2022-04-11 21:06:15 +00:00
|
|
|
package coderd_test
|
|
|
|
|
|
|
|
import (
|
2022-05-18 17:06:17 +00:00
|
|
|
"bufio"
|
2022-04-11 21:06:15 +00:00
|
|
|
"context"
|
2022-04-29 22:30:10 +00:00
|
|
|
"encoding/json"
|
2022-10-11 15:10:02 +00:00
|
|
|
"fmt"
|
2022-10-06 12:38:22 +00:00
|
|
|
"net"
|
2022-10-25 00:46:24 +00:00
|
|
|
"net/http"
|
2022-11-29 18:08:27 +00:00
|
|
|
"net/http/httptest"
|
2022-10-25 00:46:24 +00:00
|
|
|
"regexp"
|
2022-05-02 15:27:34 +00:00
|
|
|
"runtime"
|
2022-10-06 12:38:22 +00:00
|
|
|
"strconv"
|
2022-04-29 22:30:10 +00:00
|
|
|
"strings"
|
2022-04-11 21:06:15 +00:00
|
|
|
"testing"
|
2022-05-18 17:06:17 +00:00
|
|
|
"time"
|
2022-04-11 21:06:15 +00:00
|
|
|
|
|
|
|
"github.com/google/uuid"
|
2022-10-25 00:46:24 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2022-04-11 21:06:15 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-11-15 21:06:13 +00:00
|
|
|
"golang.org/x/oauth2"
|
2022-04-11 21:06:15 +00:00
|
|
|
|
|
|
|
"cdr.dev/slog"
|
|
|
|
"cdr.dev/slog/sloggers/slogtest"
|
|
|
|
"github.com/coder/coder/agent"
|
|
|
|
"github.com/coder/coder/coderd/coderdtest"
|
2022-11-15 21:06:13 +00:00
|
|
|
"github.com/coder/coder/coderd/database"
|
2022-10-25 00:46:24 +00:00
|
|
|
"github.com/coder/coder/coderd/gitauth"
|
2022-04-11 21:06:15 +00:00
|
|
|
"github.com/coder/coder/codersdk"
|
2023-01-29 21:47:24 +00:00
|
|
|
"github.com/coder/coder/codersdk/agentsdk"
|
2022-04-11 21:06:15 +00:00
|
|
|
"github.com/coder/coder/provisioner/echo"
|
|
|
|
"github.com/coder/coder/provisionersdk/proto"
|
2022-08-09 17:17:00 +00:00
|
|
|
"github.com/coder/coder/testutil"
|
2022-04-11 21:06:15 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestWorkspaceAgent(t *testing.T) {
|
|
|
|
t.Parallel()
|
2022-05-02 15:27:34 +00:00
|
|
|
t.Run("Connect", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2022-06-27 18:50:52 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
2022-09-04 16:28:09 +00:00
|
|
|
IncludeProvisionerDaemon: true,
|
2022-06-27 18:50:52 +00:00
|
|
|
})
|
2022-05-02 15:27:34 +00:00
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
2022-07-25 13:55:06 +00:00
|
|
|
tmpDir := t.TempDir()
|
2022-05-02 15:27:34 +00:00
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2022-11-11 22:45:58 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-05-02 15:27:34 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
2022-07-25 13:55:06 +00:00
|
|
|
Directory: tmpDir,
|
2022-05-02 15:27:34 +00:00
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
}},
|
2022-04-11 21:06:15 +00:00
|
|
|
}},
|
2022-05-02 15:27:34 +00:00
|
|
|
},
|
2022-04-11 21:06:15 +00:00
|
|
|
},
|
2022-05-02 15:27:34 +00:00
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
2022-04-11 21:06:15 +00:00
|
|
|
|
2022-08-09 17:17:00 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
2022-10-03 21:01:13 +00:00
|
|
|
workspace, err := client.Workspace(ctx, workspace.ID)
|
2022-05-02 15:27:34 +00:00
|
|
|
require.NoError(t, err)
|
2022-10-03 21:01:13 +00:00
|
|
|
require.Equal(t, tmpDir, workspace.LatestBuild.Resources[0].Agents[0].Directory)
|
|
|
|
_, err = client.WorkspaceAgent(ctx, workspace.LatestBuild.Resources[0].Agents[0].ID)
|
2022-05-02 15:27:34 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
2022-11-16 10:53:02 +00:00
|
|
|
t.Run("HasFallbackTroubleshootingURL", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
tmpDir := t.TempDir()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Directory: tmpDir,
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitMedium)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
workspace, err := client.Workspace(ctx, workspace.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, workspace.LatestBuild.Resources[0].Agents[0].TroubleshootingURL)
|
|
|
|
