2019-02-26 15:56:45 +00:00
|
|
|
// +build !windows
|
|
|
|
|
|
|
|
package taskrunner
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"syscall"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/client/allocrunner/interfaces"
|
|
|
|
"github.com/hashicorp/nomad/helper/testlog"
|
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/hashicorp/nomad/testutil"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
// TestTaskRunner_LogmonHook_StartCrashStop simulates logmon crashing while the
|
|
|
|
// Nomad client is restarting and asserts failing to reattach to logmon causes
|
|
|
|
// a recoverable error (task restart).
|
|
|
|
func TestTaskRunner_LogmonHook_StartCrashStop(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
alloc := mock.BatchAlloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
|
|
|
|
dir, err := ioutil.TempDir("", "nomadtest")
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer func() {
|
|
|
|
require.NoError(t, os.RemoveAll(dir))
|
|
|
|
}()
|
|
|
|
|
|
|
|
hookConf := newLogMonHookConfig(task.Name, dir)
|
|
|
|
hook := newLogMonHook(hookConf, testlog.HCLogger(t))
|
|
|
|
|
|
|
|
req := interfaces.TaskPrestartRequest{
|
|
|
|
Task: task,
|
|
|
|
}
|
|
|
|
resp := interfaces.TaskPrestartResponse{}
|
|
|
|
|
|
|
|
// First start
|
|
|
|
require.NoError(t, hook.Prestart(context.Background(), &req, &resp))
|
|
|
|
defer hook.Stop(context.Background(), nil, nil)
|
|
|
|
|
2019-02-21 23:37:22 +00:00
|
|
|
origHookData := resp.State[logmonReattachKey]
|
2019-02-26 15:56:45 +00:00
|
|
|
require.NotEmpty(t, origHookData)
|
|
|
|
|
|
|
|
// Pluck PID out of reattach synthesize a crash
|
|
|
|
reattach := struct {
|
|
|
|
Pid int
|
|
|
|
}{}
|
|
|
|
require.NoError(t, json.Unmarshal([]byte(origHookData), &reattach))
|
|
|
|
pid := reattach.Pid
|
|
|
|
require.NotZero(t, pid)
|
|
|
|
|
|
|
|
proc, _ := os.FindProcess(pid)
|
|
|
|
|
|
|
|
// Assert logmon is running
|
|
|
|
require.NoError(t, proc.Signal(syscall.Signal(0)))
|
|
|
|
|
|
|
|
// Kill it
|
|
|
|
require.NoError(t, proc.Signal(os.Kill))
|
|
|
|
|
|
|
|
// Since signals are asynchronous wait for the process to die
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
err := proc.Signal(syscall.Signal(0))
|
|
|
|
return err != nil, fmt.Errorf("pid %d still running", pid)
|
|
|
|
}, func(err error) {
|
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Running prestart again should return a recoverable error with no
|
|
|
|
// reattach config to cause the task to be restarted with a new logmon.
|
2019-02-21 23:37:22 +00:00
|
|
|
req.PreviousState = map[string]string{
|
2019-02-26 15:56:45 +00:00
|
|
|
logmonReattachKey: origHookData,
|
|
|
|
}
|
|
|
|
resp = interfaces.TaskPrestartResponse{}
|
|
|
|
err = hook.Prestart(context.Background(), &req, &resp)
|
|
|
|
require.Error(t, err)
|
|
|
|
require.True(t, structs.IsRecoverable(err))
|
2019-02-21 23:37:22 +00:00
|
|
|
require.Empty(t, resp.State)
|
2019-02-26 15:56:45 +00:00
|
|
|
|
|
|
|
// Running stop should shutdown logmon
|
|
|
|
require.NoError(t, hook.Stop(context.Background(), nil, nil))
|
|
|
|
}
|