2015-08-25 23:13:33 +00:00
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
2022-01-10 15:19:07 +00:00
|
|
|
"errors"
|
2015-11-17 03:30:37 +00:00
|
|
|
"fmt"
|
2015-08-25 23:13:33 +00:00
|
|
|
"io"
|
2016-05-31 18:58:02 +00:00
|
|
|
"os"
|
2022-01-10 15:19:07 +00:00
|
|
|
"reflect"
|
2015-11-17 03:30:37 +00:00
|
|
|
"strconv"
|
2015-11-24 15:18:49 +00:00
|
|
|
"strings"
|
2015-12-23 00:10:30 +00:00
|
|
|
"time"
|
2015-08-25 23:13:33 +00:00
|
|
|
|
2022-01-10 15:19:07 +00:00
|
|
|
"github.com/hashicorp/consul-template/config"
|
2021-03-25 02:09:37 +00:00
|
|
|
"github.com/hashicorp/nomad/client/lib/cgutil"
|
2021-09-21 19:58:51 +00:00
|
|
|
"github.com/hashicorp/nomad/command/agent/host"
|
2021-03-25 02:09:37 +00:00
|
|
|
|
2018-09-13 17:43:40 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2019-01-09 18:57:56 +00:00
|
|
|
"github.com/hashicorp/nomad/client/state"
|
2017-01-18 23:55:14 +00:00
|
|
|
"github.com/hashicorp/nomad/helper"
|
2019-01-23 14:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/pluginutils/loader"
|
2015-08-25 23:13:33 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2020-09-04 17:50:11 +00:00
|
|
|
structsc "github.com/hashicorp/nomad/nomad/structs/config"
|
2018-10-17 02:21:15 +00:00
|
|
|
"github.com/hashicorp/nomad/plugins/base"
|
2017-08-16 22:42:15 +00:00
|
|
|
"github.com/hashicorp/nomad/version"
|
2015-08-25 23:13:33 +00:00
|
|
|
)
|
|
|
|
|
2016-03-23 18:45:03 +00:00
|
|
|
var (
|
2020-10-12 12:47:05 +00:00
|
|
|
// DefaultEnvDenylist is the default set of environment variables that are
|
2016-03-23 18:45:03 +00:00
|
|
|
// filtered when passing the environment variables of the host to a task.
|
2021-09-21 19:58:51 +00:00
|
|
|
DefaultEnvDenylist = strings.Join(host.DefaultEnvDenyList, ",")
|
2016-03-24 17:55:14 +00:00
|
|
|
|
2020-10-12 12:47:05 +00:00
|
|
|
// DefaultUserDenylist is the default set of users that tasks are not
|
2016-03-24 17:55:14 +00:00
|
|
|
// allowed to run as when using a driver in "user.checked_drivers"
|
2020-10-12 12:47:05 +00:00
|
|
|
DefaultUserDenylist = strings.Join([]string{
|
2016-03-24 17:55:14 +00:00
|
|
|
"root",
|
|
|
|
"Administrator",
|
|
|
|
}, ",")
|
|
|
|
|
|
|
|
// DefaultUserCheckedDrivers is the set of drivers we apply the user
|
2020-10-12 12:47:05 +00:00
|
|
|
// denylist onto. For virtualized drivers it often doesn't make sense to
|
2016-03-24 17:55:14 +00:00
|
|
|
// make this stipulation so by default they are ignored.
|
|
|
|
DefaultUserCheckedDrivers = strings.Join([]string{
|
|
|
|
"exec",
|
2016-03-25 19:43:50 +00:00
|
|
|
"qemu",
|
2016-03-24 17:55:14 +00:00
|
|
|
"java",
|
|
|
|
}, ",")
|
2016-12-03 01:04:07 +00:00
|
|
|
|
|
|
|
// A mapping of directories on the host OS to attempt to embed inside each
|
|
|
|
// task's chroot.
|
|
|
|
DefaultChrootEnv = map[string]string{
|
|
|
|
"/bin": "/bin",
|
|
|
|
"/etc": "/etc",
|
|
|
|
"/lib": "/lib",
|
|
|
|
"/lib32": "/lib32",
|
|
|
|
"/lib64": "/lib64",
|
|
|
|
"/run/resolvconf": "/run/resolvconf",
|
|
|
|
"/sbin": "/sbin",
|
|
|
|
"/usr": "/usr",
|
2020-09-29 15:21:50 +00:00
|
|
|
|
|
|
|
// embed systemd-resolved paths for systemd-resolved paths:
|
|
|
|
// /etc/resolv.conf is a symlink to /run/systemd/resolve/stub-resolv.conf in such systems.
|
|
|
|
// In non-systemd systems, this mount is a no-op and the path is ignored if not present.
|
|
|
|
"/run/systemd/resolve": "/run/systemd/resolve",
|
2016-12-03 01:04:07 +00:00
|
|
|
}
|
2022-01-10 15:19:07 +00:00
|
|
|
|
|
|
|
DefaultTemplateMaxStale = 5 * time.Second
|
2016-03-23 18:45:03 +00:00
|
|
|
)
|
|
|
|
|
2015-08-25 23:13:33 +00:00
|
|
|
// RPCHandler can be provided to the Client if there is a local server
|
|
|
|
// to avoid going over the network. If not provided, the Client will
|
|
|
|
// maintain a connection pool to the servers
|
|
|
|
type RPCHandler interface {
|
|
|
|
RPC(method string, args interface{}, reply interface{}) error
|
|
|
|
}
|
|
|
|
|
|
|
|
// Config is used to parameterize and configure the behavior of the client
|
|
|
|
type Config struct {
|
|
|
|
// DevMode controls if we are in a development mode which
|
|
|
|
// avoids persistent storage.
