2015-08-13 23:25:59 +00:00
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2015-10-15 00:26:20 +00:00
|
|
|
"log"
|
2015-09-07 18:23:38 +00:00
|
|
|
"math/rand"
|
2015-09-07 19:25:23 +00:00
|
|
|
"reflect"
|
2015-08-13 23:25:59 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
2015-08-14 01:16:32 +00:00
|
|
|
// allocTuple is a tuple of the allocation name and potential alloc ID
|
|
|
|
type allocTuple struct {
|
|
|
|
Name string
|
|
|
|
TaskGroup *structs.TaskGroup
|
|
|
|
Alloc *structs.Allocation
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// materializeTaskGroups is used to materialize all the task groups
|
|
|
|
// a job requires. This is used to do the count expansion.
|
|
|
|
func materializeTaskGroups(job *structs.Job) map[string]*structs.TaskGroup {
|
|
|
|
out := make(map[string]*structs.TaskGroup)
|
2015-10-15 20:14:44 +00:00
|
|
|
if job == nil {
|
|
|
|
return out
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
for _, tg := range job.TaskGroups {
|
2015-10-15 20:14:44 +00:00
|
|
|
for i := 0; i < tg.Count; i++ {
|
|
|
|
name := fmt.Sprintf("%s.%s[%d]", job.Name, tg.Name, i)
|
2015-10-14 23:43:06 +00:00
|
|
|
out[name] = tg
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:28:09 +00:00
|
|
|
// diffResult is used to return the sets that result from the diff
|
|
|
|
type diffResult struct {
|
2015-10-16 18:43:09 +00:00
|
|
|
place, update, migrate, stop, ignore []allocTuple
|
2015-08-14 01:28:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (d *diffResult) GoString() string {
|
2015-09-07 02:47:02 +00:00
|
|
|
return fmt.Sprintf("allocs: (place %d) (update %d) (migrate %d) (stop %d) (ignore %d)",
|
2015-08-26 00:06:06 +00:00
|
|
|
len(d.place), len(d.update), len(d.migrate), len(d.stop), len(d.ignore))
|
2015-08-14 01:28:09 +00:00
|
|
|
}
|
|
|
|
|
2015-10-15 20:14:44 +00:00
|
|
|
func (d *diffResult) Append(other *diffResult) {
|
|
|
|
d.place = append(d.place, other.place...)
|
|
|
|
d.update = append(d.update, other.update...)
|
|
|
|
d.migrate = append(d.migrate, other.migrate...)
|
|
|
|
d.stop = append(d.stop, other.stop...)
|
|
|
|
d.ignore = append(d.ignore, other.ignore...)
|
|
|
|
}
|
|
|
|
|
2015-08-13 23:25:59 +00:00
|
|
|
// diffAllocs is used to do a set difference between the target allocations
|
2015-08-13 23:47:39 +00:00
|
|
|
// and the existing allocations. This returns 5 sets of results, the list of
|
2015-08-13 23:25:59 +00:00
|
|
|
// named task groups that need to be placed (no existing allocation), the
|
2015-08-13 23:47:39 +00:00
|
|
|
// allocations that need to be updated (job definition is newer), allocs that
|
|
|
|
// need to be migrated (node is draining), the allocs that need to be evicted
|
|
|
|
// (no longer required), and those that should be ignored.
