2015-07-06 20:23:11 +00:00
|
|
|
package nomad
|
|
|
|
|
|
|
|
import (
|
2016-02-22 02:51:34 +00:00
|
|
|
"fmt"
|
2015-07-06 21:38:57 +00:00
|
|
|
"reflect"
|
2016-08-16 06:11:57 +00:00
|
|
|
"strings"
|
2015-07-06 20:23:11 +00:00
|
|
|
"testing"
|
2015-08-23 02:17:49 +00:00
|
|
|
"time"
|
2015-07-06 20:23:11 +00:00
|
|
|
|
2017-02-08 05:22:48 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
2015-07-06 20:23:11 +00:00
|
|
|
"github.com/hashicorp/net-rpc-msgpackrpc"
|
2017-09-15 03:33:31 +00:00
|
|
|
"github.com/hashicorp/nomad/acl"
|
2017-09-29 16:58:48 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-08-11 21:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
2015-07-06 20:23:11 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/hashicorp/nomad/testutil"
|
2016-08-19 20:13:51 +00:00
|
|
|
vapi "github.com/hashicorp/vault/api"
|
2017-09-15 03:33:31 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2018-01-20 02:48:37 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2015-07-06 20:23:11 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestClientEndpoint_Register(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-05 21:50:04 +00:00
|
|
|
require := require.New(t)
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-07-06 20:23:11 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have no client connections
|
|
|
|
require.Empty(s1.connectedNodes())
|
|
|
|
|
2015-07-06 20:23:11 +00:00
|
|
|
// Create the register request
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
req := &structs.NodeRegisterRequest{
|
2015-07-06 20:23:11 +00:00
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 20:23:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", req, &resp); err != nil {
|
2015-07-06 20:23:11 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-07-06 20:34:32 +00:00
|
|
|
if resp.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp.Index)
|
|
|
|
}
|
2015-07-06 20:23:11 +00:00
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have the client connections
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
require.Len(nodes, 1)
|
|
|
|
require.Equal(node.ID, nodes[0])
|
|
|
|
|
2015-07-06 20:23:11 +00:00
|
|
|
// Check for the node in the FSM
|
|
|
|
state := s1.fsm.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2016-08-16 06:11:57 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("expected node")
|
|
|
|
}
|
|
|
|
if out.CreateIndex != resp.Index {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
|
|
|
if out.ComputedClass == "" {
|
|
|
|
t.Fatal("ComputedClass not set")
|
|
|
|
}
|
2018-01-05 21:50:04 +00:00
|
|
|
|
|
|
|
// Close the connection and check that we remove the client connections
|
|
|
|
require.Nil(codec.Close())
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
return len(nodes) == 0, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("should have no clients")
|
|
|
|
})
|
2016-08-16 06:11:57 +00:00
|
|
|
}
|
|
|
|
|
2016-08-19 17:50:49 +00:00
|
|
|
func TestClientEndpoint_Register_SecretMismatch(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-19 17:50:49 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
req := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", req, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the nodes SecretID
|
2017-09-29 16:58:48 +00:00
|
|
|
node.SecretID = uuid.Generate()
|
2016-08-19 17:50:49 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.Register", req, &resp)
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "Not registering") {
|
2017-02-28 00:00:19 +00:00
|
|
|
t.Fatalf("Expecting error regarding mismatching secret id: %v", err)
|
2016-08-19 17:50:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-06 20:42:33 +00:00
|
|
|
func TestClientEndpoint_Deregister(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-07-06 20:42:33 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
reg := &structs.NodeRegisterRequest{
|
2015-07-06 20:42:33 +00:00
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 20:42:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-07-06 20:42:33 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Deregister
|
2015-07-07 16:51:42 +00:00
|
|
|
dereg := &structs.NodeDeregisterRequest{
|
2015-07-06 20:42:33 +00:00
|
|
|
NodeID: node.ID,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 20:42:33 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg, &resp2); err != nil {
|
2015-07-06 20:42:33 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
|
|
|
state := s1.fsm.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2015-07-06 20:42:33 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out != nil {
|
|
|
|
t.Fatalf("unexpected node")
|
|
|
|
}
|
|
|
|
}
|
2015-07-06 20:50:40 +00:00
|
|
|
|
2017-10-26 21:12:17 +00:00
|
|
|
func TestClientEndpoint_Deregister_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-10-26 21:12:17 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
node1 := mock.Node()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
if err := state.UpsertNode(1, node); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if err := state.UpsertNode(2, node1); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the policy and tokens
|
|
|
|
validToken := mock.CreatePolicyAndToken(t, state, 1001, "test-valid", mock.NodePolicy(acl.PolicyWrite))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "test-invalid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
|
|
|
|
// Deregister without any token and expect it to fail
|
|
|
|
dereg := &structs.NodeDeregisterRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg, &resp); err == nil {
|
|
|
|
t.Fatalf("node de-register succeeded")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Deregister with a valid token
|
|
|
|
dereg.AuthToken = validToken.SecretID
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out != nil {
|
|
|
|
t.Fatalf("unexpected node")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Deregister with an invalid token.
|
|
|
|
dereg1 := &structs.NodeDeregisterRequest{
|
|
|
|
NodeID: node1.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
dereg1.AuthToken = invalidToken.SecretID
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg1, &resp); err == nil {
|
|
|
|
t.Fatalf("rpc should not have succeeded")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
|
|
|
dereg1.AuthToken = root.SecretID
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg1, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
2015-07-06 20:42:33 +00:00
|
|
|
}
|
|
|
|
}
|
2015-07-06 20:50:40 +00:00
|
|
|
|
2016-08-22 20:57:27 +00:00
|
|
|
func TestClientEndpoint_Deregister_Vault(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-22 20:57:27 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Swap the servers Vault Client
|
|
|
|
tvc := &TestVaultClient{}
|
|
|
|
s1.vault = tvc
|
|
|
|
|
|
|
|
// Put some Vault accessors in the state store for that node
|
|
|
|
state := s1.fsm.State()
|
|
|
|
va1 := mock.VaultAccessor()
|
|
|
|
va1.NodeID = node.ID
|
|
|
|
va2 := mock.VaultAccessor()
|
|
|
|
va2.NodeID = node.ID
|
|
|
|
state.UpsertVaultAccessor(100, []*structs.VaultAccessor{va1, va2})
|
|
|
|
|
|
|
|
// Deregister
|
|
|
|
dereg := &structs.NodeDeregisterRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Deregister", dereg, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2016-08-22 20:57:27 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out != nil {
|
|
|
|
t.Fatalf("unexpected node")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the endpoint revoked the tokens
|
|
|
|
if l := len(tvc.RevokedTokens); l != 2 {
|
|
|
|
t.Fatalf("Deregister revoked %d tokens; want 2", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-06 20:50:40 +00:00
|
|
|
func TestClientEndpoint_UpdateStatus(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-05 21:50:04 +00:00
|
|
|
require := require.New(t)
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-07-06 20:50:40 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have no client connections
|
|
|
|
require.Empty(s1.connectedNodes())
|
|
|
|
|
2015-07-06 20:50:40 +00:00
|
|
|
// Create the register request
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
reg := &structs.NodeRegisterRequest{
|
2015-07-06 20:50:40 +00:00
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 20:50:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
2015-08-23 00:49:48 +00:00
|
|
|
var resp structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-07-06 20:50:40 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-08-23 00:49:48 +00:00
|
|
|
// Check for heartbeat interval
|
2015-08-23 01:16:05 +00:00
|
|
|
ttl := resp.HeartbeatTTL
|
2015-08-31 01:10:12 +00:00
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
2015-08-23 01:16:05 +00:00
|
|
|
t.Fatalf("bad: %#v", ttl)
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
|
2015-07-06 20:50:40 +00:00
|
|
|
// Update the status
|
2015-07-07 16:51:42 +00:00
|
|
|
dereg := &structs.NodeUpdateStatusRequest{
|
2015-07-06 20:50:40 +00:00
|
|
|
NodeID: node.ID,
|
2015-09-07 02:47:02 +00:00
|
|
|
Status: structs.NodeStatusInit,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 20:50:40 +00:00
|
|
|
}
|
2015-08-23 00:49:48 +00:00
|
|
|
var resp2 structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateStatus", dereg, &resp2); err != nil {
|
2015-07-06 20:50:40 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
2015-08-23 00:49:48 +00:00
|
|
|
// Check for heartbeat interval
|
2015-08-23 01:16:05 +00:00
|
|
|
ttl = resp2.HeartbeatTTL
|
2015-08-31 01:10:12 +00:00
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
2015-08-23 01:16:05 +00:00
|
|
|
t.Fatalf("bad: %#v", ttl)
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have the client connections
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
require.Len(nodes, 1)
|
|
|
|
require.Equal(node.ID, nodes[0])
|
|
|
|
|
2015-07-06 20:50:40 +00:00
|
|
|
// Check for the node in the FSM
|
|
|
|
state := s1.fsm.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2015-07-06 20:50:40 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("expected node")
|
|
|
|
}
|
|
|
|
if out.ModifyIndex != resp2.Index {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
2018-01-05 21:50:04 +00:00
|
|
|
|
|
|
|
// Close the connection and check that we remove the client connections
|
|
|
|
require.Nil(codec.Close())
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
return len(nodes) == 0, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("should have no clients")
|
|
|
|
})
|
2015-07-06 20:50:40 +00:00
|
|
|
}
|
2015-07-06 21:38:57 +00:00
|
|
|
|
2016-08-22 20:57:27 +00:00
|
|
|
func TestClientEndpoint_UpdateStatus_Vault(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-22 20:57:27 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
|
|
|
ttl := resp.HeartbeatTTL
|
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
|
|
|
t.Fatalf("bad: %#v", ttl)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Swap the servers Vault Client
|
|
|
|
tvc := &TestVaultClient{}
|
|
|
|
s1.vault = tvc
|
|
|
|
|
|
|
|
// Put some Vault accessors in the state store for that node
|
|
|
|
state := s1.fsm.State()
|
|
|
|
va1 := mock.VaultAccessor()
|
|
|
|
va1.NodeID = node.ID
|
|
|
|
va2 := mock.VaultAccessor()
|
|
|
|
va2.NodeID = node.ID
|
|
|
|
state.UpsertVaultAccessor(100, []*structs.VaultAccessor{va1, va2})
|
|
|
|
|
|
|
|
// Update the status to be down
|
|
|
|
dereg := &structs.NodeUpdateStatusRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Status: structs.NodeStatusDown,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateStatus", dereg, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the endpoint revoked the tokens
|
|
|
|
if l := len(tvc.RevokedTokens); l != 2 {
|
|
|
|
t.Fatalf("Deregister revoked %d tokens; want 2", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-21 22:22:02 +00:00
|
|
|
func TestClientEndpoint_Register_GetEvals(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-07-21 22:22:02 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Register a system job.
