e2e-aci_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722
  1. /*
  2. Copyright 2020 Docker, Inc.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package main
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "io/ioutil"
  19. "net/http"
  20. "net/url"
  21. "os"
  22. "runtime"
  23. "strconv"
  24. "strings"
  25. "syscall"
  26. "testing"
  27. "time"
  28. "github.com/docker/compose-cli/aci/convert"
  29. "gotest.tools/v3/assert"
  30. is "gotest.tools/v3/assert/cmp"
  31. "gotest.tools/v3/icmd"
  32. "gotest.tools/v3/poll"
  33. "github.com/Azure/azure-sdk-for-go/profiles/2019-03-01/resources/mgmt/resources"
  34. azure_storage "github.com/Azure/azure-sdk-for-go/profiles/2019-03-01/storage/mgmt/storage"
  35. "github.com/Azure/azure-storage-file-go/azfile"
  36. "github.com/Azure/go-autorest/autorest/to"
  37. "github.com/docker/compose-cli/aci"
  38. "github.com/docker/compose-cli/aci/login"
  39. "github.com/docker/compose-cli/api/containers"
  40. "github.com/docker/compose-cli/context/store"
  41. "github.com/docker/compose-cli/errdefs"
  42. "github.com/docker/compose-cli/tests/aci-e2e/storage"
  43. . "github.com/docker/compose-cli/tests/framework"
  44. )
  45. const (
  46. contextName = "aci-test"
  47. location = "eastus2"
  48. )
  49. var binDir string
  50. func TestMain(m *testing.M) {
  51. p, cleanup, err := SetupExistingCLI()
  52. if err != nil {
  53. fmt.Println(err)
  54. os.Exit(1)
  55. }
  56. binDir = p
  57. exitCode := m.Run()
  58. cleanup()
  59. os.Exit(exitCode)
  60. }
  61. // Cannot be parallelized as login/logout is global.
  62. func TestLoginLogout(t *testing.T) {
  63. startTime := strconv.Itoa(int(time.Now().UnixNano()))
  64. c := NewE2eCLI(t, binDir)
  65. rg := "E2E-" + startTime
  66. t.Run("login", func(t *testing.T) {
  67. azureLogin(t, c)
  68. })
  69. t.Run("create context", func(t *testing.T) {
  70. sID := getSubscriptionID(t)
  71. err := createResourceGroup(t, sID, rg)
  72. assert.Check(t, is.Nil(err))
  73. t.Cleanup(func() {
  74. _ = deleteResourceGroup(t, rg)
  75. })
  76. c.RunDockerCmd("context", "create", "aci", contextName, "--subscription-id", sID, "--resource-group", rg, "--location", location)
  77. res := c.RunDockerCmd("context", "use", contextName)
  78. res.Assert(t, icmd.Expected{Out: contextName})
  79. res = c.RunDockerCmd("context", "ls")
  80. res.Assert(t, icmd.Expected{Out: contextName + " *"})
  81. })
  82. t.Run("delete context", func(t *testing.T) {
  83. res := c.RunDockerCmd("context", "use", "default")
  84. res.Assert(t, icmd.Expected{Out: "default"})
  85. res = c.RunDockerCmd("context", "rm", contextName)
  86. res.Assert(t, icmd.Expected{Out: contextName})
  87. })
  88. t.Run("logout", func(t *testing.T) {
  89. _, err := os.Stat(login.GetTokenStorePath())
  90. assert.NilError(t, err)
  91. res := c.RunDockerCmd("logout", "azure")
  92. res.Assert(t, icmd.Expected{Out: "Removing login credentials for Azure"})
  93. _, err = os.Stat(login.GetTokenStorePath())
  94. errMsg := "no such file or directory"
  95. if runtime.GOOS == "windows" {
  96. errMsg = "The system cannot find the file specified"
  97. }
  98. assert.ErrorContains(t, err, errMsg)
  99. })
  100. t.Run("create context fail", func(t *testing.T) {
  101. res := c.RunDockerOrExitError("context", "create", "aci", "fail-context")
  102. res.Assert(t, icmd.Expected{
  103. ExitCode: errdefs.ExitCodeLoginRequired,
  104. Err: `not logged in to azure, you need to run "docker login azure" first`,
  105. })
  106. })
  107. }
  108. func TestContainerRunVolume(t *testing.T) {
  109. c := NewParallelE2eCLI(t, binDir)
  110. sID, rg := setupTestResourceGroup(t, c)
  111. const (
  112. testShareName = "dockertestshare"
  113. testFileContent = "Volume mounted successfully!"
