2015-09-10 04:42:50 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2015-09-10 05:11:48 +00:00
|
|
|
"io/ioutil"
|
2016-11-09 19:55:10 +00:00
|
|
|
"net"
|
2015-09-10 05:11:48 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2015-09-10 04:42:50 +00:00
|
|
|
"reflect"
|
|
|
|
"testing"
|
2015-12-02 19:55:29 +00:00
|
|
|
"time"
|
2015-09-10 18:24:59 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2016-08-06 01:13:06 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs/config"
|
2015-09-10 04:42:50 +00:00
|
|
|
)
|
|
|
|
|
2016-10-11 01:04:39 +00:00
|
|
|
var (
|
|
|
|
// trueValue/falseValue are used to get a pointer to a boolean
|
|
|
|
trueValue = true
|
|
|
|
falseValue = false
|
|
|
|
)
|
|
|
|
|
2015-09-10 04:42:50 +00:00
|
|
|
func TestConfig_Merge(t *testing.T) {
|
2017-02-03 16:05:35 +00:00
|
|
|
c0 := &Config{}
|
|
|
|
|
2015-09-10 04:42:50 +00:00
|
|
|
c1 := &Config{
|
2017-02-03 16:05:35 +00:00
|
|
|
Telemetry: &Telemetry{},
|
|
|
|
Client: &ClientConfig{},
|
|
|
|
Server: &ServerConfig{},
|
|
|
|
Ports: &Ports{},
|
|
|
|
Addresses: &Addresses{},
|
|
|
|
AdvertiseAddrs: &AdvertiseAddrs{},
|
|
|
|
Atlas: &AtlasConfig{},
|
|
|
|
Vault: &config.VaultConfig{},
|
|
|
|
Consul: &config.ConsulConfig{},
|
|
|
|
}
|
|
|
|
|
|
|
|
c2 := &Config{
|
2015-09-14 01:18:40 +00:00
|
|
|
Region: "global",
|
2015-09-10 04:42:50 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
NodeName: "node1",
|
|
|
|
DataDir: "/tmp/dir1",
|
|
|
|
LogLevel: "INFO",
|
|
|
|
EnableDebug: false,
|
|
|
|
LeaveOnInt: false,
|
|
|
|
LeaveOnTerm: false,
|
|
|
|
EnableSyslog: false,
|
|
|
|
SyslogFacility: "local0.info",
|
|
|
|
DisableUpdateCheck: false,
|
|
|
|
DisableAnonymousSignature: false,
|
2015-09-11 02:04:06 +00:00
|
|
|
BindAddr: "127.0.0.1",
|
2015-09-10 18:24:59 +00:00
|
|
|
Telemetry: &Telemetry{
|
2016-07-22 16:33:10 +00:00
|
|
|
StatsiteAddr: "127.0.0.1:8125",
|
|
|
|
StatsdAddr: "127.0.0.1:8125",
|
2016-10-15 08:49:33 +00:00
|
|
|
DataDogAddr: "127.0.0.1:8125",
|
2016-07-22 16:33:10 +00:00
|
|
|
DisableHostname: false,
|
|
|
|
CirconusAPIToken: "0",
|
|
|
|
CirconusAPIApp: "nomadic",
|
|
|
|
CirconusAPIURL: "http://api.circonus.com/v2",
|
|
|
|
CirconusSubmissionInterval: "60s",
|
|
|
|
CirconusCheckSubmissionURL: "https://someplace.com/metrics",
|
|
|
|
CirconusCheckID: "0",
|
|
|
|
CirconusCheckForceMetricActivation: "true",
|
|
|
|
CirconusCheckInstanceID: "node1:nomadic",
|
|
|
|
CirconusCheckSearchTag: "service:nomadic",
|
2016-11-09 20:12:30 +00:00
|
|
|
CirconusCheckDisplayName: "node1:nomadic",
|
|
|
|
CirconusCheckTags: "cat1:tag1,cat2:tag2",
|
2016-07-22 16:33:10 +00:00
|
|
|
CirconusBrokerID: "0",
|
|
|
|
CirconusBrokerSelectTag: "dc:dc1",
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
|
|
|
Client: &ClientConfig{
|
|
|
|
Enabled: false,
|
|
|
|
StateDir: "/tmp/state1",
|
|
|
|
AllocDir: "/tmp/alloc1",
|
|
|
|
NodeClass: "class1",
|
2015-10-03 00:02:32 +00:00
|
|
|
Options: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
