2015-06-05 22:21:17 +00:00
package structs
import (
2017-01-14 00:46:08 +00:00
"fmt"
2017-11-13 17:14:57 +00:00
"os"
2015-06-05 22:21:17 +00:00
"reflect"
2015-09-15 18:23:03 +00:00
"strings"
2015-06-05 22:21:17 +00:00
"testing"
2015-11-02 21:24:59 +00:00
"time"
2015-12-01 00:51:56 +00:00
2016-08-16 19:05:15 +00:00
"github.com/hashicorp/consul/api"
2015-12-01 00:51:56 +00:00
"github.com/hashicorp/go-multierror"
2017-09-29 16:58:48 +00:00
"github.com/hashicorp/nomad/helper/uuid"
2017-05-10 20:48:53 +00:00
"github.com/kr/pretty"
2017-08-12 21:36:10 +00:00
"github.com/stretchr/testify/assert"
2015-06-05 22:21:17 +00:00
)
2015-09-15 18:23:03 +00:00
func TestJob_Validate ( t * testing . T ) {
j := & Job { }
err := j . Validate ( )
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "job region" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "job ID" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "job name" ) {
t . Fatalf ( "err: %s" , err )
}
2017-09-07 23:56:15 +00:00
if ! strings . Contains ( mErr . Errors [ 3 ] . Error ( ) , "namespace" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-09-07 23:56:15 +00:00
if ! strings . Contains ( mErr . Errors [ 4 ] . Error ( ) , "job type" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-09-07 23:56:15 +00:00
if ! strings . Contains ( mErr . Errors [ 5 ] . Error ( ) , "priority" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-09-07 23:56:15 +00:00
if ! strings . Contains ( mErr . Errors [ 6 ] . Error ( ) , "datacenters" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 7 ] . Error ( ) , "task groups" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-07 22:34:26 +00:00
j = & Job {
Type : "invalid-job-type" ,
}
err = j . Validate ( )
if expected := ` Invalid job type: "invalid-job-type" ` ; ! strings . Contains ( err . Error ( ) , expected ) {
t . Errorf ( "expected %s but found: %v" , expected , err )
}
2015-12-01 00:51:56 +00:00
j = & Job {
Type : JobTypeService ,
2015-12-01 16:40:32 +00:00
Periodic : & PeriodicConfig {
2015-12-01 00:51:56 +00:00
Enabled : true ,
} ,
}
err = j . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Error ( ) , "Periodic" ) {
t . Fatalf ( "err: %s" , err )
}
2015-09-15 18:23:03 +00:00
j = & Job {
Region : "global" ,
2017-09-29 16:58:48 +00:00
ID : uuid . Generate ( ) ,
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
2015-09-15 18:23:03 +00:00
Name : "my-job" ,
Type : JobTypeService ,
Priority : 50 ,
Datacenters : [ ] string { "dc1" } ,
TaskGroups : [ ] * TaskGroup {
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:23:03 +00:00
Name : "web" ,
2015-11-02 21:24:59 +00:00
RestartPolicy : & RestartPolicy {
Interval : 5 * time . Minute ,
Delay : 10 * time . Second ,
Attempts : 10 ,
} ,
2015-09-15 18:23:03 +00:00
} ,
2017-09-26 22:26:33 +00:00
{
2015-09-15 18:23:03 +00:00
Name : "web" ,
2015-11-02 21:24:59 +00:00
RestartPolicy : & RestartPolicy {
Interval : 5 * time . Minute ,
Delay : 10 * time . Second ,
Attempts : 10 ,
} ,
} ,
2017-09-26 22:26:33 +00:00
{
2015-11-02 21:24:59 +00:00
RestartPolicy : & RestartPolicy {
Interval : 5 * time . Minute ,
Delay : 10 * time . Second ,
Attempts : 10 ,
} ,
2015-09-15 18:23:03 +00:00
} ,
} ,
}
err = j . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "2 redefines 'web' from group 1" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "group 3 missing name" ) {
t . Fatalf ( "err: %s" , err )
}
2016-07-20 23:43:20 +00:00
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "Task group web validation failed" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
}
2017-05-10 03:52:47 +00:00
func TestJob_Warnings ( t * testing . T ) {
cases := [ ] struct {
Name string
Job * Job
Expected [ ] string
2017-07-13 20:10:45 +00:00
} {
{
Name : "Higher counts for update stanza" ,
Expected : [ ] string { "max parallel count is greater" } ,
Job : & Job {
Type : JobTypeService ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
Update : & UpdateStrategy {
MaxParallel : 10 ,
} ,
} ,
} ,
} ,
} ,
}
2017-05-10 03:52:47 +00:00
for _ , c := range cases {
t . Run ( c . Name , func ( t * testing . T ) {
warnings := c . Job . Warnings ( )
if warnings == nil {
if len ( c . Expected ) == 0 {
return
} else {
t . Fatal ( "Got no warnings when they were expected" )
}
}
a := warnings . Error ( )
for _ , e := range c . Expected {
if ! strings . Contains ( a , e ) {
t . Fatalf ( "Got warnings %q; didn't contain %q" , a , e )
}
}
} )
}
}
2017-05-10 20:48:53 +00:00
func TestJob_Canonicalize_Update ( t * testing . T ) {
cases := [ ] struct {
Name string
Job * Job
Expected * Job
2017-07-07 02:08:51 +00:00
Warnings [ ] string
2017-05-10 20:48:53 +00:00
} {
{
2017-07-07 02:08:51 +00:00
Name : "One task group" ,
Warnings : [ ] string { "conversion to new update stanza" } ,
2017-05-10 20:48:53 +00:00
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 2 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 2 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-05-10 20:48:53 +00:00
Update : & UpdateStrategy {
2017-07-07 02:08:51 +00:00
Stagger : 30 * time . Second ,
2017-05-10 20:48:53 +00:00
MaxParallel : 2 ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
MinHealthyTime : 10 * time . Second ,
HealthyDeadline : 5 * time . Minute ,
AutoRevert : false ,
Canary : 0 ,
} ,
} ,
} ,
} ,
} ,
{
2017-07-07 02:08:51 +00:00
Name : "One task group batch" ,
Warnings : [ ] string { "Update stanza is disallowed for batch jobs" } ,
2017-05-10 20:48:53 +00:00
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeBatch ,
2017-07-07 02:08:51 +00:00
Update : UpdateStrategy {
MaxParallel : 2 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeBatch ,
Update : UpdateStrategy { } ,
2017-07-07 02:08:51 +00:00
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeBatch ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeBatch ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-07-07 02:08:51 +00:00
} ,
} ,
} ,
} ,
{
Name : "One task group batch - new spec" ,
Warnings : [ ] string { "Update stanza is disallowed for batch jobs" } ,
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeBatch ,
2017-07-07 02:08:51 +00:00
Update : UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
Update : & UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeBatch ,
Update : UpdateStrategy { } ,
2017-07-07 02:08:51 +00:00
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeBatch ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeBatch ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-07-07 02:08:51 +00:00
} ,
} ,
} ,
} ,
{
Name : "One task group service - new spec" ,
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-07-07 02:08:51 +00:00
Update : UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
Update : & UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-07-07 02:08:51 +00:00
Update : UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-07-07 02:08:51 +00:00
Update : & UpdateStrategy {
Stagger : 2 * time . Second ,
MaxParallel : 2 ,
Canary : 2 ,
MinHealthyTime : 2 * time . Second ,
HealthyDeadline : 10 * time . Second ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
} ,
} ,
} ,
} ,
} ,
{
Name : "One task group; too high of parallelism" ,
Warnings : [ ] string { "conversion to new update stanza" } ,
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 200 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 200 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-05-10 20:48:53 +00:00
Update : & UpdateStrategy {
2017-07-07 02:08:51 +00:00
Stagger : 30 * time . Second ,
2017-05-10 20:48:53 +00:00
MaxParallel : 2 ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
MinHealthyTime : 10 * time . Second ,
HealthyDeadline : 5 * time . Minute ,
AutoRevert : false ,
Canary : 0 ,
} ,
} ,
} ,
} ,
} ,
{
2017-07-07 02:08:51 +00:00
Name : "Multiple task group; rounding" ,
Warnings : [ ] string { "conversion to new update stanza" } ,
2017-05-10 20:48:53 +00:00
Job : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 2 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Count : 2 ,
} ,
{
Name : "bar" ,
Count : 14 ,
} ,
{
Name : "foo" ,
Count : 26 ,
} ,
} ,
} ,
Expected : & Job {
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
Type : JobTypeService ,
2017-05-10 20:48:53 +00:00
Update : UpdateStrategy {
MaxParallel : 2 ,
Stagger : 10 * time . Second ,
} ,
TaskGroups : [ ] * TaskGroup {
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 2 ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-05-10 20:48:53 +00:00
Update : & UpdateStrategy {
2017-07-07 02:08:51 +00:00
Stagger : 30 * time . Second ,
2017-05-10 20:48:53 +00:00
MaxParallel : 1 ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
MinHealthyTime : 10 * time . Second ,
HealthyDeadline : 5 * time . Minute ,
AutoRevert : false ,
Canary : 0 ,
} ,
} ,
{
2018-01-14 15:03:08 +00:00
Name : "bar" ,
Count : 14 ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2017-05-10 20:48:53 +00:00
Update : & UpdateStrategy {
2017-07-07 02:08:51 +00:00
Stagger : 30 * time . Second ,
2017-05-10 20:48:53 +00:00
MaxParallel : 1 ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
MinHealthyTime : 10 * time . Second ,
HealthyDeadline : 5 * time . Minute ,
AutoRevert : false ,
Canary : 0 ,
} ,
} ,
{
2018-01-14 15:03:08 +00:00
Name : "foo" ,
Count : 26 ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
RestartPolicy : NewRestartPolicy ( JobTypeService ) ,
ReschedulePolicy : NewReshedulePolicy ( JobTypeService ) ,
2017-05-10 20:48:53 +00:00
Update : & UpdateStrategy {
2017-07-07 02:08:51 +00:00
Stagger : 30 * time . Second ,
2017-05-10 20:48:53 +00:00
MaxParallel : 3 ,
HealthCheck : UpdateStrategyHealthCheck_Checks ,
MinHealthyTime : 10 * time . Second ,
HealthyDeadline : 5 * time . Minute ,
AutoRevert : false ,
Canary : 0 ,
} ,
} ,
} ,
} ,
} ,
}
for _ , c := range cases {
t . Run ( c . Name , func ( t * testing . T ) {
2017-07-07 02:08:51 +00:00
warnings := c . Job . Canonicalize ( )
2017-05-10 20:48:53 +00:00
if ! reflect . DeepEqual ( c . Job , c . Expected ) {
2017-07-07 02:08:51 +00:00
t . Fatalf ( "Diff %#v" , pretty . Diff ( c . Job , c . Expected ) )
}
wErr := ""
if warnings != nil {
wErr = warnings . Error ( )
}
for _ , w := range c . Warnings {
if ! strings . Contains ( wErr , w ) {
t . Fatalf ( "Wanted warning %q: got %q" , w , wErr )
}
}
if len ( c . Warnings ) == 0 && warnings != nil {
t . Fatalf ( "Wanted no warnings: got %q" , wErr )
2017-05-10 20:48:53 +00:00
}
} )
}
}
2017-05-23 00:02:20 +00:00
func TestJob_SpecChanged ( t * testing . T ) {
// Get a base test job
base := testJob ( )
// Only modify the indexes/mutable state of the job
mutatedBase := base . Copy ( )
mutatedBase . Status = "foo"
mutatedBase . ModifyIndex = base . ModifyIndex + 100
// changed contains a spec change that should be detected
change := base . Copy ( )
change . Priority = 99
cases := [ ] struct {
Name string
Original * Job
New * Job