|
|
|
|
job := mock.SystemJob()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
if err := state.UpsertJob(1, job); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the register request going directly to ready
|
|
|
|
node := mock.Node()
|
|
|
|
node.Status = structs.NodeStatusReady
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
|
|
|
ttl := resp.HeartbeatTTL
|
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
|
|
|
t.Fatalf("bad: %#v", ttl)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for an eval caused by the system job.
|
|
|
|
if len(resp.EvalIDs) != 1 {
|
|
|
|
t.Fatalf("expected one eval; got %#v", resp.EvalIDs)
|
|
|
|
}
|
|
|
|
|
|
|
|
evalID := resp.EvalIDs[0]
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, evalID)
|
2016-07-21 22:22:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("could not get eval %v", evalID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if eval.Type != "system" {
|
|
|
|
t.Fatalf("unexpected eval type; got %v; want %q", eval.Type, "system")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
2017-02-08 05:22:48 +00:00
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2016-07-21 22:22:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("expected node")
|
|
|
|
}
|
|
|
|
if out.ModifyIndex != resp.Index {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
2016-07-25 19:46:18 +00:00
|
|
|
|
2017-08-07 21:13:05 +00:00
|
|
|
// Transition it to down and then ready
|
2016-07-25 19:46:18 +00:00
|
|
|
node.Status = structs.NodeStatusDown
|
|
|
|
reg = &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp.EvalIDs) != 1 {
|
|
|
|
t.Fatalf("expected one eval; got %#v", resp.EvalIDs)
|
|
|
|
}
|
|
|
|
|
|
|
|
node.Status = structs.NodeStatusReady
|
|
|
|
reg = &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp.EvalIDs) != 1 {
|
|
|
|
t.Fatalf("expected one eval; got %#v", resp.EvalIDs)
|
|
|
|
}
|
2016-07-21 22:22:02 +00:00
|
|
|
}
|
|
|
|
|
2015-10-20 18:33:37 +00:00
|
|
|
func TestClientEndpoint_UpdateStatus_GetEvals(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-10-20 18:33:37 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Register a system job.
|
|
|
|
job := mock.SystemJob()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
if err := state.UpsertJob(1, job); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
node.Status = structs.NodeStatusInit
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
|
|
|
ttl := resp.HeartbeatTTL
|
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
|
|
|
t.Fatalf("bad: %#v", ttl)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the status
|
|
|
|
update := &structs.NodeUpdateStatusRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Status: structs.NodeStatusReady,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateStatus", update, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for an eval caused by the system job.
|
|
|
|
if len(resp2.EvalIDs) != 1 {
|
|
|
|
t.Fatalf("expected one eval; got %#v", resp2.EvalIDs)
|
|
|
|
}
|
|
|
|
|
|
|
|
evalID := resp2.EvalIDs[0]
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, evalID)
|
2015-10-20 18:33:37 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("could not get eval %v", evalID)
|
|
|
|
}
|
|
|
|
|
2015-10-23 23:32:45 +00:00
|
|
|
if eval.Type != "system" {
|
|
|
|
t.Fatalf("unexpected eval type; got %v; want %q", eval.Type, "system")
|
2015-10-20 18:33:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
|
|
|
ttl = resp2.HeartbeatTTL
|
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
|
|
|
t.Fatalf("bad: %#v", ttl)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
2017-02-08 05:22:48 +00:00
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2015-10-20 18:33:37 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out == nil {
|
|
|
|
t.Fatalf("expected node")
|
|
|
|
}
|
|
|
|
if out.ModifyIndex != resp2.Index {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-23 00:49:48 +00:00
|
|
|
func TestClientEndpoint_UpdateStatus_HeartbeatOnly(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-08-23 00:49:48 +00:00
|
|
|
defer s1.Shutdown()
|
2016-06-01 10:47:19 +00:00
|
|
|
|
2018-01-12 01:00:30 +00:00
|
|
|
s2 := TestServer(t, func(c *Config) {
|
2016-06-01 10:47:19 +00:00
|
|
|
c.DevDisableBootstrap = true
|
|
|
|
})
|
|
|
|
defer s2.Shutdown()
|
|
|
|
|
2018-01-12 01:00:30 +00:00
|
|
|
s3 := TestServer(t, func(c *Config) {
|
2016-06-01 10:47:19 +00:00
|
|
|
c.DevDisableBootstrap = true
|
|
|
|
})
|
|
|
|
defer s3.Shutdown()
|
|
|
|
servers := []*Server{s1, s2, s3}
|
2018-01-12 01:00:30 +00:00
|
|
|
TestJoin(t, s1, s2, s3)
|
2016-06-01 10:47:19 +00:00
|
|
|
|
|
|
|
for _, s := range servers {
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-02-02 21:52:31 +00:00
|
|
|
peers, _ := s.numPeers()
|
2017-02-03 01:50:06 +00:00
|
|
|
return peers == 3, nil
|
2016-06-01 10:47:19 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("should have 3 peers")
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-08-23 00:49:48 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-08-23 00:49:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
2015-08-23 01:16:05 +00:00
|
|
|
ttl := resp.HeartbeatTTL
|
2015-08-31 01:10:12 +00:00
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
2015-08-23 01:16:05 +00:00
|
|
|
t.Fatalf("bad: %#v", ttl)
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 18:09:31 +00:00
|
|
|
// Check for heartbeat servers
|
2016-06-01 10:47:19 +00:00
|
|
|
serverAddrs := resp.Servers
|
|
|
|
if len(serverAddrs) == 0 {
|
|
|
|
t.Fatalf("bad: %#v", serverAddrs)
|
2016-05-23 18:09:31 +00:00
|
|
|
}
|
|
|
|
|
2015-08-23 00:49:48 +00:00
|
|
|
// Update the status, static state
|
|
|
|
dereg := &structs.NodeUpdateStatusRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Status: node.Status,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateStatus", dereg, &resp2); err != nil {
|
2015-08-23 00:49:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for heartbeat interval
|
2015-08-23 01:16:05 +00:00
|
|
|
ttl = resp2.HeartbeatTTL
|
2015-08-31 01:10:12 +00:00
|
|
|
if ttl < s1.config.MinHeartbeatTTL || ttl > 2*s1.config.MinHeartbeatTTL {
|
2015-08-23 01:16:05 +00:00
|
|
|
t.Fatalf("bad: %#v", ttl)
|
2015-08-23 00:49:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-07 03:00:12 +00:00
|
|
|
func TestClientEndpoint_UpdateDrain(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-09-07 03:00:12 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-09-07 03:00:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-09-07 03:00:12 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the status
|
|
|
|
dereg := &structs.NodeUpdateDrainRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Drain: true,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-09-07 03:00:12 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.NodeDrainUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp2); err != nil {
|
2015-09-07 03:00:12 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for the node in the FSM
|
|
|
|
state := s1.fsm.State()
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.NodeByID(ws, node.ID)
|
2015-09-07 03:00:12 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if !out.Drain {
|
|
|
|
t.Fatalf("bad: %#v", out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-15 03:33:31 +00:00
|
|
|
func TestClientEndpoint_UpdateDrain_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-09-15 03:33:31 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2017-09-15 03:59:18 +00:00
|
|
|
// Create the node
|
2017-09-15 03:33:31 +00:00
|
|
|
node := mock.Node()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
|
|
|
|
assert.Nil(state.UpsertNode(1, node), "UpsertNode")
|
|
|
|
|
2017-09-15 04:41:26 +00:00
|
|
|
// Create the policy and tokens
|
2017-10-04 22:08:10 +00:00
|
|
|
validToken := mock.CreatePolicyAndToken(t, state, 1001, "test-valid", mock.NodePolicy(acl.PolicyWrite))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "test-invalid", mock.NodePolicy(acl.PolicyRead))
|
2017-09-15 03:33:31 +00:00
|
|
|
|
|
|
|
// Update the status without a token and expect failure
|
|
|
|
dereg := &structs.NodeUpdateDrainRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Drain: true,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
{
|
|
|
|
var resp structs.NodeDrainUpdateResponse
|
2017-09-15 17:41:28 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-09-15 03:33:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a valid token
|
2017-10-12 22:16:33 +00:00
|
|
|
dereg.AuthToken = validToken.SecretID
|
2017-09-15 03:33:31 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeDrainUpdateResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp), "RPC")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a invalid token
|
2017-10-12 22:16:33 +00:00
|
|
|
dereg.AuthToken = invalidToken.SecretID
|
2017-09-15 03:33:31 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeDrainUpdateResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
2017-10-12 22:16:33 +00:00
|
|
|
dereg.AuthToken = root.SecretID
|
2017-09-15 03:33:31 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeDrainUpdateResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp), "RPC")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// This test ensures that Nomad marks client state of allocations which are in
|
|
|
|
// pending/running state to lost when a node is marked as down.