2015-12-23 00:10:30 +00:00
|
|
|
NetworkSpeed: 100,
|
2017-03-14 19:56:31 +00:00
|
|
|
CpuCompute: 100,
|
2015-12-23 00:10:30 +00:00
|
|
|
MaxKillTimeout: "20s",
|
2016-03-12 02:24:58 +00:00
|
|
|
ClientMaxPort: 19996,
|
|
|
|
Reserved: &Resources{
|
2016-03-12 03:02:44 +00:00
|
|
|
CPU: 10,
|
|
|
|
MemoryMB: 10,
|
|
|
|
DiskMB: 10,
|
|
|
|
IOPS: 10,
|
|
|
|
ReservedPorts: "1,10-30,55",
|
|
|
|
ParsedReservedPorts: []int{1, 2, 4},
|
2016-03-12 02:24:58 +00:00
|
|
|
},
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
|
|
|
Server: &ServerConfig{
|
|
|
|
Enabled: false,
|
|
|
|
BootstrapExpect: 1,
|
|
|
|
DataDir: "/tmp/data1",
|
|
|
|
ProtocolVersion: 1,
|
|
|
|
NumSchedulers: 1,
|
2015-10-29 13:47:06 +00:00
|
|
|
NodeGCThreshold: "1h",
|
2016-03-04 23:44:12 +00:00
|
|
|
HeartbeatGrace: "30s",
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
2015-09-11 02:04:06 +00:00
|
|
|
Ports: &Ports{
|
|
|
|
HTTP: 4646,
|
|
|
|
RPC: 4647,
|
|
|
|
Serf: 4648,
|
|
|
|
},
|
|
|
|
Addresses: &Addresses{
|
|
|
|
HTTP: "127.0.0.1",
|
|
|
|
RPC: "127.0.0.1",
|
|
|
|
Serf: "127.0.0.1",
|
|
|
|
},
|
|
|
|
AdvertiseAddrs: &AdvertiseAddrs{
|
|
|
|
RPC: "127.0.0.1",
|
|
|
|
Serf: "127.0.0.1",
|
|
|
|
},
|
2015-11-30 23:21:50 +00:00
|
|
|
Atlas: &AtlasConfig{
|
|
|
|
Infrastructure: "hashicorp/test1",
|
|
|
|
Token: "abc",
|
|
|
|
Join: false,
|
|
|
|
Endpoint: "foo",
|
|
|
|
},
|
2016-05-17 03:57:54 +00:00
|
|
|
HTTPAPIResponseHeaders: map[string]string{
|
|
|
|
"Access-Control-Allow-Origin": "*",
|
|
|
|
},
|
2016-08-06 01:13:06 +00:00
|
|
|
Vault: &config.VaultConfig{
|
2016-08-13 04:59:31 +00:00
|
|
|
Token: "1",
|
2016-10-11 01:04:39 +00:00
|
|
|
AllowUnauthenticated: &falseValue,
|
2016-08-13 04:59:31 +00:00
|
|
|
TaskTokenTTL: "1",
|
2016-08-06 01:13:06 +00:00
|
|
|
Addr: "1",
|
2016-08-08 22:16:40 +00:00
|
|
|
TLSCaFile: "1",
|
|
|
|
TLSCaPath: "1",
|
|
|
|
TLSCertFile: "1",
|
|
|
|
TLSKeyFile: "1",
|
2016-10-11 01:04:39 +00:00
|
|
|
TLSSkipVerify: &falseValue,
|
2016-08-06 01:13:06 +00:00
|
|
|
TLSServerName: "1",
|
|
|
|
},
|
|
|
|
Consul: &config.ConsulConfig{
|
2017-02-02 19:12:07 +00:00
|
|
|
ServerServiceName: "1",
|
|
|
|
ClientServiceName: "1",
|
|
|
|
AutoAdvertise: &falseValue,
|
|
|
|
Addr: "1",
|
|
|
|
Timeout: 1 * time.Second,
|
|
|
|
Token: "1",
|
|
|
|
Auth: "1",
|
|
|
|
EnableSSL: &falseValue,
|
|
|
|
VerifySSL: &falseValue,
|
|
|
|
CAFile: "1",
|
|
|
|
CertFile: "1",
|
|
|
|
KeyFile: "1",
|
|
|
|
ServerAutoJoin: &falseValue,
|
|
|
|
ClientAutoJoin: &falseValue,
|
|
|
|
ChecksUseAdvertise: &falseValue,
|
2016-08-06 01:13:06 +00:00
|
|
|
},
|
2015-09-10 04:42:50 +00:00
|
|
|
}
|
|
|
|
|
2017-02-03 16:05:35 +00:00
|
|
|
c3 := &Config{
|
2015-09-10 04:42:50 +00:00
|
|
|
Region: "region2",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
NodeName: "node2",
|
|
|
|
DataDir: "/tmp/dir2",
|
|
|
|
LogLevel: "DEBUG",
|
|
|
|
EnableDebug: true,
|
|
|
|
LeaveOnInt: true,
|
|
|
|
LeaveOnTerm: true,
|
|
|
|
EnableSyslog: true,
|
|
|
|
SyslogFacility: "local0.debug",
