2015-08-30 03:07:24 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
2016-01-21 22:09:04 +00:00
|
|
|
"fmt"
|
2016-10-18 18:22:16 +00:00
|
|
|
"io/ioutil"
|
2015-08-30 03:07:24 +00:00
|
|
|
"log"
|
2016-03-15 21:34:25 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2015-08-30 03:07:24 +00:00
|
|
|
"os"
|
2015-09-25 23:49:14 +00:00
|
|
|
"path/filepath"
|
2016-12-16 23:11:56 +00:00
|
|
|
"reflect"
|
2016-10-10 21:49:37 +00:00
|
|
|
"syscall"
|
2015-08-30 03:07:24 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2016-12-16 23:11:56 +00:00
|
|
|
"github.com/golang/snappy"
|
2015-09-25 23:49:14 +00:00
|
|
|
"github.com/hashicorp/nomad/client/allocdir"
|
2016-06-01 08:22:39 +00:00
|
|
|
"github.com/hashicorp/nomad/client/config"
|
2015-08-30 03:07:24 +00:00
|
|
|
"github.com/hashicorp/nomad/client/driver"
|
2016-10-17 18:41:22 +00:00
|
|
|
"github.com/hashicorp/nomad/client/vaultclient"
|
2015-08-30 03:07:24 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
"github.com/hashicorp/nomad/testutil"
|
2015-09-23 00:10:03 +00:00
|
|
|
|
2015-09-23 01:48:42 +00:00
|
|
|
ctestutil "github.com/hashicorp/nomad/client/testutil"
|
2015-08-30 03:07:24 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func testLogger() *log.Logger {
|
2016-03-22 20:49:52 +00:00
|
|
|
return prefixedTestLogger("")
|
|
|
|
}
|
|
|
|
|
|
|
|
func prefixedTestLogger(prefix string) *log.Logger {
|
|
|
|
return log.New(os.Stderr, prefix, log.LstdFlags)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
|
|
|
|
2016-02-02 19:09:29 +00:00
|
|
|
type MockTaskStateUpdater struct {
|
|
|
|
state string
|
2016-10-21 00:27:16 +00:00
|
|
|
failed bool
|
2016-02-02 19:09:29 +00:00
|
|
|
events []*structs.TaskEvent
|
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
|
2016-02-02 19:09:29 +00:00
|
|
|
func (m *MockTaskStateUpdater) Update(name, state string, event *structs.TaskEvent) {
|
2016-11-05 00:15:58 +00:00
|
|
|
if state != "" {
|
|
|
|
m.state = state
|
|
|
|
}
|
|
|
|
if event != nil {
|
|
|
|
if event.FailsTask {
|
|
|
|
m.failed = true
|
|
|
|
}
|
|
|
|
m.events = append(m.events, event)
|
2016-10-21 00:27:16 +00:00
|
|
|
}
|
2016-02-02 19:09:29 +00:00
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
|
2016-09-02 00:23:15 +00:00
|
|
|
func testTaskRunner(restarts bool) (*MockTaskStateUpdater, *TaskRunner) {
|
|
|
|
return testTaskRunnerFromAlloc(restarts, mock.Alloc())
|
2016-03-15 21:34:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Creates a mock task runner using the first task in the first task group of
|
|
|
|
// the passed allocation.
|
2016-09-02 00:23:15 +00:00
|
|
|
func testTaskRunnerFromAlloc(restarts bool, alloc *structs.Allocation) (*MockTaskStateUpdater, *TaskRunner) {
|
2015-08-30 03:07:24 +00:00
|
|
|
logger := testLogger()
|
2016-06-01 08:22:39 +00:00
|
|
|
conf := config.DefaultConfig()
|
2015-09-24 21:29:53 +00:00
|
|
|
conf.StateDir = os.TempDir()
|
|
|
|
conf.AllocDir = os.TempDir()
|
2015-08-30 03:07:24 +00:00
|
|
|
upd := &MockTaskStateUpdater{}
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
2015-09-24 23:00:36 +00:00
|
|
|
// Initialize the port listing. This should be done by the offer process but
|
|
|
|
// we have a mock so that doesn't happen.
