2020-04-30 13:13:00 +00:00
|
|
|
package volumewatcher
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
log "github.com/hashicorp/go-hclog"
|
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
|
|
|
cstructs "github.com/hashicorp/nomad/client/structs"
|
|
|
|
"github.com/hashicorp/nomad/nomad/state"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
// volumeWatcher is used to watch a single volume and trigger the
|
|
|
|
// scheduler when allocation health transitions.
|
|
|
|
type volumeWatcher struct {
|
|
|
|
// v is the volume being watched
|
|
|
|
v *structs.CSIVolume
|
|
|
|
|
|
|
|
// state is the state that is watched for state changes.
|
|
|
|
state *state.StateStore
|
|
|
|
|
|
|
|
// updateClaims is the function used to apply claims to raft
|
|
|
|
updateClaims updateClaimsFn
|
|
|
|
|
|
|
|
// server interface for CSI client RPCs
|
|
|
|
rpc ClientRPC
|
|
|
|
|
|
|
|
logger log.Logger
|
|
|
|
shutdownCtx context.Context // parent context
|
|
|
|
ctx context.Context // own context
|
|
|
|
exitFn context.CancelFunc
|
|
|
|
|
|
|
|
// updateCh is triggered when there is an updated volume
|
|
|
|
updateCh chan *structs.CSIVolume
|
|
|
|
|
|
|
|
wLock sync.RWMutex
|
|
|
|
running bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// newVolumeWatcher returns a volume watcher that is used to watch
|
|
|
|
// volumes
|
|
|
|
func newVolumeWatcher(parent *Watcher, vol *structs.CSIVolume) *volumeWatcher {
|
|
|
|
|
|
|
|
w := &volumeWatcher{
|
|
|
|
updateCh: make(chan *structs.CSIVolume, 1),
|
|
|
|
updateClaims: parent.updateClaims,
|
|
|
|
v: vol,
|
|
|
|
state: parent.state,
|
|
|
|
rpc: parent.rpc,
|
|
|
|
logger: parent.logger.With("volume_id", vol.ID, "namespace", vol.Namespace),
|
|
|
|
shutdownCtx: parent.ctx,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start the long lived watcher that scans for allocation updates
|
|
|
|
w.Start()
|
|
|
|
return w
|
|
|
|
}
|
|
|
|
|
|
|
|
// Notify signals an update to the tracked volume.
|
|
|
|
func (vw *volumeWatcher) Notify(v *structs.CSIVolume) {
|
|
|
|
if !vw.isRunning() {
|
|
|
|
vw.Start()
|
|
|
|
}
|
|
|
|
select {
|
|
|
|
case vw.updateCh <- v:
|
|
|
|
case <-vw.shutdownCtx.Done(): // prevent deadlock if we stopped
|
|
|
|
case <-vw.ctx.Done(): // prevent deadlock if we stopped
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vw *volumeWatcher) Start() {
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("starting watcher")
|
2020-04-30 13:13:00 +00:00
|
|
|
vw.wLock.Lock()
|
|
|
|
defer vw.wLock.Unlock()
|
|
|
|
vw.running = true
|
|
|
|
ctx, exitFn := context.WithCancel(vw.shutdownCtx)
|
|
|
|
vw.ctx = ctx
|
|
|
|
vw.exitFn = exitFn
|
|
|
|
go vw.watch()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop stops watching the volume. This should be called whenever a
|
|
|
|
// volume's claims are fully reaped or the watcher is no longer needed.
|
|
|
|
func (vw *volumeWatcher) Stop() {
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("no more claims")
|
2020-04-30 13:13:00 +00:00
|
|
|
vw.exitFn()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vw *volumeWatcher) isRunning() bool {
|
|
|
|
vw.wLock.RLock()
|
|
|
|
defer vw.wLock.RUnlock()
|
|
|
|
select {
|
|
|
|
case <-vw.shutdownCtx.Done():
|
|
|
|
return false
|
|
|
|
case <-vw.ctx.Done():
|
|
|
|
return false
|
|
|
|
default:
|
|
|
|
return vw.running
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// watch is the long-running function that watches for changes to a volume.
|
|
|
|
// Each pass steps the volume's claims through the various states of reaping
|
|
|
|
// until the volume has no more claims eligible to be reaped.