|
|
|
|
DisableUpdateCheck: true,
|
|
|
|
DisableAnonymousSignature: true,
|
2015-09-11 02:04:06 +00:00
|
|
|
BindAddr: "127.0.0.2",
|
2015-09-10 18:24:59 +00:00
|
|
|
Telemetry: &Telemetry{
|
2016-07-22 16:33:10 +00:00
|
|
|
StatsiteAddr: "127.0.0.2:8125",
|
|
|
|
StatsdAddr: "127.0.0.2:8125",
|
2016-10-15 08:49:33 +00:00
|
|
|
DataDogAddr: "127.0.0.1:8125",
|
2016-07-22 16:33:10 +00:00
|
|
|
DisableHostname: true,
|
2016-08-31 18:45:46 +00:00
|
|
|
PublishNodeMetrics: true,
|
|
|
|
PublishAllocationMetrics: true,
|
2016-07-22 16:33:10 +00:00
|
|
|
CirconusAPIToken: "1",
|
|
|
|
CirconusAPIApp: "nomad",
|
|
|
|
CirconusAPIURL: "https://api.circonus.com/v2",
|
|
|
|
CirconusSubmissionInterval: "10s",
|
|
|
|
CirconusCheckSubmissionURL: "https://example.com/metrics",
|
|
|
|
CirconusCheckID: "1",
|
|
|
|
CirconusCheckForceMetricActivation: "false",
|
|
|
|
CirconusCheckInstanceID: "node2:nomad",
|
|
|
|
CirconusCheckSearchTag: "service:nomad",
|
2016-11-09 20:12:30 +00:00
|
|
|
CirconusCheckDisplayName: "node2:nomad",
|
|
|
|
CirconusCheckTags: "cat1:tag1,cat2:tag2",
|
2016-07-22 16:33:10 +00:00
|
|
|
CirconusBrokerID: "1",
|
|
|
|
CirconusBrokerSelectTag: "dc:dc2",
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
|
|
|
Client: &ClientConfig{
|
|
|
|
Enabled: true,
|
|
|
|
StateDir: "/tmp/state2",
|
|
|
|
AllocDir: "/tmp/alloc2",
|
|
|
|
NodeClass: "class2",
|
|
|
|
Servers: []string{"server2"},
|
2015-10-03 00:02:32 +00:00
|
|
|
Meta: map[string]string{
|
|
|
|
"baz": "zip",
|
|
|
|
},
|
|
|
|
Options: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"baz": "zip",
|
|
|
|
},
|
2016-08-07 06:00:00 +00:00
|
|
|
ChrootEnv: map[string]string{},
|
2016-02-09 00:27:31 +00:00
|
|
|
ClientMaxPort: 20000,
|
|
|
|
ClientMinPort: 22000,
|
2015-12-23 00:10:30 +00:00
|
|
|
NetworkSpeed: 105,
|
2017-03-14 19:56:31 +00:00
|
|
|
CpuCompute: 105,
|
2015-12-23 00:10:30 +00:00
|
|
|
MaxKillTimeout: "50s",
|
2016-03-12 02:24:58 +00:00
|
|
|
Reserved: &Resources{
|
2016-03-12 03:02:44 +00:00
|
|
|
CPU: 15,
|
|
|
|
MemoryMB: 15,
|
|
|
|
DiskMB: 15,
|
|
|
|
IOPS: 15,
|
|
|
|
ReservedPorts: "2,10-30,55",
|
|
|
|
ParsedReservedPorts: []int{1, 2, 3},
|
2016-03-12 02:24:58 +00:00
|
|
|
},
|
2017-02-01 23:58:21 +00:00
|
|
|
GCInterval: 6 * time.Second,
|
2017-03-11 00:27:00 +00:00
|
|
|
GCParallelDestroys: 6,
|
2017-02-01 23:58:21 +00:00
|
|
|
GCDiskUsageThreshold: 71,
|
|
|
|
GCInodeUsageThreshold: 86,
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
|
|
|
Server: &ServerConfig{
|
|
|
|
Enabled: true,
|
|
|
|
BootstrapExpect: 2,
|
|
|
|
DataDir: "/tmp/data2",
|
|
|
|
ProtocolVersion: 2,
|
|
|
|
NumSchedulers: 2,
|
|
|
|
EnabledSchedulers: []string{structs.JobTypeBatch},
|
2015-10-29 13:47:06 +00:00
|
|
|
NodeGCThreshold: "12h",
|
2016-03-04 23:44:12 +00:00
|
|
|
HeartbeatGrace: "2m",
|
2015-12-02 19:55:29 +00:00
|
|
|
RejoinAfterLeave: true,
|
|
|
|
StartJoin: []string{"1.1.1.1"},
|
|
|
|
RetryJoin: []string{"1.1.1.1"},
|
|
|
|
RetryInterval: "10s",
|
|
