open-nomad/client/driver/rkt_test.go

732 lines
17 KiB
Go
Raw Normal View History

2017-10-10 06:01:55 +00:00
// +build linux
2015-09-29 22:33:25 +00:00
package driver
import (
"bytes"
"context"
2015-10-07 22:24:16 +00:00
"fmt"
2015-10-09 19:14:56 +00:00
"io/ioutil"
2016-07-11 21:46:45 +00:00
"os"
"os/exec"
2015-10-09 19:14:56 +00:00
"path/filepath"
"reflect"
"strings"
2016-10-07 23:49:00 +00:00
"syscall"
2015-10-07 22:24:16 +00:00
"testing"
"time"
2015-09-29 22:33:25 +00:00
2015-10-07 22:24:16 +00:00
"github.com/hashicorp/nomad/client/config"
cstructs "github.com/hashicorp/nomad/client/structs"
2015-10-07 22:24:16 +00:00
"github.com/hashicorp/nomad/nomad/structs"
2016-01-21 23:24:24 +00:00
"github.com/hashicorp/nomad/testutil"
2017-12-05 15:12:40 +00:00
"github.com/stretchr/testify/assert"
2015-09-29 22:33:25 +00:00
ctestutil "github.com/hashicorp/nomad/client/testutil"
2015-09-29 22:33:25 +00:00
)
2015-10-21 01:08:46 +00:00
func TestRktVersionRegex(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-21 19:06:39 +00:00
t.Parallel()
inputRkt := "rkt version 0.8.1"
inputAppc := "appc version 1.2.0"
expectedRkt := "0.8.1"
expectedAppc := "1.2.0"
rktMatches := reRktVersion.FindStringSubmatch(inputRkt)
appcMatches := reAppcVersion.FindStringSubmatch(inputAppc)
if rktMatches[1] != expectedRkt {
fmt.Printf("Test failed; got %q; want %q\n", rktMatches[1], expectedRkt)
2015-10-23 23:23:43 +00:00
}
if appcMatches[1] != expectedAppc {
fmt.Printf("Test failed; got %q; want %q\n", appcMatches[1], expectedAppc)
2015-10-23 23:23:43 +00:00
}
2015-10-21 01:08:46 +00:00
}
2015-09-29 22:33:25 +00:00
// The fingerprinter test should always pass, even if rkt is not installed.
func TestRktDriver_Fingerprint(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-21 19:06:39 +00:00
t.Parallel()
ctx := testDriverContexts(t, &structs.Task{Name: "foo", Driver: "rkt"})
d := NewRktDriver(ctx.DriverCtx)
2015-10-07 22:24:16 +00:00
node := &structs.Node{
Attributes: make(map[string]string),
}
request := &cstructs.FingerprintRequest{Config: &config.Config{}, Node: node}
var response cstructs.FingerprintResponse
err := d.Fingerprint(request, &response)
2015-10-07 22:24:16 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
2018-01-31 22:03:55 +00:00
if !response.Detected {
t.Fatalf("expected response to be applicable")
}
attributes := response.Attributes
if attributes == nil {
t.Fatalf("expected attributes to not equal nil")
2015-10-07 22:24:16 +00:00
}
if attributes["driver.rkt"] != "1" {
2015-10-07 22:24:16 +00:00
t.Fatalf("Missing Rkt driver")
}
if attributes["driver.rkt.version"] == "" {
2015-10-07 22:24:16 +00:00
t.Fatalf("Missing Rkt driver version")
}
if attributes["driver.rkt.appc.version"] == "" {
2015-10-07 22:24:16 +00:00
t.Fatalf("Missing appc version for the Rkt driver")
}
2015-09-29 22:33:25 +00:00
}
func TestRktDriver_Start_DNS(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
2015-10-07 22:24:16 +00:00
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
2016-03-10 22:56:43 +00:00
"trust_prefix": "coreos.com/etcd",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
"dns_servers": []string{"8.8.8.8", "8.8.4.4"},
"dns_search_domains": []string{"example.com", "example.org", "example.net"},
2015-10-07 22:24:16 +00:00
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
2016-02-06 08:23:56 +00:00
MemoryMB: 128,
CPU: 100,
},
2015-10-07 22:24:16 +00:00
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
2016-02-10 23:55:24 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-10-07 22:24:16 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
2015-10-07 22:24:16 +00:00
// Attempt to open
handle2, err := d.Open(ctx.ExecCtx, resp.Handle.ID())
2015-10-07 22:24:16 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
if handle2 == nil {
t.Fatalf("missing handle")
}
handle2.Kill()
2015-09-29 22:33:25 +00:00
}
2015-09-29 22:55:23 +00:00
func TestRktDriver_Start_Wait(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
2015-10-07 22:24:16 +00:00
