1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
18 "git.arvados.org/arvados.git/sdk/go/arvados"
19 "git.arvados.org/arvados.git/sdk/go/ctxlog"
20 "github.com/ghodss/yaml"
21 "github.com/sirupsen/logrus"
22 check "gopkg.in/check.v1"
25 // Gocheck boilerplate
26 func Test(t *testing.T) {
30 var _ = check.Suite(&LoadSuite{})
32 var emptyConfigYAML = `Clusters: {"z1111": {}}`
34 // Return a new Loader that reads cluster config from configdata
35 // (instead of the usual default /etc/arvados/config.yml), and logs to
36 // logdst or (if that's nil) c.Log.
37 func testLoader(c *check.C, configdata string, logdst io.Writer) *Loader {
38 logger := ctxlog.TestLogger(c)
44 ldr := NewLoader(bytes.NewBufferString(configdata), logger)
49 type LoadSuite struct{}
51 func (s *LoadSuite) SetUpSuite(c *check.C) {
52 os.Unsetenv("ARVADOS_API_HOST")
53 os.Unsetenv("ARVADOS_API_HOST_INSECURE")
54 os.Unsetenv("ARVADOS_API_TOKEN")
57 func (s *LoadSuite) TestEmpty(c *check.C) {
58 cfg, err := testLoader(c, "", nil).Load()
59 c.Check(cfg, check.IsNil)
60 c.Assert(err, check.ErrorMatches, `config does not define any clusters`)
63 func (s *LoadSuite) TestNoConfigs(c *check.C) {
64 cfg, err := testLoader(c, emptyConfigYAML, nil).Load()
65 c.Assert(err, check.IsNil)
66 c.Assert(cfg.Clusters, check.HasLen, 1)
67 cc, err := cfg.GetCluster("z1111")
68 c.Assert(err, check.IsNil)
69 c.Check(cc.ClusterID, check.Equals, "z1111")
70 c.Check(cc.API.MaxRequestAmplification, check.Equals, 4)
71 c.Check(cc.API.MaxItemsPerResponse, check.Equals, 1000)
74 func (s *LoadSuite) TestNullKeyDoesNotOverrideDefault(c *check.C) {
75 ldr := testLoader(c, `{"Clusters":{"z1111":{"API":}}}`, nil)
76 ldr.SkipDeprecated = true
77 cfg, err := ldr.Load()
78 c.Assert(err, check.IsNil)
79 c1, err := cfg.GetCluster("z1111")
80 c.Assert(err, check.IsNil)
81 c.Check(c1.ClusterID, check.Equals, "z1111")
82 c.Check(c1.API.MaxRequestAmplification, check.Equals, 4)
83 c.Check(c1.API.MaxItemsPerResponse, check.Equals, 1000)
86 func (s *LoadSuite) TestMungeLegacyConfigArgs(c *check.C) {
87 f, err := ioutil.TempFile("", "")
88 c.Check(err, check.IsNil)
89 defer os.Remove(f.Name())
90 io.WriteString(f, "Debug: true\n")
93 f, err = ioutil.TempFile("", "")
94 c.Check(err, check.IsNil)
95 defer os.Remove(f.Name())
96 io.WriteString(f, emptyConfigYAML)
99 for _, trial := range []struct {
104 []string{"-config", oldfile},
105 []string{"-old-config", oldfile},
108 []string{"-config=" + oldfile},
109 []string{"-old-config=" + oldfile},
112 []string{"-config", newfile},
113 []string{"-config", newfile},
116 []string{"-config=" + newfile},
117 []string{"-config=" + newfile},
120 []string{"-foo", oldfile},
121 []string{"-foo", oldfile},
124 []string{"-foo=" + oldfile},
125 []string{"-foo=" + oldfile},
128 []string{"-foo", "-config=" + oldfile},
129 []string{"-foo", "-old-config=" + oldfile},
132 []string{"-foo", "bar", "-config=" + oldfile},
133 []string{"-foo", "bar", "-old-config=" + oldfile},
136 []string{"-foo=bar", "baz", "-config=" + oldfile},
137 []string{"-foo=bar", "baz", "-old-config=" + oldfile},
140 []string{"-config=/dev/null"},
141 []string{"-config=/dev/null"},
144 []string{"-config=-"},
145 []string{"-config=-"},
148 []string{"-config="},
149 []string{"-config="},
152 []string{"-foo=bar", "baz", "-config"},
153 []string{"-foo=bar", "baz", "-config"},
160 var logbuf bytes.Buffer
161 logger := logrus.New()
165 args := ldr.MungeLegacyConfigArgs(logger, trial.argsIn, "-old-config")
166 c.Check(args, check.DeepEquals, trial.argsOut)
167 if fmt.Sprintf("%v", trial.argsIn) != fmt.Sprintf("%v", trial.argsOut) {
168 c.Check(logbuf.String(), check.Matches, `.*`+oldfile+` is not a cluster config file -- interpreting -config as -old-config.*\n`)
173 func (s *LoadSuite) TestSampleKeys(c *check.C) {
174 for _, yaml := range []string{
175 `{"Clusters":{"z1111":{}}}`,
176 `{"Clusters":{"z1111":{"InstanceTypes":{"Foo":{"RAM": "12345M"}}}}}`,
178 cfg, err := testLoader(c, yaml, nil).Load()