Changed bool
} {
{
Name : "Same job except mutable indexes" ,
Changed : false ,
Original : base ,
New : mutatedBase ,
} ,
{
Name : "Different" ,
Changed : true ,
Original : base ,
New : change ,
} ,
}
for _ , c := range cases {
t . Run ( c . Name , func ( t * testing . T ) {
if actual := c . Original . SpecChanged ( c . New ) ; actual != c . Changed {
t . Fatalf ( "SpecChanged() returned %v; want %v" , actual , c . Changed )
}
} )
}
}
2016-02-21 01:43:17 +00:00
func testJob ( ) * Job {
return & Job {
2016-02-21 01:36:39 +00:00
Region : "global" ,
2017-09-29 16:58:48 +00:00
ID : uuid . Generate ( ) ,
2017-09-07 23:56:15 +00:00
Namespace : "test" ,
2016-02-21 01:36:39 +00:00
Name : "my-job" ,
Type : JobTypeService ,
Priority : 50 ,
AllAtOnce : false ,
Datacenters : [ ] string { "dc1" } ,
Constraints : [ ] * Constraint {
2017-09-26 22:26:33 +00:00
{
2016-02-21 01:36:39 +00:00
LTarget : "$attr.kernel.name" ,
RTarget : "linux" ,
Operand : "=" ,
} ,
} ,
Periodic : & PeriodicConfig {
Enabled : false ,
} ,
TaskGroups : [ ] * TaskGroup {
2017-09-26 22:26:33 +00:00
{
2016-09-14 22:43:42 +00:00
Name : "web" ,
Count : 10 ,
EphemeralDisk : DefaultEphemeralDisk ( ) ,
2016-02-21 01:36:39 +00:00
RestartPolicy : & RestartPolicy {
2016-07-13 19:50:08 +00:00
Mode : RestartPolicyModeFail ,
2016-02-21 01:36:39 +00:00
Attempts : 3 ,
Interval : 10 * time . Minute ,
Delay : 1 * time . Minute ,
} ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy {
Interval : 5 * time . Minute ,
Attempts : 10 ,
} ,
2016-02-21 01:36:39 +00:00
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2016-02-21 01:36:39 +00:00
Name : "web" ,
Driver : "exec" ,
Config : map [ string ] interface { } {
"command" : "/bin/date" ,
} ,
Env : map [ string ] string {
"FOO" : "bar" ,
} ,
2016-03-16 03:21:52 +00:00
Artifacts : [ ] * TaskArtifact {
{
GetterSource : "http://foo.com" ,
} ,
} ,
2016-06-12 23:36:49 +00:00
Services : [ ] * Service {
2016-02-21 01:36:39 +00:00
{
Name : "${TASK}-frontend" ,
PortLabel : "http" ,
} ,
} ,
Resources : & Resources {
CPU : 500 ,
MemoryMB : 256 ,
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2016-02-21 01:36:39 +00:00
MBits : 50 ,
DynamicPorts : [ ] Port { { Label : "http" } } ,
} ,
} ,
} ,
2016-07-13 19:50:08 +00:00
LogConfig : & LogConfig {
MaxFiles : 10 ,
MaxFileSizeMB : 1 ,
} ,
2016-02-21 01:36:39 +00:00
} ,
} ,
Meta : map [ string ] string {
"elb_check_type" : "http" ,
"elb_check_interval" : "30s" ,
"elb_check_min" : "3" ,
} ,
} ,
} ,
Meta : map [ string ] string {
"owner" : "armon" ,
} ,
}
2016-02-21 01:43:17 +00:00
}
2016-02-21 01:36:39 +00:00
2016-02-21 01:43:17 +00:00
func TestJob_Copy ( t * testing . T ) {
j := testJob ( )
2015-12-18 20:26:28 +00:00
c := j . Copy ( )
if ! reflect . DeepEqual ( j , c ) {
2016-02-11 17:08:20 +00:00
t . Fatalf ( "Copy() returned an unequal Job; got %#v; want %#v" , c , j )
2015-12-18 20:26:28 +00:00
}
}
2015-12-01 16:40:32 +00:00
func TestJob_IsPeriodic ( t * testing . T ) {
j := & Job {
Type : JobTypeService ,
Periodic : & PeriodicConfig {
Enabled : true ,
} ,
}
if ! j . IsPeriodic ( ) {
t . Fatalf ( "IsPeriodic() returned false on periodic job" )
}
j = & Job {
Type : JobTypeService ,
}
if j . IsPeriodic ( ) {
t . Fatalf ( "IsPeriodic() returned true on non-periodic job" )
}
}
2017-12-11 21:55:17 +00:00
func TestJob_IsPeriodicActive ( t * testing . T ) {
cases := [ ] struct {
job * Job
active bool
} {
{
job : & Job {
Type : JobTypeService ,
Periodic : & PeriodicConfig {
Enabled : true ,
} ,
} ,
active : true ,
} ,
{
job : & Job {
Type : JobTypeService ,
Periodic : & PeriodicConfig {
Enabled : false ,
} ,
} ,
active : false ,
} ,
{
job : & Job {
Type : JobTypeService ,
Periodic : & PeriodicConfig {
Enabled : true ,
} ,
Stop : true ,
} ,
active : false ,
} ,
{
job : & Job {
Type : JobTypeService ,
Periodic : & PeriodicConfig {
Enabled : false ,
} ,
ParameterizedJob : & ParameterizedJobConfig { } ,
} ,
active : false ,
} ,
}
for i , c := range cases {
if act := c . job . IsPeriodicActive ( ) ; act != c . active {
t . Fatalf ( "case %d failed: got %v; want %v" , i , act , c . active )
}
}
}
2016-07-13 19:50:08 +00:00
func TestJob_SystemJob_Validate ( t * testing . T ) {
j := testJob ( )
j . Type = JobTypeSystem
2016-07-20 23:07:15 +00:00
j . Canonicalize ( )
2016-07-13 19:50:08 +00:00
err := j . Validate ( )
if err == nil || ! strings . Contains ( err . Error ( ) , "exceed" ) {
t . Fatalf ( "expect error due to count" )
}
j . TaskGroups [ 0 ] . Count = 0
if err := j . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected err: %v" , err )
}
j . TaskGroups [ 0 ] . Count = 1
if err := j . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected err: %v" , err )
}
}
2016-08-17 00:50:14 +00:00
func TestJob_VaultPolicies ( t * testing . T ) {
j0 := & Job { }
2016-08-18 17:50:47 +00:00
e0 := make ( map [ string ] map [ string ] * Vault , 0 )
2016-08-17 00:50:14 +00:00
2016-08-18 17:50:47 +00:00
vj1 := & Vault {
Policies : [ ] string {
"p1" ,
"p2" ,
} ,
}
vj2 := & Vault {
Policies : [ ] string {
"p3" ,
"p4" ,
} ,
}
vj3 := & Vault {
Policies : [ ] string {
"p5" ,
} ,
}
2016-08-17 00:50:14 +00:00
j1 := & Job {
TaskGroups : [ ] * TaskGroup {
2017-09-26 22:26:33 +00:00
{
2016-08-17 00:50:14 +00:00
Name : "foo" ,
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2016-08-17 00:50:14 +00:00
Name : "t1" ,
} ,
2017-09-26 22:26:33 +00:00
{
2016-08-18 17:50:47 +00:00
Name : "t2" ,
Vault : vj1 ,
2016-08-17 00:50:14 +00:00
} ,
} ,
} ,
2017-09-26 22:26:33 +00:00
{
2016-08-17 00:50:14 +00:00
Name : "bar" ,
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2016-08-18 17:50:47 +00:00
Name : "t3" ,
Vault : vj2 ,
2016-08-17 00:50:14 +00:00
} ,
2017-09-26 22:26:33 +00:00
{
2016-08-18 17:50:47 +00:00
Name : "t4" ,
Vault : vj3 ,
2016-08-17 00:50:14 +00:00
} ,
} ,
} ,
} ,
}
2016-08-18 17:50:47 +00:00
e1 := map [ string ] map [ string ] * Vault {
2017-09-26 22:26:33 +00:00
"foo" : {
2016-08-18 17:50:47 +00:00
"t2" : vj1 ,
2016-08-17 00:50:14 +00:00
} ,
2017-09-26 22:26:33 +00:00
"bar" : {
2016-08-18 17:50:47 +00:00
"t3" : vj2 ,
"t4" : vj3 ,
2016-08-17 00:50:14 +00:00
} ,
}
cases := [ ] struct {
Job * Job
2016-08-18 17:50:47 +00:00
Expected map [ string ] map [ string ] * Vault
2016-08-17 00:50:14 +00:00
} {
{
Job : j0 ,
Expected : e0 ,
} ,
{
Job : j1 ,
Expected : e1 ,
} ,
}
for i , c := range cases {
got := c . Job . VaultPolicies ( )
if ! reflect . DeepEqual ( got , c . Expected ) {
t . Fatalf ( "case %d: got %#v; want %#v" , i + 1 , got , c . Expected )
}
}
}
2016-10-20 20:55:35 +00:00
func TestJob_RequiredSignals ( t * testing . T ) {
j0 := & Job { }
e0 := make ( map [ string ] map [ string ] [ ] string , 0 )
vj1 := & Vault {
Policies : [ ] string { "p1" } ,
ChangeMode : VaultChangeModeNoop ,
}
vj2 := & Vault {
Policies : [ ] string { "p1" } ,
ChangeMode : VaultChangeModeSignal ,
ChangeSignal : "SIGUSR1" ,
}
tj1 := & Template {
SourcePath : "foo" ,
DestPath : "bar" ,
ChangeMode : TemplateChangeModeNoop ,
}
tj2 := & Template {
SourcePath : "foo" ,
DestPath : "bar" ,
ChangeMode : TemplateChangeModeSignal ,
ChangeSignal : "SIGUSR2" ,
}
j1 := & Job {
TaskGroups : [ ] * TaskGroup {
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "foo" ,
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "t1" ,
} ,
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "t2" ,
Vault : vj2 ,
Templates : [ ] * Template { tj2 } ,
} ,
} ,
} ,
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "bar" ,
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "t3" ,
Vault : vj1 ,
Templates : [ ] * Template { tj1 } ,
} ,
2017-09-26 22:26:33 +00:00
{
2016-10-20 20:55:35 +00:00
Name : "t4" ,
Vault : vj2 ,
} ,
} ,
} ,
} ,
}
e1 := map [ string ] map [ string ] [ ] string {
2017-09-26 22:26:33 +00:00
"foo" : {
"t2" : { "SIGUSR1" , "SIGUSR2" } ,
2016-10-20 20:55:35 +00:00
} ,
2017-09-26 22:26:33 +00:00
"bar" : {
"t4" : { "SIGUSR1" } ,
2016-10-20 20:55:35 +00:00
} ,
}
2017-12-07 15:45:21 +00:00
j2 := & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
Tasks : [ ] * Task {
{
Name : "t1" ,
KillSignal : "SIGQUIT" ,
} ,
} ,
} ,
} ,
}
e2 := map [ string ] map [ string ] [ ] string {
"foo" : {
"t1" : { "SIGQUIT" } ,
} ,
}
2016-10-20 20:55:35 +00:00
cases := [ ] struct {
Job * Job
Expected map [ string ] map [ string ] [ ] string
} {
{
Job : j0 ,
Expected : e0 ,
} ,
{
Job : j1 ,
Expected : e1 ,
} ,
2017-12-07 15:45:21 +00:00
{
Job : j2 ,
Expected : e2 ,
} ,
2016-10-20 20:55:35 +00:00
}
for i , c := range cases {
got := c . Job . RequiredSignals ( )
if ! reflect . DeepEqual ( got , c . Expected ) {
t . Fatalf ( "case %d: got %#v; want %#v" , i + 1 , got , c . Expected )
}
}
}
2015-09-15 18:23:03 +00:00
func TestTaskGroup_Validate ( t * testing . T ) {
2017-07-07 02:08:51 +00:00
j := testJob ( )
2015-11-02 21:24:59 +00:00
tg := & TaskGroup {
2016-03-17 18:29:41 +00:00
Count : - 1 ,
2015-11-02 21:24:59 +00:00
RestartPolicy : & RestartPolicy {
2016-02-02 23:08:07 +00:00
Interval : 5 * time . Minute ,
Delay : 10 * time . Second ,
Attempts : 10 ,
Mode : RestartPolicyModeDelay ,
2015-11-02 21:24:59 +00:00
} ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy {
Interval : 5 * time . Minute ,
Attempts : 5 ,
} ,
2015-11-02 21:24:59 +00:00
}
2017-07-07 02:08:51 +00:00
err := tg . Validate ( j )
2015-09-15 18:23:03 +00:00
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "group name" ) {
t . Fatalf ( "err: %s" , err )
}
2016-03-17 18:29:41 +00:00
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "count can't be negative" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "Missing tasks" ) {
t . Fatalf ( "err: %s" , err )
}
2017-07-07 23:17:05 +00:00
tg = & TaskGroup {
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:17:05 +00:00
Name : "task-a" ,
Resources : & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:17:05 +00:00
ReservedPorts : [ ] Port { { Label : "foo" , Value : 123 } } ,
} ,
} ,
} ,
} ,
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:17:05 +00:00
Name : "task-b" ,
Resources : & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:17:05 +00:00
ReservedPorts : [ ] Port { { Label : "foo" , Value : 123 } } ,
} ,
} ,
} ,
} ,
} ,
}
err = tg . Validate ( & Job { } )
2017-07-07 23:58:20 +00:00
expected := ` Static port 123 already reserved by task-a:foo `
if ! strings . Contains ( err . Error ( ) , expected ) {
t . Errorf ( "expected %s but found: %v" , expected , err )
}
tg = & TaskGroup {
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:58:20 +00:00
Name : "task-a" ,
Resources : & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2017-07-07 23:58:20 +00:00
ReservedPorts : [ ] Port {
{ Label : "foo" , Value : 123 } ,
{ Label : "bar" , Value : 123 } ,
} ,
} ,
} ,
} ,
} ,
} ,
}
err = tg . Validate ( & Job { } )
expected = ` Static port 123 already reserved by task-a:foo `
2017-07-07 23:17:05 +00:00
if ! strings . Contains ( err . Error ( ) , expected ) {
