You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mesos.apache.org by al...@apache.org on 2016/10/31 10:59:17 UTC
mesos git commit: Added test cases for HTTPS health checks.
Repository: mesos
Updated Branches:
refs/heads/master d0d496b02 -> 96f48e012
Added test cases for HTTPS health checks.
Review: https://reviews.apache.org/r/53230/
Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/96f48e01
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/96f48e01
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/96f48e01
Branch: refs/heads/master
Commit: 96f48e012764479d7aad1ba77c3241fb590ed109
Parents: d0d496b
Author: haosdent huang <ha...@gmail.com>
Authored: Mon Oct 31 11:57:17 2016 +0100
Committer: Alexander Rukletsov <al...@apache.org>
Committed: Mon Oct 31 11:59:36 2016 +0100
----------------------------------------------------------------------
src/tests/health_check_tests.cpp | 218 ++++++++++++++++++++++++++++++++++
1 file changed, 218 insertions(+)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/mesos/blob/96f48e01/src/tests/health_check_tests.cpp
----------------------------------------------------------------------
diff --git a/src/tests/health_check_tests.cpp b/src/tests/health_check_tests.cpp
index bc3015e..e473c98 100644
--- a/src/tests/health_check_tests.cpp
+++ b/src/tests/health_check_tests.cpp
@@ -1629,6 +1629,94 @@ TEST_F(HealthCheckTest, ROOT_INTERNET_CURL_HealthyTaskViaHTTPWithContainerImage)
}
+// Tests a healthy task via HTTPS with a container image using mesos
+// containerizer. To emulate a task responsive to HTTPS health checks,
+// starts an HTTPS server in the docker "haosdent/https-server" image.
+TEST_F(HealthCheckTest,
+ ROOT_INTERNET_CURL_HealthyTaskViaHTTPSWithContainerImage)
+{
+ master::Flags masterFlags = CreateMasterFlags();
+ Try<Owned<cluster::Master>> master = StartMaster(masterFlags);
+ ASSERT_SOME(master);
+
+ slave::Flags agentFlags = CreateSlaveFlags();
+ agentFlags.isolation = "docker/runtime,filesystem/linux";
+ agentFlags.image_providers = "docker";
+
+ Owned<MasterDetector> detector = master.get()->createDetector();
+ Try<Owned<cluster::Slave>> agent = StartSlave(detector.get(), agentFlags);
+ ASSERT_SOME(agent);
+
+ MockScheduler sched;
+ MesosSchedulerDriver driver(
+ &sched, DEFAULT_FRAMEWORK_INFO, master.get()->pid, DEFAULT_CREDENTIAL);
+
+ EXPECT_CALL(sched, registered(&driver, _, _));
+
+ Future<vector<Offer>> offers;
+ EXPECT_CALL(sched, resourceOffers(&driver, _))
+ .WillOnce(FutureArg<1>(&offers))
+ .WillRepeatedly(Return()); // Ignore subsequent offers.
+
+ driver.start();
+
+ AWAIT_READY(offers);
+ EXPECT_NE(0u, offers.get().size());
+
+ const uint16_t testPort = 31001;
+
+ const string command = strings::format(
+ "python https_server.py %u",
+ testPort).get();
+
+ TaskInfo task = createTask(offers.get()[0], command);
+
+ // Refer to https://github.com/haosdent/https-server/ for how the
+ // docker image `haosdent/https-server` works.
+ Image image;
+ image.set_type(Image::DOCKER);
+ image.mutable_docker()->set_name("haosdent/https-server");
+
+ ContainerInfo* container = task.mutable_container();
+ container->set_type(ContainerInfo::MESOS);
+ container->mutable_mesos()->mutable_image()->CopyFrom(image);
+
+ // Set `grace_period_seconds` here because it takes some time to
+ // launch the HTTPS server to serve requests.
+ HealthCheck healthCheck;
+ healthCheck.set_type(HealthCheck::HTTP);
+ healthCheck.mutable_http()->set_port(testPort);
+ healthCheck.mutable_http()->set_scheme("https");
+ healthCheck.set_delay_seconds(0);
+ healthCheck.set_interval_seconds(0);
+ healthCheck.set_grace_period_seconds(15);
+
+ task.mutable_health_check()->CopyFrom(healthCheck);
+
+ Future<TaskStatus> statusRunning;
+ Future<TaskStatus> statusHealthy;
+
+ EXPECT_CALL(sched, statusUpdate(&driver, _))
+ .WillOnce(FutureArg<1>(&statusRunning))
+ .WillOnce(FutureArg<1>(&statusHealthy))
+ .WillRepeatedly(Return()); // Ignore subsequent updates.
+
+ driver.launchTasks(offers.get()[0].id(), {task});
+
+ // Increase time here to wait for pulling image finish.
+ AWAIT_READY_FOR(statusRunning, Seconds(60));
+ EXPECT_EQ(TASK_RUNNING, statusRunning.get().state());
+
+ AWAIT_READY(statusHealthy);
+ EXPECT_EQ(TASK_RUNNING, statusHealthy.get().state());
+ EXPECT_TRUE(statusHealthy.get().has_healthy());
+ EXPECT_TRUE(statusHealthy.get().healthy());
+
+ driver.stop();
+ driver.join();
+}
+
+
// Tests a healthy task via TCP with a container image using mesos
// containerizer. To emulate a task responsive to TCP health checks,
// starts Netcat in the docker "alpine" image.
