Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 8D2D22004A0 for ; Wed, 16 Aug 2017 21:14:07 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 89CE51696FD; Wed, 16 Aug 2017 19:14:07 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id D0DA41696F9 for ; Wed, 16 Aug 2017 21:14:06 +0200 (CEST) Received: (qmail 68070 invoked by uid 500); 16 Aug 2017 19:14:04 -0000 Mailing-List: contact issues-help@mesos.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@mesos.apache.org Delivered-To: mailing list issues@mesos.apache.org Received: (qmail 68059 invoked by uid 99); 16 Aug 2017 19:14:04 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 16 Aug 2017 19:14:04 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id 643751A194C for ; Wed, 16 Aug 2017 19:14:04 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -100.002 X-Spam-Level: X-Spam-Status: No, score=-100.002 tagged_above=-999 required=6.31 tests=[RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=disabled Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id E_IqmRJBSPaZ for ; Wed, 16 Aug 2017 19:14:03 +0000 (UTC) Received: from mailrelay1-us-west.apache.org (mailrelay1-us-west.apache.org [209.188.14.139]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTP id 9807F60E9E for ; Wed, 16 Aug 2017 19:14:01 +0000 (UTC) Received: from jira-lw-us.apache.org (unknown [207.244.88.139]) by mailrelay1-us-west.apache.org (ASF Mail Server at mailrelay1-us-west.apache.org) with ESMTP id 87155E0D6A for ; Wed, 16 Aug 2017 19:14:00 +0000 (UTC) Received: from jira-lw-us.apache.org (localhost [127.0.0.1]) by jira-lw-us.apache.org (ASF Mail Server at jira-lw-us.apache.org) with ESMTP id 357A725381 for ; Wed, 16 Aug 2017 19:14:00 +0000 (UTC) Date: Wed, 16 Aug 2017 19:14:00 +0000 (UTC) From: "Benjamin Mahler (JIRA)" To: issues@mesos.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (MESOS-7513) Expose the container sandbox path to users via the API. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 archived-at: Wed, 16 Aug 2017 19:14:07 -0000 [ https://issues.apache.org/jira/browse/MESOS-7513?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Benjamin Mahler updated MESOS-7513: ----------------------------------- Description: Currently, only the agent exposes the executor sandbox via a {{directory}} field in the executor JSON for the v0 API. The master's v0 API and all of the v1 API do not expose the executor sandbox at all. As a result, users reverse engineer the logic for generating the path and use it in their scripts. To add to the difficulty, the path currently includes the agent's work directory which is only obtainable from the agent endpoints (i.e. {{//frameworks//executors/}}) rather than exposing a virtual path (i.e. {{/frameworks//executors/}}), like we did for {{/slave/log}} and {{/master/log}}. We should expose the executor sandbox directory to users consistently in both the master and agent v0/v1 APIs, as well as simplify the path format so that users don't know about the agent's work directory. This also needs to work for nested containers. was: Currently, there is no public API for getting the path to the sandbox of a running container. This leads to folks reverse engineering the Mesos logic for generating the path and then using it in their scripts. This is already done by the Mesos Web UI and the DC/OS CLI. This is prone to errors if the Mesos path logic changes in the upcoming versions. We should introduce a new calls on the v1 Agent API; {{GET_CONTAINER_SANDBOX_PATH}}/{{GET_EXECUTOR_SANDBOX_PATH}} to get the path to a running container (can be nested) and another call to get the path to the executor sandbox. Summary: Expose the container sandbox path to users via the API. (was: Consider introducing an API call to get the sandbox of a running container.) > Expose the container sandbox path to users via the API. > ------------------------------------------------------- > > Key: MESOS-7513 > URL: https://issues.apache.org/jira/browse/MESOS-7513 > Project: Mesos > Issue Type: Task > Reporter: Anand Mazumdar > Labels: mesosphere > > Currently, only the agent exposes the executor sandbox via a {{directory}} field in the executor JSON for the v0 API. The master's v0 API and all of the v1 API do not expose the executor sandbox at all. > As a result, users reverse engineer the logic for generating the path and use it in their scripts. To add to the difficulty, the path currently includes the agent's work directory which is only obtainable from the agent endpoints (i.e. {{//frameworks//executors/}}) rather than exposing a virtual path (i.e. {{/frameworks//executors/}}), like we did for {{/slave/log}} and {{/master/log}}. > We should expose the executor sandbox directory to users consistently in both the master and agent v0/v1 APIs, as well as simplify the path format so that users don't know about the agent's work directory. > This also needs to work for nested containers. -- This message was sent by Atlassian JIRA (v6.4.14#64029)