Merge pull request #10243 from apollo13/issue10239
Automatically populate `CONSUL_HTTP_ADDR` for connect native tasks in host networking mode.
This commit is contained in:
commit
03ed2a8035
|
@ -15,6 +15,7 @@ BUG FIXES:
|
||||||
IMPROVEMENTS:
|
IMPROVEMENTS:
|
||||||
* cli: Update defaults for `nomad operator debug` flags `-interval` and `-server-id` to match common usage. [[GH-10121](https://github.com/hashicorp/nomad/issues/10121)]
|
* cli: Update defaults for `nomad operator debug` flags `-interval` and `-server-id` to match common usage. [[GH-10121](https://github.com/hashicorp/nomad/issues/10121)]
|
||||||
* consul/connect: Enable setting `local_bind_address` field on connect upstreams [[GH-6248](https://github.com/hashicorp/nomad/issues/6248)]
|
* consul/connect: Enable setting `local_bind_address` field on connect upstreams [[GH-6248](https://github.com/hashicorp/nomad/issues/6248)]
|
||||||
|
* consul/connect: Automatically populate `CONSUL_HTTP_ADDR` for connect native tasks in host networking mode. [[GH-10239](https://github.com/hashicorp/nomad/issues/10239)]
|
||||||
* csi: Added support for jobs to request a unique volume ID per allocation. [[GH-10136](https://github.com/hashicorp/nomad/issues/10136)]
|
* csi: Added support for jobs to request a unique volume ID per allocation. [[GH-10136](https://github.com/hashicorp/nomad/issues/10136)]
|
||||||
* driver/docker: Added support for optional extra container labels. [[GH-9885](https://github.com/hashicorp/nomad/issues/9885)]
|
* driver/docker: Added support for optional extra container labels. [[GH-9885](https://github.com/hashicorp/nomad/issues/9885)]
|
||||||
* driver/docker: Added support for configuring default logger behavior in the client configuration. [[GH-10156](https://github.com/hashicorp/nomad/issues/10156)]
|
* driver/docker: Added support for configuring default logger behavior in the client configuration. [[GH-10156](https://github.com/hashicorp/nomad/issues/10156)]
|
||||||
|
|
|
@ -115,6 +115,7 @@ func (h *connectNativeHook) Prestart(
|
||||||
}
|
}
|
||||||
|
|
||||||
merge(environment, h.bridgeEnv(request.TaskEnv.EnvMap))
|
merge(environment, h.bridgeEnv(request.TaskEnv.EnvMap))
|
||||||
|
merge(environment, h.hostEnv(request.TaskEnv.EnvMap))
|
||||||
|
|
||||||
// tls/acl setup for native task done
|
// tls/acl setup for native task done
|
||||||
response.Done = true
|
response.Done = true
|
||||||
|
@ -225,6 +226,25 @@ func (h *connectNativeHook) bridgeEnv(env map[string]string) map[string]string {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// hostEnv creates a set of additional environment variables to be used when launching
|
||||||
|
// the connect native task. This will enable the task to communicate with Consul
|
||||||
|
// if the task is running in host network mode.
|
||||||
|
//
|
||||||
|
// Sets CONSUL_HTTP_ADDR if not already set.
|
||||||
|
func (h *connectNativeHook) hostEnv(env map[string]string) map[string]string {
|
||||||
|
if h.alloc.AllocatedResources.Shared.Networks[0].Mode != "host" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, exists := env["CONSUL_HTTP_ADDR"]; !exists {
|
||||||
|
return map[string]string{
|
||||||
|
"CONSUL_HTTP_ADDR": h.consulConfig.HTTPAddr,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// maybeSetSITokenEnv will set the CONSUL_HTTP_TOKEN environment variable in
|
// maybeSetSITokenEnv will set the CONSUL_HTTP_TOKEN environment variable in
|
||||||
// the given env map, if the token is found to exist in the task's secrets
|
// the given env map, if the token is found to exist in the task's secrets
|
||||||
// directory AND the CONSUL_HTTP_TOKEN environment variable is not already set.
|
// directory AND the CONSUL_HTTP_TOKEN environment variable is not already set.