  114. testFileName = "index.html"
  115. )
  116. // Bootstrap volume
  117. aciContext := store.AciContext{
  118. SubscriptionID: sID,
  119. Location: location,
  120. ResourceGroup: rg,
  121. }
  122. saName := "e2e" + strconv.Itoa(int(time.Now().UnixNano()))
  123. _, cleanupSa := createStorageAccount(t, aciContext, saName)
  124. t.Cleanup(func() {
  125. if err := cleanupSa(); err != nil {
  126. t.Error(err)
  127. }
  128. })
  129. keys := getStorageKeys(t, aciContext, saName)
  130. assert.Assert(t, len(keys) > 0)
  131. k := *keys[0].Value
  132. cred, u := createFileShare(t, k, testShareName, saName)
  133. uploadFile(t, *cred, u.String(), testFileName, testFileContent)
  134. // Used in subtests
  135. var (
  136. container string
  137. hostIP string
  138. endpoint string
  139. )
  140. t.Run("run", func(t *testing.T) {
  141. mountTarget := "/usr/share/nginx/html"
  142. res := c.RunDockerCmd(
  143. "run", "-d",
  144. "-v", fmt.Sprintf("%s@%s:%s", saName, testShareName, mountTarget),
  145. "-p", "80:80",
  146. "nginx",
  147. )
  148. container = getContainerName(res.Stdout())
  149. })
  150. t.Run("inspect", func(t *testing.T) {
  151. res := c.RunDockerCmd("inspect", container)
  152. containerInspect, err := ParseContainerInspect(res.Stdout())
  153. assert.NilError(t, err)
  154. assert.Equal(t, containerInspect.Platform, "Linux")
  155. assert.Equal(t, containerInspect.CPULimit, 1.0)
  156. assert.Equal(t, containerInspect.RestartPolicyCondition, containers.RestartPolicyNone)
  157. assert.Assert(t, is.Len(containerInspect.Ports, 1))
  158. hostIP = containerInspect.Ports[0].HostIP
  159. endpoint = fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
  160. })
  161. t.Run("ps", func(t *testing.T) {
  162. res := c.RunDockerCmd("ps")
  163. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  164. l := out[len(out)-1]
  165. assert.Assert(t, strings.Contains(l, container), "Looking for %q in line: %s", container, l)
  166. assert.Assert(t, strings.Contains(l, "nginx"))
  167. assert.Assert(t, strings.Contains(l, "Running"))
  168. assert.Assert(t, strings.Contains(l, hostIP+":80->80/tcp"))
  169. })
  170. t.Run("http get", func(t *testing.T) {
  171. r, err := HTTPGetWithRetry(endpoint, 3)
  172. assert.NilError(t, err)
  173. assert.Equal(t, r.StatusCode, http.StatusOK)
  174. b, err := ioutil.ReadAll(r.Body)
  175. assert.NilError(t, err)
  176. assert.Assert(t, strings.Contains(string(b), testFileContent), "Actual content: "+string(b))
  177. })
  178. t.Run("logs", func(t *testing.T) {
  179. res := c.RunDockerCmd("logs", container)
  180. res.Assert(t, icmd.Expected{Out: "GET"})
  181. })
  182. t.Run("exec", func(t *testing.T) {
  183. res := c.RunDockerCmd("exec", container, "pwd")
  184. res.Assert(t, icmd.Expected{Out: "/"})
  185. res = c.RunDockerOrExitError("exec", container, "echo", "fail_with_argument")
  186. res.Assert(t, icmd.Expected{
  187. ExitCode: 1,
  188. Err: "ACI exec command does not accept arguments to the command. Only the binary should be specified",
  189. })
  190. })
  191. t.Run("logs follow", func(t *testing.T) {
  192. cmd := c.NewDockerCmd("logs", "--follow", container)
  193. res := icmd.StartCmd(cmd)
  194. checkUp := func(t poll.LogT) poll.Result {
  195. r, _ := http.Get(endpoint + "/is_up")