t . Errorf ( "expected %s but found: %v" , expected , err )
}
2015-09-15 18:23:03 +00:00
tg = & TaskGroup {
Name : "web" ,
Count : 1 ,
Tasks : [ ] * Task {
2017-09-26 22:26:33 +00:00
{ Name : "web" , Leader : true } ,
{ Name : "web" , Leader : true } ,
{ } ,
2015-09-15 18:23:03 +00:00
} ,
2015-11-02 21:24:59 +00:00
RestartPolicy : & RestartPolicy {
2016-02-02 23:08:07 +00:00
Interval : 5 * time . Minute ,
Delay : 10 * time . Second ,
Attempts : 10 ,
Mode : RestartPolicyModeDelay ,
2015-11-02 21:24:59 +00:00
} ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy {
Interval : 5 * time . Minute ,
Attempts : 10 ,
} ,
2015-09-15 18:23:03 +00:00
}
2016-07-20 23:43:20 +00:00
2017-07-07 02:08:51 +00:00
err = tg . Validate ( j )
2015-09-15 18:23:03 +00:00
mErr = err . ( * multierror . Error )
2016-09-28 00:57:05 +00:00
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "should have an ephemeral disk object" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-13 20:10:45 +00:00
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "2 redefines 'web' from task 1" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-13 20:10:45 +00:00
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "Task 3 missing name" ) {
2016-08-25 18:53:09 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-13 20:10:45 +00:00
if ! strings . Contains ( mErr . Errors [ 3 ] . Error ( ) , "Only one task may be marked as leader" ) {
2017-02-11 00:57:47 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-13 20:10:45 +00:00
if ! strings . Contains ( mErr . Errors [ 4 ] . Error ( ) , "Task web validation failed" ) {
2015-09-15 18:23:03 +00:00
t . Fatalf ( "err: %s" , err )
}
2017-07-07 02:08:51 +00:00
// COMPAT: Enable in 0.7.0
//j.Type = JobTypeBatch
//err = tg.Validate(j)
//if !strings.Contains(err.Error(), "does not allow update block") {
//t.Fatalf("err: %s", err)
//}
2015-09-15 18:23:03 +00:00
}
func TestTask_Validate ( t * testing . T ) {
task := & Task { }
2016-09-14 22:43:42 +00:00
ephemeralDisk := DefaultEphemeralDisk ( )
err := task . Validate ( ephemeralDisk )
2015-09-15 18:23:03 +00:00
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "task name" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "task driver" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "task resources" ) {
t . Fatalf ( "err: %s" , err )
}
2016-05-28 00:17:10 +00:00
task = & Task { Name : "web/foo" }
2016-09-14 22:43:42 +00:00
err = task . Validate ( ephemeralDisk )
2016-05-28 00:17:10 +00:00
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "slashes" ) {
t . Fatalf ( "err: %s" , err )
}
2015-09-15 18:23:03 +00:00
task = & Task {
2016-02-02 21:50:30 +00:00
Name : "web" ,
Driver : "docker" ,
Resources : & Resources {
CPU : 100 ,
MemoryMB : 100 ,
IOPS : 10 ,
} ,
2016-02-11 18:42:56 +00:00
LogConfig : DefaultLogConfig ( ) ,
2015-09-15 18:23:03 +00:00
}
2016-09-14 22:43:42 +00:00
ephemeralDisk . SizeMB = 200
err = task . Validate ( ephemeralDisk )
2015-09-15 18:23:03 +00:00
if err != nil {
t . Fatalf ( "err: %s" , err )
}
2017-03-12 00:23:24 +00:00
task . Constraints = append ( task . Constraints ,
& Constraint {
Operand : ConstraintDistinctHosts ,
} ,
& Constraint {
Operand : ConstraintDistinctProperty ,
LTarget : "${meta.rack}" ,
} )
err = task . Validate ( ephemeralDisk )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "task level: distinct_hosts" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "task level: distinct_property" ) {
t . Fatalf ( "err: %s" , err )
}
2015-09-15 18:23:03 +00:00
}
2016-04-19 02:38:47 +00:00
func TestTask_Validate_Services ( t * testing . T ) {
2016-06-12 23:36:49 +00:00
s1 := & Service {
2016-04-19 02:38:47 +00:00
Name : "service-name" ,
PortLabel : "bar" ,
Checks : [ ] * ServiceCheck {
{
2016-07-09 05:33:04 +00:00
Name : "check-name" ,
Type : ServiceCheckTCP ,
Interval : 0 * time . Second ,
2016-04-19 02:38:47 +00:00
} ,
2016-05-03 20:16:02 +00:00
{
2016-07-09 05:33:04 +00:00
Name : "check-name" ,
Type : ServiceCheckTCP ,
Timeout : 2 * time . Second ,
2016-05-03 20:16:02 +00:00
} ,
2016-11-01 23:02:16 +00:00
{
Name : "check-name" ,
Type : ServiceCheckTCP ,
Interval : 1 * time . Second ,
} ,
2016-04-19 02:38:47 +00:00
} ,
}
2016-06-12 23:36:49 +00:00
s2 := & Service {
2017-01-17 20:26:07 +00:00
Name : "service-name" ,
PortLabel : "bar" ,
}
s3 := & Service {
Name : "service-A" ,
PortLabel : "a" ,
}
s4 := & Service {
Name : "service-A" ,
PortLabel : "b" ,
2016-05-02 20:40:49 +00:00
}
2016-09-14 22:43:42 +00:00
ephemeralDisk := DefaultEphemeralDisk ( )
2017-01-17 20:26:07 +00:00
ephemeralDisk . SizeMB = 200
2016-04-19 02:38:47 +00:00
task := & Task {
Name : "web" ,
Driver : "docker" ,
Resources : & Resources {
CPU : 100 ,
MemoryMB : 100 ,
IOPS : 10 ,
} ,
2016-06-12 23:36:49 +00:00
Services : [ ] * Service { s1 , s2 } ,
2016-04-19 02:38:47 +00:00
}
2017-01-17 20:26:07 +00:00
task1 := & Task {
Name : "web" ,
Driver : "docker" ,
Resources : DefaultResources ( ) ,
Services : [ ] * Service { s3 , s4 } ,
LogConfig : DefaultLogConfig ( ) ,
}
task1 . Resources . Networks = [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2017-01-17 20:26:07 +00:00
MBits : 10 ,
DynamicPorts : [ ] Port {
2017-09-26 22:26:33 +00:00
{
2017-01-17 20:26:07 +00:00
Label : "a" ,
Value : 1000 ,
} ,
2017-09-26 22:26:33 +00:00
{
2017-01-17 20:26:07 +00:00
Label : "b" ,
Value : 2000 ,
} ,
} ,
} ,
}
2016-08-25 18:53:09 +00:00
2016-09-14 22:43:42 +00:00
err := task . Validate ( ephemeralDisk )
2016-04-19 02:38:47 +00:00
if err == nil {
t . Fatal ( "expected an error" )
}
2016-05-02 20:40:49 +00:00
if ! strings . Contains ( err . Error ( ) , "service \"service-name\" is duplicate" ) {
2016-05-03 20:16:02 +00:00
t . Fatalf ( "err: %v" , err )
}
if ! strings . Contains ( err . Error ( ) , "check \"check-name\" is duplicate" ) {
2016-05-02 20:40:49 +00:00
t . Fatalf ( "err: %v" , err )
}
2016-07-09 05:33:04 +00:00
2016-11-01 23:02:16 +00:00
if ! strings . Contains ( err . Error ( ) , "missing required value interval" ) {
t . Fatalf ( "err: %v" , err )
}
2016-11-01 23:05:34 +00:00
if ! strings . Contains ( err . Error ( ) , "cannot be less than" ) {
2016-08-12 19:09:44 +00:00
t . Fatalf ( "err: %v" , err )
2016-08-16 19:05:15 +00:00
}
2017-01-17 20:26:07 +00:00
if err = task1 . Validate ( ephemeralDisk ) ; err != nil {
t . Fatalf ( "err : %v" , err )
}
2016-08-16 19:05:15 +00:00
}
2018-01-12 23:32:51 +00:00
func TestTask_Validate_Service_AddressMode_Ok ( t * testing . T ) {
ephemeralDisk := DefaultEphemeralDisk ( )
getTask := func ( s * Service ) * Task {
task := & Task {
Name : "web" ,
Driver : "docker" ,
Resources : DefaultResources ( ) ,
Services : [ ] * Service { s } ,
LogConfig : DefaultLogConfig ( ) ,
}
task . Resources . Networks = [ ] * NetworkResource {
{
MBits : 10 ,
DynamicPorts : [ ] Port {
{
Label : "http" ,
Value : 80 ,
} ,
} ,
} ,
}
return task
}
cases := [ ] * Service {
{
// https://github.com/hashicorp/nomad/issues/3681#issuecomment-357274177
Name : "DriverModeWithLabel" ,
PortLabel : "http" ,
AddressMode : AddressModeDriver ,
} ,
{
Name : "DriverModeWithPort" ,
PortLabel : "80" ,
AddressMode : AddressModeDriver ,
} ,
{
Name : "HostModeWithLabel" ,
PortLabel : "http" ,
AddressMode : AddressModeHost ,
} ,
{
Name : "HostModeWithoutLabel" ,
AddressMode : AddressModeHost ,
} ,
{
Name : "DriverModeWithoutLabel" ,
AddressMode : AddressModeDriver ,
} ,
}
for _ , service := range cases {
task := getTask ( service )
t . Run ( service . Name , func ( t * testing . T ) {
if err := task . Validate ( ephemeralDisk ) ; err != nil {
t . Fatalf ( "unexpected err: %v" , err )
}
} )
}
}
func TestTask_Validate_Service_AddressMode_Bad ( t * testing . T ) {
ephemeralDisk := DefaultEphemeralDisk ( )
getTask := func ( s * Service ) * Task {
task := & Task {
Name : "web" ,
Driver : "docker" ,
Resources : DefaultResources ( ) ,
Services : [ ] * Service { s } ,
LogConfig : DefaultLogConfig ( ) ,
}
task . Resources . Networks = [ ] * NetworkResource {
{
MBits : 10 ,
DynamicPorts : [ ] Port {
{
Label : "http" ,
Value : 80 ,
} ,
} ,
} ,
}
return task
}
cases := [ ] * Service {
{
// https://github.com/hashicorp/nomad/issues/3681#issuecomment-357274177
Name : "DriverModeWithLabel" ,
PortLabel : "asdf" ,
AddressMode : AddressModeDriver ,
} ,
{
Name : "HostModeWithLabel" ,
PortLabel : "asdf" ,
AddressMode : AddressModeHost ,
} ,
{
Name : "HostModeWithPort" ,
PortLabel : "80" ,
AddressMode : AddressModeHost ,
} ,
}
for _ , service := range cases {
task := getTask ( service )
t . Run ( service . Name , func ( t * testing . T ) {
err := task . Validate ( ephemeralDisk )
if err == nil {
t . Fatalf ( "expected an error" )
}
//t.Logf("err: %v", err)
} )
}
}
2016-08-16 19:05:15 +00:00
func TestTask_Validate_Service_Check ( t * testing . T ) {
2017-08-14 17:23:52 +00:00
invalidCheck := ServiceCheck {
Name : "check-name" ,
Command : "/bin/true" ,
Type : ServiceCheckScript ,
Interval : 10 * time . Second ,
}
err := invalidCheck . validate ( )
if err == nil || ! strings . Contains ( err . Error ( ) , "Timeout cannot be less" ) {
t . Fatalf ( "expected a timeout validation error but received: %q" , err )
}
2016-08-16 19:05:15 +00:00
check1 := ServiceCheck {
Name : "check-name" ,
Type : ServiceCheckTCP ,
Interval : 10 * time . Second ,
Timeout : 2 * time . Second ,
}
2017-08-14 17:23:52 +00:00
if err := check1 . validate ( ) ; err != nil {
2017-02-28 00:00:19 +00:00
t . Fatalf ( "err: %v" , err )
2016-08-16 19:05:15 +00:00
}
check1 . InitialStatus = "foo"
err = check1 . validate ( )
if err == nil {
t . Fatal ( "Expected an error" )
}
if ! strings . Contains ( err . Error ( ) , "invalid initial check state (foo)" ) {
t . Fatalf ( "err: %v" , err )
}
check1 . InitialStatus = api . HealthCritical
err = check1 . validate ( )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
check1 . InitialStatus = api . HealthPassing
err = check1 . validate ( )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
check1 . InitialStatus = ""
err = check1 . validate ( )
if err != nil {
t . Fatalf ( "err: %v" , err )
2016-07-09 05:33:04 +00:00
}
2017-12-21 09:32:12 +00:00
check2 := ServiceCheck {
Name : "check-name-2" ,
Type : ServiceCheckHTTP ,
Interval : 10 * time . Second ,
Timeout : 2 * time . Second ,
Path : "/foo/bar" ,
}
err = check2 . validate ( )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
check2 . Path = ""
err = check2 . validate ( )
if err == nil {
t . Fatal ( "Expected an error" )
}
if ! strings . Contains ( err . Error ( ) , "valid http path" ) {
t . Fatalf ( "err: %v" , err )
}
check2 . Path = "http://www.example.com"
err = check2 . validate ( )
if err == nil {
t . Fatal ( "Expected an error" )
}
if ! strings . Contains ( err . Error ( ) , "relative http path" ) {
t . Fatalf ( "err: %v" , err )
}
2016-04-19 02:38:47 +00:00
}
2017-12-08 21:49:57 +00:00
// TestTask_Validate_Service_Check_AddressMode asserts that checks do not
// inherit address mode but do inherit ports.