@@ -1844,6 +1932,136 @@ TEST_F(HealthCheckTest, ROOT_DOCKER_DockerHealthyTaskViaHTTP)
}
+// Tests a healthy docker task via HTTPS. To emulate a task responsive
+// to HTTPS health checks, starts an HTTPS server in the docker
+// "haosdent/https-server" image.
+TEST_F(HealthCheckTest, ROOT_DOCKER_DockerHealthyTaskViaHTTPS)
+{
+ Shared<Docker> docker(new MockDocker(
+ tests::flags.docker, tests::flags.docker_socket));
+
+ Try<Owned<cluster::Master>> master = StartMaster();
+ ASSERT_SOME(master);
+
+ slave::Flags agentFlags = CreateSlaveFlags();
+
+ Fetcher fetcher;
+
+ Try<ContainerLogger*> logger =
+ ContainerLogger::create(agentFlags.container_logger);
+ ASSERT_SOME(logger);
+
+ MockDockerContainerizer containerizer(
+ agentFlags,
+ &fetcher,
+ Owned<ContainerLogger>(logger.get()),
+ docker);
+
+ Owned<MasterDetector> detector = master.get()->createDetector();
+ Try<Owned<cluster::Slave>> agent =
+ StartSlave(detector.get(), &containerizer, agentFlags);
+ ASSERT_SOME(agent);
+
+ MockScheduler sched;
+ MesosSchedulerDriver driver(
+ &sched, DEFAULT_FRAMEWORK_INFO, master.get()->pid, DEFAULT_CREDENTIAL);
+
+ EXPECT_CALL(sched, registered(&driver, _, _));
+
+ Future<vector<Offer>> offers;
+ EXPECT_CALL(sched, resourceOffers(&driver, _))
+ .WillOnce(FutureArg<1>(&offers))
+ .WillRepeatedly(Return()); // Ignore subsequent offers.
+
+ driver.start();
+
+ AWAIT_READY(offers);
+ EXPECT_NE(0u, offers.get().size());
+
+ const uint16_t testPort = 31001;
+
+ const string command = strings::format(
+ "python https_server.py %u",
+ testPort).get();
+
+ TaskInfo task = createTask(offers.get()[0], command);
+
+ // The docker container runs in bridge network mode.
+ // Refer to https://github.com/haosdent/https-server/ for how the
+ // docker image `haosdent/https-server` works.
+ //
+ // TODO(haosdent): Use local image to test if possible.
+ ContainerInfo containerInfo;
+ containerInfo.set_type(ContainerInfo::DOCKER);
+ containerInfo.mutable_docker()->set_image("haosdent/https-server");
+ containerInfo.mutable_docker()->set_network(
+ ContainerInfo::DockerInfo::BRIDGE);
+
+ task.mutable_container()->CopyFrom(containerInfo);
+
+ // Set `grace_period_seconds` here because it takes some time to
+ // launch the HTTPS server to serve requests.
+ HealthCheck healthCheck;
+ healthCheck.set_type(HealthCheck::HTTP);
+ healthCheck.mutable_http()->set_port(testPort);
+ healthCheck.mutable_http()->set_scheme("https");
+ healthCheck.set_delay_seconds(0);
+ healthCheck.set_interval_seconds(0);
+ healthCheck.set_grace_period_seconds(15);
+
+ task.mutable_health_check()->CopyFrom(healthCheck);
+
+ Future<ContainerID> containerId;
+ EXPECT_CALL(containerizer, launch(_, _, _, _, _, _, _, _))
+ .WillOnce(DoAll(FutureArg<0>(&containerId),
+ Invoke(&containerizer,
+ &MockDockerContainerizer::_launch)));
+
+ Future<TaskStatus> statusRunning;
+ Future<TaskStatus> statusHealthy;
+
+ EXPECT_CALL(sched, statusUpdate(&driver, _))
+ .WillOnce(FutureArg<1>(&statusRunning))
+ .WillOnce(FutureArg<1>(&statusHealthy))
+ .WillRepeatedly(Return()); // Ignore subsequent updates.
+
+ driver.launchTasks(offers.get()[0].id(), {task});
+
+ AWAIT_READY(containerId);
+
+ // Increase time here to wait for pulling image finish.
+ AWAIT_READY_FOR(statusRunning, Seconds(60));
+ EXPECT_EQ(TASK_RUNNING, statusRunning.get().state());
+
+ AWAIT_READY(statusHealthy);
+ EXPECT_EQ(TASK_RUNNING, statusHealthy.get().state());
+ EXPECT_TRUE(statusHealthy.get().has_healthy());
+ EXPECT_TRUE(statusHealthy.get().healthy());
+
+ Future<Option<ContainerTermination>> termination =
+ containerizer.wait(containerId.get());
+
+ driver.stop();
+ driver.join();
+
+ AWAIT_READY(termination);
+ EXPECT_SOME(termination.get());
+
+ agent.get()->terminate();
+ agent->reset();
+
+ Future<std::list<Docker::Container>> containers =
+ docker->ps(true, slave::DOCKER_NAME_PREFIX);
+
+ AWAIT_READY(containers);
+
+ // Clean up all mesos launched docker containers.
+ foreach (const Docker::Container& container, containers.get()) {
+ AWAIT_READY_FOR(docker->rm(container.id, true), Seconds(30));
+ }
+}
+
+
// Tests a healthy docker task via TCP. To emulate a task responsive
// to TCP health checks, starts Netcat in the docker "alpine" image.
//