  196. if r != nil && r.StatusCode == http.StatusNotFound {
  197. return poll.Success()
  198. }
  199. return poll.Continue("waiting for container to serve request")
  200. }
  201. poll.WaitOn(t, checkUp, poll.WithDelay(1*time.Second), poll.WithTimeout(60*time.Second))
  202. assert.Assert(t, !strings.Contains(res.Stdout(), "/test"))
  203. checkLogs := func(t poll.LogT) poll.Result {
  204. if strings.Contains(res.Stdout(), "/test") {
  205. return poll.Success()
  206. }
  207. return poll.Continue("waiting for logs to contain /test")
  208. }
  209. // Do request on /test
  210. go func() {
  211. time.Sleep(3 * time.Second)
  212. _, _ = http.Get(endpoint + "/test")
  213. }()
  214. poll.WaitOn(t, checkLogs, poll.WithDelay(3*time.Second), poll.WithTimeout(20*time.Second))
  215. if runtime.GOOS == "windows" {
  216. err := res.Cmd.Process.Kill()
  217. assert.NilError(t, err)
  218. } else {
  219. err := res.Cmd.Process.Signal(syscall.SIGTERM)
  220. assert.NilError(t, err)
  221. }
  222. })
  223. t.Run("rm a running container", func(t *testing.T) {
  224. res := c.RunDockerOrExitError("rm", container)
  225. res.Assert(t, icmd.Expected{
  226. Err: fmt.Sprintf("Error: you cannot remove a running container %s. Stop the container before attempting removal or force remove", container),
  227. ExitCode: 1,
  228. })
  229. })
  230. t.Run("force rm", func(t *testing.T) {
  231. res := c.RunDockerCmd("rm", "-f", container)
  232. res.Assert(t, icmd.Expected{Out: container})
  233. checkStopped := func(t poll.LogT) poll.Result {
  234. res := c.RunDockerOrExitError("inspect", container)
  235. if res.ExitCode == 1 {
  236. return poll.Success()
  237. }
  238. return poll.Continue("waiting for container to stop")
  239. }
  240. poll.WaitOn(t, checkStopped, poll.WithDelay(5*time.Second), poll.WithTimeout(60*time.Second))
  241. })
  242. }
  243. func TestContainerRunAttached(t *testing.T) {
  244. c := NewParallelE2eCLI(t, binDir)
  245. _, _ = setupTestResourceGroup(t, c)
  246. // Used in subtests
  247. var (
  248. container string
  249. endpoint string
  250. )
  251. container = "test-container"
  252. var followLogsProcess *icmd.Result
  253. t.Run("run attached limits", func(t *testing.T) {
  254. cmd := c.NewDockerCmd(
  255. "run",
  256. "--name", container,
  257. "--restart", "on-failure",
  258. "--memory", "0.1G", "--cpus", "0.1",
  259. "-p", "80:80",
  260. "nginx",
  261. )
  262. followLogsProcess = icmd.StartCmd(cmd)
  263. checkRunning := func(t poll.LogT) poll.Result {
  264. res := c.RunDockerOrExitError("inspect", container)
  265. if res.ExitCode == 0 {
  266. return poll.Success()
  267. }
  268. return poll.Continue("waiting for container to be running")
  269. }
  270. poll.WaitOn(t, checkRunning, poll.WithDelay(5*time.Second), poll.WithTimeout(60*time.Second))
  271. inspectRes := c.RunDockerCmd("inspect", container)
  272. containerInspect, err := ParseContainerInspect(inspectRes.Stdout())
  273. assert.NilError(t, err)
  274. assert.Equal(t, containerInspect.Platform, "Linux")
  275. assert.Equal(t, containerInspect.CPULimit, 0.1)
  276. assert.Equal(t, containerInspect.MemoryLimit, uint64(107374182))
  277. assert.Equal(t, containerInspect.RestartPolicyCondition, containers.RestartPolicyOnFailure)