|
2015-08-14 01:28:09 +00:00
|
|
|
func diffAllocs(job *structs.Job, taintedNodes map[string]bool,
|
|
|
|
required map[string]*structs.TaskGroup, allocs []*structs.Allocation) *diffResult {
|
|
|
|
result := &diffResult{}
|
2015-08-14 01:18:32 +00:00
|
|
|
|
2015-08-13 23:25:59 +00:00
|
|
|
// Scan the existing updates
|
2015-08-14 01:20:55 +00:00
|
|
|
existing := make(map[string]struct{})
|
|
|
|
for _, exist := range allocs {
|
|
|
|
// Index the existing node
|
|
|
|
name := exist.Name
|
|
|
|
existing[name] = struct{}{}
|
2015-08-13 23:25:59 +00:00
|
|
|
|
2015-08-14 01:20:55 +00:00
|
|
|
// Check for the definition in the required set
|
|
|
|
tg, ok := required[name]
|
2015-08-13 23:25:59 +00:00
|
|
|
|
2015-08-26 00:06:06 +00:00
|
|
|
// If not required, we stop the alloc
|
2015-08-14 01:20:55 +00:00
|
|
|
if !ok {
|
2015-10-16 18:43:09 +00:00
|
|
|
result.stop = append(result.stop, allocTuple{
|
2015-08-14 01:20:55 +00:00
|
|
|
Name: name,
|
|
|
|
TaskGroup: tg,
|
|
|
|
Alloc: exist,
|
|
|
|
})
|
|
|
|
continue
|
|
|
|
}
|
2015-08-13 23:47:39 +00:00
|
|
|
|
2015-08-14 01:20:55 +00:00
|
|
|
// If we are on a tainted node, we must migrate
|
|
|
|
if taintedNodes[exist.NodeID] {
|
2015-10-16 18:43:09 +00:00
|
|
|
result.migrate = append(result.migrate, allocTuple{
|
2015-08-14 01:20:55 +00:00
|
|
|
Name: name,
|
|
|
|
TaskGroup: tg,
|
|
|
|
Alloc: exist,
|
|
|
|
})
|
|
|
|
continue
|
|
|
|
}
|
2015-08-13 23:25:59 +00:00
|
|
|
|
2015-08-14 01:20:55 +00:00
|
|
|
// If the definition is updated we need to update
|
2016-01-12 17:50:33 +00:00
|
|
|
if job.JobModifyIndex != exist.Job.JobModifyIndex {
|
2015-10-16 18:43:09 +00:00
|
|
|
result.update = append(result.update, allocTuple{
|
2015-08-14 01:16:32 +00:00
|
|
|
Name: name,
|
|
|
|
TaskGroup: tg,
|
|
|
|
Alloc: exist,
|
|
|
|
})
|
2015-08-14 01:20:55 +00:00
|
|
|
continue
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
2015-08-14 01:20:55 +00:00
|
|
|
|
|
|
|
// Everything is up-to-date
|
2015-10-16 18:43:09 +00:00
|
|
|
result.ignore = append(result.ignore, allocTuple{
|
2015-08-14 01:20:55 +00:00
|
|
|
Name: name,
|
|
|
|
TaskGroup: tg,
|
|
|
|
Alloc: exist,
|
|
|
|
})
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Scan the required groups
|
2015-08-14 01:16:32 +00:00
|
|
|
for name, tg := range required {
|
2015-08-13 23:25:59 +00:00
|
|
|
// Check for an existing allocation
|
|
|
|
_, ok := existing[name]
|
|
|
|
|
|
|
|
// Require a placement if no existing allocation. If there
|
|
|
|
// is an existing allocation, we would have checked for a potential
|
|
|
|
// update or ignore above.
|
|
|
|
if !ok {
|
2015-10-16 18:43:09 +00:00
|
|
|
result.place = append(result.place, allocTuple{
|
2015-08-14 01:16:32 +00:00
|
|
|
Name: name,
|
|
|
|
TaskGroup: tg,
|
|
|
|
})
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
|
|
|
}
|
2015-08-14 01:28:09 +00:00
|
|
|
return result
|
2015-08-13 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
2015-10-15 20:14:44 +00:00
|
|
|
// diffSystemAllocs is like diffAllocs however, the allocations in the
|
|
|
|
// diffResult contain the specific nodeID they should be allocated on.
|
|
|
|
func diffSystemAllocs(job *structs.Job, nodes []*structs.Node, taintedNodes map[string]bool,
|
|
|
|
allocs []*structs.Allocation) *diffResult {
|
|
|
|
|
|
|
|
// Build a mapping of nodes to all their allocs.
|
|
|
|
nodeAllocs := make(map[string][]*structs.Allocation, len(allocs))
|
|
|
|
for _, alloc := range allocs {
|
|
|
|
nallocs := append(nodeAllocs[alloc.NodeID], alloc)
|
|
|
|
nodeAllocs[alloc.NodeID] = nallocs
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, node := range nodes {
|
|
|
|
if _, ok := nodeAllocs[node.ID]; !ok {
|
|
|
|
nodeAllocs[node.ID] = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the required task groups.