|
||||||
|
|
|
@ -202,6 +202,48 @@ func TestConnectNativeHook_bridgeEnv_host(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestConnectNativeHook_hostEnv_host(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
hook := new(connectNativeHook)
|
||||||
|
hook.alloc = mock.ConnectNativeAlloc("host")
|
||||||
|
hook.consulConfig.HTTPAddr = "http://1.2.3.4:9999"
|
||||||
|
|
||||||
|
t.Run("consul address env not preconfigured", func(t *testing.T) {
|
||||||
|
result := hook.hostEnv(nil)
|
||||||
|
require.Equal(t, map[string]string{
|
||||||
|
"CONSUL_HTTP_ADDR": "http://1.2.3.4:9999",
|
||||||
|
}, result)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("consul address env is preconfigured", func(t *testing.T) {
|
||||||
|
result := hook.hostEnv(map[string]string{
|
||||||
|
"CONSUL_HTTP_ADDR": "10.1.1.1",
|
||||||
|
})
|
||||||
|
require.Empty(t, result)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestConnectNativeHook_hostEnv_bridge(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
hook := new(connectNativeHook)
|
||||||
|
hook.alloc = mock.ConnectNativeAlloc("bridge")
|
||||||
|
hook.consulConfig.HTTPAddr = "http://1.2.3.4:9999"
|
||||||
|
|
||||||
|
t.Run("consul address env not preconfigured", func(t *testing.T) {
|
||||||
|
result := hook.hostEnv(nil)
|
||||||
|
require.Empty(t, result)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("consul address env is preconfigured", func(t *testing.T) {
|
||||||
|
result := hook.hostEnv(map[string]string{
|
||||||
|
"CONSUL_HTTP_ADDR": "10.1.1.1",
|
||||||
|
})
|
||||||
|
require.Empty(t, result)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func TestTaskRunner_ConnectNativeHook_Noop(t *testing.T) {
|
func TestTaskRunner_ConnectNativeHook_Noop(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
logger := testlog.HCLogger(t)
|
logger := testlog.HCLogger(t)
|
||||||
|
@ -231,6 +273,9 @@ func TestTaskRunner_ConnectNativeHook_Noop(t *testing.T) {
|
||||||
// Assert the hook is Done
|
// Assert the hook is Done
|
||||||
require.True(t, response.Done)
|
require.True(t, response.Done)
|
||||||
|
|
||||||
|
// Assert no environment variables configured to be set
|
||||||
|
require.Empty(t, response.Env)
|
||||||
|
|
||||||
// Assert secrets dir is empty (no TLS config set)
|
// Assert secrets dir is empty (no TLS config set)
|
||||||
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
||||||
nil,
|
nil,
|
||||||
|
@ -292,8 +337,8 @@ func TestTaskRunner_ConnectNativeHook_Ok(t *testing.T) {
|
||||||
// Assert the hook is Done
|
// Assert the hook is Done
|
||||||
require.True(t, response.Done)
|
require.True(t, response.Done)
|
||||||
|
|
||||||
// Assert no environment variables configured to be set
|
// Assert only CONSUL_HTTP_ADDR env variable is set
|
||||||
require.Empty(t, response.Env)
|
require.Equal(t, map[string]string{"CONSUL_HTTP_ADDR": testConsul.HTTPAddr}, response.Env)
|
||||||
|
|
||||||
// Assert no secrets were written
|
// Assert no secrets were written
|
||||||
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
checkFilesInDir(t, request.TaskDir.SecretsDir,
|
||||||
|
@ -443,6 +488,9 @@ func TestTaskRunner_ConnectNativeHook_shareTLS(t *testing.T) {
|
||||||
// Assert the hook is Done
|
// Assert the hook is Done
|
||||||
require.True(t, response.Done)
|
require.True(t, response.Done)
|
||||||
|
|
||||||
|
// Remove variables we are not interested in
|
||||||
|
delete(response.Env, "CONSUL_HTTP_ADDR")
|
||||||
|
|
||||||
// Assert environment variable for token is set
|
// Assert environment variable for token is set
|
||||||
require.NotEmpty(t, response.Env)
|
require.NotEmpty(t, response.Env)
|
||||||
require.Equal(t, map[string]string{
|
require.Equal(t, map[string]string{
|
||||||
|
@ -550,6 +598,7 @@ func TestTaskRunner_ConnectNativeHook_shareTLS_override(t *testing.T) {
|
||||||
"CONSUL_CLIENT_KEY": "/foo/key.pem",
|
"CONSUL_CLIENT_KEY": "/foo/key.pem",
|
||||||
"CONSUL_HTTP_AUTH": "foo:bar",
|
"CONSUL_HTTP_AUTH": "foo:bar",
|
||||||
"CONSUL_HTTP_SSL_VERIFY": "false",
|
"CONSUL_HTTP_SSL_VERIFY": "false",
|
||||||
|
"CONSUL_HTTP_ADDR": "localhost:8500",
|
||||||
// CONSUL_HTTP_SSL (check the default value is assumed from client config)
|
// CONSUL_HTTP_SSL (check the default value is assumed from client config)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -23,6 +23,12 @@ The Nomad agent metrics API now respects the
|
||||||
configuration value. If this value is set to `false`, which is the default value,
|
configuration value. If this value is set to `false`, which is the default value,
|
||||||
calling `/v1/metrics?format=prometheus` will now result in a response error.
|
calling `/v1/metrics?format=prometheus` will now result in a response error.
|
||||||
|
|
||||||
|
#### Connect native tasks
|
||||||
|
|
||||||
|
Connect native tasks running in host networking mode will now have `CONSUL_HTTP_ADDR`
|
||||||
|
set automatically. Before this was only the case for bridge networking. If an operator
|
||||||
|
already explicitly set `CONSUL_HTTP_ADDR` then it will not get overriden.
|
||||||
|
|
||||||
## Nomad 1.0.3, 0.12.10
|
## Nomad 1.0.3, 0.12.10
|
||||||
|
|
||||||
Nomad versions 1.0.3 and 0.12.10 change the behavior of the `exec` and `java` drivers so that
|
Nomad versions 1.0.3 and 0.12.10 change the behavior of the `exec` and `java` drivers so that
|
||||||
|
|
|
@ -260,5 +260,65 @@
|
||||||
Consul Connect enabled service.
|
Consul Connect enabled service.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<th colspan="2">Consul-related Variables (only set for connect native tasks)</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_HTTP_ADDR</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Specifies the address to the local Consul agent, will be a unix domain
|
||||||
|
socket in bridge mode and a tcp address in host networking.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_HTTP_TOKEN</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The token to authenticate against consul.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_HTTP_SSL</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Specifies whether HTTPS should be used when communicating with consul.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_HTTP_SSL_VERIFY</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Specifies whether the HTTPS connection should be verified.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_CACERT</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Specifies the path to the CA certificate used for Consul communication.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_CLIENT_CERT</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The client certificate to use when communicating with Consul.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<code>CONSUL_CLIENT_KEY</code>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The client key to use when communicating with Consul.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
Loading…
Reference in New Issue