|
2015-11-15 06:16:32 +00:00
|
|
|
task.Resources.Networks[0].ReservedPorts = []structs.Port{{"", 80}}
|
2015-09-24 23:00:36 +00:00
|
|
|
|
2016-10-21 20:55:51 +00:00
|
|
|
allocDir := allocdir.NewAllocDir(filepath.Join(conf.AllocDir, alloc.ID))
|
2015-09-25 23:49:14 +00:00
|
|
|
allocDir.Build([]*structs.Task{task})
|
|
|
|
|
2016-10-17 18:41:22 +00:00
|
|
|
vclient := vaultclient.NewMockVaultClient()
|
2015-11-06 02:31:39 +00:00
|
|
|
ctx := driver.NewExecContext(allocDir, alloc.ID)
|
2016-10-17 18:41:22 +00:00
|
|
|
tr := NewTaskRunner(logger, conf, upd.Update, ctx, alloc, task, vclient)
|
2015-11-14 06:07:13 +00:00
|
|
|
if !restarts {
|
2016-02-04 00:16:48 +00:00
|
|
|
tr.restartTracker = noRestartsTracker()
|
2015-11-14 06:07:13 +00:00
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
return upd, tr
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_SimpleRun(t *testing.T) {
|
2015-09-23 01:48:42 +00:00
|
|
|
ctestutil.ExecCompatible(t)
|
2016-09-02 00:23:15 +00:00
|
|
|
upd, tr := testTaskRunner(false)
|
2016-03-22 20:49:52 +00:00
|
|
|
tr.MarkReceived()
|
2015-08-30 03:07:24 +00:00
|
|
|
go tr.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2015-09-24 23:59:09 +00:00
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
2016-01-21 23:24:24 +00:00
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
2015-08-30 03:07:24 +00:00
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
2016-02-19 22:49:43 +00:00
|
|
|
if len(upd.events) != 3 {
|
|
|
|
t.Fatalf("should have 3 updates: %#v", upd.events)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
|
|
|
|
2016-02-02 19:09:29 +00:00
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-02-19 22:49:43 +00:00
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-02-19 22:49:43 +00:00
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskTerminated)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-29 00:49:46 +00:00
|
|
|
func TestTaskRunner_Run_RecoverableStartError(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": 0,
|
|
|
|
"start_error": "driver failure",
|
|
|
|
"start_error_recoverable": true,
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(true, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
go tr.Run()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l < 3 {
|
|
|
|
return false, fmt.Errorf("Expect at least three events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskDriverFailure {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskDriverFailure)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskRestarting {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[2].Type, structs.TaskRestarting)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-08-30 03:07:24 +00:00
|
|
|
func TestTaskRunner_Destroy(t *testing.T) {
|
2015-09-23 01:48:42 +00:00
|
|
|
ctestutil.ExecCompatible(t)
|
2016-09-02 00:23:15 +00:00
|
|
|
upd, tr := testTaskRunner(true)
|
2016-03-22 20:49:52 +00:00
|
|
|
tr.MarkReceived()
|
2015-09-24 23:59:09 +00:00
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
// Change command to ensure we run for a bit
|
|
|
|
tr.task.Config["command"] = "/bin/sleep"
|
2016-02-29 00:56:05 +00:00
|
|
|
tr.task.Config["args"] = []string{"1000"}
|
2015-08-30 03:07:24 +00:00
|
|
|
go tr.Run()
|
|
|
|
|
2016-02-29 00:56:05 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 2 {
|
|
|
|
return false, fmt.Errorf("Expect two events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
2016-05-29 02:38:09 +00:00
|
|
|
// Make sure we are collecting afew stats
|
|
|
|
time.Sleep(2 * time.Second)
|
2016-06-12 18:14:17 +00:00
|
|
|
stats := tr.LatestResourceUsage()
|
|
|
|
if len(stats.Pids) == 0 || stats.ResourceUsage == nil || stats.ResourceUsage.MemoryStats.RSS == 0 {
|
2016-05-29 02:38:09 +00:00
|
|
|
t.Fatalf("expected task runner to have some stats")
|
|
|
|
}
|
|
|
|
|
2015-08-30 03:07:24 +00:00
|
|
|
// Begin the tear down
|
2016-08-23 21:51:09 +00:00
|
|
|
tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
2016-01-21 20:55:35 +00:00
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
2015-08-30 03:07:24 +00:00
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
2016-08-11 20:16:17 +00:00
|
|
|
if len(upd.events) != 4 {
|
|
|
|
t.Fatalf("should have 4 updates: %#v", upd.events)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-02-02 19:09:29 +00:00
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-08-11 20:16:17 +00:00
|
|
|
if upd.events[2].Type != structs.TaskKilling {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskKilling)
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2015-11-14 06:07:13 +00:00
|
|
|
|
2016-08-11 20:16:17 +00:00
|
|
|
if upd.events[3].Type != structs.TaskKilled {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[3].Type, structs.TaskKilled)