|
2016-08-09 17:16:17 +00:00
|
|
|
func TestClientEndpoint_Drain_Down(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-09 17:16:17 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// Register a node
|
2016-08-09 17:16:17 +00:00
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// Register a service job
|
2016-08-09 17:16:17 +00:00
|
|
|
var jobResp structs.JobRegisterResponse
|
|
|
|
job := mock.Job()
|
2016-08-09 20:11:58 +00:00
|
|
|
job.TaskGroups[0].Count = 1
|
2016-08-09 17:16:17 +00:00
|
|
|
jobReq := &structs.JobRegisterRequest{
|
2017-09-07 23:56:15 +00:00
|
|
|
Job: job,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
},
|
2016-08-09 17:16:17 +00:00
|
|
|
}
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Job.Register", jobReq, &jobResp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// Register a system job
|
|
|
|
var jobResp1 structs.JobRegisterResponse
|
|
|
|
job1 := mock.Job()
|
|
|
|
job1.TaskGroups[0].Count = 1
|
|
|
|
job1.Type = structs.JobTypeSystem
|
|
|
|
jobReq1 := &structs.JobRegisterRequest{
|
2017-09-07 23:56:15 +00:00
|
|
|
Job: job1,
|
|
|
|
WriteRequest: structs.WriteRequest{
|
|
|
|
Region: "global",
|
|
|
|
Namespace: job1.Namespace,
|
|
|
|
},
|
2016-08-09 20:11:58 +00:00
|
|
|
}
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Job.Register", jobReq1, &jobResp1); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for the scheduler to create an allocation
|
2016-08-09 17:16:17 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
allocs, err := s1.fsm.state.AllocsByJob(ws, job.Namespace, job.ID, true)
|
2016-08-09 17:16:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2017-09-07 23:56:15 +00:00
|
|
|
allocs1, err := s1.fsm.state.AllocsByJob(ws, job1.Namespace, job1.ID, true)
|
2016-08-09 20:11:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return len(allocs) > 0 && len(allocs1) > 0, nil
|
2016-08-09 17:16:17 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// Drain the node
|
2016-08-09 17:16:17 +00:00
|
|
|
dereg := &structs.NodeUpdateDrainRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
Drain: true,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeDrainUpdateResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateDrain", dereg, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-08-09 20:11:58 +00:00
|
|
|
// Mark the node as down
|
2016-08-09 17:16:17 +00:00
|
|
|
node.Status = structs.NodeStatusDown
|
|
|
|
reg = &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that the allocation has transitioned to lost
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
summary, err := s1.fsm.state.JobSummaryByID(ws, job.Namespace, job.ID)
|
2016-08-09 17:16:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2016-08-09 20:11:58 +00:00
|
|
|
expectedSummary := &structs.JobSummary{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: job.ID,
|
|
|
|
Namespace: job.Namespace,
|
2016-08-09 17:16:17 +00:00
|
|
|
Summary: map[string]structs.TaskGroupSummary{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2016-08-09 20:11:58 +00:00
|
|
|
Queued: 1,
|
|
|
|
Lost: 1,
|
2016-08-09 17:16:17 +00:00
|
|
|
},
|
|
|
|
},
|
2016-12-16 18:21:56 +00:00
|
|
|
Children: new(structs.JobChildrenSummary),
|
2016-08-09 20:11:58 +00:00
|
|
|
CreateIndex: jobResp.JobModifyIndex,
|
|
|
|
ModifyIndex: summary.ModifyIndex,
|
2016-08-09 17:16:17 +00:00
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(summary, expectedSummary) {
|
2016-08-09 20:11:58 +00:00
|
|
|
return false, fmt.Errorf("expected: %#v, actual: %#v", expectedSummary, summary)
|
|
|
|
}
|
|
|
|
|
2017-09-07 23:56:15 +00:00
|
|
|
summary1, err := s1.fsm.state.JobSummaryByID(ws, job1.Namespace, job1.ID)
|
2016-08-09 20:11:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
expectedSummary1 := &structs.JobSummary{
|
2017-09-07 23:56:15 +00:00
|
|
|
JobID: job1.ID,
|
|
|
|
Namespace: job1.Namespace,
|
2016-08-09 20:11:58 +00:00
|
|
|
Summary: map[string]structs.TaskGroupSummary{
|
2017-09-26 22:26:33 +00:00
|
|
|
"web": {
|
2016-08-09 20:11:58 +00:00
|
|
|
Lost: 1,
|
|
|
|
},
|
|
|
|
},
|
2016-12-16 18:21:56 +00:00
|
|
|
Children: new(structs.JobChildrenSummary),
|
2016-08-09 20:11:58 +00:00
|
|
|
CreateIndex: jobResp1.JobModifyIndex,
|
|
|
|
ModifyIndex: summary1.ModifyIndex,
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(summary1, expectedSummary1) {
|
|
|
|
return false, fmt.Errorf("expected: %#v, actual: %#v", expectedSummary1, summary1)
|
2016-08-09 17:16:17 +00:00
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-07-06 21:38:57 +00:00
|
|
|
func TestClientEndpoint_GetNode(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-07-06 21:38:57 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
2015-08-11 21:27:14 +00:00
|
|
|
node := mock.Node()
|
2015-07-07 16:51:42 +00:00
|
|
|
reg := &structs.NodeRegisterRequest{
|
2015-07-06 21:38:57 +00:00
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-07-06 21:38:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-07-06 21:38:57 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Lookup the node
|
|
|
|
get := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
2015-09-14 01:18:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2015-07-06 21:38:57 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.SingleNodeResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", get, &resp2); err != nil {
|
2015-07-06 21:38:57 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != resp.Index {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, resp.Index)
|
|
|
|
}
|
|
|
|
|
2016-01-30 01:46:44 +00:00
|
|
|
if resp2.Node.ComputedClass == "" {
|
2016-01-21 20:21:42 +00:00
|
|
|
t.Fatalf("bad ComputedClass: %#v", resp2.Node)
|
|
|
|
}
|
|
|
|
|
2016-07-25 21:11:32 +00:00
|
|
|
// Update the status updated at value
|
|
|
|
node.StatusUpdatedAt = resp2.Node.StatusUpdatedAt
|
2016-08-16 06:11:57 +00:00
|
|
|
node.SecretID = ""
|
2015-07-06 21:38:57 +00:00
|
|
|
if !reflect.DeepEqual(node, resp2.Node) {
|
2016-07-25 21:11:32 +00:00
|
|
|
t.Fatalf("bad: %#v \n %#v", node, resp2.Node)
|
2015-07-06 21:38:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup non-existing node
|
2016-01-14 20:57:43 +00:00
|
|
|
get.NodeID = "12345678-abcd-efab-cdef-123456789abc"
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", get, &resp2); err != nil {
|
2015-07-06 21:38:57 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != resp.Index {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, resp.Index)
|
|
|
|
}
|
|
|
|
if resp2.Node != nil {
|
|
|
|
t.Fatalf("unexpected node")
|
|
|
|
}
|
|
|
|
}
|
2015-08-06 23:39:20 +00:00
|
|
|
|
2017-09-15 03:59:18 +00:00
|
|
|
func TestClientEndpoint_GetNode_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-09-15 03:59:18 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
assert.Nil(state.UpsertNode(1, node), "UpsertNode")
|
|
|
|
|
2017-09-15 04:41:26 +00:00
|
|
|
// Create the policy and tokens
|
2017-10-04 22:08:10 +00:00
|
|
|
validToken := mock.CreatePolicyAndToken(t, state, 1001, "test-valid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "test-invalid", mock.NodePolicy(acl.PolicyDeny))
|
2017-09-15 03:59:18 +00:00
|
|
|
|
|
|
|
// Lookup the node without a token and expect failure
|
|
|
|
req := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
{
|
|
|
|
var resp structs.SingleNodeResponse
|
2017-09-15 17:41:28 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-09-15 03:59:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a valid token
|
2017-10-12 23:27:33 +00:00
|
|
|
req.AuthToken = validToken.SecretID
|
|
|
|
{
|
|
|
|
var resp structs.SingleNodeResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp), "RPC")
|
|
|
|
assert.Equal(node.ID, resp.Node.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a Node.SecretID
|
|
|
|
req.AuthToken = node.SecretID
|
2017-09-15 03:59:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.SingleNodeResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp), "RPC")
|
|
|
|
assert.Equal(node.ID, resp.Node.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a invalid token
|
2017-10-12 23:27:33 +00:00
|
|
|
req.AuthToken = invalidToken.SecretID
|
2017-09-15 03:59:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.SingleNodeResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
2017-10-12 23:27:33 +00:00
|
|
|
req.AuthToken = root.SecretID
|
2017-09-15 03:59:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.SingleNodeResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp), "RPC")
|
|
|
|
assert.Equal(node.ID, resp.Node.ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-30 02:00:02 +00:00
|
|
|
func TestClientEndpoint_GetNode_Blocking(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-10-29 22:48:44 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node1 := mock.Node()
|
|
|
|
node2 := mock.Node()
|
|
|
|
|
|
|
|
// First create an unrelated node.
