open-nomad/nomad/structs/funcs_test.go

385 lines
7.7 KiB
Go
Raw Normal View History

2015-08-05 00:19:05 +00:00
package structs
2015-09-07 22:08:50 +00:00
import (
2018-01-12 21:58:44 +00:00
"encoding/base64"
2016-08-31 20:40:43 +00:00
"fmt"
2015-09-07 22:08:50 +00:00
"testing"
2017-08-20 21:30:27 +00:00
lru "github.com/hashicorp/golang-lru"
"github.com/hashicorp/nomad/helper/uuid"
"github.com/stretchr/testify/assert"
2015-09-07 22:08:50 +00:00
)
2015-08-05 00:19:05 +00:00
func TestRemoveAllocs(t *testing.T) {
l := []*Allocation{
2017-09-26 22:26:33 +00:00
{ID: "foo"},
{ID: "bar"},
{ID: "baz"},
{ID: "zip"},
2015-08-05 00:19:05 +00:00
}
out := RemoveAllocs(l, []*Allocation{l[1], l[3]})
2015-08-05 00:19:05 +00:00
if len(out) != 2 {
t.Fatalf("bad: %#v", out)
}
if out[0].ID != "foo" && out[1].ID != "baz" {
t.Fatalf("bad: %#v", out)
}
}
2015-08-05 00:28:19 +00:00
2015-12-15 03:20:57 +00:00
func TestFilterTerminalAllocs(t *testing.T) {
2015-08-23 01:27:51 +00:00
l := []*Allocation{
2017-09-26 22:26:33 +00:00
{
2016-08-31 20:40:43 +00:00
ID: "bar",
Name: "myname1",
DesiredStatus: AllocDesiredStatusEvict,
},
2017-09-26 22:26:33 +00:00
{ID: "baz", DesiredStatus: AllocDesiredStatusStop},
{
ID: "foo",
DesiredStatus: AllocDesiredStatusRun,
ClientStatus: AllocClientStatusPending,
},
2017-09-26 22:26:33 +00:00
{
ID: "bam",
2016-08-31 20:40:43 +00:00
Name: "myname",
DesiredStatus: AllocDesiredStatusRun,
ClientStatus: AllocClientStatusComplete,
2016-08-31 20:40:43 +00:00
CreateIndex: 5,
},
2017-09-26 22:26:33 +00:00
{
2016-08-31 20:40:43 +00:00
ID: "lol",
Name: "myname",
DesiredStatus: AllocDesiredStatusRun,
ClientStatus: AllocClientStatusComplete,
CreateIndex: 2,
},
2015-08-23 01:27:51 +00:00
}
out, terminalAllocs := FilterTerminalAllocs(l)
if len(out) != 1 {
2015-08-23 01:27:51 +00:00
t.Fatalf("bad: %#v", out)
}
if out[0].ID != "foo" {
2015-08-23 01:27:51 +00:00
t.Fatalf("bad: %#v", out)
}
2016-08-31 20:40:43 +00:00
if len(terminalAllocs) != 3 {
for _, o := range terminalAllocs {
fmt.Printf("%#v \n", o)
}
t.Fatalf("bad: %#v", terminalAllocs)
}
2016-08-31 20:40:43 +00:00
if terminalAllocs["myname"].ID != "bam" {
t.Fatalf("bad: %#v", terminalAllocs["myname"])
}
2015-08-23 01:27:51 +00:00
}
func TestAllocsFit_PortsOvercommitted(t *testing.T) {
n := &Node{
Resources: &Resources{
Networks: []*NetworkResource{
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:12:46 +00:00
Device: "eth0",
CIDR: "10.0.0.0/8",
MBits: 100,
},
2015-08-05 00:28:19 +00:00
},
},
}
a1 := &Allocation{
2016-08-27 03:38:50 +00:00
Job: &Job{
TaskGroups: []*TaskGroup{
{
Name: "web",
EphemeralDisk: DefaultEphemeralDisk(),
2016-08-27 03:38:50 +00:00
},
},
},
TaskResources: map[string]*Resources{
2017-09-26 22:26:33 +00:00
"web": {
Networks: []*NetworkResource{
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:12:46 +00:00
Device: "eth0",
IP: "10.0.0.1",
MBits: 50,
2015-11-15 09:56:21 +00:00
ReservedPorts: []Port{{"main", 8000}},
},
},
2015-08-05 00:28:19 +00:00
},
},
}
// Should fit one allocation
2015-09-15 18:12:46 +00:00
