2015-08-20 22:25:09 +00:00
|
|
|
package client
|
|
|
|
|
2015-08-20 23:12:28 +00:00
|
|
|
import (
|
|
|
|
"fmt"
|
2015-09-12 18:47:44 +00:00
|
|
|
"io/ioutil"
|
2019-11-21 01:34:11 +00:00
|
|
|
"net"
|
2015-09-12 18:47:44 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2019-05-02 21:13:56 +00:00
|
|
|
"runtime"
|
2018-11-15 15:13:14 +00:00
|
|
|
"sort"
|
2015-08-20 23:12:28 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2019-08-27 21:19:44 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
|
|
|
trstate "github.com/hashicorp/nomad/client/allocrunner/taskrunner/state"
|
2015-08-25 23:21:29 +00:00
|
|
|
"github.com/hashicorp/nomad/client/config"
|
2018-06-11 20:33:18 +00:00
|
|
|
consulApi "github.com/hashicorp/nomad/client/consul"
|
2018-12-01 16:10:39 +00:00
|
|
|
"github.com/hashicorp/nomad/client/fingerprint"
|
2019-08-27 21:19:44 +00:00
|
|
|
"github.com/hashicorp/nomad/client/state"
|
2016-06-08 06:02:37 +00:00
|
|
|
"github.com/hashicorp/nomad/command/agent/consul"
|
2019-01-23 14:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/pluginutils/catalog"
|
2019-11-21 01:29:27 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/pluginutils/singleton"
|
2018-06-13 22:33:25 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/testlog"
|
2017-09-29 16:58:48 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-08-20 23:12:28 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad"
|
2015-08-29 21:22:24 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
2015-08-21 00:49:04 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2017-04-06 03:50:35 +00:00
|
|
|
nconfig "github.com/hashicorp/nomad/nomad/structs/config"
|
2018-11-15 15:13:14 +00:00
|
|
|
"github.com/hashicorp/nomad/plugins/device"
|
|
|
|
psstructs "github.com/hashicorp/nomad/plugins/shared/structs"
|
2015-08-20 23:12:28 +00:00
|
|
|
"github.com/hashicorp/nomad/testutil"
|
2017-09-01 19:41:07 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2015-09-23 00:10:03 +00:00
|
|
|
|
2019-01-09 16:16:33 +00:00
|
|
|
cstate "github.com/hashicorp/nomad/client/state"
|
|
|
|
"github.com/stretchr/testify/require"
|
2015-08-20 23:12:28 +00:00
|
|
|
)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
func testACLServer(t *testing.T, cb func(*nomad.Config)) (*nomad.Server, string, *structs.ACLToken, func()) {
|
|
|
|
server, token, cleanup := nomad.TestACLServer(t, cb)
|
|
|
|
return server, server.GetConfig().RPCAddr.String(), token, cleanup
|
2017-08-22 00:31:32 +00:00
|
|
|
}
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
func testServer(t *testing.T, cb func(*nomad.Config)) (*nomad.Server, string, func()) {
|
|
|
|
server, cleanup := nomad.TestServer(t, cb)
|
|
|
|
return server, server.GetConfig().RPCAddr.String(), cleanup
|
2015-08-20 22:25:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_StartStop(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2018-10-16 03:07:16 +00:00
|
|
|
client, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
2015-08-20 22:25:09 +00:00
|
|
|
if err := client.Shutdown(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2015-08-20 23:12:28 +00:00
|
|
|
|
2017-09-26 22:26:33 +00:00
|
|
|
// Certain labels for metrics are dependant on client initial setup. This tests
|
2017-09-01 19:41:07 +00:00
|
|
|
// that the client has properly initialized before we assign values to labels
|
|
|
|
func TestClient_BaseLabels(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
client, cleanup := TestClient(t, nil)
|
2017-09-01 19:41:07 +00:00
|
|
|
if err := client.Shutdown(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-09-01 19:41:07 +00:00
|
|
|
|
2017-09-05 14:27:28 +00:00
|
|
|
// directly invoke this function, as otherwise this will fail on a CI build
|
|
|
|
// due to a race condition
|
|
|
|
client.emitStats()
|
|
|
|
|
2017-09-04 02:56:47 +00:00
|
|
|
baseLabels := client.baseLabels
|
|
|
|
assert.NotEqual(0, len(baseLabels))
|
|
|
|
|
2017-09-01 19:41:07 +00:00
|
|
|
nodeID := client.Node().ID
|
2017-09-04 02:56:47 +00:00
|
|
|
for _, e := range baseLabels {
|
2017-09-01 19:41:07 +00:00
|
|
|
if e.Name == "node_id" {
|
|
|
|
assert.Equal(nodeID, e.Value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-20 23:12:28 +00:00
|
|
|
func TestClient_RPC(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2015-08-20 23:12:28 +00:00
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
_, addr, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
|
|
|
|
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2015-08-20 23:12:28 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2015-08-20 23:12:28 +00:00
|
|
|
|
|
|
|
// RPC should succeed
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out struct{}
|
|
|
|
err := c1.RPC("Status.Ping", struct{}{}, &out)
|
|
|
|
return err == nil, err
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2015-08-20 23:13:05 +00:00
|
|
|
|
2018-04-04 01:05:28 +00:00
|
|
|
func TestClient_RPC_FireRetryWatchers(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
_, addr, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
|
|
|
|
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2018-04-04 01:05:28 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2018-04-04 01:05:28 +00:00
|
|
|
|
|
|
|
watcher := c1.rpcRetryWatcher()
|
|
|
|
|
|
|
|
// RPC should succeed
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out struct{}
|
|
|
|
err := c1.RPC("Status.Ping", struct{}{}, &out)
|
|
|
|
return err == nil, err
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-watcher:
|
|
|
|
default:
|
|
|
|
t.Fatal("watcher should be fired")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-20 23:13:05 +00:00
|
|
|
func TestClient_RPC_Passthrough(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2015-08-20 23:13:05 +00:00
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
|
|
|
|
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2015-08-20 23:13:05 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2015-08-20 23:13:05 +00:00
|
|
|
|
|
|
|
// RPC should succeed
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out struct{}
|
|
|
|
err := c1.RPC("Status.Ping", struct{}{}, &out)
|
|
|
|
return err == nil, err
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2015-08-20 23:41:29 +00:00
|
|
|
|
|
|
|
func TestClient_Fingerprint(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2018-03-27 22:51:54 +00:00
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
2015-08-20 23:41:29 +00:00
|
|
|
|
2018-04-12 21:29:30 +00:00
|
|
|
// Ensure we are fingerprinting
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
node := c.Node()
|
|
|
|
if _, ok := node.Attributes["kernel.name"]; !ok {
|
|
|
|
return false, fmt.Errorf("Expected value for kernel.name")
|
|
|
|
}
|
|
|
|
if _, ok := node.Attributes["cpu.arch"]; !ok {
|
|
|
|
return false, fmt.Errorf("Expected value for cpu.arch")
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
2015-08-20 23:41:29 +00:00
|
|
|
}
|
2015-08-20 23:53:43 +00:00
|
|
|
|
2018-12-20 01:08:24 +00:00
|
|
|
// TestClient_Fingerprint_Periodic asserts that driver node attributes are
|
|
|
|
// periodically fingerprinted.
