2015-08-12 00:57:23 +00:00
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
2015-08-13 17:19:46 +00:00
|
|
|
"fmt"
|
2015-08-13 17:46:30 +00:00
|
|
|
"reflect"
|
2015-10-11 19:35:13 +00:00
|
|
|
"regexp"
|
2015-10-14 23:43:06 +00:00
|
|
|
"strconv"
|
2015-08-13 17:46:30 +00:00
|
|
|
"strings"
|
2015-08-12 00:57:23 +00:00
|
|
|
|
2015-10-11 19:12:39 +00:00
|
|
|
"github.com/hashicorp/go-version"
|
2015-08-12 00:57:23 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
// FeasibleIterator is used to iteratively yield nodes that
|
|
|
|
// match feasibility constraints. The iterators may manage
|
|
|
|
// some state for performance optimizations.
|
|
|
|
type FeasibleIterator interface {
|
|
|
|
// Next yields a feasible node or nil if exhausted
|
|
|
|
Next() *structs.Node
|
2015-08-13 22:01:02 +00:00
|
|
|
|
|
|
|
// Reset is invoked when an allocation has been placed
|
|
|
|
// to reset any stale state.
|
|
|
|
Reset()
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// FeasibilityChecker is used to check if a single node meets feasibility
|
|
|
|
// constraints.
|
|
|
|
type FeasibilityChecker interface {
|
|
|
|
Feasible(*structs.Node) bool
|
|
|
|
}
|
|
|
|
|
2015-08-12 00:57:23 +00:00
|
|
|
// StaticIterator is a FeasibleIterator which returns nodes
|
|
|
|
// in a static order. This is used at the base of the iterator
|
|
|
|
// chain only for testing due to deterministic behavior.
|
|
|
|
type StaticIterator struct {
|
|
|
|
ctx Context
|
|
|
|
nodes []*structs.Node
|
|
|
|
offset int
|
2015-08-13 22:01:02 +00:00
|
|
|
seen int
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewStaticIterator constructs a random iterator from a list of nodes
|
|
|
|
func NewStaticIterator(ctx Context, nodes []*structs.Node) *StaticIterator {
|
|
|
|
iter := &StaticIterator{
|
|
|
|
ctx: ctx,
|
|
|
|
nodes: nodes,
|
|
|
|
}
|
|
|
|
return iter
|
|
|
|
}
|
|
|
|
|
|
|
|
func (iter *StaticIterator) Next() *structs.Node {
|
|
|
|
// Check if exhausted
|
2015-08-13 22:01:02 +00:00
|
|
|
n := len(iter.nodes)
|
|
|
|
if iter.offset == n || iter.seen == n {
|
|
|
|
if iter.seen != n {
|
|
|
|
iter.offset = 0
|
|
|
|
} else {
|
|
|
|
return nil
|
|
|
|
}
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return the next offset
|
|
|
|
offset := iter.offset
|
|
|
|
iter.offset += 1
|
2015-08-13 22:01:02 +00:00
|
|
|
iter.seen += 1
|
2015-08-14 04:46:33 +00:00
|
|
|
iter.ctx.Metrics().EvaluateNode()
|
2015-08-12 00:57:23 +00:00
|
|
|
return iter.nodes[offset]
|
|
|
|
}
|
|
|
|
|
2015-08-13 22:01:02 +00:00
|
|
|
func (iter *StaticIterator) Reset() {
|
|
|
|
iter.seen = 0
|
|
|
|
}
|
|
|
|
|
2015-09-07 18:26:16 +00:00
|
|
|
func (iter *StaticIterator) SetNodes(nodes []*structs.Node) {
|
|
|
|
iter.nodes = nodes
|
|
|
|
iter.offset = 0
|
|
|
|
iter.seen = 0
|
|
|
|
}
|
|
|
|
|
2015-08-12 00:57:23 +00:00
|
|
|
// NewRandomIterator constructs a static iterator from a list of nodes
|
2015-08-13 17:13:11 +00:00
|
|
|
// after applying the Fisher-Yates algorithm for a random shuffle. This
|
|
|
|
// is applied in-place
|
2015-08-12 00:57:23 +00:00
|
|
|
func NewRandomIterator(ctx Context, nodes []*structs.Node) *StaticIterator {
|
|
|
|
// shuffle with the Fisher-Yates algorithm
|
2015-09-07 18:23:38 +00:00
|
|
|
shuffleNodes(nodes)
|
2015-08-12 00:57:23 +00:00
|
|
|
|
|
|
|
// Create a static iterator
|
|
|
|
return NewStaticIterator(ctx, nodes)
|
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// DriverChecker is a FeasibilityChecker which returns whether a node has the
|
|
|
|
// drivers necessary to scheduler a task group.