  278. assert.Assert(t, is.Len(containerInspect.Ports, 1))
  279. port := containerInspect.Ports[0]
  280. assert.Assert(t, len(port.HostIP) > 0)
  281. assert.Equal(t, port.ContainerPort, uint32(80))
  282. assert.Equal(t, port.HostPort, uint32(80))
  283. endpoint = fmt.Sprintf("http://%s:%d", port.HostIP, port.HostPort)
  284. assert.Assert(t, !strings.Contains(followLogsProcess.Stdout(), "/test"))
  285. checkRequest := func(t poll.LogT) poll.Result {
  286. r, _ := http.Get(endpoint + "/test")
  287. if r != nil && r.StatusCode == http.StatusNotFound {
  288. return poll.Success()
  289. }
  290. return poll.Continue("waiting for container to serve request")
  291. }
  292. poll.WaitOn(t, checkRequest, poll.WithDelay(1*time.Second), poll.WithTimeout(60*time.Second))
  293. checkLog := func(t poll.LogT) poll.Result {
  294. if strings.Contains(followLogsProcess.Stdout(), "/test") {
  295. return poll.Success()
  296. }
  297. return poll.Continue("waiting for logs to contain /test")
  298. }
  299. poll.WaitOn(t, checkLog, poll.WithDelay(1*time.Second), poll.WithTimeout(20*time.Second))
  300. })
  301. t.Run("stop wrong container", func(t *testing.T) {
  302. res := c.RunDockerOrExitError("stop", "unknown-container")
  303. res.Assert(t, icmd.Expected{
  304. Err: "Error: container unknown-container not found",
  305. ExitCode: 1,
  306. })
  307. })
  308. t.Run("stop container", func(t *testing.T) {
  309. res := c.RunDockerCmd("stop", container)
  310. res.Assert(t, icmd.Expected{Out: container})
  311. waitForStatus(t, c, container, "Terminated", "Node Stopped")
  312. })
  313. t.Run("check we stoppped following logs", func(t *testing.T) {
  314. // nolint errcheck
  315. followLogsStopped := waitWithTimeout(func() { followLogsProcess.Cmd.Process.Wait() }, 10*time.Second)
  316. assert.NilError(t, followLogsStopped, "Follow logs process did not stop after container is stopped")
  317. })
  318. t.Run("ps stopped container with --all", func(t *testing.T) {
  319. res := c.RunDockerCmd("ps", container)
  320. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  321. assert.Assert(t, is.Len(out, 1))
  322. res = c.RunDockerCmd("ps", "--all", container)
  323. out = strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  324. assert.Assert(t, is.Len(out, 2))
  325. })
  326. t.Run("restart container", func(t *testing.T) {
  327. res := c.RunDockerCmd("start", container)
  328. res.Assert(t, icmd.Expected{Out: container})
  329. waitForStatus(t, c, container, convert.StatusRunning)
  330. })
  331. t.Run("kill & rm stopped container", func(t *testing.T) {
  332. res := c.RunDockerCmd("kill", container)
  333. res.Assert(t, icmd.Expected{Out: container})
  334. waitForStatus(t, c, container, "Terminated", "Node Stopped")
  335. res = c.RunDockerCmd("rm", container)
  336. res.Assert(t, icmd.Expected{Out: container})
  337. })
  338. }
  339. func TestComposeUpUpdate(t *testing.T) {
  340. c := NewParallelE2eCLI(t, binDir)
  341. _, _ = setupTestResourceGroup(t, c)
  342. const (
  343. composeFile = "../composefiles/aci-demo/aci_demo_port.yaml"
  344. composeFileMultiplePorts = "../composefiles/aci-demo/aci_demo_multi_port.yaml"
  345. composeProjectName = "acidemo"
  346. serverContainer = composeProjectName + "_web"
