open-nomad/e2e
Michael Schurter 0a496c845e
Task API via Unix Domain Socket (#15864)
This change introduces the Task API: a portable way for tasks to access Nomad's HTTP API. This particular implementation uses a Unix Domain Socket and, unlike the agent's HTTP API, always requires authentication even if ACLs are disabled.

This PR contains the core feature and tests but followup work is required for the following TODO items:

- Docs - might do in a followup since dynamic node metadata / task api / workload id all need to interlink
- Unit tests for auth middleware
- Caching for auth middleware
- Rate limiting on negative lookups for auth middleware

---------

Co-authored-by: Seth Hoenig <shoenig@duck.com>
2023-02-06 11:31:22 -08:00
..
acl e2e: do not assume clean cluster when checking return objects. (#14557) 2022-09-13 14:25:19 +02:00
affinities e2e: setup consul ACLs a little more correctly 2020-01-31 19:06:11 -06:00
artifact artifact: fix sandbox behavior when destination is shared alloc directory (#15712) 2023-01-09 09:46:32 -06:00
bin scripts: fix interpreter for bash (#12549) 2022-04-12 10:08:21 -04:00
clientstate e2e: have e2e use ci.Parallel 2022-03-17 08:37:34 -05:00
connect e2e: use unique names for Connect ACL Consul policy names. (#14604) 2022-09-16 13:35:40 +02:00
consul consul: restore consul token when reverting a job (#15996) 2023-02-01 14:02:45 -06:00
consultemplate renamed stanza to block for consistency with other projects (#15941) 2023-01-30 15:48:43 +01:00
csi E2E: set longer timeout for CSI plugin alloc start (#12732) 2022-04-21 11:11:43 -04:00
deployment e2e: setup consul ACLs a little more correctly 2020-01-31 19:06:11 -06:00
disconnectedclients e2e: disable disconnected clients test(s) (#15703) 2023-01-06 08:52:37 -06:00
e2eutil Add option to expose workload token to task (#15755) 2023-02-02 10:59:14 -08:00
eval_priority core: allow setting and propagation of eval priority on job de/registration (#11532) 2021-11-23 09:23:31 +01:00
events api: remove mapstructure tags fromPort struct (#12916) 2022-11-08 11:26:28 +01:00
example E2E: move example test to use golangs stdlib test runner (#12383) 2022-03-25 14:44:16 -04:00
execagent Apply some suggested fixes from staticcheck (#9598) 2020-12-10 07:29:18 -08:00
framework vault: configure user agent on Nomad vault clients (#15745) 2023-01-10 10:39:45 -06:00
isolation e2e: explicitly wait on task status in chroot download exec test (#15145) 2022-11-04 09:50:11 -05:00
lifecycle chore: fix incorrect docstring formatting. 2021-08-30 11:08:12 +02:00
metrics E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
namespaces e2e: fix incorrect must function usage in namespace suite. (#14805) 2022-10-05 15:50:56 +02:00
networking scripts: fix interpreter for bash (#12549) 2022-04-12 10:08:21 -04:00
nodedrain E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
nomadexec e2e: stop suppressing unexpected EOF errors 2021-05-24 13:35:08 -04:00
operator_scheduler core: allow pausing and un-pausing of leader broker routine (#13045) 2022-07-06 16:13:48 +02:00
overlap test: use port collision instead of cpu exhaustion (#14994) 2022-10-21 07:53:26 -07:00
oversubscription e2e: fixup oversubscription test case for jammy (#15347) 2022-11-21 12:41:55 -06:00
parameterized Add a test for parameterized summary counts 2021-03-25 11:27:09 -04:00
periodic Add a test for parameterized summary counts 2021-03-25 11:27:09 -04:00
podman e2e: ensure tests are constrained to Linux (#8990) 2020-09-30 09:43:30 -04:00
quotas gofmt all the files 2021-10-01 10:14:28 -04:00
remotetasks comment out unused consts to make linter happy 2021-04-30 08:31:31 -07:00
rescheduling e2e: account for new job stop CLI exit behaviour. 2022-02-01 14:16:37 +01:00
scaling cleanup: replace TypeToPtr helper methods with pointer.Of (#14151) 2022-08-17 18:26:34 +02:00
scalingpolicies e2e: account for new job stop CLI exit behaviour. 2022-02-01 14:16:37 +01:00
scheduler_sysbatch Allow specification of a custom job name/prefix for parameterized jobs (#14631) 2022-10-06 16:21:40 -04:00
scheduler_system e2e: Run system jobs on all datacenters (#11060) 2021-08-17 11:01:47 -04:00
servicediscovery nsd: block on removal of services (#15862) 2023-01-26 08:17:57 -06:00
spread e2e: fixup reference to exported test type (#15786) 2023-01-17 12:13:57 -06:00
taskevents e2e: use testify requires instead of t.Fatal 2021-01-26 09:14:47 -05:00
terraform e2e: fix 1 of 4 client disconnect tests (#15357) 2022-11-22 08:51:53 -06:00
ui e2e: upgrade playwright package and container image (#13080) 2022-05-20 08:41:07 -04:00
upgrades script e2e/upgrades: cluster upgrade scripts 2019-09-24 14:35:45 -04:00
vaultcompat cleanup: replace TypeToPtr helper methods with pointer.Of (#14151) 2022-08-17 18:26:34 +02:00
vaultsecrets e2e: use context for executing external commands (#12185) 2022-03-04 08:55:36 -05:00
volumes E2E: move volume mounts test to use golang's stdlib test runner (#12788) 2022-04-26 14:28:20 -04:00
workload_id Task API via Unix Domain Socket (#15864) 2023-02-06 11:31:22 -08:00
.gitignore e2e: have TF write-out HCL for CSI volume registration (#7599) 2020-04-02 12:16:43 -04:00
e2e_test.go e2e: move namespaces test out of legacy framework (#13934) 2022-08-01 13:24:34 -04:00
README.md E2E: move example test to use golangs stdlib test runner (#12383) 2022-03-25 14:44:16 -04:00