|
|
|
|
type DriverChecker struct {
|
2015-08-13 17:19:46 +00:00
|
|
|
ctx Context
|
|
|
|
drivers map[string]struct{}
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// NewDriverChecker creates a DriverChecker from a set of drivers
|
|
|
|
func NewDriverChecker(ctx Context, drivers map[string]struct{}) *DriverChecker {
|
|
|
|
return &DriverChecker{
|
2015-08-13 17:19:46 +00:00
|
|
|
ctx: ctx,
|
|
|
|
drivers: drivers,
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *DriverChecker) SetDrivers(d map[string]struct{}) {
|
|
|
|
c.drivers = d
|
2015-08-13 20:52:20 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *DriverChecker) Feasible(option *structs.Node) bool {
|
|
|
|
// Use this node if possible
|
|
|
|
if c.hasDrivers(option) {
|
|
|
|
return true
|
2015-08-12 00:57:23 +00:00
|
|
|
}
|
2016-01-26 18:07:33 +00:00
|
|
|
c.ctx.Metrics().FilterNode(option, "missing drivers")
|
|
|
|
return false
|
2015-08-13 22:01:02 +00:00
|
|
|
}
|
|
|
|
|
2015-08-13 17:19:46 +00:00
|
|
|
// hasDrivers is used to check if the node has all the appropriate
|
|
|
|
// drivers for this task group. Drivers are registered as node attribute
|
|
|
|
// like "driver.docker=1" with their corresponding version.
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *DriverChecker) hasDrivers(option *structs.Node) bool {
|
|
|
|
for driver := range c.drivers {
|
2015-08-13 17:19:46 +00:00
|
|
|
driverStr := fmt.Sprintf("driver.%s", driver)
|
2015-10-14 23:43:06 +00:00
|
|
|
value, ok := option.Attributes[driverStr]
|
2015-08-13 17:19:46 +00:00
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
enabled, err := strconv.ParseBool(value)
|
|
|
|
if err != nil {
|
2016-01-26 18:07:33 +00:00
|
|
|
c.ctx.Logger().
|
|
|
|
Printf("[WARN] scheduler.DriverChecker: node %v has invalid driver setting %v: %v",
|
2016-02-19 23:49:32 +00:00
|
|
|
option.ID, driverStr, value)
|
2015-10-14 23:43:06 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !enabled {
|
|
|
|
return false
|
|
|
|
}
|
2015-08-13 17:19:46 +00:00
|
|
|
}
|
2015-08-12 00:57:23 +00:00
|
|
|
return true
|
|
|
|
}
|
2015-08-12 01:27:54 +00:00
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
// ProposedAllocConstraintIterator is a FeasibleIterator which returns nodes that
|
2015-10-22 21:31:12 +00:00
|
|
|
// match constraints that are not static such as Node attributes but are
|
2015-10-26 21:12:54 +00:00
|
|
|
// effected by proposed alloc placements. Examples are distinct_hosts and
|
|
|
|
// tenancy constraints. This is used to filter on job and task group
|
|
|
|
// constraints.
|
|
|
|
type ProposedAllocConstraintIterator struct {
|
2015-10-22 21:31:12 +00:00
|
|
|
ctx Context
|
|
|
|
source FeasibleIterator
|
|
|
|
tg *structs.TaskGroup
|
|
|
|
job *structs.Job
|
|
|
|
|
2015-10-26 20:47:56 +00:00
|
|
|
// Store whether the Job or TaskGroup has a distinct_hosts constraints so
|
2015-10-23 00:40:41 +00:00
|
|
|
// they don't have to be calculated every time Next() is called.
