Merge pull request #10243 from apollo13/issue10239
Automatically populate `CONSUL_HTTP_ADDR` for connect native tasks in host networking mode.
This commit is contained in:
commit
03ed2a8035
|
@ -15,6 +15,7 @@ BUG FIXES:
|
|||
IMPROVEMENTS:
|
||||
* cli: Update defaults for `nomad operator debug` flags `-interval` and `-server-id` to match common usage. [[GH-10121](https://github.com/hashicorp/nomad/issues/10121)]
|
||||
* consul/connect: Enable setting `local_bind_address` field on connect upstreams [[GH-6248](https://github.com/hashicorp/nomad/issues/6248)]
|
||||
* consul/connect: Automatically populate `CONSUL_HTTP_ADDR` for connect native tasks in host networking mode. [[GH-10239](https://github.com/hashicorp/nomad/issues/10239)]
|
||||
* csi: Added support for jobs to request a unique volume ID per allocation. [[GH-10136](https://github.com/hashicorp/nomad/issues/10136)]
|
||||
* driver/docker: Added support for optional extra container labels. [[GH-9885](https://github.com/hashicorp/nomad/issues/9885)]
|
||||
* driver/docker: Added support for configuring default logger behavior in the client configuration. [[GH-10156](https://github.com/hashicorp/nomad/issues/10156)]
|
||||
|
|
|
@ -115,6 +115,7 @@ func (h *connectNativeHook) Prestart(
|
|||
}
|
||||
|
||||
merge(environment, h.bridgeEnv(request.TaskEnv.EnvMap))
|
||||
merge(environment, h.hostEnv(request.TaskEnv.EnvMap))
|
||||
|
||||
// tls/acl setup for native task done
|
||||
response.Done = true
|
||||
|
@ -225,6 +226,25 @@ func (h *connectNativeHook) bridgeEnv(env map[string]string) map[string]string {
|
|||
return nil
|
||||
}
|
||||
|
||||
// hostEnv creates a set of additional environment variables to be used when launching
|
||||
// the connect native task. This will enable the task to communicate with Consul
|
||||
// if the task is running in host network mode.
|
||||
//
|
||||
// Sets CONSUL_HTTP_ADDR if not already set.
|
||||
func (h *connectNativeHook) hostEnv(env map[string]string) map[string]string {
|
||||
if h.alloc.AllocatedResources.Shared.Networks[0].Mode != "host" {
|
||||
return nil
|
||||
}
|
||||
|
||||
if _, exists := env["CONSUL_HTTP_ADDR"]; !exists {
|
||||
return map[string]string{
|
||||
"CONSUL_HTTP_ADDR": h.consulConfig.HTTPAddr,
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// maybeSetSITokenEnv will set the CONSUL_HTTP_TOKEN environment variable in
|
||||
// the given env map, if the token is found to exist in the task's secrets
|
||||
// directory AND the CONSUL_HTTP_TOKEN environment variable is not already set.
|
||||
|
|
|
@ -202,6 +202,48 @@ func TestConnectNativeHook_bridgeEnv_host(t *testing.T) {
|
|||
})
|
||||
}
|
||||
|
||||
func TestConnectNativeHook_hostEnv_host(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
hook := new(connectNativeHook)
|
||||
hook.alloc = mock.ConnectNativeAlloc("host")
|
||||
hook.consulConfig.HTTPAddr = "http://1.2.3.4:9999"
|
||||
|
||||
t.Run("consul address env not preconfigured", func(t *testing.T) {
|
||||
result := hook.hostEnv(nil)
|
||||
require.Equal(t, map[string]string{
|
||||
"CONSUL_HTTP_ADDR": "http://1.2.3.4:9999",
|
||||
}, result)
|
||||
})
|
||||
|
||||
t.Run("consul address env is preconfigured", func(t *testing.T) {
|
||||
result := hook.hostEnv(map[string]string{
|
||||
"CONSUL_HTTP_ADDR": "10.1.1.1",
|
||||
})
|
||||
require.Empty(t, result)
|
||||
})
|
||||
}
|
||||
|
||||
func TestConnectNativeHook_hostEnv_bridge(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
hook := new(connectNativeHook)
|
||||
hook.alloc = mock.ConnectNativeAlloc("bridge")
|
||||
hook.consulConfig.HTTPAddr = "http://1.2.3.4:9999"
|
||||
|
||||
t.Run("consul address env not preconfigured", func(t *testing.T) {
|
||||
result := hook.hostEnv(nil)
|
||||
require.Empty(t, result)
|
||||
})
|
||||
|
||||
t.Run("consul address env is preconfigured", func(t *testing.T) {
|
||||
result := hook.hostEnv(map[string]string{
|
||||
"CONSUL_HTTP_ADDR": "10.1.1.1",
|
||||
})
|
||||
require.Empty(t, result)
|
||||
})
|
||||
}
|
||||
|
||||
