2015-07-04 01:41:36 +00:00
|
|
|
package nomad
|
|
|
|
|
|
|
|
import (
|
2015-07-06 20:01:10 +00:00
|
|
|
"bytes"
|
2016-01-30 02:18:29 +00:00
|
|
|
"fmt"
|
2015-07-04 01:41:36 +00:00
|
|
|
"os"
|
2015-07-06 20:01:10 +00:00
|
|
|
"reflect"
|
2017-09-19 14:47:10 +00:00
|
|
|
"strings"
|
2015-07-04 01:41:36 +00:00
|
|
|
"testing"
|
2015-08-16 00:38:13 +00:00
|
|
|
"time"
|
2015-07-04 01:41:36 +00:00
|
|
|
|
2017-09-01 23:40:27 +00:00
|
|
|
"github.com/google/go-cmp/cmp"
|
2017-02-08 05:22:48 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
2017-06-27 17:31:32 +00:00
|
|
|
"github.com/hashicorp/nomad/helper"
|
2015-08-11 21:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
|
|
"github.com/hashicorp/nomad/nomad/state"
|
2015-07-04 01:41:36 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2016-01-30 02:18:29 +00:00
|
|
|
"github.com/hashicorp/nomad/testutil"
|
2015-07-04 01:41:36 +00:00
|
|
|
"github.com/hashicorp/raft"
|
2017-06-29 18:01:41 +00:00
|
|
|
"github.com/kr/pretty"
|
2017-08-07 21:38:18 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2015-07-04 01:41:36 +00:00
|
|
|
)
|
|
|
|
|
2015-07-06 20:01:10 +00:00
|
|
|
type MockSink struct {
|
|
|
|
*bytes.Buffer
|
|
|
|
cancel bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *MockSink) ID() string {
|
|
|
|
return "Mock"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *MockSink) Cancel() error {
|
|
|
|
m.cancel = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *MockSink) Close() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-08-11 21:27:14 +00:00
|
|
|
func testStateStore(t *testing.T) *state.StateStore {
|
2017-10-13 21:36:02 +00:00
|
|
|
return state.TestStateStore(t)
|
2015-08-11 21:27:14 +00:00
|
|
|
}
|
|
|
|
|
2015-07-04 01:41:36 +00:00
|
|
|
func testFSM(t *testing.T) *nomadFSM {
|
2016-01-29 23:31:32 +00:00
|
|
|
broker := testBroker(t, 0)
|
2017-10-13 21:36:02 +00:00
|
|
|
dispatcher, _ := testPeriodicDispatcher()
|
|
|
|
fsmConfig := &FSMConfig{
|
|
|
|
EvalBroker: broker,
|
|
|
|
Periodic: dispatcher,
|
|
|
|
Blocked: NewBlockedEvals(broker),
|
|
|
|
LogOutput: os.Stderr,
|
|
|
|
Region: "global",
|
|
|
|
}
|
|
|
|
fsm, err := NewFSM(fsmConfig)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if fsm == nil {
|
|
|
|
t.Fatalf("missing fsm")
|
|
|
|
}
|
2017-10-13 21:36:02 +00:00
|
|
|
state.TestInitState(t, fsm.state)
|
2015-07-04 01:41:36 +00:00
|
|
|
return fsm
|
|
|
|
}
|
|
|
|
|
|
|
|
func makeLog(buf []byte) *raft.Log {
|
|
|
|
return &raft.Log{
|
|
|
|
Index: 1,
|
|
|
|
Term: 1,
|
|
|
|
Type: raft.LogCommand,
|
|
|
|
Data: buf,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:47:42 +00:00
|
|
|
func TestFSM_UpsertNode(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-04 01:41:36 +00:00
|
|
|
fsm := testFSM(t)
|
2016-04-01 01:11:27 +00:00
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
node := mock.Node()
|
|
|
|
|
|
|
|
// Mark an eval as blocked.
|
|
|
|
eval := mock.Eval()
|
|
|
|
eval.ClassEligibility = map[string]bool{node.ComputedClass: true}
|
|
|
|
fsm.blockedEvals.Block(eval)
|
2015-07-04 01:41:36 +00:00
|
|
|
|
2015-07-07 16:51:42 +00:00
|
|
|
req := structs.NodeRegisterRequest{
|
2016-04-01 01:11:27 +00:00
|
|
|
Node: node,
|
2015-07-04 01:41:36 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.NodeRegisterRequestType, req)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
n, err := fsm.State().NodeByID(ws, req.Node.ID)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-04-01 01:11:27 +00:00
|
|
|
if n == nil {
|
2015-07-04 01:41:36 +00:00
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
2016-04-01 01:11:27 +00:00
|
|
|
if n.CreateIndex != 1 {
|
2015-07-04 01:41:36 +00:00
|
|
|
t.Fatalf("bad index: %d", node.CreateIndex)
|
|
|
|
}
|
2015-08-16 00:38:13 +00:00
|
|
|
|
|
|
|
tt := fsm.TimeTable()
|
|
|
|
index := tt.NearestIndex(time.Now().UTC())
|
|
|
|
if index != 1 {
|
|
|
|
t.Fatalf("bad: %d", index)
|
|
|
|
}
|
2016-04-01 01:11:27 +00:00
|
|
|
|
|
|
|
// Verify the eval was unblocked.
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
|
|
|
if bStats.TotalBlocked != 0 {
|
|
|
|
return false, fmt.Errorf("bad: %#v", bStats)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
})
|
|
|
|
|
2015-07-04 01:41:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_DeregisterNode(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-04 01:41:36 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
req := structs.NodeRegisterRequest{
|
2015-07-04 01:41:36 +00:00
|
|
|
Node: node,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.NodeRegisterRequestType, req)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2015-07-07 16:51:42 +00:00
|
|
|
req2 := structs.NodeDeregisterRequest{
|
2015-07-04 01:41:36 +00:00
|
|
|
NodeID: node.ID,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.NodeDeregisterRequestType, req2)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
node, err = fsm.State().NodeByID(ws, req.Node.ID)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if node != nil {
|
|
|
|
t.Fatalf("node found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_UpdateNodeStatus(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-04 01:41:36 +00:00
|
|
|
fsm := testFSM(t)
|
2016-01-29 23:31:32 +00:00
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
2015-07-04 01:41:36 +00:00
|
|
|
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
req := structs.NodeRegisterRequest{
|
2015-07-04 01:41:36 +00:00
|
|
|
Node: node,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.NodeRegisterRequestType, req)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2016-01-29 23:31:32 +00:00
|
|
|
// Mark an eval as blocked.
|
|
|
|
eval := mock.Eval()
|
2016-01-30 01:46:44 +00:00
|
|
|
eval.ClassEligibility = map[string]bool{node.ComputedClass: true}
|
2016-01-29 23:31:32 +00:00
|
|
|
fsm.blockedEvals.Block(eval)
|
|
|
|
|
2015-07-07 16:51:42 +00:00
|
|
|
req2 := structs.NodeUpdateStatusRequest{
|
2015-07-04 01:41:36 +00:00
|
|
|
NodeID: node.ID,
|
|
|
|
Status: structs.NodeStatusReady,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.NodeUpdateStatusRequestType, req2)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2016-01-29 23:31:32 +00:00
|
|
|
// Verify the status is ready.
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
node, err = fsm.State().NodeByID(ws, req.Node.ID)
|
2015-07-04 01:41:36 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if node.Status != structs.NodeStatusReady {
|
|
|
|
t.Fatalf("bad node: %#v", node)
|
|
|
|
}
|
2016-01-29 23:31:32 +00:00
|
|
|
|
|
|
|
// Verify the eval was unblocked.
|
2016-01-30 02:18:29 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
|
|
|
if bStats.TotalBlocked != 0 {
|
|
|
|
return false, fmt.Errorf("bad: %#v", bStats)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
})
|
2015-07-04 01:41:36 +00:00
|
|
|
}
|
2015-07-06 20:01:10 +00:00
|
|
|
|
2015-09-07 02:55:38 +00:00
|
|
|
func TestFSM_UpdateNodeDrain(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-09-07 02:55:38 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
node := mock.Node()
|
|
|
|
req := structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.NodeRegisterRequestType, req)
|
2015-09-07 02:55:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
req2 := structs.NodeUpdateDrainRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Drain: true,
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.NodeUpdateDrainRequestType, req2)
|
2015-09-07 02:55:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
node, err = fsm.State().NodeByID(ws, req.Node.ID)
|
2015-09-07 02:55:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !node.Drain {
|
|
|
|
t.Fatalf("bad node: %#v", node)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-07 16:55:47 +00:00
|
|
|
func TestFSM_RegisterJob(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-07 16:55:47 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
2015-12-19 01:51:30 +00:00
|
|
|
job := mock.PeriodicJob()
|
2015-07-07 16:55:47 +00:00
|
|
|
req := structs.JobRegisterRequest{
|
2015-12-01 22:54:57 +00:00
|
|
|
Job: job,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.JobRegisterRequestType, req)
|
2015-07-07 16:55:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
jobOut, err := fsm.State().JobByID(ws, req.Namespace, req.Job.ID)
|
2015-07-07 16:55:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-12-01 22:54:57 +00:00
|
|
|
if jobOut == nil {
|
2015-07-07 16:55:47 +00:00
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
2015-12-01 22:54:57 +00:00
|
|
|
if jobOut.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", jobOut.CreateIndex)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify it was added to the periodic runner.