|
|
|
|
tgDistinctHosts bool
|
|
|
|
jobDistinctHosts bool
|
2015-10-22 21:31:12 +00:00
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
// NewProposedAllocConstraintIterator creates a ProposedAllocConstraintIterator
|
|
|
|
// from a source.
|
|
|
|
func NewProposedAllocConstraintIterator(ctx Context, source FeasibleIterator) *ProposedAllocConstraintIterator {
|
2016-01-26 18:07:33 +00:00
|
|
|
return &ProposedAllocConstraintIterator{
|
2015-10-22 21:31:12 +00:00
|
|
|
ctx: ctx,
|
|
|
|
source: source,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) SetTaskGroup(tg *structs.TaskGroup) {
|
2015-10-22 21:31:12 +00:00
|
|
|
iter.tg = tg
|
2015-10-23 00:40:41 +00:00
|
|
|
iter.tgDistinctHosts = iter.hasDistinctHostsConstraint(tg.Constraints)
|
2015-10-22 21:31:12 +00:00
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) SetJob(job *structs.Job) {
|
2015-10-22 21:31:12 +00:00
|
|
|
iter.job = job
|
2015-10-23 00:40:41 +00:00
|
|
|
iter.jobDistinctHosts = iter.hasDistinctHostsConstraint(job.Constraints)
|
2015-10-22 21:31:12 +00:00
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) hasDistinctHostsConstraint(constraints []*structs.Constraint) bool {
|
2015-10-22 21:31:12 +00:00
|
|
|
for _, con := range constraints {
|
2015-10-26 20:47:56 +00:00
|
|
|
if con.Operand == structs.ConstraintDistinctHosts {
|
2015-10-22 21:31:12 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) Next() *structs.Node {
|
2015-10-22 21:31:12 +00:00
|
|
|
for {
|
|
|
|
// Get the next option from the source
|
|
|
|
option := iter.source.Next()
|
|
|
|
|
2015-10-26 20:47:56 +00:00
|
|
|
// Hot-path if the option is nil or there are no distinct_hosts constraints.
|
2015-10-26 21:12:54 +00:00
|
|
|
if option == nil || !(iter.jobDistinctHosts || iter.tgDistinctHosts) {
|
2015-10-22 21:31:12 +00:00
|
|
|
return option
|
|
|
|
}
|
|
|
|
|
2015-10-26 21:01:32 +00:00
|
|
|
if !iter.satisfiesDistinctHosts(option) {
|
2015-10-26 20:47:56 +00:00
|
|
|
iter.ctx.Metrics().FilterNode(option, structs.ConstraintDistinctHosts)
|
2015-10-22 21:31:12 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return option
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-26 20:47:56 +00:00
|
|
|
// satisfiesDistinctHosts checks if the node satisfies a distinct_hosts
|
2015-10-23 00:40:41 +00:00
|
|
|
// constraint either specified at the job level or the TaskGroup level.
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) satisfiesDistinctHosts(option *structs.Node) bool {
|
2015-10-26 21:01:32 +00:00
|
|
|
// Check if there is no constraint set.
|
|
|
|
if !(iter.jobDistinctHosts || iter.tgDistinctHosts) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2015-10-22 21:31:12 +00:00
|
|
|
// Get the proposed allocations
|
|
|
|
proposed, err := iter.ctx.ProposedAllocs(option.ID)
|
|
|
|
if err != nil {
|
|
|
|
iter.ctx.Logger().Printf(
|
2015-10-23 16:56:48 +00:00
|
|
|
"[ERR] scheduler.dynamic-constraint: failed to get proposed allocations: %v", err)
|
2015-10-22 21:31:12 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Skip the node if the task group has already been allocated on it.
|
|
|
|
for _, alloc := range proposed {
|
2015-10-26 20:47:56 +00:00
|
|
|
// If the job has a distinct_hosts constraint we only need an alloc
|
2015-10-23 00:40:41 +00:00
|
|
|
// collision on the JobID but if the constraint is on the TaskGroup then
|
|
|
|
// we need both a job and TaskGroup collision.