|
2018-01-26 19:31:37 +00:00
|
|
|
func TestClient_Fingerprint_Periodic(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2018-12-20 01:08:24 +00:00
|
|
|
confs := []*nconfig.PluginConfig{
|
2019-01-08 16:15:38 +00:00
|
|
|
{
|
2018-12-20 01:08:24 +00:00
|
|
|
Name: "mock_driver",
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"shutdown_periodic_after": true,
|
|
|
|
"shutdown_periodic_duration": time.Second,
|
|
|
|
},
|
|
|
|
},
|
2018-01-26 19:31:37 +00:00
|
|
|
}
|
2018-12-20 01:08:24 +00:00
|
|
|
c.PluginLoader = catalog.TestPluginLoaderWithOptions(t, "", nil, confs)
|
2018-01-26 19:31:37 +00:00
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2018-01-26 19:31:37 +00:00
|
|
|
|
|
|
|
node := c1.config.Node
|
2018-03-03 01:21:13 +00:00
|
|
|
{
|
|
|
|
// Ensure the mock driver is registered on the client
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.configLock.Lock()
|
2018-03-14 17:10:41 +00:00
|
|
|
defer c1.configLock.Unlock()
|
2018-04-12 21:52:50 +00:00
|
|
|
|
|
|
|
// assert that the driver is set on the node attributes
|
|
|
|
mockDriverInfoAttr := node.Attributes["driver.mock_driver"]
|
|
|
|
if mockDriverInfoAttr == "" {
|
|
|
|
return false, fmt.Errorf("mock driver is empty when it should be set on the node attributes")
|
|
|
|
}
|
|
|
|
|
2018-03-03 01:21:13 +00:00
|
|
|
mockDriverInfo := node.Drivers["mock_driver"]
|
|
|
|
|
|
|
|
// assert that the Driver information for the node is also set correctly
|
|
|
|
if mockDriverInfo == nil {
|
|
|
|
return false, fmt.Errorf("mock driver is nil when it should be set on node Drivers")
|
|
|
|
}
|
|
|
|
if !mockDriverInfo.Detected {
|
2018-03-07 16:58:14 +00:00
|
|
|
return false, fmt.Errorf("mock driver should be set as detected")
|
2018-03-03 01:21:13 +00:00
|
|
|
}
|
|
|
|
if !mockDriverInfo.Healthy {
|
|
|
|
return false, fmt.Errorf("mock driver should be set as healthy")
|
|
|
|
}
|
|
|
|
if mockDriverInfo.HealthDescription == "" {
|
|
|
|
return false, fmt.Errorf("mock driver description should not be empty")
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2018-01-26 19:31:37 +00:00
|
|
|
|
2018-03-03 01:21:13 +00:00
|
|
|
{
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.configLock.Lock()
|
2018-03-14 17:10:41 +00:00
|
|
|
defer c1.configLock.Unlock()
|
2018-03-07 16:58:14 +00:00
|
|
|
mockDriverInfo := node.Drivers["mock_driver"]
|
|
|
|
// assert that the Driver information for the node is also set correctly
|
|
|
|
if mockDriverInfo == nil {
|
|
|
|
return false, fmt.Errorf("mock driver is nil when it should be set on node Drivers")
|
|
|
|
}
|
2018-03-14 17:10:41 +00:00
|
|
|
if mockDriverInfo.Detected {
|
2018-12-20 01:08:24 +00:00
|
|
|
return false, fmt.Errorf("mock driver should not be set as detected")
|
2018-03-07 16:58:14 +00:00
|
|
|
}
|
|
|
|
if mockDriverInfo.Healthy {
|
2018-12-20 01:08:24 +00:00
|
|
|
return false, fmt.Errorf("mock driver should not be set as healthy")
|
2018-03-07 16:58:14 +00:00
|
|
|
}
|
|
|
|
if mockDriverInfo.HealthDescription == "" {
|
|
|
|
return false, fmt.Errorf("mock driver description should not be empty")
|
|
|
|
}
|
2018-03-03 01:21:13 +00:00
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2018-01-26 19:31:37 +00:00
|
|
|
}
|
|
|
|
|
2017-04-06 03:50:35 +00:00
|
|
|
// TestClient_MixedTLS asserts that when a server is running with TLS enabled
|
|
|
|
// it will reject any RPC connections from clients that lack TLS. See #2525
|
|
|
|
func TestClient_MixedTLS(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2017-04-06 03:50:35 +00:00
|
|
|
const (
|
|
|
|
cafile = "../helper/tlsutil/testdata/ca.pem"
|
|
|
|
foocert = "../helper/tlsutil/testdata/nomad-foo.pem"
|
|
|
|
fookey = "../helper/tlsutil/testdata/nomad-foo-key.pem"
|
|
|
|
)
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, addr, cleanupS1 := testServer(t, func(c *nomad.Config) {
|
2017-04-06 03:50:35 +00:00
|
|
|
c.TLSConfig = &nconfig.TLSConfig{
|
|
|
|
EnableHTTP: true,
|
|
|
|
EnableRPC: true,
|
|
|
|
VerifyServerHostname: true,
|
|
|
|
CAFile: cafile,
|
|
|
|
CertFile: foocert,
|
|
|
|
KeyFile: fookey,
|
|
|
|
}
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2017-04-06 03:50:35 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2017-04-06 03:50:35 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-04-06 03:50:35 +00:00
|
|
|
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
var out structs.SingleNodeResponse
|
2017-04-07 00:05:09 +00:00
|
|
|
testutil.AssertUntil(100*time.Millisecond,
|
|
|
|
func() (bool, error) {
|
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err == nil {
|
|
|
|
return false, fmt.Errorf("client RPC succeeded when it should have failed:\n%+v", out)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
},
|
|
|
|
func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
},
|
|
|
|
)
|
2017-04-06 03:50:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// TestClient_BadTLS asserts that when a client and server are running with TLS
|
|
|
|
// enabled -- but their certificates are signed by different CAs -- they're
|
|
|
|
// unable to communicate.
|
|
|
|
func TestClient_BadTLS(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
2017-04-06 03:50:35 +00:00
|
|
|
const (
|
|
|
|
cafile = "../helper/tlsutil/testdata/ca.pem"
|
|
|
|
foocert = "../helper/tlsutil/testdata/nomad-foo.pem"
|
|
|
|
fookey = "../helper/tlsutil/testdata/nomad-foo-key.pem"
|
|
|
|
badca = "../helper/tlsutil/testdata/ca-bad.pem"
|
|
|
|
badcert = "../helper/tlsutil/testdata/nomad-bad.pem"
|
|
|
|
badkey = "../helper/tlsutil/testdata/nomad-bad-key.pem"
|
|
|
|
)
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, addr, cleanupS1 := testServer(t, func(c *nomad.Config) {
|
2017-04-06 03:50:35 +00:00
|
|
|
c.TLSConfig = &nconfig.TLSConfig{
|
|
|
|
EnableHTTP: true,
|
|
|
|
EnableRPC: true,
|
|
|
|
VerifyServerHostname: true,
|
|
|
|
CAFile: cafile,
|
|
|
|
CertFile: foocert,
|
|
|
|
KeyFile: fookey,
|
|
|
|
}
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2017-04-06 03:50:35 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2017-04-06 03:50:35 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
c.TLSConfig = &nconfig.TLSConfig{
|
|
|
|
EnableHTTP: true,
|
|
|
|
EnableRPC: true,
|
|
|
|
VerifyServerHostname: true,
|
|
|
|
CAFile: badca,
|
|
|
|
CertFile: badcert,
|
|
|
|
KeyFile: badkey,
|
|
|
|
}
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2017-04-06 03:50:35 +00:00
|
|
|
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
var out structs.SingleNodeResponse
|
2017-04-07 00:05:09 +00:00
|
|
|
testutil.AssertUntil(100*time.Millisecond,
|
|
|
|
func() (bool, error) {
|
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err == nil {
|
|
|
|
return false, fmt.Errorf("client RPC succeeded when it should have failed:\n%+v", out)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
},
|
|
|
|
func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
},
|
|
|
|
)
|
2017-04-06 03:50:35 +00:00
|
|
|
}
|
|
|
|
|
2015-08-21 00:49:04 +00:00
|
|
|
func TestClient_Register(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2015-08-21 00:49:04 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2015-08-21 00:49:04 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2015-08-21 00:49:04 +00:00
|
|
|
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2015-09-14 01:18:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2015-08-21 00:49:04 +00:00
|
|
|
}
|
|
|
|
var out structs.SingleNodeResponse
|
|
|
|
|
|
|
|
// Register should succeed
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2015-09-07 03:31:32 +00:00
|
|
|
err := s1.RPC("Node.GetNode", &req, &out)
|
2015-08-21 00:49:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
if out.Node == nil {
|
|
|
|
return false, fmt.Errorf("missing reg")
|
|
|
|
}
|
|
|
|
return out.Node.ID == req.NodeID, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2015-08-29 21:15:34 +00:00
|
|
|
|
|
|
|
func TestClient_Heartbeat(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, _, cleanupS1 := testServer(t, func(c *nomad.Config) {
|
2015-08-29 21:15:34 +00:00
|
|
|
c.MinHeartbeatTTL = 50 * time.Millisecond
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2015-08-29 21:15:34 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2015-08-29 21:15:34 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2015-08-29 21:15:34 +00:00
|
|
|
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2015-09-14 01:18:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2015-08-29 21:15:34 +00:00
|
|
|
}
|
|
|
|
var out structs.SingleNodeResponse
|
|
|
|
|
|
|
|
// Register should succeed
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2015-09-07 03:31:32 +00:00
|
|
|
err := s1.RPC("Node.GetNode", &req, &out)
|
2015-08-29 21:15:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
if out.Node == nil {
|
|
|
|
return false, fmt.Errorf("missing reg")
|
|
|
|
}
|
|
|
|
return out.Node.Status == structs.NodeStatusReady, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2015-08-29 21:22:24 +00:00
|
|
|
|
2018-12-19 19:41:53 +00:00
|
|
|
// TestClient_UpdateAllocStatus that once running allocations send updates to
|
|
|
|
// the server.