func TestTask_Validate_Service_Check_AddressMode ( t * testing . T ) {
2017-12-19 00:18:42 +00:00
getTask := func ( s * Service ) * Task {
return & Task {
Resources : & Resources {
Networks : [ ] * NetworkResource {
{
DynamicPorts : [ ] Port {
{
Label : "http" ,
Value : 9999 ,
} ,
2017-12-08 21:49:57 +00:00
} ,
} ,
} ,
} ,
2017-12-19 00:18:42 +00:00
Services : [ ] * Service { s } ,
}
}
cases := [ ] struct {
Service * Service
ErrContains string
} {
{
Service : & Service {
2017-12-08 21:49:57 +00:00
Name : "invalid-driver" ,
PortLabel : "80" ,
AddressMode : "host" ,
} ,
2017-12-19 00:18:42 +00:00
ErrContains : ` port label "80" referenced ` ,
} ,
{
Service : & Service {
Name : "http-driver-fail-1" ,
2017-12-08 21:49:57 +00:00
PortLabel : "80" ,
AddressMode : "driver" ,
Checks : [ ] * ServiceCheck {
{
Name : "invalid-check-1" ,
Type : "tcp" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
2017-12-19 00:18:42 +00:00
} ,
} ,
ErrContains : ` check "invalid-check-1" cannot use a numeric port ` ,
} ,
{
Service : & Service {
Name : "http-driver-fail-2" ,
PortLabel : "80" ,
AddressMode : "driver" ,
Checks : [ ] * ServiceCheck {
2017-12-08 21:49:57 +00:00
{
Name : "invalid-check-2" ,
Type : "tcp" ,
PortLabel : "80" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
2017-12-19 00:18:42 +00:00
} ,
} ,
ErrContains : ` check "invalid-check-2" cannot use a numeric port ` ,
} ,
{
Service : & Service {
Name : "http-driver-fail-3" ,
PortLabel : "80" ,
AddressMode : "driver" ,
Checks : [ ] * ServiceCheck {
2017-12-08 21:49:57 +00:00
{
Name : "invalid-check-3" ,
Type : "tcp" ,
PortLabel : "missing-port-label" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
2017-12-19 00:18:42 +00:00
} ,
} ,
ErrContains : ` port label "missing-port-label" referenced ` ,
} ,
{
Service : & Service {
Name : "http-driver-passes" ,
PortLabel : "80" ,
AddressMode : "driver" ,
Checks : [ ] * ServiceCheck {
2017-12-08 21:49:57 +00:00
{
Name : "valid-script-check" ,
Type : "script" ,
Command : "ok" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
{
Name : "valid-host-check" ,
Type : "tcp" ,
PortLabel : "http" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
{
Name : "valid-driver-check" ,
Type : "tcp" ,
AddressMode : "driver" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
} ,
} ,
} ,
2017-12-19 00:18:42 +00:00
{
Service : & Service {
Name : "empty-address-3673-passes-1" ,
Checks : [ ] * ServiceCheck {
{
Name : "valid-port-label" ,
Type : "tcp" ,
PortLabel : "http" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
{
Name : "empty-is-ok" ,
Type : "script" ,
Command : "ok" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
} ,
} ,
} ,
{
Service : & Service {
Name : "empty-address-3673-passes-2" ,
} ,
} ,
{
Service : & Service {
Name : "empty-address-3673-fails" ,
Checks : [ ] * ServiceCheck {
{
Name : "empty-is-not-ok" ,
Type : "tcp" ,
Interval : time . Second ,
Timeout : time . Second ,
} ,
} ,
} ,
ErrContains : ` invalid: check requires a port but neither check nor service ` ,
} ,
2017-12-08 21:49:57 +00:00
}
2017-12-19 00:18:42 +00:00
for _ , tc := range cases {
tc := tc
task := getTask ( tc . Service )
t . Run ( tc . Service . Name , func ( t * testing . T ) {
err := validateServices ( task )
if err == nil && tc . ErrContains == "" {
// Ok!
return
}
if err == nil {
t . Fatalf ( "no error returned. expected: %s" , tc . ErrContains )
}
if ! strings . Contains ( err . Error ( ) , tc . ErrContains ) {
t . Fatalf ( "expected %q but found: %v" , tc . ErrContains , err )
}
} )
}
2017-12-08 21:49:57 +00:00
}
2017-09-15 22:12:47 +00:00
func TestTask_Validate_Service_Check_CheckRestart ( t * testing . T ) {
invalidCheckRestart := & CheckRestart {
Limit : - 1 ,
Grace : - 1 ,
}
err := invalidCheckRestart . Validate ( )
assert . NotNil ( t , err , "invalidateCheckRestart.Validate()" )
assert . Len ( t , err . ( * multierror . Error ) . Errors , 2 )
validCheckRestart := & CheckRestart { }
assert . Nil ( t , validCheckRestart . Validate ( ) )
validCheckRestart . Limit = 1
validCheckRestart . Grace = 1
assert . Nil ( t , validCheckRestart . Validate ( ) )
}
2016-02-11 20:30:47 +00:00
func TestTask_Validate_LogConfig ( t * testing . T ) {
task := & Task {
LogConfig : DefaultLogConfig ( ) ,
2016-08-25 18:53:09 +00:00
}
2016-09-14 22:43:42 +00:00
ephemeralDisk := & EphemeralDisk {
SizeMB : 1 ,
2016-02-11 20:30:47 +00:00
}
2016-09-14 22:43:42 +00:00
err := task . Validate ( ephemeralDisk )
2016-02-11 20:30:47 +00:00
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 3 ] . Error ( ) , "log storage" ) {
t . Fatalf ( "err: %s" , err )
}
}
2016-09-23 22:39:52 +00:00
func TestTask_Validate_Template ( t * testing . T ) {
bad := & Template { }
task := & Task {
Templates : [ ] * Template { bad } ,
}
ephemeralDisk := & EphemeralDisk {
SizeMB : 1 ,
}
err := task . Validate ( ephemeralDisk )
if ! strings . Contains ( err . Error ( ) , "Template 1 validation failed" ) {
t . Fatalf ( "err: %s" , err )
}
2016-10-10 22:19:00 +00:00
// Have two templates that share the same destination
good := & Template {
SourcePath : "foo" ,
DestPath : "local/foo" ,
ChangeMode : "noop" ,
}
task . Templates = [ ] * Template { good , good }
err = task . Validate ( ephemeralDisk )
if ! strings . Contains ( err . Error ( ) , "same destination as" ) {
t . Fatalf ( "err: %s" , err )
}
2017-07-26 03:27:18 +00:00
// Env templates can't use signals
task . Templates = [ ] * Template {
{
Envvars : true ,
ChangeMode : "signal" ,
} ,
}
err = task . Validate ( ephemeralDisk )
if err == nil {
t . Fatalf ( "expected error from Template.Validate" )
}
if expected := "cannot use signals" ; ! strings . Contains ( err . Error ( ) , expected ) {
t . Errorf ( "expected to find %q but found %v" , expected , err )
}
2016-09-23 22:39:52 +00:00
}
func TestTemplate_Validate ( t * testing . T ) {
cases := [ ] struct {
Tmpl * Template
Fail bool
ContainsErrs [ ] string
} {
{
Tmpl : & Template { } ,
Fail : true ,
ContainsErrs : [ ] string {
"specify a source path" ,
"specify a destination" ,
TemplateChangeModeInvalidError . Error ( ) ,
} ,
} ,
{
Tmpl : & Template {
Splay : - 100 ,
} ,
Fail : true ,
ContainsErrs : [ ] string {
"positive splay" ,
} ,
} ,
{
Tmpl : & Template {
ChangeMode : "foo" ,
} ,
Fail : true ,
ContainsErrs : [ ] string {
TemplateChangeModeInvalidError . Error ( ) ,
} ,
} ,
{
Tmpl : & Template {
ChangeMode : "signal" ,
} ,
Fail : true ,
ContainsErrs : [ ] string {
"specify signal value" ,
} ,
} ,
{
Tmpl : & Template {
SourcePath : "foo" ,
DestPath : "../../root" ,
ChangeMode : "noop" ,
} ,
Fail : true ,
ContainsErrs : [ ] string {
"destination escapes" ,
} ,
} ,
{
Tmpl : & Template {
SourcePath : "foo" ,
DestPath : "local/foo" ,
ChangeMode : "noop" ,
} ,
Fail : false ,
} ,
2017-02-01 04:00:33 +00:00
{
Tmpl : & Template {
SourcePath : "foo" ,
DestPath : "local/foo" ,
ChangeMode : "noop" ,
Perms : "0444" ,
} ,
Fail : false ,
} ,
{
Tmpl : & Template {
SourcePath : "foo" ,
DestPath : "local/foo" ,
ChangeMode : "noop" ,
Perms : "zza" ,
} ,
Fail : true ,
ContainsErrs : [ ] string {
"as octal" ,
} ,
} ,
2016-09-23 22:39:52 +00:00
}
for i , c := range cases {
err := c . Tmpl . Validate ( )
if err != nil {
if ! c . Fail {
t . Fatalf ( "Case %d: shouldn't have failed: %v" , i + 1 , err )
}
e := err . Error ( )
for _ , exp := range c . ContainsErrs {
if ! strings . Contains ( e , exp ) {
t . Fatalf ( "Cased %d: should have contained error %q: %q" , i + 1 , exp , e )
}
}
} else if c . Fail {
t . Fatalf ( "Case %d: should have failed: %v" , i + 1 , err )
}
}
}
2015-10-11 19:50:16 +00:00
func TestConstraint_Validate ( t * testing . T ) {
c := & Constraint { }
err := c . Validate ( )
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "Missing constraint operand" ) {
t . Fatalf ( "err: %s" , err )
}
c = & Constraint {
LTarget : "$attr.kernel.name" ,
RTarget : "linux" ,
Operand : "=" ,
}
err = c . Validate ( )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
// Perform additional regexp validation
2015-10-26 20:47:56 +00:00
c . Operand = ConstraintRegex
2015-10-11 19:50:16 +00:00
c . RTarget = "(foo"
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "missing closing" ) {
t . Fatalf ( "err: %s" , err )
}
// Perform version validation
2015-10-26 20:47:56 +00:00
c . Operand = ConstraintVersion
2015-10-11 19:50:16 +00:00
c . RTarget = "~> foo"
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "Malformed constraint" ) {
t . Fatalf ( "err: %s" , err )
}
2017-07-31 23:44:17 +00:00
// Perform distinct_property validation
c . Operand = ConstraintDistinctProperty
c . RTarget = "0"
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "count of 1 or greater" ) {
t . Fatalf ( "err: %s" , err )
}
c . RTarget = "-1"
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "to uint64" ) {
t . Fatalf ( "err: %s" , err )
}
// Perform distinct_hosts validation
c . Operand = ConstraintDistinctHosts
2017-08-30 17:30:01 +00:00
c . LTarget = ""
c . RTarget = ""
if err := c . Validate ( ) ; err != nil {
t . Fatalf ( "expected valid constraint: %v" , err )
2017-07-31 23:44:17 +00:00
}
// Perform set_contains validation
c . Operand = ConstraintSetContains
c . RTarget = ""
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "requires an RTarget" ) {
t . Fatalf ( "err: %s" , err )
}
// Perform LTarget validation
c . Operand = ConstraintRegex
c . RTarget = "foo"
c . LTarget = ""
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "No LTarget" ) {
t . Fatalf ( "err: %s" , err )
}
// Perform constraint type validation
c . Operand = "foo"
err = c . Validate ( )
mErr = err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "Unknown constraint type" ) {
t . Fatalf ( "err: %s" , err )
}
2015-10-11 19:50:16 +00:00
}
2017-05-09 00:44:26 +00:00
func TestUpdateStrategy_Validate ( t * testing . T ) {
u := & UpdateStrategy {
2017-08-23 13:30:28 +00:00
MaxParallel : 0 ,
2017-05-09 00:44:26 +00:00
HealthCheck : "foo" ,
MinHealthyTime : - 10 ,
2017-07-25 23:30:53 +00:00
HealthyDeadline : - 15 ,
2017-05-09 00:44:26 +00:00
AutoRevert : false ,
Canary : - 1 ,
}
