2017-08-11 17:27:21 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"archive/tar"
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2017-11-17 01:48:06 +00:00
|
|
|
"strings"
|
2018-01-09 00:00:07 +00:00
|
|
|
"syscall"
|
2017-08-11 17:27:21 +00:00
|
|
|
"testing"
|
2017-08-11 23:14:58 +00:00
|
|
|
"time"
|
2017-08-11 17:27:21 +00:00
|
|
|
|
2017-11-17 01:48:06 +00:00
|
|
|
"github.com/hashicorp/nomad/client/allocdir"
|
2017-08-11 17:27:21 +00:00
|
|
|
"github.com/hashicorp/nomad/client/config"
|
2018-01-09 00:00:07 +00:00
|
|
|
"github.com/hashicorp/nomad/client/testutil"
|
2017-08-11 23:14:58 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
2017-08-11 17:27:21 +00:00
|
|
|
)
|
|
|
|
|
2017-08-11 23:14:58 +00:00
|
|
|
// TestPrevAlloc_LocalPrevAlloc asserts that when a previous alloc runner is
|
|
|
|
// set a localPrevAlloc will block on it.
|
|
|
|
func TestPrevAlloc_LocalPrevAlloc(t *testing.T) {
|
|
|
|
_, prevAR := testAllocRunner(false)
|
|
|
|
prevAR.alloc.Job.TaskGroups[0].Tasks[0].Config["run_for"] = "10s"
|
|
|
|
|
|
|
|
newAlloc := mock.Alloc()
|
|
|
|
newAlloc.PreviousAllocation = prevAR.Alloc().ID
|
|
|
|
newAlloc.Job.TaskGroups[0].EphemeralDisk.Sticky = false
|
|
|
|
task := newAlloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config["run_for"] = "500ms"
|
|
|
|
|
2017-10-03 17:53:32 +00:00
|
|
|
waiter := newAllocWatcher(newAlloc, prevAR, nil, nil, testLogger(), "")
|
2017-08-11 23:14:58 +00:00
|
|
|
|
|
|
|
// Wait in a goroutine with a context to make sure it exits at the right time
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
go func() {
|
|
|
|
defer cancel()
|
|
|
|
waiter.Wait(ctx)
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
t.Fatalf("Wait exited too early")
|
|
|
|
case <-time.After(33 * time.Millisecond):
|
|
|
|
// Good! It's blocking
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start the previous allocs to cause it to update but not terminate
|
|
|
|
go prevAR.Run()
|
|
|
|
defer prevAR.Destroy()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
t.Fatalf("Wait exited too early")
|
|
|
|
case <-time.After(33 * time.Millisecond):
|
|
|
|
// Good! It's still blocking
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop the previous alloc
|
|
|
|
prevAR.Destroy()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
// Good! We unblocked when the previous alloc stopped
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Fatalf("Wait exited too early")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-17 01:48:06 +00:00
|
|
|
// TestPrevAlloc_StreamAllocDir_Ok asserts that streaming a tar to an alloc dir
|
2017-08-11 23:14:58 +00:00
|
|
|
// works.
|
2017-11-17 01:48:06 +00:00
|
|
|
func TestPrevAlloc_StreamAllocDir_Ok(t *testing.T) {
|
2018-01-09 00:00:07 +00:00
|
|
|
testutil.RequireRoot(t)
|
2017-08-11 17:27:21 +00:00
|
|
|
t.Parallel()
|
|
|
|
dir, err := ioutil.TempDir("", "")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
2018-01-09 00:00:07 +00:00
|
|
|
// Create foo/
|
|
|
|
fooDir := filepath.Join(dir, "foo")
|
|
|
|
if err := os.Mkdir(fooDir, 0777); err != nil {
|
2017-08-11 17:27:21 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2018-01-09 00:00:07 +00:00
|
|
|
|
|
|
|
// Change ownership of foo/ to test #3702 (any non-root user is fine)
|
|
|
|
const uid, gid = 1, 1
|
|
|
|
if err := os.Chown(fooDir, uid, gid); err != nil {
|
|
|
|
t.Fatalf("err : %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
dirInfo, err := os.Stat(fooDir)
|
2017-08-11 17:27:21 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2018-01-09 00:00:07 +00:00
|
|
|
|
|
|
|
// Create foo/bar
|
|
|
|
f, err := os.Create(filepath.Join(fooDir, "bar"))
|
2017-08-11 17:27:21 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2018-01-09 00:00:07 +00:00
|
|
|
if _, err := f.WriteString("123"); err != nil {
|
2017-08-11 17:27:21 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if err := f.Chmod(0644); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
fInfo, err := f.Stat()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
f.Close()
|
2018-01-09 00:00:07 +00:00
|
|
|
|
|
|
|
// Create foo/baz -> bar symlink
|
2017-08-11 17:27:21 +00:00
|
|
|
if err := os.Symlink("bar", filepath.Join(dir, "foo", "baz")); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
linkInfo, err := os.Lstat(filepath.Join(dir, "foo", "baz"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
buf := new(bytes.Buffer)
|
|
|
|
tw := tar.NewWriter(buf)
|
|
|
|
|
|
|
|
walkFn := func(path string, fileInfo os.FileInfo, err error) error {
|
|
|
|
// Include the path of the file name relative to the alloc dir
|
|
|
|
// so that we can put the files in the right directories
|
|
|
|
link := ""
|
|
|
|
if fileInfo.Mode()&os.ModeSymlink != 0 {
|
|
|
|
target, err := os.Readlink(path)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error reading symlink: %v", err)
|
|