|
2015-08-29 21:22:24 +00:00
|
|
|
func TestClient_UpdateAllocStatus(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2015-08-29 21:22:24 +00:00
|
|
|
|
2018-12-19 19:41:53 +00:00
|
|
|
_, cleanup := TestClient(t, func(c *config.Config) {
|
2015-08-29 21:22:24 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2015-08-29 21:22:24 +00:00
|
|
|
|
2016-08-16 06:11:57 +00:00
|
|
|
job := mock.Job()
|
2019-01-07 17:21:14 +00:00
|
|
|
// allow running job on any node including self client, that may not be a Linux box
|
|
|
|
job.Constraints = nil
|
2018-12-19 19:41:53 +00:00
|
|
|
job.TaskGroups[0].Count = 1
|
|
|
|
task := job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"run_for": "10s",
|
2016-07-21 21:43:21 +00:00
|
|
|
}
|
2018-12-19 19:41:53 +00:00
|
|
|
task.Services = nil
|
2015-08-29 21:22:24 +00:00
|
|
|
|
2018-12-19 19:41:53 +00:00
|
|
|
// WaitForRunning polls the server until the ClientStatus is running
|
|
|
|
testutil.WaitForRunning(t, s1.RPC, job)
|
2015-08-29 21:22:24 +00:00
|
|
|
}
|
2015-08-29 21:33:30 +00:00
|
|
|
|
|
|
|
func TestClient_WatchAllocs(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2015-08-29 21:33:30 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2015-08-29 21:33:30 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2015-08-29 21:33:30 +00:00
|
|
|
|
2018-04-11 17:36:28 +00:00
|
|
|
// Wait until the node is ready
|
2016-08-16 06:11:57 +00:00
|
|
|
waitTilNodeReady(c1, t)
|
|
|
|
|
2015-08-29 21:33:30 +00:00
|
|
|
// Create mock allocations
|
2016-08-16 06:11:57 +00:00
|
|
|
job := mock.Job()
|
2019-11-21 01:32:11 +00:00
|
|
|
job.TaskGroups[0].Count = 3
|
|
|
|
job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
2015-08-29 21:33:30 +00:00
|
|
|
alloc1 := mock.Alloc()
|
2016-08-16 06:11:57 +00:00
|
|
|
alloc1.JobID = job.ID
|
|
|
|
alloc1.Job = job
|
2015-08-29 21:33:30 +00:00
|
|
|
alloc1.NodeID = c1.Node().ID
|
|
|
|
alloc2 := mock.Alloc()
|
|
|
|
alloc2.NodeID = c1.Node().ID
|
2016-08-16 06:11:57 +00:00
|
|
|
alloc2.JobID = job.ID
|
|
|
|
alloc2.Job = job
|
2015-08-29 21:33:30 +00:00
|
|
|
|
|
|
|
state := s1.State()
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertJob(structs.MsgTypeTestSetup, 100, job); err != nil {
|
2016-07-21 21:43:21 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-08-16 06:11:57 +00:00
|
|
|
if err := state.UpsertJobSummary(101, mock.JobSummary(alloc1.JobID)); err != nil {
|
2016-07-21 21:43:21 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-10-19 13:30:15 +00:00
|
|
|
err := state.UpsertAllocs(structs.MsgTypeTestSetup, 102, []*structs.Allocation{alloc1, alloc2})
|
2015-08-29 21:33:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Both allocations should get registered
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.allocLock.RLock()
|
|
|
|
num := len(c1.allocs)
|
|
|
|
c1.allocLock.RUnlock()
|
|
|
|
return num == 2, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Delete one allocation
|
2017-10-19 00:06:46 +00:00
|
|
|
if err := state.DeleteEval(103, nil, []string{alloc1.ID}); err != nil {
|
2015-08-29 21:33:30 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-02-01 21:57:35 +00:00
|
|
|
// Update the other allocation. Have to make a copy because the allocs are
|
|
|
|
// shared in memory in the test and the modify index would be updated in the
|
|
|
|
// alloc runner.
|
2017-10-19 00:06:46 +00:00
|
|
|
alloc2_2 := alloc2.Copy()
|
2016-02-01 21:57:35 +00:00
|
|
|
alloc2_2.DesiredStatus = structs.AllocDesiredStatusStop
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertAllocs(structs.MsgTypeTestSetup, 104, []*structs.Allocation{alloc2_2}); err != nil {
|
2017-10-19 00:06:46 +00:00
|
|
|
t.Fatalf("err upserting stopped alloc: %v", err)
|
2015-08-29 21:33:30 +00:00
|
|
|
}
|
|
|
|
|
2017-10-19 00:06:46 +00:00
|
|
|
// One allocation should get GC'd and removed
|
2015-08-29 21:33:30 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.allocLock.RLock()
|
|
|
|
num := len(c1.allocs)
|
|
|
|
c1.allocLock.RUnlock()
|
|
|
|
return num == 1, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// One allocations should get updated
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.allocLock.RLock()
|
|
|
|
ar := c1.allocs[alloc2.ID]
|
|
|
|
c1.allocLock.RUnlock()
|
|
|
|
return ar.Alloc().DesiredStatus == structs.AllocDesiredStatusStop, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2015-08-31 00:19:20 +00:00
|
|
|
|
2016-08-16 06:11:57 +00:00
|
|
|
func waitTilNodeReady(client *Client, t *testing.T) {
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
n := client.Node()
|
|
|
|
if n.Status != structs.NodeStatusReady {
|
|
|
|
return false, fmt.Errorf("node not registered")
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-08-31 00:19:20 +00:00
|
|
|
func TestClient_SaveRestoreState(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2018-11-06 20:39:21 +00:00
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2015-08-31 00:19:20 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2015-11-11 00:03:18 +00:00
|
|
|
c.DevMode = false
|
2015-08-31 00:19:20 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2015-08-31 00:19:20 +00:00
|
|
|
|
2018-04-11 17:36:28 +00:00
|
|
|
// Wait until the node is ready
|
2016-08-16 06:11:57 +00:00
|
|
|
waitTilNodeReady(c1, t)
|
|
|
|
|
2015-08-31 00:19:20 +00:00
|
|
|
// Create mock allocations
|
2016-08-16 06:11:57 +00:00
|
|
|
job := mock.Job()
|
2015-08-31 00:19:20 +00:00
|
|
|
alloc1 := mock.Alloc()
|
|
|
|
alloc1.NodeID = c1.Node().ID
|
2016-08-16 06:11:57 +00:00
|
|
|
alloc1.Job = job
|
|
|
|
alloc1.JobID = job.ID
|
2016-09-05 02:09:08 +00:00
|
|
|
alloc1.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
2018-11-06 17:04:07 +00:00
|
|
|
alloc1.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
2018-11-06 20:39:21 +00:00
|
|
|
alloc1.ClientStatus = structs.AllocClientStatusRunning
|
2015-08-31 00:19:20 +00:00
|
|
|
|
|
|
|
state := s1.State()
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertJob(structs.MsgTypeTestSetup, 100, job); err != nil {
|
2016-07-21 21:43:21 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-08-16 06:11:57 +00:00
|
|
|
if err := state.UpsertJobSummary(101, mock.JobSummary(alloc1.JobID)); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertAllocs(structs.MsgTypeTestSetup, 102, []*structs.Allocation{alloc1}); err != nil {
|
2015-08-31 00:19:20 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Allocations should get registered
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.allocLock.RLock()
|
2015-11-11 00:03:18 +00:00
|
|
|
ar := c1.allocs[alloc1.ID]
|
2015-08-31 00:19:20 +00:00
|
|
|
c1.allocLock.RUnlock()
|
2016-08-16 06:11:57 +00:00
|
|
|
if ar == nil {
|
|
|
|
return false, fmt.Errorf("nil alloc runner")
|
|
|
|
}
|
|
|
|
if ar.Alloc().ClientStatus != structs.AllocClientStatusRunning {
|
|
|
|
return false, fmt.Errorf("client status: got %v; want %v", ar.Alloc().ClientStatus, structs.AllocClientStatusRunning)
|
|
|
|
}
|
|
|
|
return true, nil
|
2015-08-31 00:19:20 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Shutdown the client, saves state
|
2016-07-21 21:43:21 +00:00
|
|
|
if err := c1.Shutdown(); err != nil {
|
2015-08-31 00:19:20 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new client
|
2018-09-13 17:43:40 +00:00
|
|
|
logger := testlog.HCLogger(t)
|
|
|
|
c1.config.Logger = logger
|
2019-11-21 01:29:27 +00:00
|
|
|
consulCatalog := consul.NewMockCatalog(logger)
|
2018-09-13 17:43:40 +00:00
|
|
|
mockService := consulApi.NewMockConsulServiceClient(t, logger)
|
2019-01-09 18:57:56 +00:00
|
|
|
|
2019-11-21 01:29:27 +00:00
|
|
|
// ensure we use non-shutdown driver instances
|
|
|
|
c1.config.PluginLoader = catalog.TestPluginLoaderWithOptions(t, "", c1.config.Options, nil)
|
|
|
|
c1.config.PluginSingletonLoader = singleton.NewSingletonLoader(logger, c1.config.PluginLoader)
|
|
|
|
|
2020-09-04 17:50:11 +00:00
|
|
|
c2, err := NewClient(c1.config, consulCatalog, nil, mockService)
|
2015-08-31 00:19:20 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer c2.Shutdown()