|
|
|
|
func (vw *volumeWatcher) watch() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
// TODO(tgross): currently server->client RPC have no cancellation
|
|
|
|
// context, so we can't stop the long-runner RPCs gracefully
|
|
|
|
case <-vw.shutdownCtx.Done():
|
|
|
|
return
|
|
|
|
case <-vw.ctx.Done():
|
|
|
|
return
|
|
|
|
case vol := <-vw.updateCh:
|
|
|
|
// while we won't make raft writes if we get a stale update,
|
|
|
|
// we can still fire extra CSI RPC calls if we don't check this
|
2020-05-04 16:28:32 +00:00
|
|
|
if vol.ModifyIndex >= vw.v.ModifyIndex {
|
2020-04-30 13:13:00 +00:00
|
|
|
vol = vw.getVolume(vol)
|
|
|
|
if vol == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
vw.volumeReap(vol)
|
|
|
|
}
|
2020-05-11 13:32:05 +00:00
|
|
|
default:
|
|
|
|
vw.Stop() // no pending work
|
|
|
|
return
|
2020-04-30 13:13:00 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// getVolume returns the tracked volume, fully populated with the current
|
|
|
|
// state
|
|
|
|
func (vw *volumeWatcher) getVolume(vol *structs.CSIVolume) *structs.CSIVolume {
|
|
|
|
vw.wLock.RLock()
|
|
|
|
defer vw.wLock.RUnlock()
|
|
|
|
|
|
|
|
var err error
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
|
|
|
|
vol, err = vw.state.CSIVolumeDenormalizePlugins(ws, vol.Copy())
|
|
|
|
if err != nil {
|
|
|
|
vw.logger.Error("could not query plugins for volume", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
vol, err = vw.state.CSIVolumeDenormalize(ws, vol)
|
|
|
|
if err != nil {
|
|
|
|
vw.logger.Error("could not query allocs for volume", "error", err)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
vw.v = vol
|
|
|
|
return vol
|
|
|
|
}
|
|
|
|
|
|
|
|
// volumeReap collects errors for logging but doesn't return them
|
|
|
|
// to the main loop.
|
|
|
|
func (vw *volumeWatcher) volumeReap(vol *structs.CSIVolume) {
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("releasing unused volume claims")
|
2020-04-30 13:13:00 +00:00
|
|
|
err := vw.volumeReapImpl(vol)
|
|
|
|
if err != nil {
|
|
|
|
vw.logger.Error("error releasing volume claims", "error", err)
|
|
|
|
}
|
|
|
|
if vw.isUnclaimed(vol) {
|
|
|
|
vw.Stop()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vw *volumeWatcher) isUnclaimed(vol *structs.CSIVolume) bool {
|
|
|
|
return len(vol.ReadClaims) == 0 && len(vol.WriteClaims) == 0 && len(vol.PastClaims) == 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vw *volumeWatcher) volumeReapImpl(vol *structs.CSIVolume) error {
|
|
|
|
var result *multierror.Error
|
|
|
|
nodeClaims := map[string]int{} // node IDs -> count
|
|
|
|
jobs := map[string]bool{} // jobID -> stopped
|
|
|
|
|
|
|
|
// if a job is purged, the subsequent alloc updates can't
|
|
|
|
// trigger a GC job because there's no job for them to query.