|
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_Update(t *testing.T) {
|
2015-09-23 01:48:42 +00:00
|
|
|
ctestutil.ExecCompatible(t)
|
2016-09-02 00:23:15 +00:00
|
|
|
_, tr := testTaskRunner(false)
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
// Change command to ensure we run for a bit
|
|
|
|
tr.task.Config["command"] = "/bin/sleep"
|
2016-02-04 03:58:39 +00:00
|
|
|
tr.task.Config["args"] = []string{"100"}
|
2015-08-30 03:07:24 +00:00
|
|
|
go tr.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2015-09-24 23:59:09 +00:00
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
// Update the task definition
|
2016-02-04 03:43:44 +00:00
|
|
|
updateAlloc := tr.alloc.Copy()
|
|
|
|
|
|
|
|
// Update the restart policy
|
|
|
|
newTG := updateAlloc.Job.TaskGroups[0]
|
|
|
|
newMode := "foo"
|
|
|
|
newTG.RestartPolicy.Mode = newMode
|
|
|
|
|
|
|
|
newTask := updateAlloc.Job.TaskGroups[0].Tasks[0]
|
2015-08-30 03:07:24 +00:00
|
|
|
newTask.Driver = "foobar"
|
2016-02-04 03:43:44 +00:00
|
|
|
|
|
|
|
// Update the kill timeout
|
2016-02-04 03:58:39 +00:00
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if tr.handle == nil {
|
|
|
|
return false, fmt.Errorf("task not started")
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
2016-02-04 03:43:44 +00:00
|
|
|
oldHandle := tr.handle.ID()
|
|
|
|
newTask.KillTimeout = time.Hour
|
|
|
|
|
|
|
|
tr.Update(updateAlloc)
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
// Wait for update to take place
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
2016-11-04 22:10:18 +00:00
|
|
|
if tr.task == newTask {
|
|
|
|
return false, fmt.Errorf("We copied the pointer! This would be very bad")
|
|
|
|
}
|
|
|
|
if tr.task.Driver != newTask.Driver {
|
|
|
|
return false, fmt.Errorf("Task not copied")
|
2016-02-04 03:43:44 +00:00
|
|
|
}
|
|
|
|
if tr.restartTracker.policy.Mode != newMode {
|
|
|
|
return false, fmt.Errorf("restart policy not updated")
|
|
|
|
}
|
|
|
|
if tr.handle.ID() == oldHandle {
|
|
|
|
return false, fmt.Errorf("handle not updated")
|
|
|
|
}
|
|
|
|
return true, nil
|
2015-08-30 03:07:24 +00:00
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_SaveRestoreState(t *testing.T) {
|
2016-10-18 18:22:16 +00:00
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "5s",
|
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
// Give it a Vault token
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"default"}}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
2015-08-30 03:07:24 +00:00
|
|
|
go tr.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2015-08-30 03:07:24 +00:00
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
// Wait for the task to be running and then snapshot the state
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 2 {
|
|
|
|
return false, fmt.Errorf("Expect two events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
2015-11-11 00:49:38 +00:00
|
|
|
if err := tr.SaveState(); err != nil {
|
2015-08-30 03:07:24 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
// Read the token from the file system
|
|
|
|
secretDir, err := tr.ctx.AllocDir.GetSecretDir(task.Name)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to determine task %s secret dir: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tokenPath := filepath.Join(secretDir, vaultTokenFile)
|
|
|
|
data, err := ioutil.ReadFile(tokenPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to read file: %v", err)
|
|
|
|
}
|
|
|
|
token := string(data)
|
|
|
|
if len(token) == 0 {
|
|
|
|
t.Fatalf("Token not written to disk")
|
|
|
|
}
|
|
|
|
|
2015-08-30 03:07:24 +00:00
|
|
|
// Create a new task runner
|
|
|
|
tr2 := NewTaskRunner(tr.logger, tr.config, upd.Update,
|
2016-10-17 18:41:22 +00:00
|
|
|
tr.ctx, tr.alloc, &structs.Task{Name: tr.task.Name}, tr.vaultClient)
|
2016-10-18 18:22:16 +00:00
|
|
|
tr2.restartTracker = noRestartsTracker()
|
2015-11-11 00:49:38 +00:00
|
|
|
if err := tr2.RestoreState(); err != nil {
|
2015-08-30 03:07:24 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
go tr2.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr2.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2015-08-30 03:07:24 +00:00
|
|
|
|
|
|
|
// Destroy and wait
|
2016-10-18 18:22:16 +00:00
|
|
|
select {
|
|
|
|
case <-tr2.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that we recovered the token
|
|
|
|
if act := tr2.vaultFuture.Get(); act != token {
|
|
|
|
t.Fatalf("Vault token not properly recovered")
|
|
|
|
}
|
2015-08-30 03:07:24 +00:00
|
|
|
}
|
2016-03-15 21:34:25 +00:00
|
|
|
|
|
|
|
func TestTaskRunner_Download_List(t *testing.T) {
|
|
|
|
ctestutil.ExecCompatible(t)
|
|
|
|
|
|
|
|
ts := httptest.NewServer(http.FileServer(http.Dir(filepath.Dir("."))))