|
2017-09-07 23:56:15 +00:00
|
|
|
tuple := structs.NamespacedID{
|
|
|
|
ID: job.ID,
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
}
|
|
|
|
if _, ok := fsm.periodicDispatcher.tracked[tuple]; !ok {
|
2015-12-01 22:54:57 +00:00
|
|
|
t.Fatal("job not added to periodic runner")
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
2015-12-19 01:51:30 +00:00
|
|
|
|
|
|
|
// Verify the launch time was tracked.
|
2017-09-07 23:56:15 +00:00
|
|
|
launchOut, err := fsm.State().PeriodicLaunchByID(ws, req.Namespace, req.Job.ID)
|
2015-12-19 01:51:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if launchOut == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if launchOut.Launch.IsZero() {
|
|
|
|
t.Fatalf("bad launch time: %v", launchOut.Launch)
|
|
|
|
}
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
|
|
|
|
2017-09-19 14:47:10 +00:00
|
|
|
func TestFSM_RegisterJob_BadNamespace(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
job := mock.Job()
|
|
|
|
job.Namespace = "foo"
|
|
|
|
req := structs.JobRegisterRequest{
|
|
|
|
Job: job,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.JobRegisterRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp == nil {
|
|
|
|
t.Fatalf("no resp: %v", resp)
|
|
|
|
}
|
|
|
|
err, ok := resp.(error)
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("resp not of error type: %T %v", resp, resp)
|
|
|
|
}
|
2017-09-26 22:26:33 +00:00
|
|
|
if !strings.Contains(err.Error(), "non-existent namespace") {
|
2017-09-19 14:47:10 +00:00
|
|
|
t.Fatalf("bad error: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are not registered
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
jobOut, err := fsm.State().JobByID(ws, req.Namespace, req.Job.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if jobOut != nil {
|
|
|
|
t.Fatalf("job found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-15 03:54:30 +00:00
|
|
|
func TestFSM_DeregisterJob_Purge(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-07 16:55:47 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
2015-12-19 01:51:30 +00:00
|
|
|
job := mock.PeriodicJob()
|
2015-07-07 16:55:47 +00:00
|
|
|
req := structs.JobRegisterRequest{
|
|
|
|
Job: job,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.JobRegisterRequestType, req)
|
2015-07-07 16:55:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
req2 := structs.JobDeregisterRequest{
|
2015-07-23 22:15:48 +00:00
|
|
|
JobID: job.ID,
|
2017-04-15 03:54:30 +00:00
|
|
|
Purge: true,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.JobDeregisterRequestType, req2)
|
2015-07-07 16:55:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
jobOut, err := fsm.State().JobByID(ws, req.Namespace, req.Job.ID)
|
2015-07-07 16:55:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-12-01 22:54:57 +00:00
|
|
|
if jobOut != nil {
|
2015-07-07 16:55:47 +00:00
|
|
|
t.Fatalf("job found!")
|
|
|
|
}
|
2015-12-01 22:54:57 +00:00
|
|
|
|
|
|
|
// Verify it was removed from the periodic runner.
|
2017-09-07 23:56:15 +00:00
|
|
|
tuple := structs.NamespacedID{
|
|
|
|
ID: job.ID,
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
}
|
|
|
|
if _, ok := fsm.periodicDispatcher.tracked[tuple]; ok {
|
2015-12-01 22:54:57 +00:00
|
|
|
t.Fatal("job not removed from periodic runner")
|
|
|
|
}
|
2015-12-19 01:51:30 +00:00
|
|
|
|
|
|
|
// Verify it was removed from the periodic launch table.
|
2017-09-07 23:56:15 +00:00
|
|
|
launchOut, err := fsm.State().PeriodicLaunchByID(ws, req.Namespace, req.Job.ID)
|
2015-12-19 01:51:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if launchOut != nil {
|
|
|
|
t.Fatalf("launch found!")
|
|
|
|
}
|
2015-07-07 16:55:47 +00:00
|
|
|
}
|
|
|
|
|
2017-04-15 03:54:30 +00:00
|
|
|
func TestFSM_DeregisterJob_NoPurge(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-04-15 03:54:30 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
job := mock.PeriodicJob()
|
|
|
|
req := structs.JobRegisterRequest{
|
|
|
|
Job: job,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2017-04-15 03:54:30 +00:00
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.JobRegisterRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
req2 := structs.JobDeregisterRequest{
|
|
|
|
JobID: job.ID,
|
|
|
|
Purge: false,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2017-04-15 03:54:30 +00:00
|
|
|
}
|
|
|
|
buf, err = structs.Encode(structs.JobDeregisterRequestType, req2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
jobOut, err := fsm.State().JobByID(ws, req.Namespace, req.Job.ID)
|
2017-04-15 03:54:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if jobOut == nil {
|
|
|
|
t.Fatalf("job not found!")
|
|
|
|
}
|
|
|
|
if !jobOut.Stop {
|
|
|
|
t.Fatalf("job not stopped found!")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify it was removed from the periodic runner.
|
2017-09-07 23:56:15 +00:00
|
|
|
tuple := structs.NamespacedID{
|
|
|
|
ID: job.ID,
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
}
|
|
|
|
if _, ok := fsm.periodicDispatcher.tracked[tuple]; ok {
|
2017-04-15 03:54:30 +00:00
|
|
|
t.Fatal("job not removed from periodic runner")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify it was removed from the periodic launch table.
|
2017-09-07 23:56:15 +00:00
|
|
|
launchOut, err := fsm.State().PeriodicLaunchByID(ws, req.Namespace, req.Job.ID)
|
2017-04-15 03:54:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if launchOut == nil {
|
|
|
|
t.Fatalf("launch not found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-23 22:52:38 +00:00
|
|
|
func TestFSM_UpdateEval(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-23 22:52:38 +00:00
|
|
|
fsm := testFSM(t)
|
2015-08-06 18:32:42 +00:00
|
|
|
fsm.evalBroker.SetEnabled(true)
|
2015-07-23 22:52:38 +00:00
|
|
|
|
|
|
|
req := structs.EvalUpdateRequest{
|
2015-08-11 21:27:14 +00:00
|
|
|
Evals: []*structs.Evaluation{mock.Eval()},
|
2015-07-23 22:52:38 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.EvalUpdateRequestType, req)
|
2015-07-23 22:52:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := fsm.State().EvalByID(ws, req.Evals[0].ID)
|
2015-07-23 22:52:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if eval == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if eval.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", eval.CreateIndex)
|
|
|
|
}
|
2015-08-06 18:32:42 +00:00
|
|
|
|
|
|
|
// Verify enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 1 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, eval)
|
|
|
|
}
|
2015-07-23 22:52:38 +00:00
|
|
|
}
|
|
|
|
|
2016-01-29 23:31:32 +00:00
|
|
|
func TestFSM_UpdateEval_Blocked(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-01-29 23:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
// Create a blocked eval.
|
|
|
|
eval := mock.Eval()
|
|
|
|
eval.Status = structs.EvalStatusBlocked
|
|
|
|
|
|
|
|
req := structs.EvalUpdateRequest{
|
|
|
|
Evals: []*structs.Evaluation{eval},
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.EvalUpdateRequestType, req)
|
2016-01-29 23:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().EvalByID(ws, eval.ID)
|
2016-01-29 23:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if out.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", out.CreateIndex)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval wasn't enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 0 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval was added to the blocked tracker.
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
2016-01-30 00:45:09 +00:00
|
|
|
if bStats.TotalBlocked != 1 {
|
2016-01-29 23:31:32 +00:00
|
|
|
t.Fatalf("bad: %#v %#v", bStats, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-04 23:25:03 +00:00
|
|
|
func TestFSM_UpdateEval_Untrack(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-01-04 23:25:03 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
// Mark an eval as blocked.
|
|
|
|
bEval := mock.Eval()
|
|
|
|
bEval.ClassEligibility = map[string]bool{"v1:123": true}
|
|
|
|
fsm.blockedEvals.Block(bEval)
|
|
|
|
|
|
|
|
// Create a successful eval for the same job
|
|
|
|
eval := mock.Eval()
|
|
|
|
eval.JobID = bEval.JobID
|
|
|
|
eval.Status = structs.EvalStatusComplete
|
|
|
|
|
|
|
|
req := structs.EvalUpdateRequest{
|
|
|
|
Evals: []*structs.Evaluation{eval},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.EvalUpdateRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().EvalByID(ws, eval.ID)
|
2017-01-04 23:25:03 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if out.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", out.CreateIndex)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval wasn't enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 0 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval was untracked in the blocked tracker.