  347. wordsContainer = composeProjectName + "_words"
  348. dbContainer = composeProjectName + "_db"
  349. )
  350. t.Run("compose up", func(t *testing.T) {
  351. // Name of Compose project is taken from current folder "acie2e"
  352. c.RunDockerCmd("compose", "up", "-f", composeFile)
  353. res := c.RunDockerCmd("ps")
  354. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  355. // Check three containers are running
  356. assert.Assert(t, is.Len(out, 4))
  357. webRunning := false
  358. for _, l := range out {
  359. if strings.Contains(l, serverContainer) {
  360. webRunning = true
  361. strings.Contains(l, ":80->80/tcp")
  362. }
  363. }
  364. assert.Assert(t, webRunning, "web container not running")
  365. res = c.RunDockerCmd("inspect", serverContainer)
  366. containerInspect, err := ParseContainerInspect(res.Stdout())
  367. assert.NilError(t, err)
  368. assert.Assert(t, is.Len(containerInspect.Ports, 1))
  369. endpoint := fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
  370. r, err := HTTPGetWithRetry(endpoint+"/words/noun", 3)
  371. assert.NilError(t, err)
  372. assert.Equal(t, r.StatusCode, http.StatusOK)
  373. b, err := ioutil.ReadAll(r.Body)
  374. assert.NilError(t, err)
  375. assert.Assert(t, strings.Contains(string(b), `"word":`))
  376. })
  377. t.Run("compose ps", func(t *testing.T) {
  378. res := c.RunDockerCmd("compose", "ps", "--project-name", composeProjectName)
  379. lines := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  380. assert.Assert(t, is.Len(lines, 4))
  381. var wordsDisplayed, webDisplayed, dbDisplayed bool
  382. for _, line := range lines {
  383. fields := strings.Fields(line)
  384. containerID := fields[0]
  385. switch containerID {
  386. case wordsContainer:
  387. wordsDisplayed = true
  388. assert.DeepEqual(t, fields, []string{containerID, "words", "1/1"})
  389. case dbContainer:
  390. dbDisplayed = true
  391. assert.DeepEqual(t, fields, []string{containerID, "db", "1/1"})
  392. case serverContainer:
  393. webDisplayed = true
  394. assert.Equal(t, fields[1], "web")
  395. assert.Check(t, strings.Contains(fields[3], ":80->80/tcp"))
  396. }
  397. }
  398. assert.Check(t, webDisplayed && wordsDisplayed && dbDisplayed, "\n%s\n", res.Stdout())
  399. })
  400. t.Run("compose ls", func(t *testing.T) {
  401. res := c.RunDockerCmd("compose", "ls")
  402. lines := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  403. assert.Equal(t, 2, len(lines))
  404. fields := strings.Fields(lines[1])
  405. assert.Equal(t, 2, len(fields))
  406. assert.Equal(t, fields[0], composeProjectName)
  407. assert.Equal(t, "Running", fields[1])
  408. })
  409. t.Run("logs web", func(t *testing.T) {
  410. res := c.RunDockerCmd("logs", serverContainer)
  411. res.Assert(t, icmd.Expected{Out: "Listening on port 80"})
  412. })
  413. t.Run("update", func(t *testing.T) {
  414. c.RunDockerCmd("compose", "up", "-f", composeFileMultiplePorts, "--project-name", composeProjectName)
  415. res := c.RunDockerCmd("ps")
  416. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  417. // Check three containers are running
  418. assert.Assert(t, is.Len(out, 4))
  419. for _, cName := range []string{serverContainer, wordsContainer} {
  420. res = c.RunDockerCmd("inspect", cName)