func TestTaskRunner_ConnectNativeHook_Noop(t *testing.T) {
|
||||
t.Parallel()
|
||||
logger := testlog.HCLogger(t)
|
||||
|
@ -231,6 +273,9 @@ func TestTaskRunner_ConnectNativeHook_Noop(t *testing.T) {
|
|||
// Assert the hook is Done
|
||||
require.True(t, response.Done)
|
||||
|
||||
// Assert no environment variables configured to be set
|
||||
require.Empty(t, response.Env)
|
||||
|
||||
// Assert secrets dir is empty (no TLS config set)
|
||||
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
||||
nil,
|
||||
|
@ -292,8 +337,8 @@ func TestTaskRunner_ConnectNativeHook_Ok(t *testing.T) {
|
|||
// Assert the hook is Done
|
||||
require.True(t, response.Done)
|
||||
|
||||
// Assert no environment variables configured to be set
|
||||
require.Empty(t, response.Env)
|
||||
// Assert only CONSUL_HTTP_ADDR env variable is set
|
||||
require.Equal(t, map[string]string{"CONSUL_HTTP_ADDR": testConsul.HTTPAddr}, response.Env)
|
||||
|
||||
// Assert no secrets were written
|
||||
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
||||
|
@ -443,6 +488,9 @@ func TestTaskRunner_ConnectNativeHook_shareTLS(t *testing.T) {
|
|||
// Assert the hook is Done
|
||||
require.True(t, response.Done)
|
||||
|
||||
// Remove variables we are not interested in
|
||||
delete(response.Env, "CONSUL_HTTP_ADDR")
|
||||
|
||||
// Assert environment variable for token is set
|
||||
require.NotEmpty(t, response.Env)
|
||||
require.Equal(t, map[string]string{
|
||||
|
@ -550,6 +598,7 @@ func TestTaskRunner_ConnectNativeHook_shareTLS_override(t *testing.T) {
|
|||
"CONSUL_CLIENT_KEY": "/foo/key.pem",
|
||||
"CONSUL_HTTP_AUTH": "foo:bar",
|
||||
"CONSUL_HTTP_SSL_VERIFY": "false",
|
||||
"CONSUL_HTTP_ADDR": "localhost:8500",
|
||||
// CONSUL_HTTP_SSL (check the default value is assumed from client config)
|
||||
}
|
||||
|
||||
|
|
|
@ -23,6 +23,12 @@ The Nomad agent metrics API now respects the
|
|||
configuration value. If this value is set to `false`, which is the default value,
|
||||
calling `/v1/metrics?format=prometheus` will now result in a response error.
|
||||
|
||||
#### Connect native tasks
|
||||
|
||||
Connect native tasks running in host networking mode will now have `CONSUL_HTTP_ADDR`
|
||||
set automatically. Before this was only the case for bridge networking. If an operator
|
||||
already explicitly set `CONSUL_HTTP_ADDR` then it will not get overriden.
|
||||
|
||||
## Nomad 1.0.3, 0.12.10
|
||||
|
||||
Nomad versions 1.0.3 and 0.12.10 change the behavior of the `exec` and `java` drivers so that
|
||||
|
|
|
@ -260,5 +260,65 @@
|
|||
Consul Connect enabled service.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<th colspan="2">Consul-related Variables (only set for connect native tasks)</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_HTTP_ADDR</code>
|
||||
</td>
|
||||
<td>
|
||||
Specifies the address to the local Consul agent, will be a unix domain
|
||||
socket in bridge mode and a tcp address in host networking.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_HTTP_TOKEN</code>
|
||||
</td>
|
||||
<td>
|
||||
The token to authenticate against consul.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_HTTP_SSL</code>
|
||||
</td>
|
||||
<td>
|
||||
Specifies whether HTTPS should be used when communicating with consul.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_HTTP_SSL_VERIFY</code>
|
||||
</td>
|
||||
<td>
|
||||
Specifies whether the HTTPS connection should be verified.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_CACERT</code>
|
||||
</td>
|
||||
<td>
|
||||
Specifies the path to the CA certificate used for Consul communication.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_CLIENT_CERT</code>
|
||||
</td>
|
||||
<td>
|
||||
The client certificate to use when communicating with Consul.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<code>CONSUL_CLIENT_KEY</code>
|
||||
</td>
|
||||
<td>
|
||||
The client key to use when communicating with Consul.
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
|
Loading…
Reference in New Issue