|
|
|
|
|
|
|
|
// Ensure the allocation is running
|
2016-02-22 05:12:58 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c2.allocLock.RLock()
|
|
|
|
ar := c2.allocs[alloc1.ID]
|
|
|
|
c2.allocLock.RUnlock()
|
|
|
|
status := ar.Alloc().ClientStatus
|
2017-02-28 00:00:19 +00:00
|
|
|
alive := status == structs.AllocClientStatusRunning || status == structs.AllocClientStatusPending
|
2016-02-22 05:12:58 +00:00
|
|
|
if !alive {
|
|
|
|
return false, fmt.Errorf("incorrect client status: %#v", ar.Alloc())
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
2016-09-02 19:44:05 +00:00
|
|
|
|
|
|
|
// Destroy all the allocations
|
2017-01-05 21:19:01 +00:00
|
|
|
for _, ar := range c2.getAllocRunners() {
|
2016-09-02 19:44:05 +00:00
|
|
|
ar.Destroy()
|
|
|
|
}
|
2017-01-05 20:32:44 +00:00
|
|
|
|
2017-01-05 21:19:01 +00:00
|
|
|
for _, ar := range c2.getAllocRunners() {
|
2018-12-18 22:38:28 +00:00
|
|
|
<-ar.DestroyCh()
|
2017-01-05 20:32:44 +00:00
|
|
|
}
|
2015-08-31 00:19:20 +00:00
|
|
|
}
|
2015-09-12 18:47:44 +00:00
|
|
|
|
2019-01-11 15:15:25 +00:00
|
|
|
func TestClient_AddAllocError(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
require := require.New(t)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2019-01-11 15:15:25 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
c1, cleanupC1 := TestClient(t, func(c *config.Config) {
|
2019-01-11 15:15:25 +00:00
|
|
|
c.DevMode = false
|
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupC1()
|
2019-01-11 15:15:25 +00:00
|
|
|
|
|
|
|
// Wait until the node is ready
|
|
|
|
waitTilNodeReady(c1, t)
|
|
|
|
|
|
|
|
// Create mock allocation with invalid task group name
|
|
|
|
job := mock.Job()
|
|
|
|
alloc1 := mock.Alloc()
|
|
|
|
alloc1.NodeID = c1.Node().ID
|
|
|
|
alloc1.Job = job
|
|
|
|
alloc1.JobID = job.ID
|
|
|
|
alloc1.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
alloc1.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
alloc1.ClientStatus = structs.AllocClientStatusPending
|
|
|
|
|
2019-01-11 16:58:43 +00:00
|
|
|
// Set these two fields to nil to cause alloc runner creation to fail
|
|
|
|
alloc1.AllocatedResources = nil
|
|
|
|
alloc1.TaskResources = nil
|
|
|
|
|
2019-01-11 15:15:25 +00:00
|
|
|
state := s1.State()
|
2020-10-19 13:30:15 +00:00
|
|
|
err := state.UpsertJob(structs.MsgTypeTestSetup, 100, job)
|
2019-01-11 15:15:25 +00:00
|
|
|
require.Nil(err)
|
|
|
|
|
|
|
|
err = state.UpsertJobSummary(101, mock.JobSummary(alloc1.JobID))
|
|
|
|
require.Nil(err)
|
|
|
|
|
2020-10-19 13:30:15 +00:00
|
|
|
err = state.UpsertAllocs(structs.MsgTypeTestSetup, 102, []*structs.Allocation{alloc1})
|
2019-01-11 15:15:25 +00:00
|
|
|
require.Nil(err)
|
|
|
|
|
2019-01-11 16:58:43 +00:00
|
|
|
// Push this alloc update to the client
|
|
|
|
allocUpdates := &allocUpdates{
|
|
|
|
pulled: map[string]*structs.Allocation{
|
|
|
|
alloc1.ID: alloc1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
c1.runAllocs(allocUpdates)
|
2019-01-11 15:15:25 +00:00
|
|
|
|
|
|
|
// Ensure the allocation has been marked as invalid and failed on the server
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
c1.allocLock.RLock()
|
|
|
|
ar := c1.allocs[alloc1.ID]
|
|
|
|
_, isInvalid := c1.invalidAllocs[alloc1.ID]
|
|
|
|
c1.allocLock.RUnlock()
|
|
|
|
if ar != nil {
|
|
|
|
return false, fmt.Errorf("expected nil alloc runner")
|
|
|
|
}
|
|
|
|
if !isInvalid {
|
|
|
|
return false, fmt.Errorf("expected alloc to be marked as invalid")
|
|
|
|
}
|
|
|
|
alloc, err := s1.State().AllocByID(nil, alloc1.ID)
|
|
|
|
require.Nil(err)
|
|
|
|
failed := alloc.ClientStatus == structs.AllocClientStatusFailed
|
|
|
|
if !failed {
|
|
|
|
return false, fmt.Errorf("Expected failed client status, but got %v", alloc.ClientStatus)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
require.NoError(err)
|
|
|
|
})
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-09-12 18:47:44 +00:00
|
|
|
func TestClient_Init(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2015-09-12 18:47:44 +00:00
|
|
|
dir, err := ioutil.TempDir("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
allocDir := filepath.Join(dir, "alloc")
|
|
|
|
|
|
|
|
client := &Client{
|
|
|
|
config: &config.Config{
|
2019-01-09 18:57:56 +00:00
|
|
|
AllocDir: allocDir,
|
|
|
|
StateDBFactory: cstate.GetStateDBFactory(true),
|
2015-09-12 18:47:44 +00:00
|
|
|
},
|
2018-09-16 00:48:59 +00:00
|
|
|
logger: testlog.HCLogger(t),
|
2015-09-12 18:47:44 +00:00
|
|
|
}
|
2019-01-09 18:57:56 +00:00
|
|
|
|
|
|
|
if err := client.init(); err != nil {
|
2015-09-12 18:47:44 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := os.Stat(allocDir); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2016-08-22 16:34:24 +00:00
|
|
|
|
|
|
|
func TestClient_BlockedAllocations(t *testing.T) {
|
2017-07-23 02:04:36 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, _, cleanupS1 := testServer(t, nil)
|
|
|
|
defer cleanupS1()
|
2016-08-22 16:34:24 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2016-08-22 16:34:24 +00:00
|
|
|
c.RPCHandler = s1
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2016-08-22 16:34:24 +00:00
|
|
|
|
|
|
|
// Wait for the node to be ready
|
|
|
|
state := s1.State()
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, c1.Node().ID)
|
2016-08-22 16:34:24 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
if out == nil || out.Status != structs.NodeStatusReady {
|
|
|
|
return false, fmt.Errorf("bad node: %#v", out)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Add an allocation
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = c1.Node().ID
|
|
|
|
alloc.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
alloc.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"kill_after": "1s",
|
|
|
|
"run_for": "100s",
|
|
|
|
"exit_code": 0,
|
|
|
|
"exit_signal": 0,
|
|
|
|
}
|
|
|
|
|
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2020-10-19 13:30:15 +00:00
|
|
|
state.UpsertAllocs(structs.MsgTypeTestSetup, 100, []*structs.Allocation{alloc})
|
2016-08-22 16:34:24 +00:00
|
|
|
|
|
|
|
// Wait until the client downloads and starts the allocation
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.AllocByID(ws, alloc.ID)
|
2016-08-22 16:34:24 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
if out == nil || out.ClientStatus != structs.AllocClientStatusRunning {
|
|
|
|
return false, fmt.Errorf("bad alloc: %#v", out)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Add a new chained alloc
|
|
|
|
alloc2 := alloc.Copy()
|
2017-09-29 16:58:48 +00:00
|
|
|
alloc2.ID = uuid.Generate()
|
2016-08-22 16:34:24 +00:00
|
|
|
alloc2.Job = alloc.Job
|
|
|
|
alloc2.JobID = alloc.JobID
|
|
|
|
alloc2.PreviousAllocation = alloc.ID
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertAllocs(structs.MsgTypeTestSetup, 200, []*structs.Allocation{alloc2}); err != nil {
|
2016-08-22 16:34:24 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2019-05-07 19:54:36 +00:00
|
|
|
// Ensure that the chained allocation is being tracked as blocked
|
2016-08-22 16:34:24 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-08-11 17:27:21 +00:00
|
|
|
ar := c1.getAllocRunners()[alloc2.ID]
|
|
|
|
if ar == nil {
|
|
|
|
return false, fmt.Errorf("alloc 2's alloc runner does not exist")
|
|
|
|
}
|
2017-08-14 23:02:28 +00:00
|
|
|
if !ar.IsWaiting() {
|
2017-08-11 17:27:21 +00:00
|
|
|
return false, fmt.Errorf("alloc 2 is not blocked")
|
2016-08-22 16:34:24 +00:00
|
|
|
}
|
2017-08-11 17:27:21 +00:00
|
|
|
return true, nil
|
2016-08-22 16:34:24 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Change the desired state of the parent alloc to stop
|
|
|
|
alloc1 := alloc.Copy()
|
|
|
|
alloc1.DesiredStatus = structs.AllocDesiredStatusStop
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertAllocs(structs.MsgTypeTestSetup, 300, []*structs.Allocation{alloc1}); err != nil {
|
2016-08-22 16:34:24 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that there are no blocked allocations
