1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
18 "git.arvados.org/arvados.git/sdk/go/arvados"
19 "golang.org/x/net/context"
23 func busyboxDockerImage(c *C) string {
24 fnm := "busybox_uclibc.tar"
26 cachefile := cachedir + "/" + fnm
27 if _, err := os.Stat(cachefile); err == nil {
31 f, err := ioutil.TempFile(cachedir, "")
34 defer os.Remove(f.Name())
36 resp, err := http.Get("https://cache.arvados.org/" + fnm)
38 defer resp.Body.Close()
39 _, err = io.Copy(f, resp.Body)
43 err = os.Rename(f.Name(), cachefile)
49 type nopWriteCloser struct{ io.Writer }
51 func (nopWriteCloser) Close() error { return nil }
53 // embedded by dockerSuite and singularitySuite so they can share
55 type executorSuite struct {
56 newExecutor func(*C) // embedding struct's SetUpSuite method must set this
57 executor containerExecutor
63 func (s *executorSuite) SetUpTest(c *C) {
65 s.stdout = bytes.Buffer{}
66 s.stderr = bytes.Buffer{}
67 s.spec = containerSpec{
68 Image: "busybox:uclibc",
71 Env: map[string]string{"PATH": "/bin:/usr/bin"},
72 NetworkMode: "default",
73 Stdout: nopWriteCloser{&s.stdout},
74 Stderr: nopWriteCloser{&s.stderr},
76 err := s.executor.LoadImage("", busyboxDockerImage(c), arvados.Container{}, "", nil)
80 func (s *executorSuite) TearDownTest(c *C) {
84 func (s *executorSuite) TestExecTrivialContainer(c *C) {
85 s.spec.Command = []string{"echo", "ok"}
87 c.Check(s.stdout.String(), Equals, "ok\n")
88 c.Check(s.stderr.String(), Equals, "")
91 func (s *executorSuite) TestExitStatus(c *C) {
92 s.spec.Command = []string{"false"}
96 func (s *executorSuite) TestSignalExitStatus(c *C) {
97 if _, isdocker := s.executor.(*dockerExecutor); isdocker {
98 // It's not quite this easy to make busybox kill
99 // itself in docker where it's pid 1.
100 c.Skip("kill -9 $$ doesn't work on busybox with pid=1 in docker")
103 s.spec.Command = []string{"sh", "-c", "kill -9 $$"}
104 s.checkRun(c, 0x80+9)
107 func (s *executorSuite) TestExecStop(c *C) {
108 s.spec.Command = []string{"sh", "-c", "sleep 10; echo ok"}
109 err := s.executor.Create(s.spec)
111 err = s.executor.Start()
114 time.Sleep(time.Second / 10)
117 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(10*time.Second))
119 code, err := s.executor.Wait(ctx)
120 c.Check(code, Not(Equals), 0)
122 c.Check(s.stdout.String(), Equals, "")
123 c.Check(s.stderr.String(), Equals, "")
126 func (s *executorSuite) TestExecCleanEnv(c *C) {
127 s.spec.Command = []string{"env"}
129 c.Check(s.stderr.String(), Equals, "")
130 got := map[string]string{}
131 for _, kv := range strings.Split(s.stdout.String(), "\n") {
135 kv := strings.SplitN(kv, "=", 2)
137 case "HOSTNAME", "HOME":
138 // docker sets these by itself
139 case "LD_LIBRARY_PATH", "SINGULARITY_NAME", "PWD", "LANG", "SHLVL", "SINGULARITY_INIT", "SINGULARITY_CONTAINER":
140 // singularity sets these by itself (cf. https://sylabs.io/guides/3.5/user-guide/environment_and_metadata.html)
141 case "SINGULARITY_APPNAME":
142 // singularity also sets this by itself (v3.5.2, but not v3.7.4)
143 case "PROMPT_COMMAND", "PS1", "SINGULARITY_BIND", "SINGULARITY_COMMAND", "SINGULARITY_ENVIRONMENT":