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
|
|
|
if bStats.TotalBlocked != 0 {
|
|
|
|
t.Fatalf("bad: %#v %#v", bStats, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_UpdateEval_NoUntrack(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-01-04 23:25:03 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
// Mark an eval as blocked.
|
|
|
|
bEval := mock.Eval()
|
|
|
|
bEval.ClassEligibility = map[string]bool{"v1:123": true}
|
|
|
|
fsm.blockedEvals.Block(bEval)
|
|
|
|
|
|
|
|
// Create a successful eval for the same job but with placement failures
|
|
|
|
eval := mock.Eval()
|
|
|
|
eval.JobID = bEval.JobID
|
|
|
|
eval.Status = structs.EvalStatusComplete
|
|
|
|
eval.FailedTGAllocs = make(map[string]*structs.AllocMetric)
|
|
|
|
eval.FailedTGAllocs["test"] = new(structs.AllocMetric)
|
|
|
|
|
|
|
|
req := structs.EvalUpdateRequest{
|
|
|
|
Evals: []*structs.Evaluation{eval},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.EvalUpdateRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().EvalByID(ws, eval.ID)
|
2017-01-04 23:25:03 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if out.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", out.CreateIndex)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval wasn't enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 0 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the eval was not untracked in the blocked tracker.
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
|
|
|
if bStats.TotalBlocked != 1 {
|
|
|
|
t.Fatalf("bad: %#v %#v", bStats, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-23 22:52:38 +00:00
|
|
|
func TestFSM_DeleteEval(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-23 22:52:38 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
2015-08-11 21:27:14 +00:00
|
|
|
eval := mock.Eval()
|
2015-07-23 22:52:38 +00:00
|
|
|
req := structs.EvalUpdateRequest{
|
2015-08-06 21:51:15 +00:00
|
|
|
Evals: []*structs.Evaluation{eval},
|
2015-07-23 22:52:38 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.EvalUpdateRequestType, req)
|
2015-07-23 22:52:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
req2 := structs.EvalDeleteRequest{
|
2015-08-15 22:39:29 +00:00
|
|
|
Evals: []string{eval.ID},
|
2015-07-23 22:52:38 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.EvalDeleteRequestType, req2)
|
2015-07-23 22:52:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err = fsm.State().EvalByID(ws, req.Evals[0].ID)
|
2015-07-23 22:52:38 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if eval != nil {
|
|
|
|
t.Fatalf("eval found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:47:42 +00:00
|
|
|
func TestFSM_UpsertAllocs(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-08-04 21:04:26 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
2015-08-11 21:27:14 +00:00
|
|
|
alloc := mock.Alloc()
|
2016-07-21 21:43:21 +00:00
|
|
|
fsm.State().UpsertJobSummary(1, mock.JobSummary(alloc.JobID))
|
2015-08-04 21:04:26 +00:00
|
|
|
req := structs.AllocUpdateRequest{
|
|
|
|
Alloc: []*structs.Allocation{alloc},
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.AllocUpdateRequestType, req)
|
2015-08-04 21:04:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
2015-08-04 21:04:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
alloc.CreateIndex = out.CreateIndex
|
|
|
|
alloc.ModifyIndex = out.ModifyIndex
|
2016-02-01 21:57:35 +00:00
|
|
|
alloc.AllocModifyIndex = out.AllocModifyIndex
|
2015-08-04 21:04:26 +00:00
|
|
|
if !reflect.DeepEqual(alloc, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", alloc, out)
|
|
|
|
}
|
|
|
|
|
2015-08-26 00:36:52 +00:00
|
|
|
evictAlloc := new(structs.Allocation)
|
|
|
|
*evictAlloc = *alloc
|
|
|
|
evictAlloc.DesiredStatus = structs.AllocDesiredStatusEvict
|
2015-08-04 21:04:26 +00:00
|
|
|
req2 := structs.AllocUpdateRequest{
|
2015-08-26 00:36:52 +00:00
|
|
|
Alloc: []*structs.Allocation{evictAlloc},
|
2015-08-04 21:04:26 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err = structs.Encode(structs.AllocUpdateRequestType, req2)
|
2015-08-04 21:04:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2015-08-23 01:30:49 +00:00
|
|
|
// Verify we are evicted
|
2017-02-08 05:22:48 +00:00
|
|
|
out, err = fsm.State().AllocByID(ws, alloc.ID)
|
2015-08-04 21:04:26 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
if out.DesiredStatus != structs.AllocDesiredStatusEvict {
|
2015-08-04 21:04:26 +00:00
|
|
|
t.Fatalf("alloc found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-21 19:42:54 +00:00
|
|
|
func TestFSM_UpsertAllocs_SharedJob(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-02-21 19:42:54 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
2016-07-21 21:43:21 +00:00
|
|
|
fsm.State().UpsertJobSummary(1, mock.JobSummary(alloc.JobID))
|
2016-02-21 19:42:54 +00:00
|
|
|
job := alloc.Job
|
|
|
|
alloc.Job = nil
|
|
|
|
req := structs.AllocUpdateRequest{
|
|
|
|
Job: job,
|
|
|
|
Alloc: []*structs.Allocation{alloc},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.AllocUpdateRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
2016-02-21 19:42:54 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
alloc.CreateIndex = out.CreateIndex
|
|
|
|
alloc.ModifyIndex = out.ModifyIndex
|
|
|
|
alloc.AllocModifyIndex = out.AllocModifyIndex
|
|
|
|
|
|
|
|
// Job should be re-attached
|
|
|
|
alloc.Job = job
|
|
|
|
if !reflect.DeepEqual(alloc, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", alloc, out)
|
|
|
|
}
|
|
|
|
|
2016-08-03 00:53:31 +00:00
|
|
|
// Ensure that the original job is used
|
2016-02-21 19:42:54 +00:00
|
|
|
evictAlloc := new(structs.Allocation)
|
|
|
|
*evictAlloc = *alloc
|
2016-08-03 00:53:31 +00:00
|
|
|
job = mock.Job()
|
|
|
|
job.Priority = 123
|
|
|
|
|
2016-02-21 19:42:54 +00:00
|
|
|
evictAlloc.Job = nil
|
|
|
|
evictAlloc.DesiredStatus = structs.AllocDesiredStatusEvict
|
|
|
|
req2 := structs.AllocUpdateRequest{
|
|
|
|
Job: job,
|
|
|
|
Alloc: []*structs.Allocation{evictAlloc},
|
|
|
|
}
|
|
|
|
buf, err = structs.Encode(structs.AllocUpdateRequestType, req2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are evicted
|
2017-02-08 05:22:48 +00:00
|
|
|
out, err = fsm.State().AllocByID(ws, alloc.ID)
|
2016-02-21 19:42:54 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out.DesiredStatus != structs.AllocDesiredStatusEvict {
|
|
|
|
t.Fatalf("alloc found!")
|
|
|
|
}
|
2016-08-03 00:53:31 +00:00
|
|
|
if out.Job == nil || out.Job.Priority == 123 {
|
|
|
|
t.Fatalf("bad job")
|
2016-02-21 19:42:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-01 22:09:25 +00:00
|
|
|
func TestFSM_UpsertAllocs_StrippedResources(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-03-01 22:09:25 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
2016-07-21 21:43:21 +00:00
|
|
|
fsm.State().UpsertJobSummary(1, mock.JobSummary(alloc.JobID))
|
2016-03-01 22:09:25 +00:00
|
|
|
job := alloc.Job
|
|
|
|
resources := alloc.Resources
|
|
|
|
alloc.Resources = nil
|
|
|
|
req := structs.AllocUpdateRequest{
|
|
|
|
Job: job,
|
|
|
|
Alloc: []*structs.Allocation{alloc},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.AllocUpdateRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
2016-03-01 22:09:25 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
alloc.CreateIndex = out.CreateIndex
|
|
|
|
alloc.ModifyIndex = out.ModifyIndex
|
|
|
|
alloc.AllocModifyIndex = out.AllocModifyIndex
|
|
|
|
|
|
|
|
// Resources should be recomputed
|
2016-09-14 22:43:42 +00:00
|
|
|
resources.DiskMB = alloc.Job.TaskGroups[0].EphemeralDisk.SizeMB
|
2016-03-01 22:09:25 +00:00
|
|
|
alloc.Resources = resources
|
|
|
|
if !reflect.DeepEqual(alloc, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", alloc, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-22 02:00:33 +00:00
|
|
|
func TestFSM_UpdateAllocFromClient_Unblock(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-01-29 23:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
node := mock.Node()
|
|
|
|
state.UpsertNode(1, node)
|
|
|
|
|
|
|
|
// Mark an eval as blocked.
