| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018 |
- /*
- Copyright 2020 Docker Compose CLI authors
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package main
- import (
- "bytes"
- "context"
- "encoding/json"
- "errors"
- "fmt"
- "io/ioutil"
- "math/rand"
- "net/http"
- "net/url"
- "os"
- "path/filepath"
- "runtime"
- "strconv"
- "strings"
- "syscall"
- "testing"
- "time"
- "github.com/docker/docker/pkg/fileutils"
- "gotest.tools/v3/assert"
- is "gotest.tools/v3/assert/cmp"
- "gotest.tools/v3/icmd"
- "gotest.tools/v3/poll"
- "github.com/Azure/azure-sdk-for-go/profiles/2019-03-01/resources/mgmt/resources"
- "github.com/Azure/azure-storage-file-go/azfile"
- "github.com/Azure/go-autorest/autorest/to"
- "github.com/prometheus/tsdb/fileutil"
- "github.com/docker/compose-cli/aci"
- "github.com/docker/compose-cli/aci/convert"
- "github.com/docker/compose-cli/aci/login"
- "github.com/docker/compose-cli/api/containers"
- "github.com/docker/compose-cli/api/context/store"
- "github.com/docker/compose-cli/api/errdefs"
- "github.com/docker/compose-cli/cli/cmd"
- . "github.com/docker/compose-cli/utils/e2e"
- )
- const (
- contextName = "aci-test"
- )
- var (
- binDir string
- location = []string{"eastus2"}
- )
- func TestMain(m *testing.M) {
- p, cleanup, err := SetupExistingCLI()
- if err != nil {
- fmt.Println(err)
- os.Exit(1)
- }
- binDir = p
- exitCode := m.Run()
- cleanup()
- os.Exit(exitCode)
- }
- // Cannot be parallelized as login/logout is global.
- func TestLoginLogout(t *testing.T) {
- startTime := strconv.Itoa(int(time.Now().UnixNano()))
- c := NewE2eCLI(t, binDir)
- rg := "E2E-" + startTime
- t.Run("login", func(t *testing.T) {
- azureLogin(t, c)
- })
- t.Run("create context", func(t *testing.T) {
- sID := getSubscriptionID(t)
- location := getTestLocation()
- err := createResourceGroup(t, sID, rg, location)
- assert.Check(t, is.Nil(err))
- t.Cleanup(func() {
- _ = deleteResourceGroup(t, rg)
- })
- c.RunDockerCmd("context", "create", "aci", contextName, "--subscription-id", sID, "--resource-group", rg, "--location", location)
- res := c.RunDockerCmd("context", "use", contextName)
- res.Assert(t, icmd.Expected{Out: contextName})
- res = c.RunDockerCmd("context", "ls")
- res.Assert(t, icmd.Expected{Out: contextName + " *"})
- })
- t.Run("delete context", func(t *testing.T) {
- res := c.RunDockerCmd("context", "use", "default")
- res.Assert(t, icmd.Expected{Out: "default"})
- res = c.RunDockerCmd("context", "rm", contextName)
- res.Assert(t, icmd.Expected{Out: contextName})
- })
- t.Run("logout", func(t *testing.T) {
- _, err := os.Stat(login.GetTokenStorePath())
- assert.NilError(t, err)
- res := c.RunDockerCmd("logout", "azure")
- res.Assert(t, icmd.Expected{Out: "Removing login credentials for Azure"})
- _, err = os.Stat(login.GetTokenStorePath())
- errMsg := "no such file or directory"
- if runtime.GOOS == "windows" {
- errMsg = "The system cannot find the file specified"
- }
- assert.ErrorContains(t, err, errMsg)
- })
- t.Run("create context fail", func(t *testing.T) {
- res := c.RunDockerOrExitError("context", "create", "aci", "fail-context")
- res.Assert(t, icmd.Expected{
- ExitCode: errdefs.ExitCodeLoginRequired,
- Err: `not logged in to azure, you need to run "docker login azure" first`,
- })
- })
- }
- func getTestLocation() string {
- rand.Seed(time.Now().Unix())
- n := rand.Intn(len(location))
- return location[n]
- }
- func uploadTestFile(t *testing.T, aciContext store.AciContext, accountName string, fileshareName string, testFileName string, testFileContent string) {
- storageLogin := login.StorageLoginImpl{AciContext: aciContext}
- key, err := storageLogin.GetAzureStorageAccountKey(context.TODO(), accountName)
- assert.NilError(t, err)
- cred, err := azfile.NewSharedKeyCredential(accountName, key)
- assert.NilError(t, err)
- u, _ := url.Parse(fmt.Sprintf("https://%s.file.core.windows.net/%s", accountName, fileshareName))
- uploadFile(t, *cred, u.String(), testFileName, testFileContent)
- }
- const (
- fileshareName = "dockertestshare"
- fileshareName2 = "dockertestshare2"
- )
- func TestRunVolume(t *testing.T) {
- const (
- testFileContent = "Volume mounted successfully!"