|
|
retryInterval: time.Second * 10,
|
2015-09-10 18:24:59 +00:00
|
|
|
},
|
2015-09-11 02:04:06 +00:00
|
|
|
Ports: &Ports{
|
|
|
|
HTTP: 20000,
|
|
|
|
RPC: 21000,
|
|
|
|
Serf: 22000,
|
|
|
|
},
|
|
|
|
Addresses: &Addresses{
|
|
|
|
HTTP: "127.0.0.2",
|
|
|
|
RPC: "127.0.0.2",
|
|
|
|
Serf: "127.0.0.2",
|
|
|
|
},
|
|
|
|
AdvertiseAddrs: &AdvertiseAddrs{
|
|
|
|
RPC: "127.0.0.2",
|
|
|
|
Serf: "127.0.0.2",
|
|
|
|
},
|
2015-11-30 23:21:50 +00:00
|
|
|
Atlas: &AtlasConfig{
|
|
|
|
Infrastructure: "hashicorp/test2",
|
|
|
|
Token: "xyz",
|
|
|
|
Join: true,
|
|
|
|
Endpoint: "bar",
|
|
|
|
},
|
2016-05-17 03:57:54 +00:00
|
|
|
HTTPAPIResponseHeaders: map[string]string{
|
|
|
|
"Access-Control-Allow-Origin": "*",
|
|
|
|
"Access-Control-Allow-Methods": "GET, POST, OPTIONS",
|
|
|
|
},
|
2016-08-06 01:13:06 +00:00
|
|
|
Vault: &config.VaultConfig{
|
2016-08-13 04:59:31 +00:00
|
|
|
Token: "2",
|
2016-10-11 01:04:39 +00:00
|
|
|
AllowUnauthenticated: &trueValue,
|
2016-08-13 04:59:31 +00:00
|
|
|
TaskTokenTTL: "2",
|
2016-08-06 01:13:06 +00:00
|
|
|
Addr: "2",
|
2016-08-08 22:16:40 +00:00
|
|
|
TLSCaFile: "2",
|
|
|
|
TLSCaPath: "2",
|
|
|
|
TLSCertFile: "2",
|
|
|
|
TLSKeyFile: "2",
|
2016-10-11 01:04:39 +00:00
|
|
|
TLSSkipVerify: &trueValue,
|
2016-08-06 01:13:06 +00:00
|
|
|
TLSServerName: "2",
|
|
|
|
},
|
|
|
|
Consul: &config.ConsulConfig{
|
2017-02-02 19:12:07 +00:00
|
|
|
ServerServiceName: "2",
|
|
|
|
ClientServiceName: "2",
|
|
|
|
AutoAdvertise: &trueValue,
|
|
|
|
Addr: "2",
|
|
|
|
Timeout: 2 * time.Second,
|
|
|
|
Token: "2",
|
|
|
|
Auth: "2",
|
|
|
|
EnableSSL: &trueValue,
|
|
|
|
VerifySSL: &trueValue,
|
|
|
|
CAFile: "2",
|
|
|
|
CertFile: "2",
|
|
|
|
KeyFile: "2",
|
|
|
|
ServerAutoJoin: &trueValue,
|
|
|
|
ClientAutoJoin: &trueValue,
|
|
|
|
ChecksUseAdvertise: &trueValue,
|
2016-08-06 01:13:06 +00:00
|
|
|
},
|
2015-09-10 04:42:50 +00:00
|
|
|
}
|
|
|
|
|
2017-02-03 16:05:35 +00:00
|
|
|
result := c0.Merge(c1)
|
|
|
|
result = result.Merge(c2)
|
|
|
|
result = result.Merge(c3)
|
|
|
|
if !reflect.DeepEqual(result, c3) {
|
|
|
|
t.Fatalf("bad:\n%#v\n%#v", result, c3)
|
2015-09-10 04:42:50 +00:00
|
|
|
}
|
|
|
|
}
|
2015-09-10 05:11:48 +00:00
|
|
|
|
2016-03-12 02:24:58 +00:00
|
|
|
func TestConfig_ParseConfigFile(t *testing.T) {
|
2015-09-10 05:11:48 +00:00
|
|
|
// Fails if the file doesn't exist
|
2016-03-12 02:24:58 +00:00
|
|
|
if _, err := ParseConfigFile("/unicorns/leprechauns"); err == nil {
|
2015-09-10 05:11:48 +00:00
|
|
|
t.Fatalf("expected error, got nothing")
|
|
|
|
}
|
|
|
|
|
|
|
|
fh, err := ioutil.TempFile("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(fh.Name())
|
|
|
|
|
|
|
|
// Invalid content returns error
|
2015-11-09 19:49:27 +00:00
|
|
|
if _, err := fh.WriteString("nope;!!!"); err != nil {
|
2015-09-10 05:11:48 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2016-03-12 02:24:58 +00:00
|
|
|
if _, err := ParseConfigFile(fh.Name()); err == nil {
|
2015-09-10 05:11:48 +00:00
|
|
|