|
|
|
|
eval := mock.Eval()
|
2016-01-30 01:46:44 +00:00
|
|
|
eval.ClassEligibility = map[string]bool{node.ComputedClass: true}
|
2016-01-29 23:31:32 +00:00
|
|
|
fsm.blockedEvals.Block(eval)
|
|
|
|
|
|
|
|
bStats := fsm.blockedEvals.Stats()
|
2016-01-30 00:45:09 +00:00
|
|
|
if bStats.TotalBlocked != 1 {
|
2016-01-29 23:31:32 +00:00
|
|
|
t.Fatalf("bad: %#v", bStats)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a completed eval
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
2016-02-22 01:58:56 +00:00
|
|
|
alloc2 := mock.Alloc()
|
|
|
|
alloc2.NodeID = node.ID
|
2016-07-21 21:43:21 +00:00
|
|
|
state.UpsertJobSummary(8, mock.JobSummary(alloc.JobID))
|
|
|
|
state.UpsertJobSummary(9, mock.JobSummary(alloc2.JobID))
|
|
|
|
state.UpsertAllocs(10, []*structs.Allocation{alloc, alloc2})
|
2016-01-29 23:31:32 +00:00
|
|
|
|
|
|
|
clientAlloc := new(structs.Allocation)
|
|
|
|
*clientAlloc = *alloc
|
2016-03-24 01:08:19 +00:00
|
|
|
clientAlloc.ClientStatus = structs.AllocClientStatusComplete
|
2016-02-22 01:58:56 +00:00
|
|
|
update2 := &structs.Allocation{
|
|
|
|
ID: alloc2.ID,
|
|
|
|
ClientStatus: structs.AllocClientStatusRunning,
|
|
|
|
}
|
2016-01-29 23:31:32 +00:00
|
|
|
|
|
|
|
req := structs.AllocUpdateRequest{
|
2016-02-22 01:58:56 +00:00
|
|
|
Alloc: []*structs.Allocation{clientAlloc, update2},
|
2016-01-29 23:31:32 +00:00
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.AllocClientUpdateRequestType, req)
|
2016-01-29 23:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2016-02-22 01:58:56 +00:00
|
|
|
// Verify we are updated
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
2016-01-29 23:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
clientAlloc.CreateIndex = out.CreateIndex
|
|
|
|
clientAlloc.ModifyIndex = out.ModifyIndex
|
|
|
|
if !reflect.DeepEqual(clientAlloc, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", clientAlloc, out)
|
|
|
|
}
|
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
out, err = fsm.State().AllocByID(ws, alloc2.ID)
|
2016-02-22 01:58:56 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
alloc2.CreateIndex = out.CreateIndex
|
|
|
|
alloc2.ModifyIndex = out.ModifyIndex
|
|
|
|
alloc2.ClientStatus = structs.AllocClientStatusRunning
|
|
|
|
alloc2.TaskStates = nil
|
|
|
|
if !reflect.DeepEqual(alloc2, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", alloc2, out)
|
|
|
|
}
|
|
|
|
|
2016-01-29 23:31:32 +00:00
|
|
|
// Verify the eval was unblocked.
|
2016-01-30 02:18:29 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
bStats = fsm.blockedEvals.Stats()
|
|
|
|
if bStats.TotalBlocked != 0 {
|
|
|
|
return false, fmt.Errorf("bad: %#v %#v", bStats, out)
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
})
|
2016-01-29 23:31:32 +00:00
|
|
|
}
|
|
|
|
|
2016-02-22 02:00:33 +00:00
|
|
|
func TestFSM_UpdateAllocFromClient(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-08-26 01:00:14 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
2016-07-21 21:43:21 +00:00
|
|
|
state.UpsertJobSummary(9, mock.JobSummary(alloc.JobID))
|
|
|
|
state.UpsertAllocs(10, []*structs.Allocation{alloc})
|
2015-08-26 01:00:14 +00:00
|
|
|
|
|
|
|
clientAlloc := new(structs.Allocation)
|
|
|
|
*clientAlloc = *alloc
|
|
|
|
clientAlloc.ClientStatus = structs.AllocClientStatusFailed
|
|
|
|
|
|
|
|
req := structs.AllocUpdateRequest{
|
|
|
|
Alloc: []*structs.Allocation{clientAlloc},
|
|
|
|
}
|
2016-02-21 01:36:39 +00:00
|
|
|
buf, err := structs.Encode(structs.AllocClientUpdateRequestType, req)
|
2015-08-26 01:00:14 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
2015-08-26 01:00:14 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
clientAlloc.CreateIndex = out.CreateIndex
|
|
|
|
clientAlloc.ModifyIndex = out.ModifyIndex
|
|
|
|
if !reflect.DeepEqual(clientAlloc, out) {
|
2016-07-21 21:43:21 +00:00
|
|
|
t.Fatalf("err: %#v,%#v", clientAlloc, out)
|
2015-08-26 01:00:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-19 20:13:51 +00:00
|
|
|
func TestFSM_UpsertVaultAccessor(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-08-19 20:13:51 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
va := mock.VaultAccessor()
|
|
|
|
va2 := mock.VaultAccessor()
|
2016-08-22 20:57:27 +00:00
|
|
|
req := structs.VaultAccessorsRequest{
|
2016-08-19 20:13:51 +00:00
|
|
|
Accessors: []*structs.VaultAccessor{va, va2},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.VaultAccessorRegisterRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, err := fsm.State().VaultAccessor(ws, va.Accessor)
|
2016-08-19 20:13:51 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out1 == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if out1.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", out1.CreateIndex)
|
|
|
|
}
|
2017-02-08 05:22:48 +00:00
|
|
|
out2, err := fsm.State().VaultAccessor(ws, va2.Accessor)
|
2016-08-19 20:13:51 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out2 == nil {
|
|
|
|
t.Fatalf("not found!")
|
|
|
|
}
|
|
|
|
if out1.CreateIndex != 1 {
|
|
|
|
t.Fatalf("bad index: %d", out2.CreateIndex)
|
|
|
|
}
|
|
|
|
|
|
|
|
tt := fsm.TimeTable()
|
|
|
|
index := tt.NearestIndex(time.Now().UTC())
|
|
|
|
if index != 1 {
|
|
|
|
t.Fatalf("bad: %d", index)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-22 20:57:27 +00:00
|
|
|
func TestFSM_DeregisterVaultAccessor(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-08-22 20:57:27 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.blockedEvals.SetEnabled(true)
|
|
|
|
|
|
|
|
va := mock.VaultAccessor()
|
|
|
|
va2 := mock.VaultAccessor()
|
|
|
|
accessors := []*structs.VaultAccessor{va, va2}
|
|
|
|
|
|
|
|
// Insert the accessors
|
|
|
|
if err := fsm.State().UpsertVaultAccessor(1000, accessors); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req := structs.VaultAccessorsRequest{
|
|
|
|
Accessors: accessors,
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.VaultAccessorDegisterRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, err := fsm.State().VaultAccessor(ws, va.Accessor)
|
2016-08-22 20:57:27 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out1 != nil {
|
|
|
|
t.Fatalf("not deleted!")
|
|
|
|
}
|
|
|
|
|
|
|
|
tt := fsm.TimeTable()
|
|
|
|
index := tt.NearestIndex(time.Now().UTC())
|
|
|
|
if index != 1 {
|
|
|
|
t.Fatalf("bad: %d", index)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-27 17:31:32 +00:00
|
|
|
func TestFSM_ApplyPlanResults(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-06-27 17:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
// Create the request and create a deployment
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
job := alloc.Job
|
|
|
|
alloc.Job = nil
|
|
|
|
|
|
|
|
d := mock.Deployment()
|
|
|
|
d.JobID = job.ID
|
|
|
|
d.JobModifyIndex = job.ModifyIndex
|
|
|
|
d.JobVersion = job.Version
|
|
|
|
|
|
|
|
alloc.DeploymentID = d.ID
|
|
|
|
|
|
|
|
fsm.State().UpsertJobSummary(1, mock.JobSummary(alloc.JobID))
|
|
|
|
req := structs.ApplyPlanResultsRequest{
|
|
|
|
AllocUpdateRequest: structs.AllocUpdateRequest{
|
|
|
|
Job: job,
|
|
|
|
Alloc: []*structs.Allocation{alloc},
|
|
|
|
},
|
2017-07-04 20:31:01 +00:00
|
|
|
Deployment: d,
|
2017-06-27 17:31:32 +00:00
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ApplyPlanResultsRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the allocation is registered
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().AllocByID(ws, alloc.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
alloc.CreateIndex = out.CreateIndex
|
|
|
|
alloc.ModifyIndex = out.ModifyIndex
|
|
|
|
alloc.AllocModifyIndex = out.AllocModifyIndex
|
|
|
|
|
|
|
|
// Job should be re-attached
|
|
|
|
alloc.Job = job
|
|
|
|
if !reflect.DeepEqual(alloc, out) {
|
|
|
|
t.Fatalf("bad: %#v %#v", alloc, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
dout, err := fsm.State().DeploymentByID(ws, d.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if tg, ok := dout.TaskGroups[alloc.TaskGroup]; !ok || tg.PlacedAllocs != 1 {
|
|
|
|
t.Fatalf("err: %v %v", tg, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that the original job is used
|
|
|
|
evictAlloc := alloc.Copy()
|
|
|
|
job = mock.Job()
|
|
|
|
job.Priority = 123
|
|
|
|
|
|
|
|
evictAlloc.Job = nil
|
|
|
|
evictAlloc.DesiredStatus = structs.AllocDesiredStatusEvict
|
|
|
|
req2 := structs.ApplyPlanResultsRequest{
|
|
|
|
AllocUpdateRequest: structs.AllocUpdateRequest{
|
|
|
|
Job: job,
|
|
|
|
Alloc: []*structs.Allocation{evictAlloc},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
buf, err = structs.Encode(structs.ApplyPlanResultsRequestType, req2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are evicted
|
|
|
|
out, err = fsm.State().AllocByID(ws, alloc.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out.DesiredStatus != structs.AllocDesiredStatusEvict {
|
|
|
|
t.Fatalf("alloc found!")
