Using the plugin to spawn processes from the raw_exec driver

This commit is contained in:
Diptanu Choudhury 2016-02-02 18:54:04 -08:00
parent 57453086a7
commit 87f40135ea
6 changed files with 330 additions and 211 deletions

View file

@ -55,26 +55,26 @@ const (
// TaskEnvironment is used to expose information to a task via environment // TaskEnvironment is used to expose information to a task via environment
// variables and provide interpolation of Nomad variables. // variables and provide interpolation of Nomad variables.
type TaskEnvironment struct { type TaskEnvironment struct {
env map[string]string Env map[string]string
meta map[string]string Meta map[string]string
allocDir string AllocDir string
taskDir string TaskDir string
cpuLimit int CpuLimit int
memLimit int MemLimit int
node *structs.Node Node *structs.Node
networks []*structs.NetworkResource Networks []*structs.NetworkResource
portMap map[string]int PortMap map[string]int
// taskEnv is the variables that will be set in the tasks environment // taskEnv is the variables that will be set in the tasks environment
taskEnv map[string]string TaskEnv map[string]string
// nodeValues is the values that are allowed for interprolation from the // nodeValues is the values that are allowed for interprolation from the
// node. // node.
nodeValues map[string]string NodeValues map[string]string
} }
func NewTaskEnvironment(node *structs.Node) *TaskEnvironment { func NewTaskEnvironment(node *structs.Node) *TaskEnvironment {
return &TaskEnvironment{node: node} return &TaskEnvironment{Node: node}
} }
// ParseAndReplace takes the user supplied args replaces any instance of an // ParseAndReplace takes the user supplied args replaces any instance of an
@ -82,7 +82,7 @@ func NewTaskEnvironment(node *structs.Node) *TaskEnvironment {
func (t *TaskEnvironment) ParseAndReplace(args []string) []string { func (t *TaskEnvironment) ParseAndReplace(args []string) []string {
replaced := make([]string, len(args)) replaced := make([]string, len(args))
for i, arg := range args { for i, arg := range args {
replaced[i] = hargs.ReplaceEnv(arg, t.taskEnv, t.nodeValues) replaced[i] = hargs.ReplaceEnv(arg, t.TaskEnv, t.NodeValues)
} }
return replaced return replaced
@ -92,75 +92,75 @@ func (t *TaskEnvironment) ParseAndReplace(args []string) []string {
// and nomad variables. If the variable is found in the passed map it is // and nomad variables. If the variable is found in the passed map it is
// replaced, otherwise the original string is returned. // replaced, otherwise the original string is returned.
func (t *TaskEnvironment) ReplaceEnv(arg string) string { func (t *TaskEnvironment) ReplaceEnv(arg string) string {
return hargs.ReplaceEnv(arg, t.taskEnv, t.nodeValues) return hargs.ReplaceEnv(arg, t.TaskEnv, t.NodeValues)
} }
// Build must be called after all the tasks environment values have been set. // Build must be called after all the tasks environment values have been set.
func (t *TaskEnvironment) Build() *TaskEnvironment { func (t *TaskEnvironment) Build() *TaskEnvironment {
t.nodeValues = make(map[string]string) t.NodeValues = make(map[string]string)
t.taskEnv = make(map[string]string) t.TaskEnv = make(map[string]string)
// Build the task metadata // Build the task metadata
for k, v := range t.meta { for k, v := range t.Meta {
t.taskEnv[fmt.Sprintf("%s%s", MetaPrefix, strings.ToUpper(k))] = v t.TaskEnv[fmt.Sprintf("%s%s", MetaPrefix, strings.ToUpper(k))] = v
} }
// Build the ports // Build the ports
for _, network := range t.networks { for _, network := range t.Networks {
for label, value := range network.MapLabelToValues(t.portMap) { for label, value := range network.MapLabelToValues(t.PortMap) {
IPPort := fmt.Sprintf("%s:%d", network.IP, value) IPPort := fmt.Sprintf("%s:%d", network.IP, value)
t.taskEnv[fmt.Sprintf("%s%s", AddrPrefix, label)] = IPPort t.TaskEnv[fmt.Sprintf("%s%s", AddrPrefix, label)] = IPPort
// Pass an explicit port mapping to the environment // Pass an explicit port mapping to the environment
if port, ok := t.portMap[label]; ok { if port, ok := t.PortMap[label]; ok {
t.taskEnv[fmt.Sprintf("%s%s", HostPortPrefix, label)] = strconv.Itoa(port) t.TaskEnv[fmt.Sprintf("%s%s", HostPortPrefix, label)] = strconv.Itoa(port)
} }
} }
} }
// Build the directories // Build the directories
if t.allocDir != "" { if t.AllocDir != "" {
t.taskEnv[AllocDir] = t.allocDir t.TaskEnv[AllocDir] = t.AllocDir
} }
if t.taskDir != "" { if t.TaskDir != "" {
t.taskEnv[TaskLocalDir] = t.taskDir t.TaskEnv[TaskLocalDir] = t.TaskDir
} }
// Build the resource limits // Build the resource limits
if t.memLimit != 0 { if t.MemLimit != 0 {
t.taskEnv[MemLimit] = strconv.Itoa(t.memLimit) t.TaskEnv[MemLimit] = strconv.Itoa(t.MemLimit)
} }
if t.cpuLimit != 0 { if t.CpuLimit != 0 {
t.taskEnv[CpuLimit] = strconv.Itoa(t.cpuLimit) t.TaskEnv[CpuLimit] = strconv.Itoa(t.CpuLimit)
} }
// Build the node // Build the node
if t.node != nil { if t.Node != nil {
// Set up the node values. // Set up the node values.