|
|
}
|
|
|
|
link = target
|
|
|
|
}
|
|
|
|
hdr, err := tar.FileInfoHeader(fileInfo, link)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error creating file header: %v", err)
|
|
|
|
}
|
|
|
|
hdr.Name = fileInfo.Name()
|
|
|
|
tw.WriteHeader(hdr)
|
|
|
|
|
|
|
|
// If it's a directory or symlink we just write the header into the tar
|
|
|
|
if fileInfo.IsDir() || (fileInfo.Mode()&os.ModeSymlink != 0) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the file into the archive
|
|
|
|
file, err := os.Open(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
if _, err := io.Copy(tw, file); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := filepath.Walk(dir, walkFn); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
tw.Close()
|
|
|
|
|
|
|
|
dir1, err := ioutil.TempDir("", "nomadtest-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
|
|
|
|
c1 := testClient(t, func(c *config.Config) {
|
|
|
|
c.RPCHandler = nil
|
|
|
|
})
|
|
|
|
defer c1.Shutdown()
|
|
|
|
|
|
|
|
rc := ioutil.NopCloser(buf)
|
|
|
|
|
|
|
|
prevAlloc := &remotePrevAlloc{logger: testLogger()}
|
|
|
|
if err := prevAlloc.streamAllocDir(context.Background(), rc, dir1); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure foo is present
|
|
|
|
fi, err := os.Stat(filepath.Join(dir1, "foo"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if fi.Mode() != dirInfo.Mode() {
|
|
|
|
t.Fatalf("mode: %v", fi.Mode())
|
|
|
|
}
|
2018-01-09 00:00:07 +00:00
|
|
|
stat := fi.Sys().(*syscall.Stat_t)
|
|
|
|
if stat.Uid != uid || stat.Gid != gid {
|
|
|
|
t.Fatalf("foo/ has incorrect ownership: expected %d:%d found %d:%d",
|
|
|
|
uid, gid, stat.Uid, stat.Gid)
|
|
|
|
}
|
2017-08-11 17:27:21 +00:00
|
|
|
|
|
|
|
fi1, err := os.Stat(filepath.Join(dir1, "bar"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if fi1.Mode() != fInfo.Mode() {
|
|
|
|
t.Fatalf("mode: %v", fi1.Mode())
|
|
|
|
}
|
|
|
|
|
|
|
|
fi2, err := os.Lstat(filepath.Join(dir1, "baz"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if fi2.Mode() != linkInfo.Mode() {
|
|
|
|
t.Fatalf("mode: %v", fi2.Mode())
|
|
|
|
}
|
|
|
|
}
|
2017-11-17 01:48:06 +00:00
|
|
|
|
|
|
|
// TestPrevAlloc_StreamAllocDir_Error asserts that errors encountered while
|
|
|
|
// streaming a tar cause the migration to be cancelled and no files are written
|
|
|
|
// (migrations are atomic).
|
|
|
|
func TestPrevAlloc_StreamAllocDir_Error(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
dest, err := ioutil.TempDir("", "nomadtest-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dest)
|
|
|
|
|
|
|
|
// This test only unit tests streamAllocDir so we only need a partially
|
|
|
|
// complete remotePrevAlloc
|
|
|
|
prevAlloc := &remotePrevAlloc{
|
|
|
|
logger: testLogger(),
|
|
|
|
allocID: "123",
|
|
|
|
prevAllocID: "abc",
|
|
|
|
migrate: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
tarBuf := bytes.NewBuffer(nil)
|
|
|
|
tw := tar.NewWriter(tarBuf)
|
|
|
|
fooHdr := tar.Header{
|
|
|
|
Name: "foo.txt",
|
|
|
|
Mode: 0666,
|
|
|
|
Size: 1,
|
|
|
|
ModTime: time.Now(),
|
|
|
|
Typeflag: tar.TypeReg,
|
|
|
|
}
|
|
|
|
err = tw.WriteHeader(&fooHdr)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error writing file header: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := tw.Write([]byte{'a'}); err != nil {
|
|
|
|
t.Fatalf("error writing file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now write the error file
|
|
|
|
contents := []byte("SENTINEL ERROR")
|
|
|
|
err = tw.WriteHeader(&tar.Header{
|
|
|
|
Name: allocdir.SnapshotErrorFilename(prevAlloc.prevAllocID),
|
|
|
|
Mode: 0666,
|
|
|
|
Size: int64(len(contents)),
|
|
|
|
AccessTime: allocdir.SnapshotErrorTime,
|
|
|
|
ChangeTime: allocdir.SnapshotErrorTime,
|
|
|
|
ModTime: allocdir.SnapshotErrorTime,
|
|
|
|
Typeflag: tar.TypeReg,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error writing sentinel file header: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := tw.Write(contents); err != nil {
|
|
|
|
t.Fatalf("error writing sentinel file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assert streamAllocDir fails
|
|
|
|
err = prevAlloc.streamAllocDir(context.Background(), ioutil.NopCloser(tarBuf), dest)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expected an error from streamAllocDir")
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(err.Error(), string(contents)) {
|
|
|
|
t.Fatalf("expected error to end with %q but found: %v", string(contents), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// streamAllocDir leaves cleanup to the caller on error, so assert
|
|
|
|
// "foo.txt" was written
|
|
|
|
fi, err := os.Stat(filepath.Join(dest, "foo.txt"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error reading foo.txt: %v", err)
|
|
|
|
}
|
|
|
|
if fi.Size() != fooHdr.Size {
|
|
|
|
t.Fatalf("expected foo.txt to be size 1 but found %d", fi.Size())
|
|
|
|
}
|
|
|
|
}
|