2015-09-06 22:34:28 +00:00
|
|
|
package nomad
|
|
|
|
|
|
|
|
import (
|
2018-02-21 18:58:04 +00:00
|
|
|
"fmt"
|
2015-09-06 22:34:28 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/armon/go-metrics"
|
2015-12-24 10:46:59 +00:00
|
|
|
"github.com/hashicorp/go-memdb"
|
2017-10-12 23:27:33 +00:00
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
2017-09-15 00:24:51 +00:00
|
|
|
"github.com/hashicorp/nomad/acl"
|
2017-02-08 04:31:23 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/state"
|
2015-09-06 22:34:28 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Alloc endpoint is used for manipulating allocations
|
|
|
|
type Alloc struct {
|
|
|
|
srv *Server
|
|
|
|
}
|
|
|
|
|
|
|
|
// List is used to list the allocations in the system
|
|
|
|
func (a *Alloc) List(args *structs.AllocListRequest, reply *structs.AllocListResponse) error {
|
|
|
|
if done, err := a.srv.forward("Alloc.List", args, args, reply); done {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"nomad", "alloc", "list"}, time.Now())
|
|
|
|
|
2017-09-15 00:24:51 +00:00
|
|
|
// Check namespace read-job permissions
|
2017-10-12 22:16:33 +00:00
|
|
|
if aclObj, err := a.srv.ResolveToken(args.AuthToken); err != nil {
|
2017-09-15 00:24:51 +00:00
|
|
|
return err
|
|
|
|
} else if aclObj != nil && !aclObj.AllowNsOp(args.RequestNamespace(), acl.NamespaceCapabilityReadJob) {
|
|
|
|
return structs.ErrPermissionDenied
|
|
|
|
}
|
|
|
|
|
2015-10-29 02:25:39 +00:00
|
|
|
// Setup the blocking query
|
|
|
|
opts := blockingOptions{
|
2015-10-29 21:47:39 +00:00
|
|
|
queryOpts: &args.QueryOptions,
|
|
|
|
queryMeta: &reply.QueryMeta,
|
2017-02-08 04:31:23 +00:00
|
|
|
run: func(ws memdb.WatchSet, state *state.StateStore) error {
|
2015-10-29 02:25:39 +00:00
|
|
|
// Capture all the allocations
|
2017-02-08 04:31:23 +00:00
|
|
|
var err error
|
2015-12-24 10:46:59 +00:00
|
|
|
var iter memdb.ResultIterator
|
|
|
|
if prefix := args.QueryOptions.Prefix; prefix != "" {
|
2017-09-07 23:56:15 +00:00
|
|
|
iter, err = state.AllocsByIDPrefix(ws, args.RequestNamespace(), prefix)
|
2015-12-24 10:46:59 +00:00
|
|
|
} else {
|
2017-09-07 23:56:15 +00:00
|
|
|
iter, err = state.AllocsByNamespace(ws, args.RequestNamespace())
|
2015-12-24 10:46:59 +00:00
|
|
|
}
|
2015-10-29 02:25:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-06 22:34:28 +00:00
|
|
|
|
2015-10-29 02:25:39 +00:00
|
|
|
var allocs []*structs.AllocListStub
|
|
|
|
for {
|
|
|
|
raw := iter.Next()
|
|
|
|
if raw == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
alloc := raw.(*structs.Allocation)
|
|
|
|
allocs = append(allocs, alloc.Stub())
|
|
|
|
}
|
|
|
|
reply.Allocations = allocs
|
2015-09-06 22:34:28 +00:00
|
|
|
|
2015-10-29 02:25:39 +00:00
|
|
|
// Use the last index that affected the jobs table
|
2017-02-08 04:31:23 +00:00
|
|
|
index, err := state.Index("allocs")
|
2015-10-29 02:25:39 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
reply.Index = index
|
2015-09-06 22:34:28 +00:00
|
|
|
|
2015-10-29 02:25:39 +00:00
|
|
|
// Set the query response
|
|
|
|
a.srv.setQueryMeta(&reply.QueryMeta)
|
|
|
|
return nil
|
|
|
|
}}
|
|
|
|
return a.srv.blockingRPC(&opts)
|
2015-09-06 22:34:28 +00:00
|
|
|
}
|
2015-09-06 22:46:45 +00:00
|
|
|
|
|
|
|
// GetAlloc is used to lookup a particular allocation
|
|
|
|
func (a *Alloc) GetAlloc(args *structs.AllocSpecificRequest,
|
|
|
|
reply *structs.SingleAllocResponse) error {
|
|
|
|
if done, err := a.srv.forward("Alloc.GetAlloc", args, args, reply); done {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"nomad", "alloc", "get_alloc"}, time.Now())
|
|
|
|
|
2017-09-15 00:43:27 +00:00
|
|
|
// Check namespace read-job permissions
|
2017-10-12 22:16:33 +00:00
|
|
|
if aclObj, err := a.srv.ResolveToken(args.AuthToken); err != nil {
|
2017-10-12 23:27:33 +00:00
|
|
|
// If ResolveToken had an unexpected error return that
|
|
|
|
if err != structs.ErrTokenNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to lookup AuthToken as a Node.SecretID since nodes
|
|
|
|
// call this endpoint and don't have an ACL token.