179 c.Assert(err, check.IsNil)
180 cc, err := cfg.GetCluster("z1111")
181 c.Assert(err, check.IsNil)
182 _, hasSample := cc.InstanceTypes["SAMPLE"]
183 c.Check(hasSample, check.Equals, false)
184 if strings.Contains(yaml, "Foo") {
185 c.Check(cc.InstanceTypes["Foo"].RAM, check.Equals, arvados.ByteSize(12345000000))
186 c.Check(cc.InstanceTypes["Foo"].Price, check.Equals, 0.0)
191 func (s *LoadSuite) TestMultipleClusters(c *check.C) {
192 ldr := testLoader(c, `{"Clusters":{"z1111":{},"z2222":{}}}`, nil)
193 ldr.SkipDeprecated = true
194 cfg, err := ldr.Load()
195 c.Assert(err, check.IsNil)
196 c1, err := cfg.GetCluster("z1111")
197 c.Assert(err, check.IsNil)
198 c.Check(c1.ClusterID, check.Equals, "z1111")
199 c2, err := cfg.GetCluster("z2222")
200 c.Assert(err, check.IsNil)
201 c.Check(c2.ClusterID, check.Equals, "z2222")
204 func (s *LoadSuite) TestDeprecatedOrUnknownWarning(c *check.C) {
205 var logbuf bytes.Buffer
206 _, err := testLoader(c, `
209 ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
210 SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
212 BlobSigningKey: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
219 Host: z2222.arvadosapi.com
225 "http://host.example:12345": {}
228 "http://host.example:12345":
233 "http://host.example:12345": {}
235 zzzzz-nyw5e-aaaaaaaaaaaaaaa: {Replication: 2}
237 c.Assert(err, check.IsNil)
238 c.Log(logbuf.String())
239 logs := strings.Split(strings.TrimSuffix(logbuf.String(), "\n"), "\n")
240 for _, log := range logs {
241 c.Check(log, check.Matches, `.*deprecated or unknown config entry:.*(RunTimeEngine.*RuntimeEngine|BadKey1|BadKey2|KeepStore|ServiceS|RendezVous).*`)
243 c.Check(logs, check.HasLen, 6)
246 func (s *LoadSuite) checkSAMPLEKeys(c *check.C, path string, x interface{}) {
247 v := reflect.Indirect(reflect.ValueOf(x))
250 var stringKeys, sampleKey bool
254 if k.Kind() == reflect.String {
256 if k.String() == "SAMPLE" || k.String() == "xxxxx" {
258 s.checkSAMPLEKeys(c, path+"."+k.String(), iter.Value().Interface())
262 if stringKeys && !sampleKey {
263 c.Errorf("%s is a map with string keys (type %T) but config.default.yml has no SAMPLE key", path, x)
267 for i := 0; i < v.NumField(); i++ {
269 if val.CanInterface() {
270 s.checkSAMPLEKeys(c, path+"."+v.Type().Field(i).Name, val.Interface())
276 func (s *LoadSuite) TestDefaultConfigHasAllSAMPLEKeys(c *check.C) {
277 var logbuf bytes.Buffer
278 loader := testLoader(c, string(DefaultYAML), &logbuf)
279 cfg, err := loader.Load()
280 c.Assert(err, check.IsNil)
281 s.checkSAMPLEKeys(c, "", cfg)
284 func (s *LoadSuite) TestNoUnrecognizedKeysInDefaultConfig(c *check.C) {
285 var logbuf bytes.Buffer
286 var supplied map[string]interface{}
287 yaml.Unmarshal(DefaultYAML, &supplied)
289 loader := testLoader(c, string(DefaultYAML), &logbuf)
290 cfg, err := loader.Load()
291 c.Assert(err, check.IsNil)
292 var loaded map[string]interface{}
293 buf, err := yaml.Marshal(cfg)
294 c.Assert(err, check.IsNil)
295 err = yaml.Unmarshal(buf, &loaded)
296 c.Assert(err, check.IsNil)
298 c.Check(logbuf.String(), check.Matches, `(?ms).*SystemRootToken: secret token is not set.*`)
299 c.Check(logbuf.String(), check.Matches, `(?ms).*ManagementToken: secret token is not set.*`)
300 c.Check(logbuf.String(), check.Matches, `(?ms).*Collections.BlobSigningKey: secret token is not set.*`)
302 loader.logExtraKeys(loaded, supplied, "")
303 c.Check(logbuf.String(), check.Equals, "")
306 func (s *LoadSuite) TestNoWarningsForDumpedConfig(c *check.C) {
307 var logbuf bytes.Buffer
308 cfg, err := testLoader(c, `
311 ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
312 SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
314 BlobSigningKey: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
317 IncludedScratch: 123456
319 c.Assert(err, check.IsNil)
320 yaml, err := yaml.Marshal(cfg)
321 c.Assert(err, check.IsNil)
322 cfgDumped, err := testLoader(c, string(yaml), &logbuf).Load()
323 c.Assert(err, check.IsNil)
324 c.Check(cfg, check.DeepEquals, cfgDumped)
