Inject the current binary into the chroot in test mode
This commit is contained in:
parent
ea5a60629a
commit
c7cd7abe22
|
@ -108,24 +108,40 @@ func (d *AllocDir) Build(tasks []*structs.Task) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Embed takes a mapping of absolute directory paths on the host to their
|
// Embed takes a mapping of absolute directory or file paths on the host to
|
||||||
// intended, relative location within the task directory. Embed attempts
|
// their intended, relative location within the task directory. Embed attempts
|
||||||
// hardlink and then defaults to copying. If the path exists on the host and
|
// hardlink and then defaults to copying. If the path exists on the host and
|
||||||
// can't be embeded an error is returned.
|
// can't be embeded an error is returned.
|
||||||
func (d *AllocDir) Embed(task string, dirs map[string]string) error {
|
func (d *AllocDir) Embed(task string, entries map[string]string) error {
|
||||||
taskdir, ok := d.TaskDirs[task]
|
taskdir, ok := d.TaskDirs[task]
|
||||||
if !ok {
|
if !ok {
|
||||||
return fmt.Errorf("Task directory doesn't exist for task %v", task)
|
return fmt.Errorf("Task directory doesn't exist for task %v", task)
|
||||||
}
|
}
|
||||||
|
|
||||||
subdirs := make(map[string]string)
|
subdirs := make(map[string]string)
|
||||||
for source, dest := range dirs {
|
for source, dest := range entries {
|
||||||
// Check to see if directory exists on host.
|
// Check to see if directory exists on host.
|
||||||
s, err := os.Stat(source)
|
s, err := os.Stat(source)
|
||||||
if os.IsNotExist(err) {
|
if os.IsNotExist(err) {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Embedding a single file
|
||||||
|
if !s.IsDir() {
|
||||||
|
destDir := filepath.Join(taskdir, filepath.Dir(dest))
|
||||||
|
if err := os.MkdirAll(destDir, s.Mode().Perm()); err != nil {
|
||||||
|
return fmt.Errorf("Couldn't create destination directory %v: %v", destDir, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy the file.
|
||||||
|
taskEntry := filepath.Join(destDir, filepath.Base(dest))
|
||||||
|
if err := d.linkOrCopy(source, taskEntry, s.Mode().Perm()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
// Create destination directory.
|
// Create destination directory.
|
||||||
destDir := filepath.Join(taskdir, dest)
|
destDir := filepath.Join(taskdir, dest)
|
||||||
if err := os.MkdirAll(destDir, s.Mode().Perm()); err != nil {
|
if err := os.MkdirAll(destDir, s.Mode().Perm()); err != nil {
|
||||||
|
@ -133,12 +149,12 @@ func (d *AllocDir) Embed(task string, dirs map[string]string) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Enumerate the files in source.
|
// Enumerate the files in source.
|
||||||
entries, err := ioutil.ReadDir(source)
|
dirEntries, err := ioutil.ReadDir(source)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("Couldn't read directory %v: %v", source, err)
|
return fmt.Errorf("Couldn't read directory %v: %v", source, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, entry := range entries {
|
for _, entry := range dirEntries {
|
||||||
hostEntry := filepath.Join(source, entry.Name())
|
hostEntry := filepath.Join(source, entry.Name())
|
||||||
taskEntry := filepath.Join(destDir, filepath.Base(hostEntry))
|
taskEntry := filepath.Join(destDir, filepath.Base(hostEntry))
|
||||||
if entry.IsDir() {
|
if entry.IsDir() {
|
||||||
|
|
|
@ -24,6 +24,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/hashicorp/nomad/client/allocdir"
|
"github.com/hashicorp/nomad/client/allocdir"
|
||||||
"github.com/hashicorp/nomad/nomad/structs"
|
"github.com/hashicorp/nomad/nomad/structs"
|
||||||
|
@ -33,6 +34,11 @@ import (
|
||||||
|
|
||||||
var errNoResources = fmt.Errorf("No resources are associated with this task")
|
var errNoResources = fmt.Errorf("No resources are associated with this task")
|
||||||
|
|
||||||
|
// If testModeEnvVar is set in a process's environment variables, the
|
||||||
|
// LinuxExecutor will detect it and inject the current binary into the chroot.