|
|
|
|
DevMode bool
|
|
|
|
|
2019-12-13 18:41:55 +00:00
|
|
|
// EnableDebug is used to enable debugging RPC endpoints
|
|
|
|
// in the absence of ACLs
|
|
|
|
EnableDebug bool
|
|
|
|
|
2015-08-25 23:13:33 +00:00
|
|
|
// StateDir is where we store our state
|
|
|
|
StateDir string
|
|
|
|
|
|
|
|
// AllocDir is where we store data for allocations
|
|
|
|
AllocDir string
|
|
|
|
|
|
|
|
// LogOutput is the destination for logs
|
|
|
|
LogOutput io.Writer
|
|
|
|
|
2021-11-24 23:35:45 +00:00
|
|
|
// Logger provides a logger to the client
|
2019-10-15 19:14:25 +00:00
|
|
|
Logger log.InterceptLogger
|
2018-09-13 17:43:40 +00:00
|
|
|
|
2015-08-25 23:13:33 +00:00
|
|
|
// Region is the clients region
|
|
|
|
Region string
|
|
|
|
|
2015-10-01 15:31:47 +00:00
|
|
|
// Network interface to be used in network fingerprinting
|
2015-10-02 07:29:18 +00:00
|
|
|
NetworkInterface string
|
2015-10-01 15:31:47 +00:00
|
|
|
|
2015-10-03 00:32:11 +00:00
|
|
|
// Network speed is the default speed of network interfaces if they can not
|
|
|
|
// be determined dynamically.
|
|
|
|
NetworkSpeed int
|
|
|
|
|
2017-03-14 19:56:31 +00:00
|
|
|
// CpuCompute is the default total CPU compute if they can not be determined
|
|
|
|
// dynamically. It should be given as Cores * MHz (2 Cores * 2 Ghz = 4000)
|
|
|
|
CpuCompute int
|
|
|
|
|
2018-01-22 20:28:29 +00:00
|
|
|
// MemoryMB is the default node total memory in megabytes if it cannot be
|
|
|
|
// determined dynamically.
|
|
|
|
MemoryMB int
|
|
|
|
|
2015-12-23 00:10:30 +00:00
|
|
|
// MaxKillTimeout allows capping the user-specifiable KillTimeout. If the
|
|
|
|
// task's KillTimeout is greater than the MaxKillTimeout, MaxKillTimeout is
|
|
|
|
// used.
|
|
|
|
MaxKillTimeout time.Duration
|
|
|
|
|
2015-08-25 23:13:33 +00:00
|
|
|
// Servers is a list of known server addresses. These are as "host:port"
|
|
|
|
Servers []string
|
|
|
|
|
|
|
|
// RPCHandler can be provided to avoid network traffic if the
|
|
|
|
// server is running locally.
|
|
|
|
RPCHandler RPCHandler
|
|
|
|
|
|
|
|
// Node provides the base node
|
|
|
|
Node *structs.Node
|
2015-09-01 02:48:59 +00:00
|
|
|
|
2016-02-08 21:29:53 +00:00
|
|
|
// ClientMaxPort is the upper range of the ports that the client uses for
|
2016-03-14 02:05:41 +00:00
|
|
|
// communicating with plugin subsystems over loopback
|
2016-02-08 21:29:53 +00:00
|
|
|
ClientMaxPort uint
|
2016-02-05 23:17:15 +00:00
|
|
|
|
2016-02-08 21:29:53 +00:00
|
|
|
// ClientMinPort is the lower range of the ports that the client uses for
|
2016-03-14 02:05:41 +00:00
|
|
|
// communicating with plugin subsystems over loopback
|
2016-02-08 21:29:53 +00:00
|
|
|
ClientMinPort uint
|
2016-02-05 23:17:15 +00:00
|
|
|
|
2021-09-10 08:52:47 +00:00
|
|
|
// MaxDynamicPort is the largest dynamic port generated
|
|
|
|
MaxDynamicPort int
|
|
|
|
|
|
|
|
// MinDynamicPort is the smallest dynamic port generated
|
|
|
|
MinDynamicPort int
|
|
|
|
|
2016-08-02 02:58:32 +00:00
|
|
|
// A mapping of directories on the host OS to attempt to embed inside each
|
|
|
|
// task's chroot.
|
|
|
|
ChrootEnv map[string]string
|
|
|
|
|
2015-09-01 02:48:59 +00:00
|
|
|
// Options provides arbitrary key-value configuration for nomad internals,
|
|
|
|
// like fingerprinters and drivers. The format is:
|
|
|
|
//
|
|
|
|
// namespace.option = value
|
|
|
|
Options map[string]string
|
2016-02-25 03:06:30 +00:00
|
|
|
|
|
|
|
// Version is the version of the Nomad client
|
2017-08-16 22:42:15 +00:00
|
|
|
Version *version.VersionInfo
|
2016-05-11 22:24:37 +00:00
|
|
|
|
2016-05-24 04:28:12 +00:00
|
|
|
// ConsulConfig is this Agent's Consul configuration
|
2020-09-04 17:50:11 +00:00
|
|
|
ConsulConfig *structsc.ConsulConfig
|
2016-05-25 05:30:10 +00:00
|
|
|
|
2016-08-09 22:00:50 +00:00
|
|
|
// VaultConfig is this Agent's Vault configuration
|
2020-09-04 17:50:11 +00:00
|
|
|
VaultConfig *structsc.VaultConfig
|
2016-08-09 22:00:50 +00:00
|
|
|
|
2016-05-25 05:30:10 +00:00
|
|
|
// StatsCollectionInterval is the interval at which the Nomad client
|
|
|
|
// collects resource usage stats
|
|
|
|
StatsCollectionInterval time.Duration
|
2016-08-02 02:49:01 +00:00
|
|
|
|
|
|
|
// PublishNodeMetrics determines whether nomad is going to publish node
|
|
|
|
// level metrics to remote Telemetry sinks
|
|
|
|
PublishNodeMetrics bool
|
|
|
|
|
|
|
|
// PublishAllocationMetrics determines whether nomad is going to publish
|
|
|
|
// allocation metrics to remote Telemetry sinks
|
|
|
|
PublishAllocationMetrics bool
|
2016-10-24 05:22:00 +00:00
|
|
|
|
2016-10-25 22:57:38 +00:00
|
|
|
// TLSConfig holds various TLS related configurations
|
2020-09-04 17:50:11 +00:00
|
|
|
TLSConfig *structsc.TLSConfig
|
2017-01-09 19:21:51 +00:00
|
|
|
|
2017-01-31 23:32:20 +00:00
|
|
|
// GCInterval is the time interval at which the client triggers garbage
|
|
|
|
// collection
|
|
|
|
GCInterval time.Duration
|
|
|
|
|
2017-03-11 00:27:00 +00:00
|
|
|
// GCParallelDestroys is the number of parallel destroys the garbage
|
|
|
|
// collector will allow.