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
// Create an allocation that has a task with a list of artifacts.
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
f1 := "task_runner_test.go"
|
|
|
|
f2 := "task_runner.go"
|
|
|
|
artifact1 := structs.TaskArtifact{
|
|
|
|
GetterSource: fmt.Sprintf("%s/%s", ts.URL, f1),
|
|
|
|
}
|
|
|
|
artifact2 := structs.TaskArtifact{
|
|
|
|
GetterSource: fmt.Sprintf("%s/%s", ts.URL, f2),
|
|
|
|
}
|
|
|
|
task.Artifacts = []*structs.TaskArtifact{&artifact1, &artifact2}
|
|
|
|
|
2016-09-02 00:23:15 +00:00
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
2016-03-22 20:49:52 +00:00
|
|
|
tr.MarkReceived()
|
2016-03-15 21:34:25 +00:00
|
|
|
go tr.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2016-03-15 21:34:25 +00:00
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 4 {
|
|
|
|
t.Fatalf("should have 4 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskDownloadingArtifacts {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskDownloadingArtifacts)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that both files exist.
|
|
|
|
taskDir := tr.ctx.AllocDir.TaskDirs[task.Name]
|
|
|
|
if _, err := os.Stat(filepath.Join(taskDir, f1)); err != nil {
|
|
|
|
t.Fatalf("%v not downloaded", f1)
|
|
|
|
}
|
|
|
|
if _, err := os.Stat(filepath.Join(taskDir, f2)); err != nil {
|
|
|
|
t.Fatalf("%v not downloaded", f2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_Download_Retries(t *testing.T) {
|
|
|
|
ctestutil.ExecCompatible(t)
|
|
|
|
|
|
|
|
// Create an allocation that has a task with bad artifacts.
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
artifact := structs.TaskArtifact{
|
|
|
|
GetterSource: "http://127.1.1.111:12315/foo/bar/baz",
|
|
|
|
}
|
|
|
|
task.Artifacts = []*structs.TaskArtifact{&artifact}
|
|
|
|
|
|
|
|
// Make the restart policy try one update
|
|
|
|
alloc.Job.TaskGroups[0].RestartPolicy = &structs.RestartPolicy{
|
|
|
|
Attempts: 1,
|
|
|
|
Interval: 10 * time.Minute,
|
|
|
|
Delay: 1 * time.Second,
|
|
|
|
Mode: structs.RestartPolicyModeFail,
|
|
|
|
}
|
|
|
|
|
2016-09-02 00:23:15 +00:00
|
|
|
upd, tr := testTaskRunnerFromAlloc(true, alloc)
|
2016-03-22 20:49:52 +00:00
|
|
|
tr.MarkReceived()
|
2016-03-15 21:34:25 +00:00
|
|
|
go tr.Run()
|
2016-08-23 21:51:09 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
2016-03-15 21:34:25 +00:00
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 7 {
|
|
|
|
t.Fatalf("should have 7 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskDownloadingArtifacts {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskDownloadingArtifacts)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskArtifactDownloadFailed {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskArtifactDownloadFailed)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskRestarting {
|
|
|
|
t.Fatalf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskRestarting)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[4].Type != structs.TaskDownloadingArtifacts {
|
|
|
|
t.Fatalf("Fifth Event was %v; want %v", upd.events[4].Type, structs.TaskDownloadingArtifacts)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[5].Type != structs.TaskArtifactDownloadFailed {
|
|
|
|
t.Fatalf("Sixth Event was %v; want %v", upd.events[5].Type, structs.TaskArtifactDownloadFailed)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[6].Type != structs.TaskNotRestarting {
|
|
|
|
t.Fatalf("Seventh Event was %v; want %v", upd.events[6].Type, structs.TaskNotRestarting)
|
|
|
|
}
|
|
|
|
}
|
2016-03-24 17:55:14 +00:00
|
|
|
|
|
|
|
func TestTaskRunner_Validate_UserEnforcement(t *testing.T) {
|
2016-09-02 00:23:15 +00:00
|
|
|
_, tr := testTaskRunner(false)
|
2016-09-02 19:44:05 +00:00
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
2016-03-24 17:55:14 +00:00
|
|
|
|
2016-10-26 22:03:41 +00:00
|
|
|
if err := tr.setTaskEnv(); err != nil {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-03-24 17:55:14 +00:00
|
|
|
// Try to run as root with exec.