t.nodeValues[nodeIdKey] = t.node.ID t.NodeValues[nodeIdKey] = t.Node.ID
t.nodeValues[nodeDcKey] = t.node.Datacenter t.NodeValues[nodeDcKey] = t.Node.Datacenter
t.nodeValues[nodeNameKey] = t.node.Name t.NodeValues[nodeNameKey] = t.Node.Name
t.nodeValues[nodeClassKey] = t.node.NodeClass t.NodeValues[nodeClassKey] = t.Node.NodeClass
// Set up the attributes. // Set up the attributes.
for k, v := range t.node.Attributes { for k, v := range t.Node.Attributes {
t.nodeValues[fmt.Sprintf("%s%s", nodeAttributePrefix, k)] = v t.NodeValues[fmt.Sprintf("%s%s", nodeAttributePrefix, k)] = v
} }
// Set up the meta. // Set up the meta.
for k, v := range t.node.Meta { for k, v := range t.Node.Meta {
t.nodeValues[fmt.Sprintf("%s%s", nodeMetaPrefix, k)] = v t.NodeValues[fmt.Sprintf("%s%s", nodeMetaPrefix, k)] = v
} }
} }
// Interpret the environment variables // Interpret the environment variables
interpreted := make(map[string]string, len(t.env)) interpreted := make(map[string]string, len(t.Env))
for k, v := range t.env { for k, v := range t.Env {
interpreted[k] = hargs.ReplaceEnv(v, t.nodeValues, t.taskEnv) interpreted[k] = hargs.ReplaceEnv(v, t.NodeValues, t.TaskEnv)
} }
for k, v := range interpreted { for k, v := range interpreted {
t.taskEnv[k] = v t.TaskEnv[k] = v
} }
return t return t
@ -169,7 +169,7 @@ func (t *TaskEnvironment) Build() *TaskEnvironment {
// EnvList returns a list of strings with NAME=value pairs. // EnvList returns a list of strings with NAME=value pairs.
func (t *TaskEnvironment) EnvList() []string { func (t *TaskEnvironment) EnvList() []string {
env := []string{} env := []string{}
for k, v := range t.taskEnv { for k, v := range t.TaskEnv {
env = append(env, fmt.Sprintf("%s=%s", k, v)) env = append(env, fmt.Sprintf("%s=%s", k, v))
} }
@ -178,8 +178,8 @@ func (t *TaskEnvironment) EnvList() []string {
// EnvMap returns a copy of the tasks environment variables. // EnvMap returns a copy of the tasks environment variables.
func (t *TaskEnvironment) EnvMap() map[string]string { func (t *TaskEnvironment) EnvMap() map[string]string {
m := make(map[string]string, len(t.taskEnv)) m := make(map[string]string, len(t.TaskEnv))
for k, v := range t.taskEnv { for k, v := range t.TaskEnv {
m[k] = v m[k] = v
} }
@ -188,95 +188,95 @@ func (t *TaskEnvironment) EnvMap() map[string]string {
// Builder methods to build the TaskEnvironment // Builder methods to build the TaskEnvironment
func (t *TaskEnvironment) SetAllocDir(dir string) *TaskEnvironment { func (t *TaskEnvironment) SetAllocDir(dir string) *TaskEnvironment {
t.allocDir = dir t.AllocDir = dir
return t return t
} }
func (t *TaskEnvironment) ClearAllocDir() *TaskEnvironment { func (t *TaskEnvironment) ClearAllocDir() *TaskEnvironment {
t.allocDir = "" t.AllocDir = ""
return t return t
} }
func (t *TaskEnvironment) SetTaskLocalDir(dir string) *TaskEnvironment { func (t *TaskEnvironment) SetTaskLocalDir(dir string) *TaskEnvironment {
t.taskDir = dir t.TaskDir = dir
return t return t
} }
func (t *TaskEnvironment) ClearTaskLocalDir() *TaskEnvironment { func (t *TaskEnvironment) ClearTaskLocalDir() *TaskEnvironment {
t.taskDir = "" t.TaskDir = ""
return t return t
} }
func (t *TaskEnvironment) SetMemLimit(limit int) *TaskEnvironment { func (t *TaskEnvironment) SetMemLimit(limit int) *TaskEnvironment {
t.memLimit = limit t.MemLimit = limit
return t return t
} }
func (t *TaskEnvironment) ClearMemLimit() *TaskEnvironment { func (t *TaskEnvironment) ClearMemLimit() *TaskEnvironment {
t.memLimit = 0 t.MemLimit = 0
return t return t
} }
func (t *TaskEnvironment) SetCpuLimit(limit int) *TaskEnvironment { func (t *TaskEnvironment) SetCpuLimit(limit int) *TaskEnvironment {
t.cpuLimit = limit t.CpuLimit = limit
return t return t
} }
func (t *TaskEnvironment) ClearCpuLimit() *TaskEnvironment { func (t *TaskEnvironment) ClearCpuLimit() *TaskEnvironment {
t.cpuLimit = 0 t.CpuLimit = 0
return t return t
} }
func (t *TaskEnvironment) SetNetworks(networks []*structs.NetworkResource) *TaskEnvironment { func (t *TaskEnvironment) SetNetworks(networks []*structs.NetworkResource) *TaskEnvironment {
t.networks = networks t.Networks = networks