|
|
|
|
GCParallelDestroys int
|
|
|
|
|
|
|
|
// GCDiskUsageThreshold is the disk usage threshold given as a percent
|
|
|
|
// beyond which the Nomad client triggers GC of terminal allocations
|
2017-01-31 23:32:20 +00:00
|
|
|
GCDiskUsageThreshold float64
|
|
|
|
|
2017-03-11 00:27:00 +00:00
|
|
|
// GCInodeUsageThreshold is the inode usage threshold given as a percent
|
|
|
|
// beyond which the Nomad client triggers GC of the terminal allocations
|
2017-01-31 23:32:20 +00:00
|
|
|
GCInodeUsageThreshold float64
|
|
|
|
|
2017-05-11 00:39:45 +00:00
|
|
|
// GCMaxAllocs is the maximum number of allocations a node can have
|
|
|
|
// before garbage collection is triggered.
|
|
|
|
GCMaxAllocs int
|
|
|
|
|
2017-01-09 19:21:51 +00:00
|
|
|
// LogLevel is the level of the logs to putout
|
|
|
|
LogLevel string
|
2017-02-27 21:42:37 +00:00
|
|
|
|
|
|
|
// NoHostUUID disables using the host's UUID and will force generation of a
|
|
|
|
// random UUID.
|
|
|
|
NoHostUUID bool
|
2017-08-20 00:19:38 +00:00
|
|
|
|
|
|
|
// ACLEnabled controls if ACL enforcement and management is enabled.
|
|
|
|
ACLEnabled bool
|
|
|
|
|
|
|
|
// ACLTokenTTL is how long we cache token values for
|
|
|
|
ACLTokenTTL time.Duration
|
|
|
|
|
|
|
|
// ACLPolicyTTL is how long we cache policy values for
|
|
|
|
ACLPolicyTTL time.Duration
|
2017-08-30 21:18:42 +00:00
|
|
|
|
2019-06-03 19:31:39 +00:00
|
|
|
// DisableRemoteExec disables remote exec targeting tasks on this client
|
|
|
|
DisableRemoteExec bool
|
|
|
|
|
2019-08-02 19:20:14 +00:00
|
|
|
// TemplateConfig includes configuration for template rendering
|
|
|
|
TemplateConfig *ClientTemplateConfig
|
|
|
|
|
2018-01-10 19:28:44 +00:00
|
|
|
// RPCHoldTimeout is how long an RPC can be "held" before it is errored.
|
|
|
|
// This is used to paper over a loss of leadership by instead holding RPCs,
|
|
|
|
// so that the caller experiences a slow response rather than an error.
|
|
|
|
// This period is meant to be long enough for a leader election to take
|
|
|
|
// place, and a small jitter is applied to avoid a thundering herd.
|
|
|
|
RPCHoldTimeout time.Duration
|
2018-09-27 01:14:36 +00:00
|
|
|
|
|
|
|
// PluginLoader is used to load plugins.
|
|
|
|
PluginLoader loader.PluginCatalog
|
|
|
|
|
|
|
|
// PluginSingletonLoader is a plugin loader that will returns singleton
|
|
|
|
// instances of the plugins.
|
|
|
|
PluginSingletonLoader loader.PluginCatalog
|
2019-01-09 18:57:56 +00:00
|
|
|
|
|
|
|
// StateDBFactory is used to override stateDB implementations,
|
|
|
|
StateDBFactory state.NewStateDBFunc
|
2019-06-14 03:05:57 +00:00
|
|
|
|
|
|
|
// CNIPath is the path used to search for CNI plugins. Multiple paths can
|
|
|
|
// be specified with colon delimited
|
|
|
|
CNIPath string
|
|
|
|
|
2020-05-15 15:09:01 +00:00
|
|
|
// CNIConfigDir is the directory where CNI network configuration is located. The
|
|
|
|
// client will use this path when fingerprinting CNI networks.
|
|
|
|
CNIConfigDir string
|
|
|
|
|
|
|
|
// CNIInterfacePrefix is the prefix to use when creating CNI network interfaces. This
|
|
|
|
// defaults to 'eth', therefore the first interface created by CNI inside the alloc
|
|
|
|
// network will be 'eth0'.
|
|
|
|
CNIInterfacePrefix string
|
|
|
|
|
2019-06-14 03:05:57 +00:00
|
|
|
// BridgeNetworkName is the name to use for the bridge created in bridge
|
|
|
|
// networking mode. This defaults to 'nomad' if not set
|
|
|
|
BridgeNetworkName string
|
|
|
|
|
|
|
|
// BridgeNetworkAllocSubnet is the IP subnet to use for address allocation
|
|
|
|
// for allocations in bridge networking mode. Subnet must be in CIDR
|
|
|
|
// notation
|
|
|
|
BridgeNetworkAllocSubnet string
|
2019-07-25 14:45:41 +00:00
|
|
|
|
2019-08-12 14:22:27 +00:00
|
|
|
// HostVolumes is a map of the configured host volumes by name.
|
2019-07-25 14:45:41 +00:00
|
|
|
HostVolumes map[string]*structs.ClientHostVolumeConfig
|
2020-06-16 15:53:10 +00:00
|
|
|
|
|
|
|
// HostNetworks is a map of the conigured host networks by name.
|
|
|
|
HostNetworks map[string]*structs.ClientHostNetworkConfig
|
2020-07-06 22:51:46 +00:00
|
|
|
|
|
|
|
// BindWildcardDefaultHostNetwork toggles if the default host network should accept all
|
|
|
|
// destinations (true) or only filter on the IP of the default host network (false) when
|
|
|
|
// port mapping. This allows Nomad clients with no defined host networks to accept and
|
|
|
|
// port forward traffic only matching on the destination port. An example use of this
|
|
|
|
// is when a network loadbalancer is utilizing direct server return and the destination
|
|
|
|
// address of incomming packets does not match the IP address of the host interface.
|
|
|
|
//
|
|
|
|
// This configuration is only considered if no host networks are defined.
|
|
|
|
BindWildcardDefaultHostNetwork bool
|
2021-03-25 02:09:37 +00:00
|
|
|
|
|
|
|
// CgroupParent is the parent cgroup Nomad should use when managing any cgroup subsystems.