t.Fatalf("expected load error, got nothing")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Valid content parses successfully
|
|
|
|
if err := fh.Truncate(0); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if _, err := fh.Seek(0, 0); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if _, err := fh.WriteString(`{"region":"west"}`); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-03-12 02:24:58 +00:00
|
|
|
config, err := ParseConfigFile(fh.Name())
|
2015-09-10 05:11:48 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Region != "west" {
|
|
|
|
t.Fatalf("bad region: %q", config.Region)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfig_LoadConfigDir(t *testing.T) {
|
|
|
|
// Fails if the dir doesn't exist.
|
|
|
|
if _, err := LoadConfigDir("/unicorns/leprechauns"); err == nil {
|
|
|
|
t.Fatalf("expected error, got nothing")
|
|
|
|
}
|
|
|
|
|
|
|
|
dir, err := ioutil.TempDir("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
2015-09-29 22:07:41 +00:00
|
|
|
// Returns empty config on empty dir
|
|
|
|
config, err := LoadConfig(dir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config == nil {
|
|
|
|
t.Fatalf("should not be nil")
|
|
|
|
}
|
|
|
|
|
2015-09-10 05:11:48 +00:00
|
|
|
file1 := filepath.Join(dir, "conf1.hcl")
|
|
|
|
err = ioutil.WriteFile(file1, []byte(`{"region":"west"}`), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
file2 := filepath.Join(dir, "conf2.hcl")
|
|
|
|
err = ioutil.WriteFile(file2, []byte(`{"datacenter":"sfo"}`), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
file3 := filepath.Join(dir, "conf3.hcl")
|
2015-11-09 19:49:27 +00:00
|
|
|
err = ioutil.WriteFile(file3, []byte(`nope;!!!`), 0600)
|
2015-09-10 05:11:48 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fails if we have a bad config file
|
|
|
|
if _, err := LoadConfigDir(dir); err == nil {
|
|
|
|
t.Fatalf("expected load error, got nothing")
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := os.Remove(file3); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Works if configs are valid
|
2015-09-29 22:07:41 +00:00
|
|
|
config, err = LoadConfigDir(dir)
|
2015-09-10 05:11:48 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Region != "west" || config.Datacenter != "sfo" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfig_LoadConfig(t *testing.T) {
|
|
|
|
// Fails if the target doesn't exist
|
|
|
|
if _, err := LoadConfig("/unicorns/leprechauns"); err == nil {
|
|
|
|
t.Fatalf("expected error, got nothing")
|
|
|
|
}
|
|
|
|
|
|
|
|
fh, err := ioutil.TempFile("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.Remove(fh.Name())
|
|
|
|
|
|
|
|
if _, err := fh.WriteString(`{"region":"west"}`); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Works on a config file
|
|
|
|
config, err := LoadConfig(fh.Name())
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Region != "west" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-12-05 00:52:17 +00:00
|
|
|
expectedConfigFiles := []string{fh.Name()}
|