- testFileName = "index.html"
- )
- c := NewParallelE2eCLI(t, binDir)
- sID, rg, location := setupTestResourceGroup(t, c)
- // Bootstrap volume
- aciContext := store.AciContext{
- SubscriptionID: sID,
- Location: location,
- ResourceGroup: rg,
- }
- // Used in subtests
- var (
- container string
- hostIP string
- endpoint string
- volumeID string
- accountName = "e2e" + strconv.Itoa(int(time.Now().UnixNano()))
- )
- t.Run("check empty volume name validity", func(t *testing.T) {
- invalidName := ""
- res := c.RunDockerOrExitError("volume", "create", "--storage-account", invalidName, fileshareName)
- res.Assert(t, icmd.Expected{
- ExitCode: 1,
- Err: `parameter=accountName constraint=MinLength value="" details: value length must be greater than or equal to 3`,
- })
- })
- t.Run("check volume name validity", func(t *testing.T) {
- invalidName := "some-storage-123"
- res := c.RunDockerOrExitError("volume", "create", "--storage-account", invalidName, fileshareName)
- res.Assert(t, icmd.Expected{
- ExitCode: 1,
- Err: "some-storage-123 is not a valid storage account name. Storage account name must be between 3 and 24 characters in length and use numbers and lower-case letters only.",
- })
- })
- t.Run("create volumes", func(t *testing.T) {
- c.RunDockerCmd("volume", "create", "--storage-account", accountName, fileshareName)
- })
- volumeID = accountName + "/" + fileshareName
- t.Cleanup(func() {
- c.RunDockerCmd("volume", "rm", volumeID)
- res := c.RunDockerCmd("volume", "ls")
- lines := Lines(res.Stdout())
- assert.Equal(t, len(lines), 1)
- })
- t.Run("create second fileshare", func(t *testing.T) {
- c.RunDockerCmd("volume", "create", "--storage-account", accountName, fileshareName2)
- })
- volumeID2 := accountName + "/" + fileshareName2
- t.Run("list volumes", func(t *testing.T) {
- res := c.RunDockerCmd("volume", "ls", "--quiet")
- l := Lines(res.Stdout())
- assert.Equal(t, len(l), 2)
- assert.Equal(t, l[0], volumeID)
- assert.Equal(t, l[1], volumeID2)
- res = c.RunDockerCmd("volume", "ls")
- l = Lines(res.Stdout())
- assert.Equal(t, len(l), 3)
- firstAccount := l[1]
- fields := strings.Fields(firstAccount)
- assert.Equal(t, fields[0], volumeID)
- secondAccount := l[2]
- fields = strings.Fields(secondAccount)
- assert.Equal(t, fields[0], volumeID2)
- })
- t.Run("inspect volumes", func(t *testing.T) {
- res := c.RunDockerCmd("volume", "inspect", volumeID)
- assert.Equal(t, res.Stdout(), fmt.Sprintf(`{
- "ID": %q,
- "Description": "Fileshare %s in %s storage account"
- }
- `, volumeID, fileshareName, accountName))
- res = c.RunDockerCmd("volume", "inspect", volumeID2)
- assert.Equal(t, res.Stdout(), fmt.Sprintf(`{
- "ID": %q,
- "Description": "Fileshare %s in %s storage account"
- }
- `, volumeID2, fileshareName2, accountName))
- })
- t.Run("delete only fileshare", func(t *testing.T) {
- c.RunDockerCmd("volume", "rm", volumeID2)
- res := c.RunDockerCmd("volume", "ls")
- lines := Lines(res.Stdout())
- assert.Equal(t, len(lines), 2)
- assert.Assert(t, !strings.Contains(res.Stdout(), fileshareName2), "second fileshare still visible after rm")
- })
- t.Run("upload file", func(t *testing.T) {
- uploadTestFile(t, aciContext, accountName, fileshareName, testFileName, testFileContent)
- })
- t.Run("run", func(t *testing.T) {
- mountTarget := "/usr/share/nginx/html"
- res := c.RunDockerCmd(
- "run", "-d",
- "-v", fmt.Sprintf("%s:%s", volumeID, mountTarget),
- "-p", "80:80",
- "nginx",
- )
- container = getContainerName(res.Stdout())
- })
- t.Run("inspect", func(t *testing.T) {
- res := c.RunDockerCmd("inspect", container)
- containerInspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- assert.Equal(t, containerInspect.Platform, "Linux")
- assert.Equal(t, containerInspect.HostConfig.CPULimit, 1.0)
- assert.Equal(t, containerInspect.HostConfig.CPUReservation, 1.0)
- assert.Equal(t, containerInspect.HostConfig.RestartPolicy, containers.RestartPolicyNone)
- assert.Assert(t, is.Len(containerInspect.Ports, 1))
- hostIP = containerInspect.Ports[0].HostIP
- endpoint = fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
- })
- t.Run("ps", func(t *testing.T) {
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- l := out[len(out)-1]
- assert.Assert(t, strings.Contains(l, container), "Looking for %q in line: %s", container, l)
- assert.Assert(t, strings.Contains(l, "nginx"))
- assert.Assert(t, strings.Contains(l, "Running"))