|
2021-04-09 17:12:53 +00:00
|
|
|
// Currently this only includes the 'cpuset' cgroup subsystem.
|
2021-03-25 02:09:37 +00:00
|
|
|
CgroupParent string
|
|
|
|
|
2021-04-09 17:12:53 +00:00
|
|
|
// ReservableCores if set overrides the set of reservable cores reported in fingerprinting.
|
2021-03-29 18:05:12 +00:00
|
|
|
ReservableCores []uint16
|
2015-09-01 02:48:59 +00:00
|
|
|
}
|
|
|
|
|
2022-01-10 15:19:07 +00:00
|
|
|
// ClientTemplateConfig is configuration on the client specific to template
|
|
|
|
// rendering
|
2019-08-02 19:20:14 +00:00
|
|
|
type ClientTemplateConfig struct {
|
2022-01-10 15:19:07 +00:00
|
|
|
// FunctionDenylist disables functions in consul-template that
|
|
|
|
// are unsafe because they expose information from the client host.
|
|
|
|
FunctionDenylist []string `hcl:"function_denylist"`
|
|
|
|
|
|
|
|
// Deprecated: COMPAT(1.0) consul-template uses inclusive language from
|
|
|
|
// v0.25.0 - function_blacklist is kept for compatibility
|
|
|
|
FunctionBlacklist []string `hcl:"function_blacklist"`
|
|
|
|
|
|
|
|
// DisableSandbox allows templates to access arbitrary files on the
|
|
|
|
// client host. By default templates can access files only within
|
|
|
|
// the task directory.
|
|
|
|
DisableSandbox bool `hcl:"disable_file_sandbox"`
|
|
|
|
|
|
|
|
// This is the maximum interval to allow "stale" data. By default, only the
|
|
|
|
// Consul leader will respond to queries; any requests to a follower will
|
|
|
|
// forward to the leader. In large clusters with many requests, this is not as
|
|
|
|
// scalable, so this option allows any follower to respond to a query, so long
|
|
|
|
// as the last-replicated data is within these bounds. Higher values result in
|
|
|
|
// less cluster load, but are more likely to have outdated data.
|
|
|
|
// NOTE: Since Consul Template uses a pointer, this field uses a pointer which
|
|
|
|
// is inconsistent with how Nomad typically works. This decision was made to
|
|
|
|
// maintain parity with the external subsystem, not to establish a new standard.
|
|
|
|
MaxStale *time.Duration `hcl:"-"`
|
|
|
|
MaxStaleHCL string `hcl:"max_stale,optional"`
|
|
|
|
|
|
|
|
// BlockQueryWaitTime is amount of time in seconds to do a blocking query for.
|
|
|
|
// Many endpoints in Consul support a feature known as "blocking queries".
|
|
|
|
// A blocking query is used to wait for a potential change using long polling.
|
|
|
|
// NOTE: Since Consul Template uses a pointer, this field uses a pointer which
|
|
|
|
// is inconsistent with how Nomad typically works. This decision was made to
|
|
|
|
// maintain parity with the external subsystem, not to establish a new standard.
|
|
|
|
BlockQueryWaitTime *time.Duration `hcl:"-"`
|
|
|
|
BlockQueryWaitTimeHCL string `hcl:"block_query_wait,optional"`
|
|
|
|
|
|
|
|
// Wait is the quiescence timers; it defines the minimum and maximum amount of
|
|
|
|
// time to wait for the Consul cluster to reach a consistent state before rendering a
|
|
|
|
// template. This is useful to enable in systems where Consul is experiencing
|
|
|
|
// a lot of flapping because it will reduce the number of times a template is rendered.
|
|
|
|
Wait *WaitConfig `hcl:"wait,optional" json:"-"`
|
|
|
|
|
|
|
|
// WaitBounds allows operators to define boundaries on individual template wait
|
|
|
|
// configuration overrides. If set, this ensures that if a job author specifies
|
|
|
|
// a wait configuration with values the cluster operator does not allow, the
|
|
|
|
// cluster operator's boundary will be applied rather than the job author's
|
|
|
|
// out of bounds configuration.
|
|
|
|
WaitBounds *WaitConfig `hcl:"wait_bounds,optional" json:"-"`
|
|
|
|
|
|
|
|
// This controls the retry behavior when an error is returned from Consul.
|
|
|
|
// Consul Template is highly fault tolerant, meaning it does not exit in the
|
|
|
|
// face of failure. Instead, it uses exponential back-off and retry functions
|
|
|
|
// to wait for the cluster to become available, as is customary in distributed
|
|
|
|
// systems.
|
|
|
|
ConsulRetry *RetryConfig `hcl:"consul_retry,optional"`
|
|
|
|
|
|
|
|
// This controls the retry behavior when an error is returned from Vault.
|
|
|
|
// Consul Template is highly fault tolerant, meaning it does not exit in the
|
|
|
|
// face of failure. Instead, it uses exponential back-off and retry functions
|
|
|
|
// to wait for the cluster to become available, as is customary in distributed
|
|
|
|
// systems.
|
|
|
|
VaultRetry *RetryConfig `hcl:"vault_retry,optional"`
|
2019-08-02 19:20:14 +00:00
|
|
|
}
|
|
|
|
|
2022-01-10 15:19:07 +00:00
|
|
|
// Copy returns a deep copy of a ClientTemplateConfig
|
2019-08-16 14:03:31 +00:00
|
|
|
func (c *ClientTemplateConfig) Copy() *ClientTemplateConfig {
|
|
|
|
if c == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
nc := new(ClientTemplateConfig)
|
|
|
|
*nc = *c
|
2020-10-01 18:08:49 +00:00
|
|
|
nc.FunctionDenylist = helper.CopySliceString(nc.FunctionDenylist)
|
2022-01-10 15:19:07 +00:00
|
|
|
|
|
|
|
if c.BlockQueryWaitTime != nil {
|
|
|
|
nc.BlockQueryWaitTime = &*c.BlockQueryWaitTime
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.MaxStale != nil {
|
|
|
|
nc.MaxStale = &*c.MaxStale
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.Wait != nil {
|
|
|
|
nc.Wait = c.Wait.Copy()
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.ConsulRetry != nil {
|
|
|
|
nc.ConsulRetry = c.ConsulRetry.Copy()
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.VaultRetry != nil {
|
|
|
|
nc.VaultRetry = c.VaultRetry.Copy()
|
|
|
|
}
|
|
|
|
|
2019-08-16 14:03:31 +00:00
|
|
|
return nc
|
|
|
|
}
|
|
|
|
|
2022-01-10 15:19:07 +00:00
|
|
|
// Merge merges the values of two ClientTemplateConfigs. If first copies the receiver
|
|
|
|
// instance, and then overrides those values with the instance to merge with.