|
|
|
|
tr.task.Driver = "exec"
|
|
|
|
tr.task.User = "root"
|
|
|
|
if err := tr.validateTask(); err == nil {
|
|
|
|
t.Fatalf("expected error running as root with exec")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to run a non-blacklisted user with exec.
|
|
|
|
tr.task.Driver = "exec"
|
|
|
|
tr.task.User = "foobar"
|
|
|
|
if err := tr.validateTask(); err != nil {
|
|
|
|
t.Fatalf("unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to run as root with docker.
|
|
|
|
tr.task.Driver = "docker"
|
|
|
|
tr.task.User = "root"
|
|
|
|
if err := tr.validateTask(); err != nil {
|
|
|
|
t.Fatalf("unexpected error: %v", err)
|
|
|
|
}
|
2016-05-27 18:25:36 +00:00
|
|
|
}
|
2016-09-16 00:39:08 +00:00
|
|
|
|
2016-10-06 22:17:34 +00:00
|
|
|
func TestTaskRunner_RestartTask(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(true, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
go tr.Run()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
go func() {
|
2016-10-27 00:08:53 +00:00
|
|
|
time.Sleep(time.Duration(testutil.TestMultiplier()*300) * time.Millisecond)
|
2016-10-06 22:17:34 +00:00
|
|
|
tr.Restart("test", "restart")
|
2016-10-27 00:08:53 +00:00
|
|
|
time.Sleep(time.Duration(testutil.TestMultiplier()*300) * time.Millisecond)
|
2016-10-21 00:27:16 +00:00
|
|
|
tr.Kill("test", "restart", false)
|
2016-10-06 22:17:34 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 9 {
|
|
|
|
t.Fatalf("should have 9 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskRestartSignal {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskRestartSignal)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskKilling {
|
|
|
|
t.Fatalf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskKilling)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[4].Type != structs.TaskKilled {
|
|
|
|
t.Fatalf("Fifth Event was %v; want %v", upd.events[4].Type, structs.TaskKilled)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("%+v", upd.events[5])
|
|
|
|
if upd.events[5].Type != structs.TaskRestarting {
|
|
|
|
t.Fatalf("Sixth Event was %v; want %v", upd.events[5].Type, structs.TaskRestarting)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[6].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Seventh Event was %v; want %v", upd.events[7].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
if upd.events[7].Type != structs.TaskKilling {
|
|
|
|
t.Fatalf("Eighth Event was %v; want %v", upd.events[7].Type, structs.TaskKilling)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[8].Type != structs.TaskKilled {
|
|
|
|
t.Fatalf("Nineth Event was %v; want %v", upd.events[8].Type, structs.TaskKilled)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_KillTask(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
go tr.Run()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
2016-10-21 00:27:16 +00:00
|
|
|
tr.Kill("test", "kill", true)
|
2016-10-06 22:17:34 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 4 {
|
|
|
|
t.Fatalf("should have 4 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
2016-10-21 00:27:16 +00:00
|
|
|
if !upd.failed {
|
|
|
|
t.Fatalf("TaskState should be failed: %+v", upd)
|
|
|
|
}
|
|
|
|
|
2016-10-06 22:17:34 +00:00
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskKilling {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskKilling)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskKilled {
|
|
|
|
t.Fatalf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskKilled)
|
|
|
|
}
|
|
|
|
}
|
2016-10-10 21:49:37 +00:00
|
|
|
|
|
|
|
func TestTaskRunner_SignalFailure(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
"signal_error": "test forcing failure",
|
|
|
|
}
|
|
|
|
|
|
|
|
_, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
go tr.Run()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
if err := tr.Signal("test", "test", syscall.SIGINT); err == nil {
|
|
|
|
t.Fatalf("Didn't receive error")
|
|
|
|
}
|
|
|
|
}
|
2016-10-18 18:22:16 +00:00
|
|
|
|
|
|
|
func TestTaskRunner_BlockForVault(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"default"}}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
// Control when we get a Vault token
|
|
|
|
token := "1234"
|
|
|
|
waitCh := make(chan struct{})
|
|
|
|
handler := func(*structs.Allocation, []string) (map[string]string, error) {
|
|
|
|
<-waitCh
|
|
|
|
return map[string]string{task.Name: token}, nil
|
|
|
|
}
|
|
|
|
tr.vaultClient.(*vaultclient.MockVaultClient).DeriveTokenFn = handler
|
|
|
|
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
t.Fatalf("premature exit")