|
|
|
|
node, stateErr := a.srv.fsm.State().NodeBySecretID(nil, args.AuthToken)
|
|
|
|
if stateErr != nil {
|
|
|
|
// Return the original ResolveToken error with this err
|
|
|
|
var merr multierror.Error
|
|
|
|
merr.Errors = append(merr.Errors, err, stateErr)
|
|
|
|
return merr.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not a node or a valid ACL token
|
|
|
|
if node == nil {
|
|
|
|
return structs.ErrTokenNotFound
|
|
|
|
}
|
2017-09-15 00:43:27 +00:00
|
|
|
} else if aclObj != nil && !aclObj.AllowNsOp(args.RequestNamespace(), acl.NamespaceCapabilityReadJob) {
|
|
|
|
return structs.ErrPermissionDenied
|
|
|
|
}
|
|
|
|
|
2015-10-29 23:04:53 +00:00
|
|
|
// Setup the blocking query
|
|
|
|
opts := blockingOptions{
|
|
|
|
queryOpts: &args.QueryOptions,
|
|
|
|
queryMeta: &reply.QueryMeta,
|
2017-02-08 04:31:23 +00:00
|
|
|
run: func(ws memdb.WatchSet, state *state.StateStore) error {
|
2015-10-29 23:04:53 +00:00
|
|
|
// Lookup the allocation
|
2017-02-08 04:31:23 +00:00
|
|
|
out, err := state.AllocByID(ws, args.AllocID)
|
2015-12-22 22:44:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2015-10-29 23:04:53 +00:00
|
|
|
}
|
2015-09-06 22:46:45 +00:00
|
|
|
|
2015-10-29 23:04:53 +00:00
|
|
|
// Setup the output
|
2015-10-30 15:27:47 +00:00
|
|
|
reply.Alloc = out
|
2015-10-29 23:04:53 +00:00
|
|
|
if out != nil {
|
|
|
|
reply.Index = out.ModifyIndex
|
|
|
|
} else {
|
2017-01-10 21:25:52 +00:00
|
|
|
// Use the last index that affected the allocs table
|
2017-02-08 04:31:23 +00:00
|
|
|
index, err := state.Index("allocs")
|
2015-10-29 23:04:53 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
reply.Index = index
|
|
|
|
}
|
2015-09-06 22:46:45 +00:00
|
|
|
|
2015-10-29 23:04:53 +00:00
|
|
|
// Set the query response
|
|
|
|
a.srv.setQueryMeta(&reply.QueryMeta)
|
|
|
|
return nil
|
|
|
|
}}
|
|
|
|
return a.srv.blockingRPC(&opts)
|
2015-09-06 22:46:45 +00:00
|
|
|
}
|
2016-02-01 21:57:35 +00:00
|
|
|
|
|
|
|
// GetAllocs is used to lookup a set of allocations
|
|
|
|
func (a *Alloc) GetAllocs(args *structs.AllocsGetRequest,
|
|
|
|
reply *structs.AllocsGetResponse) error {
|
|
|
|
if done, err := a.srv.forward("Alloc.GetAllocs", args, args, reply); done {
|
|
|
|
return err
|
|
|
|
}
|
2017-01-10 21:25:52 +00:00
|
|
|
defer metrics.MeasureSince([]string{"nomad", "alloc", "get_allocs"}, time.Now())
|
2016-02-01 21:57:35 +00:00
|
|
|
|
|
|
|
allocs := make([]*structs.Allocation, len(args.AllocIDs))
|
|
|
|
|
2017-01-10 21:25:52 +00:00
|
|
|
// Setup the blocking query. We wait for at least one of the requested
|
|
|
|
// allocations to be above the min query index. This guarantees that the
|
|
|
|
// server has received that index.
