open-nomad/nomad/util.go

366 lines
9.0 KiB
Go
Raw Normal View History

2015-06-01 15:49:10 +00:00
package nomad
import (
2015-06-04 10:33:12 +00:00
"fmt"
2015-06-05 22:14:08 +00:00
"math/rand"
2015-06-03 11:35:48 +00:00
"net"
2015-06-01 15:49:10 +00:00
"os"
"path/filepath"
2015-06-03 10:26:50 +00:00
"strconv"
2015-06-03 11:35:48 +00:00
memdb "github.com/hashicorp/go-memdb"
2017-09-07 23:56:15 +00:00
version "github.com/hashicorp/go-version"
"github.com/hashicorp/nomad/nomad/state"
"github.com/hashicorp/nomad/nomad/structs"
2015-06-03 11:35:48 +00:00
"github.com/hashicorp/serf/serf"
2015-06-01 15:49:10 +00:00
)
2019-03-08 11:18:56 +00:00
// MinVersionPlanNormalization is the minimum version to support the
// normalization of Plan in SubmitPlan, and the denormalization raft log entry committed
2019-03-04 09:49:32 +00:00
// in ApplyPlanResultsRequest
var MinVersionPlanNormalization = version.Must(version.NewVersion("0.9.2"))
2019-03-04 09:49:32 +00:00
2015-06-01 15:49:10 +00:00
// ensurePath is used to make sure a path exists
func ensurePath(path string, dir bool) error {
if !dir {
path = filepath.Dir(path)
}
return os.MkdirAll(path, 0755)
}
2015-06-03 10:26:50 +00:00
2015-06-03 11:35:48 +00:00
// serverParts is used to return the parts of a server role
type serverParts struct {
Name string
ID string
Region string
Datacenter string
Port int
Bootstrap bool
Expect int
MajorVersion int
MinorVersion int
2017-09-07 23:56:15 +00:00
Build version.Version
RaftVersion int
Addr net.Addr
RPCAddr net.Addr
2017-09-07 23:56:15 +00:00
Status serf.MemberStatus
2018-09-20 00:13:37 +00:00
NonVoter bool
2015-06-03 11:35:48 +00:00
}
2015-06-04 10:33:12 +00:00
func (s *serverParts) String() string {
return fmt.Sprintf("%s (Addr: %s) (DC: %s)",
s.Name, s.Addr, s.Datacenter)
}
2018-01-30 06:01:42 +00:00
func (s *serverParts) Copy() *serverParts {
ns := new(serverParts)
*ns = *s
return ns
}
2015-06-03 11:35:48 +00:00
// Returns if a member is a Nomad server. Returns a boolean,
// and a struct with the various important components
func isNomadServer(m serf.Member) (bool, *serverParts) {
if m.Tags["role"] != "nomad" {
return false, nil
}
2017-11-27 22:46:37 +00:00
id := "unknown"
if v, ok := m.Tags["id"]; ok {
id = v
}
2015-06-03 11:35:48 +00:00
region := m.Tags["region"]
datacenter := m.Tags["dc"]
_, bootstrap := m.Tags["bootstrap"]
expect := 0
2018-01-16 21:35:32 +00:00
expectStr, ok := m.Tags["expect"]
2015-06-03 11:35:48 +00:00
var err error
if ok {
2018-01-16 21:35:32 +00:00
expect, err = strconv.Atoi(expectStr)
2015-06-03 11:35:48 +00:00
if err != nil {
return false, nil
}
}
// If the server is missing the rpc_addr tag, default to the serf advertise addr
2018-01-16 21:35:32 +00:00
rpcIP := net.ParseIP(m.Tags["rpc_addr"])
if rpcIP == nil {
rpcIP = m.Addr
}
2018-01-16 21:35:32 +00:00
portStr := m.Tags["port"]
port, err := strconv.Atoi(portStr)
2015-06-03 11:35:48 +00:00
if err != nil {
return false, nil
}
2018-01-16 21:35:32 +00:00
buildVersion, err := version.NewVersion(m.Tags["build"])
2017-09-07 23:56:15 +00:00
if err != nil {
return false, nil
}
// The "vsn" tag was Version, which is now the MajorVersion number.
