diff --git a/drivers/qemu/driver.go b/drivers/qemu/driver.go new file mode 100644 index 000000000..71f2e1d75 --- /dev/null +++ b/drivers/qemu/driver.go @@ -0,0 +1,635 @@ +package qemu + +import ( + "errors" + "fmt" + "os" + "os/exec" + "path/filepath" + "regexp" + "runtime" + "strings" + "time" + + "net" + "strconv" + + "github.com/coreos/go-semver/semver" + "github.com/hashicorp/go-hclog" + "github.com/hashicorp/go-plugin" + "github.com/hashicorp/nomad/client/driver/executor" + dstructs "github.com/hashicorp/nomad/client/driver/structs" + cstructs "github.com/hashicorp/nomad/client/structs" + "github.com/hashicorp/nomad/drivers/shared/eventer" + "github.com/hashicorp/nomad/plugins/base" + "github.com/hashicorp/nomad/plugins/drivers" + "github.com/hashicorp/nomad/plugins/drivers/utils" + "github.com/hashicorp/nomad/plugins/shared/hclspec" + "golang.org/x/net/context" +) + +const ( + // pluginName is the name of the plugin + pluginName = "qemu" + + // fingerprintPeriod is the interval at which the driver will send fingerprint responses + fingerprintPeriod = 30 * time.Second + + // The key populated in Node Attributes to indicate presence of the Qemu driver + qemuDriverAttr = "driver.qemu" + qemuDriverVersionAttr = "driver.qemu.version" + + // Represents an ACPI shutdown request to the VM (emulates pressing a physical power button) + // Reference: https://en.wikibooks.org/wiki/QEMU/Monitor + qemuGracefulShutdownMsg = "system_powerdown\n" + qemuMonitorSocketName = "qemu-monitor.sock" + + // Maximum socket path length prior to qemu 2.10.1 + qemuLegacyMaxMonitorPathLen = 108 +) + +var ( + reQemuVersion = regexp.MustCompile(`version (\d[\.\d+]+)`) + + // Prior to qemu 2.10.1, monitor socket paths are truncated to 108 bytes. + // We should consider this if driver.qemu.version is < 2.10.1 and the + // generated monitor path is too long. + // + // Relevant fix is here: + // https://github.com/qemu/qemu/commit/ad9579aaa16d5b385922d49edac2c96c79bcfb6 + qemuVersionLongSocketPathFix = semver.New("2.10.1") + + // pluginInfo is the response returned for the PluginInfo RPC + pluginInfo = &base.PluginInfoResponse{ + Type: base.PluginTypeDriver, + PluginApiVersion: "0.0.1", + PluginVersion: "0.1.0", + Name: pluginName, + } + + // configSpec is the hcl specification returned by the ConfigSchema RPC + configSpec = hclspec.NewObject(map[string]*hclspec.Spec{}) + + // taskConfigSpec is the hcl specification for the driver config section of + // a taskConfig within a job. It is returned in the TaskConfigSchema RPC + taskConfigSpec = hclspec.NewObject(map[string]*hclspec.Spec{ + "image_path": hclspec.NewAttr("image_path", "string", true), + "accelerator": hclspec.NewAttr("accelerator", "string", false), + "graceful_shutdown": hclspec.NewAttr("graceful_shutdown", "bool", false), + "args": hclspec.NewAttr("args", "list(string)", false), + "port_map": hclspec.NewBlockAttrs("port_map", "number", false), + }) + + // capabilities is returned by the Capabilities RPC and indicates what + // optional features this driver supports + capabilities = &drivers.Capabilities{ + SendSignals: false, + Exec: false, + FSIsolation: cstructs.FSIsolationImage, + } + + _ drivers.DriverPlugin = (*QemuDriver)(nil) +) + +// TaskConfig is the driver configuration of a taskConfig within a job +type TaskConfig struct { + ImagePath string `codec:"image_path"` + Accelerator string `codec:"accelerator"` + Args []string `codec:"args"` // extra arguments to qemu executable + PortMap map[string]int `codec:"port_map"` // A map of host port and the port name defined in the image manifest file + GracefulShutdown bool `codec:"graceful_shutdown"` +} + +// QemuTaskState is the state which is encoded in the handle returned in +// StartTask. This information is needed to rebuild the taskConfig state and handler +// during recovery. +type QemuTaskState struct { + ReattachConfig *utils.ReattachConfig + TaskConfig *drivers.TaskConfig + Pid int + StartedAt time.Time +} + +// QemuDriver is a driver for running images via Qemu +type QemuDriver struct { + // eventer is used to handle multiplexing of