|
|
|
|
}
|
|
|
|
if out.Job == nil || out.Job.Priority == 123 {
|
|
|
|
t.Fatalf("bad job")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_DeploymentStatusUpdate(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-06-27 17:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
// Upsert a deployment
|
|
|
|
d := mock.Deployment()
|
2017-07-04 20:31:01 +00:00
|
|
|
if err := state.UpsertDeployment(1, d); err != nil {
|
2017-06-27 17:31:32 +00:00
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a request to update the deployment, create an eval and job
|
|
|
|
e := mock.Eval()
|
|
|
|
j := mock.Job()
|
|
|
|
status, desc := structs.DeploymentStatusFailed, "foo"
|
|
|
|
req := &structs.DeploymentStatusUpdateRequest{
|
|
|
|
DeploymentUpdate: &structs.DeploymentStatusUpdate{
|
|
|
|
DeploymentID: d.ID,
|
|
|
|
Status: status,
|
|
|
|
StatusDescription: desc,
|
|
|
|
},
|
|
|
|
Job: j,
|
|
|
|
Eval: e,
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.DeploymentStatusUpdateRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the status was updated properly
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
dout, err := state.DeploymentByID(ws, d.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if dout.Status != status || dout.StatusDescription != desc {
|
|
|
|
t.Fatalf("bad: %#v", dout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the evaluation was created
|
|
|
|
eout, _ := state.EvalByID(ws, e.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if eout == nil {
|
|
|
|
t.Fatalf("bad: %#v", eout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the job was created
|
2017-09-07 23:56:15 +00:00
|
|
|
jout, _ := state.JobByID(ws, j.Namespace, j.ID)
|
2017-06-27 17:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if jout == nil {
|
|
|
|
t.Fatalf("bad: %#v", jout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assert the eval was enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 1 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-06 19:49:13 +00:00
|
|
|
func TestFSM_JobStabilityUpdate(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-07-06 19:49:13 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
// Upsert a deployment
|
|
|
|
job := mock.Job()
|
|
|
|
if err := state.UpsertJob(1, job); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a request to update the job to stable
|
|
|
|
req := &structs.JobStabilityRequest{
|
|
|
|
JobID: job.ID,
|
|
|
|
JobVersion: job.Version,
|
|
|
|
Stable: true,
|
2017-09-07 23:56:15 +00:00
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2017-07-06 19:49:13 +00:00
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.JobStabilityRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the stability was updated properly
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
jout, _ := state.JobByIDAndVersion(ws, job.Namespace, job.ID, job.Version)
|
2017-07-06 19:49:13 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if jout == nil || !jout.Stable {
|
|
|
|
t.Fatalf("bad: %#v", jout)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-27 17:31:32 +00:00
|
|
|
func TestFSM_DeploymentPromotion(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-06-27 17:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
// Create a job with two task groups
|
|
|
|
j := mock.Job()
|
|
|
|
tg1 := j.TaskGroups[0]
|
|
|
|
tg2 := tg1.Copy()
|
|
|
|
tg2.Name = "foo"
|
|
|
|
j.TaskGroups = append(j.TaskGroups, tg2)
|
|
|
|
if err := state.UpsertJob(1, j); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a deployment
|
|
|
|
d := mock.Deployment()
|
|
|
|
d.JobID = j.ID
|
|
|
|
d.TaskGroups = map[string]*structs.DeploymentState{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2017-06-27 17:31:32 +00:00
|
|
|
DesiredTotal: 10,
|
|
|
|
DesiredCanaries: 1,
|
|
|
|
},
|
2017-09-26 22:26:33 +00:00
|
|
|
"foo": {
|
2017-06-27 17:31:32 +00:00
|
|
|
DesiredTotal: 10,
|
|
|
|
DesiredCanaries: 1,
|
|
|
|
},
|
|
|
|
}
|
2017-07-04 20:31:01 +00:00
|
|
|
if err := state.UpsertDeployment(2, d); err != nil {
|
2017-06-27 17:31:32 +00:00
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a set of allocations
|
|
|
|
c1 := mock.Alloc()
|
|
|
|
c1.JobID = j.ID
|
|
|
|
c1.DeploymentID = d.ID
|
2017-07-06 16:55:39 +00:00
|
|
|
d.TaskGroups[c1.TaskGroup].PlacedCanaries = append(d.TaskGroups[c1.TaskGroup].PlacedCanaries, c1.ID)
|
2017-06-27 17:31:32 +00:00
|
|
|
c1.DeploymentStatus = &structs.AllocDeploymentStatus{
|
|
|
|
Healthy: helper.BoolToPtr(true),
|
|
|
|
}
|
|
|
|
c2 := mock.Alloc()
|
|
|
|
c2.JobID = j.ID
|
|
|
|
c2.DeploymentID = d.ID
|
2017-07-06 16:55:39 +00:00
|
|
|
d.TaskGroups[c2.TaskGroup].PlacedCanaries = append(d.TaskGroups[c2.TaskGroup].PlacedCanaries, c2.ID)
|
2017-06-27 17:31:32 +00:00
|
|
|
c2.TaskGroup = tg2.Name
|
|
|
|
c2.DeploymentStatus = &structs.AllocDeploymentStatus{
|
|
|
|
Healthy: helper.BoolToPtr(true),
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := state.UpsertAllocs(3, []*structs.Allocation{c1, c2}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create an eval
|
|
|
|
e := mock.Eval()
|
|
|
|
|
|
|
|
// Promote the canaries
|
|
|
|
req := &structs.ApplyDeploymentPromoteRequest{
|
|
|
|
DeploymentPromoteRequest: structs.DeploymentPromoteRequest{
|
|
|
|
DeploymentID: d.ID,
|
|
|
|
All: true,
|
|
|
|
},
|
|
|
|
Eval: e,
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.DeploymentPromoteRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the status per task group was updated properly
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
dout, err := state.DeploymentByID(ws, d.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if len(dout.TaskGroups) != 2 {
|
|
|
|
t.Fatalf("bad: %#v", dout.TaskGroups)
|
|
|
|
}
|
|
|
|
for tg, state := range dout.TaskGroups {
|
|
|
|
if !state.Promoted {
|
|
|
|
t.Fatalf("bad: group %q not promoted %#v", tg, state)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the evaluation was created
|
|
|
|
eout, _ := state.EvalByID(ws, e.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if eout == nil {
|
|
|
|
t.Fatalf("bad: %#v", eout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assert the eval was enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 1 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_DeploymentAllocHealth(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-06-27 17:31:32 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
fsm.evalBroker.SetEnabled(true)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
// Insert a deployment
|
|
|
|
d := mock.Deployment()
|
2017-07-04 20:31:01 +00:00
|
|
|
if err := state.UpsertDeployment(1, d); err != nil {
|
2017-06-27 17:31:32 +00:00
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Insert two allocations
|
|
|
|
a1 := mock.Alloc()
|
|
|
|
a1.DeploymentID = d.ID
|
|
|
|
a2 := mock.Alloc()
|
|
|
|
a2.DeploymentID = d.ID
|
|
|
|
if err := state.UpsertAllocs(2, []*structs.Allocation{a1, a2}); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a job to roll back to
|
|
|
|
j := mock.Job()
|
|
|
|
|
|
|
|
// Create an eval that should be upserted
|
|
|
|
e := mock.Eval()
|
|
|
|
|
|
|
|
// Create a status update for the deployment
|
|
|
|
status, desc := structs.DeploymentStatusFailed, "foo"
|
|
|
|
u := &structs.DeploymentStatusUpdate{
|
|
|
|
DeploymentID: d.ID,
|
|
|
|
Status: status,
|
|
|
|
StatusDescription: desc,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set health against the deployment
|
|
|
|
req := &structs.ApplyDeploymentAllocHealthRequest{
|
|
|
|
DeploymentAllocHealthRequest: structs.DeploymentAllocHealthRequest{
|
|
|
|
DeploymentID: d.ID,
|
|
|
|
HealthyAllocationIDs: []string{a1.ID},
|
|
|
|
UnhealthyAllocationIDs: []string{a2.ID},
|
|
|
|
},
|
|
|
|
Job: j,
|
|
|
|
Eval: e,
|
|
|
|
DeploymentUpdate: u,
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.DeploymentAllocHealthRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the status was updated properly
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
