2016-01-13 18:19:53 +00:00
|
|
|
package nomad
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
2018-12-19 21:05:12 +00:00
|
|
|
msgpackrpc "github.com/hashicorp/net-rpc-msgpackrpc"
|
2017-10-09 03:53:50 +00:00
|
|
|
"github.com/hashicorp/nomad/acl"
|
2016-01-13 18:19:53 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/hashicorp/nomad/testutil"
|
2017-10-09 03:53:50 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2016-01-13 18:19:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestPeriodicEndpoint_Force(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, cleanupS1 := TestServer(t, func(c *Config) {
|
2016-01-13 18:19:53 +00:00
|
|
|
c.NumSchedulers = 0 // Prevent automatic dequeue
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2016-01-13 18:19:53 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create and insert a periodic job.
|
|
|
|
job := mock.PeriodicJob()
|
|
|
|
job.Periodic.ProhibitOverlap = true // Shouldn't affect anything.
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertJob(structs.MsgTypeTestSetup, 100, job); err != nil {
|
2016-01-13 18:19:53 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
s1.periodicDispatcher.Add(job)
|
|
|
|
|
|
|
|
// Force launch it.
|
|
|
|
req := &structs.PeriodicForceRequest{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: job.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2016-01-13 18:19:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the evaluation
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, resp.EvalID)
|
2016-01-13 18:19:53 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if eval == nil {
|
|
|
|
t.Fatalf("expected eval")
|
|
|
|
}
|
|
|
|
if eval.CreateIndex != resp.EvalCreateIndex {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-09 03:53:50 +00:00
|
|
|
func TestPeriodicEndpoint_Force_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, root, cleanupS1 := TestACLServer(t, func(c *Config) {
|
2017-10-09 03:53:50 +00:00
|
|
|
c.NumSchedulers = 0 // Prevent automatic dequeue
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2017-10-09 03:53:50 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
assert := assert.New(t)
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create and insert a periodic job.
|
|
|
|
job := mock.PeriodicJob()
|
|
|
|
job.Periodic.ProhibitOverlap = true // Shouldn't affect anything.
|
2020-10-19 13:30:15 +00:00
|
|
|
assert.Nil(state.UpsertJob(structs.MsgTypeTestSetup, 100, job))
|
2017-12-11 21:55:17 +00:00
|
|
|
err := s1.periodicDispatcher.Add(job)
|
2017-10-09 03:53:50 +00:00
|
|
|
assert.Nil(err)
|
|
|
|
|
|
|
|
// Force launch it.
|
|
|
|
req := &structs.PeriodicForceRequest{
|
|
|
|
JobID: job.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with no token and expect permission denied
|
|
|
|
{
|
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp)
|
|
|
|
assert.NotNil(err)
|
|
|
|
assert.Contains(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with an invalid token and expect permission denied
|
|
|
|
{
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "invalid", mock.NodePolicy(acl.PolicyWrite))
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = invalidToken.SecretID
|
2017-10-09 03:53:50 +00:00
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp)
|
|
|
|
assert.NotNil(err)
|
|
|
|
assert.Contains(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response with a valid token
|
|
|
|
{
|
|
|
|
policy := mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilitySubmitJob})
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "valid", policy)
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = token.SecretID
|
2017-10-09 03:53:50 +00:00
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp))
|
2020-02-03 16:59:00 +00:00
|
|
|
assert.NotEqual(uint64(0), resp.Index)
|
2017-10-09 03:53:50 +00:00
|
|
|
|
|
|
|
// Lookup the evaluation
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, resp.EvalID)
|
|
|
|
assert.Nil(err)
|
2018-12-19 21:05:12 +00:00
|
|
|
if assert.NotNil(eval) {
|
|
|
|
assert.Equal(eval.CreateIndex, resp.EvalCreateIndex)
|
|
|
|
}
|
2017-10-09 03:53:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response with management token
|
|
|
|
{
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = root.SecretID
|
2017-10-09 03:53:50 +00:00
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp))
|
2020-02-03 16:59:00 +00:00
|
|
|
assert.NotEqual(uint64(0), resp.Index)
|
2017-10-09 03:53:50 +00:00
|
|
|
|
|
|
|
// Lookup the evaluation
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, resp.EvalID)
|
|
|
|
assert.Nil(err)
|
2018-12-19 21:05:12 +00:00
|
|
|
if assert.NotNil(eval) {
|
|
|
|
assert.Equal(eval.CreateIndex, resp.EvalCreateIndex)
|
|
|
|
}
|
2017-10-09 03:53:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-13 18:19:53 +00:00
|
|
|
func TestPeriodicEndpoint_Force_NonPeriodic(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2019-12-04 00:15:11 +00:00
|
|
|
|
|
|
|
s1, cleanupS1 := TestServer(t, func(c *Config) {
|
2016-01-13 18:19:53 +00:00
|
|
|
c.NumSchedulers = 0 // Prevent automatic dequeue
|
|
|
|
})
|
2019-12-04 00:15:11 +00:00
|
|
|
defer cleanupS1()
|
2016-01-13 18:19:53 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create and insert a non-periodic job.
|
|
|
|
job := mock.Job()
|
2020-10-19 13:30:15 +00:00
|
|
|
if err := state.UpsertJob(structs.MsgTypeTestSetup, 100, job); err != nil {
|
2016-01-13 18:19:53 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Force launch it.
|
|
|
|
req := &structs.PeriodicForceRequest{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: job.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2016-01-13 18:19:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.PeriodicForceResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Periodic.Force", req, &resp); err == nil {
|
2018-03-11 18:37:05 +00:00
|
|
|
t.Fatalf("Force on non-periodic job should err")
|
2016-01-13 18:19:53 +00:00
|
|
|
}
|
|
|
|
}
|