End to End Tests

This package contains integration tests. Unlike tests alongside Nomad code, these tests expect there to already be a functional Nomad cluster accessible (either on localhost or via the NOMAD_ADDR env var).

See framework/doc.go for how to write tests.

The NOMAD_E2E=1 environment variable must be set for these tests to run.

Provisioning Test Infrastructure on AWS

The terraform/ folder has provisioning code to spin up a Nomad cluster on AWS. You'll need both Terraform and AWS credentials to setup AWS instances on which e2e tests will run. See the README for details. The number of servers and clients is configurable, as is the specific build of Nomad to deploy and the configuration file for each client and server.

Provisioning Local Clusters

To run tests against a local cluster, you'll need to make sure the following environment variables are set:

  • NOMAD_ADDR should point to one of the Nomad servers
  • CONSUL_HTTP_ADDR should point to one of the Consul servers
  • NOMAD_E2E=1

TODO: the scripts in ./bin currently work only with Terraform, it would be nice for us to have a way to deploy Nomad to Vagrant or local clusters.

Running

After completing the provisioning step above, you can set the client environment for NOMAD_ADDR and run the tests as shown below:

# from the ./e2e/terraform directory, set your client environment
# if you haven't already
$(terraform output environment)

cd ..
go test -v ./...

If you want to run a specific suite, you can specify the -suite flag as shown below. Only the suite with a matching Framework.TestSuite.Component will be run, and all others will be skipped.

go test -v -suite=Consul .

If you want to run a specific test, you'll need to regex-escape some of the test's name so that the test runner doesn't skip over framework struct method names in the full name of the tests:

go test -v . -run 'TestE2E/Consul/\*consul\.ScriptChecksE2ETest/TestGroup'
                              ^       ^             ^               ^
                              |       |             |               |
                          Component   |             |           Test func
                                      |             |
                                  Go Package      Struct

We're also in the process of migrating to "stdlib-style" tests that use the standard go testing package without a notion of "suite". You can run these with -run regexes the same way you would any other go test:

go test -v . -run TestExample/TestExample_Simple

I Want To...

...SSH Into One Of The Test Machines

You can use the Terraform output to find the IP address. The keys will in the ./terraform/keys/ directory.

ssh -i keys/nomad-e2e-*.pem ubuntu@${EC2_IP_ADDR}

Run terraform output for IP addresses and details.

...Deploy a Cluster of Mixed Nomad Versions

The variables.tf file describes the nomad_version, and nomad_local_binary variables that can be used for most circumstances. But if you want to deploy mixed Nomad versions, you can provide a list of versions in your terraform.tfvars file.

For example, if you want to provision 3 servers all using Nomad 0.12.1, and 2 Linux clients using 0.12.1 and 0.12.2, you can use the following variables:

# will be used for servers
nomad_version = "0.12.1"

# will override the nomad_version for Linux clients
nomad_version_client_linux = [
    "0.12.1",
    "0.12.2"
]

...Deploy Custom Configuration Files

Set the profile field to "custom" and put the configuration files in ./terraform/config/custom/ as described in the README.

...Deploy More Than 4 Linux Clients

Use the "custom" profile as described above.

...Change the Nomad Version After Provisioning

You can update the nomad_version variable, or simply rebuild the binary you have at the nomad_local_binary path so that Terraform picks up the changes. Then run terraform plan/terraform apply again. This will update Nomad in place, making the minimum amount of changes necessary.