open-nomad/command/job_plan_test.go

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

347 lines
8.8 KiB
Go
Raw Normal View History

2016-05-17 20:32:47 +00:00
package command
import (
"io/ioutil"
"os"
2018-11-06 15:52:32 +00:00
"strconv"
2016-05-17 20:32:47 +00:00
"strings"
"testing"
2018-10-30 23:26:23 +00:00
"github.com/hashicorp/nomad/api"
"github.com/hashicorp/nomad/ci"
2017-02-16 23:18:38 +00:00
"github.com/hashicorp/nomad/testutil"
2016-05-17 20:32:47 +00:00
"github.com/mitchellh/cli"
"github.com/shoenig/test/must"
2018-11-06 15:52:32 +00:00
"github.com/stretchr/testify/require"
2016-05-17 20:32:47 +00:00
)
func TestPlanCommand_Implements(t *testing.T) {
ci.Parallel(t)
2018-03-21 00:37:28 +00:00
var _ cli.Command = &JobRunCommand{}
2016-05-17 20:32:47 +00:00
}
func TestPlanCommand_Fails(t *testing.T) {
ci.Parallel(t)
2016-05-17 20:32:47 +00:00
2017-02-16 23:18:38 +00:00
// Create a server
s := testutil.NewTestServer(t, nil)
defer s.Stop()
2020-10-05 14:07:41 +00:00
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui, flagAddress: "http://" + s.HTTPAddr}}
2017-02-16 23:18:38 +00:00
2016-05-17 20:32:47 +00:00
// Fails on misuse
2016-08-03 18:09:50 +00:00
if code := cmd.Run([]string{"some", "bad", "args"}); code != 255 {
2016-05-17 20:32:47 +00:00
t.Fatalf("expected exit code 1, got: %d", code)
}
if out := ui.ErrorWriter.String(); !strings.Contains(out, commandErrorText(cmd)) {
2016-05-17 20:32:47 +00:00
t.Fatalf("expected help output, got: %s", out)
}
ui.ErrorWriter.Reset()
// Fails when specified file does not exist
2016-08-03 18:09:50 +00:00
if code := cmd.Run([]string{"/unicorns/leprechauns"}); code != 255 {
t.Fatalf("expect exit 255, got: %d", code)
2016-05-17 20:32:47 +00:00
}
2016-08-17 08:02:43 +00:00
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Error getting job struct") {
t.Fatalf("expect getting job struct error, got: %s", out)
2016-05-17 20:32:47 +00:00
}
ui.ErrorWriter.Reset()
// Fails on invalid HCL
fh1, err := ioutil.TempFile("", "nomad")
if err != nil {
t.Fatalf("err: %s", err)
}
defer os.Remove(fh1.Name())
if _, err := fh1.WriteString("nope"); err != nil {
t.Fatalf("err: %s", err)
}
2016-08-03 18:09:50 +00:00
if code := cmd.Run([]string{fh1.Name()}); code != 255 {
t.Fatalf("expect exit 255, got: %d", code)
2016-05-17 20:32:47 +00:00
}
2016-08-17 08:02:43 +00:00
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Error getting job struct") {
t.Fatalf("expect parsing error, got: %s", out)
2016-05-17 20:32:47 +00:00
}
ui.ErrorWriter.Reset()
// Fails on invalid job spec
fh2, err := ioutil.TempFile("", "nomad")
if err != nil {
t.Fatalf("err: %s", err)
}
defer os.Remove(fh2.Name())
if _, err := fh2.WriteString(`job "job1" {}`); err != nil {
t.Fatalf("err: %s", err)
}
2016-08-03 18:09:50 +00:00
if code := cmd.Run([]string{fh2.Name()}); code != 255 {
t.Fatalf("expect exit 255, got: %d", code)
2016-05-17 20:32:47 +00:00
}
2017-02-16 23:18:38 +00:00