  421. containerInspect, err := ParseContainerInspect(res.Stdout())
  422. assert.NilError(t, err)
  423. assert.Assert(t, is.Len(containerInspect.Ports, 1))
  424. endpoint := fmt.Sprintf("http://%s:%d", containerInspect.Ports[0].HostIP, containerInspect.Ports[0].HostPort)
  425. var route string
  426. switch cName {
  427. case serverContainer:
  428. route = "/words/noun"
  429. assert.Equal(t, containerInspect.Ports[0].HostPort, uint32(80))
  430. assert.Equal(t, containerInspect.Ports[0].ContainerPort, uint32(80))
  431. case wordsContainer:
  432. route = "/noun"
  433. assert.Equal(t, containerInspect.Ports[0].HostPort, uint32(8080))
  434. assert.Equal(t, containerInspect.Ports[0].ContainerPort, uint32(8080))
  435. }
  436. checkUp := func(t poll.LogT) poll.Result {
  437. r, _ := http.Get(endpoint + route)
  438. if r != nil && r.StatusCode == http.StatusOK {
  439. return poll.Success()
  440. }
  441. return poll.Continue("Waiting for container to serve request")
  442. }
  443. poll.WaitOn(t, checkUp, poll.WithDelay(1*time.Second), poll.WithTimeout(60*time.Second))
  444. res = c.RunDockerCmd("ps")
  445. p := containerInspect.Ports[0]
  446. res.Assert(t, icmd.Expected{
  447. Out: fmt.Sprintf("%s:%d->%d/tcp", p.HostIP, p.HostPort, p.ContainerPort),
  448. })
  449. }
  450. })
  451. t.Run("down", func(t *testing.T) {
  452. c.RunDockerCmd("compose", "down", "--project-name", composeProjectName)
  453. res := c.RunDockerCmd("ps")
  454. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  455. assert.Equal(t, len(out), 1)
  456. })
  457. }
  458. func TestRunEnvVars(t *testing.T) {
  459. c := NewParallelE2eCLI(t, binDir)
  460. _, _ = setupTestResourceGroup(t, c)
  461. t.Run("run", func(t *testing.T) {
  462. cmd := c.NewDockerCmd(
  463. "run", "-d",
  464. "-e", "MYSQL_ROOT_PASSWORD=rootpwd",
  465. "-e", "MYSQL_DATABASE=mytestdb",
  466. "-e", "MYSQL_USER",
  467. "-e", "MYSQL_PASSWORD=userpwd",
  468. "-e", "DATASOURCE_URL=jdbc:mysql://mydb.mysql.database.azure.com/db1?useSSL=true&requireSSL=false&serverTimezone=America/Recife",
  469. "mysql:5.7",
  470. )
  471. cmd.Env = append(cmd.Env, "MYSQL_USER=user1")
  472. res := icmd.RunCmd(cmd)
  473. res.Assert(t, icmd.Success)
  474. out := strings.Split(strings.TrimSpace(res.Stdout()), "\n")
  475. container := strings.TrimSpace(out[len(out)-1])
  476. res = c.RunDockerCmd("inspect", container)
  477. containerInspect, err := ParseContainerInspect(res.Stdout())
  478. assert.NilError(t, err)
  479. assert.Assert(t, containerInspect.Config != nil, "nil container config")
  480. assert.Assert(t, containerInspect.Config.Env != nil, "nil container env variables")
  481. assert.Equal(t, containerInspect.Image, "mysql:5.7")
  482. envVars := containerInspect.Config.Env
  483. assert.Equal(t, len(envVars), 5)
  484. assert.Equal(t, envVars["MYSQL_ROOT_PASSWORD"], "rootpwd")
  485. assert.Equal(t, envVars["MYSQL_DATABASE"], "mytestdb")
  486. assert.Equal(t, envVars["MYSQL_USER"], "user1")
  487. assert.Equal(t, envVars["MYSQL_PASSWORD"], "userpwd")
  488. assert.Equal(t, envVars["DATASOURCE_URL"], "jdbc:mysql://mydb.mysql.database.azure.com/db1?useSSL=true&requireSSL=false&serverTimezone=America/Recife")
  489. check := func(t poll.LogT) poll.Result {
  490. res := c.RunDockerOrExitError("logs", container)