- assert.Assert(t, strings.Contains(l, hostIP+":80->80/tcp"))
- })
- t.Run("http get", func(t *testing.T) {
- output := HTTPGetWithRetry(t, endpoint, http.StatusOK, 2*time.Second, 20*time.Second)
- assert.Assert(t, strings.Contains(output, testFileContent), "Actual content: "+output)
- })
- t.Run("logs", func(t *testing.T) {
- res := c.RunDockerCmd("logs", container)
- res.Assert(t, icmd.Expected{Out: "GET"})
- })
- t.Run("exec", func(t *testing.T) {
- res := c.RunDockerOrExitError("exec", container, "pwd")
- assert.Assert(t, strings.Contains(res.Stdout(), "/"))
- res = c.RunDockerOrExitError("exec", container, "echo", "fail_with_argument")
- res.Assert(t, icmd.Expected{
- ExitCode: 1,
- Err: "ACI exec command does not accept arguments to the command. Only the binary should be specified",
- })
- })
- t.Run("logs follow", func(t *testing.T) {
- cmd := c.NewDockerCmd("logs", "--follow", container)
- res := icmd.StartCmd(cmd)
- checkUp := func(t poll.LogT) poll.Result {
- r, _ := http.Get(endpoint + "/is_up")
- if r != nil && r.StatusCode == http.StatusNotFound {
- return poll.Success()
- }
- return poll.Continue("waiting for container to serve request")
- }
- poll.WaitOn(t, checkUp, poll.WithDelay(1*time.Second), poll.WithTimeout(60*time.Second))
- assert.Assert(t, !strings.Contains(res.Stdout(), "/test"))
- checkLogs := func(t poll.LogT) poll.Result {
- if strings.Contains(res.Stdout(), "/test") {
- return poll.Success()
- }
- return poll.Continue("waiting for logs to contain /test")
- }
- // Do request on /test
- go func() {
- time.Sleep(3 * time.Second)
- _, _ = http.Get(endpoint + "/test")
- }()
- poll.WaitOn(t, checkLogs, poll.WithDelay(3*time.Second), poll.WithTimeout(20*time.Second))
- if runtime.GOOS == "windows" {
- err := res.Cmd.Process.Kill()
- assert.NilError(t, err)
- } else {
- err := res.Cmd.Process.Signal(syscall.SIGTERM)
- assert.NilError(t, err)
- }
- })
- t.Run("rm a running container", func(t *testing.T) {
- res := c.RunDockerOrExitError("rm", container)
- res.Assert(t, icmd.Expected{
- Err: fmt.Sprintf("Error: you cannot remove a running container %s. Stop the container before attempting removal or force remove", container),
- ExitCode: 1,
- })
- })
- t.Run("force rm", func(t *testing.T) {
- res := c.RunDockerCmd("rm", "-f", container)
- res.Assert(t, icmd.Expected{Out: container})
- checkStopped := func(t poll.LogT) poll.Result {
- res := c.RunDockerOrExitError("inspect", container)
- if res.ExitCode == 1 {
- return poll.Success()
- }
- return poll.Continue("waiting for container to stop")
- }
- poll.WaitOn(t, checkStopped, poll.WithDelay(5*time.Second), poll.WithTimeout(60*time.Second))
- })
- }
- func TestContainerRunAttached(t *testing.T) {
- c := NewParallelE2eCLI(t, binDir)
- _, groupID, location := setupTestResourceGroup(t, c)
- // Used in subtests
- var (
- container string = "test-container"
- endpoint string
- followLogsProcess *icmd.Result
- )
- t.Run("run attached limits", func(t *testing.T) {
- dnsLabelName := "nginx-" + groupID
- fqdn := dnsLabelName + "." + location + ".azurecontainer.io"
- cmd := c.NewDockerCmd(
- "run",
- "--name", container,
- "--restart", "on-failure",
- "--memory", "0.1G", "--cpus", "0.1",
- "-p", "80:80",
- "--domainname",
- dnsLabelName,
- "nginx",
- )
- followLogsProcess = icmd.StartCmd(cmd)
- checkRunning := func(t poll.LogT) poll.Result {
- res := c.RunDockerOrExitError("inspect", container)
- if res.ExitCode == 0 && strings.Contains(res.Stdout(), `"Status": "Running"`) && !strings.Contains(res.Stdout(), `"HostIP": ""`) {
- return poll.Success()
- }
- return poll.Continue("waiting for container to be running, current inspect result: \n%s", res.Combined())
- }
- poll.WaitOn(t, checkRunning, poll.WithDelay(5*time.Second), poll.WithTimeout(180*time.Second))
- inspectRes := c.RunDockerCmd("inspect", container)
- containerInspect, err := parseContainerInspect(inspectRes.Stdout())
- assert.NilError(t, err)
- assert.Equal(t, containerInspect.Platform, "Linux")
- assert.Equal(t, containerInspect.HostConfig.CPULimit, 0.1)
- assert.Equal(t, containerInspect.HostConfig.MemoryLimit, uint64(107374182))
- assert.Equal(t, containerInspect.HostConfig.CPUReservation, 0.1)
- assert.Equal(t, containerInspect.HostConfig.MemoryReservation, uint64(107374182))
- assert.Equal(t, containerInspect.HostConfig.RestartPolicy, containers.RestartPolicyOnFailure)