TaskEvents calls such that an + // event can be broadcast to all callers + eventer *eventer.Eventer + + // tasks is the in memory datastore mapping taskIDs to qemuTaskHandle + tasks *taskStore + + // ctx is the context for the driver. It is passed to other subsystems to + // coordinate shutdown + ctx context.Context + + // signalShutdown is called when the driver is shutting down and cancels the + // ctx passed to any subsystems + signalShutdown context.CancelFunc + + // logger will log to the plugin output which is usually an 'executor.out' + // file located in the root of the TaskDir + logger hclog.Logger +} + +func NewQemuDriver(logger hclog.Logger) drivers.DriverPlugin { + ctx, cancel := context.WithCancel(context.Background()) + logger = logger.Named(pluginName) + return &QemuDriver{ + eventer: eventer.NewEventer(ctx, logger), + tasks: newTaskStore(), + ctx: ctx, + signalShutdown: cancel, + logger: logger, + } +} + +func (d *QemuDriver) PluginInfo() (*base.PluginInfoResponse, error) { + return pluginInfo, nil +} + +func (d *QemuDriver) ConfigSchema() (*hclspec.Spec, error) { + return configSpec, nil +} + +func (d *QemuDriver) SetConfig(data []byte) error { + // nothing to do, no driver config + return nil +} + +func (d *QemuDriver) TaskConfigSchema() (*hclspec.Spec, error) { + return taskConfigSpec, nil +} + +func (d *QemuDriver) Capabilities() (*drivers.Capabilities, error) { + return capabilities, nil +} + +func (r *QemuDriver) Fingerprint(ctx context.Context) (<-chan *drivers.Fingerprint, error) { + ch := make(chan *drivers.Fingerprint) + go r.handleFingerprint(ctx, ch) + return ch, nil +} + +func (d *QemuDriver) handleFingerprint(ctx context.Context, ch chan *drivers.Fingerprint) { + ticker := time.NewTimer(0) + for { + select { + case <-ctx.Done(): + return + case <-d.ctx.Done(): + return + case <-ticker.C: + ticker.Reset(fingerprintPeriod) + ch <- d.buildFingerprint() + } + } +} + +func (d *QemuDriver) buildFingerprint() *drivers.Fingerprint { + fingerprint := &drivers.Fingerprint{ + Attributes: map[string]string{}, + Health: drivers.HealthStateHealthy, + HealthDescription: "healthy", + } + + bin := "qemu-system-x86_64" + if runtime.GOOS == "windows" { + // On windows, the "qemu-system-x86_64" command does not respond to the + // version flag. + bin = "qemu-img" + } + outBytes, err := exec.Command(bin, "--version").Output() + if err != nil { + // return no error, as it isn't an error to not find qemu, it just means we + // can't use it. + fingerprint.Health = drivers.HealthStateUndetected + fingerprint.HealthDescription = "" + return fingerprint + } + out := strings.TrimSpace(string(outBytes)) + + matches := reQemuVersion.FindStringSubmatch(out) + if len(matches) != 2 { + fingerprint.Health = drivers.HealthStateUndetected + fingerprint.HealthDescription = fmt.Sprintf("failed to parse qemu version from %v", out) + return fingerprint + } + currentQemuVersion := matches[1] + fingerprint.Attributes[qemuDriverAttr] = "1" + fingerprint.Attributes[qemuDriverVersionAttr] = currentQemuVersion + return fingerprint +} + +func (d *QemuDriver) RecoverTask(handle *drivers.TaskHandle) error { + if handle == nil { + return fmt.Errorf("error: handle cannot be nil") + } + + var taskState QemuTaskState + if err := handle.GetDriverState(&taskState); err != nil { + d.logger.Error("failed to decode taskConfig state from handle", "error", err, "task_id", handle.Config.ID) + return fmt.Errorf("failed to decode taskConfig state from handle: %v", err) + } + + plugRC, err := utils.ReattachConfigToGoPlugin(taskState.ReattachConfig) + if err != nil { + d.logger.Error("failed to build ReattachConfig from taskConfig state", "error", err, "task_id", handle.Config.ID) + return fmt.Errorf("failed to build ReattachConfig from taskConfig state: %v", err) + } + + pluginConfig := &plugin.ClientConfig{ + Reattach: plugRC, + } + + execImpl, pluginClient, err := utils.CreateExecutorWithConfig(pluginConfig, os.Stderr) + if err != nil { + d.logger.Error("failed to reattach to executor", "error", err, "task_id", handle.Config.ID) + return fmt.Errorf("failed