|
|
|
|
required := materializeTaskGroups(job)
|
|
|
|
|
|
|
|
result := &diffResult{}
|
|
|
|
for nodeID, allocs := range nodeAllocs {
|
|
|
|
diff := diffAllocs(job, taintedNodes, required, allocs)
|
|
|
|
|
|
|
|
// Mark the alloc as being for a specific node.
|
2015-10-16 18:43:09 +00:00
|
|
|
for i := range diff.place {
|
|
|
|
alloc := &diff.place[i]
|
2015-10-15 20:14:44 +00:00
|
|
|
alloc.Alloc = &structs.Allocation{NodeID: nodeID}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Migrate does not apply to system jobs and instead should be marked as
|
|
|
|
// stop because if a node is tainted, the job is invalid on that node.
|
|
|
|
diff.stop = append(diff.stop, diff.migrate...)
|
|
|
|
diff.migrate = nil
|
|
|
|
|
|
|
|
result.Append(diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2016-01-04 20:07:33 +00:00
|
|
|
// readyNodesInDCs returns all the ready nodes in the given datacenters and a
|
|
|
|
// mapping of each data center to the count of ready nodes.
|
|
|
|
func readyNodesInDCs(state State, dcs []string) ([]*structs.Node, map[string]int, error) {
|
2015-08-15 20:11:42 +00:00
|
|
|
// Index the DCs
|
2016-01-04 20:07:33 +00:00
|
|
|
dcMap := make(map[string]int, len(dcs))
|
2015-08-14 00:19:09 +00:00
|
|
|
for _, dc := range dcs {
|
2016-01-04 20:07:33 +00:00
|
|
|
dcMap[dc] = 0
|
2015-08-15 20:11:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Scan the nodes
|
|
|
|
var out []*structs.Node
|
|
|
|
iter, err := state.Nodes()
|
|
|
|
if err != nil {
|
2016-01-04 20:07:33 +00:00
|
|
|
return nil, nil, err
|
2015-08-15 20:11:42 +00:00
|
|
|
}
|
|
|
|
for {
|
|
|
|
raw := iter.Next()
|
|
|
|
if raw == nil {
|
|
|
|
break
|
2015-08-14 00:19:09 +00:00
|
|
|
}
|
2015-08-15 20:11:42 +00:00
|
|
|
|
|
|
|
// Filter on datacenter and status
|
|
|
|
node := raw.(*structs.Node)
|
|
|
|
if node.Status != structs.NodeStatusReady {
|
|
|
|
continue
|
|
|
|
}
|
2015-09-07 02:47:02 +00:00
|
|
|
if node.Drain {
|
|
|
|
continue
|
|
|
|
}
|
2015-08-15 20:11:42 +00:00
|
|
|
if _, ok := dcMap[node.Datacenter]; !ok {
|
|
|
|
continue
|
2015-08-14 00:19:09 +00:00
|
|
|
}
|
2015-08-15 20:11:42 +00:00
|
|
|
out = append(out, node)
|
2016-01-04 20:07:33 +00:00
|
|
|
dcMap[node.Datacenter] += 1
|
2015-08-14 00:19:09 +00:00
|
|
|
}
|
2016-01-04 20:07:33 +00:00
|
|
|
return out, dcMap, nil
|
2015-08-14 00:19:09 +00:00
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
|
|
|
|
// retryMax is used to retry a callback until it returns success or
|
2016-02-10 05:24:47 +00:00
|
|
|
// a maximum number of attempts is reached. An optional reset function may be
|
|
|
|
// passed which is called after each failed iteration. If the reset function is
|
|
|
|
// set and returns true, the number of attempts is reset back to max.