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-08-11 17:27:21 +00:00
|
|
|
for id, ar := range c1.getAllocRunners() {
|
2017-08-14 23:02:28 +00:00
|
|
|
if ar.IsWaiting() {
|
2017-08-11 17:27:21 +00:00
|
|
|
return false, fmt.Errorf("%q still blocked", id)
|
|
|
|
}
|
2017-08-14 23:02:28 +00:00
|
|
|
if ar.IsMigrating() {
|
2017-08-11 17:27:21 +00:00
|
|
|
return false, fmt.Errorf("%q still migrating", id)
|
|
|
|
}
|
2016-08-22 16:34:24 +00:00
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
2016-09-02 19:44:05 +00:00
|
|
|
|
|
|
|
// Destroy all the allocations
|
2017-01-05 21:19:01 +00:00
|
|
|
for _, ar := range c1.getAllocRunners() {
|
2016-09-02 19:44:05 +00:00
|
|
|
ar.Destroy()
|
|
|
|
}
|
|
|
|
|
2017-01-05 21:19:01 +00:00
|
|
|
for _, ar := range c1.getAllocRunners() {
|
2018-12-18 22:38:28 +00:00
|
|
|
<-ar.DestroyCh()
|
2017-01-05 21:15:08 +00:00
|
|
|
}
|
2016-08-22 16:34:24 +00:00
|
|
|
}
|
2017-10-04 18:46:47 +00:00
|
|
|
|
|
|
|
func TestClient_ValidateMigrateToken_ValidToken(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c, cleanup := TestClient(t, func(c *config.Config) {
|
2017-10-04 18:46:47 +00:00
|
|
|
c.ACLEnabled = true
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-10-04 18:46:47 +00:00
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
2018-01-12 21:58:44 +00:00
|
|
|
validToken, err := structs.GenerateMigrateToken(alloc.ID, c.secretNodeID())
|
2017-10-04 18:46:47 +00:00
|
|
|
assert.Nil(err)
|
|
|
|
|
|
|
|
assert.Equal(c.ValidateMigrateToken(alloc.ID, validToken), true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_ValidateMigrateToken_InvalidToken(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c, cleanup := TestClient(t, func(c *config.Config) {
|
2017-10-04 18:46:47 +00:00
|
|
|
c.ACLEnabled = true
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-10-04 18:46:47 +00:00
|
|
|
|
|
|
|
assert.Equal(c.ValidateMigrateToken("", ""), false)
|
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
assert.Equal(c.ValidateMigrateToken(alloc.ID, alloc.ID), false)
|
|
|
|
assert.Equal(c.ValidateMigrateToken(alloc.ID, ""), false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_ValidateMigrateToken_ACLDisabled(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c, cleanup := TestClient(t, func(c *config.Config) {})
|
|
|
|
defer cleanup()
|
2017-10-04 18:46:47 +00:00
|
|
|
|
|
|
|
assert.Equal(c.ValidateMigrateToken("", ""), true)
|
|
|
|
}
|
2017-11-20 15:38:46 +00:00
|
|
|
|
|
|
|
func TestClient_ReloadTLS_UpgradePlaintextToTLS(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, addr, cleanupS1 := testServer(t, func(c *nomad.Config) {
|
2019-05-02 20:00:21 +00:00
|
|
|
c.Region = "global"
|
2017-11-20 15:38:46 +00:00
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2017-11-20 15:38:46 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
const (
|
|
|
|
cafile = "../helper/tlsutil/testdata/ca.pem"
|
|
|
|
foocert = "../helper/tlsutil/testdata/nomad-foo.pem"
|
|
|
|
fookey = "../helper/tlsutil/testdata/nomad-foo-key.pem"
|
|
|
|
)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2017-11-20 15:38:46 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-11-20 15:38:46 +00:00
|
|
|
|
2018-01-16 12:34:39 +00:00
|
|
|
// Registering a node over plaintext should succeed
|
|
|
|
{
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2019-05-02 20:00:21 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2018-01-16 12:34:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out structs.SingleNodeResponse
|
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("client RPC failed when it should have succeeded:\n%+v", err)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
},
|
|
|
|
func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2017-11-20 15:38:46 +00:00
|
|
|
newConfig := &nconfig.TLSConfig{
|
|
|
|
EnableHTTP: true,
|
|
|
|
EnableRPC: true,
|
|
|
|
VerifyServerHostname: true,
|
|
|
|
CAFile: cafile,
|
|
|
|
CertFile: foocert,
|
|
|
|
KeyFile: fookey,
|
|
|
|
}
|
|
|
|
|
2017-12-05 00:29:43 +00:00
|
|
|
err := c1.reloadTLSConnections(newConfig)
|
2017-11-20 15:38:46 +00:00
|
|
|
assert.Nil(err)
|
|
|
|
|
2018-01-16 12:34:39 +00:00
|
|
|
// Registering a node over plaintext should fail after the node has upgraded
|
|
|
|
// to TLS
|
|
|
|
{
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2019-05-02 20:00:21 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2018-01-16 12:34:39 +00:00
|
|
|
}
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out structs.SingleNodeResponse
|
2017-11-20 15:38:46 +00:00
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err == nil {
|
|
|
|
return false, fmt.Errorf("client RPC succeeded when it should have failed:\n%+v", err)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
},
|
2018-01-16 12:34:39 +00:00
|
|
|
func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
2017-11-20 15:38:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_ReloadTLS_DowngradeTLSToPlaintext(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2019-12-04 00:15:11 +00:00
|
|
|
s1, addr, cleanupS1 := testServer(t, func(c *nomad.Config) {
|
2019-05-02 20:00:21 +00:00
|
|
|
c.Region = "global"
|
2017-11-20 15:38:46 +00:00
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2017-11-20 15:38:46 +00:00
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
const (
|
|
|
|
cafile = "../helper/tlsutil/testdata/ca.pem"
|
|
|
|
foocert = "../helper/tlsutil/testdata/nomad-foo.pem"
|
|
|
|
fookey = "../helper/tlsutil/testdata/nomad-foo-key.pem"
|
|
|
|
)
|
|
|
|
|
2018-10-16 03:07:16 +00:00
|
|
|
c1, cleanup := TestClient(t, func(c *config.Config) {
|
2017-11-20 15:38:46 +00:00
|
|
|
c.Servers = []string{addr}
|
|
|
|
c.TLSConfig = &nconfig.TLSConfig{
|
|
|
|
EnableHTTP: true,
|
|
|
|
EnableRPC: true,
|
|
|
|
VerifyServerHostname: true,
|
|
|
|
CAFile: cafile,
|
|
|
|
CertFile: foocert,
|
|
|
|
KeyFile: fookey,
|
|
|
|
}
|
|
|
|
})
|
2018-10-16 03:07:16 +00:00
|
|
|
defer cleanup()
|
2017-11-20 15:38:46 +00:00
|
|
|
|
2018-01-16 12:34:39 +00:00
|
|
|
// assert that when one node is running in encrypted mode, a RPC request to a
|
|
|
|
// node running in plaintext mode should fail
|
|
|
|
{
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2019-05-02 20:00:21 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2018-01-16 12:34:39 +00:00
|
|
|
}
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out structs.SingleNodeResponse
|
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err == nil {
|
|
|
|
return false, fmt.Errorf("client RPC succeeded when it should have failed :\n%+v", err)
|
|
|
|
}
|
|
|
|
return true, nil
|
2018-02-16 00:04:53 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
2018-01-16 12:34:39 +00:00
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2017-11-20 15:38:46 +00:00
|
|
|
newConfig := &nconfig.TLSConfig{}
|
|
|
|
|
2017-12-05 00:29:43 +00:00
|
|
|
err := c1.reloadTLSConnections(newConfig)
|
2017-11-20 15:38:46 +00:00
|
|
|
assert.Nil(err)
|
|
|
|
|
2018-01-16 12:34:39 +00:00
|
|
|
// assert that when both nodes are in plaintext mode, a RPC request should
|
|
|
|
// succeed
|
|
|
|
{
|
|
|
|
req := structs.NodeSpecificRequest{
|
|
|
|
NodeID: c1.Node().ID,
|
2019-05-02 20:00:21 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2018-01-16 12:34:39 +00:00
|
|
|
}
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
var out structs.SingleNodeResponse
|
2017-11-20 15:38:46 +00:00
|
|
|
err := c1.RPC("Node.GetNode", &req, &out)
|
|
|
|
if err != nil {
|
2017-11-21 18:21:29 +00:00
|
|
|
return false, fmt.Errorf("client RPC failed when it should have succeeded:\n%+v", err)
|
2017-11-20 15:38:46 +00:00
|
|
|
}
|
|
|
|
return true, nil
|
2018-02-16 00:04:53 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
2017-11-20 15:38:46 +00:00
|
|
|
},
|
2018-01-16 12:34:39 +00:00
|
|
|
)
|
|
|
|
}
|
2017-11-20 15:38:46 +00:00
|
|
|
}
|
2018-01-09 23:26:53 +00:00
|
|
|
|
|
|
|
// TestClient_ServerList tests client methods that interact with the internal
|
|
|
|
// nomad server list.