to reattach to executor: %v", err) + } + + h := &qemuTaskHandle{ + exec: execImpl, + pid: taskState.Pid, + pluginClient: pluginClient, + taskConfig: taskState.TaskConfig, + procState: drivers.TaskStateRunning, + startedAt: taskState.StartedAt, + exitResult: &drivers.ExitResult{}, + } + + d.tasks.Set(taskState.TaskConfig.ID, h) + + go h.run() + return nil +} + +func (d *QemuDriver) StartTask(cfg *drivers.TaskConfig) (*drivers.TaskHandle, *cstructs.DriverNetwork, error) { + if _, ok := d.tasks.Get(cfg.ID); ok { + return nil, nil, fmt.Errorf("taskConfig with ID '%s' already started", cfg.ID) + } + + var driverConfig TaskConfig + + if err := cfg.DecodeDriverConfig(&driverConfig); err != nil { + return nil, nil, fmt.Errorf("failed to decode driver config: %v", err) + } + + handle := drivers.NewTaskHandle(pluginName) + handle.Config = cfg + + // Get the image source + vmPath := driverConfig.ImagePath + if vmPath == "" { + return nil, nil, fmt.Errorf("image_path must be set") + } + vmID := filepath.Base(vmPath) + + // Parse configuration arguments + // Create the base arguments + accelerator := "tcg" + if driverConfig.Accelerator != "" { + accelerator = driverConfig.Accelerator + } + + if cfg.Resources.NomadResources.MemoryMB < 128 || cfg.Resources.NomadResources.MemoryMB > 4000000 { + return nil, nil, fmt.Errorf("Qemu memory assignment out of bounds") + } + mem := fmt.Sprintf("%dM", cfg.Resources.NomadResources.MemoryMB) + + absPath, err := GetAbsolutePath("qemu-system-x86_64") + if err != nil { + return nil, nil, err + } + + args := []string{ + absPath, + "-machine", "type=pc,accel=" + accelerator, + "-name", vmID, + "-m", mem, + "-drive", "file=" + vmPath, + "-nographic", + } + + var monitorPath string + if driverConfig.GracefulShutdown { + if runtime.GOOS == "windows" { + return nil, nil, errors.New("QEMU graceful shutdown is unsupported on the Windows platform") + } + // This socket will be used to manage the virtual machine (for example, + // to perform graceful shutdowns) + taskDir := filepath.Join(cfg.AllocDir, cfg.Name) + fingerPrint := d.buildFingerprint() + if fingerPrint.Attributes == nil { + return nil, nil, fmt.Errorf("unable to get qemu driver version from fingerprinted attributes") + } + monitorPath, err = d.getMonitorPath(taskDir, fingerPrint) + if err != nil { + d.logger.Debug("could not get qemu monitor path", "error", err) + return nil, nil, err + } + d.logger.Debug("got monitor path", "monitorPath", monitorPath) + args = append(args, "-monitor", fmt.Sprintf("unix:%s,server,nowait", monitorPath)) + } + + // Add pass through arguments to qemu executable. A user can specify + // these arguments in driver task configuration. These arguments are + // passed directly to the qemu driver as command line options. + // For example, args = [ "-nodefconfig", "-nodefaults" ] + // This will allow a VM with embedded configuration to boot successfully. + args = append(args, driverConfig.Args...) + + // Check the Resources required Networks to add port mappings. If no resources + // are required, we assume the VM is a purely compute job and does not require + // the outside world to be able to reach it. VMs ran without port mappings can + // still reach out to the world, but without port mappings it is effectively + // firewalled + protocols := []string{"udp", "tcp"} + if len(cfg.Resources.NomadResources.Networks) > 0 { + // Loop through the port map and construct the hostfwd string, to map + // reserved ports to the ports listenting in the VM + // Ex: hostfwd=tcp::22000-:22,hostfwd=tcp::80-:8080 + var forwarding []string + taskPorts := cfg.Resources.NomadResources.Networks[0].PortLabels() + for label, guest := range driverConfig.PortMap { + host, ok := taskPorts[label] + if !ok { + return nil, nil, fmt.Errorf("Unknown port label %q", label) + } + + for _, p := range protocols { + forwarding = append(forwarding, fmt.Sprintf("hostfwd=%s::%d-:%d", p, host, guest)) + } + } + + if len(forwarding) != 0 { + args = append(args, + "-netdev", + fmt.Sprintf("user,id=user.0,%s", strings.Join(forwarding, ",")), + "-device", "virtio-net,netdev=user.0", + ) + } + } + + // If