majorVersionStr := m.Tags["vsn"]
majorVersion, err := strconv.Atoi(majorVersionStr)
2015-06-03 11:35:48 +00:00
if err != nil {
return false, nil
}
// To keep some semblance of convention, "mvn" is now the "Minor
// Version Number."
minorVersionStr := m.Tags["mvn"]
minorVersion, err := strconv.Atoi(minorVersionStr)
if err != nil {
minorVersion = 0
}
2018-01-16 21:35:32 +00:00
raftVsn := 0
raftVsnString, ok := m.Tags["raft_vsn"]
if ok {
2018-01-16 21:35:32 +00:00
raftVsn, err = strconv.Atoi(raftVsnString)
if err != nil {
return false, nil
}
}
2018-09-20 00:13:37 +00:00
// Check if the server is a non voter
_, nonVoter := m.Tags["nonvoter"]
2015-06-03 11:35:48 +00:00
addr := &net.TCPAddr{IP: m.Addr, Port: port}
2018-01-16 21:35:32 +00:00
rpcAddr := &net.TCPAddr{IP: rpcIP, Port: port}
2015-06-03 11:35:48 +00:00
parts := &serverParts{
Name: m.Name,
ID: id,
Region: region,
Datacenter: datacenter,
Port: port,
Bootstrap: bootstrap,
Expect: expect,
Addr: addr,
RPCAddr: rpcAddr,
MajorVersion: majorVersion,
MinorVersion: minorVersion,
2018-01-16 21:35:32 +00:00
Build: *buildVersion,
RaftVersion: raftVsn,
2017-09-07 23:56:15 +00:00
Status: m.Status,
2018-09-20 00:13:37 +00:00
NonVoter: nonVoter,
2015-06-03 11:35:48 +00:00
}
return true, parts
}
2015-06-05 22:14:08 +00:00
// ServersMeetMinimumVersion returns whether the Nomad servers are at least on the
// given Nomad version. The checkFailedServers parameter specifies whether version
// for the failed servers should be verified.
2019-03-04 09:49:32 +00:00
func ServersMeetMinimumVersion(members []serf.Member, minVersion *version.Version, checkFailedServers bool) bool {
2017-09-07 23:56:15 +00:00
for _, member := range members {
2019-03-04 09:49:32 +00:00
if valid, parts := isNomadServer(member); valid && (parts.Status == serf.StatusAlive || (checkFailedServers && parts.Status == serf.StatusFailed)) {
// Check if the versions match - version.LessThan will return true for
// 0.8.0-rc1 < 0.8.0, so we want to ignore the metadata
versionsMatch := slicesMatch(minVersion.Segments(), parts.Build.Segments())
if parts.Build.LessThan(minVersion) && !versionsMatch {
2017-09-07 23:56:15 +00:00
return false
}
}
}
return true
}
func slicesMatch(a, b []int) bool {
if a == nil && b == nil {
return true
}
if a == nil || b == nil {
return false
}
if len(a) != len(b) {
return false
}
for i := range a {
if a[i] != b[i] {
return false
}
}
return true
}
2015-07-24 00:30:07 +00:00
// shuffleStrings randomly shuffles the list of strings
func shuffleStrings(list []string) {
for i := range list {
j := rand.Intn(i + 1)
list[i], list[j] = list[j], list[i]
}
}
2015-08-05 00:13:40 +00:00
2019-06-03 18:30:27 +00:00
// partitionAll splits a slice of strings into a slice of slices of strings, each with a max
// size of `size`. All entries from the original slice are preserved. The last slice may be
// smaller than `size`. The input slice is unmodified
func partitionAll(size int, xs []string) [][]string {
if size < 1 {
2019-06-07 14:58:16 +00:00
return [][]string{xs}
2019-06-03 18:30:27 +00:00
}
2019-06-07 14:58:16 +00:00
out := [][]string{}
for i := 0; i < len(xs); i += size {
j := i + size
if j > len(xs) {
j = len(xs)
}
2019-06-03 18:30:27 +00:00
out = append(out, xs[i:j])
}
return out
}
2015-08-05 00:13:40 +00:00
// maxUint64 returns the maximum value
2017-10-13 21:36:02 +00:00
func maxUint64(inputs ...uint64) uint64 {
l := len(inputs)
if l == 0 {
return 0
} else if l == 1 {
return inputs[0]
2015-08-05 00:13:40 +00:00
}
2017-10-13 21:36:02 +00:00
max := inputs[0]
for i := 1; i < l; i++ {
cur := inputs[i]
if cur > max {
max = cur
}
}
return max
2015-08-05 00:13:40 +00:00
}
// getNodeForRpc returns a Node struct if the Node supports Node RPC. Otherwise
// an error is returned.