|
|
|
|
func (c *ClientTemplateConfig) Merge(b *ClientTemplateConfig) *ClientTemplateConfig {
|
|
|
|
if c == nil {
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
|
|
|
result := *c
|
|
|
|
|
|
|
|
if b == nil {
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.BlockQueryWaitTime != nil {
|
|
|
|
result.BlockQueryWaitTime = b.BlockQueryWaitTime
|
|
|
|
}
|
|
|
|
if b.BlockQueryWaitTimeHCL != "" {
|
|
|
|
result.BlockQueryWaitTimeHCL = b.BlockQueryWaitTimeHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.ConsulRetry != nil {
|
|
|
|
result.ConsulRetry = result.ConsulRetry.Merge(b.ConsulRetry)
|
|
|
|
}
|
|
|
|
|
|
|
|
result.DisableSandbox = b.DisableSandbox
|
|
|
|
|
|
|
|
// Maintain backward compatibility for older clients
|
|
|
|
if len(b.FunctionBlacklist) > 0 {
|
|
|
|
for _, fn := range b.FunctionBlacklist {
|
|
|
|
if !helper.SliceStringContains(result.FunctionBlacklist, fn) {
|
|
|
|
result.FunctionBlacklist = append(result.FunctionBlacklist, fn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(b.FunctionDenylist) > 0 {
|
|
|
|
for _, fn := range b.FunctionDenylist {
|
|
|
|
if !helper.SliceStringContains(result.FunctionDenylist, fn) {
|
|
|
|
result.FunctionDenylist = append(result.FunctionDenylist, fn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MaxStale != nil {
|
|
|
|
result.MaxStale = b.MaxStale
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MaxStaleHCL != "" {
|
|
|
|
result.MaxStaleHCL = b.MaxStaleHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Wait != nil {
|
|
|
|
result.Wait = result.Wait.Merge(b.Wait)
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.WaitBounds != nil {
|
|
|
|
result.WaitBounds = result.WaitBounds.Merge(b.WaitBounds)
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.VaultRetry != nil {
|
|
|
|
result.VaultRetry = result.VaultRetry.Merge(b.VaultRetry)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ClientTemplateConfig) IsEmpty() bool {
|
|
|
|
if c == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-01-26 16:31:37 +00:00
|
|
|
return !c.DisableSandbox &&
|
|
|
|
len(c.FunctionDenylist) == 0 &&
|
|
|
|
len(c.FunctionBlacklist) == 0 &&
|
|
|
|
c.BlockQueryWaitTime == nil &&
|
2022-01-10 15:19:07 +00:00
|
|
|
c.BlockQueryWaitTimeHCL == "" &&
|
|
|
|
c.MaxStale == nil &&
|
|
|
|
c.MaxStaleHCL == "" &&
|
|
|
|
c.Wait.IsEmpty() &&
|
|
|
|
c.ConsulRetry.IsEmpty() &&
|
|
|
|
c.VaultRetry.IsEmpty()
|
|
|
|
}
|
|
|
|
|
|
|
|
// WaitConfig is mirrored from templateconfig.WaitConfig because we need to handle
|
|
|
|
// the HCL conversion which happens in agent.ParseConfigFile
|
|
|
|
// NOTE: Since Consul Template requires pointers, this type uses pointers to fields
|
|
|
|
// which is inconsistent with how Nomad typically works. This decision was made
|
|
|
|
// to maintain parity with the external subsystem, not to establish a new standard.
|
|
|
|
type WaitConfig struct {
|
|
|
|
Min *time.Duration `hcl:"-"`
|
|
|
|
MinHCL string `hcl:"min,optional" json:"-"`
|
|
|
|
Max *time.Duration `hcl:"-"`
|
|
|
|
MaxHCL string `hcl:"max,optional" json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy returns a deep copy of the receiver.
|
|
|
|
func (wc *WaitConfig) Copy() *WaitConfig {
|
|
|
|
if wc == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
nwc := new(WaitConfig)
|
|
|
|
|
|
|
|
if wc.Min != nil {
|
|
|
|
nwc.Min = &*wc.Min
|
|
|
|
}
|
|
|
|
|
|
|
|
if wc.Max != nil {
|
|
|
|
nwc.Max = &*wc.Max
|
|
|
|
}
|
|
|
|
|
|
|
|
return wc
|
|
|
|
}
|
|
|
|
|
|
|
|
// Equals returns the result of reflect.DeepEqual
|
|
|
|
func (wc *WaitConfig) Equals(other *WaitConfig) bool {
|
|
|
|
return reflect.DeepEqual(wc, other)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsEmpty returns true if the receiver only contains an instance with no fields set.
|
|
|
|
func (wc *WaitConfig) IsEmpty() bool {
|
|
|
|
if wc == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return wc.Equals(&WaitConfig{})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate returns an error if the receiver is nil or empty or if Min is greater
|
|
|
|
// than Max the user specified Max.
|
|
|
|
func (wc *WaitConfig) Validate() error {
|
|
|
|
// If the config is nil or empty return false so that it is never assigned.
|
|
|
|
if wc == nil || wc.IsEmpty() {
|
|
|
|
return errors.New("wait config is nil or empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
// If min is nil, return
|
|
|
|
if wc.Min == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If min isn't nil, make sure Max is less than Min.
|
|
|
|
if wc.Max != nil {
|
|
|
|
if *wc.Min > *wc.Max {
|
|
|
|
return fmt.Errorf("wait config min %d is greater than max %d", *wc.Min, *wc.Max)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, return nil. Consul Template will set a Max based off of Min.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Merge merges two WaitConfigs. The passed instance always takes precedence.