|
2015-10-26 21:01:32 +00:00
|
|
|
jobCollision := alloc.JobID == iter.job.ID
|
|
|
|
taskCollision := alloc.TaskGroup == iter.tg.Name
|
|
|
|
if iter.jobDistinctHosts && jobCollision || jobCollision && taskCollision {
|
2015-10-22 21:31:12 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2015-10-26 21:12:54 +00:00
|
|
|
func (iter *ProposedAllocConstraintIterator) Reset() {
|
2015-10-22 21:31:12 +00:00
|
|
|
iter.source.Reset()
|
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// ConstraintChecker is a FeasibilityChecker which returns nodes that match a
|
|
|
|
// given set of constraints. This is used to filter on job, task group, and task
|
|
|
|
// constraints.
|
|
|
|
type ConstraintChecker struct {
|
2015-08-13 17:19:46 +00:00
|
|
|
ctx Context
|
|
|
|
constraints []*structs.Constraint
|
2015-08-12 01:27:54 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// NewConstraintChecker creates a ConstraintChecker for a set of constraints
|
|
|
|
func NewConstraintChecker(ctx Context, constraints []*structs.Constraint) *ConstraintChecker {
|
|
|
|
return &ConstraintChecker{
|
2015-08-13 17:19:46 +00:00
|
|
|
ctx: ctx,
|
|
|
|
constraints: constraints,
|
2015-08-12 01:27:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *ConstraintChecker) SetConstraints(constraints []*structs.Constraint) {
|
|
|
|
c.constraints = constraints
|
2015-08-13 20:52:20 +00:00
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *ConstraintChecker) Feasible(option *structs.Node) bool {
|
|
|
|
// Use this node if possible
|
|
|
|
for _, constraint := range c.constraints {
|
|
|
|
if !c.meetsConstraint(constraint, option) {
|
|
|
|
c.ctx.Metrics().FilterNode(option, constraint.String())
|
2015-08-13 17:46:30 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
2015-08-12 01:27:54 +00:00
|
|
|
return true
|
|
|
|
}
|
2015-08-13 17:46:30 +00:00
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
func (c *ConstraintChecker) meetsConstraint(constraint *structs.Constraint, option *structs.Node) bool {
|
2015-08-13 17:46:30 +00:00
|
|
|
// Resolve the targets
|
|
|
|
lVal, ok := resolveConstraintTarget(constraint.LTarget, option)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
rVal, ok := resolveConstraintTarget(constraint.RTarget, option)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if satisfied
|
2016-01-26 18:07:33 +00:00
|
|
|
return checkConstraint(c.ctx, constraint.Operand, lVal, rVal)
|
2015-08-13 17:46:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// resolveConstraintTarget is used to resolve the LTarget and RTarget of a Constraint
|
|
|
|
func resolveConstraintTarget(target string, node *structs.Node) (interface{}, bool) {
|
|
|
|
// If no prefix, this must be a literal value
|
2016-02-16 18:03:04 +00:00
|
|
|
if !strings.HasPrefix(target, "${") {
|
2015-08-13 17:46:30 +00:00
|
|
|
return target, true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handle the interpolations
|
|
|
|
switch {
|
2016-02-05 00:50:20 +00:00
|
|
|
case "${node.unique.id}" == target:
|
2015-08-13 17:46:30 +00:00
|
|
|
return node.ID, true
|
|
|
|
|
2016-02-05 00:50:20 +00:00
|
|
|
case "${node.datacenter}" == target:
|
2015-08-13 17:46:30 +00:00
|
|
|
return node.Datacenter, true
|
|
|
|
|
2016-02-05 00:50:20 +00:00
|
|
|
case "${node.unique.name}" == target:
|
2015-08-13 17:46:30 +00:00
|
|
|
return node.Name, true
|
|
|
|
|
2016-02-05 00:50:20 +00:00
|
|
|
case "${node.class}" == target:
|
2015-12-22 01:15:34 +00:00
|
|
|
return node.NodeClass, true
|
|
|
|
|
2016-02-05 00:50:20 +00:00
|
|
|
case strings.HasPrefix(target, "${attr."):
|
|
|
|
attr := strings.TrimSuffix(strings.TrimPrefix(target, "${attr."), "}")
|
2015-08-13 17:46:30 +00:00
|
|
|
val, ok := node.Attributes[attr]
|
|
|
|
return val, ok
|
|
|
|
|
2016-02-05 00:50:20 +00:00
|
|
|
case strings.HasPrefix(target, "${meta."):
|
|
|
|
meta := strings.TrimSuffix(strings.TrimPrefix(target, "${meta."), "}")
|
2015-08-13 17:46:30 +00:00
|
|
|
val, ok := node.Meta[meta]
|
|
|
|
return val, ok
|
|
|
|
|
|
|
|
default:
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkConstraint checks if a constraint is satisfied
|
2015-10-13 03:15:07 +00:00
|
|
|
func checkConstraint(ctx Context, operand string, lVal, rVal interface{}) bool {
|
2016-01-26 18:07:33 +00:00
|
|
|
// Check for constraints not handled by this checker.