func getNodeForRpc(snap *state.StateSnapshot, nodeID string) (*structs.Node, error) {
node, err := snap.NodeByID(nil, nodeID)
if err != nil {
return nil, err
}
if node == nil {
return nil, fmt.Errorf("%w %s", structs.ErrUnknownNode, nodeID)
}
if err := nodeSupportsRpc(node); err != nil {
return nil, err
}
return node, nil
}
var minNodeVersionSupportingRPC = version.Must(version.NewVersion("0.8.0-rc1"))
// nodeSupportsRpc returns a non-nil error if a Node does not support RPC.
func nodeSupportsRpc(node *structs.Node) error {
rawNodeVer, ok := node.Attributes["nomad.version"]
if !ok {
return structs.ErrUnknownNomadVersion
}
nodeVer, err := version.NewVersion(rawNodeVer)
if err != nil {
return structs.ErrUnknownNomadVersion
}
if nodeVer.LessThan(minNodeVersionSupportingRPC) {
return structs.ErrNodeLacksRpc
}
return nil
}
// AllocGetter is an interface for retrieving allocations by ID. It is
// satisfied by *state.StateStore and *state.StateSnapshot.
type AllocGetter interface {
AllocByID(ws memdb.WatchSet, id string) (*structs.Allocation, error)
}
// getAlloc retrieves an allocation by ID and namespace. If the allocation is
// nil, an error is returned.
func getAlloc(state AllocGetter, allocID string) (*structs.Allocation, error) {
if allocID == "" {
return nil, structs.ErrMissingAllocID
}
alloc, err := state.AllocByID(nil, allocID)
if err != nil {
return nil, err
}
if alloc == nil {
return nil, structs.NewErrUnknownAllocation(allocID)
}
return alloc, nil
}
// tlsCertificateLevel represents a role level for mTLS certificates.
type tlsCertificateLevel int8
const (
tlsCertificateLevelServer tlsCertificateLevel = iota
tlsCertificateLevelClient
)
// validateTLSCertificateLevel checks if the provided RPC connection was
// initiated with a certificate that matches the given TLS role level.
//
// - tlsCertificateLevelServer requires a server certificate.
// - tlsCertificateLevelServer requires a client or server certificate.
func validateTLSCertificateLevel(srv *Server, ctx *RPCContext, lvl tlsCertificateLevel) error {
switch lvl {
case tlsCertificateLevelClient:
err := validateLocalClientTLSCertificate(srv, ctx)
if err != nil {
return validateLocalServerTLSCertificate(srv, ctx)
}
return nil
case tlsCertificateLevelServer:
return validateLocalServerTLSCertificate(srv, ctx)
}
return fmt.Errorf("invalid TLS certificate level %v", lvl)
}
// validateLocalClientTLSCertificate checks if the provided RPC connection was
// initiated by a client in the same region as the target server.
func validateLocalClientTLSCertificate(srv *Server, ctx *RPCContext) error {
expected := fmt.Sprintf("client.%s.nomad", srv.Region())
err := validateTLSCertificate(srv, ctx, expected)
if err != nil {
return fmt.Errorf("invalid client connection in region %s: %v", srv.Region(), err)
}
return nil
}
// validateLocalServerTLSCertificate checks if the provided RPC connection was
// initiated by a server in the same region as the target server.
func validateLocalServerTLSCertificate(srv *Server, ctx *RPCContext) error {
expected := fmt.Sprintf("server.%s.nomad", srv.Region())
err := validateTLSCertificate(srv, ctx, expected)
if err != nil {
return fmt.Errorf("invalid server connection in region %s: %v", srv.Region(), err)
}
return nil
}
// validateTLSCertificate checks if the RPC connection mTLS certificates are
// valid for the given name.
func validateTLSCertificate(srv *Server, ctx *RPCContext, name string) error {
if srv.config.TLSConfig == nil || !srv.config.TLSConfig.VerifyServerHostname {
return nil
}
return ctx.ValidateCertificateForName(name)
}