|
|
|
|
// Job.Deregister will send a claim release on all claims
|
|
|
|
// but the allocs will not yet be terminated. save the status
|
|
|
|
// for each job so that we don't requery in this pass
|
|
|
|
checkStopped := func(jobID string) bool {
|
|
|
|
namespace := vw.v.Namespace
|
|
|
|
isStopped, ok := jobs[jobID]
|
|
|
|
if !ok {
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
job, err := vw.state.JobByID(ws, namespace, jobID)
|
|
|
|
if err != nil {
|
|
|
|
isStopped = true
|
|
|
|
}
|
|
|
|
if job == nil || job.Stopped() {
|
|
|
|
isStopped = true
|
|
|
|
}
|
|
|
|
jobs[jobID] = isStopped
|
|
|
|
}
|
|
|
|
return isStopped
|
|
|
|
}
|
|
|
|
|
|
|
|
collect := func(allocs map[string]*structs.Allocation,
|
|
|
|
claims map[string]*structs.CSIVolumeClaim) {
|
|
|
|
|
|
|
|
for allocID, alloc := range allocs {
|
|
|
|
|
|
|
|
if alloc == nil {
|
|
|
|
_, exists := vol.PastClaims[allocID]
|
|
|
|
if !exists {
|
|
|
|
vol.PastClaims[allocID] = &structs.CSIVolumeClaim{
|
|
|
|
AllocationID: allocID,
|
|
|
|
State: structs.CSIVolumeClaimStateReadyToFree,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeClaims[alloc.NodeID]++
|
|
|
|
|
|
|
|
if alloc.Terminated() || checkStopped(alloc.JobID) {
|
|
|
|
// don't overwrite the PastClaim if we've seen it before,
|
|
|
|
// so that we can track state between subsequent calls
|
|
|
|
_, exists := vol.PastClaims[allocID]
|
|
|
|
if !exists {
|
|
|
|
claim, ok := claims[allocID]
|
|
|
|
if !ok {
|
|
|
|
claim = &structs.CSIVolumeClaim{
|
|
|
|
AllocationID: allocID,
|
|
|
|
NodeID: alloc.NodeID,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
claim.State = structs.CSIVolumeClaimStateTaken
|
|
|
|
vol.PastClaims[allocID] = claim
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
collect(vol.ReadAllocs, vol.ReadClaims)
|
|
|
|
collect(vol.WriteAllocs, vol.WriteClaims)
|
|
|
|
|
|
|
|
if len(vol.PastClaims) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, claim := range vol.PastClaims {
|
|
|
|
|
|
|
|
var err error
|
|
|
|
|
|
|
|
// previous checkpoints may have set the past claim state already.
|
|
|
|
// in practice we should never see CSIVolumeClaimStateControllerDetached
|
|
|
|
// but having an option for the state makes it easy to add a checkpoint
|
|
|
|
// in a backwards compatible way if we need one later
|
|
|
|
switch claim.State {
|
|
|
|
case structs.CSIVolumeClaimStateNodeDetached:
|
|
|
|
goto NODE_DETACHED
|
|
|
|
case structs.CSIVolumeClaimStateControllerDetached:
|
|
|
|
goto RELEASE_CLAIM
|
|
|
|
case structs.CSIVolumeClaimStateReadyToFree:
|
|
|
|
goto RELEASE_CLAIM
|
|
|
|
}
|
|
|
|
|
|
|
|
err = vw.nodeDetach(vol, claim)
|
|
|
|
if err != nil {
|
|
|
|
result = multierror.Append(result, err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
NODE_DETACHED:
|
|
|
|
nodeClaims[claim.NodeID]--
|
|
|
|
err = vw.controllerDetach(vol, claim, nodeClaims)
|
|
|
|
if err != nil {
|
|
|
|
result = multierror.Append(result, err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
RELEASE_CLAIM:
|
2020-05-07 19:57:24 +00:00
|
|
|
// advance a CSIVolumeClaimStateControllerDetached claim
|
|
|
|
claim.State = structs.CSIVolumeClaimStateReadyToFree
|
2020-04-30 13:13:00 +00:00
|
|
|
err = vw.checkpoint(vol, claim)
|
|
|
|
if err != nil {
|
|
|
|
result = multierror.Append(result, err)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// the checkpoint deletes from the state store, but this operates
|
|
|
|
// on our local copy which aids in testing
|
|
|
|
delete(vol.PastClaims, claim.AllocationID)
|
|
|
|
}
|
|
|
|
|
|
|
|
return result.ErrorOrNil()
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// nodeDetach makes the client NodePublish / NodeUnstage RPCs, which
|
|
|
|
// must be completed before controller operations or releasing the claim.