|
|
|
|
func TestClient_ServerList(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-10-16 03:07:16 +00:00
|
|
|
client, cleanup := TestClient(t, func(c *config.Config) {})
|
|
|
|
defer cleanup()
|
2018-01-09 23:26:53 +00:00
|
|
|
|
|
|
|
if s := client.GetServers(); len(s) != 0 {
|
|
|
|
t.Fatalf("expected server lit to be empty but found: %+q", s)
|
|
|
|
}
|
2018-05-11 19:52:05 +00:00
|
|
|
if _, err := client.SetServers(nil); err != noServersErr {
|
2018-01-09 23:26:53 +00:00
|
|
|
t.Fatalf("expected setting an empty list to return a 'no servers' error but received %v", err)
|
|
|
|
}
|
2018-05-11 19:52:05 +00:00
|
|
|
if _, err := client.SetServers([]string{"123.456.13123.123.13:80"}); err == nil {
|
2018-01-09 23:26:53 +00:00
|
|
|
t.Fatalf("expected setting a bad server to return an error")
|
|
|
|
}
|
2018-05-11 19:52:05 +00:00
|
|
|
if _, err := client.SetServers([]string{"123.456.13123.123.13:80", "127.0.0.1:1234", "127.0.0.1"}); err == nil {
|
2018-01-09 23:26:53 +00:00
|
|
|
t.Fatalf("expected setting at least one good server to succeed but received: %v", err)
|
|
|
|
}
|
|
|
|
s := client.GetServers()
|
2018-01-26 01:56:47 +00:00
|
|
|
if len(s) != 0 {
|
2018-01-09 23:26:53 +00:00
|
|
|
t.Fatalf("expected 2 servers but received: %+q", s)
|
|
|
|
}
|
|
|
|
}
|
2018-11-14 03:20:03 +00:00
|
|
|
|
|
|
|
func TestClient_UpdateNodeFromDevicesAccumulates(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client, cleanup := TestClient(t, func(c *config.Config) {})
|
|
|
|
defer cleanup()
|
|
|
|
|
2018-12-01 16:10:39 +00:00
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
2018-11-14 03:20:03 +00:00
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2018-12-01 16:10:39 +00:00
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
2018-11-14 03:20:03 +00:00
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Memory: structs.NodeMemoryResources{MemoryMB: 1024},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
client.updateNodeFromDevices([]*structs.NodeDeviceResource{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
// initial check
|
|
|
|
expectedResources := &structs.NodeResources{
|
|
|
|
// computed through test client initialization
|
2020-06-19 17:53:31 +00:00
|
|
|
Networks: client.configCopy.Node.NodeResources.Networks,
|
|
|
|
NodeNetworks: client.configCopy.Node.NodeResources.NodeNetworks,
|
|
|
|
Disk: client.configCopy.Node.NodeResources.Disk,
|
2018-11-14 03:20:03 +00:00
|
|
|
|
|
|
|
// injected
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
Memory: structs.NodeMemoryResources{MemoryMB: 1024},
|
|
|
|
Devices: []*structs.NodeDeviceResource{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.EqualValues(t, expectedResources, client.configCopy.Node.NodeResources)
|
|
|
|
|
|
|
|
// overrides of values
|
|
|
|
|
2018-12-01 16:10:39 +00:00
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
2018-11-14 03:20:03 +00:00
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Memory: structs.NodeMemoryResources{MemoryMB: 2048},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
client.updateNodeFromDevices([]*structs.NodeDeviceResource{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor2",
|
|
|
|
Type: "type2",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectedResources2 := &structs.NodeResources{
|
|
|
|
// computed through test client initialization
|
2020-06-19 17:53:31 +00:00
|
|
|
Networks: client.configCopy.Node.NodeResources.Networks,
|
|
|
|
NodeNetworks: client.configCopy.Node.NodeResources.NodeNetworks,
|
|
|
|
Disk: client.configCopy.Node.NodeResources.Disk,
|
2018-11-14 03:20:03 +00:00
|
|
|
|
|
|
|
// injected
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
Memory: structs.NodeMemoryResources{MemoryMB: 2048},
|
|
|
|
Devices: []*structs.NodeDeviceResource{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor2",
|
|
|
|
Type: "type2",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.EqualValues(t, expectedResources2, client.configCopy.Node.NodeResources)
|
|
|
|
|
|
|
|
}
|
2018-11-15 15:13:14 +00:00
|
|
|
|
2019-04-11 17:17:26 +00:00
|
|
|
// TestClient_UpdateNodeFromFingerprintKeepsConfig asserts manually configured
|
|
|
|
// network interfaces take precedence over fingerprinted ones.
|
|
|
|
func TestClient_UpdateNodeFromFingerprintKeepsConfig(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Client without network configured updates to match fingerprint
|
|
|
|
client, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
2019-11-21 13:28:20 +00:00
|
|
|
|
2019-04-11 17:17:26 +00:00
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
2020-05-15 15:09:01 +00:00
|
|
|
Networks: []*structs.NetworkResource{{Mode: "host", Device: "any-interface"}},
|
2019-04-11 17:17:26 +00:00
|
|
|
},
|
|
|
|
Resources: &structs.Resources{
|
2020-05-15 15:09:01 +00:00
|
|
|
CPU: 80,
|
2019-04-11 17:17:26 +00:00
|
|
|
},
|
|
|
|
})
|
2020-05-15 15:09:01 +00:00
|
|
|
idx := len(client.config.Node.NodeResources.Networks) - 1
|
|
|
|
require.Equal(t, int64(123), client.config.Node.NodeResources.Cpu.CpuShares)
|
|
|
|
require.Equal(t, "any-interface", client.config.Node.NodeResources.Networks[idx].Device)
|
|
|
|
require.Equal(t, 80, client.config.Node.Resources.CPU)
|
2019-04-11 17:17:26 +00:00
|
|
|
|
2019-11-21 01:34:11 +00:00
|
|
|
// lookup an interface. client.Node starts with a hardcoded value, eth0,
|
|
|
|
// and is only updated async through fingerprinter.
|
|
|
|
// Let's just lookup network device; anyone will do for this test
|
|
|
|
interfaces, err := net.Interfaces()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, interfaces)
|
|
|
|
dev := interfaces[0].Name
|
|
|
|
|
2019-04-11 17:17:26 +00:00
|
|
|
// Client with network interface configured keeps the config
|
|
|
|
// setting on update
|
|
|
|
name := "TestClient_UpdateNodeFromFingerprintKeepsConfig2"
|
|
|
|
client, cleanup = TestClient(t, func(c *config.Config) {
|
|
|
|
c.NetworkInterface = dev
|
|
|
|
c.Node.Name = name
|
2020-10-12 12:47:05 +00:00
|
|
|
c.Options["fingerprint.denylist"] = "network"
|
2019-04-11 17:17:26 +00:00
|
|
|
// Node is already a mock.Node, with a device
|
|
|
|
c.Node.NodeResources.Networks[0].Device = dev
|
|
|
|
})
|
|
|
|
defer cleanup()
|
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
Networks: []*structs.NetworkResource{
|
2020-05-15 15:09:01 +00:00
|
|
|
{Mode: "host", Device: "any-interface", MBits: 20},
|
2019-04-11 17:17:26 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
2020-05-15 15:09:01 +00:00
|
|
|
require.Equal(t, int64(123), client.config.Node.NodeResources.Cpu.CpuShares)
|
2019-04-11 17:17:26 +00:00
|
|
|
// only the configured device is kept
|
2020-05-15 15:09:01 +00:00
|
|
|
require.Equal(t, 2, len(client.config.Node.NodeResources.Networks))
|
|
|
|
require.Equal(t, dev, client.config.Node.NodeResources.Networks[0].Device)
|
|
|
|
require.Equal(t, "bridge", client.config.Node.NodeResources.Networks[1].Mode)
|
2019-04-11 17:17:26 +00:00
|
|
|
|
|
|
|
// Network speed is applied to all NetworkResources
|
|
|
|
client.config.NetworkInterface = ""
|
|
|
|
client.config.NetworkSpeed = 100
|
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
|
|
|
NodeResources: &structs.NodeResources{
|
2020-05-15 15:09:01 +00:00
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
Networks: []*structs.NetworkResource{
|
|
|
|
{Mode: "host", Device: "any-interface", MBits: 20},
|
|
|
|
},
|
2019-04-11 17:17:26 +00:00
|
|
|
},
|
|
|
|
Resources: &structs.Resources{
|
2020-05-15 15:09:01 +00:00
|
|
|
CPU: 80,
|
2019-04-11 17:17:26 +00:00
|
|
|
},
|
|
|
|
})
|
2020-05-15 15:09:01 +00:00
|
|
|
assert.Equal(t, 3, len(client.config.Node.NodeResources.Networks))
|
|
|
|
assert.Equal(t, "any-interface", client.config.Node.NodeResources.Networks[2].Device)
|
|
|
|
assert.Equal(t, 100, client.config.Node.NodeResources.Networks[2].MBits)
|
|
|
|
assert.Equal(t, 0, client.config.Node.NodeResources.Networks[1].MBits)
|
2019-04-11 17:17:26 +00:00
|
|
|
}
|
|
|
|
|
2019-05-02 21:13:56 +00:00
|
|
|
