open-nomad/e2e
Tim Gross e687a21da9
CSI: set plugin CSI_ENDPOINT env var only if unset by user (#12257)
* Use unix:// prefix for CSI_ENDPOINT variable by default
* Some plugins have strict validation over the format of the
  `CSI_ENDPOINT` variable, and unfortunately not all plugins
  agree. Allow the user to override the `CSI_ENDPOINT` to workaround
  those cases.
* Update all demos and tests with CSI_ENDPOINT
2022-03-21 11:48:47 -04:00
..
affinities
bin
cli
clientstate e2e: have e2e use ci.Parallel 2022-03-17 08:37:34 -05:00
connect E2E: ensure ConnectACLsE2ETest has clean state before starting (#12334) 2022-03-21 11:05:02 -04:00
consul E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
consulacls
consultemplate
csi CSI: set plugin CSI_ENDPOINT env var only if unset by user (#12257) 2022-03-21 11:48:47 -04:00
deployment
e2eutil e2e: use context for executing external commands (#12185) 2022-03-04 08:55:36 -05:00
eval_priority
events
example
execagent
framework e2e: have e2e use ci.Parallel 2022-03-17 08:37:34 -05:00
isolation
lifecycle
metrics E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
namespaces
networking
nodedrain E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
nomad09upgrade ci: missing import for nomad09upgrade 2022-03-17 08:49:15 -05:00
nomadexec
oversubscription
parameterized
periodic
podman
quotas
remotetasks
rescheduling
scaling
scalingpolicies
scheduler_sysbatch
scheduler_system
spread
taskevents
terraform E2E with HCP Consul/Vault (#12267) 2022-03-18 09:27:28 -04:00
upgrades
vaultcompat
vaultsecrets e2e: use context for executing external commands (#12185) 2022-03-04 08:55:36 -05:00
volumes
.gitignore
e2e_test.go
README.md

End to End Tests

This package contains integration tests. Unlike tests alongside Nomad code, these tests expect there to already be a functional Nomad cluster accessible (either on localhost or via the NOMAD_ADDR env var).

See framework/doc.go for how to write tests.

The NOMAD_E2E=1 environment variable must be set for these tests to run.

Provisioning Test Infrastructure on AWS

The terraform/ folder has provisioning code to spin up a Nomad cluster on AWS. You'll need both Terraform and AWS credentials to setup AWS instances on which e2e tests will run. See the README for details. The number of servers and clients is configurable, as is the specific build of Nomad to deploy and the configuration file for each client and server.

Provisioning Local Clusters

To run tests against a local cluster, you'll need to make sure the following environment variables are set:

  • NOMAD_ADDR should point to one of the Nomad servers
  • CONSUL_HTTP_ADDR should point to one of the Consul servers
  • NOMAD_E2E=1

TODO: the scripts in ./bin currently work only with Terraform, it would be nice for us to have a way to deploy Nomad to Vagrant or local clusters.

Running

After completing the provisioning step above, you can set the client environment for NOMAD_ADDR and run the tests as shown below:

# from the ./e2e/terraform directory, set your client environment
# if you haven't already
$(terraform output environment)

cd ..
go test -v .

If you want to run a specific suite, you can specify the -suite flag as shown below. Only the suite with a matching Framework.TestSuite.Component will be run, and all others will be skipped.

go test -v -suite=Consul .

If you want to run a specific test, you'll need to regex-escape some of the test's name so that the test runner doesn't skip over framework struct method names in the full name of the tests:

go test -v . -run 'TestE2E/Consul/\*consul\.ScriptChecksE2ETest/TestGroup'
                              ^       ^             ^               ^
                              |       |             |               |
                          Component   |             |           Test func
                                      |             |
                                  Go Package      Struct

I Want To...

...SSH Into One Of The Test Machines

You can use the Terraform output to find the IP address. The keys will in the ./terraform/keys/ directory.

ssh -i keys/nomad-e2e-*.pem ubuntu@${EC2_IP_ADDR}

Run terraform output for IP addresses and details.

...Deploy a Cluster of Mixed Nomad Versions

The variables.tf file describes the nomad_version, and nomad_local_binary variables that can be used for most circumstances. But if you want to deploy mixed Nomad versions, you can provide a list of versions in your terraform.tfvars file.

For example, if you want to provision 3 servers all using Nomad 0.12.1, and 2 Linux clients using 0.12.1 and 0.12.2, you can use the following variables:

# will be used for servers
nomad_version = "0.12.1"

# will override the nomad_version for Linux clients
nomad_version_client_linux = [
    "0.12.1",
    "0.12.2"
]

...Deploy Custom Configuration Files

Set the profile field to "custom" and put the configuration files in ./terraform/config/custom/ as described in the README.

...Deploy More Than 4 Linux Clients

Use the "custom" profile as described above.

...Change the Nomad Version After Provisioning

You can update the nomad_version variable, or simply rebuild the binary you have at the nomad_local_binary path so that Terraform picks up the changes. Then run terraform plan/terraform apply again. This will update Nomad in place, making the minimum amount of changes necessary.