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
2015-10-30 02:00:02 +00:00
|
|
|
if err := state.UpsertNode(100, node1); err != nil {
|
2015-10-29 22:48:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Upsert the node we are watching later
|
|
|
|
time.AfterFunc(200*time.Millisecond, func() {
|
2015-10-30 02:00:02 +00:00
|
|
|
if err := state.UpsertNode(200, node2); err != nil {
|
2015-10-29 22:48:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Lookup the node
|
2015-10-30 02:00:02 +00:00
|
|
|
req := &structs.NodeSpecificRequest{
|
2015-10-29 22:48:44 +00:00
|
|
|
NodeID: node2.ID,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
2017-02-08 06:10:33 +00:00
|
|
|
MinQueryIndex: 150,
|
2015-10-29 22:48:44 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp structs.SingleNodeResponse
|
|
|
|
start := time.Now()
|
2015-10-30 02:00:02 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp); err != nil {
|
2015-10-29 22:48:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 200*time.Millisecond {
|
2015-10-29 22:48:44 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp)
|
|
|
|
}
|
2015-10-30 02:00:02 +00:00
|
|
|
if resp.Index != 200 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp.Index, 200)
|
2015-10-29 22:48:44 +00:00
|
|
|
}
|
|
|
|
if resp.Node == nil || resp.Node.ID != node2.ID {
|
|
|
|
t.Fatalf("bad: %#v", resp.Node)
|
|
|
|
}
|
2015-10-30 02:00:02 +00:00
|
|
|
|
|
|
|
// Node update triggers watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
nodeUpdate := mock.Node()
|
|
|
|
nodeUpdate.ID = node2.ID
|
|
|
|
nodeUpdate.Status = structs.NodeStatusDown
|
|
|
|
if err := state.UpsertNode(300, nodeUpdate); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.QueryOptions.MinQueryIndex = 250
|
|
|
|
var resp2 structs.SingleNodeResponse
|
|
|
|
start = time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-30 02:00:02 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp)
|
|
|
|
}
|
|
|
|
if resp2.Index != 300 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 300)
|
|
|
|
}
|
|
|
|
if resp2.Node == nil || resp2.Node.Status != structs.NodeStatusDown {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Node)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Node delete triggers watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
if err := state.DeleteNode(400, node2.ID); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.QueryOptions.MinQueryIndex = 350
|
|
|
|
var resp3 structs.SingleNodeResponse
|
|
|
|
start = time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetNode", req, &resp3); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-30 02:00:02 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp)
|
|
|
|
}
|
|
|
|
if resp3.Index != 400 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 400)
|
|
|
|
}
|
|
|
|
if resp3.Node != nil {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Node)
|
|
|
|
}
|
2015-10-29 22:48:44 +00:00
|
|
|
}
|
|
|
|
|
2015-08-23 02:17:49 +00:00
|
|
|
func TestClientEndpoint_GetAllocs(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-08-23 02:17:49 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-23 02:17:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-08-23 02:17:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Inject fake evaluations
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
state := s1.fsm.State()
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2015-09-07 03:47:42 +00:00
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
2015-08-23 02:17:49 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the allocs
|
|
|
|
get := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
2015-09-14 01:18:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2015-08-23 02:17:49 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.NodeAllocsResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", get, &resp2); err != nil {
|
2015-08-23 02:17:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != 100 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 100)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp2.Allocs) != 1 || resp2.Allocs[0].ID != alloc.ID {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Allocs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup non-existing node
|
|
|
|
get.NodeID = "foobarbaz"
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", get, &resp2); err != nil {
|
2015-08-23 02:17:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != 100 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 100)
|
|
|
|
}
|
|
|
|
if len(resp2.Allocs) != 0 {
|
|
|
|
t.Fatalf("unexpected node")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-16 21:21:29 +00:00
|
|
|
func TestClientEndpoint_GetAllocs_ACL_Basic(t *testing.T) {
|
2017-09-15 04:42:19 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-09-15 04:42:19 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
// Create the node
|
2017-09-15 21:27:11 +00:00
|
|
|
allocDefaultNS := mock.Alloc()
|
2017-09-15 04:42:19 +00:00
|
|
|
node := mock.Node()
|
2017-09-15 21:27:11 +00:00
|
|
|
allocDefaultNS.NodeID = node.ID
|
2017-09-15 04:42:19 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
assert.Nil(state.UpsertNode(1, node), "UpsertNode")
|
2017-09-15 21:27:11 +00:00
|
|
|
assert.Nil(state.UpsertJobSummary(2, mock.JobSummary(allocDefaultNS.JobID)), "UpsertJobSummary")
|
2017-10-16 21:21:29 +00:00
|
|
|
allocs := []*structs.Allocation{allocDefaultNS}
|
2017-09-15 21:27:11 +00:00
|
|
|
assert.Nil(state.UpsertAllocs(5, allocs), "UpsertAllocs")
|
2017-09-15 04:42:19 +00:00
|
|
|
|
|
|
|
// Create the namespace policy and tokens
|
2017-10-04 22:08:10 +00:00
|
|
|
validDefaultToken := mock.CreatePolicyAndToken(t, state, 1001, "test-default-valid", mock.NodePolicy(acl.PolicyRead)+
|
|
|
|
mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1004, "test-invalid",
|
|
|
|
mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}))
|
2017-09-15 04:42:19 +00:00
|
|
|
|
|
|
|
req := &structs.NodeSpecificRequest{
|
2017-10-13 16:56:56 +00:00
|
|
|
NodeID: node.ID,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
},
|
2017-09-15 04:42:19 +00:00
|
|
|
}
|
2017-10-13 16:56:56 +00:00
|
|
|
|
|
|
|
// Lookup the node without a token and expect failure
|
2017-09-15 04:42:19 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeAllocsResponse
|
2017-09-15 17:41:28 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-09-15 04:42:19 +00:00
|
|
|
}
|
|
|
|
|
2017-09-15 21:27:11 +00:00
|
|
|
// Try with a valid token for the default namespace
|
2017-10-13 16:56:56 +00:00
|
|
|
req.AuthToken = validDefaultToken.SecretID
|
2017-09-15 04:42:19 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeAllocsResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp), "RPC")
|
2017-09-15 21:27:11 +00:00
|
|
|
assert.Len(resp.Allocs, 1)
|
|
|
|
assert.Equal(allocDefaultNS.ID, resp.Allocs[0].ID)
|
|
|
|
}
|
|
|
|
|
2017-09-15 04:42:19 +00:00
|
|
|
// Try with a invalid token
|
2017-10-13 16:56:56 +00:00
|
|
|
req.AuthToken = invalidToken.SecretID
|
2017-09-15 04:42:19 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeAllocsResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
2017-10-13 16:56:56 +00:00
|
|
|
req.AuthToken = root.SecretID
|
2017-09-15 04:42:19 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeAllocsResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp), "RPC")
|
2017-10-16 21:21:29 +00:00
|
|
|
assert.Len(resp.Allocs, 1)
|
2017-09-15 21:27:11 +00:00
|
|
|
for _, alloc := range resp.Allocs {
|
|
|
|
switch alloc.ID {
|
2017-10-16 21:21:29 +00:00
|
|
|
case allocDefaultNS.ID:
|
2017-09-15 21:27:11 +00:00
|
|
|
// expected
|
|
|
|
default:
|
|
|
|
t.Errorf("unexpected alloc %q for namespace %q", alloc.ID, alloc.Namespace)
|
|
|
|
}
|
|
|
|
}
|
2017-09-15 04:42:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-29 14:29:52 +00:00
|
|
|
func TestClientEndpoint_GetClientAllocs(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-05 21:50:04 +00:00
|
|
|
require := require.New(t)
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-01-29 14:29:52 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have no client connections
|
|
|
|
require.Empty(s1.connectedNodes())
|
|
|
|
|
2016-01-29 14:29:52 +00:00
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
2018-01-05 21:50:04 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
require.Nil(state.UpsertNode(98, node))
|
2016-01-29 14:29:52 +00:00
|
|
|
|
|
|
|
// Inject fake evaluations
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2016-01-29 14:29:52 +00:00
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the allocs
|
|
|
|
get := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
2016-08-16 06:11:57 +00:00
|
|
|
SecretID: node.SecretID,
|
2016-01-29 14:29:52 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeClientAllocsResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", get, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != 100 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 100)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp2.Allocs) != 1 || resp2.Allocs[alloc.ID] != 100 {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Allocs)
|
|
|
|
}
|
|
|
|
|
2018-01-05 21:50:04 +00:00
|
|
|
// Check that we have the client connections
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
require.Len(nodes, 1)
|
|
|
|
require.Equal(node.ID, nodes[0])
|
|
|
|
|
2016-08-16 06:11:57 +00:00
|
|
|
// Lookup node with bad SecretID
|
|
|
|
get.SecretID = "foobarbaz"
|
2016-01-29 14:29:52 +00:00
|
|
|
var resp3 structs.NodeClientAllocsResponse
|
2016-08-16 06:11:57 +00:00
|
|
|
err = msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", get, &resp3)
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "does not match") {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup non-existing node
|
2017-09-29 16:58:48 +00:00
|
|
|
get.NodeID = uuid.Generate()
|
2016-08-16 06:11:57 +00:00
|
|
|