err := u . Validate ( )
mErr := err . ( * multierror . Error )
if ! strings . Contains ( mErr . Errors [ 0 ] . Error ( ) , "Invalid health check given" ) {
t . Fatalf ( "err: %s" , err )
}
2017-08-23 13:30:28 +00:00
if ! strings . Contains ( mErr . Errors [ 1 ] . Error ( ) , "Max parallel can not be less than one" ) {
2017-05-09 00:44:26 +00:00
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 2 ] . Error ( ) , "Canary count can not be less than zero" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 3 ] . Error ( ) , "Minimum healthy time may not be less than zero" ) {
t . Fatalf ( "err: %s" , err )
}
if ! strings . Contains ( mErr . Errors [ 4 ] . Error ( ) , "Healthy deadline must be greater than zero" ) {
t . Fatalf ( "err: %s" , err )
}
2017-07-25 23:30:53 +00:00
if ! strings . Contains ( mErr . Errors [ 5 ] . Error ( ) , "Minimum healthy time must be less than healthy deadline" ) {
t . Fatalf ( "err: %s" , err )
}
2017-05-09 00:44:26 +00:00
}
2015-09-13 22:04:36 +00:00
func TestResource_NetIndex ( t * testing . T ) {
2015-08-05 00:23:42 +00:00
r := & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{ Device : "eth0" } ,
{ Device : "lo0" } ,
{ Device : "" } ,
2015-08-05 00:23:42 +00:00
} ,
}
2015-09-13 22:04:36 +00:00
if idx := r . NetIndex ( & NetworkResource { Device : "eth0" } ) ; idx != 0 {
2015-08-05 00:23:42 +00:00
t . Fatalf ( "Bad: %d" , idx )
}
2015-09-13 22:04:36 +00:00
if idx := r . NetIndex ( & NetworkResource { Device : "lo0" } ) ; idx != 1 {
2015-08-05 00:23:42 +00:00
t . Fatalf ( "Bad: %d" , idx )
}
2015-09-13 22:04:36 +00:00
if idx := r . NetIndex ( & NetworkResource { Device : "eth1" } ) ; idx != - 1 {
2015-09-12 23:21:57 +00:00
t . Fatalf ( "Bad: %d" , idx )
}
}
2015-08-05 00:32:57 +00:00
func TestResource_Superset ( t * testing . T ) {
r1 := & Resources {
2015-09-23 18:14:32 +00:00
CPU : 2000 ,
2015-08-05 00:32:57 +00:00
MemoryMB : 2048 ,
DiskMB : 10000 ,
IOPS : 100 ,
}
r2 := & Resources {
2015-09-23 18:14:32 +00:00
CPU : 2000 ,
2015-08-05 00:32:57 +00:00
MemoryMB : 1024 ,
DiskMB : 5000 ,
IOPS : 50 ,
}
2015-09-14 01:38:11 +00:00
if s , _ := r1 . Superset ( r1 ) ; ! s {
2015-08-05 00:32:57 +00:00
t . Fatalf ( "bad" )
}
2015-09-14 01:38:11 +00:00
if s , _ := r1 . Superset ( r2 ) ; ! s {
2015-08-05 00:32:57 +00:00
t . Fatalf ( "bad" )
}
2015-09-14 01:38:11 +00:00
if s , _ := r2 . Superset ( r1 ) ; s {
2015-08-05 00:32:57 +00:00
t . Fatalf ( "bad" )
}
2015-09-14 01:38:11 +00:00
if s , _ := r2 . Superset ( r2 ) ; ! s {
2015-08-05 00:32:57 +00:00
t . Fatalf ( "bad" )
}
}
2015-08-05 00:41:02 +00:00
func TestResource_Add ( t * testing . T ) {
r1 := & Resources {
2015-09-23 18:14:32 +00:00
CPU : 2000 ,
2015-08-05 00:41:02 +00:00
MemoryMB : 2048 ,
DiskMB : 10000 ,
IOPS : 100 ,
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-08-05 00:41:02 +00:00
CIDR : "10.0.0.0/8" ,
MBits : 100 ,
2015-11-15 09:56:21 +00:00
ReservedPorts : [ ] Port { { "ssh" , 22 } } ,
2015-08-05 00:41:02 +00:00
} ,
} ,
}
r2 := & Resources {
2015-09-23 18:14:32 +00:00
CPU : 2000 ,
2015-08-05 00:41:02 +00:00
MemoryMB : 1024 ,
DiskMB : 5000 ,
IOPS : 50 ,
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-09-12 23:33:41 +00:00
IP : "10.0.0.1" ,
2015-08-05 00:41:02 +00:00
MBits : 50 ,
2015-11-15 09:56:21 +00:00
ReservedPorts : [ ] Port { { "web" , 80 } } ,
2015-08-05 00:41:02 +00:00
} ,
} ,
}
err := r1 . Add ( r2 )
if err != nil {
t . Fatalf ( "Err: %v" , err )
}
expect := & Resources {
2015-09-23 18:14:32 +00:00
CPU : 3000 ,
2015-08-05 00:41:02 +00:00
MemoryMB : 3072 ,
DiskMB : 15000 ,
IOPS : 150 ,
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-08-05 00:41:02 +00:00
CIDR : "10.0.0.0/8" ,
MBits : 150 ,
2015-11-15 09:56:21 +00:00
ReservedPorts : [ ] Port { { "ssh" , 22 } , { "web" , 80 } } ,
2015-08-05 00:41:02 +00:00
} ,
} ,
}
if ! reflect . DeepEqual ( expect . Networks , r1 . Networks ) {
t . Fatalf ( "bad: %#v %#v" , expect , r1 )
}
}
2015-09-13 00:04:09 +00:00
func TestResource_Add_Network ( t * testing . T ) {
r1 := & Resources { }
r2 := & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-09-13 00:04:09 +00:00
MBits : 50 ,
2015-11-15 09:56:21 +00:00
DynamicPorts : [ ] Port { { "http" , 0 } , { "https" , 0 } } ,
2015-09-13 00:04:09 +00:00
} ,
} ,
}
r3 := & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-09-13 00:04:09 +00:00
MBits : 25 ,
2015-11-15 09:56:21 +00:00
DynamicPorts : [ ] Port { { "admin" , 0 } } ,
2015-09-13 00:04:09 +00:00
} ,
} ,
}
err := r1 . Add ( r2 )
if err != nil {
t . Fatalf ( "Err: %v" , err )
}
err = r1 . Add ( r3 )
if err != nil {
t . Fatalf ( "Err: %v" , err )
}
expect := & Resources {
Networks : [ ] * NetworkResource {
2017-09-26 22:26:33 +00:00
{
2015-09-13 00:04:09 +00:00
MBits : 75 ,
2015-11-15 09:56:21 +00:00
DynamicPorts : [ ] Port { { "http" , 0 } , { "https" , 0 } , { "admin" , 0 } } ,
2015-09-13 00:04:09 +00:00
} ,
} ,
}
if ! reflect . DeepEqual ( expect . Networks , r1 . Networks ) {
2015-09-14 01:38:11 +00:00
t . Fatalf ( "bad: %#v %#v" , expect . Networks [ 0 ] , r1 . Networks [ 0 ] )
2015-09-13 00:04:09 +00:00
}
}
2015-06-05 22:21:17 +00:00
func TestEncodeDecode ( t * testing . T ) {
type FooRequest struct {
Foo string
Bar int
Baz bool
}
arg := & FooRequest {
Foo : "test" ,
Bar : 42 ,
Baz : true ,
}
buf , err := Encode ( 1 , arg )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
var out FooRequest
err = Decode ( buf [ 1 : ] , & out )
if err != nil {
t . Fatalf ( "err: %v" , err )
}
if ! reflect . DeepEqual ( arg , & out ) {
t . Fatalf ( "bad: %#v %#v" , arg , out )
}
}
2015-11-17 07:56:11 +00:00
2016-02-21 01:43:17 +00:00
func BenchmarkEncodeDecode ( b * testing . B ) {
job := testJob ( )
for i := 0 ; i < b . N ; i ++ {
buf , err := Encode ( 1 , job )
if err != nil {
b . Fatalf ( "err: %v" , err )
}
var out Job
err = Decode ( buf [ 1 : ] , & out )
if err != nil {
b . Fatalf ( "err: %v" , err )
}
}
}
2015-11-17 21:36:59 +00:00
func TestInvalidServiceCheck ( t * testing . T ) {
2016-06-12 23:36:49 +00:00
s := Service {
2015-11-17 21:36:59 +00:00
Name : "service-name" ,
PortLabel : "bar" ,
2015-11-26 20:40:42 +00:00
Checks : [ ] * ServiceCheck {
2015-11-17 21:36:59 +00:00
{
Name : "check-name" ,
Type : "lol" ,
} ,
} ,
}
if err := s . Validate ( ) ; err == nil {
2016-03-15 00:54:49 +00:00
t . Fatalf ( "Service should be invalid (invalid type)" )
2015-11-17 07:56:11 +00:00
}
2016-02-05 22:42:35 +00:00
2016-06-12 23:36:49 +00:00
s = Service {
2016-02-05 22:42:35 +00:00
Name : "service.name" ,
PortLabel : "bar" ,
}
2016-10-24 19:13:47 +00:00
if err := s . ValidateName ( s . Name ) ; err == nil {
2016-03-15 00:54:49 +00:00
t . Fatalf ( "Service should be invalid (contains a dot): %v" , err )
}
2016-06-12 23:36:49 +00:00
s = Service {
2016-03-15 00:54:49 +00:00
Name : "-my-service" ,
PortLabel : "bar" ,
}
if err := s . Validate ( ) ; err == nil {
t . Fatalf ( "Service should be invalid (begins with a hyphen): %v" , err )
}
2016-10-24 19:13:47 +00:00
s = Service {
Name : "my-service-${NOMAD_META_FOO}" ,
PortLabel : "bar" ,
}
if err := s . Validate ( ) ; err != nil {
t . Fatalf ( "Service should be valid: %v" , err )
}
2017-11-15 21:35:43 +00:00
s = Service {
Name : "my_service-${NOMAD_META_FOO}" ,
PortLabel : "bar" ,
}
if err := s . Validate ( ) ; err == nil {
t . Fatalf ( "Service should be invalid (contains underscore but not in a variable name): %v" , err )
}
2016-06-12 23:36:49 +00:00
s = Service {
2016-03-15 00:54:49 +00:00
Name : "abcdef0123456789-abcdef0123456789-abcdef0123456789-abcdef0123456" ,
PortLabel : "bar" ,
}
2016-10-24 19:13:47 +00:00
if err := s . ValidateName ( s . Name ) ; err == nil {
2016-03-15 00:54:49 +00:00
t . Fatalf ( "Service should be invalid (too long): %v" , err )
2016-02-05 22:42:35 +00:00
}
2016-04-15 08:50:55 +00:00
2016-06-12 23:36:49 +00:00
s = Service {
2016-04-15 08:50:55 +00:00
Name : "service-name" ,
Checks : [ ] * ServiceCheck {
{
Name : "check-tcp" ,
Type : ServiceCheckTCP ,
Interval : 5 * time . Second ,
Timeout : 2 * time . Second ,
} ,
{
Name : "check-http" ,
Type : ServiceCheckHTTP ,
Path : "/foo" ,
Interval : 5 * time . Second ,
Timeout : 2 * time . Second ,
} ,
} ,
}
if err := s . Validate ( ) ; err == nil {
t . Fatalf ( "service should be invalid (tcp/http checks with no port): %v" , err )
}
2016-06-12 23:36:49 +00:00
s = Service {
2016-04-15 08:50:55 +00:00
Name : "service-name" ,
Checks : [ ] * ServiceCheck {
{
Name : "check-script" ,
Type : ServiceCheckScript ,
Command : "/bin/date" ,
Interval : 5 * time . Second ,
Timeout : 2 * time . Second ,
} ,
} ,
}
if err := s . Validate ( ) ; err != nil {
t . Fatalf ( "un-expected error: %v" , err )
}
2015-11-17 07:56:11 +00:00
}
2015-11-21 20:34:01 +00:00
2015-12-14 23:57:56 +00:00
func TestDistinctCheckID ( t * testing . T ) {
2015-11-21 20:34:01 +00:00
c1 := ServiceCheck {
Name : "web-health" ,
Type : "http" ,
Path : "/health" ,
Interval : 2 * time . Second ,
Timeout : 3 * time . Second ,
}
c2 := ServiceCheck {
Name : "web-health" ,
Type : "http" ,
Path : "/health1" ,
Interval : 2 * time . Second ,
Timeout : 3 * time . Second ,
}
c3 := ServiceCheck {
Name : "web-health" ,
Type : "http" ,
Path : "/health" ,
Interval : 4 * time . Second ,
Timeout : 3 * time . Second ,
}
2015-12-14 23:57:56 +00:00
serviceID := "123"
c1Hash := c1 . Hash ( serviceID )
c2Hash := c2 . Hash ( serviceID )
c3Hash := c3 . Hash ( serviceID )
2015-11-21 20:34:01 +00:00
2015-11-26 21:47:02 +00:00
if c1Hash == c2Hash || c1Hash == c3Hash || c3Hash == c2Hash {
t . Fatalf ( "Checks need to be uniq c1: %s, c2: %s, c3: %s" , c1Hash , c2Hash , c3Hash )
2015-11-21 20:34:01 +00:00
}
}
2015-11-27 03:26:00 +00:00
2016-07-20 23:07:15 +00:00
func TestService_Canonicalize ( t * testing . T ) {
2015-11-27 03:26:00 +00:00
job := "example"
taskGroup := "cache"
task := "redis"
2016-06-12 23:36:49 +00:00
s := Service {
2015-11-27 03:26:00 +00:00
Name : "${TASK}-db" ,
}
2016-07-20 23:07:15 +00:00
s . Canonicalize ( job , taskGroup , task )
2015-11-27 03:26:00 +00:00
if s . Name != "redis-db" {
t . Fatalf ( "Expected name: %v, Actual: %v" , "redis-db" , s . Name )