|
|
|
|
func retryMax(max int, cb func() (bool, error), reset func() bool) error {
|
2015-08-14 00:40:23 +00:00
|
|
|
attempts := 0
|
|
|
|
for attempts < max {
|
|
|
|
done, err := cb()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if done {
|
|
|
|
return nil
|
|
|
|
}
|
2016-02-10 05:24:47 +00:00
|
|
|
|
|
|
|
// Check if we should reset the number attempts
|
|
|
|
if reset != nil && reset() {
|
|
|
|
attempts = 0
|
|
|
|
} else {
|
|
|
|
attempts += 1
|
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
}
|
2015-08-15 21:47:13 +00:00
|
|
|
return &SetStatusError{
|
|
|
|
Err: fmt.Errorf("maximum attempts reached (%d)", max),
|
|
|
|
EvalStatus: structs.EvalStatusFailed,
|
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
}
|
2015-08-14 00:51:31 +00:00
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
// progressMade checks to see if the plan result made allocations or updates.
|
|
|
|
// If the result is nil, false is returned.
|
|
|
|
func progressMade(result *structs.PlanResult) bool {
|
2016-02-22 18:38:04 +00:00
|
|
|
return result != nil && (len(result.NodeUpdate) != 0 ||
|
|
|
|
len(result.NodeAllocation) != 0)
|
2016-02-10 05:24:47 +00:00
|
|
|
}
|
|
|
|
|
2015-08-14 00:51:31 +00:00
|
|
|
// taintedNodes is used to scan the allocations and then check if the
|
|
|
|
// underlying nodes are tainted, and should force a migration of the allocation.
|
|
|
|
func taintedNodes(state State, allocs []*structs.Allocation) (map[string]bool, error) {
|
|
|
|
out := make(map[string]bool)
|
|
|
|
for _, alloc := range allocs {
|
|
|
|
if _, ok := out[alloc.NodeID]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:56:38 +00:00
|
|
|
node, err := state.NodeByID(alloc.NodeID)
|
2015-08-14 00:51:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:05:31 +00:00
|
|
|
// If the node does not exist, we should migrate
|
|
|
|
if node == nil {
|
|
|
|
out[alloc.NodeID] = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-09-07 02:47:02 +00:00
|
|
|
out[alloc.NodeID] = structs.ShouldDrainNode(node.Status) || node.Drain
|
2015-08-14 00:51:31 +00:00
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
2015-09-07 18:23:38 +00:00
|
|
|
|
|
|
|
// shuffleNodes randomizes the slice order with the Fisher-Yates algorithm
|
|
|
|
func shuffleNodes(nodes []*structs.Node) {
|
|
|
|
n := len(nodes)
|
|
|
|
for i := n - 1; i > 0; i-- {
|
|
|
|
j := rand.Intn(i + 1)
|
|
|
|
nodes[i], nodes[j] = nodes[j], nodes[i]
|
|
|
|
}
|
|
|
|
}
|
2015-09-07 19:25:23 +00:00
|
|
|
|
|
|
|
// tasksUpdated does a diff between task groups to see if the
|
2015-10-23 21:52:06 +00:00
|
|
|
// tasks, their drivers, environment variables or config have updated.