325 c.Check(logbuf.String(), check.Equals, "")
328 func (s *LoadSuite) TestUnacceptableTokens(c *check.C) {
329 for _, trial := range []struct {
334 {false, "SystemRootToken", "SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa_b_c"},
335 {false, "ManagementToken", "ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa b c"},
336 {false, "ManagementToken", "ManagementToken: \"$aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabc\""},
337 {false, "Collections.BlobSigningKey", "Collections: {BlobSigningKey: \"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa⛵\"}"},
338 {true, "SystemRootToken", "SystemRootToken: a_b_c"},
339 {true, "ManagementToken", "ManagementToken: a b c"},
340 {true, "ManagementToken", "ManagementToken: \"$abc\""},
341 {true, "Collections.BlobSigningKey", "Collections: {BlobSigningKey: \"⛵\"}"},
343 c.Logf("trying bogus config: %s", trial.example)
344 _, err := testLoader(c, "Clusters:\n zzzzz:\n "+trial.example, nil).Load()
345 c.Check(err, check.ErrorMatches, `Clusters.zzzzz.`+trial.configPath+`: unacceptable characters in token.*`)
349 func (s *LoadSuite) TestPostgreSQLKeyConflict(c *check.C) {
350 _, err := testLoader(c, `
358 c.Check(err, check.ErrorMatches, `Clusters.zzzzz.PostgreSQL.Connection: multiple entries for "(dbname|host)".*`)
361 func (s *LoadSuite) TestBadClusterIDs(c *check.C) {
362 for _, data := range []string{`
365 ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
366 SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
368 BlobSigningKey: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
372 ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
373 SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
375 BlobSigningKey: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
378 Host: Zzzzz.arvadosapi.com
383 ManagementToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
384 SystemRootToken: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
386 BlobSigningKey: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
392 v, err := testLoader(c, data, nil).Load()
394 c.Logf("%#v", v.Clusters)
396 c.Check(err, check.ErrorMatches, `.*cluster ID should be 5 lowercase alphanumeric characters.*`)
400 func (s *LoadSuite) TestBadType(c *check.C) {
401 for _, data := range []string{`
414 ConnectionPool: "foo"
424 ConnectionPool: [] # {foo: bar} isn't caught here; we rely on config-check
428 v, err := testLoader(c, data, nil).Load()
430 c.Logf("%#v", v.Clusters["zzzzz"].PostgreSQL.ConnectionPool)
432 c.Check(err, check.ErrorMatches, `.*cannot unmarshal .*PostgreSQL.*`)
436 func (s *LoadSuite) TestMovedKeys(c *check.C) {
437 checkEquivalent(c, `# config has old keys only
441 MultiClusterRequestConcurrency: 3
442 MaxItemsPerResponse: 999
447 MaxRequestAmplification: 3
448 MaxItemsPerResponse: 999
450 checkEquivalent(c, `# config has both old and new keys; old values win
454 MultiClusterRequestConcurrency: 0
455 MaxItemsPerResponse: 555
457 MaxRequestAmplification: 3
458 MaxItemsPerResponse: 999
463 MaxRequestAmplification: 0
464 MaxItemsPerResponse: 555
468 func checkEquivalent(c *check.C, goty, expectedy string) string {
469 var logbuf bytes.Buffer
470 gotldr := testLoader(c, goty, &logbuf)
471 expectedldr := testLoader(c, expectedy, nil)
472 checkEquivalentLoaders(c, gotldr, expectedldr)
473 return logbuf.String()
476 func checkEqualYAML(c *check.C, got, expected interface{}) {
477 expectedyaml, err := yaml.Marshal(expected)
478 c.Assert(err, check.IsNil)
479 gotyaml, err := yaml.Marshal(got)
480 c.Assert(err, check.IsNil)
481 if !bytes.Equal(gotyaml, expectedyaml) {
482 cmd := exec.Command("diff", "-u", "--label", "expected", "--label", "got", "/dev/fd/3", "/dev/fd/4")
483 for _, y := range [][]byte{expectedyaml, gotyaml} {
484 pr, pw, err := os.Pipe()
485 c.Assert(err, check.IsNil)
487 go func(data []byte) {
491 cmd.ExtraFiles = append(cmd.ExtraFiles, pr)
493 diff, err := cmd.CombinedOutput()
494 // diff should report differences and exit non-zero.