- assert.Assert(t, is.Len(containerInspect.Ports, 1))
- port := containerInspect.Ports[0]
- assert.Assert(t, port.HostIP != "", "empty hostIP, inspect: \n"+inspectRes.Stdout())
- assert.Equal(t, port.ContainerPort, uint32(80))
- assert.Equal(t, port.HostPort, uint32(80))
- assert.Equal(t, containerInspect.Config.FQDN, fqdn)
- endpoint = fmt.Sprintf("http://%s:%d", fqdn, port.HostPort)
- assert.Assert(t, !strings.Contains(followLogsProcess.Stdout(), "/test"))
- HTTPGetWithRetry(t, endpoint+"/test", http.StatusNotFound, 2*time.Second, 60*time.Second)
- checkLog := func(t poll.LogT) poll.Result {
- if strings.Contains(followLogsProcess.Stdout(), "/test") {
- return poll.Success()
- }
- return poll.Continue("waiting for logs to contain /test")
- }
- poll.WaitOn(t, checkLog, poll.WithDelay(1*time.Second), poll.WithTimeout(20*time.Second))
- })
- t.Run("stop wrong container", func(t *testing.T) {
- res := c.RunDockerOrExitError("stop", "unknown-container")
- res.Assert(t, icmd.Expected{
- Err: "Error: container unknown-container not found",
- ExitCode: 1,
- })
- })
- t.Run("stop container", func(t *testing.T) {
- res := c.RunDockerCmd("stop", container)
- res.Assert(t, icmd.Expected{Out: container})
- waitForStatus(t, c, container, "Terminated", "Node Stopped")
- })
- t.Run("check we stoppped following logs", func(t *testing.T) {
- // nolint errcheck
- followLogsStopped := waitWithTimeout(func() { followLogsProcess.Cmd.Process.Wait() }, 10*time.Second)
- assert.NilError(t, followLogsStopped, "Follow logs process did not stop after container is stopped")
- })
- t.Run("ps stopped container with --all", func(t *testing.T) {
- res := c.RunDockerCmd("ps", container)
- out := Lines(res.Stdout())
- assert.Assert(t, is.Len(out, 1))
- res = c.RunDockerCmd("ps", "--all", container)
- out = Lines(res.Stdout())
- assert.Assert(t, is.Len(out, 2))
- })
- t.Run("restart container", func(t *testing.T) {
- res := c.RunDockerOrExitError("start", container)
- //Flaky errors on restart : Code="ContainerGroupTransitioning" Message="The container group 'test-container' is still transitioning, please retry later."
- if res.ExitCode != 0 && strings.Contains(res.Stderr(), `Code="ContainerGroupTransitioning"`) {
- res = c.RunDockerOrExitError("rm", "-f", container)
- if strings.Contains(res.Stderr(), "unsupported protocol scheme") { // ...
- time.Sleep(1 * time.Second)
- c.RunDockerCmd("rm", "-f", container)
- }
- go func() { // this specific call to run sometimes does not come back when in this weird state, but the container is actually running fine
- c.RunDockerCmd("run",
- "--name", container, // don't reuse the container name, this container is in a weird state and blocks everything
- "--memory", "0.1G", "--cpus", "0.1",
- "nginx")
- fmt.Printf(" [%s] Finished docker run %s\n", t.Name(), container)
- }()
- waitForStatus(t, c, container, convert.StatusRunning)
- } else {
- res.Assert(t, icmd.Expected{Out: container})
- waitForStatus(t, c, container, convert.StatusRunning)
- }
- })
- t.Run("prune dry run", func(t *testing.T) {
- res := c.RunDockerCmd("prune", "--dry-run")
- assert.Equal(t, "Resources that would be deleted:\nTotal CPUs reclaimed: 0.00, total memory reclaimed: 0.00 GB\n", res.Stdout())
- res = c.RunDockerOrExitError("prune", "--dry-run", "--force")
- if strings.Contains(res.Stderr(), "unsupported protocol scheme") { //Flaky strange error on azure SDK call happening only during prune --force
- time.Sleep(1 * time.Second)
- res = c.RunDockerCmd("prune", "--dry-run", "--force")
- }
- assert.Equal(t, "Resources that would be deleted:\n"+container+"\nTotal CPUs reclaimed: 0.10, total memory reclaimed: 0.10 GB\n", res.Stdout())
- })
- t.Run("prune", func(t *testing.T) {
- res := c.RunDockerCmd("prune")
- assert.Equal(t, "Deleted resources:\nTotal CPUs reclaimed: 0.00, total memory reclaimed: 0.00 GB\n", res.Stdout())
- res = c.RunDockerCmd("ps")
- l := Lines(res.Stdout())
- assert.Equal(t, 2, len(l))
- res = c.RunDockerOrExitError("prune", "--force")
- if strings.Contains(res.Stderr(), "unsupported protocol scheme") { //Flaky strange error on azure SDK call happening only during prune --force
- time.Sleep(1 * time.Second)
- res = c.RunDockerCmd("prune", "--force")
- // After the retry, it seems prune has sometimes actually been executed, and we get zero thigs to delete again...
