1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
6 // How to manually run individual tests against the real cloud:
8 // $ go test -v git.curoverse.com/arvados.git/lib/cloud/ec2 -live-ec2-cfg ec2config.yml -check.f=TestCreate
10 // Tests should be run individually and in the order they are listed in the file:
12 // Example azconfig.yml:
14 // ImageIDForTestSuite: ami-xxxxxxxxxxxxxxxxx
16 // AccessKeyID: XXXXXXXXXXXXXX
17 // SecretAccessKey: xxxxxxxxxxxxxxxxxxxx
19 // SecurityGroupId: sg-xxxxxxxx
20 // SubnetId: subnet-xxxxxxxx
21 // AdminUsername: crunch
22 // KeyPairName: arvados-dispatcher-keypair
32 "git.curoverse.com/arvados.git/lib/cloud"
33 "git.curoverse.com/arvados.git/sdk/go/arvados"
34 "git.curoverse.com/arvados.git/sdk/go/config"
35 "github.com/aws/aws-sdk-go/aws"
36 "github.com/aws/aws-sdk-go/service/ec2"
37 "github.com/sirupsen/logrus"
38 "golang.org/x/crypto/ssh"
39 check "gopkg.in/check.v1"
42 var live = flag.String("live-ec2-cfg", "", "Test with real EC2 API, provide config file")
44 // Gocheck boilerplate
45 func Test(t *testing.T) {
49 type EC2InstanceSetSuite struct{}
51 var _ = check.Suite(&EC2InstanceSetSuite{})
53 type testConfig struct {
54 ImageIDForTestSuite string
55 DriverParameters json.RawMessage
61 func (e *ec2stub) ImportKeyPair(input *ec2.ImportKeyPairInput) (*ec2.ImportKeyPairOutput, error) {
65 func (e *ec2stub) RunInstances(input *ec2.RunInstancesInput) (*ec2.Reservation, error) {
66 return &ec2.Reservation{Instances: []*ec2.Instance{&ec2.Instance{
67 InstanceId: aws.String("i-123"),
68 Tags: input.TagSpecifications[0].Tags,
72 func (e *ec2stub) DescribeInstances(input *ec2.DescribeInstancesInput) (*ec2.DescribeInstancesOutput, error) {
73 return &ec2.DescribeInstancesOutput{}, nil
76 func (e *ec2stub) CreateTags(input *ec2.CreateTagsInput) (*ec2.CreateTagsOutput, error) {
80 func (e *ec2stub) TerminateInstances(input *ec2.TerminateInstancesInput) (*ec2.TerminateInstancesOutput, error) {
84 func GetInstanceSet() (cloud.InstanceSet, cloud.ImageID, arvados.Cluster, error) {
85 cluster := arvados.Cluster{
86 InstanceTypes: arvados.InstanceTypeMap(map[string]arvados.InstanceType{
87 "tiny": arvados.InstanceType{
89 ProviderType: "t2.micro",
96 "tiny-with-extra-scratch": arvados.InstanceType{
98 ProviderType: "t2.micro",
101 Scratch: 10000000000,
102 ExtraScratch: 20000000000,
106 "tiny-preemptible": arvados.InstanceType{
108 ProviderType: "t2.micro",
111 Scratch: 10000000000,
117 var exampleCfg testConfig
118 err := config.LoadFile(&exampleCfg, *live)
120 return nil, cloud.ImageID(""), cluster, err
123 ap, err := newEC2InstanceSet(exampleCfg.DriverParameters, "test123", logrus.StandardLogger())
124 return ap, cloud.ImageID(exampleCfg.ImageIDForTestSuite), cluster, err
126 ap := ec2InstanceSet{
127 ec2config: ec2InstanceSetConfig{},
128 dispatcherID: "test123",
129 logger: logrus.StandardLogger(),
132 return &ap, cloud.ImageID("blob"), cluster, nil