}
s . Name = "db"
2016-07-20 23:07:15 +00:00
s . Canonicalize ( job , taskGroup , task )
2015-11-27 03:26:00 +00:00
if s . Name != "db" {
t . Fatalf ( "Expected name: %v, Actual: %v" , "redis-db" , s . Name )
}
s . Name = "${JOB}-${TASKGROUP}-${TASK}-db"
2016-07-20 23:07:15 +00:00
s . Canonicalize ( job , taskGroup , task )
2015-11-27 03:26:00 +00:00
if s . Name != "example-cache-redis-db" {
t . Fatalf ( "Expected name: %v, Actual: %v" , "expample-cache-redis-db" , s . Name )
}
s . Name = "${BASE}-db"
2016-07-20 23:07:15 +00:00
s . Canonicalize ( job , taskGroup , task )
2015-11-27 03:26:00 +00:00
if s . Name != "example-cache-redis-db" {
t . Fatalf ( "Expected name: %v, Actual: %v" , "expample-cache-redis-db" , s . Name )
}
}
func TestJob_ExpandServiceNames ( t * testing . T ) {
j := & Job {
Name : "my-job" ,
TaskGroups : [ ] * TaskGroup {
2017-09-26 22:26:33 +00:00
{
2015-11-27 03:26:00 +00:00
Name : "web" ,
Tasks : [ ] * Task {
{
Name : "frontend" ,
2016-06-12 23:36:49 +00:00
Services : [ ] * Service {
2015-11-27 03:26:00 +00:00
{
Name : "${BASE}-default" ,
} ,
{
Name : "jmx" ,
} ,
} ,
} ,
} ,
} ,
2017-09-26 22:26:33 +00:00
{
2015-11-27 03:26:00 +00:00
Name : "admin" ,
Tasks : [ ] * Task {
{
Name : "admin-web" ,
} ,
} ,
} ,
} ,
}
2016-07-20 23:07:15 +00:00
j . Canonicalize ( )
2015-11-27 03:26:00 +00:00
2016-06-12 23:36:49 +00:00
service1Name := j . TaskGroups [ 0 ] . Tasks [ 0 ] . Services [ 0 ] . Name
2015-11-27 03:26:00 +00:00
if service1Name != "my-job-web-frontend-default" {
t . Fatalf ( "Expected Service Name: %s, Actual: %s" , "my-job-web-frontend-default" , service1Name )
}
2016-06-12 23:36:49 +00:00
service2Name := j . TaskGroups [ 0 ] . Tasks [ 0 ] . Services [ 1 ] . Name
2015-11-27 03:26:00 +00:00
if service2Name != "jmx" {
t . Fatalf ( "Expected Service Name: %s, Actual: %s" , "jmx" , service2Name )
}
}
2015-12-01 00:51:56 +00:00
func TestPeriodicConfig_EnabledInvalid ( t * testing . T ) {
// Create a config that is enabled but with no interval specified.
p := & PeriodicConfig { Enabled : true }
if err := p . Validate ( ) ; err == nil {
t . Fatal ( "Enabled PeriodicConfig with no spec or type shouldn't be valid" )
}
// Create a config that is enabled, with a spec but no type specified.
p = & PeriodicConfig { Enabled : true , Spec : "foo" }
if err := p . Validate ( ) ; err == nil {
t . Fatal ( "Enabled PeriodicConfig with no spec type shouldn't be valid" )
}
// Create a config that is enabled, with a spec type but no spec specified.
p = & PeriodicConfig { Enabled : true , SpecType : PeriodicSpecCron }
if err := p . Validate ( ) ; err == nil {
t . Fatal ( "Enabled PeriodicConfig with no spec shouldn't be valid" )
}
2017-02-15 22:37:06 +00:00
// Create a config that is enabled, with a bad time zone.
p = & PeriodicConfig { Enabled : true , TimeZone : "FOO" }
if err := p . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "time zone" ) {
2017-02-28 00:00:19 +00:00
t . Fatalf ( "Enabled PeriodicConfig with bad time zone shouldn't be valid: %v" , err )
2017-02-15 22:37:06 +00:00
}
2015-12-01 00:51:56 +00:00
}
func TestPeriodicConfig_InvalidCron ( t * testing . T ) {
specs := [ ] string { "foo" , "* *" , "@foo" }
for _ , spec := range specs {
p := & PeriodicConfig { Enabled : true , SpecType : PeriodicSpecCron , Spec : spec }
2017-02-15 22:37:06 +00:00
p . Canonicalize ( )
2015-12-01 00:51:56 +00:00
if err := p . Validate ( ) ; err == nil {
t . Fatal ( "Invalid cron spec" )
}
}
}
func TestPeriodicConfig_ValidCron ( t * testing . T ) {
specs := [ ] string { "0 0 29 2 *" , "@hourly" , "0 0-15 * * *" }
for _ , spec := range specs {
p := & PeriodicConfig { Enabled : true , SpecType : PeriodicSpecCron , Spec : spec }
2017-02-15 22:37:06 +00:00
p . Canonicalize ( )
2015-12-01 00:51:56 +00:00
if err := p . Validate ( ) ; err != nil {
t . Fatal ( "Passed valid cron" )
}
}
}
func TestPeriodicConfig_NextCron ( t * testing . T ) {
from := time . Date ( 2009 , time . November , 10 , 23 , 22 , 30 , 0 , time . UTC )
specs := [ ] string { "0 0 29 2 * 1980" , "*/5 * * * *" }
2017-09-26 22:26:33 +00:00
expected := [ ] time . Time { { } , time . Date ( 2009 , time . November , 10 , 23 , 25 , 0 , 0 , time . UTC ) }
2015-12-01 00:51:56 +00:00
for i , spec := range specs {
p := & PeriodicConfig { Enabled : true , SpecType : PeriodicSpecCron , Spec : spec }
2017-02-15 22:37:06 +00:00
p . Canonicalize ( )
2015-12-01 00:51:56 +00:00
n := p . Next ( from )
if expected [ i ] != n {
t . Fatalf ( "Next(%v) returned %v; want %v" , from , n , expected [ i ] )
}
}
}
2016-02-02 22:32:30 +00:00
2017-02-15 22:37:06 +00:00
func TestPeriodicConfig_ValidTimeZone ( t * testing . T ) {
zones := [ ] string { "Africa/Abidjan" , "America/Chicago" , "Europe/Minsk" , "UTC" }
for _ , zone := range zones {
p := & PeriodicConfig { Enabled : true , SpecType : PeriodicSpecCron , Spec : "0 0 29 2 * 1980" , TimeZone : zone }
p . Canonicalize ( )
if err := p . Validate ( ) ; err != nil {
2017-02-28 00:00:19 +00:00
t . Fatalf ( "Valid tz errored: %v" , err )
2017-02-15 22:37:06 +00:00
}
}
}
func TestPeriodicConfig_DST ( t * testing . T ) {
// On Sun, Mar 12, 2:00 am 2017: +1 hour UTC
p := & PeriodicConfig {
Enabled : true ,
SpecType : PeriodicSpecCron ,
Spec : "0 2 11-12 3 * 2017" ,
TimeZone : "America/Los_Angeles" ,
}
p . Canonicalize ( )
t1 := time . Date ( 2017 , time . March , 11 , 1 , 0 , 0 , 0 , p . location )
t2 := time . Date ( 2017 , time . March , 12 , 1 , 0 , 0 , 0 , p . location )
// E1 is an 8 hour adjustment, E2 is a 7 hour adjustment
e1 := time . Date ( 2017 , time . March , 11 , 10 , 0 , 0 , 0 , time . UTC )
e2 := time . Date ( 2017 , time . March , 12 , 9 , 0 , 0 , 0 , time . UTC )
n1 := p . Next ( t1 ) . UTC ( )
n2 := p . Next ( t2 ) . UTC ( )
if ! reflect . DeepEqual ( e1 , n1 ) {
t . Fatalf ( "Got %v; want %v" , n1 , e1 )
}
if ! reflect . DeepEqual ( e2 , n2 ) {
t . Fatalf ( "Got %v; want %v" , n1 , e1 )
}
}
2016-02-02 22:32:30 +00:00
func TestRestartPolicy_Validate ( t * testing . T ) {
// Policy with acceptable restart options passes
p := & RestartPolicy {
Mode : RestartPolicyModeFail ,
Attempts : 0 ,
2017-02-13 23:27:36 +00:00
Interval : 5 * time . Second ,
2016-02-02 22:32:30 +00:00
}
if err := p . Validate ( ) ; err != nil {
t . Fatalf ( "err: %v" , err )
}
// Policy with ambiguous restart options fails
p = & RestartPolicy {
Mode : RestartPolicyModeDelay ,
Attempts : 0 ,
2017-02-13 23:27:36 +00:00
Interval : 5 * time . Second ,
2016-02-02 22:32:30 +00:00
}
if err := p . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "ambiguous" ) {
t . Fatalf ( "expect ambiguity error, got: %v" , err )
}
// Bad policy mode fails
p = & RestartPolicy {
Mode : "nope" ,
Attempts : 1 ,
2017-02-13 23:27:36 +00:00
Interval : 5 * time . Second ,
2016-02-02 22:32:30 +00:00
}
if err := p . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "mode" ) {
t . Fatalf ( "expect mode error, got: %v" , err )
}
// Fails when attempts*delay does not fit inside interval
p = & RestartPolicy {
Mode : RestartPolicyModeDelay ,
Attempts : 3 ,
Delay : 5 * time . Second ,
2017-02-13 23:27:36 +00:00
Interval : 5 * time . Second ,
2016-02-02 22:32:30 +00:00
}
if err := p . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "can't restart" ) {
t . Fatalf ( "expect restart interval error, got: %v" , err )
}
2017-02-13 23:27:36 +00:00
// Fails when interval is to small
p = & RestartPolicy {
Mode : RestartPolicyModeDelay ,
Attempts : 3 ,
Delay : 5 * time . Second ,
Interval : 2 * time . Second ,
}
if err := p . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "Interval can not be less than" ) {
t . Fatalf ( "expect interval too small error, got: %v" , err )
}
2016-02-02 22:32:30 +00:00
}
2016-03-10 02:09:51 +00:00
2018-01-14 15:03:08 +00:00
func TestReschedulePolicy_Validate ( t * testing . T ) {
type testCase struct {
ReschedulePolicy * ReschedulePolicy
err error
}
testCases := [ ] testCase {
{
2018-01-17 22:34:15 +00:00
ReschedulePolicy : & ReschedulePolicy {
Attempts : 0 ,
Interval : 0 * time . Second } ,
err : nil ,
2018-01-14 15:03:08 +00:00
} ,
{
2018-01-17 22:34:15 +00:00
ReschedulePolicy : & ReschedulePolicy {
Attempts : 1 ,
Interval : 5 * time . Minute } ,
err : nil ,
2018-01-14 15:03:08 +00:00
} ,
{
2018-01-17 22:34:15 +00:00
ReschedulePolicy : & ReschedulePolicy {
Attempts : - 1 ,
Interval : 5 * time . Minute } ,
err : nil ,
} ,
{
ReschedulePolicy : & ReschedulePolicy {
Attempts : 1 ,
Interval : 1 * time . Second } ,
err : fmt . Errorf ( "Interval cannot be less than %v (got %v)" , RestartPolicyMinInterval , time . Second ) ,
2018-01-14 15:03:08 +00:00
} ,
}
assert := assert . New ( t )
for _ , tc := range testCases {
if tc . err != nil {
assert . Contains ( tc . ReschedulePolicy . Validate ( ) . Error ( ) , tc . err . Error ( ) )
} else {
assert . Nil ( tc . err )
}
}
}
2016-03-10 02:09:51 +00:00
func TestAllocation_Index ( t * testing . T ) {
2017-05-31 18:34:46 +00:00
a1 := Allocation {
Name : "example.cache[1]" ,
TaskGroup : "cache" ,
JobID : "example" ,
Job : & Job {
ID : "example" ,
TaskGroups : [ ] * TaskGroup { { Name : "cache" } } } ,
}
e1 := uint ( 1 )
a2 := a1 . Copy ( )
a2 . Name = "example.cache[713127]"
e2 := uint ( 713127 )
2016-03-10 02:09:51 +00:00
if a1 . Index ( ) != e1 || a2 . Index ( ) != e2 {
2017-05-31 18:34:46 +00:00
t . Fatalf ( "Got %d and %d" , a1 . Index ( ) , a2 . Index ( ) )
2016-03-10 02:09:51 +00:00
}
}
2016-03-14 22:46:06 +00:00
2016-03-15 02:55:30 +00:00
func TestTaskArtifact_Validate_Source ( t * testing . T ) {
valid := & TaskArtifact { GetterSource : "google.com" }
if err := valid . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected error: %v" , err )
}
}
2016-03-18 19:01:46 +00:00
func TestTaskArtifact_Validate_Dest ( t * testing . T ) {
valid := & TaskArtifact { GetterSource : "google.com" }
if err := valid . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected error: %v" , err )
}
valid . RelativeDest = "local/"
if err := valid . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected error: %v" , err )
}
valid . RelativeDest = "local/.."