dout, err := state.DeploymentByID(ws, d.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if dout.Status != status || dout.StatusDescription != desc {
|
|
|
|
t.Fatalf("bad: %#v", dout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the evaluation was created
|
|
|
|
eout, _ := state.EvalByID(ws, e.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if eout == nil {
|
|
|
|
t.Fatalf("bad: %#v", eout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the job was created
|
2017-09-07 23:56:15 +00:00
|
|
|
jout, _ := state.JobByID(ws, j.Namespace, j.ID)
|
2017-06-27 17:31:32 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if jout == nil {
|
|
|
|
t.Fatalf("bad: %#v", jout)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the status of the allocs
|
|
|
|
out1, err := state.AllocByID(ws, a1.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
out2, err := state.AllocByID(ws, a2.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !out1.DeploymentStatus.IsHealthy() {
|
|
|
|
t.Fatalf("bad: alloc %q not healthy", out1.ID)
|
|
|
|
}
|
|
|
|
if !out2.DeploymentStatus.IsUnhealthy() {
|
|
|
|
t.Fatalf("bad: alloc %q not unhealthy", out2.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assert the eval was enqueued
|
|
|
|
stats := fsm.evalBroker.Stats()
|
|
|
|
if stats.TotalReady != 1 {
|
|
|
|
t.Fatalf("bad: %#v %#v", stats, e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-29 19:32:37 +00:00
|
|
|
func TestFSM_DeleteDeployment(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-06-29 19:32:37 +00:00
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
// Upsert a deployments
|
|
|
|
d := mock.Deployment()
|
2017-07-04 20:31:01 +00:00
|
|
|
if err := state.UpsertDeployment(1, d); err != nil {
|
2017-06-29 19:32:37 +00:00
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req := structs.DeploymentDeleteRequest{
|
|
|
|
Deployments: []string{d.ID},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.DeploymentDeleteRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
deployment, err := state.DeploymentByID(ws, d.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if deployment != nil {
|
|
|
|
t.Fatalf("deployment found!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-08 04:01:14 +00:00
|
|
|
func TestFSM_UpsertACLPolicies(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
policy := mock.ACLPolicy()
|
|
|
|
req := structs.ACLPolicyUpsertRequest{
|
|
|
|
Policies: []*structs.ACLPolicy{policy},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ACLPolicyUpsertRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().ACLPolicyByName(ws, policy.Name)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out)
|
|
|
|
}
|
|
|
|
|
2017-08-08 03:53:07 +00:00
|
|
|
func TestFSM_DeleteACLPolicies(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
policy := mock.ACLPolicy()
|
|
|
|
err := fsm.State().UpsertACLPolicies(1000, []*structs.ACLPolicy{policy})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
|
|
|
|
req := structs.ACLPolicyDeleteRequest{
|
|
|
|
Names: []string{policy.Name},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ACLPolicyDeleteRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := fsm.State().ACLPolicyByName(ws, policy.Name)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, out)
|
|
|
|
}
|
|
|
|
|
2017-08-21 01:19:26 +00:00
|
|
|
func TestFSM_BootstrapACLTokens(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
token := mock.ACLToken()
|
|
|
|
req := structs.ACLTokenBootstrapRequest{
|
|
|
|
Token: token,
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ACLTokenBootstrapRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
|
|
|
out, err := fsm.State().ACLTokenByAccessorID(nil, token.AccessorID)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out)
|
2017-09-10 23:03:30 +00:00
|
|
|
|
2017-09-11 17:30:59 +00:00
|
|
|
// Test with reset
|
2017-09-10 23:03:30 +00:00
|
|
|
token2 := mock.ACLToken()
|
|
|
|
req = structs.ACLTokenBootstrapRequest{
|
|
|
|
Token: token2,
|
|
|
|
ResetIndex: out.CreateIndex,
|
|
|
|
}
|
|
|
|
buf, err = structs.Encode(structs.ACLTokenBootstrapRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
|
|
|
out2, err := fsm.State().ACLTokenByAccessorID(nil, token2.AccessorID)
|
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out2)
|
2017-08-21 01:19:26 +00:00
|
|
|
}
|
|
|
|
|
2017-08-12 22:44:05 +00:00
|
|
|
func TestFSM_UpsertACLTokens(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
token := mock.ACLToken()
|
|
|
|
req := structs.ACLTokenUpsertRequest{
|
|
|
|
Tokens: []*structs.ACLToken{token},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ACLTokenUpsertRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are registered
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-08-12 22:46:19 +00:00
|
|
|
out, err := fsm.State().ACLTokenByAccessorID(ws, token.AccessorID)
|
2017-08-12 22:44:05 +00:00
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.NotNil(t, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_DeleteACLTokens(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
token := mock.ACLToken()
|
|
|
|
err := fsm.State().UpsertACLTokens(1000, []*structs.ACLToken{token})
|
|
|
|
assert.Nil(t, err)
|
|
|
|
|
|
|
|
req := structs.ACLTokenDeleteRequest{
|
|
|
|
AccessorIDs: []string{token.AccessorID},
|
|
|
|
}
|
|
|
|
buf, err := structs.Encode(structs.ACLTokenDeleteRequestType, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we are NOT registered
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-08-12 22:46:19 +00:00
|
|
|
out, err := fsm.State().ACLTokenByAccessorID(ws, token.AccessorID)
|
2017-08-12 22:44:05 +00:00
|
|
|
assert.Nil(t, err)
|
|
|
|
assert.Nil(t, out)
|
|
|
|
}
|
|
|
|
|
2015-07-06 20:01:10 +00:00
|
|
|
func testSnapshotRestore(t *testing.T, fsm *nomadFSM) *nomadFSM {
|
|
|
|
// Snapshot
|
|
|
|
snap, err := fsm.Snapshot()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer snap.Release()
|
|
|
|
|
|
|
|
// Persist
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
|
|
sink := &MockSink{buf, false}
|
|
|
|
if err := snap.Persist(sink); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to restore on a new FSM
|
|
|
|
fsm2 := testFSM(t)
|
2017-02-08 19:18:03 +00:00
|
|
|
snap, err = fsm2.Snapshot()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer snap.Release()
|
|
|
|
|
|
|
|
abandonCh := fsm2.State().AbandonCh()
|
2015-07-06 20:01:10 +00:00
|
|
|
|
|
|
|
// Do a restore
|
|
|
|
if err := fsm2.Restore(sink); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-02-08 19:18:03 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-abandonCh:
|
|
|
|
default:
|
|
|
|
t.Fatalf("bad")
|
|
|
|
}
|
|
|
|
|
2015-07-06 20:01:10 +00:00
|
|
|
return fsm2
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_SnapshotRestore_Nodes(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-06 20:01:10 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
2015-08-11 21:27:14 +00:00
|
|
|
node1 := mock.Node()
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertNode(1000, node1)
|
2015-08-11 21:27:14 +00:00
|
|
|
node2 := mock.Node()
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertNode(1001, node2)
|
2015-07-06 20:01:10 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.NodeByID(ws, node1.ID)
|
|
|
|
out2, _ := state2.NodeByID(ws, node2.ID)
|
2015-07-06 20:01:10 +00:00
|
|
|
if !reflect.DeepEqual(node1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, node1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(node2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, node2)
|
|
|
|
}
|
|
|
|
}
|
2015-07-06 21:51:01 +00:00
|
|
|
|
2015-07-07 16:55:47 +00:00
|
|
|
func TestFSM_SnapshotRestore_Jobs(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-07 16:55:47 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
2015-08-11 21:27:14 +00:00
|
|
|
job1 := mock.Job()
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertJob(1000, job1)
|
2015-08-11 21:27:14 +00:00
|
|
|
job2 := mock.Job()
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertJob(1001, job2)
|
2015-07-07 16:55:47 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2015-07-07 16:55:47 +00:00