|
2015-10-22 21:31:12 +00:00
|
|
|
switch operand {
|
2015-10-26 20:47:56 +00:00
|
|
|
case structs.ConstraintDistinctHosts:
|
2015-10-22 21:31:12 +00:00
|
|
|
return true
|
|
|
|
default:
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
2015-08-13 17:46:30 +00:00
|
|
|
switch operand {
|
|
|
|
case "=", "==", "is":
|
|
|
|
return reflect.DeepEqual(lVal, rVal)
|
|
|
|
case "!=", "not":
|
|
|
|
return !reflect.DeepEqual(lVal, rVal)
|
|
|
|
case "<", "<=", ">", ">=":
|
2015-10-11 19:57:06 +00:00
|
|
|
return checkLexicalOrder(operand, lVal, rVal)
|
2015-10-26 20:47:56 +00:00
|
|
|
case structs.ConstraintVersion:
|
2015-10-13 03:15:07 +00:00
|
|
|
return checkVersionConstraint(ctx, lVal, rVal)
|
2015-10-26 20:47:56 +00:00
|
|
|
case structs.ConstraintRegex:
|
2015-10-13 03:15:07 +00:00
|
|
|
return checkRegexpConstraint(ctx, lVal, rVal)
|
2016-10-19 20:06:28 +00:00
|
|
|
case structs.ConstraintSetContains:
|
|
|
|
return checkSetContainsConstraint(ctx, lVal, rVal)
|
2015-08-13 17:46:30 +00:00
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
2015-10-11 19:12:39 +00:00
|
|
|
|
2015-10-11 19:57:06 +00:00
|
|
|
// checkLexicalOrder is used to check for lexical ordering
|
|
|
|
func checkLexicalOrder(op string, lVal, rVal interface{}) bool {
|
|
|
|
// Ensure the values are strings
|
|
|
|
lStr, ok := lVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
rStr, ok := rVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
switch op {
|
|
|
|
case "<":
|
|
|
|
return lStr < rStr
|
|
|
|
case "<=":
|
|
|
|
return lStr <= rStr
|
|
|
|
case ">":
|
|
|
|
return lStr > rStr
|
|
|
|
case ">=":
|
|
|
|
return lStr >= rStr
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-11 19:12:39 +00:00
|
|
|
// checkVersionConstraint is used to compare a version on the
|
|
|
|
// left hand side with a set of constraints on the right hand side
|
2015-10-13 03:15:07 +00:00
|
|
|
func checkVersionConstraint(ctx Context, lVal, rVal interface{}) bool {
|
2015-10-11 19:12:39 +00:00
|
|
|
// Parse the version
|
|
|
|
var versionStr string
|
|
|
|
switch v := lVal.(type) {
|
|
|
|
case string:
|
|
|
|
versionStr = v
|
|
|
|
case int:
|
|
|
|
versionStr = fmt.Sprintf("%d", v)
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-05-15 16:41:34 +00:00
|
|
|
// Parse the version
|
2015-10-11 19:12:39 +00:00
|
|
|
vers, err := version.NewVersion(versionStr)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Constraint must be a string
|
|
|
|
constraintStr, ok := rVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2015-10-13 03:15:07 +00:00
|
|
|
// Check the cache for a match
|
|
|
|
cache := ctx.ConstraintCache()
|
|
|
|
constraints := cache[constraintStr]
|
|
|
|
|
2015-10-11 19:12:39 +00:00
|
|
|
// Parse the constraints
|
2015-10-13 03:15:07 +00:00
|
|
|
if constraints == nil {
|
|
|
|
constraints, err = version.NewConstraint(constraintStr)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
cache[constraintStr] = constraints
|
2015-10-11 19:12:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check the constraints against the version
|
|
|
|
return constraints.Check(vers)
|
|
|
|
}
|
2015-10-11 19:35:13 +00:00
|
|
|
|
|
|
|
