X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/091ae55fc1df3ec50490becd437d512e38b0f972..ab832f5a22db3debbd13cacbee9cf69d68d7075c:/cmd/arvados-client/container_gateway_test.go diff --git a/cmd/arvados-client/container_gateway_test.go b/cmd/arvados-client/container_gateway_test.go index 743b91d69b..a49a58bf4d 100644 --- a/cmd/arvados-client/container_gateway_test.go +++ b/cmd/arvados-client/container_gateway_test.go @@ -10,6 +10,7 @@ import ( "crypto/hmac" "crypto/sha256" "fmt" + "io" "io/ioutil" "net" "net/http" @@ -24,9 +25,11 @@ import ( "git.arvados.org/arvados.git/lib/controller/rpc" "git.arvados.org/arvados.git/lib/crunchrun" "git.arvados.org/arvados.git/sdk/go/arvados" + "git.arvados.org/arvados.git/sdk/go/arvadosclient" "git.arvados.org/arvados.git/sdk/go/arvadostest" "git.arvados.org/arvados.git/sdk/go/ctxlog" "git.arvados.org/arvados.git/sdk/go/httpserver" + "git.arvados.org/arvados.git/sdk/go/keepclient" check "gopkg.in/check.v1" ) @@ -178,3 +181,133 @@ func (s *ClientSuite) TestShellGateway(c *check.C) { } wg.Wait() } + +func (s *ClientSuite) TestContainerLog(c *check.C) { + arvadostest.StartKeep(2, true) + ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(30*time.Second)) + defer cancel() + + rpcconn := rpc.NewConn("", + &url.URL{ + Scheme: "https", + Host: os.Getenv("ARVADOS_API_HOST"), + }, + true, + func(context.Context) ([]string, error) { + return []string{arvadostest.SystemRootToken}, nil + }) + imageColl, err := rpcconn.CollectionCreate(ctx, arvados.CreateOptions{Attrs: map[string]interface{}{ + "manifest_text": ". d41d8cd98f00b204e9800998ecf8427e+0 0:0:sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.tar\n", + }}) + c.Assert(err, check.IsNil) + c.Logf("imageColl %+v", imageColl) + cr, err := rpcconn.ContainerRequestCreate(ctx, arvados.CreateOptions{Attrs: map[string]interface{}{ + "state": "Committed", + "command": []string{"echo", fmt.Sprintf("%d", time.Now().Unix())}, + "container_image": imageColl.PortableDataHash, + "cwd": "/", + "output_path": "/", + "priority": 1, + "runtime_constraints": arvados.RuntimeConstraints{ + VCPUs: 1, + RAM: 1000000000, + }, + "container_count_max": 1, + }}) + c.Assert(err, check.IsNil) + h := hmac.New(sha256.New, []byte(arvadostest.SystemRootToken)) + fmt.Fprint(h, cr.ContainerUUID) + authSecret := fmt.Sprintf("%x", h.Sum(nil)) + + coll := arvados.Collection{} + client := arvados.NewClientFromEnv() + ac, err := arvadosclient.New(client) + c.Assert(err, check.IsNil) + kc, err := keepclient.MakeKeepClient(ac) + c.Assert(err, check.IsNil) + cfs, err := coll.FileSystem(client, kc) + c.Assert(err, check.IsNil) + + c.Log("running logs command on queued container") + var stdout, stderr bytes.Buffer + cmd := exec.CommandContext(ctx, "go", "run", ".", "logs", "-poll=250ms", cr.UUID) + cmd.Env = append(cmd.Env, os.Environ()...) + cmd.Env = append(cmd.Env, "ARVADOS_API_TOKEN="+arvadostest.SystemRootToken) + cmd.Stdout = io.MultiWriter(&stdout, os.Stderr) + cmd.Stderr = io.MultiWriter(&stderr, os.Stderr) + err = cmd.Start() + c.Assert(err, check.Equals, nil) + + c.Log("changing container state to Locked") + _, err = rpcconn.ContainerUpdate(ctx, arvados.UpdateOptions{UUID: cr.ContainerUUID, Attrs: map[string]interface{}{ + "state": arvados.ContainerStateLocked, + }}) + c.Assert(err, check.IsNil) + c.Log("starting gateway") + gw := crunchrun.Gateway{ + ContainerUUID: cr.ContainerUUID, + Address: "0.0.0.0:0", + AuthSecret: authSecret, + Log: ctxlog.TestLogger(c), + Target: crunchrun.GatewayTargetStub{}, + LogCollection: cfs, + } + err = gw.Start() + c.Assert(err, check.IsNil) + c.Log("updating container gateway address") + _, err = rpcconn.ContainerUpdate(ctx, arvados.UpdateOptions{UUID: cr.ContainerUUID, Attrs: map[string]interface{}{ + "gateway_address": gw.Address, + "state": arvados.ContainerStateRunning, + }}) + c.Assert(err, check.IsNil) + + fCrunchrun, err := cfs.OpenFile("crunch-run.txt", os.O_CREATE|os.O_WRONLY, 0777) + c.Assert(err, check.IsNil) + _, err = fmt.Fprintln(fCrunchrun, "line 1 of crunch-run.txt") + c.Assert(err, check.IsNil) + fStderr, err := cfs.OpenFile("stderr.txt", os.O_CREATE|os.O_WRONLY, 0777) + c.Assert(err, check.IsNil) + _, err = fmt.Fprintln(fStderr, "line 1 of stderr") + c.Assert(err, check.IsNil) + time.Sleep(time.Second * 2) + _, err = fmt.Fprintln(fCrunchrun, "line 2 of crunch-run.txt") + c.Assert(err, check.IsNil) + _, err = fmt.Fprintln(fStderr, "--end--") + c.Assert(err, check.IsNil) + + for deadline := time.Now().Add(20 * time.Second); time.Now().Before(deadline) && !strings.Contains(stdout.String(), "--end--"); time.Sleep(time.Second / 10) { + } + c.Check(stdout.String(), check.Matches, `(?ms).*stderr\.txt +--end--\n.*`) + + mtxt, err := cfs.MarshalManifest(".") + c.Assert(err, check.IsNil) + savedLog, err := rpcconn.CollectionCreate(ctx, arvados.CreateOptions{Attrs: map[string]interface{}{ + "manifest_text": mtxt, + }}) + c.Assert(err, check.IsNil) + _, err = rpcconn.ContainerUpdate(ctx, arvados.UpdateOptions{UUID: cr.ContainerUUID, Attrs: map[string]interface{}{ + "state": arvados.ContainerStateComplete, + "log": savedLog.PortableDataHash, + "output": "d41d8cd98f00b204e9800998ecf8427e+0", + "exit_code": 0, + }}) + c.Assert(err, check.IsNil) + + err = cmd.Wait() + c.Check(err, check.IsNil) + // Ensure controller doesn't cheat by fetching data from the + // gateway after the container is complete. + gw.LogCollection = nil + + c.Logf("re-running logs command on completed container") + { + ctx, cancel := context.WithDeadline(ctx, time.Now().Add(time.Second*5)) + defer cancel() + cmd := exec.CommandContext(ctx, "go", "run", ".", "logs", cr.UUID) + cmd.Env = append(cmd.Env, os.Environ()...) + cmd.Env = append(cmd.Env, "ARVADOS_API_TOKEN="+arvadostest.SystemRootToken) + buf, err := cmd.CombinedOutput() + c.Check(err, check.Equals, nil) + c.Check(string(buf), check.Matches, `(?ms).*--end--\n`) + } +}