|
|
|
|
func (wc *WaitConfig) Merge(b *WaitConfig) *WaitConfig {
|
|
|
|
if wc == nil {
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
|
|
|
result := *wc
|
|
|
|
if b == nil {
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Min != nil {
|
|
|
|
result.Min = &*b.Min
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MinHCL != "" {
|
|
|
|
result.MinHCL = b.MinHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Max != nil {
|
|
|
|
result.Max = &*b.Max
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MaxHCL != "" {
|
|
|
|
result.MaxHCL = b.MaxHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
// ToConsulTemplate converts a client WaitConfig instance to a consul-template WaitConfig
|
|
|
|
func (wc *WaitConfig) ToConsulTemplate() (*config.WaitConfig, error) {
|
|
|
|
if wc.IsEmpty() {
|
|
|
|
return nil, errors.New("wait config is empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := wc.Validate(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
result := &config.WaitConfig{Enabled: helper.BoolToPtr(true)}
|
|
|
|
|
|
|
|
if wc.Min != nil {
|
|
|
|
result.Min = wc.Min
|
|
|
|
}
|
|
|
|
|
|
|
|
if wc.Max != nil {
|
|
|
|
result.Max = wc.Max
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// RetryConfig is mirrored from templateconfig.WaitConfig because we need to handle
|
|
|
|
// the HCL indirection to support mapping in agent.ParseConfigFile.
|
|
|
|
// NOTE: Since Consul Template requires pointers, this type uses pointers to fields
|
|
|
|
// which is inconsistent with how Nomad typically works. However, since zero in
|
|
|
|
// Attempts and MaxBackoff have special meaning, it is necessary to know if the
|
|
|
|
// value was actually set rather than if it defaulted to 0. The rest of the fields
|
|
|
|
// use pointers to maintain parity with the external subystem, not to establish
|
|
|
|
// a new standard.
|
|
|
|
type RetryConfig struct {
|
|
|
|
// Attempts is the total number of maximum attempts to retry before letting
|
|
|
|
// the error fall through.
|
|
|
|
// 0 means unlimited.
|
|
|
|
Attempts *int `hcl:"attempts,optional"`
|
|
|
|
// Backoff is the base of the exponential backoff. This number will be
|
|
|
|
// multiplied by the next power of 2 on each iteration.
|
|
|
|
Backoff *time.Duration `hcl:"-"`
|
|
|
|
BackoffHCL string `hcl:"backoff,optional" json:"-"`
|
|
|
|
// MaxBackoff is an upper limit to the sleep time between retries
|
|
|
|
// A MaxBackoff of 0 means there is no limit to the exponential growth of the backoff.
|
|
|
|
MaxBackoff *time.Duration `hcl:"-"`
|
|
|
|
MaxBackoffHCL string `hcl:"max_backoff,optional" json:"-"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rc *RetryConfig) Copy() *RetryConfig {
|
|
|
|
if rc == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
nrc := new(RetryConfig)
|
|
|
|
*nrc = *rc
|
|
|
|
|
|
|
|
// Now copy pointer values
|
|
|
|
if rc.Attempts != nil {
|
|
|
|
nrc.Attempts = &*rc.Attempts
|
|
|
|
}
|
|
|
|
if rc.Backoff != nil {
|
|
|
|
nrc.Backoff = &*rc.Backoff
|
|
|
|
}
|
|
|
|
if rc.MaxBackoff != nil {
|
|
|
|
nrc.MaxBackoff = &*rc.MaxBackoff
|
|
|
|
}
|
|
|
|
|
|
|
|
return nrc
|
|
|
|
}
|
|
|
|
|
|
|
|
// Equals returns the result of reflect.DeepEqual
|
|
|
|
func (rc *RetryConfig) Equals(other *RetryConfig) bool {
|
|
|
|
return reflect.DeepEqual(rc, other)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsEmpty returns true if the receiver only contains an instance with no fields set.
|
|
|
|
func (rc *RetryConfig) IsEmpty() bool {
|
|
|
|
if rc == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc.Equals(&RetryConfig{})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate returns an error if the receiver is nil or empty, or if Backoff
|
|
|
|
// is greater than MaxBackoff.
|
|
|
|
func (rc *RetryConfig) Validate() error {
|
|
|
|
// If the config is nil or empty return false so that it is never assigned.
|
|
|
|
if rc == nil || rc.IsEmpty() {
|
|
|
|
return errors.New("retry config is nil or empty")
|
|
|
|
}
|
|
|
|
|
|
|
|
// If Backoff not set, no need to validate
|
|
|
|
if rc.Backoff == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxBackoff nil will end up defaulted to 1 minutes. We should validate that
|
|
|
|
// the user supplied backoff does not exceed that.
|
|
|
|
if rc.MaxBackoff == nil && *rc.Backoff > config.DefaultRetryMaxBackoff {
|
|
|
|
return fmt.Errorf("retry config backoff %d is greater than default max_backoff %d", *rc.Backoff, config.DefaultRetryMaxBackoff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxBackoff == 0 means backoff is unbounded. No need to validate.
|
|
|
|
if rc.MaxBackoff != nil && *rc.MaxBackoff == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if rc.MaxBackoff != nil && *rc.Backoff > *rc.MaxBackoff {
|
|
|
|
return fmt.Errorf("retry config backoff %d is greater than max_backoff %d", *rc.Backoff, *rc.MaxBackoff)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Merge merges two RetryConfigs. The passed instance always takes precedence.