// Support multiple IP addresses (ipv4 vs. 6, e.g.) on the configured network interface
|
|
|
|
func Test_UpdateNodeFromFingerprintMultiIP(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
var dev string
|
|
|
|
switch runtime.GOOS {
|
|
|
|
case "linux":
|
|
|
|
dev = "lo"
|
|
|
|
case "darwin":
|
|
|
|
dev = "lo0"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Client without network configured updates to match fingerprint
|
|
|
|
client, cleanup := TestClient(t, func(c *config.Config) {
|
|
|
|
c.NetworkInterface = dev
|
2020-10-12 12:47:05 +00:00
|
|
|
c.Options["fingerprint.denylist"] = "network,cni,bridge"
|
2019-05-02 21:13:56 +00:00
|
|
|
c.Node.Resources.Networks = c.Node.NodeResources.Networks
|
|
|
|
})
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
client.updateNodeFromFingerprint(&fingerprint.FingerprintResponse{
|
|
|
|
NodeResources: &structs.NodeResources{
|
|
|
|
Cpu: structs.NodeCpuResources{CpuShares: 123},
|
|
|
|
Networks: []*structs.NetworkResource{
|
|
|
|
{Device: dev, IP: "127.0.0.1"},
|
|
|
|
{Device: dev, IP: "::1"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2020-05-15 15:09:01 +00:00
|
|
|
nets := structs.Networks{
|
|
|
|
mock.Node().NodeResources.Networks[0],
|
2019-05-02 21:13:56 +00:00
|
|
|
{Device: dev, IP: "127.0.0.1"},
|
|
|
|
{Device: dev, IP: "::1"},
|
|
|
|
}
|
|
|
|
|
2020-05-15 15:09:01 +00:00
|
|
|
require.Equal(t, nets, client.config.Node.NodeResources.Networks)
|
2019-05-02 21:13:56 +00:00
|
|
|
}
|
|
|
|
|
2018-11-15 15:13:14 +00:00
|
|
|
func TestClient_computeAllocatedDeviceStats(t *testing.T) {
|
|
|
|
logger := testlog.HCLogger(t)
|
|
|
|
c := &Client{logger: logger}
|
|
|
|
|
|
|
|
newDeviceStats := func(strValue string) *device.DeviceStats {
|
|
|
|
return &device.DeviceStats{
|
|
|
|
Summary: &psstructs.StatValue{
|
|
|
|
StringVal: &strValue,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
allocatedDevices := []*structs.AllocatedDeviceResource{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
Name: "name",
|
|
|
|
DeviceIDs: []string{"d2", "d3", "notfoundid"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor2",
|
|
|
|
Type: "type2",
|
|
|
|
Name: "name2",
|
|
|
|
DeviceIDs: []string{"a2"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor_notfound",
|
|
|
|
Type: "type_notfound",
|
|
|
|
Name: "name_notfound",
|
|
|
|
DeviceIDs: []string{"d3"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
hostDeviceGroupStats := []*device.DeviceGroupStats{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
Name: "name",
|
|
|
|
InstanceStats: map[string]*device.DeviceStats{
|
|
|
|
"unallocated": newDeviceStats("unallocated"),
|
|
|
|
"d2": newDeviceStats("d2"),
|
|
|
|
"d3": newDeviceStats("d3"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor2",
|
|
|
|
Type: "type2",
|
|
|
|
Name: "name2",
|
|
|
|
InstanceStats: map[string]*device.DeviceStats{
|
|
|
|
"a2": newDeviceStats("a2"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor_unused",
|
|
|
|
Type: "type_unused",
|
|
|
|
Name: "name_unused",
|
|
|
|
InstanceStats: map[string]*device.DeviceStats{
|
|
|
|
"unallocated_unused": newDeviceStats("unallocated_unused"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// test some edge conditions
|
|
|
|
assert.Empty(t, c.computeAllocatedDeviceGroupStats(nil, nil))
|
|
|
|
assert.Empty(t, c.computeAllocatedDeviceGroupStats(nil, hostDeviceGroupStats))
|
|
|
|
assert.Empty(t, c.computeAllocatedDeviceGroupStats(allocatedDevices, nil))
|
|
|
|
|
|
|
|
// actual test
|
|
|
|
result := c.computeAllocatedDeviceGroupStats(allocatedDevices, hostDeviceGroupStats)
|
|
|
|
sort.Slice(result, func(i, j int) bool {
|
|
|
|
return result[i].Vendor < result[j].Vendor
|
|
|
|
})
|
|
|
|
|
|
|
|
expected := []*device.DeviceGroupStats{
|
|
|
|
{
|
|
|
|
Vendor: "vendor",
|
|
|
|
Type: "type",
|
|
|
|
Name: "name",
|
|
|
|
InstanceStats: map[string]*device.DeviceStats{
|
|
|
|
"d2": newDeviceStats("d2"),
|
|
|
|
"d3": newDeviceStats("d3"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Vendor: "vendor2",
|
|
|
|
Type: "type2",
|
|
|
|
Name: "name2",
|
|
|
|
InstanceStats: map[string]*device.DeviceStats{
|
|
|
|
"a2": newDeviceStats("a2"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-11-16 22:13:01 +00:00
|
|
|
assert.EqualValues(t, expected, result)
|
2018-11-15 15:13:14 +00:00
|
|
|
}
|
2018-12-11 17:20:51 +00:00
|
|
|
|
2019-05-07 19:54:36 +00:00
|
|
|
func TestClient_getAllocatedResources(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
require := require.New(t)
|
|
|
|
client, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
allocStops := mock.BatchAlloc()
|
|
|
|
allocStops.Job.TaskGroups[0].Count = 1
|
|
|
|
allocStops.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
allocStops.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "1ms",
|
|
|
|
"exit_code": "0",
|
|
|
|
}
|
|
|
|
allocStops.Job.TaskGroups[0].RestartPolicy.Attempts = 0
|
|
|
|
allocStops.AllocatedResources.Shared.DiskMB = 64
|
|
|
|
allocStops.AllocatedResources.Tasks["web"].Cpu = structs.AllocatedCpuResources{CpuShares: 64}
|
|
|
|
allocStops.AllocatedResources.Tasks["web"].Memory = structs.AllocatedMemoryResources{MemoryMB: 64}
|
|
|
|
require.Nil(client.addAlloc(allocStops, ""))
|
|
|
|
|
|
|
|
allocFails := mock.BatchAlloc()
|
|
|
|
allocFails.Job.TaskGroups[0].Count = 1
|
|
|
|
allocFails.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
allocFails.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "1ms",
|
|
|
|
"exit_code": "1",
|
|
|
|
}
|
|
|
|
allocFails.Job.TaskGroups[0].RestartPolicy.Attempts = 0
|
|
|
|
allocFails.AllocatedResources.Shared.DiskMB = 128
|
|
|
|
allocFails.AllocatedResources.Tasks["web"].Cpu = structs.AllocatedCpuResources{CpuShares: 128}
|
|
|
|
allocFails.AllocatedResources.Tasks["web"].Memory = structs.AllocatedMemoryResources{MemoryMB: 128}
|
|
|
|
require.Nil(client.addAlloc(allocFails, ""))
|
|
|
|
|
|
|
|
allocRuns := mock.Alloc()
|
|
|
|
allocRuns.Job.TaskGroups[0].Count = 1
|
|
|
|
allocRuns.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
allocRuns.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "3s",
|
|
|
|
}
|
|
|
|
allocRuns.AllocatedResources.Shared.DiskMB = 256
|
|
|
|
allocRuns.AllocatedResources.Tasks["web"].Cpu = structs.AllocatedCpuResources{CpuShares: 256}
|
|
|
|
allocRuns.AllocatedResources.Tasks["web"].Memory = structs.AllocatedMemoryResources{MemoryMB: 256}
|
|
|
|
require.Nil(client.addAlloc(allocRuns, ""))
|
|
|
|
|
|
|
|
allocPends := mock.Alloc()
|
|
|
|
allocPends.Job.TaskGroups[0].Count = 1
|
|
|
|
allocPends.Job.TaskGroups[0].Tasks[0].Driver = "mock_driver"
|
|
|
|
allocPends.Job.TaskGroups[0].Tasks[0].Config = map[string]interface{}{
|
|
|
|
"run_for": "5s",
|
|
|
|
"start_block_for": "10s",
|
|
|
|
}
|
|
|
|
allocPends.AllocatedResources.Shared.DiskMB = 512
|
|
|
|
allocPends.AllocatedResources.Tasks["web"].Cpu = structs.AllocatedCpuResources{CpuShares: 512}
|
|
|
|
allocPends.AllocatedResources.Tasks["web"].Memory = structs.AllocatedMemoryResources{MemoryMB: 512}
|
|
|
|
require.Nil(client.addAlloc(allocPends, ""))
|
|
|
|
|
|
|
|
// wait for allocStops to stop running and for allocRuns to be pending/running
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
as, err := client.GetAllocState(allocPends.ID)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
} else if as.ClientStatus != structs.AllocClientStatusPending {
|
|
|
|
return false, fmt.Errorf("allocPends not yet pending: %#v", as)
|
|
|
|
}
|
|
|
|
|
|
|
|
as, err = client.GetAllocState(allocRuns.ID)
|
|
|
|
if as.ClientStatus != structs.AllocClientStatusRunning {
|
|
|
|
return false, fmt.Errorf("allocRuns not yet running: %#v", as)
|
|
|
|
} else if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
as, err = client.GetAllocState(allocStops.ID)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
} else if as.ClientStatus != structs.AllocClientStatusComplete {
|
|
|
|
return false, fmt.Errorf("allocStops not yet complete: %#v", as)
|
|
|
|
}
|
|
|
|
|
|
|
|
as, err = client.GetAllocState(allocFails.ID)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