return t return t
} }
func (t *TaskEnvironment) clearNetworks() *TaskEnvironment { func (t *TaskEnvironment) clearNetworks() *TaskEnvironment {
t.networks = nil t.Networks = nil
return t return t
} }
func (t *TaskEnvironment) SetPortMap(portMap map[string]int) *TaskEnvironment { func (t *TaskEnvironment) SetPortMap(portMap map[string]int) *TaskEnvironment {
t.portMap = portMap t.PortMap = portMap
return t return t
} }
func (t *TaskEnvironment) clearPortMap() *TaskEnvironment { func (t *TaskEnvironment) clearPortMap() *TaskEnvironment {
t.portMap = nil t.PortMap = nil
return t return t
} }
// Takes a map of meta values to be passed to the task. The keys are capatilized // Takes a map of meta values to be passed to the task. The keys are capatilized
// when the environent variable is set. // when the environent variable is set.
func (t *TaskEnvironment) SetMeta(m map[string]string) *TaskEnvironment { func (t *TaskEnvironment) SetMeta(m map[string]string) *TaskEnvironment {
t.meta = m t.Meta = m
return t return t
} }
func (t *TaskEnvironment) ClearMeta() *TaskEnvironment { func (t *TaskEnvironment) ClearMeta() *TaskEnvironment {
t.meta = nil t.Meta = nil
return t return t
} }
func (t *TaskEnvironment) SetEnvvars(m map[string]string) *TaskEnvironment { func (t *TaskEnvironment) SetEnvvars(m map[string]string) *TaskEnvironment {
t.env = m t.Env = m
return t return t
} }
// Appends the given environment variables. // Appends the given environment variables.
func (t *TaskEnvironment) AppendEnvvars(m map[string]string) *TaskEnvironment { func (t *TaskEnvironment) AppendEnvvars(m map[string]string) *TaskEnvironment {
if t.env == nil { if t.Env == nil {
t.env = make(map[string]string, len(m)) t.Env = make(map[string]string, len(m))
} }
for k, v := range m { for k, v := range m {
t.env[k] = v t.Env[k] = v
} }
return t return t
} }
func (t *TaskEnvironment) ClearEnvvars() *TaskEnvironment { func (t *TaskEnvironment) ClearEnvvars() *TaskEnvironment {
t.env = nil t.Env = nil
return t return t
} }

View file

@ -5,21 +5,20 @@ import (
"fmt" "fmt"
"log" "log"
"os/exec" "os/exec"
//"path/filepath" "path/filepath"
"syscall" "syscall"
"time" "time"
"github.com/hashicorp/go-plugin" "github.com/hashicorp/go-plugin"
//"github.com/hashicorp/nomad/client/allocdir" "github.com/hashicorp/nomad/client/allocdir"
"github.com/hashicorp/nomad/client/config" "github.com/hashicorp/nomad/client/config"
"github.com/hashicorp/nomad/client/driver/executor" "github.com/hashicorp/nomad/client/driver/executor"
"github.com/hashicorp/nomad/client/driver/plugins" "github.com/hashicorp/nomad/client/driver/plugins"
cstructs "github.com/hashicorp/nomad/client/driver/structs" cstructs "github.com/hashicorp/nomad/client/driver/structs"
//"github.com/hashicorp/nomad/client/getter" "github.com/hashicorp/nomad/client/getter"
"github.com/hashicorp/nomad/nomad/structs"
//"github.com/mitchellh/mapstructure"
"github.com/hashicorp/nomad/helper/discover" "github.com/hashicorp/nomad/helper/discover"
"github.com/hashicorp/nomad/nomad/structs"
"github.com/mitchellh/mapstructure"
) )
// ExecDriver fork/execs tasks using as many of the underlying OS's isolation // ExecDriver fork/execs tasks using as many of the underlying OS's isolation
@ -70,77 +69,57 @@ func (d *ExecDriver) Periodic() (bool, time.Duration) {
} }
func (d *ExecDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandle, error) { func (d *ExecDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandle, error) {
// var driverConfig ExecDriverConfig var driverConfig ExecDriverConfig
// if err := mapstructure.WeakDecode(task.Config, &driverConfig); err != nil { if err := mapstructure.WeakDecode(task.Config, &driverConfig); err != nil {
// return nil, err return nil, err
// } }
// // Get the command to be ran // Get the command to be ran
// command := driverConfig.Command command := driverConfig.Command
// if command == "" { if command == "" {
// return nil, fmt.Errorf("missing command for exec driver") return nil, fmt.Errorf("missing command for exec driver")
// } }
//
// // Create a location to download the artifact. // Create a location to download the artifact.