|
|
|
|
case <-time.After(1 * time.Second):
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 1 {
|
|
|
|
t.Fatalf("should have 1 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStatePending {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStatePending)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unblock
|
|
|
|
close(waitCh)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 3 {
|
|
|
|
t.Fatalf("should have 3 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the token is on disk
|
|
|
|
secretDir, err := tr.ctx.AllocDir.GetSecretDir(task.Name)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to determine task %s secret dir: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the token from the file system
|
|
|
|
tokenPath := filepath.Join(secretDir, vaultTokenFile)
|
|
|
|
data, err := ioutil.ReadFile(tokenPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to read file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if act := string(data); act != token {
|
|
|
|
t.Fatalf("Token didn't get written to disk properly, got %q; want %q", act, token)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_DeriveToken_Retry(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"default"}}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
// Control when we get a Vault token
|
|
|
|
token := "1234"
|
|
|
|
count := 0
|
|
|
|
handler := func(*structs.Allocation, []string) (map[string]string, error) {
|
|
|
|
if count > 0 {
|
|
|
|
return map[string]string{task.Name: token}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
count++
|
2016-10-23 01:08:30 +00:00
|
|
|
return nil, structs.NewRecoverableError(fmt.Errorf("Want a retry"), true)
|
2016-10-18 18:22:16 +00:00
|
|
|
}
|
|
|
|
tr.vaultClient.(*vaultclient.MockVaultClient).DeriveTokenFn = handler
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 3 {
|
|
|
|
t.Fatalf("should have 3 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the token is on disk
|
|
|
|
secretDir, err := tr.ctx.AllocDir.GetSecretDir(task.Name)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to determine task %s secret dir: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read the token from the file system
|
|
|
|
tokenPath := filepath.Join(secretDir, vaultTokenFile)
|
|
|
|
data, err := ioutil.ReadFile(tokenPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to read file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if act := string(data); act != token {
|
|
|
|
t.Fatalf("Token didn't get written to disk properly, got %q; want %q", act, token)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-23 01:08:30 +00:00
|
|
|
func TestTaskRunner_DeriveToken_Unrecoverable(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{
|
|
|
|
Policies: []string{"default"},
|
|
|
|
ChangeMode: structs.VaultChangeModeRestart,
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
// Error the token derivation
|
|
|
|
vc := tr.vaultClient.(*vaultclient.MockVaultClient)
|
|
|
|
vc.SetDeriveTokenError(alloc.ID, []string{task.Name}, fmt.Errorf("Non recoverable"))
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
// Wait for the task to start
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 2 {
|
|
|
|
return false, fmt.Errorf("Expect two events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskKilling {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskKilling)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
func TestTaskRunner_Template_Block(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
task.Templates = []*structs.Template{
|
|
|
|
{
|
|
|
|
EmbeddedTmpl: "{{key \"foo\"}}",
|
|
|
|
DestPath: "local/test",
|
|
|
|
ChangeMode: structs.TemplateChangeModeNoop,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
t.Fatalf("premature exit")
|
|
|
|
case <-time.After(1 * time.Second):
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 1 {
|
|
|
|
t.Fatalf("should have 1 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStatePending {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStatePending)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unblock
|
|
|
|
tr.UnblockStart("test")
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 3 {
|
|
|
|
t.Fatalf("should have 3 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-31 18:29:26 +00:00
|
|
|
func TestTaskRunner_Template_Artifact(t *testing.T) {
|
|
|
|
dir, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("bad: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ts := httptest.NewServer(http.FileServer(http.Dir(filepath.Join(dir, ".."))))
