194 lines
5 KiB
Go
194 lines
5 KiB
Go
package driver
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/hashicorp/nomad/client/config"
|
|
"github.com/hashicorp/nomad/client/driver/executor"
|
|
cstructs "github.com/hashicorp/nomad/client/driver/structs"
|
|
"github.com/hashicorp/nomad/client/fingerprint"
|
|
"github.com/hashicorp/nomad/client/getter"
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
"github.com/mitchellh/mapstructure"
|
|
)
|
|
|
|
const (
|
|
// The option that enables this driver in the Config.Options map.
|
|
rawExecConfigOption = "driver.raw_exec.enable"
|
|
)
|
|
|
|
// The RawExecDriver is a privileged version of the exec driver. It provides no
|
|
// resource isolation and just fork/execs. The Exec driver should be preferred
|
|
// and this should only be used when explicitly needed.
|
|
type RawExecDriver struct {
|
|
DriverContext
|
|
fingerprint.StaticFingerprinter
|
|
}
|
|
|
|
// rawExecHandle is returned from Start/Open as a handle to the PID
|
|
type rawExecHandle struct {
|
|
cmd executor.Executor
|
|
killTimeout time.Duration
|
|
logger *log.Logger
|
|
waitCh chan *cstructs.WaitResult
|
|
doneCh chan struct{}
|
|
}
|
|
|
|
// NewRawExecDriver is used to create a new raw exec driver
|
|
func NewRawExecDriver(ctx *DriverContext) Driver {
|
|
return &RawExecDriver{DriverContext: *ctx}
|
|
}
|
|
|
|
func (d *RawExecDriver) Fingerprint(cfg *config.Config, node *structs.Node) (bool, error) {
|
|
// Check that the user has explicitly enabled this executor.
|
|
enabled := cfg.ReadBoolDefault(rawExecConfigOption, false)
|
|
|
|
if enabled {
|
|
d.logger.Printf("[WARN] driver.raw_exec: raw exec is enabled. Only enable if needed")
|
|
node.Attributes["driver.raw_exec"] = "1"
|
|
return true, nil
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
func (d *RawExecDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandle, error) {
|
|
var driverConfig ExecDriverConfig
|
|
if err := mapstructure.WeakDecode(task.Config, &driverConfig); err != nil {
|
|
return nil, err
|
|
}
|
|
// Get the tasks local directory.
|
|
taskName := d.DriverContext.taskName
|
|
taskDir, ok := ctx.AllocDir.TaskDirs[taskName]
|
|
if !ok {
|
|
return nil, fmt.Errorf("Could not find task directory for task: %v", d.DriverContext.taskName)
|
|
}
|
|
|
|
// Get the command to be ran
|
|
command := driverConfig.Command
|
|
if command == "" {
|
|
return nil, fmt.Errorf("missing command for Raw Exec driver")
|
|
}
|
|
|
|
// Check if an artificat is specified and attempt to download it
|
|
source, ok := task.Config["artifact_source"]
|
|
if ok && source != "" {
|
|
// Proceed to download an artifact to be executed.
|
|
_, err := getter.GetArtifact(
|
|
taskDir,
|
|
driverConfig.ArtifactSource,
|
|
driverConfig.Checksum,
|
|
d.logger,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
// Setup the command
|
|
execCtx := executor.NewExecutorContext(d.taskEnv)
|
|
cmd := executor.NewBasicExecutor(execCtx)
|
|
executor.SetCommand(cmd, command, driverConfig.Args)
|
|
if err := cmd.Limit(task.Resources); err != nil {
|
|
return nil, fmt.Errorf("failed to constrain resources: %s", err)
|
|
}
|
|
|
|
// Populate environment variables
|
|
cmd.Command().Env = d.taskEnv.EnvList()
|
|
|
|
if err := cmd.ConfigureTaskDir(d.taskName, ctx.AllocDir); err != nil {
|
|
return nil, fmt.Errorf("failed to configure task directory: %v", err)
|
|
}
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
return nil, fmt.Errorf("failed to start command: %v", err)
|
|
}
|
|
|
|
// Return a driver handle
|
|
h := &execHandle{
|
|
cmd: cmd,
|
|
killTimeout: d.DriverContext.KillTimeout(task),
|
|
logger: d.logger,
|
|
doneCh: make(chan struct{}),
|
|
waitCh: make(chan *cstructs.WaitResult, 1),
|
|
}
|
|
go h.run()
|
|
return h, nil
|
|
}
|
|
|
|
type rawExecId struct {
|
|
ExecutorId string
|
|
KillTimeout time.Duration
|
|
}
|
|
|
|
func (d *RawExecDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, error) {
|
|
id := &rawExecId{}
|
|
if err := json.Unmarshal([]byte(handleID), id); err != nil {
|
|
return nil, fmt.Errorf("Failed to parse handle '%s': %v", handleID, err)
|
|
}
|
|
|
|
// Find the process
|
|
execCtx := executor.NewExecutorContext(d.taskEnv)
|
|
cmd := executor.NewBasicExecutor(execCtx)
|
|
if err := cmd.Open(id.ExecutorId); err != nil {
|
|
return nil, fmt.Errorf("failed to open ID %v: %v", id.ExecutorId, err)
|
|
}
|
|
|
|
// Return a driver handle
|
|
h := &execHandle{
|
|
cmd: cmd,
|
|
logger: d.logger,
|
|
killTimeout: id.KillTimeout,
|
|
doneCh: make(chan struct{}),
|
|
waitCh: make(chan *cstructs.WaitResult, 1),
|
|
}
|
|
go h.run()
|
|
return h, nil
|
|
}
|
|
|
|
func (h *rawExecHandle) ID() string {
|
|
executorId, _ := h.cmd.ID()
|
|
id := rawExecId{
|
|
ExecutorId: executorId,
|
|
KillTimeout: h.killTimeout,
|
|
}
|
|
|
|
data, err := json.Marshal(id)
|
|
if err != nil {
|
|
h.logger.Printf("[ERR] driver.raw_exec: failed to marshal ID to JSON: %s", err)
|
|
}
|
|
return string(data)
|
|
}
|
|
|
|
func (h *rawExecHandle) WaitCh() chan *cstructs.WaitResult {
|
|
return h.waitCh
|
|
}
|
|
|
|
func (h *rawExecHandle) Update(task *structs.Task) error {
|
|
// Store the updated kill timeout.
|
|
h.killTimeout = task.KillTimeout
|
|
|
|
// Update is not possible
|
|
return nil
|
|
}
|
|
|
|
func (h *rawExecHandle) Kill() error {
|
|
h.cmd.Shutdown()
|
|
select {
|
|
case <-h.doneCh:
|
|
return nil
|
|
case <-time.After(h.killTimeout):
|
|
return h.cmd.ForceStop()
|
|
}
|
|
}
|
|
|
|
func (h *rawExecHandle) run() {
|
|
res := h.cmd.Wait()
|
|
close(h.doneCh)
|
|
h.waitCh <- res
|
|
close(h.waitCh)
|
|
}
|