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Error during plan") {
2016-05-17 20:32:47 +00:00
t.Fatalf("expect validation error, got: %s", out)
}
ui.ErrorWriter.Reset()
// Fails on connection failure (requires a valid job)
fh3, err := ioutil.TempFile("", "nomad")
if err != nil {
t.Fatalf("err: %s", err)
}
defer os.Remove(fh3.Name())
_, err = fh3.WriteString(`
job "job1" {
type = "service"
datacenters = [ "dc1" ]
group "group1" {
count = 1
task "task1" {
driver = "exec"
resources {
2016-05-17 20:32:47 +00:00
cpu = 1000
memory = 512
}
}
}
}`)
if err != nil {
t.Fatalf("err: %s", err)
}
2016-08-03 18:09:50 +00:00
if code := cmd.Run([]string{"-address=nope", fh3.Name()}); code != 255 {
t.Fatalf("expected exit code 255, got: %d", code)
2016-05-17 20:32:47 +00:00
}
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Error during plan") {
t.Fatalf("expected failed query error, got: %s", out)
}
}
func TestPlanCommand_hcl1_hcl2_strict(t *testing.T) {
ci.Parallel(t)
_, _, addr := testServer(t, false, nil)
t.Run("-hcl1 implies -hcl2-strict is false", func(t *testing.T) {
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
got := cmd.Run([]string{
"-hcl1", "-hcl2-strict",
"-address", addr,
"assets/example-short.nomad",
})
// Exit code 1 here means that an alloc will be created, which is
// expected.
require.Equal(t, 1, got)
})
}
func TestPlanCommand_From_STDIN(t *testing.T) {
ci.Parallel(t)
stdinR, stdinW, err := os.Pipe()
if err != nil {
t.Fatalf("err: %s", err)
}
2020-10-05 14:07:41 +00:00
ui := cli.NewMockUi()
2018-03-21 00:37:28 +00:00
cmd := &JobPlanCommand{
2016-08-16 10:49:14 +00:00
Meta: Meta{Ui: ui},
JobGetter: JobGetter{testStdin: stdinR},
}
go func() {
stdinW.WriteString(`
job "job1" {
type = "service"
datacenters = [ "dc1" ]
group "group1" {
count = 1
task "task1" {
driver = "exec"
resources {
cpu = 1000
memory = 512
}
}
}
}`)
stdinW.Close()
}()
args := []string{"-"}
2016-08-03 18:09:50 +00:00
if code := cmd.Run(args); code != 255 {
2016-08-17 08:02:43 +00:00
t.Fatalf("expected exit code 255, got %d: %q", code, ui.ErrorWriter.String())
}
if out := ui.ErrorWriter.String(); !strings.Contains(out, "connection refused") {
2016-08-17 08:02:43 +00:00
t.Fatalf("expected connection refused error, got: %s", out)
}
ui.ErrorWriter.Reset()
}
func TestPlanCommand_From_Files(t *testing.T) {
// Create a Vault server
v := testutil.NewTestVault(t)
defer v.Stop()
// Create a Nomad server
s := testutil.NewTestServer(t, func(c *testutil.TestServerConfig) {
c.Vault.Address = v.HTTPAddr
c.Vault.Enabled = true
c.Vault.AllowUnauthenticated = false
c.Vault.Token = v.RootToken
})
defer s.Stop()
t.Run("fail to place", func(t *testing.T) {
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
args := []string{"-address", "http://" + s.HTTPAddr, "testdata/example-basic.nomad"}
code := cmd.Run(args)
require.Equal(t, 1, code) // no client running, fail to place
must.StrContains(t, ui.OutputWriter.String(), "WARNING: Failed to place all allocations.")