if err := valid . Validate ( ) ; err != nil {
t . Fatalf ( "unexpected error: %v" , err )
}
2016-12-18 23:48:30 +00:00
valid . RelativeDest = "local/../../.."
2016-03-18 19:01:46 +00:00
if err := valid . Validate ( ) ; err == nil {
t . Fatalf ( "expected error: %v" , err )
}
}
2016-10-03 16:59:57 +00:00
func TestAllocation_ShouldMigrate ( t * testing . T ) {
alloc := Allocation {
2017-10-12 01:08:37 +00:00
PreviousAllocation : "123" ,
TaskGroup : "foo" ,
2016-10-03 16:59:57 +00:00
Job : & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
EphemeralDisk : & EphemeralDisk {
Migrate : true ,
Sticky : true ,
} ,
} ,
} ,
} ,
}
if ! alloc . ShouldMigrate ( ) {
t . Fatalf ( "bad: %v" , alloc )
}
alloc1 := Allocation {
2017-10-12 01:08:37 +00:00
PreviousAllocation : "123" ,
TaskGroup : "foo" ,
2016-10-03 16:59:57 +00:00
Job : & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
EphemeralDisk : & EphemeralDisk { } ,
} ,
} ,
} ,
}
if alloc1 . ShouldMigrate ( ) {
t . Fatalf ( "bad: %v" , alloc )
}
alloc2 := Allocation {
2017-10-12 01:08:37 +00:00
PreviousAllocation : "123" ,
TaskGroup : "foo" ,
2016-10-03 16:59:57 +00:00
Job : & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
EphemeralDisk : & EphemeralDisk {
Sticky : false ,
Migrate : true ,
} ,
} ,
} ,
} ,
}
if alloc2 . ShouldMigrate ( ) {
t . Fatalf ( "bad: %v" , alloc )
}
2016-10-19 18:12:25 +00:00
alloc3 := Allocation {
2017-10-12 01:08:37 +00:00
PreviousAllocation : "123" ,
TaskGroup : "foo" ,
2016-10-19 18:12:25 +00:00
Job : & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
} ,
} ,
} ,
}
if alloc3 . ShouldMigrate ( ) {
t . Fatalf ( "bad: %v" , alloc )
}
2017-10-12 01:08:37 +00:00
// No previous
alloc4 := Allocation {
TaskGroup : "foo" ,
Job : & Job {
TaskGroups : [ ] * TaskGroup {
{
Name : "foo" ,
EphemeralDisk : & EphemeralDisk {
Migrate : true ,
Sticky : true ,
} ,
} ,
} ,
} ,
}
if alloc4 . ShouldMigrate ( ) {
t . Fatalf ( "bad: %v" , alloc4 )
}
2016-10-03 16:59:57 +00:00
}
2016-03-14 22:46:06 +00:00
func TestTaskArtifact_Validate_Checksum ( t * testing . T ) {
cases := [ ] struct {
Input * TaskArtifact
Err bool
} {
{
& TaskArtifact {
GetterSource : "foo.com" ,
GetterOptions : map [ string ] string {
"checksum" : "no-type" ,
} ,
} ,
true ,
} ,
{
& TaskArtifact {
GetterSource : "foo.com" ,
GetterOptions : map [ string ] string {
"checksum" : "md5:toosmall" ,
} ,
} ,
true ,
} ,
{
& TaskArtifact {
GetterSource : "foo.com" ,
GetterOptions : map [ string ] string {
"checksum" : "invalid:type" ,
} ,
} ,
true ,
} ,
}
for i , tc := range cases {
err := tc . Input . Validate ( )
if ( err != nil ) != tc . Err {
t . Fatalf ( "case %d: %v" , i , err )
continue
}
}
}
2016-08-22 16:34:24 +00:00
func TestAllocation_Terminated ( t * testing . T ) {
type desiredState struct {
ClientStatus string
DesiredStatus string
Terminated bool
}
harness := [ ] desiredState {
{
ClientStatus : AllocClientStatusPending ,
DesiredStatus : AllocDesiredStatusStop ,
Terminated : false ,
} ,
{
ClientStatus : AllocClientStatusRunning ,
DesiredStatus : AllocDesiredStatusStop ,
Terminated : false ,
} ,
{
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusStop ,
Terminated : true ,
} ,
{
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
Terminated : true ,
} ,
}
for _ , state := range harness {
alloc := Allocation { }
alloc . DesiredStatus = state . DesiredStatus
alloc . ClientStatus = state . ClientStatus
if alloc . Terminated ( ) != state . Terminated {
t . Fatalf ( "expected: %v, actual: %v" , state . Terminated , alloc . Terminated ( ) )
}
}
}
2016-10-11 22:25:49 +00:00
2018-01-14 15:03:08 +00:00
func TestAllocation_ShouldReschedule ( t * testing . T ) {
type testCase struct {
Desc string
2018-01-17 17:05:22 +00:00
FailTime time . Time
2018-01-14 15:03:08 +00:00
ClientStatus string
DesiredStatus string
ReschedulePolicy * ReschedulePolicy
2018-01-17 17:05:22 +00:00
RescheduleTrackers [ ] * RescheduleEvent
2018-01-14 15:03:08 +00:00
ShouldReschedule bool
}
2018-01-17 17:05:22 +00:00
fail := time . Now ( )
2018-01-14 15:03:08 +00:00
harness := [ ] testCase {
{
Desc : "Reschedule when desired state is stop" ,
ClientStatus : AllocClientStatusPending ,
DesiredStatus : AllocDesiredStatusStop ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : nil ,
ShouldReschedule : false ,
} ,
2018-01-17 22:34:15 +00:00
{
Desc : "Disabled recheduling" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
FailTime : fail ,
ReschedulePolicy : & ReschedulePolicy { 0 , 1 * time . Minute } ,
ShouldReschedule : false ,
} ,
2018-01-14 15:03:08 +00:00
{
Desc : "Reschedule when client status is complete" ,
ClientStatus : AllocClientStatusComplete ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : nil ,
ShouldReschedule : false ,
} ,
{
Desc : "Reschedule with nil reschedule policy" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : nil ,
ShouldReschedule : false ,
} ,
{
Desc : "Reschedule when client status is complete" ,
ClientStatus : AllocClientStatusComplete ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : nil ,
ShouldReschedule : false ,
} ,
{
Desc : "Reschedule with policy when client status complete" ,
ClientStatus : AllocClientStatusComplete ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy { 1 , 1 * time . Minute } ,
ShouldReschedule : false ,
} ,
{
Desc : "Reschedule with no previous attempts" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy { 1 , 1 * time . Minute } ,
ShouldReschedule : true ,
} ,
{
Desc : "Reschedule with leftover attempts" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
ReschedulePolicy : & ReschedulePolicy { 2 , 5 * time . Minute } ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
RescheduleTrackers : [ ] * RescheduleEvent {
2018-01-14 15:03:08 +00:00
{
2018-01-17 17:05:22 +00:00
RescheduleTime : fail . Add ( - 1 * time . Minute ) . UTC ( ) . UnixNano ( ) ,
2018-01-14 15:03:08 +00:00
} ,
} ,
ShouldReschedule : true ,
} ,
{
Desc : "Reschedule with too old previous attempts" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy { 1 , 5 * time . Minute } ,
2018-01-17 17:05:22 +00:00
RescheduleTrackers : [ ] * RescheduleEvent {
2018-01-14 15:03:08 +00:00
{
2018-01-17 17:05:22 +00:00
RescheduleTime : fail . Add ( - 6 * time . Minute ) . UTC ( ) . UnixNano ( ) ,
2018-01-14 15:03:08 +00:00
} ,
} ,
ShouldReschedule : true ,
} ,
{
Desc : "Reschedule with no leftover attempts" ,
ClientStatus : AllocClientStatusFailed ,
DesiredStatus : AllocDesiredStatusRun ,
2018-01-17 17:05:22 +00:00
FailTime : fail ,
2018-01-14 15:03:08 +00:00
ReschedulePolicy : & ReschedulePolicy { 2 , 5 * time . Minute } ,
2018-01-17 17:05:22 +00:00
RescheduleTrackers : [ ] * RescheduleEvent {
2018-01-14 15:03:08 +00:00
{
2018-01-17 17:05:22 +00:00
RescheduleTime : fail . Add ( - 3 * time . Minute ) . UTC ( ) . UnixNano ( ) ,
2018-01-14 15:03:08 +00:00
} ,
{
2018-01-17 17:05:22 +00:00
RescheduleTime : fail . Add ( - 4 * time . Minute ) . UTC ( ) . UnixNano ( ) ,
2018-01-14 15:03:08 +00:00
} ,
} ,
ShouldReschedule : false ,
} ,
}
for _ , state := range harness {
alloc := Allocation { }
alloc . DesiredStatus = state . DesiredStatus
alloc . ClientStatus = state . ClientStatus
2018-01-17 17:05:22 +00:00
alloc . RescheduleTracker = & RescheduleTracker { state . RescheduleTrackers }
2018-01-14 15:03:08 +00:00
t . Run ( state . Desc , func ( t * testing . T ) {
2018-01-17 17:05:22 +00:00
if got := alloc . ShouldReschedule ( state . ReschedulePolicy , state . FailTime ) ; got != state . ShouldReschedule {
2018-01-14 15:03:08 +00:00
t . Fatalf ( "expected %v but got %v" , state . ShouldReschedule , got )
}
} )
}
}
2018-01-17 17:44:06 +00:00
func TestRescheduleTracker_Copy ( t * testing . T ) {
type testCase struct {
original * RescheduleTracker
expected * RescheduleTracker
}
cases := [ ] testCase {
{ nil , nil } ,
{ & RescheduleTracker { Events : [ ] * RescheduleEvent {
{ 2 , "12" , "12" } ,
} } , & RescheduleTracker { Events : [ ] * RescheduleEvent {
{ 2 , "12" , "12" } ,
} } } ,
}
for _ , tc := range cases {
if got := tc . original . Copy ( ) ; ! reflect . DeepEqual ( got , tc . expected ) {
t . Fatalf ( "expected %v but got %v" , * tc . expected , * got )
}
}
}
2016-10-11 22:25:49 +00:00
func TestVault_Validate ( t * testing . T ) {
v := & Vault {
Env : true ,
ChangeMode : VaultChangeModeNoop ,
}
if err := v . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "Policy list" ) {
t . Fatalf ( "Expected policy list empty error" )
}
2017-02-13 18:51:29 +00:00
v . Policies = [ ] string { "foo" , "root" }
2016-10-11 22:25:49 +00:00
v . ChangeMode = VaultChangeModeSignal
2017-02-13 18:51:29 +00:00
err := v . Validate ( )
if err == nil {
t . Fatalf ( "Expected validation errors" )
}
if ! strings . Contains ( err . Error ( ) , "Signal must" ) {
2016-10-11 22:25:49 +00:00
t . Fatalf ( "Expected signal empty error" )
}
2017-02-13 18:51:29 +00:00
if ! strings . Contains ( err . Error ( ) , "root" ) {
t . Fatalf ( "Expected root error" )
}
2016-10-11 22:25:49 +00:00
}
2016-11-23 22:56:50 +00:00
2017-01-20 18:33:52 +00:00
func TestParameterizedJobConfig_Validate ( t * testing . T ) {
d := & ParameterizedJobConfig {
2016-12-14 22:51:28 +00:00
Payload : "foo" ,
2016-11-23 22:56:50 +00:00
}
2016-12-14 22:51:28 +00:00
if err := d . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "payload" ) {
t . Fatalf ( "Expected unknown payload requirement: %v" , err )
2016-11-23 22:56:50 +00:00
}
2016-12-14 22:51:28 +00:00
d . Payload = DispatchPayloadOptional
