progress.
|
|
|
|
AllAtOnce bool
|
|
|
|
|
2015-08-25 23:52:56 +00:00
|
|
|
// NodeUpdate contains all the allocations for each node. For each node,
|
|
|
|
// this is a list of the allocations to update to either stop or evict.
|
|
|
|
NodeUpdate map[string][]*Allocation
|
2015-07-29 00:49:45 +00:00
|
|
|
|
|
|
|
// NodeAllocation contains all the allocations for each node.
|
|
|
|
// The evicts must be considered prior to the allocations.
|
2015-08-04 23:32:46 +00:00
|
|
|
NodeAllocation map[string][]*Allocation
|
2015-08-15 20:27:42 +00:00
|
|
|
|
|
|
|
// FailedAllocs are allocations that could not be made,
|
|
|
|
// but are persisted so that the user can use the feedback
|
|
|
|
// to determine the cause.
|
|
|
|
FailedAllocs []*Allocation
|
2015-07-27 21:59:16 +00:00
|
|
|
}
|
|
|
|
|
2015-08-26 00:06:06 +00:00
|
|
|
func (p *Plan) AppendUpdate(alloc *Allocation, status, desc string) {
|
|
|
|
newAlloc := new(Allocation)
|
|
|
|
*newAlloc = *alloc
|
|
|
|
newAlloc.DesiredStatus = status
|
|
|
|
newAlloc.DesiredDescription = desc
|
2015-08-13 21:02:39 +00:00
|
|
|
node := alloc.NodeID
|
2015-08-25 23:52:56 +00:00
|
|
|
existing := p.NodeUpdate[node]
|
2015-08-26 00:06:06 +00:00
|
|
|
p.NodeUpdate[node] = append(existing, newAlloc)
|
2015-08-13 21:02:39 +00:00
|
|
|
}
|
|
|
|
|
2015-09-07 19:00:34 +00:00
|
|
|
func (p *Plan) PopUpdate(alloc *Allocation) {
|
|
|
|
existing := p.NodeUpdate[alloc.NodeID]
|
|
|
|
n := len(existing)
|
|
|
|
if n > 0 && existing[n-1].ID == alloc.ID {
|
|
|
|
existing = existing[:n-1]
|
2015-09-07 19:05:18 +00:00
|
|
|
if len(existing) > 0 {
|
|
|
|
p.NodeUpdate[alloc.NodeID] = existing
|
|
|
|
} else {
|
|
|
|
delete(p.NodeUpdate, alloc.NodeID)
|
|
|
|
}
|
2015-09-07 19:00:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-13 21:02:39 +00:00
|
|
|
func (p *Plan) AppendAlloc(alloc *Allocation) {
|
|
|
|
node := alloc.NodeID
|
|
|
|
existing := p.NodeAllocation[node]
|
|
|
|
p.NodeAllocation[node] = append(existing, alloc)
|
|
|
|
}
|
|
|
|
|
2015-08-15 20:40:13 +00:00
|
|
|
func (p *Plan) AppendFailed(alloc *Allocation) {
|
|
|
|
p.FailedAllocs = append(p.FailedAllocs, alloc)
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:16:32 +00:00
|
|
|
// IsNoOp checks if this plan would do nothing
|
|
|
|
func (p *Plan) IsNoOp() bool {
|
2015-08-25 23:52:56 +00:00
|
|
|
return len(p.NodeUpdate) == 0 && len(p.NodeAllocation) == 0 && len(p.FailedAllocs) == 0
|
2015-08-14 01:16:32 +00:00
|
|
|
}
|
|
|
|
|
2015-07-27 22:31:49 +00:00
|
|
|
// PlanResult is the result of a plan submitted to the leader.
|
2015-07-27 21:59:16 +00:00
|
|
|
type PlanResult struct {
|
2015-08-25 23:52:56 +00:00
|
|
|
// NodeUpdate contains all the updates that were committed.
|
|
|
|
NodeUpdate map[string][]*Allocation
|
2015-07-29 00:49:45 +00:00
|
|
|
|
|
|
|
// NodeAllocation contains all the allocations that were committed.
