100 lines
2.4 KiB
Go
100 lines
2.4 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package client
|
|
|
|
import (
|
|
"net/http"
|
|
"time"
|
|
|
|
"github.com/armon/go-metrics"
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
"golang.org/x/exp/maps"
|
|
)
|
|
|
|
type NodeMeta struct {
|
|
c *Client
|
|
}
|
|
|
|
func newNodeMetaEndpoint(c *Client) *NodeMeta {
|
|
n := &NodeMeta{c: c}
|
|
return n
|
|
}
|
|
|
|
func (n *NodeMeta) Apply(args *structs.NodeMetaApplyRequest, reply *structs.NodeMetaResponse) error {
|
|
defer metrics.MeasureSince([]string{"client", "node_meta", "apply"}, time.Now())
|
|
|
|
// Check node write permissions
|
|
if aclObj, err := n.c.ResolveToken(args.AuthToken); err != nil {
|
|
return err
|
|
} else if aclObj != nil && !aclObj.AllowNodeWrite() {
|
|
return structs.ErrPermissionDenied
|
|
}
|
|
|
|
if err := args.Validate(); err != nil {
|
|
return structs.NewErrRPCCoded(http.StatusBadRequest, err.Error())
|
|
}
|
|
|
|
var stateErr error
|
|
var dyn map[string]*string
|
|
|
|
newNode := n.c.UpdateNode(func(node *structs.Node) {
|
|
// First update the Client's state store. This must be done
|
|
// atomically with updating the metadata inmemory to avoid
|
|
// bad interleaving between concurrent updates.
|
|
dyn = maps.Clone(n.c.metaDynamic)
|
|
maps.Copy(dyn, args.Meta)
|
|
|
|
if stateErr = n.c.stateDB.PutNodeMeta(dyn); stateErr != nil {
|
|
return
|
|
}
|
|
|
|
// Apply updated dynamic metadata to client and node now that the part of
|
|
// the operation that can fail succeeded (persistence). Must clone as dyn
|
|
// is read outside of UpdateNode.
|
|
n.c.metaDynamic = maps.Clone(dyn)
|
|
|
|
for k, v := range args.Meta {
|
|
if v == nil {
|
|
delete(node.Meta, k)
|
|
continue
|
|
}
|
|
|
|
node.Meta[k] = *v
|
|
}
|
|
})
|
|
|
|
if stateErr != nil {
|
|
return stateErr
|
|
}
|
|
|
|
// Trigger an async node update
|
|
n.c.updateNode()
|
|
|
|
reply.Meta = newNode.Meta
|
|
reply.Dynamic = dyn
|
|
reply.Static = n.c.metaStatic
|
|
return nil
|
|
}
|
|
|
|
func (n *NodeMeta) Read(args *structs.NodeSpecificRequest, reply *structs.NodeMetaResponse) error {
|
|
defer metrics.MeasureSince([]string{"client", "node_meta", "read"}, time.Now())
|
|
|
|
// Check node read permissions
|
|
if aclObj, err := n.c.ResolveToken(args.AuthToken); err != nil {
|
|
return err
|
|
} else if aclObj != nil && !aclObj.AllowNodeRead() {
|
|
return structs.ErrPermissionDenied
|
|
}
|
|
|
|
// Must acquire configLock to ensure reads aren't interleaved with
|
|
// writes
|
|
n.c.configLock.Lock()
|
|
defer n.c.configLock.Unlock()
|
|
|
|
reply.Meta = n.c.config.Node.Meta
|
|
reply.Dynamic = maps.Clone(n.c.metaDynamic)
|
|
reply.Static = n.c.metaStatic
|
|
return nil
|
|
}
|