t.Log(workspace.LatestBuild.Resources[0].Agents[0].TroubleshootingURL)
|
|
|
|
})
|
2022-11-09 15:27:05 +00:00
|
|
|
t.Run("Timeout", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
tmpDir := t.TempDir()
|
2022-11-16 10:53:02 +00:00
|
|
|
|
|
|
|
wantTroubleshootingURL := "https://example.com/troubleshoot"
|
|
|
|
|
2022-11-09 15:27:05 +00:00
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2022-11-11 22:45:58 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-11-09 15:27:05 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Directory: tmpDir,
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
ConnectionTimeoutSeconds: 1,
|
2022-11-16 10:53:02 +00:00
|
|
|
TroubleshootingUrl: wantTroubleshootingURL,
|
2022-11-09 15:27:05 +00:00
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitMedium)
|
|
|
|
defer cancel()
|
|
|
|
|
2022-11-16 10:53:02 +00:00
|
|
|
var err error
|
2022-11-09 15:27:05 +00:00
|
|
|
testutil.Eventually(ctx, t, func(ctx context.Context) (done bool) {
|
2022-11-16 10:53:02 +00:00
|
|
|
workspace, err = client.Workspace(ctx, workspace.ID)
|
2022-11-09 15:27:05 +00:00
|
|
|
if !assert.NoError(t, err) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return workspace.LatestBuild.Resources[0].Agents[0].Status == codersdk.WorkspaceAgentTimeout
|
|
|
|
}, testutil.IntervalMedium, "agent status timeout")
|
2022-11-16 10:53:02 +00:00
|
|
|
|
|
|
|
require.Equal(t, wantTroubleshootingURL, workspace.LatestBuild.Resources[0].Agents[0].TroubleshootingURL)
|
2022-11-09 15:27:05 +00:00
|
|
|
})
|
2022-04-11 21:06:15 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 19:09:13 +00:00
|
|
|
func TestWorkspaceAgentStartupLogs(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
t.Run("Success", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2023-03-23 22:42:20 +00:00
|
|
|
ctx := testutil.Context(t, testutil.WaitMedium)
|
2023-03-23 19:09:13 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
build := coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
agentClient := agentsdk.New(client.URL)
|
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
err := agentClient.PatchStartupLogs(ctx, agentsdk.PatchStartupLogs{
|
|
|
|
Logs: []agentsdk.StartupLog{{
|
|
|
|
CreatedAt: database.Now(),
|
|
|
|
Output: "testing",
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
logs, closer, err := client.WorkspaceAgentStartupLogsAfter(ctx, build.Resources[0].Agents[0].ID, -500)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer func() {
|
|
|
|
_ = closer.Close()
|
|
|
|
}()
|
|
|
|
var logChunk []codersdk.WorkspaceAgentStartupLog
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
case logChunk = <-logs:
|
|
|
|
}
|
|
|
|
require.NoError(t, ctx.Err())
|
|
|
|
require.Len(t, logChunk, 1)
|
|
|
|
require.Equal(t, "testing", logChunk[0].Output)
|
|
|
|
})
|
|
|
|
t.Run("PublishesOnOverflow", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2023-03-23 22:42:20 +00:00
|
|
|
ctx := testutil.Context(t, testutil.WaitMedium)
|
2023-03-23 19:09:13 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
updates, err := client.WatchWorkspace(ctx, workspace.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
agentClient := agentsdk.New(client.URL)
|
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
err = agentClient.PatchStartupLogs(ctx, agentsdk.PatchStartupLogs{
|
|
|
|
Logs: []agentsdk.StartupLog{{
|
|
|
|
CreatedAt: database.Now(),
|
|
|
|
Output: strings.Repeat("a", (1<<20)+1),
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
var apiError *codersdk.Error
|
|
|
|
require.ErrorAs(t, err, &apiError)
|
|
|
|
require.Equal(t, http.StatusRequestEntityTooLarge, apiError.StatusCode())
|
|
|
|
|
2023-03-30 15:05:45 +00:00
|
|
|
// It's possible we have multiple updates queued, but that's alright, we just
|
|
|
|
// wait for the one where it overflows.