495 c.Check(err, check.NotNil)
497 c.Error("got != expected; see diff (-expected +got) above")
501 func checkEquivalentLoaders(c *check.C, gotldr, expectedldr *Loader) {
502 got, err := gotldr.Load()
503 c.Assert(err, check.IsNil)
504 expected, err := expectedldr.Load()
505 c.Assert(err, check.IsNil)
506 checkEqualYAML(c, got, expected)
509 func checkListKeys(path string, x interface{}) (err error) {
510 v := reflect.Indirect(reflect.ValueOf(x))
516 if k.Kind() == reflect.String {
517 if err = checkListKeys(path+"."+k.String(), iter.Value().Interface()); err != nil {
525 for i := 0; i < v.NumField(); i++ {
527 structField := v.Type().Field(i)
528 fieldname := structField.Name
529 endsWithList := strings.HasSuffix(fieldname, "List")
530 isAnArray := structField.Type.Kind() == reflect.Slice
531 if endsWithList != isAnArray {
533 err = fmt.Errorf("%s.%s ends with 'List' but field is not an array (type %v)", path, fieldname, val.Kind())
536 if isAnArray && structField.Type.Elem().Kind() != reflect.Uint8 {
537 err = fmt.Errorf("%s.%s is an array but field name does not end in 'List' (slice of %v)", path, fieldname, structField.Type.Elem().Kind())
541 if val.CanInterface() {
542 checkListKeys(path+"."+fieldname, val.Interface())
549 func (s *LoadSuite) TestListKeys(c *check.C) {
552 }{[]string{"a", "b"}}
553 var m1 = make(map[string]interface{})
555 if err := checkListKeys("", m1); err != nil {
561 }{[]string{"a", "b"}}
562 var m2 = make(map[string]interface{})
564 if err := checkListKeys("", m2); err == nil {
565 c.Errorf("Should have produced an error")
571 var m3 = make(map[string]interface{})
573 if err := checkListKeys("", m3); err == nil {
574 c.Errorf("Should have produced an error")
577 loader := testLoader(c, string(DefaultYAML), nil)
578 cfg, err := loader.Load()
579 c.Assert(err, check.IsNil)
580 if err := checkListKeys("", cfg); err != nil {
585 func (s *LoadSuite) TestWarnUnusedLocalKeep(c *check.C) {
586 var logbuf bytes.Buffer
587 _, err := testLoader(c, `
594 c.Assert(err, check.IsNil)
595 c.Check(logbuf.String(), check.Matches, `(?ms).*LocalKeepBlobBuffersPerVCPU is 1 but will not be used because at least one volume \(z\) has lower replication than DefaultReplication \(1 < 2\) -- suggest changing to 0.*`)
598 _, err = testLoader(c, `
604 "http://0.0.0.0:12345": {}
606 c.Assert(err, check.IsNil)
607 c.Check(logbuf.String(), check.Matches, `(?ms).*LocalKeepBlobBuffersPerVCPU is 1 but will not be used because at least one volume \(z\) uses AccessViaHosts -- suggest changing to 0.*`)
610 func (s *LoadSuite) TestImplicitStorageClasses(c *check.C) {
611 // If StorageClasses and Volumes.*.StorageClasses are all
612 // empty, there is a default storage class named "default".
