open-nomad/client/driver/executor/executor_linux.go

236 lines
6.6 KiB
Go
Raw Normal View History

2016-02-05 00:03:17 +00:00
package executor
2016-02-02 21:38:38 +00:00
import (
"fmt"
"os"
"os/user"
"path/filepath"
"strconv"
"syscall"
"github.com/hashicorp/go-multierror"
2016-02-03 19:41:49 +00:00
"github.com/opencontainers/runc/libcontainer/cgroups"
cgroupFs "github.com/opencontainers/runc/libcontainer/cgroups/fs"
"github.com/opencontainers/runc/libcontainer/cgroups/systemd"
cgroupConfig "github.com/opencontainers/runc/libcontainer/configs"
"github.com/hashicorp/nomad/client/allocdir"
2016-02-03 19:41:49 +00:00
"github.com/hashicorp/nomad/nomad/structs"
)
var (
// A mapping of directories on the host OS to attempt to embed inside each
// task's chroot.
chrootEnv = map[string]string{
"/bin": "/bin",
"/etc": "/etc",
"/lib": "/lib",
"/lib32": "/lib32",
"/lib64": "/lib64",
"/usr/bin": "/usr/bin",
"/usr/lib": "/usr/lib",
"/usr/share": "/usr/share",
}
2016-02-02 21:38:38 +00:00
)
2016-02-05 00:18:10 +00:00
// configureIsolation configures chroot and creates cgroups
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) configureIsolation() error {
2016-02-04 00:09:17 +00:00
if e.ctx.FSIsolation {
2016-02-04 00:03:43 +00:00
if err := e.configureChroot(); err != nil {
return err
}
}
2016-02-04 00:09:17 +00:00
if e.ctx.ResourceLimits {
2016-02-04 18:09:52 +00:00
if err := e.configureCgroups(e.ctx.TaskResources); err != nil {
2016-02-04 00:03:43 +00:00
return fmt.Errorf("error creating cgroups: %v", err)
}
if err := e.applyLimits(os.Getpid()); err != nil {
if er := e.destroyCgroup(); er != nil {
e.logger.Printf("[ERROR] executor: error destroying cgroup: %v", er)
}
if er := e.removeChrootMounts(); er != nil {
e.logger.Printf("[ERROR] executor: error removing chroot: %v", er)
}
return fmt.Errorf("error entering the plugin process in the cgroup: %v:", err)
}
2016-02-03 19:41:49 +00:00
}
2016-02-04 00:03:43 +00:00
return nil
}
2016-02-03 19:41:49 +00:00
2016-02-05 00:18:10 +00:00
// applyLimits puts a process in a pre-configured cgroup
func (e *UniversalExecutor) applyLimits(pid int) error {
2016-02-04 00:09:17 +00:00
if !e.ctx.ResourceLimits {
2016-02-04 00:03:43 +00:00
return nil
}
// Entering the process in the cgroup
2016-02-03 19:41:49 +00:00
manager := e.getCgroupManager(e.groups)
if err := manager.Apply(pid); err != nil {
e.logger.Printf("[ERROR] executor: unable to join cgroup: %v", err)
2016-02-03 19:41:49 +00:00
if err := e.Exit(); err != nil {
e.logger.Printf("[ERROR] executor: unable to kill process: %v", err)
2016-02-03 19:41:49 +00:00
}
2016-02-04 00:03:43 +00:00
return err
2016-02-03 19:41:49 +00:00
}
2016-02-04 00:03:43 +00:00
return nil
}
2016-02-04 00:03:43 +00:00
// configureCgroups converts a Nomad Resources specification into the equivalent
// cgroup configuration. It returns an error if the resources are invalid.
func (e *UniversalExecutor) configureCgroups(resources *structs.Resources) error {
e.groups = &cgroupConfig.Cgroup{}
e.groups.Resources = &cgroupConfig.Resources{}
e.groups.Name = structs.GenerateUUID()
2016-02-04 00:03:43 +00:00
// TODO: verify this is needed for things like network access
e.groups.Resources.AllowAllDevices = true
2016-02-04 00:03:43 +00:00
if resources.MemoryMB > 0 {
// Total amount of memory allowed to consume
e.groups.Resources.Memory = int64(resources.MemoryMB * 1024 * 1024)
// Disable swap to avoid issues on the machine
e.groups.Resources.MemorySwap = int64(-1)
}
2016-02-04 00:03:43 +00:00
if resources.CPU < 2 {
return fmt.Errorf("resources.CPU must be equal to or greater than 2: %v", resources.CPU)
}
2016-02-04 00:03:43 +00:00
// Set the relative CPU shares for this cgroup.
e.groups.Resources.CpuShares = int64(resources.CPU)
2016-02-04 00:03:43 +00:00
if resources.IOPS != 0 {
// Validate it is in an acceptable range.
if resources.IOPS < 10 || resources.IOPS > 1000 {
return fmt.Errorf("resources.IOPS must be between 10 and 1000: %d", resources.IOPS)
}
2016-02-04 00:03:43 +00:00
e.groups.Resources.BlkioWeight = uint16(resources.IOPS)
}
return nil
}
// runAs takes a user id as a string and looks up the user, and sets the command
// to execute as that user.