- assert.Assert(t, res.Stdout() == "Deleted resources:\n"+container+"\nTotal CPUs reclaimed: 0.10, total memory reclaimed: 0.10 GB\n" ||
- res.Stdout() == "Deleted resources:\nTotal CPUs reclaimed: 0.00, total memory reclaimed: 0.00 GB\n", res.Stdout())
- } else {
- assert.Equal(t, "Deleted resources:\n"+container+"\nTotal CPUs reclaimed: 0.10, total memory reclaimed: 0.10 GB\n", res.Stdout())
- }
- res = c.RunDockerCmd("ps", "--all")
- l = Lines(res.Stdout())
- assert.Equal(t, 1, len(l))
- })
- }
- func overwriteFileStorageAccount(t *testing.T, absComposefileName string, storageAccount string) {
- data, err := ioutil.ReadFile(absComposefileName)
- assert.NilError(t, err)
- override := strings.Replace(string(data), "dockertestvolumeaccount", storageAccount, 1)
- err = ioutil.WriteFile(absComposefileName, []byte(override), 0644)
- assert.NilError(t, err)
- }
- func TestUpSecretsResources(t *testing.T) {
- const (
- composeProjectName = "aci_test"
- web1 = composeProjectName + "_web1"
- web2 = composeProjectName + "_web2"
- secret1Name = "mytarget1"
- secret1Value = "myPassword1\n"
- secret2Name = "mysecret2"
- secret2Value = "another_password\n"
- )
- composefilePath := filepath.Join("aci_secrets_resources", "compose.yml")
- c := NewParallelE2eCLI(t, binDir)
- _, _, _ = setupTestResourceGroup(t, c)
- t.Run("compose up", func(t *testing.T) {
- c.RunDockerCmd("compose", "-f", composefilePath, "--project-name", composeProjectName, "up")
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- // Check 2 containers running
- assert.Assert(t, is.Len(out, 3))
- })
- t.Cleanup(func() {
- c.RunDockerCmd("compose", "--project-name", composeProjectName, "down")
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- assert.Equal(t, len(out), 1)
- })
- res := c.RunDockerCmd("inspect", web1)
- web1Inspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- res = c.RunDockerCmd("inspect", web2)
- web2Inspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- t.Run("read secrets in service 1", func(t *testing.T) {
- assert.Assert(t, is.Len(web1Inspect.Ports, 1))
- endpoint := fmt.Sprintf("http://%s:%d", web1Inspect.Ports[0].HostIP, web1Inspect.Ports[0].HostPort)
- output := HTTPGetWithRetry(t, endpoint+"/"+secret1Name, http.StatusOK, 2*time.Second, 20*time.Second)
- // replace windows carriage return
- output = strings.ReplaceAll(output, "\r", "")
- assert.Equal(t, output, secret1Value)
- output = HTTPGetWithRetry(t, endpoint+"/"+secret2Name, http.StatusOK, 2*time.Second, 20*time.Second)
- output = strings.ReplaceAll(output, "\r", "")
- assert.Equal(t, output, secret2Value)
- })
- t.Run("read secrets in service 2", func(t *testing.T) {
- assert.Assert(t, is.Len(web2Inspect.Ports, 1))
- endpoint := fmt.Sprintf("http://%s:%d", web2Inspect.Ports[0].HostIP, web2Inspect.Ports[0].HostPort)
- output := HTTPGetWithRetry(t, endpoint+"/"+secret2Name, http.StatusOK, 2*time.Second, 20*time.Second)
- output = strings.ReplaceAll(output, "\r", "")
- assert.Equal(t, output, secret2Value)
- HTTPGetWithRetry(t, endpoint+"/"+secret1Name, http.StatusNotFound, 2*time.Second, 20*time.Second)
- })
- t.Run("check resource limits", func(t *testing.T) {
- assert.Equal(t, web1Inspect.HostConfig.CPULimit, 0.7)
- assert.Equal(t, web1Inspect.HostConfig.MemoryLimit, uint64(1073741824))
- assert.Equal(t, web1Inspect.HostConfig.CPUReservation, 0.5)
- assert.Equal(t, web1Inspect.HostConfig.MemoryReservation, uint64(536870912))
- assert.Equal(t, web2Inspect.HostConfig.CPULimit, 0.5)
- assert.Equal(t, web2Inspect.HostConfig.MemoryLimit, uint64(751619276))
- assert.Equal(t, web2Inspect.HostConfig.CPUReservation, 0.5)
- assert.Equal(t, web2Inspect.HostConfig.MemoryReservation, uint64(751619276))
- })
- t.Run("check healthchecks inspect", func(t *testing.T) {
- assert.Assert(t, web1Inspect.Healthcheck != nil)
- assert.Equal(t, time.Duration(*web1Inspect.Healthcheck.Interval), 5*time.Second)
- assert.DeepEqual(t, web1Inspect.Healthcheck.Test, []string{"curl", "-f", "http://localhost:80/healthz"})
- assert.Assert(t, web2Inspect.Healthcheck == nil)
- })
- t.Run("healthcheck restart failed app", func(t *testing.T) {
- endpoint := fmt.Sprintf("http://%s:%d", web1Inspect.Ports[0].HostIP, web1Inspect.Ports[0].HostPort)
- HTTPGetWithRetry(t, endpoint+"/failtestserver", http.StatusOK, 3*time.Second, 3*time.Second)
- logs := c.RunDockerCmd("logs", web1).Combined()
- assert.Assert(t, strings.Contains(logs, "GET /healthz"))
- assert.Assert(t, strings.Contains(logs, "GET /failtestserver"))
- assert.Assert(t, strings.Contains(logs, "Server failing"))