})
t.Run("vault no token", func(t *testing.T) {
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
args := []string{"-address", "http://" + s.HTTPAddr, "testdata/example-vault.nomad"}
code := cmd.Run(args)
must.Eq(t, 255, code)
must.StrContains(t, ui.ErrorWriter.String(), "* Vault used in the job but missing Vault token")
})
t.Run("vault bad token via flag", func(t *testing.T) {
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
args := []string{"-address", "http://" + s.HTTPAddr, "-vault-token=abc123", "testdata/example-vault.nomad"}
code := cmd.Run(args)
must.Eq(t, 255, code)
must.StrContains(t, ui.ErrorWriter.String(), "* bad token")
})
t.Run("vault bad token via env", func(t *testing.T) {
t.Setenv("VAULT_TOKEN", "abc123")
ui := cli.NewMockUi()
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
args := []string{"-address", "http://" + s.HTTPAddr, "testdata/example-vault.nomad"}
code := cmd.Run(args)
must.Eq(t, 255, code)
must.StrContains(t, ui.ErrorWriter.String(), "* bad token")
})
}
func TestPlanCommand_From_URL(t *testing.T) {
ci.Parallel(t)
2020-10-05 14:07:41 +00:00
ui := cli.NewMockUi()
2018-03-21 00:37:28 +00:00
cmd := &JobPlanCommand{
Meta: Meta{Ui: ui},
}
args := []string{"https://example.com/foo/bar"}
if code := cmd.Run(args); code != 255 {
t.Fatalf("expected exit code 255, got %d: %q", code, ui.ErrorWriter.String())
}
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Error getting jobfile") {
t.Fatalf("expected error getting jobfile, got: %s", out)
}
}
2018-10-30 23:26:23 +00:00
func TestPlanCommad_Preemptions(t *testing.T) {
ci.Parallel(t)
2020-10-05 14:07:41 +00:00
ui := cli.NewMockUi()
2018-10-30 23:26:23 +00:00
cmd := &JobPlanCommand{Meta: Meta{Ui: ui}}
2018-11-06 15:52:32 +00:00
require := require.New(t)
2018-10-30 23:26:23 +00:00
// Only one preempted alloc
resp1 := &api.JobPlanResponse{
Annotations: &api.PlanAnnotations{
PreemptedAllocs: []*api.AllocationListStub{
{
ID: "alloc1",
JobID: "jobID1",
TaskGroup: "meta",
JobType: "batch",
Namespace: "test",
},
},
},
}
cmd.addPreemptions(resp1)
out := ui.OutputWriter.String()
require.Contains(out, "Alloc ID")
require.Contains(out, "alloc1")
// Less than 10 unique job ids
var preemptedAllocs []*api.AllocationListStub
for i := 0; i < 12; i++ {
job_id := "job" + strconv.Itoa(i%4)
alloc := &api.AllocationListStub{
ID: "alloc",
JobID: job_id,
TaskGroup: "meta",
JobType: "batch",
Namespace: "test",
}
preemptedAllocs = append(preemptedAllocs, alloc)
}
resp2 := &api.JobPlanResponse{
Annotations: &api.PlanAnnotations{
PreemptedAllocs: preemptedAllocs,
},
}
ui.OutputWriter.Reset()
cmd.addPreemptions(resp2)
out = ui.OutputWriter.String()
require.Contains(out, "Job ID")
require.Contains(out, "Namespace")
// More than 10 unique job IDs
preemptedAllocs = make([]*api.AllocationListStub, 0)
2018-11-08 15:04:49 +00:00
var job_type string
2018-10-30 23:26:23 +00:00
for i := 0; i < 20; i++ {
job_id := "job" + strconv.Itoa(i)
if i%2 == 0 {
job_type = "service"
} else {
job_type = "batch"
}
alloc := &api.AllocationListStub{
ID: "alloc",
JobID: job_id,
TaskGroup: "meta",
JobType: job_type,
Namespace: "test",
}
preemptedAllocs = append(preemptedAllocs, alloc)
}
resp3 := &api.JobPlanResponse{
Annotations: &api.PlanAnnotations{
PreemptedAllocs: preemptedAllocs,
},
}
ui.OutputWriter.Reset()
cmd.addPreemptions(resp3)
out = ui.OutputWriter.String()
require.Contains(out, "Job Type")
require.Contains(out, "batch")
require.Contains(out, "service")
}
func TestPlanCommad_JSON(t *testing.T) {
ui := cli.NewMockUi()
cmd := &JobPlanCommand{
Meta: Meta{Ui: ui},
}
args := []string{
"-address=http://nope",
"-json",
"testdata/example-short.json",
}
code := cmd.Run(args)
require.Equal(t, 255, code)
require.Contains(t, ui.ErrorWriter.String(), "Error during plan: Put")
}