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
2015-10-07 22:24:16 +00:00
"trust_prefix": "coreos.com/etcd",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
"args": []string{"--version"},
2015-10-07 22:24:16 +00:00
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
2015-12-21 06:09:11 +00:00
Resources: &structs.Resources{
2016-02-06 08:23:56 +00:00
MemoryMB: 128,
CPU: 100,
2015-12-21 06:09:11 +00:00
},
2015-10-07 22:24:16 +00:00
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
2015-10-07 22:24:16 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-10-07 22:24:16 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
handle := resp.Handle.(*rktHandle)
defer handle.Kill()
2015-10-07 22:24:16 +00:00
// Update should be a no-op
if err := handle.Update(task); err != nil {
2015-10-07 22:24:16 +00:00
t.Fatalf("err: %v", err)
}
2016-10-07 23:49:00 +00:00
// Signal should be an error
if err := resp.Handle.Signal(syscall.SIGTERM); err == nil {
2016-10-07 23:49:00 +00:00
t.Fatalf("err: %v", err)
}
2015-10-07 22:24:16 +00:00
select {
case res := <-resp.Handle.WaitCh():
if !res.Successful() {
t.Fatalf("err: %v", res)
2015-10-07 22:24:16 +00:00
}
2016-10-13 23:18:18 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
2015-10-07 22:24:16 +00:00
t.Fatalf("timeout")
}
// Make sure pod was removed #3561
var stderr bytes.Buffer
cmd := exec.Command(rktCmd, "status", handle.uuid)
cmd.Stdout = ioutil.Discard
cmd.Stderr = &stderr
if err := cmd.Run(); err == nil {
t.Fatalf("expected error running 'rkt status %s' on removed container", handle.uuid)
}
if out := stderr.String(); !strings.Contains(out, "no matches found") {
t.Fatalf("expected 'no matches found' but received: %s", out)
}
2015-09-29 22:55:23 +00:00
}
2015-10-09 19:14:56 +00:00
func TestRktDriver_Start_Wait_Skip_Trust(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
"args": []string{"--version"},
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
2015-12-21 06:09:11 +00:00
Resources: &structs.Resources{
2016-02-06 08:23:56 +00:00
MemoryMB: 128,
CPU: 100,
2015-12-21 06:09:11 +00:00
},
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
// Update should be a no-op
err = resp.Handle.Update(task)
if err != nil {
t.Fatalf("err: %v", err)
}
select {
case res := <-resp.Handle.WaitCh():
if !res.Successful() {
t.Fatalf("err: %v", res)
}
2016-10-13 23:18:18 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
t.Fatalf("timeout")
}
}
func TestRktDriver_Start_Wait_AllocDir(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
exp := []byte{'w', 'i', 'n'}
file := "output.txt"
2016-10-13 23:38:31 +00:00
tmpvol, err := ioutil.TempDir("", "nomadtest_rktdriver_volumes")
2016-10-13 23:34:47 +00:00
if err != nil {
t.Fatalf("error creating temporary dir: %v", err)
}
defer os.RemoveAll(tmpvol)
hostpath := filepath.Join(tmpvol, file)
2015-10-09 19:14:56 +00:00
task := &structs.Task{
Name: "rkttest_alpine",
Driver: "rkt",
Config: map[string]interface{}{
"image": "docker://alpine",
"command": "/bin/sh",
"args": []string{
"-c",
2016-10-13 23:34:47 +00:00
fmt.Sprintf(`echo -n %s > foo/%s`, string(exp), file),
},
"net": []string{"none"},
2016-10-13 23:34:47 +00:00
"volumes": []string{fmt.Sprintf("%s:/foo", tmpvol)},
2015-10-09 19:14:56 +00:00
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
2015-12-21 06:09:11 +00:00
Resources: &structs.Resources{
2016-02-06 08:23:56 +00:00
MemoryMB: 128,
CPU: 100,
2015-12-21 06:09:11 +00:00
},
2015-10-09 19:14:56 +00:00
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
2015-10-09 19:14:56 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2015-10-09 19:14:56 +00:00
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
2015-10-09 19:14:56 +00:00
select {
case res := <-resp.Handle.WaitCh():
if !res.Successful() {
t.Fatalf("err: %v", res)
2015-10-09 19:14:56 +00:00
}
2016-10-13 23:18:18 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
2015-10-09 19:14:56 +00:00
t.Fatalf("timeout")
}
// Check that data was written to the shared alloc directory.