// checkRegexpConstraint is used to compare a value on the
|
|
|
|
// left hand side with a regexp on the right hand side
|
2015-10-13 03:15:07 +00:00
|
|
|
func checkRegexpConstraint(ctx Context, lVal, rVal interface{}) bool {
|
2015-10-11 19:35:13 +00:00
|
|
|
// Ensure left-hand is string
|
|
|
|
lStr, ok := lVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Regexp must be a string
|
|
|
|
regexpStr, ok := rVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2015-10-13 03:15:07 +00:00
|
|
|
// Check the cache
|
|
|
|
cache := ctx.RegexpCache()
|
|
|
|
re := cache[regexpStr]
|
|
|
|
|
2015-10-11 19:35:13 +00:00
|
|
|
// Parse the regexp
|
2015-10-13 03:15:07 +00:00
|
|
|
if re == nil {
|
|
|
|
var err error
|
|
|
|
re, err = regexp.Compile(regexpStr)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
cache[regexpStr] = re
|
2015-10-11 19:35:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Look for a match
|
|
|
|
return re.MatchString(lStr)
|
|
|
|
}
|
2016-01-26 18:07:33 +00:00
|
|
|
|
2016-10-19 20:06:28 +00:00
|
|
|
// checkSetContainsConstraint is used to see if the left hand side contains the
|
|
|
|
// string on the right hand side
|
|
|
|
func checkSetContainsConstraint(ctx Context, lVal, rVal interface{}) bool {
|
|
|
|
// Ensure left-hand is string
|
|
|
|
lStr, ok := lVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Regexp must be a string
|
|
|
|
rStr, ok := rVal.(string)
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
input := strings.Split(lStr, ",")
|
|
|
|
lookup := make(map[string]struct{}, len(input))
|
|
|
|
for _, in := range input {
|
|
|
|
cleaned := strings.TrimSpace(in)
|
|
|
|
lookup[cleaned] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, r := range strings.Split(rStr, ",") {
|
|
|
|
cleaned := strings.TrimSpace(r)
|
|
|
|
if _, ok := lookup[cleaned]; !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2016-01-26 18:07:33 +00:00
|
|
|
// FeasibilityWrapper is a FeasibleIterator which wraps both job and task group
|
|
|
|
// FeasibilityCheckers in which feasibility checking can be skipped if the
|
|
|
|
// computed node class has previously been marked as eligible or ineligible.
|
|
|
|
type FeasibilityWrapper struct {
|
|
|
|
ctx Context
|
|
|
|
source FeasibleIterator
|
|
|
|
jobCheckers []FeasibilityChecker
|
|
|
|
tgCheckers []FeasibilityChecker
|
|
|
|
tg string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFeasibilityWrapper returns a FeasibleIterator based on the passed source
|
|
|
|
// and FeasibilityCheckers.
|
|
|
|
func NewFeasibilityWrapper(ctx Context, source FeasibleIterator,
|
|
|
|
jobCheckers, tgCheckers []FeasibilityChecker) *FeasibilityWrapper {
|
|
|
|
return &FeasibilityWrapper{
|
|
|
|
ctx: ctx,
|
|
|
|
source: source,
|
|
|
|
jobCheckers: jobCheckers,
|
|
|
|
tgCheckers: tgCheckers,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *FeasibilityWrapper) SetTaskGroup(tg string) {
|
|
|
|
w.tg = tg
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *FeasibilityWrapper) Reset() {
|
|
|
|
w.source.Reset()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next returns an eligible node, only running the FeasibilityCheckers as needed
|
|
|
|
// based on the sources computed node class.
