1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
13 "git.arvados.org/arvados.git/sdk/go/arvados"
14 "git.arvados.org/arvados.git/sdk/go/arvadostest"
15 "golang.org/x/net/context"
19 type nopWriteCloser struct{ io.Writer }
21 func (nopWriteCloser) Close() error { return nil }
23 // embedded by dockerSuite and singularitySuite so they can share
25 type executorSuite struct {
26 newExecutor func(*C) // embedding struct's SetUpSuite method must set this
27 executor containerExecutor
33 func (s *executorSuite) SetUpTest(c *C) {
35 s.stdout = bytes.Buffer{}
36 s.stderr = bytes.Buffer{}
37 s.spec = containerSpec{
38 Image: "busybox:uclibc",
41 Env: map[string]string{"PATH": "/bin:/usr/bin"},
42 NetworkMode: "default",
43 Stdout: nopWriteCloser{&s.stdout},
44 Stderr: nopWriteCloser{&s.stderr},
46 err := s.executor.LoadImage("", arvadostest.BusyboxDockerImage(c), arvados.Container{}, "", nil)
50 func (s *executorSuite) TearDownTest(c *C) {
54 func (s *executorSuite) TestExecTrivialContainer(c *C) {
55 c.Logf("Using container runtime: %s", s.executor.Runtime())
56 s.spec.Command = []string{"echo", "ok"}
58 c.Check(s.stdout.String(), Equals, "ok\n")
59 c.Check(s.stderr.String(), Equals, "")
62 func (s *executorSuite) TestExitStatus(c *C) {
63 s.spec.Command = []string{"false"}
67 func (s *executorSuite) TestSignalExitStatus(c *C) {
68 if _, isdocker := s.executor.(*dockerExecutor); isdocker {
69 // It's not quite this easy to make busybox kill
70 // itself in docker where it's pid 1.
71 c.Skip("kill -9 $$ doesn't work on busybox with pid=1 in docker")
74 s.spec.Command = []string{"sh", "-c", "kill -9 $$"}
78 func (s *executorSuite) TestExecStop(c *C) {
79 s.spec.Command = []string{"sh", "-c", "sleep 10; echo ok"}
80 err := s.executor.Create(s.spec)
82 err = s.executor.Start()
85 time.Sleep(time.Second / 10)
88 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(10*time.Second))
90 code, err := s.executor.Wait(ctx)
91 c.Check(code, Not(Equals), 0)
93 c.Check(s.stdout.String(), Equals, "")
94 c.Check(s.stderr.String(), Equals, "")
97 func (s *executorSuite) TestExecCleanEnv(c *C) {
98 s.spec.Command = []string{"env"}
100 c.Check(s.stderr.String(), Equals, "")
101 got := map[string]string{}
102 for _, kv := range strings.Split(s.stdout.String(), "\n") {
106 kv := strings.SplitN(kv, "=", 2)
108 case "HOSTNAME", "HOME":
109 // docker sets these by itself
110 case "LD_LIBRARY_PATH", "SINGULARITY_NAME", "PWD", "LANG", "SHLVL", "SINGULARITY_INIT", "SINGULARITY_CONTAINER":
111 // singularity sets these by itself (cf. https://sylabs.io/guides/3.5/user-guide/environment_and_metadata.html)
112 case "SINGULARITY_APPNAME":
113 // singularity also sets this by itself (v3.5.2, but not v3.7.4)
114 case "PROMPT_COMMAND", "PS1", "SINGULARITY_BIND", "SINGULARITY_COMMAND", "SINGULARITY_ENVIRONMENT":
115 // singularity also sets these by itself (v3.7.4)
120 c.Check(got, DeepEquals, s.spec.Env)
122 func (s *executorSuite) TestExecEnableNetwork(c *C) {
123 for _, enable := range []bool{false, true} {
125 s.spec.Command = []string{"ip", "route"}
126 s.spec.EnableNetwork = enable
129 c.Check(s.stdout.String(), Matches, "(?ms).*default via.*")
131 c.Check(s.stdout.String(), Equals, "")
136 func (s *executorSuite) TestExecWorkingDir(c *C) {
137 s.spec.WorkingDir = "/tmp"
138 s.spec.Command = []string{"sh", "-c", "pwd"}
140 c.Check(s.stdout.String(), Equals, "/tmp\n")
143 func (s *executorSuite) TestExecStdoutStderr(c *C) {
144 s.spec.Command = []string{"sh", "-c", "echo foo; echo -n bar >&2; echo baz; echo waz >&2"}
146 c.Check(s.stdout.String(), Equals, "foo\nbaz\n")
147 c.Check(s.stderr.String(), Equals, "barwaz\n")
150 func (s *executorSuite) checkRun(c *C, expectCode int) {
151 c.Assert(s.executor.Create(s.spec), IsNil)
152 c.Assert(s.executor.Start(), IsNil)
153 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(10*time.Second))
155 code, err := s.executor.Wait(ctx)
157 c.Check(code, Equals, expectCode)