|
||||||
|
// This enables using the test binary in tests to provide portability.
|
||||||
|
var testModeEnvVar = "NOMAD_EXECUTOR_TEST_ONLY_13871827980214"
|
||||||
|
|
||||||
// Executor is an interface that any platform- or capability-specific exec
|
// Executor is an interface that any platform- or capability-specific exec
|
||||||
// wrapper must implement. You should not need to implement a Java executor.
|
// wrapper must implement. You should not need to implement a Java executor.
|
||||||
// Rather, you would implement a cgroups executor that the Java driver will use.
|
// Rather, you would implement a cgroups executor that the Java driver will use.
|
||||||
|
@ -106,3 +112,18 @@ func OpenId(id string) (Executor, error) {
|
||||||
}
|
}
|
||||||
return executor, nil
|
return executor, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// isTest returns whether the cmd is a test binary.
|
||||||
|
func isTest(cmd *exec.Cmd) bool {
|
||||||
|
if cmd == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, env := range cmd.Env {
|
||||||
|
if strings.HasPrefix(env, testModeEnvVar) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
|
@ -252,6 +252,13 @@ func (e *LinuxExecutor) ConfigureTaskDir(taskName string, alloc *allocdir.AllocD
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Embed ourselves if this is a test. This needs to be done so the test
|
||||||
|
// binary is inside the chroot.
|
||||||
|
if isTest(&e.cmd) {
|
||||||
|
bin := e.cmd.Args[0]
|
||||||
|
alloc.Embed(taskName, map[string]string{bin: bin})
|
||||||
|
}
|
||||||
|
|
||||||
if err := alloc.Embed(taskName, chrootEnv); err != nil {
|
if err := alloc.Embed(taskName, chrootEnv); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,19 +17,27 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// testBinary is the path to the running test binary
|
// testBinary is the path to the running test binary
|
||||||
var testBinary = os.Args[0]
|
var testBinary = func() string {
|
||||||
|
abs, err := filepath.Abs(os.Args[0])
|
||||||
|
if err != nil {
|
||||||
|
return err.Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
return abs
|
||||||
|
}()
|
||||||
|
|
||||||
func TestMain(m *testing.M) {
|
func TestMain(m *testing.M) {
|
||||||
// The tests in this package recursively execute the test binary produced
|
// The tests in this package recursively execute the test binary produced
|
||||||
// by go test. The TEST_MAIN environment variable controls the recursive
|
// by go test. The TEST_MAIN environment variable controls the recursive
|
||||||
// execution.
|
// execution.
|
||||||
switch tm := os.Getenv("TEST_MAIN"); tm {
|
switch tm := os.Getenv(testModeEnvVar); tm {
|
||||||
case "":
|
case "":
|
||||||
os.Exit(m.Run())
|
os.Exit(m.Run())
|
||||||
case "app":
|
case "app":
|
||||||
appMain()
|
appMain()
|
||||||
default:
|
default:
|
||||||
fmt.Fprintf(os.Stderr, "unexpected value for TEST_MAIN, \"%s\"\n", tm)
|
fmt.Fprintf(os.Stderr,
|
||||||
|
"Unexpected value for test mode environment variable, %q\n", tm)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -37,7 +45,7 @@ func TestMain(m *testing.M) {
|
||||||
// setTestAppEnv sets the environement of cmd for a recursive call into
|
// setTestAppEnv sets the environement of cmd for a recursive call into
|
||||||
// TestMain.
|
// TestMain.
|
||||||
func setTestAppEnv(cmd *exec.Cmd) {
|
func setTestAppEnv(cmd *exec.Cmd) {
|
||||||
cmd.Env = append(os.Environ(), "TEST_MAIN=app")
|
cmd.Env = append(os.Environ(), fmt.Sprintf("%v=app", testModeEnvVar))
|
||||||
}
|
}
|
||||||
|
|
||||||
func appMain() {
|
func appMain() {
|
||||||
|
|
Loading…
Reference in New Issue