|
|
|
|
func (rc *RetryConfig) Merge(b *RetryConfig) *RetryConfig {
|
|
|
|
if rc == nil {
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
|
|
|
result := *rc
|
|
|
|
if b == nil {
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Attempts != nil {
|
|
|
|
result.Attempts = &*b.Attempts
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Backoff != nil {
|
|
|
|
result.Backoff = &*b.Backoff
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.BackoffHCL != "" {
|
|
|
|
result.BackoffHCL = b.BackoffHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MaxBackoff != nil {
|
|
|
|
result.MaxBackoff = &*b.MaxBackoff
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.MaxBackoffHCL != "" {
|
|
|
|
result.MaxBackoffHCL = b.MaxBackoffHCL
|
|
|
|
}
|
|
|
|
|
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
// ToConsulTemplate converts a client RetryConfig instance to a consul-template RetryConfig
|
|
|
|
func (rc *RetryConfig) ToConsulTemplate() (*config.RetryConfig, error) {
|
|
|
|
if err := rc.Validate(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
result := &config.RetryConfig{Enabled: helper.BoolToPtr(true)}
|
|
|
|
|
|
|
|
if rc.Attempts != nil {
|
|
|
|
result.Attempts = rc.Attempts
|
|
|
|
}
|
|
|
|
|
|
|
|
if rc.Backoff != nil {
|
|
|
|
result.Backoff = rc.Backoff
|
|
|
|
}
|
|
|
|
|
|
|
|
if rc.MaxBackoff != nil {
|
|
|
|
result.MaxBackoff = &*rc.MaxBackoff
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2016-02-10 21:44:53 +00:00
|
|
|
func (c *Config) Copy() *Config {
|
2016-02-11 01:54:43 +00:00
|
|
|
nc := new(Config)
|
|
|
|
*nc = *c
|
|
|
|
nc.Node = nc.Node.Copy()
|
2017-01-18 23:55:14 +00:00
|
|
|
nc.Servers = helper.CopySliceString(nc.Servers)
|
|
|
|
nc.Options = helper.CopyMapStringString(nc.Options)
|
2019-07-25 14:45:41 +00:00
|
|
|
nc.HostVolumes = structs.CopyMapStringClientHostVolumeConfig(nc.HostVolumes)
|
2016-08-09 22:00:50 +00:00
|
|
|
nc.ConsulConfig = c.ConsulConfig.Copy()
|
|
|
|
nc.VaultConfig = c.VaultConfig.Copy()
|
2019-08-16 14:03:31 +00:00
|
|
|
nc.TemplateConfig = c.TemplateConfig.Copy()
|
2021-03-29 18:05:12 +00:00
|
|
|
if c.ReservableCores != nil {
|
|
|
|
nc.ReservableCores = make([]uint16, len(c.ReservableCores))
|
|
|
|
copy(nc.ReservableCores, c.ReservableCores)
|
|
|
|
}
|
2016-02-11 01:54:43 +00:00
|
|
|
return nc
|
2016-02-10 21:44:53 +00:00
|
|
|
}
|
|
|
|
|
2016-05-31 18:58:02 +00:00
|
|
|
// DefaultConfig returns the default configuration
|
|
|
|
func DefaultConfig() *Config {
|
|
|
|
return &Config{
|
2019-08-02 19:20:14 +00:00
|
|
|
Version: version.GetVersion(),
|
2020-09-04 17:50:11 +00:00
|
|
|
VaultConfig: structsc.DefaultVaultConfig(),
|
|
|
|
ConsulConfig: structsc.DefaultConsulConfig(),
|
2019-08-02 19:20:14 +00:00
|
|
|
LogOutput: os.Stderr,
|
|
|
|
Region: "global",
|
|
|
|
StatsCollectionInterval: 1 * time.Second,
|
2020-09-04 17:50:11 +00:00
|
|
|
TLSConfig: &structsc.TLSConfig{},
|
2019-08-02 19:20:14 +00:00
|
|
|
LogLevel: "DEBUG",
|
|
|
|
GCInterval: 1 * time.Minute,
|
|
|
|
GCParallelDestroys: 2,
|
|
|
|
GCDiskUsageThreshold: 80,
|
|
|
|
GCInodeUsageThreshold: 70,
|
|
|
|
GCMaxAllocs: 50,
|
|
|
|
NoHostUUID: true,
|
|
|
|
DisableRemoteExec: false,
|
|
|
|
TemplateConfig: &ClientTemplateConfig{
|
2020-10-01 18:08:49 +00:00
|
|
|
FunctionDenylist: []string{"plugin"},
|
|
|
|
DisableSandbox: false,
|
2019-08-02 19:20:14 +00:00
|
|
|
},
|
2020-10-13 19:56:54 +00:00
|
|
|
RPCHoldTimeout: 5 * time.Second,
|
|
|
|
CNIPath: "/opt/cni/bin",
|
|
|
|
CNIConfigDir: "/opt/cni/config",
|
|
|
|
CNIInterfacePrefix: "eth",
|
|
|
|
HostNetworks: map[string]*structs.ClientHostNetworkConfig{},
|
2021-03-25 02:09:37 +00:00
|
|
|
CgroupParent: cgutil.DefaultCgroupParent,
|
2021-10-04 22:43:35 +00:00
|
|
|
MaxDynamicPort: structs.DefaultMinDynamicPort,
|
|
|
|
MinDynamicPort: structs.DefaultMaxDynamicPort,
|
2016-05-31 18:58:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-01 02:54:49 +00:00
|
|
|
// Read returns the specified configuration value or "".
|
2015-09-01 02:48:59 +00:00
|
|
|
func (c *Config) Read(id string) string {
|
2016-03-24 17:55:14 +00:00
|
|
|
return c.Options[id]
|
2015-08-25 23:13:33 +00:00
|
|
|
}
|
2015-09-01 02:54:49 +00:00
|
|
|
|
|
|
|
// ReadDefault returns the specified configuration value, or the specified
|
|
|
|
// default value if none is set.
|
|
|
|
func (c *Config) ReadDefault(id string, defaultValue string) string {
|
2020-10-12 12:47:05 +00:00
|
|
|
return c.ReadAlternativeDefault([]string{id}, defaultValue)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadAlternativeDefault returns the specified configuration value, or the
|
|
|
|
// specified value if none is set.
|
|
|
|
func (c *Config) ReadAlternativeDefault(ids []string, defaultValue string) string {
|
|
|
|
for _, id := range ids {
|
|
|
|
val, ok := c.Options[id]
|
|
|
|
if ok {
|
|
|
|
return val
|
|
|
|
}
|
2015-09-01 02:54:49 +00:00
|
|
|
}
|
2020-10-12 12:47:05 +00:00
|
|
|
|
|
|
|
return defaultValue
|
2015-09-01 02:54:49 +00:00
|
|
|
}
|
2015-11-17 03:30:37 +00:00
|
|
|
|
|
|
|
// ReadBool parses the specified option as a boolean.