} else if as.ClientStatus != structs.AllocClientStatusFailed {
|
|
|
|
return false, fmt.Errorf("allocFails not yet failed: %#v", as)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
require.NoError(err)
|
|
|
|
})
|
|
|
|
|
|
|
|
result := client.getAllocatedResources(client.config.Node)
|
|
|
|
|
2020-05-15 15:09:01 +00:00
|
|
|
// Ignore comparing networks for now
|
|
|
|
result.Flattened.Networks = nil
|
|
|
|
|
2019-05-07 19:54:36 +00:00
|
|
|
expected := structs.ComparableResources{
|
|
|
|
Flattened: structs.AllocatedTaskResources{
|
|
|
|
Cpu: structs.AllocatedCpuResources{
|
2021-03-20 02:08:27 +00:00
|
|
|
CpuShares: 768,
|
|
|
|
ReservedCores: []uint16{},
|
2019-05-07 19:54:36 +00:00
|
|
|
},
|
|
|
|
Memory: structs.AllocatedMemoryResources{
|
|
|
|
MemoryMB: 768,
|
|
|
|
},
|
|
|
|
Networks: nil,
|
|
|
|
},
|
|
|
|
Shared: structs.AllocatedSharedResources{
|
|
|
|
DiskMB: 768,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.EqualValues(t, expected, *result)
|
|
|
|
}
|
|
|
|
|
2018-12-11 17:20:51 +00:00
|
|
|
func TestClient_updateNodeFromDriverUpdatesAll(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
// initial update
|
|
|
|
{
|
|
|
|
info := &structs.DriverInfo{
|
|
|
|
Detected: true,
|
|
|
|
Healthy: false,
|
|
|
|
HealthDescription: "not healthy at start",
|
|
|
|
Attributes: map[string]string{
|
|
|
|
"node.mock.testattr1": "val1",
|
|
|
|
},
|
|
|
|
}
|
2018-12-18 03:54:25 +00:00
|
|
|
client.updateNodeFromDriver("mock", info)
|
|
|
|
n := client.config.Node
|
2018-12-11 17:20:51 +00:00
|
|
|
|
|
|
|
updatedInfo := *n.Drivers["mock"]
|
|
|
|
// compare without update time
|
|
|
|
updatedInfo.UpdateTime = info.UpdateTime
|
|
|
|
assert.EqualValues(t, updatedInfo, *info)
|
|
|
|
|
|
|
|
// check node attributes
|
|
|
|
assert.Equal(t, "val1", n.Attributes["node.mock.testattr1"])
|
|
|
|
}
|
|
|
|
|
|
|
|
// initial update
|
|
|
|
{
|
|
|
|
info := &structs.DriverInfo{
|
|
|
|
Detected: true,
|
|
|
|
Healthy: true,
|
|
|
|
HealthDescription: "healthy",
|
|
|
|
Attributes: map[string]string{
|
|
|
|
"node.mock.testattr1": "val2",
|
|
|
|
},
|
|
|
|
}
|
2018-12-18 03:54:25 +00:00
|
|
|
client.updateNodeFromDriver("mock", info)
|
|
|
|
n := client.Node()
|
2018-12-11 17:20:51 +00:00
|
|
|
|
|
|
|
updatedInfo := *n.Drivers["mock"]
|
|
|
|
// compare without update time
|
|
|
|
updatedInfo.UpdateTime = info.UpdateTime
|
|
|
|
assert.EqualValues(t, updatedInfo, *info)
|
|
|
|
|
|
|
|
// check node attributes are updated
|
|
|
|
assert.Equal(t, "val2", n.Attributes["node.mock.testattr1"])
|
|
|
|
|
|
|
|
// update once more with the same info, updateTime shouldn't change
|
2018-12-18 03:54:25 +00:00
|
|
|
client.updateNodeFromDriver("mock", info)
|
|
|
|
un := client.Node()
|
2018-12-11 17:20:51 +00:00
|
|
|
assert.EqualValues(t, n, un)
|
|
|
|
}
|
|
|
|
|
|
|
|
// update once more to unhealthy because why not
|
|
|
|
{
|
|
|
|
info := &structs.DriverInfo{
|
|
|
|
Detected: true,
|
|
|
|
Healthy: false,
|
|
|
|
HealthDescription: "lost track",
|
|
|
|
Attributes: map[string]string{
|
|
|
|
"node.mock.testattr1": "",
|
|
|
|
},
|
|
|
|
}
|
2018-12-18 03:54:25 +00:00
|
|
|
client.updateNodeFromDriver("mock", info)
|
|
|
|
n := client.Node()
|
2018-12-11 17:20:51 +00:00
|
|
|
|
|
|
|
updatedInfo := *n.Drivers["mock"]
|
|
|
|
// compare without update time
|
|
|
|
updatedInfo.UpdateTime = info.UpdateTime
|
|
|
|
assert.EqualValues(t, updatedInfo, *info)
|
|
|
|
|
|
|
|
// check node attributes are updated
|
|
|
|
assert.Equal(t, "", n.Attributes["node.mock.testattr1"])
|
|
|
|
|
|
|
|
// update once more with the same info, updateTime shouldn't change
|
2018-12-18 03:54:25 +00:00
|
|
|
client.updateNodeFromDriver("mock", info)
|
|
|
|
un := client.Node()
|
2018-12-11 17:20:51 +00:00
|
|
|
assert.EqualValues(t, n, un)
|
|
|
|
}
|
|
|
|
}
|
2019-08-27 21:19:44 +00:00
|
|
|
|
|
|
|
// COMPAT(0.12): remove once upgrading from 0.9.5 is no longer supported
|
2019-08-28 15:44:48 +00:00
|
|
|
func TestClient_hasLocalState(t *testing.T) {
|
2019-08-27 21:19:44 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
c, cleanup := TestClient(t, nil)
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
c.stateDB = state.NewMemDB(c.logger)
|
|
|
|
|
|
|
|
t.Run("plain alloc", func(t *testing.T) {
|
|
|
|
alloc := mock.BatchAlloc()
|
|
|
|
c.stateDB.PutAllocation(alloc)
|
|
|
|
|
2019-08-28 15:44:48 +00:00
|
|
|
require.False(t, c.hasLocalState(alloc))
|
2019-08-27 21:19:44 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("alloc with a task with local state", func(t *testing.T) {
|
|
|
|
alloc := mock.BatchAlloc()
|
|
|
|
taskName := alloc.Job.LookupTaskGroup(alloc.TaskGroup).Tasks[0].Name
|
|
|
|
ls := &trstate.LocalState{}
|
|
|
|
|
|
|
|
c.stateDB.PutAllocation(alloc)
|
|
|
|
c.stateDB.PutTaskRunnerLocalState(alloc.ID, taskName, ls)
|
|
|
|
|
2019-08-28 15:44:48 +00:00
|
|
|
require.True(t, c.hasLocalState(alloc))
|
2019-08-27 21:19:44 +00:00
|
|
|
})
|
|
|
|
|
2019-08-28 15:44:48 +00:00
|
|
|
t.Run("alloc with a task with task state", func(t *testing.T) {
|
2019-08-27 21:19:44 +00:00
|
|
|
alloc := mock.BatchAlloc()
|
|
|
|
taskName := alloc.Job.LookupTaskGroup(alloc.TaskGroup).Tasks[0].Name
|
|
|
|
ts := &structs.TaskState{
|
|
|
|
State: structs.TaskStateRunning,
|
|
|
|
}
|
|
|
|
|
|
|
|
c.stateDB.PutAllocation(alloc)
|
|
|
|
c.stateDB.PutTaskState(alloc.ID, taskName, ts)
|
|
|
|
|
2019-08-28 15:44:48 +00:00
|
|
|
require.True(t, c.hasLocalState(alloc))
|
2019-08-27 21:19:44 +00:00
|
|
|
})
|
|
|
|
}
|
2019-11-27 21:41:45 +00:00
|
|
|
|
|
|
|
func Test_verifiedTasks(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
logger := testlog.HCLogger(t)
|
|
|
|
|
|
|
|
// produce a result and check against expected tasks and/or error output
|
|
|
|
try := func(t *testing.T, a *structs.Allocation, tasks, expTasks []string, expErr string) {
|
|
|
|
result, err := verifiedTasks(logger, a, tasks)
|
|
|
|
if expErr != "" {
|
|
|
|
require.EqualError(t, err, expErr)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, expTasks, result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// create an alloc with TaskGroup=g1, tasks configured given g1Tasks
|
|
|
|
alloc := func(g1Tasks []string) *structs.Allocation {
|
|
|
|
var tasks []*structs.Task
|
|
|
|
for _, taskName := range g1Tasks {
|
|
|
|
tasks = append(tasks, &structs.Task{Name: taskName})
|
|
|
|
}
|
|
|
|
|
|
|
|
return &structs.Allocation{
|
|
|
|
Job: &structs.Job{
|
|
|
|
TaskGroups: []*structs.TaskGroup{
|
|
|
|
{Name: "g0", Tasks: []*structs.Task{{Name: "g0t1"}}},
|
|
|
|
{Name: "g1", Tasks: tasks},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
TaskGroup: "g1",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("nil alloc", func(t *testing.T) {
|
|
|
|
tasks := []string{"g1t1"}
|
|
|
|
try(t, nil, tasks, nil, "nil allocation")
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("missing task names", func(t *testing.T) {
|
|
|
|
var tasks []string
|
|
|
|
tgTasks := []string{"g1t1"}
|
|
|
|
try(t, alloc(tgTasks), tasks, nil, "missing task names")
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("missing group", func(t *testing.T) {
|
|
|
|
tasks := []string{"g1t1"}
|
|
|
|
a := alloc(tasks)
|
|
|
|
a.TaskGroup = "other"
|
|
|
|
try(t, a, tasks, nil, "group name in allocation is not present in job")
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("nonexistent task", func(t *testing.T) {
|
|
|
|
tasks := []string{"missing"}
|
|
|
|
try(t, alloc([]string{"task1"}), tasks, nil, `task "missing" not found in allocation`)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("matching task", func(t *testing.T) {
|
|
|
|
tasks := []string{"g1t1"}
|
|
|
|
try(t, alloc(tasks), tasks, tasks, "")
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("matching task subset", func(t *testing.T) {
|
|
|
|
tasks := []string{"g1t1", "g1t3"}
|
|
|
|
tgTasks := []string{"g1t1", "g1t2", "g1t3"}
|
|
|
|
try(t, alloc(tgTasks), tasks, tasks, "")
|
|
|
|
})
|
|
|
|
}
|