135 var testKey = []byte(`ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLQS1ExT2+WjA0d/hntEAyAtgeN1W2ik2QX8c2zO6HjlPHWXL92r07W0WMuDib40Pcevpi1BXeBWXA9ZB5KKMJB+ukaAu22KklnQuUmNvk6ZXnPKSkGxuCYvPQb08WhHf3p1VxiKfP3iauedBDM4x9/bkJohlBBQiFXzNUcQ+a6rKiMzmJN2gbL8ncyUzc+XQ5q4JndTwTGtOlzDiGOc9O4z5Dd76wtAVJneOuuNpwfFRVHThpJM6VThpCZOnl8APaceWXKeuwOuCae3COZMz++xQfxOfZ9Z8aIwo+TlQhsRaNfZ4Vjrop6ej8dtfZtgUFKfbXEOYaHrGrWGotFDTD example@example`)
137 func (*EC2InstanceSetSuite) TestCreate(c *check.C) {
138 ap, img, cluster, err := GetInstanceSet()
140 c.Fatal("Error making provider", err)
143 pk, _, _, _, err := ssh.ParseAuthorizedKey(testKey)
144 c.Assert(err, check.IsNil)
146 inst, err := ap.Create(cluster.InstanceTypes["tiny"],
147 img, map[string]string{
148 "TestTagName": "test tag value",
149 }, "umask 0600; echo -n test-file-data >/var/run/test-file", pk)
151 c.Assert(err, check.IsNil)
154 c.Check(tags["TestTagName"], check.Equals, "test tag value")
155 c.Logf("inst.String()=%v Address()=%v Tags()=%v", inst.String(), inst.Address(), tags)
159 func (*EC2InstanceSetSuite) TestCreateWithExtraScratch(c *check.C) {
160 ap, img, cluster, err := GetInstanceSet()
162 c.Fatal("Error making provider", err)
165 pk, _, _, _, err := ssh.ParseAuthorizedKey(testKey)
166 c.Assert(err, check.IsNil)
168 inst, err := ap.Create(cluster.InstanceTypes["tiny-with-extra-scratch"],
169 img, map[string]string{
170 "TestTagName": "test tag value",
171 }, "umask 0600; echo -n test-file-data >/var/run/test-file", pk)
173 c.Assert(err, check.IsNil)
176 c.Check(tags["TestTagName"], check.Equals, "test tag value")
177 c.Logf("inst.String()=%v Address()=%v Tags()=%v", inst.String(), inst.Address(), tags)
181 func (*EC2InstanceSetSuite) TestCreatePreemptible(c *check.C) {
182 ap, img, cluster, err := GetInstanceSet()
184 c.Fatal("Error making provider", err)
187 pk, _, _, _, err := ssh.ParseAuthorizedKey(testKey)
188 c.Assert(err, check.IsNil)
190 inst, err := ap.Create(cluster.InstanceTypes["tiny-preemptible"],
191 img, map[string]string{
192 "TestTagName": "test tag value",
193 }, "umask 0600; echo -n test-file-data >/var/run/test-file", pk)
195 c.Assert(err, check.IsNil)
198 c.Check(tags["TestTagName"], check.Equals, "test tag value")
199 c.Logf("inst.String()=%v Address()=%v Tags()=%v", inst.String(), inst.Address(), tags)
203 func (*EC2InstanceSetSuite) TestTagInstances(c *check.C) {
204 ap, _, _, err := GetInstanceSet()
206 c.Fatal("Error making provider", err)
209 l, err := ap.Instances(nil)
210 c.Assert(err, check.IsNil)
212 for _, i := range l {
214 tg["TestTag2"] = "123 test tag 2"
215 c.Check(i.SetTags(tg), check.IsNil)
219 func (*EC2InstanceSetSuite) TestListInstances(c *check.C) {
220 ap, _, _, err := GetInstanceSet()
222 c.Fatal("Error making provider: ", err)
225 l, err := ap.Instances(nil)
227 c.Assert(err, check.IsNil)
229 for _, i := range l {
231 log.Printf("%v %v %v", i.String(), i.Address(), tg)
235 func (*EC2InstanceSetSuite) TestDestroyInstances(c *check.C) {
236 ap, _, _, err := GetInstanceSet()
238 c.Fatal("Error making provider", err)
241 l, err := ap.Instances(nil)
242 c.Assert(err, check.IsNil)
244 for _, i := range l {
245 c.Check(i.Destroy(), check.IsNil)