|
|
|
|
for {
|
|
|
|
var update codersdk.Workspace
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
t.FailNow()
|
|
|
|
case update = <-updates:
|
|
|
|
}
|
|
|
|
if update.LatestBuild.Resources[0].Agents[0].StartupLogsOverflowed {
|
|
|
|
break
|
|
|
|
}
|
2023-03-23 19:09:13 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-04-11 21:06:15 +00:00
|
|
|
func TestWorkspaceAgentListen(t *testing.T) {
|
|
|
|
t.Parallel()
|
2022-06-02 20:03:01 +00:00
|
|
|
|
|
|
|
t.Run("Connect", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2022-06-27 18:50:52 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
2022-09-04 16:28:09 +00:00
|
|
|
IncludeProvisionerDaemon: true,
|
2022-06-27 18:50:52 +00:00
|
|
|
})
|
2022-06-02 20:03:01 +00:00
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-06-02 20:03:01 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-09-01 01:09:44 +00:00
|
|
|
agentCloser := agent.New(agent.Options{
|
2022-10-24 03:35:08 +00:00
|
|
|
Client: agentClient,
|
|
|
|
Logger: slogtest.Make(t, nil).Named("agent").Leveled(slog.LevelDebug),
|
2022-06-02 20:03:01 +00:00
|
|
|
})
|
2022-07-25 16:22:02 +00:00
|
|
|
defer func() {
|
2022-06-02 20:03:01 +00:00
|
|
|
_ = agentCloser.Close()
|
2022-07-25 16:22:02 +00:00
|
|
|
}()
|
2022-08-09 17:17:00 +00:00
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
2022-10-03 21:01:13 +00:00
|
|
|
resources := coderdtest.AwaitWorkspaceAgents(t, client, workspace.ID)
|
2022-10-17 13:43:30 +00:00
|
|
|
conn, err := client.DialWorkspaceAgent(ctx, resources[0].Agents[0].ID, nil)
|
2022-06-02 20:03:01 +00:00
|
|
|
require.NoError(t, err)
|
2022-07-25 16:22:02 +00:00
|
|
|
defer func() {
|
2022-06-02 20:03:01 +00:00
|
|
|
_ = conn.Close()
|
2022-07-25 16:22:02 +00:00
|
|
|
}()
|
2022-11-13 17:33:05 +00:00
|
|
|
conn.AwaitReachable(ctx)
|
2022-04-11 21:06:15 +00:00
|
|
|
})
|
2022-06-02 20:03:01 +00:00
|
|
|
|
|
|
|
t.Run("FailNonLatestBuild", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2022-06-27 18:50:52 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
2022-09-04 16:28:09 +00:00
|
|
|
IncludeProvisionerDaemon: true,
|
2022-06-27 18:50:52 +00:00
|
|
|
})
|
2022-06-02 20:03:01 +00:00
|
|
|
|
2022-06-27 18:50:52 +00:00
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
2022-06-02 20:03:01 +00:00
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-06-02 20:03:01 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
version = coderdtest.UpdateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2022-11-11 22:45:58 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-06-02 20:03:01 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: uuid.NewString(),
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}, template.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
|
2022-08-09 17:17:00 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
stopBuild, err := client.CreateWorkspaceBuild(ctx, workspace.ID, codersdk.CreateWorkspaceBuildRequest{
|