- checkLogsReset := func(logt poll.LogT) poll.Result {
- res := c.RunDockerOrExitError("logs", web1)
- if res.ExitCode == 0 &&
- !strings.Contains(res.Combined(), "GET /failtestserver") &&
- strings.Contains(res.Combined(), "Listening on port 80") &&
- strings.Contains(res.Combined(), "GET /healthz") {
- return poll.Success()
- }
- return poll.Continue("Logs not reset by healcheck restart\n" + res.Combined())
- }
- poll.WaitOn(t, checkLogsReset, poll.WithDelay(5*time.Second), poll.WithTimeout(90*time.Second))
- res := c.RunDockerCmd("inspect", web1)
- web1Inspect, err = parseContainerInspect(res.Stdout())
- assert.Equal(t, web1Inspect.Status, "Running")
- })
- }
- func TestUpUpdate(t *testing.T) {
- const (
- composeProjectName = "acidemo"
- serverContainer = composeProjectName + "_web"
- wordsContainer = composeProjectName + "_words"
- dbContainer = composeProjectName + "_db"
- )
- var (
- singlePortVolumesComposefile = "aci_demo_port_volumes.yaml"
- multiPortComposefile = "demo_multi_port.yaml"
- )
- c := NewParallelE2eCLI(t, binDir)
- sID, groupID, location := setupTestResourceGroup(t, c)
- composeAccountName := strings.ToLower(strings.ReplaceAll(groupID, "-", "") + "sa")
- dstDir := filepath.Join(os.TempDir(), "e2e-aci-volume-"+composeAccountName)
- err := fileutil.CopyDirs("aci-demo", dstDir)
- assert.NilError(t, err)
- t.Cleanup(func() {
- assert.NilError(t, os.RemoveAll(dstDir))
- })
- _, err = fileutils.CopyFile(filepath.Join(filepath.Join("aci-demo"), multiPortComposefile), filepath.Join(dstDir, multiPortComposefile))
- assert.NilError(t, err)
- singlePortVolumesComposefile = filepath.Join(dstDir, singlePortVolumesComposefile)
- overwriteFileStorageAccount(t, singlePortVolumesComposefile, composeAccountName)
- multiPortComposefile = filepath.Join(dstDir, multiPortComposefile)
- volumeID := composeAccountName + "/" + fileshareName
- const (
- testFileName = "msg.txt"
- testFileContent = "VOLUME_OK"
- projectName = "acidemo"
- )
- var (
- dnsLabelName = "nginx-" + groupID
- fqdn = dnsLabelName + "." + location + ".azurecontainer.io"
- )
- t.Run("compose up", func(t *testing.T) {
- aciContext := store.AciContext{
- SubscriptionID: sID,
- Location: location,
- ResourceGroup: groupID,
- }
- c.RunDockerCmd("compose", "-f", singlePortVolumesComposefile, "--project-name", projectName, "up", "--domainname", dnsLabelName)
- // Volume should be autocreated by the "compose up"
- uploadTestFile(t, aciContext, composeAccountName, fileshareName, testFileName, testFileContent)
- })
- t.Cleanup(func() {
- c.RunDockerCmd("volume", "rm", volumeID)
- })
- t.Run("check deployed compose app", func(t *testing.T) {
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- // Check three containers are running
- assert.Assert(t, is.Len(out, 4))
- webRunning := false
- for _, l := range out {
- if strings.Contains(l, serverContainer) {
- webRunning = true
- assert.Check(t, strings.Contains(l, ":80->80/tcp"))
- }
- }
- assert.Assert(t, webRunning, "web container not running ; ps:\n"+res.Stdout())
- res = c.RunDockerCmd("inspect", serverContainer)
- containerInspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- assert.Assert(t, is.Len(containerInspect.Ports, 1))
- endpoint := fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
- output := HTTPGetWithRetry(t, endpoint+"/words/noun", http.StatusOK, 2*time.Second, 20*time.Second)
- assert.Assert(t, strings.Contains(output, `"word":`))
- endpoint = fmt.Sprintf("http://%s:%d", fqdn, containerInspect.Ports[0].HostPort)
- HTTPGetWithRetry(t, endpoint+"/words/noun", http.StatusOK, 2*time.Second, 20*time.Second)
- body := HTTPGetWithRetry(t, endpoint+"/volume_test/"+testFileName, http.StatusOK, 2*time.Second, 20*time.Second)
- assert.Assert(t, strings.Contains(body, testFileContent))
- // Try to remove the volume while it's still in use
- res = c.RunDockerOrExitError("volume", "rm", volumeID)
- res.Assert(t, icmd.Expected{
- ExitCode: 1,
- Err: fmt.Sprintf(`Error: volume "%s/%s" is used in container group %q`,
- composeAccountName, fileshareName, projectName),
- })
- })
- t.Run("compose ps", func(t *testing.T) {
- res := c.RunDockerCmd("compose", "--project-name", composeProjectName, "ps", "--quiet")
- l := Lines(res.Stdout())
- assert.Assert(t, is.Len(l, 3))
- res = c.RunDockerCmd("compose", "--project-name", composeProjectName, "ps")
- l = Lines(res.Stdout())
- assert.Assert(t, is.Len(l, 4))
- var wordsDisplayed, webDisplayed, dbDisplayed bool
- for _, line := range l {
- fields := strings.Fields(line)
- name := fields[0]
- switch name {
- case wordsContainer:
- wordsDisplayed = true
- assert.Equal(t, fields[2], "Running")
- case dbContainer:
- dbDisplayed = true
- assert.Equal(t, fields[2], "Running")
- case serverContainer:
- webDisplayed = true
- assert.Equal(t, fields[2], "Running")
- assert.Check(t, strings.Contains(fields[3], ":80->80/tcp"))
- }
- }
- assert.Check(t, webDisplayed, "webDisplayed"+res.Stdout())
- assert.Check(t, wordsDisplayed, "wordsDisplayed"+res.Stdout())
- assert.Check(t, dbDisplayed, "dbDisplayed"+res.Stdout())
- assert.Check(t, webDisplayed && wordsDisplayed && dbDisplayed, "\n%s\n", res.Stdout())
- })
- t.Run("compose ls", func(t *testing.T) {
- res := c.RunDockerCmd("compose", "ls", "--quiet")
- l := Lines(res.Stdout())
- assert.Assert(t, is.Len(l, 1))
- res = c.RunDockerCmd("compose", "ls")
- l = Lines(res.Stdout())
- assert.Equal(t, 2, len(l))
- fields := strings.Fields(l[1])
- assert.Equal(t, 2, len(fields))
- assert.Equal(t, fields[0], composeProjectName)
- assert.Equal(t, "Running", fields[1])
- })
- t.Run("logs web", func(t *testing.T) {
- res := c.RunDockerCmd("logs", serverContainer)
- res.Assert(t, icmd.Expected{Out: "Listening on port 80"})
- })
- t.Run("update", func(t *testing.T) {
- c.RunDockerCmd("compose", "-f", multiPortComposefile, "--project-name", composeProjectName, "up")
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- // Check three containers are running
- assert.Assert(t, is.Len(out, 4))
- for _, cName := range []string{serverContainer, wordsContainer} {
- res = c.RunDockerCmd("inspect", cName)
- containerInspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- assert.Assert(t, is.Len(containerInspect.Ports, 1))
- endpoint := fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
- var route string
- switch cName {
- case serverContainer:
- route = "/words/noun"
- assert.Equal(t, containerInspect.Ports[0].HostPort, uint32(80))
- assert.Equal(t, containerInspect.Ports[0].ContainerPort, uint32(80))
- case wordsContainer:
- route = "/noun"
- assert.Equal(t, containerInspect.Ports[0].HostPort, uint32(8080))
- assert.Equal(t, containerInspect.Ports[0].ContainerPort, uint32(8080))
- }
- HTTPGetWithRetry(t, endpoint+route, http.StatusOK, 1*time.Second, 60*time.Second)
- res = c.RunDockerCmd("ps")
- p := containerInspect.Ports[0]
- res.Assert(t, icmd.Expected{
- Out: fmt.Sprintf("%s:%d->%d/tcp", p.HostIP, p.HostPort, p.ContainerPort),
- })
- }
- })
- t.Run("down", func(t *testing.T) {
- c.RunDockerCmd("compose", "--project-name", composeProjectName, "down")
- res := c.RunDockerCmd("ps")
- out := Lines(res.Stdout())
- assert.Equal(t, len(out), 1)
- })
- }
- /*
- func TestRunEnvVars(t *testing.T) {
- c := NewParallelE2eCLI(t, binDir)
- _, _, _ = setupTestResourceGroup(t, c)
- t.Run("run", func(t *testing.T) {
- cmd := c.NewDockerCmd(
- "run", "-d",
- "-e", "MYSQL_ROOT_PASSWORD=rootpwd",
- "-e", "MYSQL_DATABASE=mytestdb",
- "-e", "MYSQL_USER",
- "-e", "MYSQL_PASSWORD=userpwd",
- "-e", "DATASOURCE_URL=jdbc:mysql://mydb.mysql.database.azure.com/db1?useSSL=true&requireSSL=false&serverTimezone=America/Recife",
- "mysql:5.7",
- )
- cmd.Env = append(cmd.Env, "MYSQL_USER=user1")
- res := icmd.RunCmd(cmd)
- res.Assert(t, icmd.Success)
- out := Lines(res.Stdout())
- container := strings.TrimSpace(out[len(out)-1])
- res = c.RunDockerCmd("inspect", container)
- containerInspect, err := ParseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- assert.Assert(t, containerInspect.Config != nil, "nil container config")
- assert.Assert(t, containerInspect.Config.Env != nil, "nil container env variables")
- assert.Equal(t, containerInspect.Image, "mysql:5.7")
- envVars := containerInspect.Config.Env
- assert.Equal(t, len(envVars), 5)
- assert.Equal(t, envVars["MYSQL_ROOT_PASSWORD"], "rootpwd")
- assert.Equal(t, envVars["MYSQL_DATABASE"], "mytestdb")
- assert.Equal(t, envVars["MYSQL_USER"], "user1")
- assert.Equal(t, envVars["MYSQL_PASSWORD"], "userpwd")
- assert.Equal(t, envVars["DATASOURCE_URL"], "jdbc:mysql://mydb.mysql.database.azure.com/db1?useSSL=true&requireSSL=false&serverTimezone=America/Recife")
- check := func(t poll.LogT) poll.Result {
- res := c.RunDockerOrExitError("logs", container)
- if strings.Contains(res.Stdout(), "Giving user user1 access to schema mytestdb") {
- return poll.Success()
- }
- return poll.Continue("waiting for DB container to be up\n%s", res.Combined())
- }
- poll.WaitOn(t, check, poll.WithDelay(5*time.Second), poll.WithTimeout(90*time.Second))
- })
- }
- */
- func setupTestResourceGroup(t *testing.T, c *E2eCLI) (string, string, string) {
- startTime := strconv.Itoa(int(time.Now().Unix()))
