4903e5b114
* consul: advertise cni and multi host interface addresses * structs: add service/check address_mode validation * ar/groupservices: fetch networkstatus at hook runtime * ar/groupservice: nil check network status getter before calling * consul: comment network status can be nil
103 lines
2.8 KiB
Go
103 lines
2.8 KiB
Go
package consul
|
|
|
|
import (
|
|
"github.com/hashicorp/nomad/client/allocrunner/taskrunner/interfaces"
|
|
"github.com/hashicorp/nomad/client/taskenv"
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
"github.com/hashicorp/nomad/plugins/drivers"
|
|
)
|
|
|
|
// WorkloadServices describes services defined in either a Task or TaskGroup
|
|
// that need to be syncronized with Consul
|
|
type WorkloadServices struct {
|
|
AllocID string
|
|
|
|
// Name of the task and task group the services are defined for. For
|
|
// group based services, Task will be empty
|
|
Task string
|
|
Group string
|
|
|
|
// Canary indicates whether or not the allocation is a canary
|
|
Canary bool
|
|
|
|
// Restarter allows restarting the task or task group depending on the
|
|
// check_restart stanzas.
|
|
Restarter WorkloadRestarter
|
|
|
|
// Services and checks to register for the task.
|
|
Services []*structs.Service
|
|
|
|
// Networks from the task's resources stanza.
|
|
// TODO: remove and use Ports
|
|
Networks structs.Networks
|
|
|
|
// NetworkStatus from alloc if network namespace is created
|
|
// Can be nil
|
|
NetworkStatus *structs.AllocNetworkStatus
|
|
|
|
// AllocatedPorts is the list of port mappings
|
|
Ports structs.AllocatedPorts
|
|
|
|
// DriverExec is the script executor for the task's driver.
|
|
// For group services this is nil and script execution is managed by
|
|
// a tasklet in the taskrunner script_check_hook
|
|
DriverExec interfaces.ScriptExecutor
|
|
|
|
// DriverNetwork is the network specified by the driver and may be nil.
|
|
DriverNetwork *drivers.DriverNetwork
|
|
}
|
|
|
|
func BuildAllocServices(node *structs.Node, alloc *structs.Allocation, restarter WorkloadRestarter) *WorkloadServices {
|
|
|
|
//TODO(schmichael) only support one network for now
|
|
net := alloc.AllocatedResources.Shared.Networks[0]
|
|
|
|
tg := alloc.Job.LookupTaskGroup(alloc.TaskGroup)
|
|
|
|
ws := &WorkloadServices{
|
|
AllocID: alloc.ID,
|
|
Group: alloc.TaskGroup,
|
|
Services: taskenv.InterpolateServices(taskenv.NewBuilder(mock.Node(), alloc, nil, alloc.Job.Region).Build(), tg.Services),
|
|
Networks: alloc.AllocatedResources.Shared.Networks,
|
|
|
|
//TODO(schmichael) there's probably a better way than hacking driver network
|
|
DriverNetwork: &drivers.DriverNetwork{
|
|
AutoAdvertise: true,
|
|
IP: net.IP,
|
|
// Copy PortLabels from group network
|
|
PortMap: net.PortLabels(),
|
|
},
|
|
|
|
Restarter: restarter,
|
|
DriverExec: nil,
|
|
}
|
|
|
|
if alloc.DeploymentStatus != nil {
|
|
ws.Canary = alloc.DeploymentStatus.Canary
|
|
}
|
|
|
|
return ws
|
|
}
|
|
|
|
// Copy method for easing tests
|
|
func (ws *WorkloadServices) Copy() *WorkloadServices {
|
|
newTS := new(WorkloadServices)
|
|
*newTS = *ws
|
|
|
|
// Deep copy Services
|
|
newTS.Services = make([]*structs.Service, len(ws.Services))
|
|
for i := range ws.Services {
|
|
newTS.Services[i] = ws.Services[i].Copy()
|
|
}
|
|
return newTS
|
|
}
|
|
|
|
func (ws *WorkloadServices) Name() string {
|
|
if ws.Task != "" {
|
|
return ws.Task
|
|
}
|
|
|
|
return "group-" + ws.Group
|
|
}
|