|
|
|
|
opts := blockingOptions{
|
|
|
|
queryOpts: &args.QueryOptions,
|
|
|
|
queryMeta: &reply.QueryMeta,
|
2017-02-08 04:31:23 +00:00
|
|
|
run: func(ws memdb.WatchSet, state *state.StateStore) error {
|
2017-01-10 21:25:52 +00:00
|
|
|
// Lookup the allocation
|
|
|
|
thresholdMet := false
|
|
|
|
maxIndex := uint64(0)
|
|
|
|
for i, alloc := range args.AllocIDs {
|
2017-02-08 04:31:23 +00:00
|
|
|
out, err := state.AllocByID(ws, alloc)
|
2017-01-10 21:25:52 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
// We don't have the alloc yet
|
|
|
|
thresholdMet = false
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store the pointer
|
|
|
|
allocs[i] = out
|
|
|
|
|
|
|
|
// Check if we have passed the minimum index
|
|
|
|
if out.ModifyIndex > args.QueryOptions.MinQueryIndex {
|
|
|
|
thresholdMet = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if maxIndex < out.ModifyIndex {
|
|
|
|
maxIndex = out.ModifyIndex
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup the output
|
|
|
|
if thresholdMet {
|
|
|
|
reply.Allocs = allocs
|
|
|
|
reply.Index = maxIndex
|
|
|
|
} else {
|
|
|
|
// Use the last index that affected the nodes table
|
2017-02-08 04:31:23 +00:00
|
|
|
index, err := state.Index("allocs")
|
2017-01-10 21:25:52 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
reply.Index = index
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the query response
|
|
|
|
a.srv.setQueryMeta(&reply.QueryMeta)
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
return a.srv.blockingRPC(&opts)
|
2016-02-01 21:57:35 +00:00
|
|
|
}
|
2018-02-21 18:58:04 +00:00
|
|
|
|
|
|
|
// UpdateDesiredTransistion is used to update the desired transistions of an
|
|
|
|
// allocation.
|
|
|
|
func (a *Alloc) UpdateDesiredTransistion(args *structs.AllocUpdateDesiredTransistionRequest, reply *structs.GenericResponse) error {
|
|
|
|
if done, err := a.srv.forward("Alloc.UpdateDesiredTransistion", args, args, reply); done {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer metrics.MeasureSince([]string{"nomad", "alloc", "update_desired_transistion"}, time.Now())
|
|
|
|
|
|
|
|
// Check that it is a management token.
|
|
|
|
if aclObj, err := a.srv.ResolveToken(args.AuthToken); err != nil {
|
|
|
|
return err
|
|
|
|
} else if aclObj != nil && !aclObj.IsManagement() {
|
|
|
|
return structs.ErrPermissionDenied
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure at least a single alloc
|
|
|
|
if len(args.Allocs) == 0 {
|
|
|
|
return fmt.Errorf("must update at least one allocation")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Commit this update via Raft
|
|
|
|
_, index, err := a.srv.raftApply(structs.AllocUpdateDesiredTransistionRequestType, args)
|
|
|
|
if err != nil {
|
|
|
|
a.srv.logger.Printf("[ERR] nomad.allocs: AllocUpdateDesiredTransistionRequest failed: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup the response
|
|
|
|
reply.Index = index
|
|
|
|
return nil
|
|
|
|
}
|