using KVM, add optimization args + if accelerator == "kvm" { + if runtime.GOOS == "windows" { + return nil, nil, errors.New("KVM accelerator is unsupported on the Windows platform") + } + args = append(args, + "-enable-kvm", + "-cpu", "host", + // Do we have cores information available to the Driver? + // "-smp", fmt.Sprintf("%d", cores), + ) + } + d.logger.Debug("starting QemuVM command ", "args", strings.Join(args, " ")) + + pluginLogFile := filepath.Join(cfg.TaskDir().Dir, fmt.Sprintf("%s-executor.out", cfg.Name)) + executorConfig := &dstructs.ExecutorConfig{ + LogFile: pluginLogFile, + LogLevel: "debug", + } + + // TODO: best way to pass port ranges in from client config + execImpl, pluginClient, err := utils.CreateExecutor(os.Stderr, hclog.Debug, 14000, 14512, executorConfig) + if err != nil { + return nil, nil, err + } + + execCmd := &executor.ExecCommand{ + Cmd: args[0], + Args: args[1:], + Env: cfg.EnvList(), + User: cfg.User, + TaskDir: cfg.TaskDir().Dir, + StdoutPath: cfg.StdoutPath, + StderrPath: cfg.StderrPath, + } + ps, err := execImpl.Launch(execCmd) + if err != nil { + pluginClient.Kill() + return nil, nil, err + } + d.logger.Debug("started new QemuVM", "ID", vmID) + + h := &qemuTaskHandle{ + exec: execImpl, + pid: ps.Pid, + monitorPath: monitorPath, + pluginClient: pluginClient, + taskConfig: cfg, + procState: drivers.TaskStateRunning, + startedAt: time.Now().Round(time.Millisecond), + logger: d.logger, + } + + qemuDriverState := QemuTaskState{ + ReattachConfig: utils.ReattachConfigFromGoPlugin(pluginClient.ReattachConfig()), + Pid: ps.Pid, + TaskConfig: cfg, + StartedAt: h.startedAt, + } + + if err := handle.SetDriverState(&qemuDriverState); err != nil { + d.logger.Error("failed to start task, error setting driver state", "error", err) + execImpl.Shutdown("", 0) + pluginClient.Kill() + return nil, nil, fmt.Errorf("failed to set driver state: %v", err) + } + + d.tasks.Set(cfg.ID, h) + go h.run() + + var driverNetwork *cstructs.DriverNetwork + if len(driverConfig.PortMap) == 1 { + driverNetwork = &cstructs.DriverNetwork{ + PortMap: driverConfig.PortMap, + } + } + return handle, driverNetwork, nil +} + +func (d *QemuDriver) WaitTask(ctx context.Context, taskID string) (<-chan *drivers.ExitResult, error) { + handle, ok := d.tasks.Get(taskID) + if !ok { + return nil, drivers.ErrTaskNotFound + } + + ch := make(chan *drivers.ExitResult) + go d.handleWait(ctx, handle, ch) + + return ch, nil +} + +func (d *QemuDriver) StopTask(taskID string, timeout time.Duration, signal string) error { + handle, ok := d.tasks.Get(taskID) + if !ok { + return drivers.ErrTaskNotFound + } + + // Attempt a graceful shutdown only if it was configured in the job + if handle.monitorPath != "" { + if err := sendQemuShutdown(d.logger, handle.monitorPath, handle.pid); err != nil { + d.logger.Debug("error sending graceful shutdown ", "pid", handle.pid, "error", err) + } + } + + // TODO(preetha) we are calling shutdown on the executor here + // after attempting a graceful qemu shutdown, qemu process may + // not be around when we call exec.shutdown + if err := handle.exec.Shutdown(signal, timeout); err != nil { + if handle.pluginClient.Exited() { + return nil + } + return fmt.Errorf("executor Shutdown failed: %v", err) + } + + return nil +} + +func (d *QemuDriver) DestroyTask(taskID string, force bool) error { + handle, ok := d.tasks.Get(taskID) + if !ok { + return drivers.ErrTaskNotFound + } + + if handle.IsRunning() && !force { + return fmt.Errorf("cannot destroy running task") + } + + if !handle.pluginClient.Exited() { + if handle.IsRunning() { + if err := handle.exec.Shutdown("", 0); err != nil { + handle.logger.Error("destroying executor failed", "err", err) + } + } + + handle.pluginClient.Kill() + } + + d.tasks.Delete(taskID) + return nil +} + +func (d *QemuDriver) InspectTask(taskID string) (*drivers.TaskStatus, error) { + handle, ok := d.tasks.Get(taskID) + if !ok { + return nil, drivers.ErrTaskNotFound + } + + handle.stateLock.RLock() + defer handle.stateLock.RUnlock() + + status := &drivers.TaskStatus{ + ID: handle.taskConfig.ID, + Name: handle.taskConfig.Name, + State: handle.procState, + StartedAt: handle.startedAt, + CompletedAt: handle.completedAt, + ExitResult: handle.exitResult, + DriverAttributes: map[string]string{ + "pid": strconv.Itoa(handle.pid), + }, + } + + return status, nil +} + +func (d *QemuDriver) TaskStats(taskID string) (*cstructs.TaskResourceUsage, error) { + handle, ok := d.tasks.Get(taskID) + if !ok { + return nil, drivers.ErrTaskNotFound + } + + return handle.exec.Stats() +} + +func (d *QemuDriver) TaskEvents(ctx context.Context) (<-chan *drivers.TaskEvent, error) { + return d.eventer.TaskEvents(ctx) +} + +func (d *QemuDriver) SignalTask(taskID string, signal string) error { + return fmt.Errorf("Qemu driver can't signal commands") +} + +func (d *QemuDriver) ExecTask(taskID string, cmdArgs []string, timeout time.Duration) (*drivers.ExecTaskResult, error) { + return nil, fmt.Errorf("Qemu driver can't execute commands") + +} + +// GetAbsolutePath returns the absolute path of the passed binary by resolving +// it in the path and following symlinks. +func GetAbsolutePath(bin string) (string, error) { + lp, err := exec.LookPath(bin) + if err != nil { + return "", fmt.Errorf("failed to resolve path to %q executable: %v", bin, err) + } + + return filepath.EvalSymlinks(lp) +} + +func (d *QemuDriver) handleWait(ctx context.Context, handle *qemuTaskHandle, ch chan *drivers.ExitResult) { + defer close(ch) + var result *drivers.ExitResult + ps, err := handle.exec.Wait() + if err != nil { + result = &drivers.ExitResult{ + Err: fmt.Errorf("executor: error waiting on process: %v", err), + } + } else { + result = &drivers.ExitResult{ + ExitCode: ps.ExitCode, + Signal: ps.Signal, + } + } + + select { + case <-ctx.Done(): + case <-d.ctx.Done(): + case ch <- result: + } +} + +// getMonitorPath is used to determine whether a qemu monitor socket can be +// safely created and accessed in the task directory by the version of qemu +// present on the host. If it is safe to use, the socket's full path is +// returned along with a nil error. Otherwise, an empty string is returned +// along with a descriptive error. +func (d *QemuDriver) getMonitorPath(dir string, fingerPrint *drivers.Fingerprint) (string, error) { + var longPathSupport bool + currentQemuVer := fingerPrint.Attributes[qemuDriverVersionAttr] + currentQemuSemver := semver.New(currentQemuVer) + if currentQemuSemver.LessThan(*qemuVersionLongSocketPathFix) { + longPathSupport = false + d.logger.Debug("long socket paths are not available in this version of QEMU", "version", currentQemuVer) + } else { + longPathSupport = true + d.logger.Debug("long socket paths available in this version of QEMU", "version", currentQemuVer) + } + fullSocketPath := fmt.Sprintf("%s/%s", dir, qemuMonitorSocketName) + if len(fullSocketPath) > qemuLegacyMaxMonitorPathLen && longPathSupport == false { + return "", fmt.Errorf("monitor path is too long for this version of qemu") + } + return fullSocketPath, nil +} + +// sendQemuShutdown attempts to issue an ACPI power-off command via the qemu +// monitor +func sendQemuShutdown(logger hclog.Logger, monitorPath string, userPid int) error { + if monitorPath == "" { + return errors.New("monitorPath not set") + } + monitorSocket, err := net.Dial("unix", monitorPath) + if err != nil { + logger.Warn("could not connect to qemu monitor", "pid", userPid, "monitorPath", monitorPath, "error", err) + return err + } + defer monitorSocket.Close() + logger.Debug("sending graceful shutdown command to qemu monitor socket", "monitor_path", monitorPath, "pid", userPid) + _, err = monitorSocket.Write([]byte(qemuGracefulShutdownMsg)) + if err != nil { + logger.Warn("failed to send shutdown message", "shutdown message", qemuGracefulShutdownMsg, "monitorPath", monitorPath, "userPid", userPid, "error", err) + } + return err +} diff --git a/drivers/qemu/driver_test.go b/drivers/qemu/driver_test.go new file mode 100644 index 000000000..814b79cd7 --- /dev/null +++ b/drivers/qemu/driver_test.go @@ -0,0 +1,370 @@ +package qemu + +import ( + "io" + "os" + "path/filepath" + "strings" + "testing" + + "context" + "fmt" + "time" + + "github.com/hashicorp/hcl2/hcl" + ctestutil "github.com/hashicorp/nomad/client/testutil" + "github.com/hashicorp/nomad/helper/testlog" + "github.com/hashicorp/nomad/helper/uuid" + "github.com/hashicorp/nomad/nomad/structs" + "github.com/hashicorp/nomad/plugins/drivers" + "github.com/hashicorp/nomad/plugins/shared" + "github.com/hashicorp/nomad/plugins/shared/hclspec" + "github.com/hashicorp/nomad/testutil" + "github.com/stretchr/testify/require" +) + +// TODO(preetha) - tests remaining +// using monitor socket for graceful shutdown + +// Verifies starting a qemu image and stopping it +func TestQemuDriver_Start_Wait_Stop(t *testing.T) { + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + require := require.New(t) + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + task := &drivers.TaskConfig{ + ID: uuid.Generate(), + Name: "linux", + Resources: &drivers.Resources{ + NomadResources: &structs.Resources{ + MemoryMB: 512, + CPU: 100, + Networks: []*structs.NetworkResource{ + { + ReservedPorts: []structs.Port{{Label: "main", Value: 22000}, {Label: "web", Value: 80}}, + }, + }, + }, + }, + } + + taskConfig := map[string]interface{}{ + "image_path": "linux-0.2.img", + "accelerator": "tcg", + "graceful_shutdown": false, + "port_map": []map[string]int{{ + "main": 22, + "web": 8080, + }}, + "args": []string{"-nodefconfig", "-nodefaults"}, + } + encodeDriverHelper(require, task, taskConfig) + cleanup := harness.MkAllocDir(task, true) + defer cleanup() + + taskDir := filepath.Join(task.AllocDir, task.Name) + + copyFile("./test-resources/linux-0.2.img", filepath.Join(taskDir, "linux-0.2.img"), t) + + handle, _, err := harness.StartTask(task) + require.NoError(err) + + require.NotNil(handle) + + // Ensure that sending a Signal returns an error + err = d.SignalTask(task.ID, "SIGINT") + require.NotNil(err) + + require.NoError(harness.DestroyTask(task.ID, true)) + +} + +// Verifies monitor socket path for old qemu +func TestQemuDriver_GetMonitorPathOldQemu(t *testing.T) { + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + require := require.New(t) + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + task := &drivers.TaskConfig{ + ID: uuid.Generate(), + Name: "linux", + Resources: &drivers.Resources{ + NomadResources: &structs.Resources{ + MemoryMB: 512, + CPU: 100, + Networks: []*structs.NetworkResource{ + { + ReservedPorts: []structs.Port{{Label: "main", Value: 22000}, {Label: "web", Value: 80}}, + }, + }, + }, + }, + } + + cleanup := harness.MkAllocDir(task, true) + defer cleanup() + + fingerPrint := &drivers.Fingerprint{ + Attributes: map[string]string{ + qemuDriverVersionAttr: "2.0.0", + }, + } + shortPath := strings.Repeat("x", 10) + qemuDriver := d.(*QemuDriver) + _, err := qemuDriver.getMonitorPath(shortPath, fingerPrint) + require.Nil(err) + + longPath := strings.Repeat("x", qemuLegacyMaxMonitorPathLen+100) + _, err = qemuDriver.getMonitorPath(longPath, fingerPrint) + require.NotNil(err) + + // Max length includes the '/' separator and socket name + maxLengthCount := qemuLegacyMaxMonitorPathLen - len(qemuMonitorSocketName) - 1 + maxLengthLegacyPath := strings.Repeat("x", maxLengthCount) + _, err = qemuDriver.getMonitorPath(maxLengthLegacyPath, fingerPrint) + require.Nil(err) +} + +// Verifies monitor socket path for new qemu version +func TestQemuDriver_GetMonitorPathNewQemu(t *testing.T) { + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + require := require.New(t) + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + task := &drivers.TaskConfig{ + ID: uuid.Generate(), + Name: "linux", + Resources: &drivers.Resources{ + NomadResources: &structs.Resources{ + MemoryMB: 512, + CPU: 100, + Networks: []*structs.NetworkResource{ + { + ReservedPorts: []structs.Port{{Label: "main", Value: 22000}, {Label: "web", Value: 80}}, + }, + }, + }, + }, + } + + cleanup := harness.MkAllocDir(task, true) + defer cleanup() + + fingerPrint := &drivers.Fingerprint{ + Attributes: map[string]string{ + qemuDriverVersionAttr: "2.99.99", + }, + } + shortPath := strings.Repeat("x", 10) + qemuDriver := d.