// taskDir, ok := ctx.AllocDir.TaskDirs[d.DriverContext.taskName] taskDir, ok := ctx.AllocDir.TaskDirs[d.DriverContext.taskName]
// if !ok { if !ok {
// return nil, fmt.Errorf("Could not find task directory for task: %v", d.DriverContext.taskName) return nil, fmt.Errorf("Could not find task directory for task: %v", d.DriverContext.taskName)
// } }
//
// // Check if an artificat is specified and attempt to download it // Check if an artificat is specified and attempt to download it
// source, ok := task.Config["artifact_source"] source, ok := task.Config["artifact_source"]
// if ok && source != "" { if ok && source != "" {
// // Proceed to download an artifact to be executed. // Proceed to download an artifact to be executed.
// _, err := getter.GetArtifact( _, err := getter.GetArtifact(
// filepath.Join(taskDir, allocdir.TaskLocal), filepath.Join(taskDir, allocdir.TaskLocal),
// driverConfig.ArtifactSource, driverConfig.ArtifactSource,
// driverConfig.Checksum, driverConfig.Checksum,
// d.logger, d.logger,
// ) )
// if err != nil { if err != nil {
// return nil, err return nil, err
// } }
// } }
//
// // Setup the command
// execCtx := executor.NewExecutorContext(d.taskEnv)
// cmd := executor.Command(execCtx, command, driverConfig.Args...)
// if err := cmd.Limit(task.Resources); err != nil {
// return nil, fmt.Errorf("failed to constrain resources: %s", err)
// }
//
// // Populate environment variables
// cmd.Command().Env = d.taskEnv.EnvList()
//
// if err := cmd.ConfigureTaskDir(d.taskName, ctx.AllocDir); err != nil {
// return nil, fmt.Errorf("failed to configure task directory: %v", err)
// }
//
// if err := cmd.Start(); err != nil {
// return nil, fmt.Errorf("failed to start command: %v", err)
// }
//
bin, err := discover.NomadExecutable() bin, err := discover.NomadExecutable()
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to find the nomad binary: %v", err) return nil, fmt.Errorf("unable to find the nomad binary: %v", err)
} }
executorClient := plugin.NewClient(&plugin.ClientConfig{ pluginConfig := &plugin.ClientConfig{
HandshakeConfig: plugins.HandshakeConfig, HandshakeConfig: plugins.HandshakeConfig,
Plugins: plugins.PluginMap, Plugins: plugins.PluginMap,
Cmd: exec.Command(bin, "executor"), Cmd: exec.Command(bin, "executor"),
})
rpcClient, err := executorClient.Client()
if err != nil {
return nil, fmt.Errorf("error creating rpc client for executor plugin: %v", err)
} }
raw, err := rpcClient.Dispense("executor") executor, pluginClient, err := d.executor(pluginConfig)
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to dispense the executor plugin: %v", err) return nil, err
} }
executorPlugin := raw.(plugins.Executor) executorCtx := &plugins.ExecutorContext{
ps, err := executorPlugin.LaunchCmd(exec.Command("/bin/echo", "hello"), &plugins.ExecutorContext{}) TaskEnv: d.taskEnv,
AllocDir: ctx.AllocDir,
Task: task,
}
ps, err := executor.LaunchCmd(&plugins.ExecCommand{Cmd: command, Args: driverConfig.Args}, executorCtx)
if err != nil { if err != nil {
return nil, fmt.Errorf("error starting process via the plugin: %v", err) return nil, fmt.Errorf("error starting process via the plugin: %v", err)
} }
@ -148,8 +127,8 @@ func (d *ExecDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandle,
// Return a driver handle // Return a driver handle
h := &execHandle{ h := &execHandle{
pluginClient: executorClient, pluginClient: pluginClient,
executor: executorPlugin, executor: executor,
//cmd: cmd, //cmd: cmd,
killTimeout: d.DriverContext.KillTimeout(task), killTimeout: d.DriverContext.KillTimeout(task),
logger: d.logger, logger: d.logger,
@ -178,10 +157,16 @@ func (d *ExecDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, erro
// if err != nil { // if err != nil {
// return nil, fmt.Errorf("failed to open ID %v: %v", id.ExecutorId, err) // return nil, fmt.Errorf("failed to open ID %v: %v", id.ExecutorId, err)
// } // }
bin, err := discover.NomadExecutable()
if err != nil {
return nil, fmt.Errorf("unable to find the nomad binary: %v", err)
}
pluginConfig := &plugin.ClientConfig{ pluginConfig := &plugin.ClientConfig{
HandshakeConfig: plugins.HandshakeConfig, HandshakeConfig: plugins.HandshakeConfig,
Plugins: plugins.PluginMap, Plugins: plugins.PluginMap,
Cmd: exec.Command("/home/diptanuc/Projects/gocode/bin/nomad"), Cmd: exec.Command(bin, "executor"),