fit, dim, _, err := AllocsFit(n, []*Allocation{a1}, nil)
if err != nil {
t.Fatalf("err: %v", err)
}
if !fit {
2015-09-15 18:12:46 +00:00
t.Fatalf("Bad: %s", dim)
2015-08-05 00:28:19 +00:00
}
// Should not fit second allocation
fit, _, _, err = AllocsFit(n, []*Allocation{a1, a1}, nil)
if err != nil {
t.Fatalf("err: %v", err)
}
if fit {
t.Fatalf("Bad")
2015-08-05 00:28:19 +00:00
}
}
2015-08-05 00:48:24 +00:00
func TestAllocsFit(t *testing.T) {
n := &Node{
Resources: &Resources{
2015-09-23 18:14:32 +00:00
CPU: 2000,
2015-08-05 00:48:24 +00:00
MemoryMB: 2048,
DiskMB: 10000,
IOPS: 100,
Networks: []*NetworkResource{
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:12:46 +00:00
Device: "eth0",
CIDR: "10.0.0.0/8",
MBits: 100,
2015-08-05 00:48:24 +00:00
},
},
},
Reserved: &Resources{
2015-09-23 18:14:32 +00:00
CPU: 1000,
2015-08-05 00:48:24 +00:00
MemoryMB: 1024,
DiskMB: 5000,
IOPS: 50,
Networks: []*NetworkResource{
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:12:46 +00:00
Device: "eth0",
IP: "10.0.0.1",
2015-08-05 00:48:24 +00:00
MBits: 50,
2015-11-15 09:56:21 +00:00
ReservedPorts: []Port{{"main", 80}},
2015-08-05 00:48:24 +00:00
},
},
},
}
a1 := &Allocation{
Resources: &Resources{
2015-09-23 18:14:32 +00:00
CPU: 1000,
2015-08-05 00:48:24 +00:00
MemoryMB: 1024,
DiskMB: 5000,
IOPS: 50,
Networks: []*NetworkResource{
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:12:46 +00:00
Device: "eth0",
IP: "10.0.0.1",
2015-08-05 00:48:24 +00:00
MBits: 50,
2015-11-15 09:56:21 +00:00
ReservedPorts: []Port{{"main", 8000}},
2015-08-05 00:48:24 +00:00
},
},
},
}
// Should fit one allocation
fit, _, used, err := AllocsFit(n, []*Allocation{a1}, nil)
2015-08-05 00:48:24 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
if !fit {
t.Fatalf("Bad")
}
2015-08-13 18:54:59 +00:00
// Sanity check the used resources
2015-09-23 18:14:32 +00:00
if used.CPU != 2000 {
2015-08-13 18:54:59 +00:00
t.Fatalf("bad: %#v", used)
}
if used.MemoryMB != 2048 {
t.Fatalf("bad: %#v", used)
}
2015-08-05 00:48:24 +00:00
// Should not fit second allocation
fit, _, used, err = AllocsFit(n, []*Allocation{a1, a1}, nil)
2015-08-05 00:48:24 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
if fit {
t.Fatalf("Bad")
}
2015-08-13 18:54:59 +00:00
// Sanity check the used resources
2015-09-23 18:14:32 +00:00
if used.CPU != 3000 {
2015-08-13 18:54:59 +00:00
t.Fatalf("bad: %#v", used)
}
if used.MemoryMB != 3072 {
t.Fatalf("bad: %#v", used)
}
}
func TestScoreFit(t *testing.T) {
node := &Node{}
node.Resources = &Resources{
CPU: 4096,
MemoryMB: 8192,
}
node.Reserved = &Resources{
CPU: 2048,
MemoryMB: 4096,
}
// Test a perfect fit
util := &Resources{
CPU: 2048,
MemoryMB: 4096,
}
score := ScoreFit(node, util)
if score != 18.0 {
t.Fatalf("bad: %v", score)
}
// Test the worst fit
util = &Resources{
CPU: 0,
MemoryMB: 0,
}
score = ScoreFit(node, util)
if score != 0.0 {
t.Fatalf("bad: %v", score)
}
// Test a mid-case scenario
util = &Resources{
CPU: 1024,
MemoryMB: 2048,
}
score = ScoreFit(node, util)
if score < 10.0 || score > 16.0 {
t.Fatalf("bad: %v", score)
}
2015-08-05 00:48:24 +00:00