|
|
|
|
func (c *Config) ReadBool(id string) (bool, error) {
|
|
|
|
val, ok := c.Options[id]
|
|
|
|
if !ok {
|
2015-11-17 03:55:08 +00:00
|
|
|
return false, fmt.Errorf("Specified config is missing from options")
|
2015-11-17 03:30:37 +00:00
|
|
|
}
|
|
|
|
bval, err := strconv.ParseBool(val)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("Failed to parse %s as bool: %s", val, err)
|
|
|
|
}
|
|
|
|
return bval, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadBoolDefault tries to parse the specified option as a boolean. If there is
|
|
|
|
// an error in parsing, the default option is returned.
|
|
|
|
func (c *Config) ReadBoolDefault(id string, defaultValue bool) bool {
|
2015-11-17 03:55:08 +00:00
|
|
|
val, err := c.ReadBool(id)
|
2015-11-17 03:30:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return defaultValue
|
|
|
|
}
|
|
|
|
return val
|
|
|
|
}
|
2015-11-24 15:18:49 +00:00
|
|
|
|
2017-03-14 19:56:31 +00:00
|
|
|
// ReadInt parses the specified option as a int.
|
|
|
|
func (c *Config) ReadInt(id string) (int, error) {
|
|
|
|
val, ok := c.Options[id]
|
|
|
|
if !ok {
|
|
|
|
return 0, fmt.Errorf("Specified config is missing from options")
|
|
|
|
}
|
|
|
|
ival, err := strconv.Atoi(val)
|
|
|
|
if err != nil {
|
|
|
|
return 0, fmt.Errorf("Failed to parse %s as int: %s", val, err)
|
|
|
|
}
|
|
|
|
return ival, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadIntDefault tries to parse the specified option as a int. If there is
|
|
|
|
// an error in parsing, the default option is returned.
|
|
|
|
func (c *Config) ReadIntDefault(id string, defaultValue int) int {
|
|
|
|
val, err := c.ReadInt(id)
|
|
|
|
if err != nil {
|
|
|
|
return defaultValue
|
|
|
|
}
|
|
|
|
return val
|
|
|
|
}
|
|
|
|
|
2017-02-24 21:20:40 +00:00
|
|
|
// ReadDuration parses the specified option as a duration.
|
|
|
|
func (c *Config) ReadDuration(id string) (time.Duration, error) {
|
|
|
|
val, ok := c.Options[id]
|
|
|
|
if !ok {
|
|
|
|
return time.Duration(0), fmt.Errorf("Specified config is missing from options")
|
|
|
|
}
|
|
|
|
dval, err := time.ParseDuration(val)
|
|
|
|
if err != nil {
|
|
|
|
return time.Duration(0), fmt.Errorf("Failed to parse %s as time duration: %s", val, err)
|
|
|
|
}
|
|
|
|
return dval, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadDurationDefault tries to parse the specified option as a duration. If there is
|
|
|
|
// an error in parsing, the default option is returned.
|
|
|
|
func (c *Config) ReadDurationDefault(id string, defaultValue time.Duration) time.Duration {
|
|
|
|
val, err := c.ReadDuration(id)
|
|
|
|
if err != nil {
|
|
|
|
return defaultValue
|
|
|
|
}
|
|
|
|
return val
|
|
|
|
}
|
|
|
|
|
2020-10-12 12:47:05 +00:00
|
|
|
// ReadStringListToMap tries to parse the specified option(s) as a comma separated list.
|
2015-11-24 15:18:49 +00:00
|
|
|
// If there is an error in parsing, an empty list is returned.
|
2020-10-12 12:47:05 +00:00
|
|
|
func (c *Config) ReadStringListToMap(keys ...string) map[string]struct{} {
|
|
|
|
val := c.ReadAlternativeDefault(keys, "")
|
|
|
|
|
|
|
|
return splitValue(val)
|
2015-11-24 15:18:49 +00:00
|
|
|
}
|
2016-03-24 17:55:14 +00:00
|
|
|
|
2021-08-30 09:08:12 +00:00
|
|
|
// ReadStringListToMapDefault tries to parse the specified option as a comma
|
|
|
|
// separated list. If there is an error in parsing, an empty list is returned.
|
2016-03-24 17:55:14 +00:00
|
|
|
func (c *Config) ReadStringListToMapDefault(key, defaultValue string) map[string]struct{} {
|
2020-10-12 12:47:05 +00:00
|
|
|
return c.ReadStringListAlternativeToMapDefault([]string{key}, defaultValue)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadStringListAlternativeToMapDefault tries to parse the specified options as a comma sparated list.
|
|
|
|
// If there is an error in parsing, an empty list is returned.
|
|
|
|
func (c *Config) ReadStringListAlternativeToMapDefault(keys []string, defaultValue string) map[string]struct{} {
|
|
|
|
val := c.ReadAlternativeDefault(keys, defaultValue)
|
|
|
|
|
|
|
|
return splitValue(val)
|
|
|
|
}
|
2016-03-24 17:55:14 +00:00
|
|
|
|
2020-10-12 12:47:05 +00:00
|
|
|
// splitValue parses the value as a comma separated list.
|
|
|
|
func splitValue(val string) map[string]struct{} {
|
2016-03-24 17:55:14 +00:00
|
|
|
list := make(map[string]struct{})
|
|
|
|
if val != "" {
|
|
|
|
for _, e := range strings.Split(val, ",") {
|
|
|
|
trimmed := strings.TrimSpace(e)
|
|
|
|
list[trimmed] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return list
|
|
|
|
}
|
2018-10-17 02:21:15 +00:00
|
|
|
|
|
|
|
// NomadPluginConfig produces the NomadConfig struct which is sent to Nomad plugins
|
2018-12-18 00:40:58 +00:00
|
|
|
func (c *Config) NomadPluginConfig() *base.AgentConfig {
|
|
|
|
return &base.AgentConfig{
|
2018-10-30 01:34:34 +00:00
|
|
|
Driver: &base.ClientDriverConfig{
|
2018-10-19 03:31:01 +00:00
|
|
|
ClientMinPort: c.ClientMinPort,
|
|
|
|
ClientMaxPort: c.ClientMaxPort,
|
|
|
|
},
|
2018-10-17 02:21:15 +00:00
|
|
|
}
|
|
|
|
}
|