2015-12-05 00:59:04 +00:00
|
|
|
if !reflect.DeepEqual(config.Files, expectedConfigFiles) {
|
2015-12-05 00:52:17 +00:00
|
|
|
t.Errorf("Loaded configs don't match\nExpected\n%+vGot\n%+v\n",
|
2015-12-05 00:59:04 +00:00
|
|
|
expectedConfigFiles, config.Files)
|
2015-12-05 00:52:17 +00:00
|
|
|
}
|
|
|
|
|
2015-09-10 05:11:48 +00:00
|
|
|
dir, err := ioutil.TempDir("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
|
|
|
file1 := filepath.Join(dir, "config1.hcl")
|
|
|
|
err = ioutil.WriteFile(file1, []byte(`{"datacenter":"sfo"}`), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Works on config dir
|
|
|
|
config, err = LoadConfig(dir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Datacenter != "sfo" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-12-05 00:52:17 +00:00
|
|
|
|
|
|
|
expectedConfigFiles = []string{file1}
|
2015-12-05 00:59:04 +00:00
|
|
|
if !reflect.DeepEqual(config.Files, expectedConfigFiles) {
|
2015-12-05 00:52:17 +00:00
|
|
|
t.Errorf("Loaded configs don't match\nExpected\n%+vGot\n%+v\n",
|
2015-12-05 00:59:04 +00:00
|
|
|
expectedConfigFiles, config.Files)
|
2015-12-05 00:52:17 +00:00
|
|
|
}
|
2015-12-05 01:12:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfig_LoadConfigsFileOrder(t *testing.T) {
|
|
|
|
config1, err := LoadConfigDir("test-resources/etcnomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to load config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config2, err := LoadConfig("test-resources/myconf")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to load config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expected := []string{
|
2015-12-10 20:22:31 +00:00
|
|
|
// filepath.FromSlash changes these to backslash \ on Windows
|
|
|
|
filepath.FromSlash("test-resources/etcnomad/common.hcl"),
|
|
|
|
filepath.FromSlash("test-resources/etcnomad/server.json"),
|
|
|
|
filepath.FromSlash("test-resources/myconf"),
|
2015-12-05 01:12:47 +00:00
|
|
|
}
|
2015-12-05 00:52:17 +00:00
|
|
|
|
2015-12-05 01:12:47 +00:00
|
|
|
config := config1.Merge(config2)
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(config.Files, expected) {
|
2015-12-14 19:59:19 +00:00
|
|
|
t.Errorf("Loaded configs don't match\nwant: %+v\n got: %+v\n",
|
2015-12-05 01:12:47 +00:00
|
|
|
expected, config.Files)
|
|
|
|
}
|
2015-09-10 05:11:48 +00:00
|
|
|
}
|
2015-09-11 02:15:17 +00:00
|
|
|
|
|
|
|
func TestConfig_Listener(t *testing.T) {
|
|
|
|
config := DefaultConfig()
|
|
|
|
|
|
|
|
// Fails on invalid input
|
2015-12-02 18:59:27 +00:00
|
|
|
if ln, err := config.Listener("tcp", "nope", 8080); err == nil {
|
|
|
|
ln.Close()
|
2015-09-11 02:15:17 +00:00
|
|
|
t.Fatalf("expected addr error")
|
|
|
|
}
|
2015-12-02 18:59:27 +00:00
|
|
|
if ln, err := config.Listener("nope", "127.0.0.1", 8080); err == nil {
|
|
|
|
ln.Close()
|
2015-09-11 02:15:17 +00:00
|
|
|
t.Fatalf("expected protocol err")
|
|
|
|
}
|
2015-12-02 18:59:27 +00:00
|
|
|
if ln, err := config.Listener("tcp", "127.0.0.1", -1); err == nil {
|
|