Reattach: id.PluginConfig, Reattach: id.PluginConfig,
} }
executor, client, err := d.executor(pluginConfig) executor, client, err := d.executor(pluginConfig)
@ -208,6 +193,7 @@ func (d *ExecDriver) executor(config *plugin.ClientConfig) (plugins.Executor, *p
if err != nil { if err != nil {
return nil, nil, fmt.Errorf("error creating rpc client for executor plugin: %v", err) return nil, nil, fmt.Errorf("error creating rpc client for executor plugin: %v", err)
} }
rpcClient.SyncStreams(d.config.LogOutput, d.config.LogOutput)
raw, err := rpcClient.Dispense("executor") raw, err := rpcClient.Dispense("executor")
if err != nil { if err != nil {
@ -248,7 +234,7 @@ func (h *execHandle) Kill() error {
case <-h.doneCh: case <-h.doneCh:
return nil return nil
case <-time.After(h.killTimeout): case <-time.After(h.killTimeout):
_, err := h.executor.Exit() err := h.executor.Exit()
return err return err
} }
} }

View file

@ -1,11 +1,16 @@
package plugins package plugins
import ( import (
"log"
"net/rpc" "net/rpc"
"os/exec" "os"
"time" "time"
"github.com/hashicorp/go-plugin" "github.com/hashicorp/go-plugin"
"github.com/hashicorp/nomad/client/allocdir"
"github.com/hashicorp/nomad/client/driver/env"
"github.com/hashicorp/nomad/nomad/structs"
) )
var HandshakeConfig = plugin.HandshakeConfig{ var HandshakeConfig = plugin.HandshakeConfig{
@ -19,6 +24,16 @@ var PluginMap = map[string]plugin.Plugin{
} }
type ExecutorContext struct { type ExecutorContext struct {
TaskEnv *env.TaskEnvironment
AllocDir *allocdir.AllocDir
Task *structs.Task
Chroot bool
Limits bool
}
type ExecCommand struct {
Cmd string
Args []string
} }
type ProcessState struct { type ProcessState struct {
@ -28,10 +43,10 @@ type ProcessState struct {
} }
type Executor interface { type Executor interface {
LaunchCmd(cmd *exec.Cmd, ctx *ExecutorContext) (*ProcessState, error) LaunchCmd(cmd *ExecCommand, ctx *ExecutorContext) (*ProcessState, error)
Wait() (*ProcessState, error) Wait() (*ProcessState, error)
ShutDown() (*ProcessState, error) ShutDown() error
Exit() (*ProcessState, error) Exit() error
} }
type ExecutorRPC struct { type ExecutorRPC struct {
@ -39,11 +54,11 @@ type ExecutorRPC struct {
} }
type LaunchCmdArgs struct { type LaunchCmdArgs struct {
Cmd *exec.Cmd Cmd *ExecCommand
Ctx *ExecutorContext Ctx *ExecutorContext
} }
func (e *ExecutorRPC) LaunchCmd(cmd *exec.Cmd, ctx *ExecutorContext) (*ProcessState, error) { func (e *ExecutorRPC) LaunchCmd(cmd *ExecCommand, ctx *ExecutorContext) (*ProcessState, error) {
var ps ProcessState var ps ProcessState
err := e.client.Call("Plugin.LaunchCmd", LaunchCmdArgs{Cmd: cmd, Ctx: ctx}, &ps) err := e.client.Call("Plugin.LaunchCmd", LaunchCmdArgs{Cmd: cmd, Ctx: ctx}, &ps)
return &ps, err return &ps, err
@ -55,16 +70,16 @@ func (e *ExecutorRPC) Wait() (*ProcessState, error) {
return &ps, err return &ps, err
} }
func (e *ExecutorRPC) ShutDown() (*ProcessState, error) { func (e *ExecutorRPC) ShutDown() error {
var ps ProcessState var ps ProcessState
err := e.client.Call("Plugin.ShutDown", new(interface{}), &ps) err := e.client.Call("Plugin.ShutDown", new(interface{}), &ps)
return &ps, err return err
} }
func (e *ExecutorRPC) Exit() (*ProcessState, error) { func (e *ExecutorRPC) Exit() error {
var ps ProcessState var ps ProcessState
err := e.client.Call("Plugin.Exit", new(interface{}), &ps) err := e.client.Call("Plugin.Exit", new(interface{}), &ps)
return &ps, err return err
} }
type ExecutorRPCServer struct { type ExecutorRPCServer struct {
@ -85,22 +100,26 @@ func (e *ExecutorRPCServer) Wait(args interface{}, ps *ProcessState) error {
func (e *ExecutorRPCServer) ShutDown(args interface{}, ps *ProcessState) error { func (e *ExecutorRPCServer) ShutDown(args interface{}, ps *ProcessState) error {
var err error var err error
ps, err = e.Impl.ShutDown() err = e.Impl.ShutDown()
return err return err
} }
func (e *ExecutorRPCServer) Exit(args interface{}, ps *ProcessState) error { func (e *ExecutorRPCServer) Exit(args interface{}, ps *ProcessState) error {
var err error var err error
ps, err = e.Impl.Exit() err = e.Impl.Exit()
return err return err
} }
type ExecutorPlugin struct{} type ExecutorPlugin struct {
logger *log.Logger
}
func (p *ExecutorPlugin) Server(*plugin.MuxBroker) (interface{}, error) { func (p *ExecutorPlugin) Server(*plugin.MuxBroker) (interface{}, error) {