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) runAs(userid string) error {
u, err := user.Lookup(userid)
if err != nil {
return fmt.Errorf("Failed to identify user %v: %v", userid, err)
}
// Convert the uid and gid
uid, err := strconv.ParseUint(u.Uid, 10, 32)
if err != nil {
return fmt.Errorf("Unable to convert userid to uint32: %s", err)
}
gid, err := strconv.ParseUint(u.Gid, 10, 32)
if err != nil {
return fmt.Errorf("Unable to convert groupid to uint32: %s", err)
}
// Set the command to run as that user and group.
if e.cmd.SysProcAttr == nil {
e.cmd.SysProcAttr = &syscall.SysProcAttr{}
}
if e.cmd.SysProcAttr.Credential == nil {
e.cmd.SysProcAttr.Credential = &syscall.Credential{}
}
e.cmd.SysProcAttr.Credential.Uid = uint32(uid)
e.cmd.SysProcAttr.Credential.Gid = uint32(gid)
return nil
}
2016-02-05 00:18:10 +00:00
// configureChroot configures a chroot
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) configureChroot() error {
allocDir := e.ctx.AllocDir
2016-02-04 18:09:52 +00:00
if err := allocDir.MountSharedDir(e.ctx.TaskName); err != nil {
2016-02-04 00:03:43 +00:00
return err
}
2016-02-04 18:09:52 +00:00
if err := allocDir.Embed(e.ctx.TaskName, chrootEnv); err != nil {
2016-02-04 00:03:43 +00:00
return err
}
// Set the tasks AllocDir environment variable.
e.ctx.TaskEnv.SetAllocDir(filepath.Join("/", allocdir.SharedAllocName)).SetTaskLocalDir(filepath.Join("/", allocdir.TaskLocal)).Build()
if e.cmd.SysProcAttr == nil {
e.cmd.SysProcAttr = &syscall.SysProcAttr{}
}
e.cmd.SysProcAttr.Chroot = e.taskDir
e.cmd.Dir = "/"
2016-02-04 00:03:43 +00:00
if err := allocDir.MountSpecialDirs(e.taskDir); err != nil {
return err
}
2016-02-04 00:03:43 +00:00
return nil
}
// cleanTaskDir is an idempotent operation to clean the task directory and
// should be called when tearing down the task.
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) removeChrootMounts() error {
// Prevent a race between Wait/ForceStop
e.lock.Lock()
defer e.lock.Unlock()
return e.ctx.AllocDir.UnmountSpecialDirs(e.taskDir)
2016-02-02 21:38:38 +00:00
}
2016-02-03 19:41:49 +00:00
// destroyCgroup kills all processes in the cgroup and removes the cgroup
// configuration from the host.
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) destroyCgroup() error {
2016-02-03 19:41:49 +00:00
if e.groups == nil {
return fmt.Errorf("Can't destroy: cgroup configuration empty")
}
// Prevent a race between Wait/ForceStop
e.lock.Lock()
defer e.lock.Unlock()
manager := e.getCgroupManager(e.groups)
pids, err := manager.GetPids()
if err != nil {
return fmt.Errorf("Failed to get pids in the cgroup %v: %v", e.groups.Name, err)
}
errs := new(multierror.Error)
for _, pid := range pids {
process, err := os.FindProcess(pid)
if err != nil {
multierror.Append(errs, fmt.Errorf("Failed to find Pid %v: %v", pid, err))
continue
}
if err := process.Kill(); err != nil && err.Error() != "os: process already finished" {
multierror.Append(errs, fmt.Errorf("Failed to kill Pid %v: %v", pid, err))
continue
}
}
// Remove the cgroup.
if err := manager.Destroy(); err != nil {
multierror.Append(errs, fmt.Errorf("Failed to delete the cgroup directories: %v", err))
}
if len(errs.Errors) != 0 {
return fmt.Errorf("Failed to destroy cgroup: %v", errs)
}
return nil
}
// getCgroupManager returns the correct libcontainer cgroup manager.
2016-02-04 00:03:43 +00:00
func (e *UniversalExecutor) getCgroupManager(groups *cgroupConfig.Cgroup) cgroups.Manager {
2016-02-03 19:41:49 +00:00
var manager cgroups.Manager
manager = &cgroupFs.Manager{Cgroups: groups}
if systemd.UseSystemd() {
manager = &systemd.Manager{Cgroups: groups}
}
return manager
}