2016-10-13 23:34:47 +00:00
act, err := ioutil.ReadFile(hostpath)
if err != nil {
t.Fatalf("Couldn't read expected output: %v", err)
}
2015-10-09 19:14:56 +00:00
if !reflect.DeepEqual(act, exp) {
t.Fatalf("Command output is %v; expected %v", act, exp)
}
2015-10-09 19:14:56 +00:00
}
2018-03-15 19:51:12 +00:00
// TestRktDriver_UserGroup asserts tasks may override the user and group of the
// rkt image.
func TestRktDriver_UserGroup(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
2018-03-15 19:51:12 +00:00
require := assert.New(t)
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
2018-03-15 19:51:12 +00:00
User: "nobody",
Config: map[string]interface{}{
2018-03-15 19:51:12 +00:00
"image": "docker://redis:3.2",
"group": "nogroup",
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 128,
CPU: 100,
},
}
2018-03-15 19:51:12 +00:00
tctx := testDriverContexts(t, task)
defer tctx.AllocDir.Destroy()
d := NewRktDriver(tctx.DriverCtx)
2018-03-15 19:51:12 +00:00
_, err := d.Prestart(tctx.ExecCtx, task)
require.Nil(err)
resp, err := d.Start(tctx.ExecCtx, task)
require.Nil(err)
2017-12-05 15:12:40 +00:00
defer resp.Handle.Kill()
2018-03-15 19:51:12 +00:00
timeout := time.Duration(testutil.TestMultiplier()*15) * time.Second
ctx, cancel := context.WithTimeout(context.Background(), timeout)
defer cancel()
// WaitUntil we can determine the user/group redis is running as
expected := []byte("redis-server *:6379 nobody nogroup\n")
testutil.WaitForResult(func() (bool, error) {
raw, code, err := resp.Handle.Exec(ctx, "/bin/bash", []string{"-c", "ps -eo args,user,group | grep ^redis"})
if err != nil {
return false, err
}
if code != 0 {
return false, fmt.Errorf("unexpected exit code: %d", code)
}
return bytes.Equal(expected, raw), fmt.Errorf("expected %q but found %q", expected, raw)
}, func(err error) {
t.Fatalf("err: %v", err)
})
2017-12-05 15:12:40 +00:00
2018-03-15 19:51:12 +00:00
require.Nil(resp.Handle.Kill())
}
2016-08-04 01:18:58 +00:00
func TestRktTrustPrefix(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
2016-08-04 01:18:58 +00:00
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
2016-08-04 01:18:58 +00:00
Config: map[string]interface{}{
"trust_prefix": "example.com/invalid",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
"args": []string{"--version"},
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 128,
CPU: 100,
},
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
2016-08-04 01:18:58 +00:00
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
2016-08-04 01:18:58 +00:00
if err == nil {
resp.Handle.Kill()
2016-08-04 01:18:58 +00:00
t.Fatalf("Should've failed")
}
msg := "Error running rkt trust"
if !strings.Contains(err.Error(), msg) {
t.Fatalf("Expecting '%v' in '%v'", msg, err)
}
}
2016-08-04 08:15:18 +00:00
func TestRktTaskValidate(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-21 19:06:39 +00:00
t.Parallel()
2016-08-04 08:15:18 +00:00
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
2016-08-04 08:15:18 +00:00
Config: map[string]interface{}{
"trust_prefix": "coreos.com/etcd",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
"args": []string{"--version"},
"dns_servers": []string{"8.8.8.8", "8.8.4.4"},
"dns_search_domains": []string{"example.com", "example.org", "example.net"},
},
Resources: basicResources,
2016-08-04 08:15:18 +00:00
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
2016-08-04 08:15:18 +00:00
if err := d.Validate(task.Config); err != nil {
t.Fatalf("Validation error in TaskConfig : '%v'", err)
}
}
func TestRktDriver_PortMapping(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
2018-03-15 19:51:12 +00:00
"image": "docker://redis:3.2",
"port_map": []map[string]string{
2017-09-26 22:26:33 +00:00
{
2016-10-25 23:27:35 +00:00
"main": "6379-tcp",
},
},
"debug": "true",
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 256,
CPU: 512,
Networks: []*structs.NetworkResource{
2017-09-26 22:26:33 +00:00
{
2016-10-25 23:27:35 +00:00
IP: "127.0.0.1",
ReservedPorts: []structs.Port{{Label: "main", Value: 8080}},
},
},
},
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
if resp.Network == nil {
t.Fatalf("Expected driver to set a DriverNetwork, but it did not!")