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
// Create an allocation that has a task that renders a template from an
|
|
|
|
// artifact
|
|
|
|
f1 := "CHANGELOG.md"
|
|
|
|
artifact := structs.TaskArtifact{
|
|
|
|
GetterSource: fmt.Sprintf("%s/%s", ts.URL, f1),
|
|
|
|
}
|
|
|
|
task.Artifacts = []*structs.TaskArtifact{&artifact}
|
|
|
|
task.Templates = []*structs.Template{
|
|
|
|
{
|
|
|
|
SourcePath: "CHANGELOG.md",
|
|
|
|
DestPath: "local/test",
|
|
|
|
ChangeMode: structs.TemplateChangeModeNoop,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 4 {
|
|
|
|
t.Fatalf("should have 4 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskDownloadingArtifacts {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskDownloadingArtifacts)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that both files exist.
|
|
|
|
taskDir := tr.ctx.AllocDir.TaskDirs[task.Name]
|
|
|
|
if _, err := os.Stat(filepath.Join(taskDir, f1)); err != nil {
|
|
|
|
t.Fatalf("%v not downloaded", f1)
|
|
|
|
}
|
|
|
|
if _, err := os.Stat(filepath.Join(taskDir, allocdir.TaskLocal, "test")); err != nil {
|
|
|
|
t.Fatalf("template not rendered")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-18 18:22:16 +00:00
|
|
|
func TestTaskRunner_Template_NewVaultToken(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
task.Templates = []*structs.Template{
|
|
|
|
{
|
|
|
|
EmbeddedTmpl: "{{key \"foo\"}}",
|
|
|
|
DestPath: "local/test",
|
|
|
|
ChangeMode: structs.TemplateChangeModeNoop,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{Policies: []string{"default"}}
|
|
|
|
|
|
|
|
_, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
// Wait for a Vault token
|
|
|
|
var token string
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if token = tr.vaultFuture.Get(); token == "" {
|
|
|
|
return false, fmt.Errorf("No Vault token")
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Error the token renewal
|
|
|
|
vc := tr.vaultClient.(*vaultclient.MockVaultClient)
|
|
|
|
renewalCh, ok := vc.RenewTokens[token]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("no renewal channel")
|
|
|
|
}
|
|
|
|
|
|
|
|
originalManager := tr.templateManager
|
|
|
|
|
|
|
|
renewalCh <- fmt.Errorf("Test killing")
|
|
|
|
close(renewalCh)
|
|
|
|
|
|
|
|
// Wait for a new Vault token
|
|
|
|
var token2 string
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if token2 = tr.vaultFuture.Get(); token2 == "" || token2 == token {
|
|
|
|
return false, fmt.Errorf("No new Vault token")
|
|
|
|
}
|
|
|
|
|
|
|
|
if originalManager == tr.templateManager {
|
|
|
|
return false, fmt.Errorf("Template manager not updated")
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_VaultManager_Restart(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{
|
|
|
|
Policies: []string{"default"},
|
|
|
|
ChangeMode: structs.VaultChangeModeRestart,
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
// Wait for the task to start
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 2 {
|
|
|
|
return false, fmt.Errorf("Expect two events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Error the token renewal
|
|
|
|
vc := tr.vaultClient.(*vaultclient.MockVaultClient)
|
|
|
|
renewalCh, ok := vc.RenewTokens[tr.vaultFuture.Get()]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("no renewal channel")
|
|
|
|
}
|
|
|
|
|
|
|
|
renewalCh <- fmt.Errorf("Test killing")
|
|
|
|
close(renewalCh)
|
|
|
|
|
|
|
|
// Ensure a restart
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 7 {
|
|
|
|
return false, fmt.Errorf("Expect seven events; got %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskRestartSignal {
|
|
|
|
return false, fmt.Errorf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskRestartSignal)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[3].Type != structs.TaskKilling {
|
|
|
|
return false, fmt.Errorf("Fourth Event was %v; want %v", upd.events[3].Type, structs.TaskKilling)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[4].Type != structs.TaskKilled {
|
|
|
|
return false, fmt.Errorf("Fifth Event was %v; want %v", upd.events[4].Type, structs.TaskKilled)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[5].Type != structs.TaskRestarting {