|
|
|
|
func (vw *volumeWatcher) nodeDetach(vol *structs.CSIVolume, claim *structs.CSIVolumeClaim) error {
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("detaching node")
|
2020-04-30 13:13:00 +00:00
|
|
|
nReq := &cstructs.ClientCSINodeDetachVolumeRequest{
|
|
|
|
PluginID: vol.PluginID,
|
|
|
|
VolumeID: vol.ID,
|
|
|
|
ExternalID: vol.RemoteID(),
|
|
|
|
AllocID: claim.AllocationID,
|
|
|
|
NodeID: claim.NodeID,
|
|
|
|
AttachmentMode: vol.AttachmentMode,
|
|
|
|
AccessMode: vol.AccessMode,
|
|
|
|
ReadOnly: claim.Mode == structs.CSIVolumeClaimRead,
|
|
|
|
}
|
|
|
|
|
|
|
|
err := vw.rpc.NodeDetachVolume(nReq,
|
|
|
|
&cstructs.ClientCSINodeDetachVolumeResponse{})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not detach from node: %v", err)
|
|
|
|
}
|
|
|
|
claim.State = structs.CSIVolumeClaimStateNodeDetached
|
|
|
|
return vw.checkpoint(vol, claim)
|
|
|
|
}
|
|
|
|
|
|
|
|
// controllerDetach makes the client RPC to the controller to
|
|
|
|
// unpublish the volume if a controller is required and no other
|
|
|
|
// allocs on the node need it
|
|
|
|
func (vw *volumeWatcher) controllerDetach(vol *structs.CSIVolume, claim *structs.CSIVolumeClaim, nodeClaims map[string]int) error {
|
|
|
|
if !vol.ControllerRequired || nodeClaims[claim.NodeID] > 1 {
|
|
|
|
claim.State = structs.CSIVolumeClaimStateReadyToFree
|
|
|
|
return nil
|
|
|
|
}
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("detaching controller")
|
2020-04-30 13:13:00 +00:00
|
|
|
// note: we need to get the CSI Node ID, which is not the same as
|
|
|
|
// the Nomad Node ID
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
targetNode, err := vw.state.NodeByID(ws, claim.NodeID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if targetNode == nil {
|
|
|
|
return fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
|
|
|
|
}
|
|
|
|
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("failed to find NodeInfo for node: %s", targetNode.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
plug, err := vw.state.CSIPluginByID(ws, vol.PluginID)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("plugin lookup error: %s %v", vol.PluginID, err)
|
|
|
|
}
|
|
|
|
if plug == nil {
|
|
|
|
return fmt.Errorf("plugin lookup error: %s missing plugin", vol.PluginID)
|
|
|
|
}
|
|
|
|
|
|
|
|
cReq := &cstructs.ClientCSIControllerDetachVolumeRequest{
|
|
|
|
VolumeID: vol.RemoteID(),
|
|
|
|
ClientCSINodeID: targetCSIInfo.NodeInfo.ID,
|
2020-05-11 21:12:51 +00:00
|
|
|
Secrets: vol.Secrets,
|
2020-04-30 13:13:00 +00:00
|
|
|
}
|
|
|
|
cReq.PluginID = plug.ID
|
|
|
|
err = vw.rpc.ControllerDetachVolume(cReq,
|
|
|
|
&cstructs.ClientCSIControllerDetachVolumeResponse{})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not detach from controller: %v", err)
|
|
|
|
}
|
|
|
|
claim.State = structs.CSIVolumeClaimStateReadyToFree
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vw *volumeWatcher) checkpoint(vol *structs.CSIVolume, claim *structs.CSIVolumeClaim) error {
|
2020-05-07 19:57:24 +00:00
|
|
|
vw.logger.Trace("checkpointing claim")
|
2020-04-30 13:13:00 +00:00
|
|
|
req := structs.CSIVolumeClaimRequest{
|
|
|
|
VolumeID: vol.ID,
|
|
|
|
AllocationID: claim.AllocationID,
|
|
|
|
NodeID: claim.NodeID,
|
|
|
|
Claim: structs.CSIVolumeClaimRelease,
|
|
|
|
State: claim.State,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: vol.Namespace,
|
|
|
|
// Region: vol.Region, // TODO(tgross) should volumes have regions?
|
|
|
|
},
|
|
|
|
}
|
|
|
|
index, err := vw.updateClaims([]structs.CSIVolumeClaimRequest{req})
|
|
|
|
if err == nil && index != 0 {
|
|
|
|
vw.wLock.Lock()
|
|
|
|
defer vw.wLock.Unlock()
|
|
|
|
vw.v.ModifyIndex = index
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not checkpoint claim release: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|