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-09-07 23:56:15 +00:00
|
|
|
out1, _ := state2.JobByID(ws, job1.Namespace, job1.ID)
|
|
|
|
out2, _ := state2.JobByID(ws, job2.Namespace, job2.ID)
|
2015-07-07 16:55:47 +00:00
|
|
|
if !reflect.DeepEqual(job1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, job1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(job2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, job2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-23 22:52:38 +00:00
|
|
|
func TestFSM_SnapshotRestore_Evals(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-23 22:52:38 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
2015-08-11 21:27:14 +00:00
|
|
|
eval1 := mock.Eval()
|
2015-08-06 21:51:15 +00:00
|
|
|
state.UpsertEvals(1000, []*structs.Evaluation{eval1})
|
2015-08-11 21:27:14 +00:00
|
|
|
eval2 := mock.Eval()
|
2015-08-06 21:51:15 +00:00
|
|
|
state.UpsertEvals(1001, []*structs.Evaluation{eval2})
|
2015-07-23 22:52:38 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.EvalByID(ws, eval1.ID)
|
|
|
|
out2, _ := state2.EvalByID(ws, eval2.ID)
|
2015-07-23 22:52:38 +00:00
|
|
|
if !reflect.DeepEqual(eval1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, eval1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(eval2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, eval2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-04 21:04:26 +00:00
|
|
|
func TestFSM_SnapshotRestore_Allocs(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-08-04 21:04:26 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
2015-08-11 21:27:14 +00:00
|
|
|
alloc1 := mock.Alloc()
|
|
|
|
alloc2 := mock.Alloc()
|
2016-07-21 21:43:21 +00:00
|
|
|
state.UpsertJobSummary(998, mock.JobSummary(alloc1.JobID))
|
|
|
|
state.UpsertJobSummary(999, mock.JobSummary(alloc2.JobID))
|
|
|
|
state.UpsertAllocs(1000, []*structs.Allocation{alloc1})
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertAllocs(1001, []*structs.Allocation{alloc2})
|
2015-08-04 21:04:26 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.AllocByID(ws, alloc1.ID)
|
|
|
|
out2, _ := state2.AllocByID(ws, alloc2.ID)
|
2015-08-04 21:04:26 +00:00
|
|
|
if !reflect.DeepEqual(alloc1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, alloc1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(alloc2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, alloc2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-29 19:49:52 +00:00
|
|
|
func TestFSM_SnapshotRestore_Allocs_NoSharedResources(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-08-29 19:49:52 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
alloc1 := mock.Alloc()
|
|
|
|
alloc2 := mock.Alloc()
|
|
|
|
alloc1.SharedResources = nil
|
|
|
|
alloc2.SharedResources = nil
|
|
|
|
state.UpsertJobSummary(998, mock.JobSummary(alloc1.JobID))
|
|
|
|
state.UpsertJobSummary(999, mock.JobSummary(alloc2.JobID))
|
|
|
|
state.UpsertAllocs(1000, []*structs.Allocation{alloc1})
|
|
|
|
state.UpsertAllocs(1001, []*structs.Allocation{alloc2})
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.AllocByID(ws, alloc1.ID)
|
|
|
|
out2, _ := state2.AllocByID(ws, alloc2.ID)
|
2016-08-29 19:49:52 +00:00
|
|
|
alloc1.SharedResources = &structs.Resources{DiskMB: 150}
|
|
|
|
alloc2.SharedResources = &structs.Resources{DiskMB: 150}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(alloc1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, alloc1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(alloc2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, alloc2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-06 21:51:01 +00:00
|
|
|
func TestFSM_SnapshotRestore_Indexes(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-07-06 21:51:01 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
2015-08-11 21:27:14 +00:00
|
|
|
node1 := mock.Node()
|
2015-09-07 03:47:42 +00:00
|
|
|
state.UpsertNode(1000, node1)
|
2015-07-06 21:51:01 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
|
|
|
|
2015-09-07 03:56:38 +00:00
|
|
|
index, err := state2.Index("nodes")
|
2015-07-06 21:51:01 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if index != 1000 {
|
|
|
|
t.Fatalf("bad: %d", index)
|
|
|
|
}
|
|
|
|
}
|
2015-08-16 00:38:13 +00:00
|
|
|
|
|
|
|
func TestFSM_SnapshotRestore_TimeTable(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-08-16 00:38:13 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
|
|
|
|
tt := fsm.TimeTable()
|
|
|
|
start := time.Now().UTC()
|
|
|
|
tt.Witness(1000, start)
|
|
|
|
tt.Witness(2000, start.Add(10*time.Minute))
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
|
|
|
|
tt2 := fsm2.TimeTable()
|
|
|
|
if tt2.NearestTime(1500) != start {
|
|
|
|
t.Fatalf("bad")
|
|
|
|
}
|
|
|
|
if tt2.NearestIndex(start.Add(15*time.Minute)) != 2000 {
|
|
|
|
t.Fatalf("bad")
|
|
|
|
}
|
|
|
|
}
|
2015-12-07 23:58:17 +00:00
|
|
|
|
|
|
|
func TestFSM_SnapshotRestore_PeriodicLaunches(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2015-12-07 23:58:17 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
job1 := mock.Job()
|
2017-09-07 23:56:15 +00:00
|
|
|
launch1 := &structs.PeriodicLaunch{
|
|
|
|
ID: job1.ID,
|
|
|
|
Namespace: job1.Namespace,
|
|
|
|
Launch: time.Now(),
|
|
|
|
}
|
2015-12-07 23:58:17 +00:00
|
|
|
state.UpsertPeriodicLaunch(1000, launch1)
|
|
|
|
job2 := mock.Job()
|
2017-09-07 23:56:15 +00:00
|
|
|
launch2 := &structs.PeriodicLaunch{
|
|
|
|
ID: job2.ID,
|
|
|
|
Namespace: job2.Namespace,
|
|
|
|
Launch: time.Now(),
|
|
|
|
}
|
2015-12-07 23:58:17 +00:00
|
|
|
state.UpsertPeriodicLaunch(1001, launch2)
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
out1, _ := state2.PeriodicLaunchByID(ws, launch1.Namespace, launch1.ID)
|
|
|
|
out2, _ := state2.PeriodicLaunchByID(ws, launch2.Namespace, launch2.ID)
|
2017-09-01 23:40:27 +00:00
|
|
|
|
|
|
|
if !cmp.Equal(launch1, out1) {
|
|
|
|
t.Fatalf("bad: %v", cmp.Diff(launch1, out1))
|
2015-12-07 23:58:17 +00:00
|
|
|
}
|
2017-09-01 23:40:27 +00:00
|
|
|
if !cmp.Equal(launch2, out2) {
|
|
|
|
t.Fatalf("bad: %v", cmp.Diff(launch2, out2))
|
2015-12-07 23:58:17 +00:00
|
|
|
}
|
|
|
|
}
|
2016-07-05 20:55:11 +00:00
|
|
|
|
|
|
|
func TestFSM_SnapshotRestore_JobSummary(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-07-05 20:55:11 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
|
|
|
|
job1 := mock.Job()
|
|
|
|
state.UpsertJob(1000, job1)
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
js1, _ := state.JobSummaryByID(ws, job1.Namespace, job1.ID)
|
2016-07-05 20:55:11 +00:00
|
|
|
|
|
|
|
job2 := mock.Job()
|
|
|
|
state.UpsertJob(1001, job2)
|
2017-09-07 23:56:15 +00:00
|
|
|
js2, _ := state.JobSummaryByID(ws, job2.Namespace, job2.ID)
|
2016-07-05 20:55:11 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-09-07 23:56:15 +00:00
|
|
|
out1, _ := state2.JobSummaryByID(ws, job1.Namespace, job1.ID)
|
|
|
|
out2, _ := state2.JobSummaryByID(ws, job2.Namespace, job2.ID)
|
2016-07-05 20:55:11 +00:00
|
|
|
if !reflect.DeepEqual(js1, out1) {
|
2016-07-25 21:11:32 +00:00
|
|
|
t.Fatalf("bad: \n%#v\n%#v", js1, out1)
|
2016-07-05 20:55:11 +00:00
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(js2, out2) {
|
2016-07-25 21:11:32 +00:00
|
|
|
t.Fatalf("bad: \n%#v\n%#v", js2, out2)
|
2016-07-05 20:55:11 +00:00
|
|
|
}
|
|
|
|
}
|
2016-07-26 00:26:10 +00:00
|
|
|
|
2016-08-19 01:14:58 +00:00
|
|
|
func TestFSM_SnapshotRestore_VaultAccessors(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-08-19 01:14:58 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
a1 := mock.VaultAccessor()
|
|
|
|
a2 := mock.VaultAccessor()
|
|
|
|
state.UpsertVaultAccessor(1000, []*structs.VaultAccessor{a1, a2})
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.VaultAccessor(ws, a1.Accessor)
|
|
|
|
out2, _ := state2.VaultAccessor(ws, a2.Accessor)
|
2016-08-19 01:14:58 +00:00
|
|
|
if !reflect.DeepEqual(a1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, a1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(a2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, a2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-24 21:49:23 +00:00