return &ExecutorRPCServer{Impl: NewExecutor()}, nil p.logger = log.New(os.Stdout, "executor-plugin-server:", log.LstdFlags)
return &ExecutorRPCServer{Impl: NewExecutor(p.logger)}, nil
} }
func (p *ExecutorPlugin) Client(b *plugin.MuxBroker, c *rpc.Client) (interface{}, error) { func (p *ExecutorPlugin) Client(b *plugin.MuxBroker, c *rpc.Client) (interface{}, error) {
p.logger = log.New(os.Stdout, "executor-plugin-client:", log.LstdFlags)
return &ExecutorRPC{client: c}, nil return &ExecutorRPC{client: c}, nil
} }

View file

@ -3,30 +3,96 @@
package plugins package plugins
import ( import (
"fmt"
"log"
"os"
"os/exec" "os/exec"
"path/filepath"
"runtime"
"syscall"
"time" "time"
"github.com/hashicorp/nomad/client/allocdir"
) )
type BasicExecutor struct { type BasicExecutor struct {
logger *log.Logger
cmd exec.Cmd
} }
func NewExecutor() Executor { func NewExecutor(logger *log.Logger) Executor {
return &BasicExecutor{} return &BasicExecutor{logger: logger}
} }
func (e *BasicExecutor) LaunchCmd(cmd *exec.Cmd, ctx *ExecutorContext) (*ProcessState, error) { func (e *BasicExecutor) LaunchCmd(command *ExecCommand, ctx *ExecutorContext) (*ProcessState, error) {
e.cmd.Path = command.Cmd
e.cmd.Args = append([]string{command.Cmd}, command.Args...)
e.cmd.Path = ctx.TaskEnv.ReplaceEnv(e.cmd.Path)
e.cmd.Args = ctx.TaskEnv.ParseAndReplace(e.cmd.Args)
if filepath.Base(command.Cmd) == command.Cmd {
if lp, err := exec.LookPath(command.Cmd); err != nil {
} else {
e.cmd.Path = lp
}
}
e.configureTaskDir(ctx.Task.Name, ctx.AllocDir)
e.cmd.Env = ctx.TaskEnv.EnvList()
stdoPath := filepath.Join(e.cmd.Dir, allocdir.TaskLocal, fmt.Sprintf("%v.stdout", ctx.Task.Name))
stdo, err := os.OpenFile(stdoPath, os.O_CREATE|os.O_RDWR|os.O_APPEND, 0666)
if err != nil {
return nil, err
}
e.cmd.Stdout = stdo
stdePath := filepath.Join(e.cmd.Dir, allocdir.TaskLocal, fmt.Sprintf("%v.stderr", ctx.Task.Name))
stde, err := os.OpenFile(stdePath, os.O_CREATE|os.O_RDWR|os.O_APPEND, 0666)
if err != nil {
return nil, err
}
e.cmd.Stderr = stde
if err := e.cmd.Start(); err != nil {
return nil, err
}
return &ProcessState{Pid: 5, ExitCode: -1, Time: time.Now()}, nil return &ProcessState{Pid: 5, ExitCode: -1, Time: time.Now()}, nil
} }
func (e *BasicExecutor) Wait() (*ProcessState, error) { func (e *BasicExecutor) Wait() (*ProcessState, error) {
time.Sleep(5 * time.Second) err := e.cmd.Wait()
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil exitCode := 1
if exitErr, ok := err.(*exec.ExitError); ok {
if status, ok := exitErr.Sys().(syscall.WaitStatus); ok {
exitCode = status.ExitStatus()
}
}
return &ProcessState{Pid: 0, ExitCode: exitCode, Time: time.Now()}, nil
} }
func (e *BasicExecutor) Exit() (*ProcessState, error) { func (e *BasicExecutor) Exit() error {
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil proc, err := os.FindProcess(e.cmd.Process.Pid)
if err != nil {
return fmt.Errorf("failied to find user process %v: %v", e.cmd.Process.Pid, err)
}
return proc.Kill()
} }
func (e *BasicExecutor) ShutDown() (*ProcessState, error) { func (e *BasicExecutor) ShutDown() error {
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil proc, err := os.FindProcess(e.cmd.Process.Pid)
if err != nil {
return err
}
if runtime.GOOS == "windows" {
return proc.Kill()
}
return proc.Signal(os.Interrupt)
}
func (e *BasicExecutor) configureTaskDir(taskName string, allocDir *allocdir.AllocDir) error {
taskDir, ok := allocDir.TaskDirs[taskName]
if !ok {
return fmt.Errorf("Couldn't find task directory for task %v", taskName)
}
e.cmd.Dir = taskDir
return nil
} }

View file

@ -1,23 +1,34 @@
package plugins package plugins
import ( import (
"fmt"
"log" "log"
"os/exec" "os/exec"
"path/filepath"
"time" "time"
) )
type LinuxExecutor struct { type LinuxExecutor struct {
cmd *exec.Cmd
ctx *ExecutorContext ctx *ExecutorContext
log *log.Logger logger *log.Logger
} }
func NewExecutor() Executor { func NewExecutor(logger *log.Logger) Executor {
return &LinuxExecutor{} return &LinuxExecutor{logger: logger}
} }
func (e *LinuxExecutor) LaunchCmd(cmd *exec.Cmd, ctx *ExecutorContext) (*ProcessState, error) { func (e *LinuxExecutor) LaunchCmd(command *ExecCommand, ctx *ExecutorContext) (*ProcessState, error) {
var cmd exec.Cmd
cmd.Path = command.Cmd
cmd.Args = append([]string{name}, args...)
