2019-05-21 04:11:48 +00:00
|
|
|
package allocrunner
|
|
|
|
|
|
|
|
import (
|
2019-09-04 20:33:25 +00:00
|
|
|
"context"
|
2019-05-21 04:11:48 +00:00
|
|
|
"fmt"
|
|
|
|
|
|
|
|
hclog "github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/hashicorp/nomad/plugins/drivers"
|
|
|
|
)
|
|
|
|
|
2020-10-12 17:43:04 +00:00
|
|
|
type networkIsolationSetter interface {
|
|
|
|
SetNetworkIsolation(*drivers.NetworkIsolationSpec)
|
|
|
|
}
|
|
|
|
|
|
|
|
// allocNetworkIsolationSetter is a shim to allow the alloc network hook to
|
|
|
|
// set the alloc network isolation configuration without full access
|
|
|
|
// to the alloc runner
|
|
|
|
type allocNetworkIsolationSetter struct {
|
|
|
|
ar *allocRunner
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *allocNetworkIsolationSetter) SetNetworkIsolation(n *drivers.NetworkIsolationSpec) {
|
|
|
|
for _, tr := range a.ar.tasks {
|
|
|
|
tr.SetNetworkIsolation(n)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type networkStatusSetter interface {
|
|
|
|
SetNetworkStatus(*structs.AllocNetworkStatus)
|
|
|
|
}
|
|
|
|
|
2019-05-21 04:11:48 +00:00
|
|
|
// networkHook is an alloc lifecycle hook that manages the network namespace
|
|
|
|
// for an alloc
|
|
|
|
type networkHook struct {
|
2020-10-12 17:43:04 +00:00
|
|
|
// isolationSetter is a callback to set the network isolation spec when after the
|
2019-05-21 04:11:48 +00:00
|
|
|
// network is created
|
2020-10-12 17:43:04 +00:00
|
|
|
isolationSetter networkIsolationSetter
|
|
|
|
|
|
|
|
// statusSetter is a callback to the alloc runner to set the network status once
|
|
|
|
// network setup is complete
|
|
|
|
networkStatusSetter networkStatusSetter
|
2019-05-21 04:11:48 +00:00
|
|
|
|
|
|
|
// manager is used when creating the network namespace. This defaults to
|
|
|
|
// bind mounting a network namespace descritor under /var/run/netns but
|
|
|
|
// can be created by a driver if nessicary
|
|
|
|
manager drivers.DriverNetworkManager
|
|
|
|
|
|
|
|
// alloc should only be read from
|
|
|
|
alloc *structs.Allocation
|
|
|
|
|
|
|
|
// spec described the network namespace and is syncronized by specLock
|
|
|
|
spec *drivers.NetworkIsolationSpec
|
|
|
|
|
2019-06-14 03:05:57 +00:00
|
|
|
// networkConfigurator configures the network interfaces, routes, etc once
|
|
|
|
// the alloc network has been created
|
|
|
|
networkConfigurator NetworkConfigurator
|
|
|
|
|
2019-05-21 04:11:48 +00:00
|
|
|
logger hclog.Logger
|
|
|
|
}
|
|
|
|
|
2020-10-12 17:43:04 +00:00
|
|
|
func newNetworkHook(logger hclog.Logger,
|
|
|
|
ns networkIsolationSetter,
|
|
|
|
alloc *structs.Allocation,
|
|
|
|
netManager drivers.DriverNetworkManager,
|
|
|
|
netConfigurator NetworkConfigurator,
|
|
|
|
networkStatusSetter networkStatusSetter) *networkHook {
|
2019-05-21 04:11:48 +00:00
|
|
|
return &networkHook{
|
2020-10-12 17:43:04 +00:00
|
|
|
isolationSetter: ns,
|
|
|
|
networkStatusSetter: networkStatusSetter,
|
2019-06-14 03:05:57 +00:00
|
|
|
alloc: alloc,
|
|
|
|
manager: netManager,
|
|
|
|
networkConfigurator: netConfigurator,
|
|
|
|
logger: logger,
|
2019-05-21 04:11:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *networkHook) Name() string {
|
|
|
|
return "network"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *networkHook) Prerun() error {
|
|
|
|
tg := h.alloc.Job.LookupTaskGroup(h.alloc.TaskGroup)
|
|
|
|
if len(tg.Networks) == 0 || tg.Networks[0].Mode == "host" || tg.Networks[0].Mode == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-06-14 03:05:57 +00:00
|
|
|
if h.manager == nil || h.networkConfigurator == nil {
|
|
|
|
h.logger.Trace("shared network namespaces are not supported on this platform, skipping network hook")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-09-18 20:34:57 +00:00
|
|
|
spec, created, err := h.manager.CreateNetwork(h.alloc.ID)
|
|
|
|
|
2019-05-21 04:11:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to create network for alloc: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if spec != nil {
|
|
|
|
h.spec = spec
|
2020-10-12 17:43:04 +00:00
|
|
|
h.isolationSetter.SetNetworkIsolation(spec)
|
2019-05-21 04:11:48 +00:00
|
|
|
}
|
|
|
|
|
2019-09-18 20:34:57 +00:00
|
|
|
if created {
|
2020-10-12 17:43:04 +00:00
|
|
|
status, err := h.networkConfigurator.Setup(context.TODO(), h.alloc, spec)
|
|
|
|
if err != nil {
|
2019-09-18 20:34:57 +00:00
|
|
|
return fmt.Errorf("failed to configure networking for alloc: %v", err)
|
|
|
|
}
|
2020-10-12 17:43:04 +00:00
|
|
|
|
|
|
|
h.networkStatusSetter.SetNetworkStatus(status)
|
2019-06-11 04:29:12 +00:00
|
|
|
}
|
2019-05-21 04:11:48 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *networkHook) Postrun() error {
|
|
|
|
if h.spec == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-09-04 20:33:25 +00:00
|
|
|
if err := h.networkConfigurator.Teardown(context.TODO(), h.alloc, h.spec); err != nil {
|
2019-06-11 04:29:12 +00:00
|
|
|
h.logger.Error("failed to cleanup network for allocation, resources may have leaked", "alloc", h.alloc.ID, "error", err)
|
|
|
|
}
|
2019-05-21 04:11:48 +00:00
|
|
|
return h.manager.DestroyNetwork(h.alloc.ID, h.spec)
|
|
|
|
}
|