144 // singularity also sets these by itself (v3.7.4)
149 c.Check(got, DeepEquals, s.spec.Env)
151 func (s *executorSuite) TestExecEnableNetwork(c *C) {
152 for _, enable := range []bool{false, true} {
154 s.spec.Command = []string{"ip", "route"}
155 s.spec.EnableNetwork = enable
158 c.Check(s.stdout.String(), Matches, "(?ms).*default via.*")
160 c.Check(s.stdout.String(), Equals, "")
165 func (s *executorSuite) TestExecWorkingDir(c *C) {
166 s.spec.WorkingDir = "/tmp"
167 s.spec.Command = []string{"sh", "-c", "pwd"}
169 c.Check(s.stdout.String(), Equals, "/tmp\n")
172 func (s *executorSuite) TestExecStdoutStderr(c *C) {
173 s.spec.Command = []string{"sh", "-c", "echo foo; echo -n bar >&2; echo baz; echo waz >&2"}
175 c.Check(s.stdout.String(), Equals, "foo\nbaz\n")
176 c.Check(s.stderr.String(), Equals, "barwaz\n")
179 func (s *executorSuite) TestIPAddress(c *C) {
180 s.spec.Command = []string{"nc", "-l", "-p", "1951", "-e", "printf", `HTTP/1.1 418 I'm a teapot\r\n\r\n`}
181 s.spec.EnableNetwork = true
182 c.Assert(s.executor.Create(s.spec), IsNil)
183 c.Assert(s.executor.Start(), IsNil)
184 starttime := time.Now()
186 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(2*time.Second))
189 for ctx.Err() == nil {
190 time.Sleep(time.Second / 10)
191 _, err := s.executor.IPAddress()
196 ip, err := s.executor.IPAddress()
197 if c.Check(err, IsNil) && c.Check(ip, Not(Equals), "") {
198 req, err := http.NewRequest("BREW", "http://"+net.JoinHostPort(ip, "1951"), nil)
200 resp, err := http.DefaultClient.Do(req)
202 c.Check(resp.StatusCode, Equals, http.StatusTeapot)
206 code, _ := s.executor.Wait(ctx)
207 c.Logf("container ran for %v", time.Now().Sub(starttime))
208 c.Check(code, Equals, -1)
211 func (s *executorSuite) TestInject(c *C) {
213 c.Assert(os.WriteFile(hostdir+"/testfile", []byte("first tube"), 0777), IsNil)
214 mountdir := fmt.Sprintf("/injecttest-%d", os.Getpid())
215 s.spec.Command = []string{"sleep", "10"}
216 s.spec.BindMounts = map[string]bindmount{mountdir: {HostPath: hostdir, ReadOnly: true}}
217 c.Assert(s.executor.Create(s.spec), IsNil)
218 c.Assert(s.executor.Start(), IsNil)
219 starttime := time.Now()
221 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(2*time.Second))
224 // Allow InjectCommand to fail a few times while the container
226 for ctx.Err() == nil {
227 _, err := s.executor.InjectCommand(ctx, "", "root", false, []string{"true"})
231 time.Sleep(time.Second / 10)
234 injectcmd := []string{"cat", mountdir + "/testfile"}
235 cmd, err := s.executor.InjectCommand(ctx, "", "root", false, injectcmd)
237 out, err := cmd.CombinedOutput()
238 c.Logf("inject %s => %q", injectcmd, out)
240 c.Check(string(out), Equals, "first tube")
243 code, _ := s.executor.Wait(ctx)
244 c.Logf("container ran for %v", time.Now().Sub(starttime))
245 c.Check(code, Equals, -1)
248 func (s *executorSuite) checkRun(c *C, expectCode int) {
249 c.Assert(s.executor.Create(s.spec), IsNil)
250 c.Assert(s.executor.Start(), IsNil)
251 ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(10*time.Second))
253 code, err := s.executor.Wait(ctx)
255 c.Check(code, Equals, expectCode)