package taskrunner import ( "fmt" "time" log "github.com/hashicorp/go-hclog" "github.com/hashicorp/nomad/client/allocrunnerv2/interfaces" "github.com/hashicorp/nomad/client/allocrunnerv2/taskrunner/state" cconfig "github.com/hashicorp/nomad/client/config" "github.com/hashicorp/nomad/client/driver" "github.com/hashicorp/nomad/nomad/structs" ) // initHooks intializes the tasks hooks. func (tr *TaskRunner) initHooks() { hookLogger := tr.logger.Named("task_hook") tr.runnerHooks = make([]interfaces.TaskHook, 0, 3) // Create the task directory hook. This is run first to ensure the // directoy path exists for other hooks. tr.runnerHooks = append(tr.runnerHooks, newTaskDirHook(tr, hookLogger)) } // prerun is used to run the runners prerun hooks. func (tr *TaskRunner) prerun() error { // Determine if the allocation is terminaland we should avoid running // pre-run hooks. alloc := tr.allocRunner.Alloc() if alloc.TerminalStatus() { tr.logger.Trace("skipping pre-run hooks since allocation is terminal") return nil } if tr.logger.IsTrace() { start := time.Now() tr.logger.Trace("running pre-run hooks", "start", start) defer func() { end := time.Now() tr.logger.Trace("finished pre-run hooks", "end", end, "duration", end.Sub(start)) }() } for _, hook := range tr.runnerHooks { pre, ok := hook.(interfaces.TaskPrerunHook) if !ok { continue } name := pre.Name() var start time.Time if tr.logger.IsTrace() { start = time.Now() tr.logger.Trace("running pre-run hook", "name", name, "start", start) } // Build the request req := interfaces.TaskPrerunRequest{ Task: tr.Task(), TaskDir: tr.taskDir.Dir, } tr.state.RLock() hookState := tr.state.Hooks[name] if hookState != nil { req.HookData = hookState.Data } req.VaultToken = tr.state.VaultToken tr.state.RUnlock() if hookState.SuccessfulOnce { tr.logger.Trace("skipping hook since it was successfully run once", "name", name) continue } // Run the pre-run hook var resp interfaces.TaskPrerunResponse err := pre.Prerun(&req, &resp) // Store the hook state { tr.state.Lock() hookState, ok := tr.state.Hooks[name] if !ok { hookState = &state.HookState{} tr.state.Hooks[name] = hookState } hookState.LastError = err if resp.HookData != nil { hookState.Data = resp.HookData } if resp.DoOnce && err != nil { hookState.SuccessfulOnce = true } // XXX Detect if state has changed so that we can signal to the // alloc runner precisly if err := tr.allocRunner.StateUpdated(tr.state.Copy()); err != nil { tr.logger.Error("failed to save state", "error", err) } tr.state.Unlock() } if err != nil { return structs.WrapRecoverable(fmt.Sprintf("pre-run hook %q failed: %v", name, err), err) } // Store the environment variables returned by the hook if len(resp.Env) != 0 { tr.envBuilder.SetGenericEnv(resp.Env) } if tr.logger.IsTrace() { end := time.Now() tr.logger.Trace("finished pre-run hooks", "name", name, "end", end, "duration", end.Sub(start)) } } return nil } // postrun is used to run the runners postrun hooks. func (tr *TaskRunner) postrun() error { if tr.logger.IsTrace() { start := time.Now() tr.logger.Trace("running post-run hooks", "start", start) defer func() { end := time.Now() tr.logger.Trace("finished post-run hooks", "end", end, "duration", end.Sub(start)) }() } for _, hook := range tr.runnerHooks { post, ok := hook.(interfaces.TaskPostrunHook) if !ok { continue } name := post.Name() var start time.Time if tr.logger.IsTrace() { start = time.Now() tr.logger.Trace("running post-run hook", "name", name, "start", start) } // XXX We shouldn't exit on the first one if err := post.Postrun(); err != nil { return fmt.Errorf("post-run hook %q failed: %v", name, err) } if tr.logger.IsTrace() { end := time.Now() tr.logger.Trace("finished post-run hooks", "name", name, "end", end, "duration", end.Sub(start)) } } return nil } // destroy is used to run the runners destroy hooks. // XXX Naming change func (tr *TaskRunner) destroy() error { if tr.logger.IsTrace() { start := time.Now() tr.logger.Trace("running destroy hooks", "start", start) defer func() { end := time.Now() tr.logger.Trace("finished destroy hooks", "end", end, "duration", end.Sub(start)) }() } for _, hook := range tr.runnerHooks { post, ok := hook.(interfaces.TaskDestroyHook) if !ok { continue } name := post.Name() var start time.Time if tr.logger.IsTrace() { start = time.Now() tr.logger.Trace("running destroy hook", "name", name, "start", start) } // XXX We shouldn't exit on the first one if err := post.Destroy(); err != nil { return fmt.Errorf("destroy hook %q failed: %v", name, err) } if tr.logger.IsTrace() { end := time.Now() tr.logger.Trace("finished destroy hooks", "name", name, "end", end, "duration", end.Sub(start)) } } return nil } type taskDirHook struct { runner *TaskRunner logger log.Logger } func newTaskDirHook(runner *TaskRunner, logger log.Logger) *taskDirHook { td := &taskDirHook{ runner: runner, } td.logger = logger.Named(td.Name()) return td } func (h *taskDirHook) Name() string { return "task_dir" } func (h *taskDirHook) Prerun(req *interfaces.TaskPrerunRequest, resp *interfaces.TaskPrerunResponse) error { cc := h.runner.allocRunner.Config().ClientConfig chroot := cconfig.DefaultChrootEnv if len(cc.ChrootEnv) > 0 { chroot = cc.ChrootEnv } // Emit the event that we are going to be building the task directory h.runner.setState("", structs.NewTaskEvent(structs.TaskSetup).SetMessage(structs.TaskBuildingTaskDir)) // Build the task directory structure fsi := h.runner.driver.FSIsolation() err := h.runner.taskDir.Build(false, chroot, fsi) if err != nil { return err } // Update the environment variables based on the built task directory driver.SetEnvvars(h.runner.envBuilder, fsi, h.runner.taskDir, h.runner.allocRunner.Config().ClientConfig) return nil } /* TR Hooks: > @schmichael Task Validate: Require: Client config, task definiton Return: error Implement: Prestart > DONE Task Dir Build: Requires: Folder structure, driver isolation, client config Return env, error Implement: Prestart > @alex Vault: Task, RPC to talk to server to derive token, Node SecretID Return vault token (Call a setter), error, env Implement: Prestart > @alex Consul Template: Require: Task, alloc directory, way to signal/restart task, updates when vault token changes Return env, error Implement: Prestart and Update (for new Vault token) and Destroy > @schmichael Consul Service Reg: Require: Task, interpolation/ENV Return: error Implement: Postrun, Update, Prestop > @alex Dispatch Payload: Require: Alloc Return error Implement: Prerun > @schmichael Artifacts: Require: Folder structure, task, interpolation/ENV Return: error Implement: Prerun and Destroy */