|
2015-09-07 19:25:23 +00:00
|
|
|
func tasksUpdated(a, b *structs.TaskGroup) bool {
|
|
|
|
// If the number of tasks do not match, clearly there is an update
|
|
|
|
if len(a.Tasks) != len(b.Tasks) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check each task
|
|
|
|
for _, at := range a.Tasks {
|
|
|
|
bt := b.LookupTask(at.Name)
|
|
|
|
if bt == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if at.Driver != bt.Driver {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(at.Config, bt.Config) {
|
|
|
|
return true
|
|
|
|
}
|
2015-10-23 21:52:06 +00:00
|
|
|
if !reflect.DeepEqual(at.Env, bt.Env) {
|
|
|
|
return true
|
|
|
|
}
|
2016-03-16 02:32:49 +00:00
|
|
|
if !reflect.DeepEqual(at.Artifacts, bt.Artifacts) {
|
|
|
|
return true
|
|
|
|
}
|
2015-09-13 23:41:53 +00:00
|
|
|
|
2015-10-04 19:53:02 +00:00
|
|
|
// Inspect the network to see if the dynamic ports are different
|
|
|
|
if len(at.Resources.Networks) != len(bt.Resources.Networks) {
|
2015-09-13 23:41:53 +00:00
|
|
|
return true
|
|
|
|
}
|
2015-10-04 19:53:02 +00:00
|
|
|
for idx := range at.Resources.Networks {
|
|
|
|
an := at.Resources.Networks[idx]
|
|
|
|
bn := bt.Resources.Networks[idx]
|
|
|
|
if len(an.DynamicPorts) != len(bn.DynamicPorts) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
2015-09-07 19:25:23 +00:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
2015-10-15 00:26:20 +00:00
|
|
|
|
|
|
|
// setStatus is used to update the status of the evaluation
|
|
|
|
func setStatus(logger *log.Logger, planner Planner, eval, nextEval *structs.Evaluation, status, desc string) error {
|
|
|
|
logger.Printf("[DEBUG] sched: %#v: setting status to %s", eval, status)
|
|
|
|
newEval := eval.Copy()
|
|
|
|
newEval.Status = status
|
|
|
|
newEval.StatusDescription = desc
|
|
|
|
if nextEval != nil {
|
|
|
|
newEval.NextEval = nextEval.ID
|
|
|
|
}
|
|
|
|
return planner.UpdateEval(newEval)
|
|
|
|
}
|
|
|
|
|
|
|
|
// inplaceUpdate attempts to update allocations in-place where possible.
|
|
|
|
func inplaceUpdate(ctx Context, eval *structs.Evaluation, job *structs.Job,
|
2015-10-16 18:43:09 +00:00
|
|
|
stack Stack, updates []allocTuple) []allocTuple {
|
2015-10-15 00:26:20 +00:00
|
|
|
|
|
|
|
n := len(updates)
|
|
|
|
inplace := 0
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
// Get the update
|
|
|
|
update := updates[i]
|
|
|
|
|
|
|
|
// Check if the task drivers or config has changed, requires
|
|
|
|
// a rolling upgrade since that cannot be done in-place.
|
|
|
|
existing := update.Alloc.Job.LookupTaskGroup(update.TaskGroup.Name)
|
|
|
|
if tasksUpdated(update.TaskGroup, existing) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the existing node
|
|
|
|
node, err := ctx.State().NodeByID(update.Alloc.NodeID)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger().Printf("[ERR] sched: %#v failed to get node '%s': %v",
|
|
|
|
eval, update.Alloc.NodeID, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if node == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the existing node as the base set
|
|
|
|
stack.SetNodes([]*structs.Node{node})
|
|
|
|
|
2015-10-16 23:35:55 +00:00
|
|
|
// Stage an eviction of the current allocation. This is done so that
|
|
|
|
// the current allocation is discounted when checking for feasability.
|
|
|
|
// Otherwise we would be trying to fit the tasks current resources and
|
|
|
|
// updated resources. After select is called we can remove the evict.
|
2015-10-15 00:26:20 +00:00
|
|
|
ctx.Plan().AppendUpdate(update.Alloc, structs.AllocDesiredStatusStop,
|
|
|
|
allocInPlace)
|
|
|
|
|
|
|
|
// Attempt to match the task group
|
2016-03-01 22:09:25 +00:00
|
|
|
option, _ := stack.Select(update.TaskGroup)
|
2015-10-15 00:26:20 +00:00
|
|
|
|
|
|
|
// Pop the allocation
|
|
|
|
ctx.Plan().PopUpdate(update.Alloc)
|
|
|
|
|
|
|
|
// Skip if we could not do an in-place update
|
|
|
|
if option == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Restore the network offers from the existing allocation.
|
|
|
|
// We do not allow network resources (reserved/dynamic ports)
|
|
|
|
// to be updated. This is guarded in taskUpdated, so we can
|
|
|
|
// safely restore those here.