|
|
ln.Close()
|
2015-09-11 02:15:17 +00:00
|
|
|
t.Fatalf("expected port error")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Works with valid inputs
|
|
|
|
ln, err := config.Listener("tcp", "127.0.0.1", 24000)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
ln.Close()
|
|
|
|
|
|
|
|
if net := ln.Addr().Network(); net != "tcp" {
|
|
|
|
t.Fatalf("expected tcp, got: %q", net)
|
|
|
|
}
|
|
|
|
if addr := ln.Addr().String(); addr != "127.0.0.1:24000" {
|
|
|
|
t.Fatalf("expected 127.0.0.1:4646, got: %q", addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Falls back to default bind address if non provided
|
|
|
|
config.BindAddr = "0.0.0.0"
|
|
|
|
ln, err = config.Listener("tcp4", "", 24000)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
ln.Close()
|
|
|
|
|
|
|
|
if addr := ln.Addr().String(); addr != "0.0.0.0:24000" {
|
|
|
|
t.Fatalf("expected 0.0.0.0:24000, got: %q", addr)
|
|
|
|
}
|
|
|
|
}
|
2015-09-22 18:29:53 +00:00
|
|
|
|
2016-03-12 03:02:44 +00:00
|
|
|
func TestResources_ParseReserved(t *testing.T) {
|
2016-03-12 02:24:58 +00:00
|
|
|
cases := []struct {
|
|
|
|
Input string
|
|
|
|
Parsed []int
|
|
|
|
Err bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"1,2,3",
|
|
|
|
[]int{1, 2, 3},
|
|
|
|
false,
|
2015-09-22 18:29:53 +00:00
|
|
|
},
|
2016-03-12 02:24:58 +00:00
|
|
|
{
|
|
|
|
"3,1,2,1,2,3,1-3",
|
|
|
|
[]int{1, 2, 3},
|
|
|
|
false,
|
2015-09-22 18:29:53 +00:00
|
|
|
},
|
2016-03-12 02:24:58 +00:00
|
|
|
{
|
|
|
|
"3-1",
|
|
|
|
nil,
|
|
|
|
true,
|
2015-09-22 18:29:53 +00:00
|
|
|
},
|
2016-03-12 02:24:58 +00:00
|
|
|
{
|
|
|
|
"1-3,2-4",
|
|
|
|
[]int{1, 2, 3, 4},
|
|
|
|
false,
|
2015-09-22 18:29:53 +00:00
|
|
|
},
|
2016-03-12 02:24:58 +00:00
|
|
|
{
|
|
|
|
"1-3,4,5-5,6,7,8-10",
|
|
|
|
[]int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10},
|
|
|
|
false,
|
2016-01-22 18:52:20 +00:00
|
|
|
},
|
2015-09-22 18:29:53 +00:00
|
|
|
}
|
|
|
|
|
2016-03-12 02:24:58 +00:00
|
|
|
for i, tc := range cases {
|
2016-03-12 03:02:44 +00:00
|
|
|
r := &Resources{ReservedPorts: tc.Input}
|
|
|
|
err := r.ParseReserved()
|
2016-03-12 02:24:58 +00:00
|
|
|
if (err != nil) != tc.Err {
|
|
|
|
t.Fatalf("test case %d: %v", i, err)
|
|
|
|
continue
|
|
|
|
}
|
2015-09-22 18:29:53 +00:00
|
|
|
|
2016-03-12 03:02:44 +00:00
|
|
|
if !reflect.DeepEqual(r.ParsedReservedPorts, tc.Parsed) {
|
|
|
|
t.Fatalf("test case %d: \n\n%#v\n\n%#v", i, r.ParsedReservedPorts, tc.Parsed)
|
2016-03-12 02:24:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2016-01-22 18:52:20 +00:00
|
|
|
}
|
2016-11-09 19:55:10 +00:00
|
|
|
|
|
|
|
func TestIsMissingPort(t *testing.T) {
|
|
|
|
_, _, err := net.SplitHostPort("localhost")
|
|
|
|
if missing := isMissingPort(err); !missing {
|
|
|
|
t.Errorf("expected missing port error, but got %v", err)
|
|
|
|
}
|
|
|
|
_, _, err = net.SplitHostPort("localhost:9000")
|
|
|
|
if missing := isMissingPort(err); missing {
|
|
|
|
t.Errorf("expected no error, but got %v", err)
|
|
|
|
}
|
|
|
|
}
|