var resp4 structs.NodeClientAllocsResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", get, &resp4); err != nil {
|
2016-01-29 14:29:52 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-08-16 06:11:57 +00:00
|
|
|
if resp4.Index != 100 {
|
2016-01-29 14:29:52 +00:00
|
|
|
t.Fatalf("Bad index: %d %d", resp3.Index, 100)
|
|
|
|
}
|
2016-08-16 06:11:57 +00:00
|
|
|
if len(resp4.Allocs) != 0 {
|
2016-01-29 14:29:52 +00:00
|
|
|
t.Fatalf("unexpected node %#v", resp3.Allocs)
|
|
|
|
}
|
2018-01-05 21:50:04 +00:00
|
|
|
|
|
|
|
// Close the connection and check that we remove the client connections
|
|
|
|
require.Nil(codec.Close())
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
nodes := s1.connectedNodes()
|
|
|
|
return len(nodes) == 0, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("should have no clients")
|
|
|
|
})
|
2016-01-29 14:29:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestClientEndpoint_GetClientAllocs_Blocking(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-01-29 14:29:52 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Inject fake evaluations async
|
2017-10-25 18:06:25 +00:00
|
|
|
now := time.Now().UTC().UnixNano()
|
2016-01-29 14:29:52 +00:00
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
2017-10-25 18:06:25 +00:00
|
|
|
alloc.ModifyTime = now
|
2016-01-29 14:29:52 +00:00
|
|
|
state := s1.fsm.State()
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2016-01-29 14:29:52 +00:00
|
|
|
start := time.Now()
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Lookup the allocs in a blocking query
|
|
|
|
req := &structs.NodeSpecificRequest{
|
2016-08-16 06:11:57 +00:00
|
|
|
NodeID: node.ID,
|
|
|
|
SecretID: node.SecretID,
|
2016-01-29 14:29:52 +00:00
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
MinQueryIndex: 50,
|
|
|
|
MaxQueryTime: time.Second,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeClientAllocsResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", req, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should block at least 100ms
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp2.Index != 100 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 100)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp2.Allocs) != 1 || resp2.Allocs[alloc.ID] != 100 {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Allocs)
|
|
|
|
}
|
|
|
|
|
2017-10-30 18:20:44 +00:00
|
|
|
iter, err := state.AllocsByIDPrefix(nil, structs.DefaultNamespace, alloc.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getAllocs := func(iter memdb.ResultIterator) []*structs.Allocation {
|
|
|
|
var allocs []*structs.Allocation
|
|
|
|
for {
|
|
|
|
raw := iter.Next()
|
|
|
|
if raw == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
allocs = append(allocs, raw.(*structs.Allocation))
|
|
|
|
}
|
|
|
|
return allocs
|
|
|
|
}
|
|
|
|
out := getAllocs(iter)
|
|
|
|
|
|
|
|
if len(out) != 1 {
|
|
|
|
t.Fatalf("Expected to get one allocation but got:%v", out)
|
|
|
|
}
|
|
|
|
|
|
|
|
if out[0].ModifyTime != now {
|
|
|
|
t.Fatalf("Invalid modify time %v", out[0].ModifyTime)
|
2017-10-25 18:06:25 +00:00
|
|
|
}
|
|
|
|
|
2016-01-29 14:29:52 +00:00
|
|
|
// Alloc updates fire watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
allocUpdate := mock.Alloc()
|
|
|
|
allocUpdate.NodeID = alloc.NodeID
|
|
|
|
allocUpdate.ID = alloc.ID
|
|
|
|
allocUpdate.ClientStatus = structs.AllocClientStatusRunning
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(199, mock.JobSummary(allocUpdate.JobID))
|
2016-02-01 21:57:35 +00:00
|
|
|
err := state.UpsertAllocs(200, []*structs.Allocation{allocUpdate})
|
2016-01-29 14:29:52 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.QueryOptions.MinQueryIndex = 150
|
|
|
|
var resp3 structs.NodeClientAllocsResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", req, &resp3); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
if resp3.Index != 200 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp3.Index, 200)
|
|
|
|
}
|
|
|
|
if len(resp3.Allocs) != 1 || resp3.Allocs[alloc.ID] != 200 {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Allocs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-26 23:59:37 +00:00
|
|
|
func TestClientEndpoint_GetClientAllocs_Blocking_GC(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-10-27 16:50:10 +00:00
|
|
|
assert := assert.New(t)
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2017-10-26 23:59:37 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp))
|
2017-10-26 23:59:37 +00:00
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Inject fake allocations async
|
|
|
|
alloc1 := mock.Alloc()
|
|
|
|
alloc1.NodeID = node.ID
|
|
|
|
alloc2 := mock.Alloc()
|
|
|
|
alloc2.NodeID = node.ID
|
|
|
|
state := s1.fsm.State()
|
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc1.JobID))
|
|
|
|
start := time.Now()
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.Nil(state.UpsertAllocs(100, []*structs.Allocation{alloc1, alloc2}))
|
2017-10-26 23:59:37 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
// Lookup the allocs in a blocking query
|
|
|
|
req := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
SecretID: node.SecretID,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
MinQueryIndex: 50,
|
|
|
|
MaxQueryTime: time.Second,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeClientAllocsResponse
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", req, &resp2))
|
2017-10-26 23:59:37 +00:00
|
|
|
|
|
|
|
// Should block at least 100ms
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.EqualValues(100, resp2.Index)
|
|
|
|
if assert.Len(resp2.Allocs, 2) {
|
|
|
|
assert.EqualValues(100, resp2.Allocs[alloc1.ID])
|
2017-10-26 23:59:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Delete an allocation
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.Nil(state.DeleteEval(200, nil, []string{alloc2.ID}))
|
2017-10-26 23:59:37 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
req.QueryOptions.MinQueryIndex = 150
|
|
|
|
var resp3 structs.NodeClientAllocsResponse
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", req, &resp3))
|
2017-10-26 23:59:37 +00:00
|
|
|
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
2017-10-27 16:50:10 +00:00
|
|
|
assert.EqualValues(200, resp3.Index)
|
|
|
|
if assert.Len(resp3.Allocs, 1) {
|
|
|
|
assert.EqualValues(100, resp3.Allocs[alloc1.ID])
|
2017-10-26 23:59:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-10 00:23:26 +00:00
|
|
|
// A MigrateToken should not be created if an allocation shares the same node
|
|
|
|
// with its previous allocation
|
|
|
|
func TestClientEndpoint_GetClientAllocs_WithoutMigrateTokens(t *testing.T) {
|
2017-10-02 19:18:33 +00:00
|
|
|
t.Parallel()
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2017-10-02 19:18:33 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Inject fake evaluations
|
2017-10-10 00:23:26 +00:00
|
|
|
prevAlloc := mock.Alloc()
|
|
|
|
prevAlloc.NodeID = node.ID
|
2017-10-02 19:18:33 +00:00
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
2017-10-10 00:23:26 +00:00
|
|
|
alloc.PreviousAllocation = prevAlloc.ID
|
|
|
|
alloc.DesiredStatus = structs.AllocClientStatusComplete
|
2017-10-02 19:18:33 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2017-10-10 00:23:26 +00:00
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{prevAlloc, alloc})
|
2017-10-02 19:18:33 +00:00
|
|
|
assert.Nil(err)
|
|
|
|
|
|
|
|
// Lookup the allocs
|
|
|
|
get := &structs.NodeSpecificRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
SecretID: node.SecretID,
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeClientAllocsResponse
|
|
|
|
|
|
|
|
err = msgpackrpc.CallWithCodec(codec, "Node.GetClientAllocs", get, &resp2)
|
|
|
|
assert.Nil(err)
|
|
|
|
|
2017-10-10 00:23:26 +00:00
|
|
|
assert.Equal(uint64(100), resp2.Index)
|
|
|
|
assert.Equal(2, len(resp2.Allocs))
|
|
|
|
assert.Equal(uint64(100), resp2.Allocs[alloc.ID])
|
|
|
|
assert.Equal(0, len(resp2.MigrateTokens))
|
2017-10-02 19:18:33 +00:00
|
|
|
}
|
|
|
|
|
2015-08-23 02:17:49 +00:00
|
|
|
func TestClientEndpoint_GetAllocs_Blocking(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-08-23 02:17:49 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-23 02:17:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-08-23 02:17:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Inject fake evaluations async
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
state := s1.fsm.State()
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2015-08-23 02:17:49 +00:00
|
|
|
start := time.Now()
|
2015-10-30 02:00:02 +00:00
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
2015-09-07 03:47:42 +00:00
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
2015-08-23 02:17:49 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-10-30 02:00:02 +00:00
|
|
|
})
|
2015-08-23 02:17:49 +00:00
|
|
|
|
|
|
|
// Lookup the allocs in a blocking query
|
2015-10-30 02:00:02 +00:00
|
|
|
req := &structs.NodeSpecificRequest{
|
2015-08-23 02:17:49 +00:00
|
|
|
NodeID: node.ID,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
2015-09-14 01:18:40 +00:00
|
|
|
Region: "global",
|
2015-08-23 02:17:49 +00:00
|
|
|
MinQueryIndex: 50,
|
|
|
|
MaxQueryTime: time.Second,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeAllocsResponse
|
2015-10-30 02:00:02 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp2); err != nil {
|
2015-08-23 02:17:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should block at least 100ms
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp2.Index != 100 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 100)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp2.Allocs) != 1 || resp2.Allocs[0].ID != alloc.ID {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Allocs)
|
|
|
|
}
|
2015-10-30 02:00:02 +00:00
|
|
|
|
|
|
|
// Alloc updates fire watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
allocUpdate := mock.Alloc()
|
|
|
|
allocUpdate.NodeID = alloc.NodeID
|
|
|
|
