open-nomad/nomad/system_endpoint.go

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

77 lines
2.0 KiB
Go
Raw Normal View History

2016-02-20 23:50:41 +00:00
package nomad
import (
"fmt"
"github.com/hashicorp/go-hclog"
2018-09-15 23:23:13 +00:00
2016-02-20 23:50:41 +00:00
"github.com/hashicorp/nomad/nomad/structs"
)
// System endpoint is used to call invoke system tasks.
type System struct {
2018-09-15 23:23:13 +00:00
srv *Server
ctx *RPCContext
logger hclog.Logger
}
func NewSystemEndpoint(srv *Server, ctx *RPCContext) *System {
return &System{srv: srv, ctx: ctx, logger: srv.logger.Named("system")}
2016-02-20 23:50:41 +00:00
}
// GarbageCollect is used to trigger the system to immediately garbage collect nodes, evals
// and jobs.
func (s *System) GarbageCollect(args *structs.GenericRequest, reply *structs.GenericResponse) error {
authErr := s.srv.Authenticate(s.ctx, args)
2016-02-20 23:50:41 +00:00
if done, err := s.srv.forward("System.GarbageCollect", args, args, reply); done {
return err
}
if authErr != nil {
return structs.ErrPermissionDenied
}
2016-02-20 23:50:41 +00:00
// Check management level permissions
if acl, err := s.srv.ResolveACL(args); err != nil {
return err
} else if acl != nil && !acl.IsManagement() {
return structs.ErrPermissionDenied
}
2016-06-22 16:33:15 +00:00
// Get the states current index
snapshotIndex, err := s.srv.fsm.State().LatestIndex()
if err != nil {
2016-06-22 16:33:15 +00:00
return fmt.Errorf("failed to determine state store's index: %v", err)
}
s.srv.evalBroker.Enqueue(s.srv.coreJobEval(structs.CoreJobForceGC, snapshotIndex))
2016-02-20 23:50:41 +00:00
return nil
}
// ReconcileJobSummaries reconciles the summaries of all the jobs in the state
// store
func (s *System) ReconcileJobSummaries(args *structs.GenericRequest, reply *structs.GenericResponse) error {
authErr := s.srv.Authenticate(s.ctx, args)
if done, err := s.srv.forward("System.ReconcileJobSummaries", args, args, reply); done {
return err
}
if authErr != nil {
return structs.ErrPermissionDenied
}
// Check management level permissions
if acl, err := s.srv.ResolveACL(args); err != nil {
return err
} else if acl != nil && !acl.IsManagement() {
return structs.ErrPermissionDenied
}
_, index, err := s.srv.raftApply(structs.ReconcileJobSummariesRequestType, args)
if err != nil {
return fmt.Errorf("reconciliation of job summaries failed: %v", err)
}
reply.Index = index
return nil
}