2018-12-07 01:24:43 +00:00
|
|
|
package state_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"compress/gzip"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/client/allocrunner"
|
|
|
|
"github.com/hashicorp/nomad/client/allocwatcher"
|
|
|
|
clientconfig "github.com/hashicorp/nomad/client/config"
|
|
|
|
"github.com/hashicorp/nomad/client/consul"
|
|
|
|
"github.com/hashicorp/nomad/client/devicemanager"
|
|
|
|
dmstate "github.com/hashicorp/nomad/client/devicemanager/state"
|
|
|
|
"github.com/hashicorp/nomad/client/pluginmanager/drivermanager"
|
|
|
|
. "github.com/hashicorp/nomad/client/state"
|
|
|
|
"github.com/hashicorp/nomad/client/vaultclient"
|
|
|
|
"github.com/hashicorp/nomad/helper/boltdd"
|
|
|
|
"github.com/hashicorp/nomad/helper/testlog"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2019-01-15 01:02:44 +00:00
|
|
|
pstructs "github.com/hashicorp/nomad/plugins/shared/structs"
|
2018-12-07 01:24:43 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
// TestBoltStateDB_Upgrade_Ok asserts upgading an old state db does not error
|
|
|
|
// during upgrade and restore.
|
|
|
|
func TestBoltStateDB_UpgradeOld_Ok(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
files, err := filepath.Glob("testdata/*.db*")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
for _, fn := range files {
|
|
|
|
t.Run(fn, func(t *testing.T) {
|
|
|
|
dir, err := ioutil.TempDir("", "nomadtest")
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
|
|
|
var src io.ReadCloser
|
|
|
|
src, err = os.Open(fn)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer src.Close()
|
|
|
|
|
|
|
|
// testdata may be gzip'd; decode on copy
|
|
|
|
if strings.HasSuffix(fn, ".gz") {
|
|
|
|
src, err = gzip.NewReader(src)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
dst, err := os.Create(filepath.Join(dir, "state.db"))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Copy test files before testing them for safety
|
|
|
|
_, err = io.Copy(dst, src)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.NoError(t, src.Close())
|
|
|
|
|
|
|
|
dbI, err := NewBoltStateDB(testlog.HCLogger(t), dir)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer dbI.Close()
|
|
|
|
|
|
|
|
db := dbI.(*BoltStateDB)
|
|
|
|
|
|
|
|
// Simply opening old files should *not* alter them
|
|
|
|
require.NoError(t, db.DB().View(func(tx *boltdd.Tx) error {
|
|
|
|
b := tx.Bucket([]byte("meta"))
|
|
|
|
if b != nil {
|
|
|
|
return fmt.Errorf("meta bucket found but should not exist yet!")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}))
|
|
|
|
|
|
|
|
needsUpgrade, err := NeedsUpgrade(db.DB().BoltDB())
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.True(t, needsUpgrade)
|
|
|
|
|
|
|
|
// Attept the upgrade
|
|
|
|
require.NoError(t, db.Upgrade())
|
|
|
|
|
|
|
|
needsUpgrade, err = NeedsUpgrade(db.DB().BoltDB())
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.False(t, needsUpgrade)
|
|
|
|
|
|
|
|
// Ensure Allocations can be restored and
|
|
|
|
// NewAR/AR.Restore do not error.
|
|
|
|
allocs, errs, err := db.GetAllAllocations()
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Len(t, errs, 0)
|
|
|
|
|
|
|
|
for _, alloc := range allocs {
|
|
|
|
checkUpgradedAlloc(t, dir, db, alloc)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should be nil for all upgrades
|
|
|
|
ps, err := db.GetDevicePluginState()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Nil(t, ps)
|
|
|
|
|
|
|
|
ps = &dmstate.PluginState{
|
2019-01-15 01:02:44 +00:00
|
|
|
ReattachConfigs: map[string]*pstructs.ReattachConfig{
|
2018-12-19 00:49:21 +00:00
|
|
|
"test": {Pid: 1},
|
2018-12-07 01:24:43 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
require.NoError(t, db.PutDevicePluginState(ps))
|
|
|
|
|
|
|
|
require.NoError(t, db.Close())
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkUpgradedAlloc creates and restores an AllocRunner from an upgraded
|
|
|
|
// database.
|
|
|
|
//
|
|
|
|
// It does not call AR.Run as its intended to be used against a wide test
|
|
|
|
// corpus in testdata that may be expensive to run and require unavailable
|
|
|
|
// dependencies.
|
|
|
|
func checkUpgradedAlloc(t *testing.T, path string, db StateDB, alloc *structs.Allocation) {
|
|
|
|
_, err := db.GetDeploymentStatus(alloc.ID)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
tg := alloc.Job.LookupTaskGroup(alloc.TaskGroup)
|
|
|
|
for _, task := range tg.Tasks {
|
|
|
|
_, _, err := db.GetTaskRunnerState(alloc.ID, task.Name)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
clientConf, cleanup := clientconfig.TestClientConfig(t)
|
|
|
|
|
|
|
|
// Does *not* cleanup overridden StateDir below. That's left alone for
|
|
|
|
// the caller to cleanup.
|
|
|
|
defer cleanup()
|
|
|
|
|
|
|
|
clientConf.StateDir = path
|
|
|
|
|
|
|
|
conf := &allocrunner.Config{
|
|
|
|
Alloc: alloc,
|
|
|
|
Logger: clientConf.Logger,
|
|
|
|
ClientConfig: clientConf,
|
|
|
|
StateDB: db,
|
|
|
|
Consul: consul.NewMockConsulServiceClient(t, clientConf.Logger),
|
|
|
|
Vault: vaultclient.NewMockVaultClient(),
|
|
|
|
StateUpdater: &allocrunner.MockStateUpdater{},
|
|
|
|
PrevAllocWatcher: allocwatcher.NoopPrevAlloc{},
|
|
|
|
PrevAllocMigrator: allocwatcher.NoopPrevAlloc{},
|
|
|
|
DeviceManager: devicemanager.NoopMockManager(),
|
|
|
|
DriverManager: drivermanager.TestDriverManager(t),
|
|
|
|
}
|
|
|
|
ar, err := allocrunner.NewAllocRunner(conf)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// AllocRunner.Restore should not error
|
|
|
|
require.NoError(t, ar.Restore())
|
|
|
|
}
|