open-nomad/client/driver/exec_test.go

426 lines
10 KiB
Go
Raw Normal View History

2015-08-20 23:50:28 +00:00
package driver
import (
"bytes"
"context"
"fmt"
"io/ioutil"
"path/filepath"
"reflect"
"runtime"
"strings"
2015-08-20 23:50:28 +00:00
"testing"
2015-08-29 23:20:07 +00:00
"time"
2015-08-20 23:53:43 +00:00
"github.com/hashicorp/nomad/client/config"
2016-01-06 02:02:11 +00:00
"github.com/hashicorp/nomad/client/driver/env"
cstructs "github.com/hashicorp/nomad/client/structs"
2015-08-20 23:53:43 +00:00
"github.com/hashicorp/nomad/nomad/structs"
"github.com/hashicorp/nomad/testutil"
2015-09-25 23:49:14 +00:00
ctestutils "github.com/hashicorp/nomad/client/testutil"
2015-08-20 23:50:28 +00:00
)
// Test that we do not enable exec on non-linux machines
func TestExecDriver_Fingerprint_NonLinux(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
if runtime.GOOS == "linux" {
t.Skip("Test only available not on Linux")
}
d := NewExecDriver(&DriverContext{})
node := &structs.Node{}
request := &cstructs.FingerprintRequest{Config: &config.Config{}, Node: node}
var response cstructs.FingerprintResponse
err := d.Fingerprint(request, &response)
if err != nil {
t.Fatalf("err: %v", err)
}
if response.Detected {
t.Fatalf("expected response to be applicable")
}
}
2015-08-20 23:50:28 +00:00
func TestExecDriver_Fingerprint(t *testing.T) {
2017-07-23 03:38:03 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
2015-09-25 23:49:14 +00:00
ctestutils.ExecCompatible(t)
2016-08-23 21:31:18 +00:00
task := &structs.Task{
Name: "foo",
Driver: "exec",
2016-08-23 21:31:18 +00:00
Resources: structs.DefaultResources(),
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
2015-08-20 23:53:43 +00:00
node := &structs.Node{
Attributes: map[string]string{
"unique.cgroup.mountpoint": "/sys/fs/cgroup",
},
2015-08-20 23:53:43 +00:00
}
request := &cstructs.FingerprintRequest{Config: &config.Config{}, Node: node}
var response cstructs.FingerprintResponse
err := d.Fingerprint(request, &response)
2015-08-20 23:50:28 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
2018-01-31 22:03:55 +00:00
if !response.Detected {
t.Fatalf("expected response to be applicable")
}
if response.Attributes == nil || response.Attributes["driver.exec"] == "" {
2015-08-20 23:53:43 +00:00
t.Fatalf("missing driver")
}
2015-08-20 23:50:28 +00:00
}
2015-08-29 23:20:07 +00:00
2015-09-25 23:49:14 +00:00
func TestExecDriver_StartOpen_Wait(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
2015-09-25 23:49:14 +00:00
ctestutils.ExecCompatible(t)
2015-08-29 23:20:07 +00:00
task := &structs.Task{
Name: "sleep",
Driver: "exec",
Config: map[string]interface{}{
2015-08-29 23:20:07 +00:00
"command": "/bin/sleep",
"args": []string{"5"},
2015-08-29 23:20:07 +00:00
},
2016-02-10 21:54:54 +00:00
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: basicResources,
2015-08-29 23:20:07 +00:00
}
2015-09-25 23:49:14 +00:00
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
2015-09-25 23:49:14 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
// Attempt to open
handle2, err := d.Open(ctx.ExecCtx, resp.Handle.ID())
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
if handle2 == nil {
t.Fatalf("missing handle")
}
2016-02-04 18:09:52 +00:00
resp.Handle.Kill()
2016-02-04 18:09:52 +00:00
handle2.Kill()
2015-08-29 23:20:07 +00:00
}
2015-08-29 23:20:07 +00:00
func TestExecDriver_Start_Wait(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
2015-09-25 23:49:14 +00:00
ctestutils.ExecCompatible(t)
2015-08-29 23:20:07 +00:00
task := &structs.Task{
Name: "sleep",
Driver: "exec",
Config: map[string]interface{}{
2015-08-29 23:20:07 +00:00
"command": "/bin/sleep",
"args": []string{"2"},
2015-08-29 23:20:07 +00:00
},
2016-02-10 21:54:54 +00:00
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: basicResources,
2015-08-29 23:20:07 +00:00
}
2015-09-25 23:49:14 +00:00
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
2015-09-25 23:49:14 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
// Update should be a no-op
err = resp.Handle.Update(task)
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
// Task should terminate quickly
select {
case res := <-resp.Handle.WaitCh():
if !res.Successful() {
t.Fatalf("err: %v", res)
2015-08-29 23:20:07 +00:00
}
2016-01-21 23:24:24 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*5) * time.Second):
2015-08-29 23:20:07 +00:00
t.Fatalf("timeout")
}
}
func TestExecDriver_Start_Wait_AllocDir(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
ctestutils.ExecCompatible(t)
exp := []byte{'w', 'i', 'n'}
file := "output.txt"
task := &structs.Task{
Name: "sleep",
Driver: "exec",
Config: map[string]interface{}{
"command": "/bin/bash",
"args": []string{
"-c",
2016-02-05 01:21:00 +00:00
fmt.Sprintf(`sleep 1; echo -n %s > ${%s}/%s`, string(exp), env.AllocDir, file),
},
},
2016-02-10 21:54:54 +00:00
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: basicResources,
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
// Task should terminate quickly
select {
case res := <-resp.Handle.WaitCh():
if !res.Successful() {
t.Fatalf("err: %v", res)
}
2016-01-21 23:24:24 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*5) * time.Second):
t.Fatalf("timeout")
}
// Check that data was written to the shared alloc directory.