- rg := "E2E-" + t.Name() + "-" + startTime[5:]
- azureLogin(t, c)
- sID := getSubscriptionID(t)
- location := getTestLocation()
- err := createResourceGroup(t, sID, rg, location)
- assert.Check(t, is.Nil(err))
- t.Cleanup(func() {
- if err := deleteResourceGroup(t, rg); err != nil {
- t.Error(err)
- }
- })
- createAciContextAndUseIt(t, c, sID, rg, location)
- // Check nothing is running
- res := c.RunDockerCmd("ps")
- assert.Assert(t, is.Len(Lines(res.Stdout()), 1))
- return sID, rg, location
- }
- func deleteResourceGroup(t *testing.T, rgName string) error {
- fmt.Printf(" [%s] deleting resource group %s\n", t.Name(), rgName)
- ctx := context.TODO()
- helper := aci.NewACIResourceGroupHelper()
- models, err := helper.GetSubscriptionIDs(ctx)
- if err != nil {
- return err
- }
- if len(models) == 0 {
- return errors.New("unable to delete resource group: no models")
- }
- return helper.DeleteAsync(ctx, *models[0].SubscriptionID, rgName)
- }
- func azureLogin(t *testing.T, c *E2eCLI) {
- // in order to create new service principal and get these 3 values : `az ad sp create-for-rbac --name 'TestServicePrincipal' --sdk-auth`
- clientID := os.Getenv("AZURE_CLIENT_ID")
- clientSecret := os.Getenv("AZURE_CLIENT_SECRET")
- tenantID := os.Getenv("AZURE_TENANT_ID")
- assert.Check(t, clientID != "", "AZURE_CLIENT_ID must not be empty")
- assert.Check(t, clientSecret != "", "AZURE_CLIENT_SECRET must not be empty")
- assert.Check(t, tenantID != "", "AZURE_TENANT_ID must not be empty")
- c.RunDockerCmd("login", "azure", "--client-id", clientID, "--client-secret", clientSecret, "--tenant-id", tenantID)
- }
- func getSubscriptionID(t *testing.T) string {
- ctx := context.TODO()
- helper := aci.NewACIResourceGroupHelper()
- models, err := helper.GetSubscriptionIDs(ctx)
- assert.Check(t, is.Nil(err))
- assert.Check(t, len(models) == 1)
- return *models[0].SubscriptionID
- }
- func createResourceGroup(t *testing.T, sID, rgName string, location string) error {
- fmt.Printf(" [%s] creating resource group %s\n", t.Name(), rgName)
- helper := aci.NewACIResourceGroupHelper()
- _, err := helper.CreateOrUpdate(context.TODO(), sID, rgName, resources.Group{Location: to.StringPtr(location)})
- return err
- }
- func createAciContextAndUseIt(t *testing.T, c *E2eCLI, sID, rgName string, location string) {
- res := c.RunDockerCmd("context", "create", "aci", contextName, "--subscription-id", sID, "--resource-group", rgName, "--location", location)
- res.Assert(t, icmd.Expected{Out: "Successfully created aci context \"" + contextName + "\""})
- res = c.RunDockerCmd("context", "use", contextName)
- res.Assert(t, icmd.Expected{Out: contextName})
- res = c.RunDockerCmd("context", "ls")
- res.Assert(t, icmd.Expected{Out: contextName + " *"})
- }
- func uploadFile(t *testing.T, cred azfile.SharedKeyCredential, baseURL, fileName, content string) {
- fURL, err := url.Parse(baseURL + "/" + fileName)
- assert.NilError(t, err)
- fileURL := azfile.NewFileURL(*fURL, azfile.NewPipeline(&cred, azfile.PipelineOptions{}))
- err = azfile.UploadBufferToAzureFile(context.TODO(), []byte(content), fileURL, azfile.UploadToAzureFileOptions{})
- assert.NilError(t, err)
- }
- func getContainerName(stdout string) string {
- out := Lines(stdout)
- return strings.TrimSpace(out[len(out)-1])
- }
- func waitForStatus(t *testing.T, c *E2eCLI, containerID string, statuses ...string) {
- checkStopped := func(logt poll.LogT) poll.Result {
- res := c.RunDockerOrExitError("inspect", containerID)
- if res.Error != nil {
- return poll.Continue("Error while inspecting container %s: %s", containerID, res.Combined())
- }
- containerInspect, err := parseContainerInspect(res.Stdout())
- assert.NilError(t, err)
- for _, status := range statuses {
- if containerInspect.Status == status {
- return poll.Success()
- }
- }
- return poll.Continue("Status %s != %s (expected) for container %s", containerInspect.Status, statuses, containerID)
- }
- poll.WaitOn(t, checkStopped, poll.WithDelay(5*time.Second), poll.WithTimeout(90*time.Second))
- }
- func parseContainerInspect(stdout string) (*cmd.ContainerInspectView, error) {
- var res cmd.ContainerInspectView
- rdr := bytes.NewReader([]byte(stdout))
- if err := json.NewDecoder(rdr).Decode(&res); err != nil {
- return nil, err
- }
- return &res, nil
- }
- func waitWithTimeout(blockingCall func(), timeout time.Duration) error {
- c := make(chan struct{})
- go func() {
- defer close(c)
- blockingCall()
- }()
- select {
- case <-c:
- return nil
- case <-time.After(timeout):
- return fmt.Errorf("Timed out after %s", timeout)
- }
- }
|