allocUpdate.ID = alloc.ID
|
|
|
|
allocUpdate.ClientStatus = structs.AllocClientStatusRunning
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(199, mock.JobSummary(allocUpdate.JobID))
|
2016-02-22 01:59:12 +00:00
|
|
|
err := state.UpdateAllocsFromClient(200, []*structs.Allocation{allocUpdate})
|
2015-10-30 02:00:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.QueryOptions.MinQueryIndex = 150
|
|
|
|
var resp3 structs.NodeAllocsResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.GetAllocs", req, &resp3); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if time.Since(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
if resp3.Index != 200 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp3.Index, 200)
|
|
|
|
}
|
|
|
|
if len(resp3.Allocs) != 1 || resp3.Allocs[0].ClientStatus != structs.AllocClientStatusRunning {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Allocs[0])
|
|
|
|
}
|
2015-08-23 02:17:49 +00:00
|
|
|
}
|
|
|
|
|
2015-08-26 01:12:51 +00:00
|
|
|
func TestClientEndpoint_UpdateAlloc(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-08-26 01:12:51 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
2018-01-20 02:48:37 +00:00
|
|
|
require := require.New(t)
|
2015-08-26 01:12:51 +00:00
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-26 01:12:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-08-26 01:12:51 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-01-17 22:24:57 +00:00
|
|
|
state := s1.fsm.State()
|
|
|
|
// Inject mock job
|
|
|
|
job := mock.Job()
|
|
|
|
err := state.UpsertJob(101, job)
|
2018-01-20 02:48:37 +00:00
|
|
|
require.Nil(err)
|
2018-01-17 22:24:57 +00:00
|
|
|
|
2018-01-16 14:55:35 +00:00
|
|
|
// Inject fake allocations
|
2015-08-26 01:12:51 +00:00
|
|
|
alloc := mock.Alloc()
|
2018-01-17 22:24:57 +00:00
|
|
|
alloc.JobID = job.ID
|
2015-08-26 01:12:51 +00:00
|
|
|
alloc.NodeID = node.ID
|
2018-01-20 02:48:37 +00:00
|
|
|
err = state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
|
|
|
require.Nil(err)
|
2018-01-17 22:24:57 +00:00
|
|
|
alloc.TaskGroup = job.TaskGroups[0].Name
|
|
|
|
err = state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
2018-01-20 02:48:37 +00:00
|
|
|
require.Nil(err)
|
2018-01-16 14:55:35 +00:00
|
|
|
|
2015-08-26 01:12:51 +00:00
|
|
|
// Attempt update
|
|
|
|
clientAlloc := new(structs.Allocation)
|
|
|
|
*clientAlloc = *alloc
|
|
|
|
clientAlloc.ClientStatus = structs.AllocClientStatusFailed
|
|
|
|
|
|
|
|
// Update the alloc
|
|
|
|
update := &structs.AllocUpdateRequest{
|
|
|
|
Alloc: []*structs.Allocation{clientAlloc},
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-26 01:12:51 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.NodeAllocsResponse
|
2016-02-22 02:51:34 +00:00
|
|
|
start := time.Now()
|
2018-01-17 22:24:57 +00:00
|
|
|
err = msgpackrpc.CallWithCodec(codec, "Node.UpdateAlloc", update, &resp2)
|
2018-01-23 17:45:13 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.NotEqual(0, resp2.Index)
|
2018-01-17 22:24:57 +00:00
|
|
|
|
2016-02-22 02:51:34 +00:00
|
|
|
if diff := time.Since(start); diff < batchUpdateInterval {
|
|
|
|
t.Fatalf("too fast: %v", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the alloc
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.AllocByID(ws, alloc.ID)
|
2018-01-23 17:45:13 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(structs.AllocClientStatusFailed, out.ClientStatus)
|
|
|
|
require.True(out.ModifyTime > 0)
|
2017-10-25 18:06:25 +00:00
|
|
|
|
2018-01-20 19:02:58 +00:00
|
|
|
// Assert that one eval with TriggeredBy EvalTriggerRetryFailedAlloc exists
|
2018-01-17 22:24:57 +00:00
|
|
|
evaluations, err := state.EvalsByJob(ws, job.Namespace, job.ID)
|
2018-01-23 17:45:13 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.True(len(evaluations) != 0)
|
2018-01-20 19:02:58 +00:00
|
|
|
found := false
|
|
|
|
for _, resultEval := range evaluations {
|
|
|
|
if resultEval.TriggeredBy == structs.EvalTriggerRetryFailedAlloc {
|
|
|
|
found = true
|
|
|
|
}
|
|
|
|
}
|
2018-01-23 17:45:13 +00:00
|
|
|
require.True(found, "Should create an eval for failed alloc")
|
2018-01-20 19:02:58 +00:00
|
|
|
|
2016-02-22 02:51:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestClientEndpoint_BatchUpdate(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-02-22 02:51:34 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Inject fake evaluations
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
state := s1.fsm.State()
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
2016-02-22 02:51:34 +00:00
|
|
|
err := state.UpsertAllocs(100, []*structs.Allocation{alloc})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt update
|
|
|
|
clientAlloc := new(structs.Allocation)
|
|
|
|
*clientAlloc = *alloc
|
|
|
|
clientAlloc.ClientStatus = structs.AllocClientStatusFailed
|
|
|
|
|
|
|
|
// Call to do the batch update
|
|
|
|
bf := NewBatchFuture()
|
2018-01-03 22:59:52 +00:00
|
|
|
endpoint := s1.staticEndpoints.Node
|
2018-01-16 14:55:35 +00:00
|
|
|
endpoint.batchUpdate(bf, []*structs.Allocation{clientAlloc}, nil)
|
2016-02-22 02:51:34 +00:00
|
|
|
if err := bf.Wait(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if bf.Index() == 0 {
|
|
|
|
t.Fatalf("Bad index: %d", bf.Index())
|
|
|
|
}
|
2015-08-26 01:12:51 +00:00
|
|
|
|
|
|
|
// Lookup the alloc
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.AllocByID(ws, alloc.ID)
|
2015-08-26 01:12:51 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out.ClientStatus != structs.AllocClientStatusFailed {
|
|
|
|
t.Fatalf("Bad: %#v", out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-22 20:57:27 +00:00
|
|
|
func TestClientEndpoint_UpdateAlloc_Vault(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-22 20:57:27 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Swap the servers Vault Client
|
|
|
|
tvc := &TestVaultClient{}
|
|
|
|
s1.vault = tvc
|
|
|
|
|
|
|
|
// Inject fake allocation and vault accessor
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
state := s1.fsm.State()
|
|
|
|
state.UpsertJobSummary(99, mock.JobSummary(alloc.JobID))
|
|
|
|
if err := state.UpsertAllocs(100, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
va := mock.VaultAccessor()
|
|
|
|
va.NodeID = node.ID
|
|
|
|
va.AllocID = alloc.ID
|
|
|
|
if err := state.UpsertVaultAccessor(101, []*structs.VaultAccessor{va}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-01-16 14:55:35 +00:00
|
|
|
// Inject mock job
|
|
|
|
job := mock.Job()
|
|
|
|
job.ID = alloc.JobID
|
|
|
|
err := state.UpsertJob(101, job)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-08-22 20:57:27 +00:00
|
|
|
// Attempt update
|
|
|
|
clientAlloc := new(structs.Allocation)
|
|
|
|
*clientAlloc = *alloc
|
|
|
|
clientAlloc.ClientStatus = structs.AllocClientStatusFailed
|
|
|
|
|
|
|
|
// Update the alloc
|
|
|
|
update := &structs.AllocUpdateRequest{
|
|
|
|
Alloc: []*structs.Allocation{clientAlloc},
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
var resp2 structs.NodeAllocsResponse
|
|
|
|
start := time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.UpdateAlloc", update, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index == 0 {
|
|
|
|
t.Fatalf("Bad index: %d", resp2.Index)
|
|
|
|
}
|
|
|
|
if diff := time.Since(start); diff < batchUpdateInterval {
|
|
|
|
t.Fatalf("too fast: %v", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the alloc
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
out, err := state.AllocByID(ws, alloc.ID)
|
2016-08-22 20:57:27 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out.ClientStatus != structs.AllocClientStatusFailed {
|
|
|
|
t.Fatalf("Bad: %#v", out)
|
|
|
|
}
|
|
|
|
|
|
|
|
if l := len(tvc.RevokedTokens); l != 1 {
|
|
|
|
t.Fatalf("Deregister revoked %d tokens; want 1", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-06 23:39:20 +00:00
|
|
|
func TestClientEndpoint_CreateNodeEvals(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-08-06 23:39:20 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Inject fake evaluations
|
2015-08-11 21:27:14 +00:00
|
|
|
alloc := mock.Alloc()
|
2015-08-06 23:39:20 +00:00
|
|
|
state := s1.fsm.State()
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(1, mock.JobSummary(alloc.JobID))
|
|
|
|
if err := state.UpsertAllocs(2, []*structs.Allocation{alloc}); err != nil {
|
2015-10-20 17:57:53 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Inject a fake system job.
|
|
|
|
job := mock.SystemJob()
|
2016-07-25 21:11:32 +00:00
|
|
|
if err := state.UpsertJob(3, job); err != nil {
|
2015-08-06 23:39:20 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create some evaluations
|
2018-01-03 22:59:52 +00:00
|
|
|
ids, index, err := s1.staticEndpoints.Node.createNodeEvals(alloc.NodeID, 1)
|
2015-08-06 23:39:20 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if index == 0 {
|
|
|
|
t.Fatalf("bad: %d", index)
|
|
|
|
}
|
2015-10-20 17:57:53 +00:00
|
|
|
if len(ids) != 2 {
|
2015-08-06 23:39:20 +00:00
|
|
|
t.Fatalf("bad: %s", ids)
|
|
|
|
}
|
|
|
|
|
2015-10-20 17:57:53 +00:00
|
|
|
// Lookup the evaluations
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2015-10-20 17:57:53 +00:00
|
|
|
evalByType := make(map[string]*structs.Evaluation, 2)
|
|
|
|
for _, id := range ids {
|
2017-02-08 05:22:48 +00:00
|
|
|
eval, err := state.EvalByID(ws, id)
|
2015-10-20 17:57:53 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if eval == nil {
|
|
|
|
t.Fatalf("expected eval")
|
|
|
|
}
|
2015-08-06 23:39:20 +00:00
|
|
|
|
2015-10-20 17:57:53 +00:00
|
|
|
if old, ok := evalByType[eval.Type]; ok {
|
|
|
|
t.Fatalf("multiple evals of the same type: %v and %v", old, eval)
|
|
|
|
}
|
|
|
|
|
|
|
|
evalByType[eval.Type] = eval
|
2015-08-06 23:39:20 +00:00
|
|
|
}
|
2015-10-20 17:57:53 +00:00
|
|
|
|
|
|
|
if len(evalByType) != 2 {
|
|
|
|
t.Fatalf("Expected a service and system job; got %#v", evalByType)
|
2015-08-06 23:39:20 +00:00
|
|
|
}
|
2015-10-20 17:57:53 +00:00
|
|
|
|
|
|
|
// Ensure the evals are correct.