outputFile := filepath.Join(ctx.AllocDir.SharedDir, file)
act, err := ioutil.ReadFile(outputFile)
if err != nil {
t.Fatalf("Couldn't read expected output: %v", err)
}
if !reflect.DeepEqual(act, exp) {
t.Fatalf("Command outputted %v; want %v", act, exp)
}
}
2015-08-29 23:20:07 +00:00
func TestExecDriver_Start_Kill_Wait(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
2015-09-25 23:49:14 +00:00
ctestutils.ExecCompatible(t)
2015-08-29 23:20:07 +00:00
task := &structs.Task{
Name: "sleep",
Driver: "exec",
Config: map[string]interface{}{
2015-08-29 23:20:07 +00:00
"command": "/bin/sleep",
2016-02-09 17:43:40 +00:00
"args": []string{"100"},
2015-08-29 23:20:07 +00:00
},
2016-02-10 21:54:54 +00:00
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
2016-02-09 17:43:40 +00:00
Resources: basicResources,
KillTimeout: 10 * time.Second,
2015-08-29 23:20:07 +00:00
}
2015-09-25 23:49:14 +00:00
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
2015-09-25 23:49:14 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
go func() {
time.Sleep(100 * time.Millisecond)
err := resp.Handle.Kill()
2015-08-29 23:20:07 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
}()
// Task should terminate quickly
select {
case res := <-resp.Handle.WaitCh():
if res.Successful() {
2015-09-26 00:55:29 +00:00
t.Fatal("should err")
2015-08-29 23:20:07 +00:00
}
2016-01-21 23:24:24 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*10) * time.Second):
2015-08-29 23:20:07 +00:00
t.Fatalf("timeout")
}
}
func TestExecDriverUser(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
ctestutils.ExecCompatible(t)
task := &structs.Task{
Name: "sleep",
Driver: "exec",
User: "alice",
Config: map[string]interface{}{
"command": "/bin/sleep",
"args": []string{"100"},
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: basicResources,
KillTimeout: 10 * time.Second,
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err == nil {
resp.Handle.Kill()
t.Fatalf("Should've failed")
}
msg := "user alice"
if !strings.Contains(err.Error(), msg) {
t.Fatalf("Expecting '%v' in '%v'", msg, err)
}
}
// TestExecDriver_HandlerExec ensures the exec driver's handle properly
// executes commands inside the container.
func TestExecDriver_HandlerExec(t *testing.T) {
if !testutil.IsTravis() {
t.Parallel()
}
ctestutils.ExecCompatible(t)
task := &structs.Task{
Name: "sleep",
Driver: "exec",
Config: map[string]interface{}{
"command": "/bin/sleep",
"args": []string{"9000"},
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: basicResources,
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewExecDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("prestart err: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
handle := resp.Handle
// Exec a command that should work and dump the environment
out, code, err := handle.Exec(context.Background(), "/bin/sh", []string{"-c", "env | grep ^NOMAD"})
if err != nil {
t.Fatalf("error exec'ing stat: %v", err)
}
if code != 0 {
t.Fatalf("expected `stat /alloc` to succeed but exit code was: %d", code)
}
// Assert exec'd commands are run in a task-like environment
scriptEnv := make(map[string]string)
for _, line := range strings.Split(string(out), "\n") {
if line == "" {
continue
}
parts := strings.SplitN(string(line), "=", 2)
if len(parts) != 2 {
t.Fatalf("Invalid env var: %q", line)
}
scriptEnv[parts[0]] = parts[1]
}
if v, ok := scriptEnv["NOMAD_SECRETS_DIR"]; !ok || v != "/secrets" {
t.Errorf("Expected NOMAD_SECRETS_DIR=/secrets but found=%t value=%q", ok, v)
}
if v, ok := scriptEnv["NOMAD_ALLOC_ID"]; !ok || v != ctx.DriverCtx.allocID {
2017-05-11 20:08:08 +00:00
t.Errorf("Expected NOMAD_SECRETS_DIR=%q but found=%t value=%q", ctx.DriverCtx.allocID, ok, v)
}
// Assert cgroup membership
out, code, err = handle.Exec(context.Background(), "/bin/cat", []string{"/proc/self/cgroup"})
if err != nil {
t.Fatalf("error exec'ing cat /proc/self/cgroup: %v", err)
}
if code != 0 {
t.Fatalf("expected `cat /proc/self/cgroup` to succeed but exit code was: %d", code)
}
found := false
for _, line := range strings.Split(string(out), "\n") {
// Every cgroup entry should be /nomad/$ALLOC_ID
if line == "" {
continue
}
if !strings.Contains(line, ":/nomad/") {
t.Errorf("Not a member of the alloc's cgroup: expected=...:/nomad/... -- found=%q", line)
continue
}
found = true
}
if !found {
t.Errorf("exec'd command isn't in the task's cgroup")
}
// Exec a command that should fail
out, code, err = handle.Exec(context.Background(), "/usr/bin/stat", []string{"lkjhdsaflkjshowaisxmcvnlia"})
if err != nil {
t.Fatalf("error exec'ing stat: %v", err)
}
if code == 0 {
t.Fatalf("expected `stat` to fail but exit code was: %d", code)
}
if expected := "No such file or directory"; !bytes.Contains(out, []byte(expected)) {
t.Fatalf("expected output to contain %q but found: %q", expected, out)
}
if err := handle.Kill(); err != nil {
t.Fatalf("error killing exec handle: %v", err)
}
}