  491. if strings.Contains(res.Stdout(), "Giving user user1 access to schema mytestdb") {
  492. return poll.Success()
  493. }
  494. return poll.Continue("waiting for DB container to be up")
  495. }
  496. poll.WaitOn(t, check, poll.WithDelay(5*time.Second), poll.WithTimeout(60*time.Second))
  497. })
  498. }
  499. func setupTestResourceGroup(t *testing.T, c *E2eCLI) (string, string) {
  500. startTime := strconv.Itoa(int(time.Now().Unix()))
  501. rg := "E2E-" + t.Name() + "-" + startTime
  502. azureLogin(t, c)
  503. sID := getSubscriptionID(t)
  504. err := createResourceGroup(t, sID, rg)
  505. assert.Check(t, is.Nil(err))
  506. t.Cleanup(func() {
  507. if err := deleteResourceGroup(t, rg); err != nil {
  508. t.Error(err)
  509. }
  510. })
  511. createAciContextAndUseIt(t, c, sID, rg)
  512. // Check nothing is running
  513. res := c.RunDockerCmd("ps")
  514. assert.Assert(t, is.Len(strings.Split(strings.TrimSpace(res.Stdout()), "\n"), 1))
  515. return sID, rg
  516. }
  517. func deleteResourceGroup(t *testing.T, rgName string) error {
  518. fmt.Printf(" [%s] deleting resource group %s\n", t.Name(), rgName)
  519. ctx := context.TODO()
  520. helper := aci.NewACIResourceGroupHelper()
  521. models, err := helper.GetSubscriptionIDs(ctx)
  522. if err != nil {
  523. return err
  524. }
  525. if len(models) == 0 {
  526. return errors.New("unable to delete resource group: no models")
  527. }
  528. return helper.DeleteAsync(ctx, *models[0].SubscriptionID, rgName)
  529. }
  530. func azureLogin(t *testing.T, c *E2eCLI) {
  531. // in order to create new service principal and get these 3 values : `az ad sp create-for-rbac --name 'TestServicePrincipal' --sdk-auth`
  532. clientID := os.Getenv("AZURE_CLIENT_ID")
  533. clientSecret := os.Getenv("AZURE_CLIENT_SECRET")
  534. tenantID := os.Getenv("AZURE_TENANT_ID")
  535. assert.Check(t, clientID != "", "AZURE_CLIENT_ID must not be empty")
  536. assert.Check(t, clientSecret != "", "AZURE_CLIENT_SECRET must not be empty")
  537. assert.Check(t, tenantID != "", "AZURE_TENANT_ID must not be empty")
  538. c.RunDockerCmd("login", "azure", "--client-id", clientID, "--client-secret", clientSecret, "--tenant-id", tenantID)
  539. }
  540. func getSubscriptionID(t *testing.T) string {
  541. ctx := context.TODO()
  542. helper := aci.NewACIResourceGroupHelper()
  543. models, err := helper.GetSubscriptionIDs(ctx)
  544. assert.Check(t, is.Nil(err))
  545. assert.Check(t, len(models) == 1)
  546. return *models[0].SubscriptionID
  547. }
  548. func createResourceGroup(t *testing.T, sID, rgName string) error {
  549. fmt.Printf(" [%s] creating resource group %s\n", t.Name(), rgName)
  550. helper := aci.NewACIResourceGroupHelper()
  551. _, err := helper.CreateOrUpdate(context.TODO(), sID, rgName, resources.Group{Location: to.StringPtr(location)})
  552. return err
  553. }
  554. func createAciContextAndUseIt(t *testing.T, c *E2eCLI, sID, rgName string) {
  555. res := c.RunDockerCmd("context", "create", "aci", contextName, "--subscription-id", sID, "--resource-group", rgName, "--location", location)
  556. res.Assert(t, icmd.Expected{Out: "Successfully created aci context \"" + contextName + "\""})
  557. res = c.RunDockerCmd("context", "use", contextName)
  558. res.Assert(t, icmd.Expected{Out: contextName})