}
2016-11-16 00:27:07 +00:00
failCh := make(chan error, 1)
go func() {
time.Sleep(1 * time.Second)
if err := resp.Handle.Kill(); err != nil {
2016-11-16 00:27:07 +00:00
failCh <- err
2016-10-25 23:27:35 +00:00
}
}()
select {
2016-11-16 00:27:07 +00:00
case err := <-failCh:
t.Fatalf("failed to kill handle: %v", err)
case <-resp.Handle.WaitCh():
2016-10-25 23:27:35 +00:00
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
t.Fatalf("timeout")
}
}
// TestRktDriver_PortsMapping_Host asserts that port_map isn't required when
// host networking is used.
func TestRktDriver_PortsMapping_Host(t *testing.T) {
ctestutil.RktCompatible(t)
if !testutil.IsTravis() {
t.Parallel()
}
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
"image": "docker://redis:latest",
"net": []string{"host"},
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 256,
CPU: 512,
Networks: []*structs.NetworkResource{
{
IP: "127.0.0.1",
ReservedPorts: []structs.Port{{Label: "main", Value: 8080}},
},
},
},
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
if resp.Network != nil {
t.Fatalf("No network should be returned with --net=host but found: %#v", resp.Network)
}
failCh := make(chan error, 1)
go func() {
time.Sleep(1 * time.Second)
if err := resp.Handle.Kill(); err != nil {
failCh <- err
}
}()
select {
case err := <-failCh:
t.Fatalf("failed to kill handle: %v", err)
case <-resp.Handle.WaitCh():
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
t.Fatalf("timeout")
}
}
func TestRktDriver_HandlerExec(t *testing.T) {
ctestutil.RktCompatible(t)
2017-07-23 04:01:22 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
"trust_prefix": "coreos.com/etcd",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 128,
CPU: 100,
},
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
// Exec a command that should work
testutil.WaitForResult(func() (bool, error) {
out, code, err := resp.Handle.Exec(context.TODO(), "/etcd", []string{"--version"})
if err != nil {
return false, fmt.Errorf("error exec'ing etcd --version: %v", err)
}
if code != 0 {
return false, fmt.Errorf("expected `etcd --version` to succeed but exit code was: %d\n%s", code, string(out))
}
if expected := []byte("etcd version "); !bytes.HasPrefix(out, expected) {
return false, fmt.Errorf("expected output to start with %q but found:\n%q", expected, out)
}
return true, nil
}, func(err error) {
t.Fatalf("err: %v", err)
})
// Exec a command that should fail
out, code, err := resp.Handle.Exec(context.TODO(), "/etcd", []string{"--kaljdshf"})
if err != nil {
t.Fatalf("error exec'ing bad command: %v", err)
}
if code == 0 {
t.Fatalf("expected `stat` to fail but exit code was: %d", code)
}
if expected := "flag provided but not defined"; !bytes.Contains(out, []byte(expected)) {
t.Fatalf("expected output to contain %q but found: %q", expected, out)
}
if err := resp.Handle.Kill(); err != nil {
t.Fatalf("error killing handle: %v", err)
}
}
2017-11-16 23:45:14 +00:00
func TestRktDriver_Stats(t *testing.T) {
ctestutil.RktCompatible(t)
2017-11-16 23:45:14 +00:00
if !testutil.IsTravis() {
t.Parallel()
}
task := &structs.Task{
Name: "etcd",
Driver: "rkt",
Config: map[string]interface{}{
"trust_prefix": "coreos.com/etcd",
"image": "coreos.com/etcd:v2.0.4",
"command": "/etcd",
},
LogConfig: &structs.LogConfig{
MaxFiles: 10,
MaxFileSizeMB: 10,
},
Resources: &structs.Resources{
MemoryMB: 128,
CPU: 100,
},
2017-11-16 23:45:14 +00:00
}
ctx := testDriverContexts(t, task)
defer ctx.AllocDir.Destroy()
d := NewRktDriver(ctx.DriverCtx)
if _, err := d.Prestart(ctx.ExecCtx, task); err != nil {
t.Fatalf("error in prestart: %v", err)
}
resp, err := d.Start(ctx.ExecCtx, task)
if err != nil {
t.Fatalf("err: %v", err)
}
defer resp.Handle.Kill()
testutil.WaitForResult(func() (bool, error) {
stats, err := resp.Handle.Stats()
if err != nil {
return false, err
}
if stats == nil || stats.ResourceUsage == nil {
return false, fmt.Errorf("stats is nil")
}
if stats.ResourceUsage.CpuStats.TotalTicks == 0 {
return false, fmt.Errorf("cpu ticks unset")
}
if stats.ResourceUsage.MemoryStats.RSS == 0 {
return false, fmt.Errorf("rss stats unset")
}
return true, nil
}, func(err error) {
t.Fatalf("error: %v", err)
})
}
func TestRktDriver_Remove_Error(t *testing.T) {
ctestutil.RktCompatible(t)
if !testutil.IsTravis() {
t.Parallel()
}
2017-11-16 23:45:14 +00:00
// Removing a nonexistent pod should return an error
2017-11-16 23:45:14 +00:00
if err := rktRemove("00000000-0000-0000-0000-000000000000"); err == nil {
t.Fatalf("expected an error")
}
if err := rktRemove("zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz"); err == nil {
t.Fatalf("expected an error")
}
}