if filepath.Base(command.Cmd) == command.Cmd {
if lp, err := exec.LookPath(command.Cmd); err != nil {
} else {
cmd.Path = lp
}
}
cmd.Env = ctx.TaskEnv.EnvList()
return &ProcessState{Pid: 5, ExitCode: -1, Time: time.Now()}, nil return &ProcessState{Pid: 5, ExitCode: -1, Time: time.Now()}, nil
} }
@ -26,10 +37,10 @@ func (e *LinuxExecutor) Wait() (*ProcessState, error) {
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil
} }
func (e *LinuxExecutor) Exit() (*ProcessState, error) { func (e *LinuxExecutor) Exit() error {
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil return nil
} }
func (e *LinuxExecutor) ShutDown() (*ProcessState, error) { func (e *LinuxExecutor) ShutDown() (*ProcessState, error) {
return &ProcessState{Pid: 0, ExitCode: 0, Time: time.Now()}, nil return nil
} }

View file

@ -4,15 +4,18 @@ import (
"encoding/json" "encoding/json"
"fmt" "fmt"
"log" "log"
"os/exec"
"path/filepath" "path/filepath"
"time" "time"
"github.com/hashicorp/go-plugin"
"github.com/hashicorp/nomad/client/allocdir" "github.com/hashicorp/nomad/client/allocdir"
"github.com/hashicorp/nomad/client/config" "github.com/hashicorp/nomad/client/config"
"github.com/hashicorp/nomad/client/driver/executor" "github.com/hashicorp/nomad/client/driver/plugins"
cstructs "github.com/hashicorp/nomad/client/driver/structs" cstructs "github.com/hashicorp/nomad/client/driver/structs"
"github.com/hashicorp/nomad/client/fingerprint" "github.com/hashicorp/nomad/client/fingerprint"
"github.com/hashicorp/nomad/client/getter" "github.com/hashicorp/nomad/client/getter"
"github.com/hashicorp/nomad/helper/discover"
"github.com/hashicorp/nomad/nomad/structs" "github.com/hashicorp/nomad/nomad/structs"
"github.com/mitchellh/mapstructure" "github.com/mitchellh/mapstructure"
) )
@ -32,11 +35,12 @@ type RawExecDriver struct {
// rawExecHandle is returned from Start/Open as a handle to the PID // rawExecHandle is returned from Start/Open as a handle to the PID
type rawExecHandle struct { type rawExecHandle struct {
cmd executor.Executor pluginClient *plugin.Client
killTimeout time.Duration executor plugins.Executor
logger *log.Logger killTimeout time.Duration
waitCh chan *cstructs.WaitResult logger *log.Logger
doneCh chan struct{} waitCh chan *cstructs.WaitResult
doneCh chan struct{}
} }
// NewRawExecDriver is used to create a new raw exec driver // NewRawExecDriver is used to create a new raw exec driver
@ -90,40 +94,62 @@ func (d *RawExecDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandl
} }
} }
// Setup the command bin, err := discover.NomadExecutable()
execCtx := executor.NewExecutorContext(d.taskEnv) if err != nil {
cmd := executor.NewBasicExecutor(execCtx) return nil, fmt.Errorf("unable to find the nomad binary: %v", err)
executor.SetCommand(cmd, command, driverConfig.Args) }
if err := cmd.Limit(task.Resources); err != nil { pluginConfig := &plugin.ClientConfig{
return nil, fmt.Errorf("failed to constrain resources: %s", err) HandshakeConfig: plugins.HandshakeConfig,
Plugins: plugins.PluginMap,
Cmd: exec.Command(bin, "executor"),
} }
// Populate environment variables executor, pluginClient, err := d.executor(pluginConfig)
cmd.Command().Env = d.taskEnv.EnvList() if err != nil {
return nil, err
if err := cmd.ConfigureTaskDir(d.taskName, ctx.AllocDir); err != nil {
return nil, fmt.Errorf("failed to configure task directory: %v", err)
} }
executorCtx := &plugins.ExecutorContext{
if err := cmd.Start(); err != nil { TaskEnv: d.taskEnv,
return nil, fmt.Errorf("failed to start command: %v", err) AllocDir: ctx.AllocDir,
Task: task,
} }
ps, err := executor.LaunchCmd(&plugins.ExecCommand{Cmd: command, Args: driverConfig.Args}, executorCtx)
if err != nil {
return nil, fmt.Errorf("error starting process via the plugin: %v", err)
}
d.logger.Printf("DIPTANU Started process via plugin: %#v", ps)