2016-11-23 22:56:50 +00:00
d . MetaOptional = [ ] string { "foo" , "bar" }
d . MetaRequired = [ ] string { "bar" , "baz" }
if err := d . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "disjoint" ) {
t . Fatalf ( "Expected meta not being disjoint error: %v" , err )
}
}
2017-01-20 18:33:52 +00:00
func TestParameterizedJobConfig_Validate_NonBatch ( t * testing . T ) {
2016-12-16 23:20:12 +00:00
job := testJob ( )
2017-01-20 18:33:52 +00:00
job . ParameterizedJob = & ParameterizedJobConfig {
2016-12-16 23:20:12 +00:00
Payload : DispatchPayloadOptional ,
}
job . Type = JobTypeSystem
if err := job . Validate ( ) ; err == nil || ! strings . Contains ( err . Error ( ) , "only be used with" ) {
t . Fatalf ( "Expected bad scheduler tpye: %v" , err )
}
}
2017-01-20 18:33:52 +00:00
func TestParameterizedJobConfig_Canonicalize ( t * testing . T ) {
d := & ParameterizedJobConfig { }
2016-11-23 22:56:50 +00:00
d . Canonicalize ( )
2016-12-14 22:51:28 +00:00
if d . Payload != DispatchPayloadOptional {
2016-11-23 22:56:50 +00:00
t . Fatalf ( "Canonicalize failed" )
}
}
2016-12-18 23:48:30 +00:00
2017-01-26 05:06:16 +00:00
func TestDispatchPayloadConfig_Validate ( t * testing . T ) {
d := & DispatchPayloadConfig {
2016-12-18 23:48:30 +00:00
File : "foo" ,
}
// task/local/haha
if err := d . Validate ( ) ; err != nil {
t . Fatalf ( "bad: %v" , err )
}
// task/haha
d . File = "../haha"
if err := d . Validate ( ) ; err != nil {
t . Fatalf ( "bad: %v" , err )
}
// ../haha
d . File = "../../../haha"
if err := d . Validate ( ) ; err == nil {
t . Fatalf ( "bad: %v" , err )
}
}
2017-01-14 00:46:08 +00:00
func TestIsRecoverable ( t * testing . T ) {
if IsRecoverable ( nil ) {
t . Errorf ( "nil should not be recoverable" )
}
if IsRecoverable ( NewRecoverableError ( nil , true ) ) {
t . Errorf ( "NewRecoverableError(nil, true) should not be recoverable" )
}
if IsRecoverable ( fmt . Errorf ( "i promise im recoverable" ) ) {
t . Errorf ( "Custom errors should not be recoverable" )
}
if IsRecoverable ( NewRecoverableError ( fmt . Errorf ( "" ) , false ) ) {
t . Errorf ( "Explicitly unrecoverable errors should not be recoverable" )
}
if ! IsRecoverable ( NewRecoverableError ( fmt . Errorf ( "" ) , true ) ) {
t . Errorf ( "Explicitly recoverable errors *should* be recoverable" )
}
}
2017-08-12 21:36:10 +00:00
func TestACLTokenValidate ( t * testing . T ) {
tk := & ACLToken { }
// Mising a type
err := tk . Validate ( )
assert . NotNil ( t , err )
if ! strings . Contains ( err . Error ( ) , "client or management" ) {
t . Fatalf ( "bad: %v" , err )
}
// Missing policies
tk . Type = ACLClientToken
err = tk . Validate ( )
assert . NotNil ( t , err )
if ! strings . Contains ( err . Error ( ) , "missing policies" ) {
t . Fatalf ( "bad: %v" , err )
}
// Invalid policices
tk . Type = ACLManagementToken
tk . Policies = [ ] string { "foo" }
err = tk . Validate ( )
assert . NotNil ( t , err )
if ! strings . Contains ( err . Error ( ) , "associated with policies" ) {
t . Fatalf ( "bad: %v" , err )
}
// Name too long policices
2017-09-29 16:58:48 +00:00
tk . Name = uuid . Generate ( ) + uuid . Generate ( )
2017-08-12 21:36:10 +00:00
tk . Policies = nil
err = tk . Validate ( )
assert . NotNil ( t , err )
if ! strings . Contains ( err . Error ( ) , "too long" ) {
t . Fatalf ( "bad: %v" , err )
}
// Make it valid
tk . Name = "foo"
err = tk . Validate ( )
assert . Nil ( t , err )
}
2017-08-22 00:45:11 +00:00
func TestACLTokenPolicySubset ( t * testing . T ) {
tk := & ACLToken {
Type : ACLClientToken ,
Policies : [ ] string { "foo" , "bar" , "baz" } ,
}
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" , "bar" , "baz" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" , "bar" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { } ) )
assert . Equal ( t , false , tk . PolicySubset ( [ ] string { "foo" , "bar" , "new" } ) )
assert . Equal ( t , false , tk . PolicySubset ( [ ] string { "new" } ) )
tk = & ACLToken {
Type : ACLManagementToken ,
}
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" , "bar" , "baz" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" , "bar" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "foo" , "bar" , "new" } ) )
assert . Equal ( t , true , tk . PolicySubset ( [ ] string { "new" } ) )
}
2017-08-30 16:58:42 +00:00
func TestACLTokenSetHash ( t * testing . T ) {
tk := & ACLToken {
Name : "foo" ,
Type : ACLClientToken ,
Policies : [ ] string { "foo" , "bar" } ,
Global : false ,
}
out1 := tk . SetHash ( )
assert . NotNil ( t , out1 )
assert . NotNil ( t , tk . Hash )
assert . Equal ( t , out1 , tk . Hash )
tk . Policies = [ ] string { "foo" }
out2 := tk . SetHash ( )
assert . NotNil ( t , out2 )
assert . NotNil ( t , tk . Hash )
assert . Equal ( t , out2 , tk . Hash )
assert . NotEqual ( t , out1 , out2 )
}
func TestACLPolicySetHash ( t * testing . T ) {
ap := & ACLPolicy {
Name : "foo" ,
Description : "great policy" ,
Rules : "node { policy = \"read\" }" ,
}
out1 := ap . SetHash ( )
assert . NotNil ( t , out1 )
assert . NotNil ( t , ap . Hash )
assert . Equal ( t , out1 , ap . Hash )
ap . Rules = "node { policy = \"write\" }"
out2 := ap . SetHash ( )
assert . NotNil ( t , out2 )
assert . NotNil ( t , ap . Hash )
assert . Equal ( t , out2 , ap . Hash )
assert . NotEqual ( t , out1 , out2 )
}
2017-10-31 20:00:23 +00:00
func TestTaskEventPopulate ( t * testing . T ) {
2017-11-13 17:14:57 +00:00
prepopulatedEvent := NewTaskEvent ( TaskSetup )
prepopulatedEvent . DisplayMessage = "Hola"
2017-10-31 20:00:23 +00:00
testcases := [ ] struct {
event * TaskEvent
expectedMsg string
} {
{ nil , "" } ,
2017-11-13 17:14:57 +00:00
{ prepopulatedEvent , "Hola" } ,
{ NewTaskEvent ( TaskSetup ) . SetMessage ( "Setup" ) , "Setup" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskStarted ) , "Task started by client" } ,
{ NewTaskEvent ( TaskReceived ) , "Task received by client" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskFailedValidation ) , "Validation of task failed" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskFailedValidation ) . SetValidationError ( fmt . Errorf ( "task failed validation" ) ) , "task failed validation" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskSetupFailure ) , "Task setup failed" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskSetupFailure ) . SetSetupError ( fmt . Errorf ( "task failed setup" ) ) , "task failed setup" } ,
{ NewTaskEvent ( TaskDriverFailure ) , "Failed to start task" } ,
{ NewTaskEvent ( TaskDownloadingArtifacts ) , "Client is downloading artifacts" } ,
{ NewTaskEvent ( TaskArtifactDownloadFailed ) , "Failed to download artifacts" } ,
{ NewTaskEvent ( TaskArtifactDownloadFailed ) . SetDownloadError ( fmt . Errorf ( "connection reset by peer" ) ) , "connection reset by peer" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskRestarting ) . SetRestartDelay ( 2 * time . Second ) . SetRestartReason ( ReasonWithinPolicy ) , "Task restarting in 2s" } ,
{ NewTaskEvent ( TaskRestarting ) . SetRestartReason ( "Chaos Monkey did it" ) , "Chaos Monkey did it - Task restarting in 0s" } ,
{ NewTaskEvent ( TaskKilling ) , "Sent interrupt" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskKilling ) . SetKillReason ( "Its time for you to die" ) , "Killing task: Its time for you to die" } ,
{ NewTaskEvent ( TaskKilling ) . SetKillTimeout ( 1 * time . Second ) , "Sent interrupt. Waiting 1s before force killing" } ,
{ NewTaskEvent ( TaskTerminated ) . SetExitCode ( - 1 ) . SetSignal ( 3 ) , "Exit Code: -1, Signal: 3" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskTerminated ) . SetMessage ( "Goodbye" ) , "Exit Code: 0, Exit Message: \"Goodbye\"" } ,
{ NewTaskEvent ( TaskKilled ) , "Task successfully killed" } ,
{ NewTaskEvent ( TaskKilled ) . SetKillError ( fmt . Errorf ( "undead creatures can't be killed" ) ) , "undead creatures can't be killed" } ,
{ NewTaskEvent ( TaskNotRestarting ) . SetRestartReason ( "Chaos Monkey did it" ) , "Chaos Monkey did it" } ,
{ NewTaskEvent ( TaskNotRestarting ) , "Task exceeded restart policy" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskLeaderDead ) , "Leader Task in Group dead" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskSiblingFailed ) , "Task's sibling failed" } ,
2017-10-31 20:00:23 +00:00
{ NewTaskEvent ( TaskSiblingFailed ) . SetFailedSibling ( "patient zero" ) , "Task's sibling \"patient zero\" failed" } ,
2017-11-13 17:14:57 +00:00
{ NewTaskEvent ( TaskSignaling ) , "Task being sent a signal" } ,
{ NewTaskEvent ( TaskSignaling ) . SetTaskSignal ( os . Interrupt ) , "Task being sent signal interrupt" } ,
{ NewTaskEvent ( TaskSignaling ) . SetTaskSignal ( os . Interrupt ) . SetTaskSignalReason ( "process interrupted" ) , "Task being sent signal interrupt: process interrupted" } ,
{ NewTaskEvent ( TaskRestartSignal ) , "Task signaled to restart" } ,
{ NewTaskEvent ( TaskRestartSignal ) . SetRestartReason ( "Chaos Monkey restarted it" ) , "Chaos Monkey restarted it" } ,
{ NewTaskEvent ( TaskDriverMessage ) . SetDriverMessage ( "YOLO" ) , "YOLO" } ,
{ NewTaskEvent ( "Unknown Type, No message" ) , "" } ,
{ NewTaskEvent ( "Unknown Type" ) . SetMessage ( "Hello world" ) , "Hello world" } ,
2017-10-31 20:00:23 +00:00
}
for _ , tc := range testcases {
tc . event . PopulateEventDisplayMessage ( )
if tc . event != nil && tc . event . DisplayMessage != tc . expectedMsg {
t . Fatalf ( "Expected %v but got %v" , tc . expectedMsg , tc . event . DisplayMessage )
}
}
}