|
|
|
func TestFSM_SnapshotRestore_JobVersions(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-04-24 21:49:23 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
job1 := mock.Job()
|
|
|
|
state.UpsertJob(1000, job1)
|
|
|
|
job2 := mock.Job()
|
|
|
|
job2.ID = job1.ID
|
|
|
|
state.UpsertJob(1001, job2)
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
2017-09-07 23:56:15 +00:00
|
|
|
out1, _ := state2.JobByIDAndVersion(ws, job1.Namespace, job1.ID, job1.Version)
|
|
|
|
out2, _ := state2.JobByIDAndVersion(ws, job2.Namespace, job2.ID, job2.Version)
|
2017-04-24 21:49:23 +00:00
|
|
|
if !reflect.DeepEqual(job1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, job1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(job2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, job2)
|
|
|
|
}
|
|
|
|
if job2.Version != 1 {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", 1, job2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_SnapshotRestore_Deployments(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2017-04-24 21:49:23 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
d1 := mock.Deployment()
|
|
|
|
d2 := mock.Deployment()
|
2017-07-04 20:31:01 +00:00
|
|
|
state.UpsertDeployment(1000, d1)
|
|
|
|
state.UpsertDeployment(1001, d2)
|
2017-04-24 21:49:23 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.DeploymentByID(ws, d1.ID)
|
|
|
|
out2, _ := state2.DeploymentByID(ws, d2.ID)
|
|
|
|
if !reflect.DeepEqual(d1, out1) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out1, d1)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(d2, out2) {
|
|
|
|
t.Fatalf("bad: \n%#v\n%#v", out2, d2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-07 21:38:18 +00:00
|
|
|
func TestFSM_SnapshotRestore_ACLPolicy(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
p1 := mock.ACLPolicy()
|
|
|
|
p2 := mock.ACLPolicy()
|
2017-08-07 23:58:12 +00:00
|
|
|
state.UpsertACLPolicies(1000, []*structs.ACLPolicy{p1, p2})
|
2017-08-07 21:38:18 +00:00
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out1, _ := state2.ACLPolicyByName(ws, p1.Name)
|
|
|
|
out2, _ := state2.ACLPolicyByName(ws, p2.Name)
|
|
|
|
assert.Equal(t, p1, out1)
|
|
|
|
assert.Equal(t, p2, out2)
|
|
|
|
}
|
|
|
|
|
2017-08-12 22:22:38 +00:00
|
|
|
func TestFSM_SnapshotRestore_ACLTokens(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
tk1 := mock.ACLToken()
|
|
|
|
tk2 := mock.ACLToken()
|
|
|
|
state.UpsertACLTokens(1000, []*structs.ACLToken{tk1, tk2})
|
|
|
|
|
|
|
|
// Verify the contents
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-08-12 22:46:19 +00:00
|
|
|
out1, _ := state2.ACLTokenByAccessorID(ws, tk1.AccessorID)
|
|
|
|
out2, _ := state2.ACLTokenByAccessorID(ws, tk2.AccessorID)
|
2017-08-12 22:22:38 +00:00
|
|
|
assert.Equal(t, tk1, out1)
|
|
|
|
assert.Equal(t, tk2, out2)
|
|
|
|
}
|
|
|
|
|
2016-07-26 00:26:10 +00:00
|
|
|
func TestFSM_SnapshotRestore_AddMissingSummary(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-07-26 00:26:10 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
|
2016-08-05 21:40:35 +00:00
|
|
|
// make an allocation
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
state.UpsertJob(1010, alloc.Job)
|
|
|
|
state.UpsertAllocs(1011, []*structs.Allocation{alloc})
|
|
|
|
|
|
|
|
// Delete the summary
|
2017-09-07 23:56:15 +00:00
|
|
|
state.DeleteJobSummary(1040, alloc.Namespace, alloc.Job.ID)
|
2016-08-05 21:40:35 +00:00
|
|
|
|
|
|
|
// Delete the index
|
|
|
|
if err := state.RemoveIndex("job_summary"); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fsm2 := testSnapshotRestore(t, fsm)
|
|
|
|
state2 := fsm2.State()
|
|
|
|
latestIndex, _ := state.LatestIndex()
|
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
out, _ := state2.JobSummaryByID(ws, alloc.Namespace, alloc.Job.ID)
|
2016-08-05 21:40:35 +00:00
|
|
|
expected := structs.JobSummary{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: alloc.Job.ID,
|
|
|
|
Namespace: alloc.Job.Namespace,
|
2016-08-05 21:40:35 +00:00
|
|
|
Summary: map[string]structs.TaskGroupSummary{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2016-08-05 21:40:35 +00:00
|
|
|
Starting: 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
CreateIndex: 1010,
|
|
|
|
ModifyIndex: latestIndex,
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(&expected, out) {
|
|
|
|
t.Fatalf("expected: %#v, actual: %#v", &expected, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFSM_ReconcileSummaries(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-08-05 21:40:35 +00:00
|
|
|
// Add some state
|
|
|
|
fsm := testFSM(t)
|
|
|
|
state := fsm.State()
|
|
|
|
|
2016-08-03 18:58:36 +00:00
|
|
|
// Add a node
|
|
|
|
node := mock.Node()
|
|
|
|
state.UpsertNode(800, node)
|
|
|
|
|
|
|
|
// Make a job so that none of the tasks can be placed
|
2016-07-26 00:26:10 +00:00
|
|
|
job1 := mock.Job()
|
2016-08-03 18:58:36 +00:00
|
|
|
job1.TaskGroups[0].Tasks[0].Resources.CPU = 5000
|
2016-07-26 00:26:10 +00:00
|
|
|
state.UpsertJob(1000, job1)
|
2016-08-03 18:58:36 +00:00
|
|
|
|
2016-08-03 23:08:30 +00:00
|
|
|
// make a job which can make partial progress
|
2016-08-04 01:08:37 +00:00
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
state.UpsertJob(1010, alloc.Job)
|
|
|
|
state.UpsertAllocs(1011, []*structs.Allocation{alloc})
|
2016-08-03 18:58:36 +00:00
|
|
|
|
|
|
|
// Delete the summaries
|
2017-09-07 23:56:15 +00:00
|
|
|
state.DeleteJobSummary(1030, job1.Namespace, job1.ID)
|
|
|
|
state.DeleteJobSummary(1040, alloc.Namespace, alloc.Job.ID)
|
2016-08-03 18:58:36 +00:00
|
|
|
|
2016-08-05 21:40:35 +00:00
|
|
|
req := structs.GenericRequest{}
|
|
|
|
buf, err := structs.Encode(structs.ReconcileJobSummariesRequestType, req)
|
|
|
|
if err != nil {
|
2016-08-03 18:58:36 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-07-26 00:26:10 +00:00
|
|
|
|
2016-08-05 21:40:35 +00:00
|
|
|
resp := fsm.Apply(makeLog(buf))
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatalf("resp: %v", resp)
|
|
|
|
}
|
2016-08-03 18:58:36 +00:00
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
out1, _ := state.JobSummaryByID(ws, job1.Namespace, job1.ID)
|
2016-07-26 00:26:10 +00:00
|
|
|
expected := structs.JobSummary{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: job1.ID,
|
|
|
|
Namespace: job1.Namespace,
|
2016-07-26 00:26:10 +00:00
|
|
|
Summary: map[string]structs.TaskGroupSummary{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2016-07-26 00:26:10 +00:00
|
|
|
Queued: 10,
|
|
|
|
},
|
|
|
|
},
|
2016-08-04 22:14:01 +00:00
|
|
|
CreateIndex: 1000,
|
2016-08-05 21:40:35 +00:00
|
|
|
ModifyIndex: out1.ModifyIndex,
|
2016-07-26 00:26:10 +00:00
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(&expected, out1) {
|
2016-07-26 05:22:55 +00:00
|
|
|
t.Fatalf("expected: %#v, actual: %#v", &expected, out1)
|
2016-07-26 00:26:10 +00:00
|
|
|
}
|
2016-08-03 18:58:36 +00:00
|
|
|
|
2016-08-04 01:08:37 +00:00
|
|
|
// This exercises the code path which adds the allocations made by the
|
|
|
|
// planner and the number of unplaced allocations in the reconcile summaries
|
|
|
|
// codepath
|
2017-09-07 23:56:15 +00:00
|
|
|
out2, _ := state.JobSummaryByID(ws, alloc.Namespace, alloc.Job.ID)
|
2016-08-03 18:58:36 +00:00
|
|
|
expected = structs.JobSummary{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: alloc.Job.ID,
|
|
|
|
Namespace: alloc.Job.Namespace,
|
2016-08-03 18:58:36 +00:00
|
|
|
Summary: map[string]structs.TaskGroupSummary{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2017-06-29 18:01:41 +00:00
|
|
|
Queued: 9,
|
2016-08-04 01:08:37 +00:00
|
|
|
Starting: 1,
|
2016-08-03 18:58:36 +00:00
|
|
|
},
|
|
|
|
},
|
2016-08-04 22:14:01 +00:00
|
|
|
CreateIndex: 1010,
|
2016-08-05 21:40:35 +00:00
|
|
|
ModifyIndex: out2.ModifyIndex,
|
2016-08-03 18:58:36 +00:00
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(&expected, out2) {
|
2017-06-29 18:01:41 +00:00
|
|
|
t.Fatalf("Diff % #v", pretty.Diff(&expected, out2))
|
2016-08-03 18:58:36 +00:00
|
|
|
}
|
2016-07-26 00:26:10 +00:00
|
|
|
}
|