(*QemuDriver) + _, err := qemuDriver.getMonitorPath(shortPath, fingerPrint) + require.Nil(err) + + // Should not return an error in this qemu version + longPath := strings.Repeat("x", qemuLegacyMaxMonitorPathLen+100) + _, err = qemuDriver.getMonitorPath(longPath, fingerPrint) + require.Nil(err) + + // Max length includes the '/' separator and socket name + maxLengthCount := qemuLegacyMaxMonitorPathLen - len(qemuMonitorSocketName) - 1 + maxLengthLegacyPath := strings.Repeat("x", maxLengthCount) + _, err = qemuDriver.getMonitorPath(maxLengthLegacyPath, fingerPrint) + require.Nil(err) +} + +//encodeDriverhelper sets up the task config spec and encodes qemu specific driver configuration +func encodeDriverHelper(require *require.Assertions, task *drivers.TaskConfig, taskConfig map[string]interface{}) { + evalCtx := &hcl.EvalContext{ + Functions: shared.GetStdlibFuncs(), + } + spec, diag := hclspec.Convert(taskConfigSpec) + require.False(diag.HasErrors(), diag.Error()) + taskConfigCtyVal, diag := shared.ParseHclInterface(taskConfig, spec, evalCtx) + require.False(diag.HasErrors(), diag.Error()) + err := task.EncodeDriverConfig(taskConfigCtyVal) + require.Nil(err) +} + +// copyFile moves an existing file to the destination +func copyFile(src, dst string, t *testing.T) { + in, err := os.Open(src) + if err != nil { + t.Fatalf("copying %v -> %v failed: %v", src, dst, err) + } + defer in.Close() + out, err := os.Create(dst) + if err != nil { + t.Fatalf("copying %v -> %v failed: %v", src, dst, err) + } + defer func() { + if err := out.Close(); err != nil { + t.Fatalf("copying %v -> %v failed: %v", src, dst, err) + } + }() + if _, err = io.Copy(out, in); err != nil { + t.Fatalf("copying %v -> %v failed: %v", src, dst, err) + } + if err := out.Sync(); err != nil { + t.Fatalf("copying %v -> %v failed: %v", src, dst, err) + } +} + +// Verifies starting a qemu image and stopping it +func TestQemuDriver_User(t *testing.T) { + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + require := require.New(t) + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + task := &drivers.TaskConfig{ + ID: uuid.Generate(), + Name: "linux", + User: "alice", + Resources: &drivers.Resources{ + NomadResources: &structs.Resources{ + MemoryMB: 512, + CPU: 100, + Networks: []*structs.NetworkResource{ + { + ReservedPorts: []structs.Port{{Label: "main", Value: 22000}, {Label: "web", Value: 80}}, + }, + }, + }, + }, + } + + taskConfig := map[string]interface{}{ + "image_path": "linux-0.2.img", + "accelerator": "tcg", + "graceful_shutdown": false, + "port_map": map[string]int{ + "main": 22, + "web": 8080, + }, + "args": []string{"-nodefconfig", "-nodefaults"}, + } + encodeDriverHelper(require, task, taskConfig) + cleanup := harness.MkAllocDir(task, true) + defer cleanup() + + taskDir := filepath.Join(task.AllocDir, task.Name) + + copyFile("./test-resources/linux-0.2.img", filepath.Join(taskDir, "linux-0.2.img"), t) + + _, _, err := harness.StartTask(task) + require.Error(err) + require.Contains(err.Error(), "unknown user alice", err.Error()) + +} + +// Verifies getting resource usage stats +// TODO(preetha) this test needs random sleeps to pass +func TestQemuDriver_Stats(t *testing.T) { + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + require := require.New(t) + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + task := &drivers.TaskConfig{ + ID: uuid.Generate(), + Name: "linux", + Resources: &drivers.Resources{ + NomadResources: &structs.Resources{ + MemoryMB: 512, + CPU: 100, + Networks: []*structs.NetworkResource{ + { + ReservedPorts: []structs.Port{{Label: "main", Value: 22000}, {Label: "web", Value: 80}}, + }, + }, + }, + }, + } + + taskConfig := map[string]interface{}{ + "image_path": "linux-0.2.img", + "accelerator": "tcg", + "graceful_shutdown": false, + "port_map": []map[string]int{{ + "main": 22, + "web": 8080, + }}, + "args": []string{"-nodefconfig", "-nodefaults"}, + } + encodeDriverHelper(require, task, taskConfig) + cleanup := harness.MkAllocDir(task, true) + defer cleanup() + + taskDir := filepath.Join(task.AllocDir, task.Name) + + copyFile("./test-resources/linux-0.2.img", filepath.Join(taskDir, "linux-0.2.img"), t) + + handle, _, err := harness.StartTask(task) + require.NoError(err) + + require.NotNil(handle) + + // Wait for task to start + _, err = harness.WaitTask(context.Background(), handle.Config.ID) + require.NoError(err) + + // Wait until task started + require.NoError(harness.WaitUntilStarted(task.ID, 1*time.Second)) + time.Sleep(30 * time.Second) + stats, err := harness.TaskStats(task.ID) + require.NoError(err) + + // Ask for stats again + stats, err = harness.TaskStats(task.ID) + require.NoError(err) + + fmt.Printf("CPU:%+v Memory:%+v\n", stats.ResourceUsage.CpuStats, stats.ResourceUsage.MemoryStats) + require.NotZero(stats.ResourceUsage.MemoryStats.RSS) + require.NoError(harness.DestroyTask(task.ID, true)) + +} + +func TestQemuDriver_Fingerprint(t *testing.T) { + require := require.New(t) + + ctestutil.QemuCompatible(t) + if !testutil.IsTravis() { + t.Parallel() + } + + d := NewQemuDriver(testlog.HCLogger(t)) + harness := drivers.NewDriverHarness(t, d) + + fingerCh, err := harness.Fingerprint(context.Background()) + require.NoError(err) + select { + case finger := <-fingerCh: + require.Equal(drivers.HealthStateHealthy, finger.Health) + require.Equal("1", finger.Attributes["driver.qemu"]) + case <-time.After(time.Duration(testutil.TestMultiplier()*5) * time.Second): + require.Fail("timeout receiving fingerprint") + } +} diff --git a/drivers/qemu/handle.go b/drivers/qemu/handle.go new file mode 100644 index 000000000..aa061dbef --- /dev/null +++ b/drivers/qemu/handle.go @@ -0,0 +1,58 @@ +package qemu + +import ( + "sync" + "time" + + "github.com/hashicorp/go-hclog" + "github.com/hashicorp/go-plugin" + "github.com/hashicorp/nomad/client/driver/executor" + "github.com/hashicorp/nomad/plugins/drivers" +) + +type qemuTaskHandle struct { + exec executor.Executor + pid int + pluginClient *plugin.Client + logger hclog.Logger + monitorPath string + // stateLock syncs access to all fields below + stateLock sync.RWMutex + + taskConfig *drivers.TaskConfig + procState drivers.TaskState + startedAt time.Time + completedAt time.Time + exitResult *drivers.ExitResult +} + +func (h *qemuTaskHandle) IsRunning() bool { + return h.procState == drivers.TaskStateRunning +} + +func (h *qemuTaskHandle) run() { + + // since run is called immediately after the handle is created this + // ensures the exitResult is initialized so we avoid a nil pointer + // thus it does not need to be included in the lock + if h.exitResult == nil { + h.exitResult = &drivers.ExitResult{} + } + + ps, err := h.exec.Wait() + h.stateLock.Lock() + defer h.stateLock.Unlock() + + if err != nil { + h.exitResult.Err = err + h.procState = drivers.TaskStateUnknown + h.completedAt = time.Now() + return + } + h.procState = drivers.TaskStateExited + h.exitResult.ExitCode = ps.ExitCode + h.exitResult.Signal = ps.Signal + h.completedAt = ps.Time + + // TODO: detect if the taskConfig OOMed +} diff --git a/drivers/qemu/state.go b/drivers/qemu/state.go new file mode 100644 index 000000000..fd33f8ed7 --- /dev/null +++ b/drivers/qemu/state.go @@ -0,0 +1,33 @@ +package qemu + +import ( + "sync" +) + +type taskStore struct { + store map[string]*qemuTaskHandle + lock sync.RWMutex +} + +func newTaskStore() *taskStore { + return &taskStore{store: map[string]*qemuTaskHandle{}} +} + +func (ts *taskStore) Set(id string, handle *qemuTaskHandle) { + ts.lock.Lock() + defer ts.lock.Unlock() + ts.store[id] = handle +} + +func (ts *taskStore) Get(id string) (*qemuTaskHandle, bool) { + ts.lock.RLock() + defer ts.lock.RUnlock() + t, ok := ts.store[id] + return t, ok +} + +func (ts *taskStore) Delete(id string) { + ts.lock.Lock() + defer ts.lock.Unlock() + delete(ts.store, id) +} diff --git a/drivers/qemu/test-resources/linux-0.2.img b/drivers/qemu/test-resources/linux-0.2.img new file mode 100644 index 000000000..c64268c42 --- /dev/null +++ b/drivers/qemu/test-resources/linux-0.2.img @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:61e6ead110410bd707072e511b82d02ee34678ed72abe4867fb9ad3ae7562c5a +size 20971520