|
|
|
|
return false, fmt.Errorf("Sixth Event was %v; want %v", upd.events[5].Type, structs.TaskRestarting)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[6].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Seventh Event was %v; want %v", upd.events[6].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTaskRunner_VaultManager_Signal(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "10s",
|
|
|
|
}
|
|
|
|
task.Vault = &structs.Vault{
|
|
|
|
Policies: []string{"default"},
|
|
|
|
ChangeMode: structs.VaultChangeModeSignal,
|
|
|
|
ChangeSignal: "SIGUSR1",
|
|
|
|
}
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
// Wait for the task to start
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 2 {
|
|
|
|
return false, fmt.Errorf("Expect two events; got %v", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// Error the token renewal
|
|
|
|
vc := tr.vaultClient.(*vaultclient.MockVaultClient)
|
|
|
|
renewalCh, ok := vc.RenewTokens[tr.vaultFuture.Get()]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("no renewal channel")
|
|
|
|
}
|
|
|
|
|
|
|
|
renewalCh <- fmt.Errorf("Test killing")
|
|
|
|
close(renewalCh)
|
|
|
|
|
|
|
|
// Ensure a restart
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
if l := len(upd.events); l != 3 {
|
|
|
|
return false, fmt.Errorf("Expect three events; got %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
return false, fmt.Errorf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
return false, fmt.Errorf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskSignaling {
|
|
|
|
return false, fmt.Errorf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskSignaling)
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
})
|
|
|
|
}
|
2016-12-16 23:11:56 +00:00
|
|
|
|
|
|
|
// Test that the payload is written to disk
|
|
|
|
func TestTaskRunner_SimpleRun_Dispatch(t *testing.T) {
|
|
|
|
alloc := mock.Alloc()
|
|
|
|
task := alloc.Job.TaskGroups[0].Tasks[0]
|
|
|
|
task.Driver = "mock_driver"
|
|
|
|
task.Config = map[string]interface{}{
|
|
|
|
"exit_code": "0",
|
|
|
|
"run_for": "1s",
|
|
|
|
}
|
|
|
|
fileName := "test"
|
|
|
|
task.DispatchInput = &structs.DispatchInputConfig{
|
|
|
|
File: fileName,
|
|
|
|
}
|
|
|
|
alloc.Job.Constructor = &structs.ConstructorConfig{}
|
|
|
|
|
|
|
|
// Add an encrypted payload
|
|
|
|
expected := []byte("hello world")
|
|
|
|
compressed := snappy.Encode(nil, expected)
|
|
|
|
alloc.Job.Payload = compressed
|
|
|
|
|
|
|
|
upd, tr := testTaskRunnerFromAlloc(false, alloc)
|
|
|
|
tr.MarkReceived()
|
|
|
|
defer tr.Destroy(structs.NewTaskEvent(structs.TaskKilled))
|
|
|
|
defer tr.ctx.AllocDir.Destroy()
|
|
|
|
go tr.Run()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-tr.WaitCh():
|
|
|
|
case <-time.After(time.Duration(testutil.TestMultiplier()*15) * time.Second):
|
|
|
|
t.Fatalf("timeout")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upd.events) != 3 {
|
|
|
|
t.Fatalf("should have 3 updates: %#v", upd.events)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.state != structs.TaskStateDead {
|
|
|
|
t.Fatalf("TaskState %v; want %v", upd.state, structs.TaskStateDead)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[0].Type != structs.TaskReceived {
|
|
|
|
t.Fatalf("First Event was %v; want %v", upd.events[0].Type, structs.TaskReceived)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[1].Type != structs.TaskStarted {
|
|
|
|
t.Fatalf("Second Event was %v; want %v", upd.events[1].Type, structs.TaskStarted)
|
|
|
|
}
|
|
|
|
|
|
|
|
if upd.events[2].Type != structs.TaskTerminated {
|
|
|
|
t.Fatalf("Third Event was %v; want %v", upd.events[2].Type, structs.TaskTerminated)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the file was written to disk properly
|
|
|
|
payloadPath := filepath.Join(tr.taskDir, allocdir.TaskLocal, fileName)
|
|
|
|
data, err := ioutil.ReadFile(payloadPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to read file: %v", err)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(data, expected) {
|
|
|
|
t.Fatalf("Bad; got %v; want %v", string(data), string(expected))
|
|
|
|
}
|
|
|
|
}
|