|
|
|
|
for schedType, eval := range evalByType {
|
|
|
|
expPriority := alloc.Job.Priority
|
|
|
|
expJobID := alloc.JobID
|
2015-10-23 23:32:45 +00:00
|
|
|
if schedType == "system" {
|
2015-10-20 17:57:53 +00:00
|
|
|
expPriority = job.Priority
|
|
|
|
expJobID = job.ID
|
|
|
|
}
|
|
|
|
|
|
|
|
if eval.CreateIndex != index {
|
|
|
|
t.Fatalf("CreateIndex mis-match on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.TriggeredBy != structs.EvalTriggerNodeUpdate {
|
|
|
|
t.Fatalf("TriggeredBy incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.NodeID != alloc.NodeID {
|
|
|
|
t.Fatalf("NodeID incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.NodeModifyIndex != 1 {
|
|
|
|
t.Fatalf("NodeModifyIndex incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.Status != structs.EvalStatusPending {
|
|
|
|
t.Fatalf("Status incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.Priority != expPriority {
|
|
|
|
t.Fatalf("Priority incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
|
|
|
if eval.JobID != expJobID {
|
|
|
|
t.Fatalf("JobID incorrect on type %v: %#v", schedType, eval)
|
|
|
|
}
|
2015-08-06 23:39:20 +00:00
|
|
|
}
|
|
|
|
}
|
2015-08-16 01:20:35 +00:00
|
|
|
|
|
|
|
func TestClientEndpoint_Evaluate(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, func(c *Config) {
|
2015-10-08 22:36:42 +00:00
|
|
|
c.NumSchedulers = 0 // Prevent automatic dequeue
|
|
|
|
})
|
2015-08-16 01:20:35 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Inject fake evaluations
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
node := mock.Node()
|
|
|
|
node.ID = alloc.NodeID
|
|
|
|
state := s1.fsm.State()
|
2015-09-07 03:47:42 +00:00
|
|
|
err := state.UpsertNode(1, node)
|
2015-08-16 01:20:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2016-07-25 21:11:32 +00:00
|
|
|
state.UpsertJobSummary(2, mock.JobSummary(alloc.JobID))
|
|
|
|
err = state.UpsertAllocs(3, []*structs.Allocation{alloc})
|
2015-08-16 01:20:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Re-evaluate
|
|
|
|
req := &structs.NodeEvaluateRequest{
|
|
|
|
NodeID: alloc.NodeID,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-08-16 01:20:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.NodeUpdateResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Evaluate", req, &resp); err != nil {
|
2015-08-16 01:20:35 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Index == 0 {
|
|
|
|
t.Fatalf("bad index: %d", resp.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create some evaluations
|
|
|
|
ids := resp.EvalIDs
|
|
|
|
if len(ids) != 1 {
|
|
|
|
t.Fatalf("bad: %s", ids)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the evaluation
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
eval, err := state.EvalByID(ws, ids[0])
|
2015-08-16 01:20:35 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if eval == nil {
|
|
|
|
t.Fatalf("expected eval")
|
|
|
|
}
|
|
|
|
if eval.CreateIndex != resp.Index {
|
|
|
|
t.Fatalf("index mis-match")
|
|
|
|
}
|
|
|
|
|
|
|
|
if eval.Priority != alloc.Job.Priority {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.Type != alloc.Job.Type {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.TriggeredBy != structs.EvalTriggerNodeUpdate {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.JobID != alloc.JobID {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.NodeID != alloc.NodeID {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.NodeModifyIndex != 1 {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
if eval.Status != structs.EvalStatusPending {
|
|
|
|
t.Fatalf("bad: %#v", eval)
|
|
|
|
}
|
|
|
|
}
|
2015-09-06 21:28:29 +00:00
|
|
|
|
2017-09-15 03:41:44 +00:00
|
|
|
func TestClientEndpoint_Evaluate_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-09-15 03:41:44 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2017-09-15 03:59:18 +00:00
|
|
|
// Create the node with an alloc
|
2017-09-15 03:41:44 +00:00
|
|
|
alloc := mock.Alloc()
|
|
|
|
node := mock.Node()
|
|
|
|
node.ID = alloc.NodeID
|
|
|
|
state := s1.fsm.State()
|
|
|
|
|
|
|
|
assert.Nil(state.UpsertNode(1, node), "UpsertNode")
|
|
|
|
assert.Nil(state.UpsertJobSummary(2, mock.JobSummary(alloc.JobID)), "UpsertJobSummary")
|
|
|
|
assert.Nil(state.UpsertAllocs(3, []*structs.Allocation{alloc}), "UpsertAllocs")
|
|
|
|
|
2017-09-15 04:41:26 +00:00
|
|
|
// Create the policy and tokens
|
2017-10-04 22:08:10 +00:00
|
|
|
validToken := mock.CreatePolicyAndToken(t, state, 1001, "test-valid", mock.NodePolicy(acl.PolicyWrite))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "test-invalid", mock.NodePolicy(acl.PolicyRead))
|
2017-09-15 03:41:44 +00:00
|
|
|
|
|
|
|
// Re-evaluate without a token and expect failure
|
|
|
|
req := &structs.NodeEvaluateRequest{
|
|
|
|
NodeID: alloc.NodeID,
|
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
|
|
|
}
|
|
|
|
{
|
|
|
|
var resp structs.NodeUpdateResponse
|
2017-09-15 17:41:28 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.Evaluate", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-09-15 03:41:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a valid token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = validToken.SecretID
|
2017-09-15 03:41:44 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.Evaluate", req, &resp), "RPC")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a invalid token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = invalidToken.SecretID
|
2017-09-15 03:41:44 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.Evaluate", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = root.SecretID
|
2017-09-15 03:41:44 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeUpdateResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.Evaluate", req, &resp), "RPC")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-06 21:28:29 +00:00
|
|
|
func TestClientEndpoint_ListNodes(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-09-06 21:28:29 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the register request
|
|
|
|
node := mock.Node()
|
|
|
|
reg := &structs.NodeRegisterRequest{
|
|
|
|
Node: node,
|
2015-09-14 01:18:40 +00:00
|
|
|
WriteRequest: structs.WriteRequest{Region: "global"},
|
2015-09-06 21:28:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch the response
|
|
|
|
var resp structs.GenericResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.Register", reg, &resp); err != nil {
|
2015-09-06 21:28:29 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
node.CreateIndex = resp.Index
|
|
|
|
node.ModifyIndex = resp.Index
|
|
|
|
|
|
|
|
// Lookup the node
|
|
|
|
get := &structs.NodeListRequest{
|
2015-09-14 01:18:40 +00:00
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
2015-09-06 21:28:29 +00:00
|
|
|
}
|
|
|
|
var resp2 structs.NodeListResponse
|
2015-09-07 03:31:32 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", get, &resp2); err != nil {
|
2015-09-06 21:28:29 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp2.Index != resp.Index {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, resp.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp2.Nodes) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Nodes)
|
|
|
|
}
|
|
|
|
if resp2.Nodes[0].ID != node.ID {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Nodes[0])
|
2015-12-24 10:46:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Lookup the node with prefix
|
|
|
|
get = &structs.NodeListRequest{
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global", Prefix: node.ID[:4]},
|
|
|
|
}
|
|
|
|
var resp3 structs.NodeListResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", get, &resp3); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if resp3.Index != resp.Index {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp3.Index, resp2.Index)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp3.Nodes) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Nodes)
|
|
|
|
}
|
|
|
|
if resp3.Nodes[0].ID != node.ID {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Nodes[0])
|
2015-09-06 21:28:29 +00:00
|
|
|
}
|
|
|
|
}
|
2015-10-28 18:21:39 +00:00
|
|
|
|
2017-09-15 05:01:18 +00:00
|
|
|
func TestClientEndpoint_ListNodes_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1, root := TestACLServer(t, nil)
|
2017-09-15 05:01:18 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
assert.Nil(state.UpsertNode(1, node), "UpsertNode")
|
|
|
|
|
|
|
|
// Create the namespace policy and tokens
|
2017-10-04 22:08:10 +00:00
|
|
|
validToken := mock.CreatePolicyAndToken(t, state, 1001, "test-valid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
invalidToken := mock.CreatePolicyAndToken(t, state, 1003, "test-invalid", mock.NodePolicy(acl.PolicyDeny))
|
2017-09-15 05:01:18 +00:00
|
|
|
|
|
|
|
// Lookup the node without a token and expect failure
|
|
|
|
req := &structs.NodeListRequest{
|
|
|
|
QueryOptions: structs.QueryOptions{Region: "global"},
|
|
|
|
}
|
|
|
|
{
|
|
|
|
var resp structs.NodeListResponse
|
2017-09-15 17:41:28 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-09-15 05:01:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a valid token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = validToken.SecretID
|
2017-09-15 05:01:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeListResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp), "RPC")
|
|
|
|
assert.Equal(node.ID, resp.Nodes[0].ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a invalid token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = invalidToken.SecretID
|
2017-09-15 05:01:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeListResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp)
|
|
|
|
assert.NotNil(err, "RPC")
|
|
|
|
assert.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try with a root token
|
2017-10-12 22:16:33 +00:00
|
|
|
req.AuthToken = root.SecretID
|
2017-09-15 05:01:18 +00:00
|
|
|
{
|
|
|
|
var resp structs.NodeListResponse
|
|
|
|
assert.Nil(msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp), "RPC")
|
|
|
|
assert.Equal(node.ID, resp.Nodes[0].ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-30 02:00:02 +00:00
|
|
|
func TestClientEndpoint_ListNodes_Blocking(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2015-10-28 18:21:39 +00:00
|
|
|
defer s1.Shutdown()
|
2015-10-28 19:29:06 +00:00
|
|
|
state := s1.fsm.State()
|
2015-10-28 18:21:39 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
|
2015-10-28 19:29:06 +00:00
|
|
|
// Node upsert triggers watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
if err := state.UpsertNode(2, node); err != nil {
|
2015-10-28 18:21:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2015-10-28 19:29:06 +00:00
|
|
|
})
|
2015-10-28 18:21:39 +00:00
|
|
|
|
2015-10-28 19:29:06 +00:00
|
|
|
req := &structs.NodeListRequest{
|
2015-10-28 18:21:39 +00:00
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
MinQueryIndex: 1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
start := time.Now()
|
|
|
|
var resp structs.NodeListResponse
|
2015-10-28 19:29:06 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp); err != nil {
|
2015-10-28 18:21:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-28 18:21:39 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp)
|
|
|
|
}
|
|
|
|
if resp.Index != 2 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp.Index, 2)
|
|
|
|
}
|
2015-10-28 19:29:06 +00:00
|
|
|
if len(resp.Nodes) != 1 || resp.Nodes[0].ID != node.ID {
|
2015-10-28 18:21:39 +00:00
|
|
|
t.Fatalf("bad: %#v", resp.Nodes)
|
|
|
|
}
|
2015-10-28 19:29:06 +00:00
|
|
|
|
|
|
|
// Node drain updates trigger watches.