  559. res = c.RunDockerCmd("context", "ls")
  560. res.Assert(t, icmd.Expected{Out: contextName + " *"})
  561. }
  562. func createStorageAccount(t *testing.T, aciContext store.AciContext, name string) (azure_storage.Account, func() error) {
  563. account, err := storage.CreateStorageAccount(context.TODO(), aciContext, name)
  564. assert.Check(t, is.Nil(err))
  565. assert.Check(t, is.Equal(*(account.Name), name))
  566. return account, func() error { return deleteStorageAccount(aciContext, name) }
  567. }
  568. func deleteStorageAccount(aciContext store.AciContext, name string) error {
  569. _, err := storage.DeleteStorageAccount(context.TODO(), aciContext, name)
  570. return err
  571. }
  572. func getStorageKeys(t *testing.T, aciContext store.AciContext, saName string) []azure_storage.AccountKey {
  573. l, err := storage.ListKeys(context.TODO(), aciContext, saName)
  574. assert.NilError(t, err)
  575. assert.Assert(t, l.Keys != nil)
  576. return *l.Keys
  577. }
  578. func createFileShare(t *testing.T, key, share, storageAccount string) (*azfile.SharedKeyCredential, *url.URL) {
  579. // Create a ShareURL object that wraps a soon-to-be-created share's URL and a default pipeline.
  580. u, _ := url.Parse(fmt.Sprintf("https://%s.file.core.windows.net/%s", storageAccount, share))
  581. cred, err := azfile.NewSharedKeyCredential(storageAccount, key)
  582. assert.NilError(t, err)
  583. shareURL := azfile.NewShareURL(*u, azfile.NewPipeline(cred, azfile.PipelineOptions{}))
  584. _, err = shareURL.Create(context.TODO(), azfile.Metadata{}, 0)
  585. assert.NilError(t, err)
  586. return cred, u
  587. }
  588. func uploadFile(t *testing.T, cred azfile.SharedKeyCredential, baseURL, fileName, content string) {
  589. fURL, err := url.Parse(baseURL + "/" + fileName)
  590. assert.NilError(t, err)
  591. fileURL := azfile.NewFileURL(*fURL, azfile.NewPipeline(&cred, azfile.PipelineOptions{}))
  592. err = azfile.UploadBufferToAzureFile(context.TODO(), []byte(content), fileURL, azfile.UploadToAzureFileOptions{})
  593. assert.NilError(t, err)
  594. }
  595. func getContainerName(stdout string) string {
  596. out := strings.Split(strings.TrimSpace(stdout), "\n")
  597. return strings.TrimSpace(out[len(out)-1])
  598. }
  599. func waitForStatus(t *testing.T, c *E2eCLI, containerID string, statuses ...string) {
  600. checkStopped := func(logt poll.LogT) poll.Result {
  601. res := c.RunDockerCmd("inspect", containerID)
  602. containerInspect, err := ParseContainerInspect(res.Stdout())
  603. assert.NilError(t, err)
  604. for _, status := range statuses {
  605. if containerInspect.Status == status {
  606. return poll.Success()
  607. }
  608. }
  609. return poll.Continue("Status %s != %s (expected) for container %s", containerInspect.Status, statuses, containerID)
  610. }
  611. poll.WaitOn(t, checkStopped, poll.WithDelay(5*time.Second), poll.WithTimeout(90*time.Second))
  612. }
  613. func waitWithTimeout(blockingCall func(), timeout time.Duration) error {
  614. c := make(chan struct{})
  615. go func() {
  616. defer close(c)
  617. blockingCall()
  618. }()
  619. select {
  620. case <-c:
  621. return nil
  622. case <-time.After(timeout):
  623. return fmt.Errorf("Timed out after %s", timeout)
  624. }
  625. }