|
|
|
|
for task, resources := range option.TaskResources {
|
|
|
|
existing := update.Alloc.TaskResources[task]
|
|
|
|
resources.Networks = existing.Networks
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a shallow copy
|
|
|
|
newAlloc := new(structs.Allocation)
|
|
|
|
*newAlloc = *update.Alloc
|
|
|
|
|
|
|
|
// Update the allocation
|
|
|
|
newAlloc.EvalID = eval.ID
|
2016-03-01 22:09:25 +00:00
|
|
|
newAlloc.Job = nil // Use the Job in the Plan
|
|
|
|
newAlloc.Resources = nil // Computed in Plan Apply
|
2015-10-15 00:26:20 +00:00
|
|
|
newAlloc.TaskResources = option.TaskResources
|
|
|
|
newAlloc.Metrics = ctx.Metrics()
|
|
|
|
newAlloc.DesiredStatus = structs.AllocDesiredStatusRun
|
|
|
|
newAlloc.ClientStatus = structs.AllocClientStatusPending
|
2016-02-21 19:15:00 +00:00
|
|
|
newAlloc.PopulateServiceIDs(update.TaskGroup)
|
2015-10-15 00:26:20 +00:00
|
|
|
ctx.Plan().AppendAlloc(newAlloc)
|
|
|
|
|
|
|
|
// Remove this allocation from the slice
|
|
|
|
updates[i] = updates[n-1]
|
|
|
|
i--
|
|
|
|
n--
|
|
|
|
inplace++
|
|
|
|
}
|
|
|
|
if len(updates) > 0 {
|
|
|
|
ctx.Logger().Printf("[DEBUG] sched: %#v: %d in-place updates of %d", eval, inplace, len(updates))
|
|
|
|
}
|
|
|
|
return updates[:n]
|
|
|
|
}
|
|
|
|
|
|
|
|
// evictAndPlace is used to mark allocations for evicts and add them to the
|
|
|
|
// placement queue. evictAndPlace modifies both the the diffResult and the
|
|
|
|
// limit. It returns true if the limit has been reached.
|
2015-10-16 18:43:09 +00:00
|
|
|
func evictAndPlace(ctx Context, diff *diffResult, allocs []allocTuple, desc string, limit *int) bool {
|
2015-10-15 00:26:20 +00:00
|
|
|
n := len(allocs)
|
|
|
|
for i := 0; i < n && i < *limit; i++ {
|
|
|
|
a := allocs[i]
|
|
|
|
ctx.Plan().AppendUpdate(a.Alloc, structs.AllocDesiredStatusStop, desc)
|
|
|
|
diff.place = append(diff.place, a)
|
|
|
|
}
|
|
|
|
if n <= *limit {
|
|
|
|
*limit -= n
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
*limit = 0
|
|
|
|
return true
|
|
|
|
}
|
2015-10-16 21:00:51 +00:00
|
|
|
|
|
|
|
// tgConstrainTuple is used to store the total constraints of a task group.
|
|
|
|
type tgConstrainTuple struct {
|
|
|
|
// Holds the combined constraints of the task group and all it's sub-tasks.
|
|
|
|
constraints []*structs.Constraint
|
|
|
|
|
|
|
|
// The set of required drivers within the task group.
|
|
|
|
drivers map[string]struct{}
|
|
|
|
|
|
|
|
// The combined resources of all tasks within the task group.
|
|
|
|
size *structs.Resources
|
|
|
|
}
|
|
|
|
|
|
|
|
// taskGroupConstraints collects the constraints, drivers and resources required by each
|
|
|
|
// sub-task to aggregate the TaskGroup totals
|
|
|
|
func taskGroupConstraints(tg *structs.TaskGroup) tgConstrainTuple {
|
|
|
|
c := tgConstrainTuple{
|
|
|
|
constraints: make([]*structs.Constraint, 0, len(tg.Constraints)),
|
|
|
|
drivers: make(map[string]struct{}),
|
|
|
|
size: new(structs.Resources),
|
|
|
|
}
|
|
|
|
|
|
|
|
c.constraints = append(c.constraints, tg.Constraints...)
|
|
|
|
for _, task := range tg.Tasks {
|
|
|
|
c.drivers[task.Driver] = struct{}{}
|
|
|
|
c.constraints = append(c.constraints, task.Constraints...)
|
|
|
|
c.size.Add(task.Resources)
|
|
|
|
}
|
|
|
|
|
|
|
|
return c
|
|
|
|
}
|