|
|
|
|
func (w *FeasibilityWrapper) Next() *structs.Node {
|
|
|
|
evalElig := w.ctx.Eligibility()
|
|
|
|
metrics := w.ctx.Metrics()
|
|
|
|
|
|
|
|
OUTER:
|
|
|
|
for {
|
|
|
|
// Get the next option from the source
|
|
|
|
option := w.source.Next()
|
|
|
|
if option == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if the job has been marked as eligible or ineligible.
|
2016-01-27 00:43:42 +00:00
|
|
|
jobEscaped, jobUnknown := false, false
|
2016-01-26 18:07:33 +00:00
|
|
|
switch evalElig.JobStatus(option.ComputedClass) {
|
|
|
|
case EvalComputedClassIneligible:
|
|
|
|
// Fast path the ineligible case
|
|
|
|
metrics.FilterNode(option, "computed class ineligible")
|
|
|
|
continue
|
|
|
|
case EvalComputedClassEscaped:
|
|
|
|
jobEscaped = true
|
2016-01-27 00:43:42 +00:00
|
|
|
case EvalComputedClassUnknown:
|
|
|
|
jobUnknown = true
|
2016-01-26 18:07:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Run the job feasibility checks.
|
|
|
|
for _, check := range w.jobCheckers {
|
|
|
|
feasible := check.Feasible(option)
|
|
|
|
if !feasible {
|
|
|
|
// If the job hasn't escaped, set it to be ineligible since it
|
|
|
|
// failed a job check.
|
|
|
|
if !jobEscaped {
|
|
|
|
evalElig.SetJobEligibility(false, option.ComputedClass)
|
|
|
|
}
|
|
|
|
continue OUTER
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-27 00:43:42 +00:00
|
|
|
// Set the job eligibility if the constraints weren't escaped and it
|
|
|
|
// hasn't been set before.
|
|
|
|
if !jobEscaped && jobUnknown {
|
2016-01-26 18:07:33 +00:00
|
|
|
evalElig.SetJobEligibility(true, option.ComputedClass)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if the task group has been marked as eligible or ineligible.
|
2016-01-27 00:43:42 +00:00
|
|
|
tgEscaped, tgUnknown := false, false
|
2016-01-26 18:07:33 +00:00
|
|
|
switch evalElig.TaskGroupStatus(w.tg, option.ComputedClass) {
|
|
|
|
case EvalComputedClassIneligible:
|
|
|
|
// Fast path the ineligible case
|
|
|
|
metrics.FilterNode(option, "computed class ineligible")
|
|
|
|
continue
|
|
|
|
case EvalComputedClassEligible:
|
|
|
|
// Fast path the eligible case
|
|
|
|
return option
|
|
|
|
case EvalComputedClassEscaped:
|
|
|
|
tgEscaped = true
|
2016-01-27 00:43:42 +00:00
|
|
|
case EvalComputedClassUnknown:
|
|
|
|
tgUnknown = true
|
2016-01-26 18:07:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Run the task group feasibility checks.
|
|
|
|
for _, check := range w.tgCheckers {
|
|
|
|
feasible := check.Feasible(option)
|
|
|
|
if !feasible {
|
|
|
|
// If the task group hasn't escaped, set it to be ineligible
|
|
|
|
// since it failed a check.
|
|
|
|
if !tgEscaped {
|
|
|
|
evalElig.SetTaskGroupEligibility(false, w.tg, option.ComputedClass)
|
|
|
|
}
|
|
|
|
continue OUTER
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-27 00:43:42 +00:00
|
|
|
// Set the task group eligibility if the constraints weren't escaped and
|
|
|
|
// it hasn't been set before.
|
|
|
|
if !tgEscaped && tgUnknown {
|
2016-01-26 18:07:33 +00:00
|
|
|
evalElig.SetTaskGroupEligibility(true, w.tg, option.ComputedClass)
|
|
|
|
}
|
|
|
|
|
|
|
|
return option
|
|
|
|
}
|
|
|
|
}
|