613 ldr := testLoader(c, `{"Clusters":{"z1111":{}}}`, nil)
614 cfg, err := ldr.Load()
615 c.Assert(err, check.IsNil)
616 cc, err := cfg.GetCluster("z1111")
617 c.Assert(err, check.IsNil)
618 c.Check(cc.StorageClasses, check.HasLen, 1)
619 c.Check(cc.StorageClasses["default"].Default, check.Equals, true)
620 c.Check(cc.StorageClasses["default"].Priority, check.Equals, 0)
622 // The implicit "default" storage class is used by all
624 ldr = testLoader(c, `
629 cfg, err = ldr.Load()
630 c.Assert(err, check.IsNil)
631 cc, err = cfg.GetCluster("z1111")
632 c.Assert(err, check.IsNil)
633 c.Check(cc.StorageClasses, check.HasLen, 1)
634 c.Check(cc.StorageClasses["default"].Default, check.Equals, true)
635 c.Check(cc.StorageClasses["default"].Priority, check.Equals, 0)
636 c.Check(cc.Volumes["z"].StorageClasses["default"], check.Equals, true)
638 // The "default" storage class isn't implicit if any classes
639 // are configured explicitly.
640 ldr = testLoader(c, `
651 cfg, err = ldr.Load()
652 c.Assert(err, check.IsNil)
653 cc, err = cfg.GetCluster("z1111")
654 c.Assert(err, check.IsNil)
655 c.Check(cc.StorageClasses, check.HasLen, 1)
656 c.Check(cc.StorageClasses["local"].Default, check.Equals, true)
657 c.Check(cc.StorageClasses["local"].Priority, check.Equals, 111)
659 // It is an error for a volume to refer to a storage class
660 // that isn't listed in StorageClasses.
661 ldr = testLoader(c, `
673 c.Assert(err, check.ErrorMatches, `z: volume refers to storage class "nx" that is not defined.*`)
675 // It is an error for a volume to refer to a storage class
676 // that isn't listed in StorageClasses ... even if it's
677 // "default", which would exist implicitly if it weren't
678 // referenced explicitly by a volume.
679 ldr = testLoader(c, `
687 c.Assert(err, check.ErrorMatches, `z: volume refers to storage class "default" that is not defined.*`)
689 // If the "default" storage class is configured explicitly, it
690 // is not used implicitly by any volumes, even if it's the
691 // only storage class.
692 var logbuf bytes.Buffer
693 ldr = testLoader(c, `
703 c.Assert(err, check.ErrorMatches, `z: volume has no StorageClasses listed`)
705 // If StorageClasses are configured explicitly, there must be
706 // at least one with Default: true. (Calling one "default" is
708 ldr = testLoader(c, `
719 c.Assert(err, check.ErrorMatches, `there is no default storage class.*`)
722 func (s *LoadSuite) TestPreemptiblePriceFactor(c *check.C) {
733 PreemptiblePriceFactor: 0.5
741 PreemptiblePriceFactor: 0.5
747 Type1.preemptible: # higher price than the auto-added variant would use -- should generate warning
757 Type2.preemptible: # identical to the auto-added variant -- so no warning
764 var logbuf bytes.Buffer
765 cfg, err := testLoader(c, yaml, &logbuf).Load()
766 c.Assert(err, check.IsNil)
767 cc, err := cfg.GetCluster("z1111")
768 c.Assert(err, check.IsNil)
769 c.Check(cc.InstanceTypes["Type1"].Price, check.Equals, 1.23)
770 c.Check(cc.InstanceTypes, check.HasLen, 1)
772 cc, err = cfg.GetCluster("z2222")
773 c.Assert(err, check.IsNil)
774 c.Check(cc.InstanceTypes["Type1"].Preemptible, check.Equals, false)
775 c.Check(cc.InstanceTypes["Type1"].Price, check.Equals, 1.23)
776 c.Check(cc.InstanceTypes["Type1.preemptible"].Preemptible, check.Equals, true)
777 c.Check(cc.InstanceTypes["Type1.preemptible"].Price, check.Equals, 1.23/2)
778 c.Check(cc.InstanceTypes["Type1.preemptible"].ProviderType, check.Equals, "Type1")
779 c.Check(cc.InstanceTypes, check.HasLen, 2)
781 cc, err = cfg.GetCluster("z3333")
782 c.Assert(err, check.IsNil)
783 // Don't overwrite the explicitly configured preemptible variant
784 c.Check(cc.InstanceTypes["Type1.preemptible"].Price, check.Equals, 1.23)
785 c.Check(cc.InstanceTypes, check.HasLen, 4)
786 c.Check(logbuf.String(), check.Matches, `(?ms).*Clusters\.z3333\.InstanceTypes\[Type1\.preemptible\]: already exists, so not automatically adding a preemptible variant of Type1.*`)
787 c.Check(logbuf.String(), check.Not(check.Matches), `(?ms).*Type2\.preemptible.*`)
788 c.Check(logbuf.String(), check.Not(check.Matches), `(?ms).*(z1111|z2222)[^\n]*InstanceTypes.*`)