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
if err := state.UpdateNodeDrain(3, node.ID, true); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.MinQueryIndex = 2
|
|
|
|
var resp2 structs.NodeListResponse
|
|
|
|
start = time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp2); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-29 01:35:48 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp2)
|
2015-10-28 19:29:06 +00:00
|
|
|
}
|
|
|
|
if resp2.Index != 3 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp2.Index, 3)
|
|
|
|
}
|
|
|
|
if len(resp2.Nodes) != 1 || !resp2.Nodes[0].Drain {
|
|
|
|
t.Fatalf("bad: %#v", resp2.Nodes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Node status update triggers watches
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
if err := state.UpdateNodeStatus(4, node.ID, structs.NodeStatusDown); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.MinQueryIndex = 3
|
|
|
|
var resp3 structs.NodeListResponse
|
|
|
|
start = time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp3); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-29 01:35:48 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp3)
|
2015-10-28 19:29:06 +00:00
|
|
|
}
|
|
|
|
if resp3.Index != 4 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp3.Index, 4)
|
|
|
|
}
|
|
|
|
if len(resp3.Nodes) != 1 || resp3.Nodes[0].Status != structs.NodeStatusDown {
|
|
|
|
t.Fatalf("bad: %#v", resp3.Nodes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Node delete triggers watches.
|
|
|
|
time.AfterFunc(100*time.Millisecond, func() {
|
|
|
|
if err := state.DeleteNode(5, node.ID); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
req.MinQueryIndex = 4
|
|
|
|
var resp4 structs.NodeListResponse
|
|
|
|
start = time.Now()
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.List", req, &resp4); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-10-30 15:27:47 +00:00
|
|
|
if elapsed := time.Since(start); elapsed < 100*time.Millisecond {
|
2015-10-29 01:35:48 +00:00
|
|
|
t.Fatalf("should block (returned in %s) %#v", elapsed, resp4)
|
2015-10-28 19:29:06 +00:00
|
|
|
}
|
|
|
|
if resp4.Index != 5 {
|
|
|
|
t.Fatalf("Bad index: %d %d", resp4.Index, 5)
|
|
|
|
}
|
|
|
|
if len(resp4.Nodes) != 0 {
|
|
|
|
t.Fatalf("bad: %#v", resp4.Nodes)
|
2015-10-28 18:21:39 +00:00
|
|
|
}
|
|
|
|
}
|
2016-02-22 02:51:34 +00:00
|
|
|
|
|
|
|
func TestBatchFuture(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2016-02-22 02:51:34 +00:00
|
|
|
bf := NewBatchFuture()
|
|
|
|
|
|
|
|
// Async respond to the future
|
|
|
|
expect := fmt.Errorf("testing")
|
|
|
|
go func() {
|
|
|
|
time.Sleep(10 * time.Millisecond)
|
|
|
|
bf.Respond(1000, expect)
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Block for the result
|
|
|
|
start := time.Now()
|
|
|
|
err := bf.Wait()
|
|
|
|
diff := time.Since(start)
|
|
|
|
if diff < 5*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the results
|
|
|
|
if err != expect {
|
|
|
|
t.Fatalf("bad: %s", err)
|
|
|
|
}
|
|
|
|
if bf.Index() != 1000 {
|
|
|
|
t.Fatalf("bad: %d", bf.Index())
|
|
|
|
}
|
|
|
|
}
|
2016-08-19 20:13:51 +00:00
|
|
|
|
|
|
|
func TestClientEndpoint_DeriveVaultToken_Bad(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-19 20:13:51 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
if err := state.UpsertNode(2, node); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create an alloc
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
tasks := []string{task.Name}
|
|
|
|
if err := state.UpsertAllocs(3, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req := &structs.DeriveVaultTokenRequest{
|
|
|
|
NodeID: node.ID,
|
2017-09-29 16:58:48 +00:00
|
|
|
SecretID: uuid.Generate(),
|
2016-08-19 20:13:51 +00:00
|
|
|
AllocID: alloc.ID,
|
|
|
|
Tasks: tasks,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.DeriveVaultTokenResponse
|
2016-10-23 01:08:30 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.Error == nil || !strings.Contains(resp.Error.Error(), "SecretID mismatch") {
|
|
|
|
t.Fatalf("Expected SecretID mismatch: %v", resp.Error)
|
2016-08-19 20:13:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Put the correct SecretID
|
|
|
|
req.SecretID = node.SecretID
|
|
|
|
|
|
|
|
// Now we should get an error about the allocation not running on the node
|
2016-10-23 01:08:30 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Error == nil || !strings.Contains(resp.Error.Error(), "not running on Node") {
|
|
|
|
t.Fatalf("Expected not running on node error: %v", resp.Error)
|
2016-08-19 20:13:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update to be running on the node
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
if err := state.UpsertAllocs(4, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now we should get an error about the job not needing any Vault secrets
|
2016-10-23 01:08:30 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Error == nil || !strings.Contains(resp.Error.Error(), "does not require") {
|
|
|
|
t.Fatalf("Expected no policies error: %v", resp.Error)
|
2016-08-19 20:13:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update to be terminal
|
|
|
|
alloc.DesiredStatus = structs.AllocDesiredStatusStop
|
|
|
|
if err := state.UpsertAllocs(5, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now we should get an error about the job not needing any Vault secrets
|
2016-10-23 01:08:30 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if resp.Error == nil || !strings.Contains(resp.Error.Error(), "terminal") {
|
|
|
|
t.Fatalf("Expected terminal allocation error: %v", resp.Error)
|
2016-08-19 20:13:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClientEndpoint_DeriveVaultToken(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-08-19 20:13:51 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Enable vault and allow authenticated
|
2016-10-11 20:28:18 +00:00
|
|
|
tr := true
|
|
|
|
s1.config.VaultConfig.Enabled = &tr
|
|
|
|
s1.config.VaultConfig.AllowUnauthenticated = &tr
|
2016-08-19 20:13:51 +00:00
|
|
|
|
|
|
|
// Replace the Vault Client on the server
|
|
|
|
tvc := &TestVaultClient{}
|
|
|
|
s1.vault = tvc
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
if err := state.UpsertNode(2, node); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create an alloc an allocation that has vault policies required
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
tasks := []string{task.Name}
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"a", "b"}}
|
|
|
|
if err := state.UpsertAllocs(3, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return a secret for the task
|
2017-09-29 16:58:48 +00:00
|
|
|
token := uuid.Generate()
|
|
|
|
accessor := uuid.Generate()
|
2016-08-19 20:13:51 +00:00
|
|
|
ttl := 10
|
|
|
|
secret := &vapi.Secret{
|
|
|
|
WrapInfo: &vapi.SecretWrapInfo{
|
|
|
|
Token: token,
|
|
|
|
WrappedAccessor: accessor,
|
|
|
|
TTL: ttl,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
tvc.SetCreateTokenSecret(alloc.ID, task.Name, secret)
|
|
|
|
|
|
|
|
req := &structs.DeriveVaultTokenRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
SecretID: node.SecretID,
|
|
|
|
AllocID: alloc.ID,
|
|
|
|
Tasks: tasks,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.DeriveVaultTokenResponse
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
2016-10-23 01:08:30 +00:00
|
|
|
if resp.Error != nil {
|
|
|
|
t.Fatalf("bad: %v", resp.Error)
|
|
|
|
}
|
2016-08-19 20:13:51 +00:00
|
|
|
|
|
|
|
// Check the state store and ensure that we created a VaultAccessor
|
2017-02-08 05:22:48 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
va, err := state.VaultAccessor(ws, accessor)
|
2016-08-19 20:13:51 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
if va == nil {
|
|
|
|
t.Fatalf("bad: %v", va)
|
|
|
|
}
|
|
|
|
|
|
|
|
if va.CreateIndex == 0 {
|
|
|
|
t.Fatalf("bad: %v", va)
|
|
|
|
}
|
|
|
|
|
|
|
|
va.CreateIndex = 0
|
|
|
|
expected := &structs.VaultAccessor{
|
|
|
|
AllocID: alloc.ID,
|
|
|
|
Task: task.Name,
|
|
|
|
NodeID: alloc.NodeID,
|
|
|
|
Accessor: accessor,
|
|
|
|
CreationTTL: ttl,
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(expected, va) {
|
|
|
|
t.Fatalf("Got %#v; want %#v", va, expected)
|
|
|
|
}
|
|
|
|
}
|
2016-10-23 01:08:30 +00:00
|
|
|
|
|
|
|
func TestClientEndpoint_DeriveVaultToken_VaultError(t *testing.T) {
|
2017-07-23 22:04:38 +00:00
|
|
|
t.Parallel()
|
2018-01-12 01:00:30 +00:00
|
|
|
s1 := TestServer(t, nil)
|
2016-10-23 01:08:30 +00:00
|
|
|
defer s1.Shutdown()
|
|
|
|
state := s1.fsm.State()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
testutil.WaitForLeader(t, s1.RPC)
|
|
|
|
|
|
|
|
// Enable vault and allow authenticated
|
|
|
|
tr := true
|
|
|
|
s1.config.VaultConfig.Enabled = &tr
|
|
|
|
s1.config.VaultConfig.AllowUnauthenticated = &tr
|
|
|
|
|
|
|
|
// Replace the Vault Client on the server
|
|
|
|
tvc := &TestVaultClient{}
|
|
|
|
s1.vault = tvc
|
|
|
|
|
|
|
|
// Create the node
|
|
|
|
node := mock.Node()
|
|
|
|
if err := state.UpsertNode(2, node); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create an alloc an allocation that has vault policies required
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
alloc.NodeID = node.ID
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
tasks := []string{task.Name}
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"a", "b"}}
|
|
|
|
if err := state.UpsertAllocs(3, []*structs.Allocation{alloc}); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return an error when creating the token
|
|
|
|
tvc.SetCreateTokenError(alloc.ID, task.Name,
|
|
|
|
structs.NewRecoverableError(fmt.Errorf("recover"), true))
|
|
|
|
|
|
|
|
req := &structs.DeriveVaultTokenRequest{
|
|
|
|
NodeID: node.ID,
|
|
|
|
SecretID: node.SecretID,
|
|
|
|
AllocID: alloc.ID,
|
|
|
|
Tasks: tasks,
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
Region: "global",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp structs.DeriveVaultTokenResponse
|
|
|
|
err := msgpackrpc.CallWithCodec(codec, "Node.DeriveVaultToken", req, &resp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
2017-03-27 23:27:24 +00:00
|
|
|
if resp.Error == nil || !resp.Error.IsRecoverable() {
|
2016-10-23 01:08:30 +00:00
|
|
|
t.Fatalf("bad: %+v", resp.Error)
|
|
|
|
}
|
|
|
|
}
|