2020-01-08 12:47:07 +00:00
|
|
|
package allocrunner
|
|
|
|
|
|
|
|
import (
|
2020-02-11 13:45:16 +00:00
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
|
2020-01-08 12:47:07 +00:00
|
|
|
hclog "github.com/hashicorp/go-hclog"
|
2020-02-11 13:45:16 +00:00
|
|
|
"github.com/hashicorp/nomad/client/pluginmanager/csimanager"
|
2020-01-08 12:47:07 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
// csiHook will wait for remote csi volumes to be attached to the host before
|
|
|
|
// continuing.
|
|
|
|
//
|
|
|
|
// It is a noop for allocs that do not depend on CSI Volumes.
|
|
|
|
type csiHook struct {
|
2020-02-11 13:45:16 +00:00
|
|
|
alloc *structs.Allocation
|
|
|
|
logger hclog.Logger
|
|
|
|
csimanager csimanager.Manager
|
|
|
|
rpcClient RPCer
|
2020-02-11 16:39:16 +00:00
|
|
|
updater hookResourceSetter
|
2020-01-08 12:47:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *csiHook) Name() string {
|
|
|
|
return "csi_hook"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *csiHook) Prerun() error {
|
|
|
|
if !c.shouldRun() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-30 20:46:43 +00:00
|
|
|
// TODO(tgross): the contexts for the CSI RPC calls made during
|
|
|
|
// mounting can have very long timeouts. Until these are better
|
|
|
|
// tuned, there's not a good value to put here for a WithCancel
|
|
|
|
// without risking conflicts with the grpc retries/timeouts in the
|
|
|
|
// pluginmanager package.
|
2020-02-11 13:45:16 +00:00
|
|
|
ctx := context.TODO()
|
2020-03-30 20:46:43 +00:00
|
|
|
|
2020-02-17 12:57:25 +00:00
|
|
|
volumes, err := c.claimVolumesFromAlloc()
|
2020-02-11 13:45:16 +00:00
|
|
|
if err != nil {
|
2020-03-10 14:22:42 +00:00
|
|
|
return fmt.Errorf("claim volumes: %v", err)
|
2020-02-11 13:45:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
mounts := make(map[string]*csimanager.MountInfo, len(volumes))
|
2020-02-17 11:10:12 +00:00
|
|
|
for alias, pair := range volumes {
|
2020-04-02 20:04:56 +00:00
|
|
|
mounter, err := c.csimanager.MounterForPlugin(ctx, pair.volume.PluginID)
|
2020-02-11 13:45:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-02-17 11:10:12 +00:00
|
|
|
usageOpts := &csimanager.UsageOptions{
|
|
|
|
ReadOnly: pair.request.ReadOnly,
|
|
|
|
AttachmentMode: string(pair.volume.AttachmentMode),
|
|
|
|
AccessMode: string(pair.volume.AccessMode),
|
2020-03-23 17:55:26 +00:00
|
|
|
MountOptions: pair.request.MountOptions,
|
2020-02-17 11:10:12 +00:00
|
|
|
}
|
|
|
|
|
2020-02-17 12:57:25 +00:00
|
|
|
mountInfo, err := mounter.MountVolume(ctx, pair.volume, c.alloc, usageOpts, pair.publishContext)
|
2020-02-11 13:45:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
mounts[alias] = mountInfo
|
|
|
|
}
|
|
|
|
|
2020-02-11 16:39:16 +00:00
|
|
|
res := c.updater.GetAllocHookResources()
|
|
|
|
res.CSIMounts = mounts
|
|
|
|
c.updater.SetAllocHookResources(res)
|
2020-02-11 13:45:16 +00:00
|
|
|
|
2020-01-08 12:47:07 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-17 11:10:12 +00:00
|
|
|
type volumeAndRequest struct {
|
|
|
|
volume *structs.CSIVolume
|
|
|
|
request *structs.VolumeRequest
|
2020-02-17 12:57:25 +00:00
|
|
|
|
|
|
|
// When volumeAndRequest was returned from a volume claim, this field will be
|
|
|
|
// populated for plugins that require it.
|
|
|
|
publishContext map[string]string
|
|
|
|
}
|
|
|
|
|
|
|
|
// claimVolumesFromAlloc is used by the pre-run hook to fetch all of the volume
|
|
|
|
// metadata and claim it for use by this alloc/node at the same time.
|
|
|
|
func (c *csiHook) claimVolumesFromAlloc() (map[string]*volumeAndRequest, error) {
|
|
|
|
result := make(map[string]*volumeAndRequest)
|
|
|
|
tg := c.alloc.Job.LookupTaskGroup(c.alloc.TaskGroup)
|
|
|
|
|
|
|
|
// Initially, populate the result map with all of the requests
|
|
|
|
for alias, volumeRequest := range tg.Volumes {
|
|
|
|
if volumeRequest.Type == structs.VolumeTypeCSI {
|
|
|
|
result[alias] = &volumeAndRequest{request: volumeRequest}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Iterate over the result map and upsert the volume field as each volume gets
|
|
|
|
// claimed by the server.
|
|
|
|
for alias, pair := range result {
|
|
|
|
claimType := structs.CSIVolumeClaimWrite
|
|
|
|
if pair.request.ReadOnly {
|
|
|
|
claimType = structs.CSIVolumeClaimRead
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &structs.CSIVolumeClaimRequest{
|
|
|
|
VolumeID: pair.request.Source,
|
|
|
|
AllocationID: c.alloc.ID,
|
|
|
|
Claim: claimType,
|
|
|
|
}
|
|
|
|
req.Region = c.alloc.Job.Region
|
|
|
|
|
|
|
|
var resp structs.CSIVolumeClaimResponse
|
|
|
|
if err := c.rpcClient.RPC("CSIVolume.Claim", req, &resp); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.Volume == nil {
|
|
|
|
return nil, fmt.Errorf("Unexpected nil volume returned for ID: %v", pair.request.Source)
|
|
|
|
}
|
|
|
|
|
|
|
|
result[alias].volume = resp.Volume
|
|
|
|
result[alias].publishContext = resp.PublishContext
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
2020-02-17 11:10:12 +00:00
|
|
|
}
|
|
|
|
|
2020-02-11 16:39:16 +00:00
|
|
|
func newCSIHook(logger hclog.Logger, alloc *structs.Allocation, rpcClient RPCer, csi csimanager.Manager, updater hookResourceSetter) *csiHook {
|
2020-01-08 12:47:07 +00:00
|
|
|
return &csiHook{
|
2020-02-11 13:45:16 +00:00
|
|
|
alloc: alloc,
|
|
|
|
logger: logger.Named("csi_hook"),
|
|
|
|
rpcClient: rpcClient,
|
|
|
|
csimanager: csi,
|
2020-02-11 16:39:16 +00:00
|
|
|
updater: updater,
|
2020-01-08 12:47:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *csiHook) shouldRun() bool {
|
|
|
|
tg := h.alloc.Job.LookupTaskGroup(h.alloc.TaskGroup)
|
|
|
|
for _, vol := range tg.Volumes {
|
|
|
|
if vol.Type == structs.VolumeTypeCSI {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|