}
2015-09-07 22:08:50 +00:00
func TestACLPolicyListHash(t *testing.T) {
h1 := ACLPolicyListHash(nil)
assert.NotEqual(t, "", h1)
p1 := &ACLPolicy{
Name: fmt.Sprintf("policy-%s", uuid.Generate()),
Description: "Super cool policy!",
Rules: `
namespace "default" {
policy = "write"
}
node {
policy = "read"
}
agent {
policy = "read"
}
`,
CreateIndex: 10,
ModifyIndex: 20,
}
h2 := ACLPolicyListHash([]*ACLPolicy{p1})
assert.NotEqual(t, "", h2)
assert.NotEqual(t, h1, h2)
// Create P2 as copy of P1 with new name
p2 := &ACLPolicy{}
*p2 = *p1
p2.Name = fmt.Sprintf("policy-%s", uuid.Generate())
h3 := ACLPolicyListHash([]*ACLPolicy{p1, p2})
assert.NotEqual(t, "", h3)
assert.NotEqual(t, h2, h3)
h4 := ACLPolicyListHash([]*ACLPolicy{p2})
assert.NotEqual(t, "", h4)
assert.NotEqual(t, h3, h4)
// ModifyIndex should change the hash
p2.ModifyIndex++
h5 := ACLPolicyListHash([]*ACLPolicy{p2})
assert.NotEqual(t, "", h5)
assert.NotEqual(t, h4, h5)
}
2017-08-20 21:30:27 +00:00
func TestCompileACLObject(t *testing.T) {
p1 := &ACLPolicy{
Name: fmt.Sprintf("policy-%s", uuid.Generate()),
2017-08-20 21:30:27 +00:00
Description: "Super cool policy!",
Rules: `
namespace "default" {
policy = "write"
}
node {
policy = "read"
}
agent {
policy = "read"
}
`,
CreateIndex: 10,
ModifyIndex: 20,
}
// Create P2 as copy of P1 with new name
p2 := &ACLPolicy{}
*p2 = *p1
p2.Name = fmt.Sprintf("policy-%s", uuid.Generate())
2017-08-20 21:30:27 +00:00
// Create a small cache
cache, err := lru.New2Q(16)
assert.Nil(t, err)
// Test compilation
aclObj, err := CompileACLObject(cache, []*ACLPolicy{p1})
assert.Nil(t, err)
assert.NotNil(t, aclObj)
// Should get the same object
aclObj2, err := CompileACLObject(cache, []*ACLPolicy{p1})
assert.Nil(t, err)
if aclObj != aclObj2 {
t.Fatalf("expected the same object")
}
// Should get another object
aclObj3, err := CompileACLObject(cache, []*ACLPolicy{p1, p2})
assert.Nil(t, err)
assert.NotNil(t, aclObj3)
if aclObj == aclObj3 {
t.Fatalf("unexpected same object")
}
// Should be order independent
aclObj4, err := CompileACLObject(cache, []*ACLPolicy{p2, p1})
assert.Nil(t, err)
assert.NotNil(t, aclObj4)
if aclObj3 != aclObj4 {
t.Fatalf("expected same object")
}
2017-08-20 21:30:27 +00:00
}
2018-01-12 21:58:44 +00:00
// TestGenerateMigrateToken asserts the migrate token is valid for use in HTTP
// headers and CompareMigrateToken works as expected.
func TestGenerateMigrateToken(t *testing.T) {
assert := assert.New(t)
allocID := uuid.Generate()
nodeSecret := uuid.Generate()
token, err := GenerateMigrateToken(allocID, nodeSecret)
assert.Nil(err)
_, err = base64.URLEncoding.DecodeString(token)
assert.Nil(err)
assert.True(CompareMigrateToken(allocID, nodeSecret, token))
assert.False(CompareMigrateToken("x", nodeSecret, token))
assert.False(CompareMigrateToken(allocID, "x", token))
assert.False(CompareMigrateToken(allocID, nodeSecret, "x"))
token2, err := GenerateMigrateToken("x", nodeSecret)
assert.Nil(err)
assert.False(CompareMigrateToken(allocID, nodeSecret, token2))
assert.True(CompareMigrateToken("x", nodeSecret, token2))
}