|
2015-08-04 23:32:46 +00:00
|
|
|
NodeAllocation map[string][]*Allocation
|
2015-07-29 00:49:45 +00:00
|
|
|
|
2015-08-15 20:33:20 +00:00
|
|
|
// FailedAllocs are allocations that could not be made,
|
|
|
|
// but are persisted so that the user can use the feedback
|
|
|
|
// to determine the cause.
|
|
|
|
FailedAllocs []*Allocation
|
|
|
|
|
2015-07-29 00:49:45 +00:00
|
|
|
// RefreshIndex is the index the worker should refresh state up to.
|
|
|
|
// This allows all evictions and allocations to be materialized.
|
|
|
|
// If any allocations were rejected due to stale data (node state,
|
|
|
|
// over committed) this can be used to force a worker refresh.
|
2015-07-28 23:36:15 +00:00
|
|
|
RefreshIndex uint64
|
|
|
|
|
2015-07-29 00:49:45 +00:00
|
|
|
// AllocIndex is the Raft index in which the evictions and
|
|
|
|
// allocations took place. This is used for the write index.
|
2015-07-27 22:31:49 +00:00
|
|
|
AllocIndex uint64
|
2015-07-27 21:59:16 +00:00
|
|
|
}
|
|
|
|
|
2015-08-26 00:36:52 +00:00
|
|
|
// IsNoOp checks if this plan result would do nothing
|
|
|
|
func (p *PlanResult) IsNoOp() bool {
|
|
|
|
return len(p.NodeUpdate) == 0 && len(p.NodeAllocation) == 0 && len(p.FailedAllocs) == 0
|
|
|
|
}
|
|
|
|
|
2015-08-13 22:17:24 +00:00
|
|
|
// FullCommit is used to check if all the allocations in a plan
|
|
|
|
// were committed as part of the result. Returns if there was
|
|
|
|
// a match, and the number of expected and actual allocations.
|
|
|
|
func (p *PlanResult) FullCommit(plan *Plan) (bool, int, int) {
|
|
|
|
expected := 0
|
|
|
|
actual := 0
|
|
|
|
for name, allocList := range plan.NodeAllocation {
|
|
|
|
didAlloc, _ := p.NodeAllocation[name]
|
|
|
|
expected += len(allocList)
|
|
|
|
actual += len(didAlloc)
|
|
|
|
}
|
|
|
|
return actual == expected, expected, actual
|
|
|
|
}
|
|
|
|
|
2015-06-05 22:21:17 +00:00
|
|
|
// msgpackHandle is a shared handle for encoding/decoding of structs
|
2015-11-18 23:16:42 +00:00
|
|
|
var MsgpackHandle = func() *codec.MsgpackHandle {
|
2015-11-16 22:25:19 +00:00
|
|
|
h := &codec.MsgpackHandle{RawToString: true}
|
|
|
|
|
|
|
|
// Sets the default type for decoding a map into a nil interface{}.
|
|
|
|
// This is necessary in particular because we store the driver configs as a
|
|
|
|
// nil interface{}.
|
|
|
|
h.MapType = reflect.TypeOf(map[string]interface{}(nil))
|
|
|
|
return h
|
|
|
|
}()
|
2015-06-05 22:21:17 +00:00
|
|
|
|
|
|
|
// Decode is used to decode a MsgPack encoded object
|
|
|
|
func Decode(buf []byte, out interface{}) error {
|
2015-11-18 23:16:42 +00:00
|
|
|
return codec.NewDecoder(bytes.NewReader(buf), MsgpackHandle).Decode(out)
|
2015-06-05 22:21:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Encode is used to encode a MsgPack object with type prefix
|
|
|
|
func Encode(t MessageType, msg interface{}) ([]byte, error) {
|
|
|
|
var buf bytes.Buffer
|
|
|
|
buf.WriteByte(uint8(t))
|
2015-11-18 23:16:42 +00:00
|
|
|
err := codec.NewEncoder(&buf, MsgpackHandle).Encode(msg)
|
2015-06-05 22:21:17 +00:00
|
|
|
return buf.Bytes(), err
|
|
|
|
}
|