// Return a driver handle // Return a driver handle
h := &execHandle{ h := &rawExecHandle{
cmd: cmd, pluginClient: pluginClient,
killTimeout: d.DriverContext.KillTimeout(task), executor: executor,
logger: d.logger, killTimeout: d.DriverContext.KillTimeout(task),
doneCh: make(chan struct{}), logger: d.logger,
waitCh: make(chan *cstructs.WaitResult, 1), doneCh: make(chan struct{}),
waitCh: make(chan *cstructs.WaitResult, 1),
} }
go h.run() go h.run()
return h, nil return h, nil
} }
func (d *RawExecDriver) executor(config *plugin.ClientConfig) (plugins.Executor, *plugin.Client, error) {
executorClient := plugin.NewClient(config)
rpcClient, err := executorClient.Client()
if err != nil {
return nil, nil, fmt.Errorf("error creating rpc client for executor plugin: %v", err)
}
rpcClient.SyncStreams(d.config.LogOutput, d.config.LogOutput)
raw, err := rpcClient.Dispense("executor")
if err != nil {
return nil, nil, fmt.Errorf("unable to dispense the executor plugin: %v", err)
}
executorPlugin := raw.(plugins.Executor)
return executorPlugin, executorClient, nil
}
type rawExecId struct { type rawExecId struct {
ExecutorId string KillTimeout time.Duration
KillTimeout time.Duration PluginConfig *plugin.ReattachConfig
} }
func (d *RawExecDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, error) { func (d *RawExecDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, error) {
@ -132,30 +158,39 @@ func (d *RawExecDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, e
return nil, fmt.Errorf("Failed to parse handle '%s': %v", handleID, err) return nil, fmt.Errorf("Failed to parse handle '%s': %v", handleID, err)
} }
// Find the process bin, err := discover.NomadExecutable()
execCtx := executor.NewExecutorContext(d.taskEnv) if err != nil {
cmd := executor.NewBasicExecutor(execCtx) return nil, fmt.Errorf("unable to find the nomad binary: %v", err)
if err := cmd.Open(id.ExecutorId); err != nil { }
return nil, fmt.Errorf("failed to open ID %v: %v", id.ExecutorId, err)
pluginConfig := &plugin.ClientConfig{
HandshakeConfig: plugins.HandshakeConfig,
Plugins: plugins.PluginMap,
Cmd: exec.Command(bin, "executor"),
Reattach: id.PluginConfig,
}
executor, client, err := d.executor(pluginConfig)
if err != nil {
return nil, fmt.Errorf("error connecting to plugin: %v", err)
} }
// Return a driver handle // Return a driver handle
h := &execHandle{ h := &execHandle{
cmd: cmd, pluginClient: client,
logger: d.logger, executor: executor,
killTimeout: id.KillTimeout, logger: d.logger,
doneCh: make(chan struct{}), killTimeout: id.KillTimeout,
waitCh: make(chan *cstructs.WaitResult, 1), doneCh: make(chan struct{}),
waitCh: make(chan *cstructs.WaitResult, 1),
} }
go h.run() go h.run()
return h, nil return h, nil
} }
func (h *rawExecHandle) ID() string { func (h *rawExecHandle) ID() string {
executorId, _ := h.cmd.ID()
id := rawExecId{ id := rawExecId{
ExecutorId: executorId, KillTimeout: h.killTimeout,
KillTimeout: h.killTimeout, PluginConfig: h.pluginClient.ReattachConfig(),
} }
data, err := json.Marshal(id) data, err := json.Marshal(id)
@ -178,18 +213,20 @@ func (h *rawExecHandle) Update(task *structs.Task) error {
} }
func (h *rawExecHandle) Kill() error { func (h *rawExecHandle) Kill() error {
h.cmd.Shutdown() h.executor.ShutDown()
select { select {
case <-h.doneCh: case <-h.doneCh:
return nil return nil
case <-time.After(h.killTimeout): case <-time.After(h.killTimeout):
return h.cmd.ForceStop() err := h.executor.Exit()
return err
} }
} }
func (h *rawExecHandle) run() { func (h *rawExecHandle) run() {
res := h.cmd.Wait() ps, err := h.executor.Wait()
close(h.doneCh) close(h.doneCh)
h.waitCh <- res h.waitCh <- &cstructs.WaitResult{ExitCode: ps.ExitCode, Signal: 0, Err: err}
close(h.waitCh) close(h.waitCh)
h.pluginClient.Kill()
} }