2022-06-02 20:03:01 +00:00
|
|
|
TemplateVersionID: version.ID,
|
|
|
|
Transition: codersdk.WorkspaceTransitionStop,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, stopBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-06-02 20:03:01 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
_, err = agentClient.Listen(ctx)
|
2022-06-02 20:03:01 +00:00
|
|
|
require.Error(t, err)
|
|
|
|
require.ErrorContains(t, err, "build is outdated")
|
2022-04-11 21:06:15 +00:00
|
|
|
})
|
2022-04-18 22:40:25 +00:00
|
|
|
}
|
|
|
|
|
2022-09-01 01:09:44 +00:00
|
|
|
func TestWorkspaceAgentTailnet(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client, daemonCloser := coderdtest.NewWithProvisionerCloser(t, nil)
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-09-01 01:09:44 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
daemonCloser.Close()
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-09-01 01:09:44 +00:00
|
|
|
agentCloser := agent.New(agent.Options{
|
2022-10-24 03:35:08 +00:00
|
|
|
Client: agentClient,
|
|
|
|
Logger: slogtest.Make(t, nil).Named("agent").Leveled(slog.LevelDebug),
|
2022-09-01 01:09:44 +00:00
|
|
|
})
|
|
|
|
defer agentCloser.Close()
|
2022-10-03 21:01:13 +00:00
|
|
|
resources := coderdtest.AwaitWorkspaceAgents(t, client, workspace.ID)
|
2022-09-01 01:09:44 +00:00
|
|
|
|
|
|
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
|
|
|
defer cancelFunc()
|
2022-10-17 13:43:30 +00:00
|
|
|
conn, err := client.DialWorkspaceAgent(ctx, resources[0].Agents[0].ID, &codersdk.DialWorkspaceAgentOptions{
|
|
|
|
Logger: slogtest.Make(t, nil).Named("client").Leveled(slog.LevelDebug),
|
|
|
|
})
|
2022-09-01 01:09:44 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
defer conn.Close()
|
2022-11-08 22:10:48 +00:00
|
|
|
sshClient, err := conn.SSHClient(ctx)
|
2022-09-01 01:09:44 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
session, err := sshClient.NewSession()
|
|
|
|
require.NoError(t, err)
|
|
|
|
output, err := session.CombinedOutput("echo test")
|
|
|
|
require.NoError(t, err)
|
|
|
|
_ = session.Close()
|
|
|
|
_ = sshClient.Close()
|
|
|
|
_ = conn.Close()
|
|
|
|
require.Equal(t, "test", strings.TrimSpace(string(output)))
|
|
|
|
}
|
|
|
|
|
2022-04-29 22:30:10 +00:00
|
|
|
func TestWorkspaceAgentPTY(t *testing.T) {
|
|
|
|
t.Parallel()
|
2022-05-02 15:27:34 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
// This might be our implementation, or ConPTY itself.
|
|
|
|
// It's difficult to find extensive tests for it, so
|
|
|
|
// it seems like it could be either.
|
|
|
|
t.Skip("ConPTY appears to be inconsistent on Windows.")
|
|
|
|
}
|
2022-06-27 18:50:52 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
2022-09-04 16:28:09 +00:00
|
|
|
IncludeProvisionerDaemon: true,
|
2022-06-27 18:50:52 +00:00
|
|
|
})
|
2022-04-29 22:30:10 +00:00
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-04-29 22:30:10 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-09-01 01:09:44 +00:00
|
|
|
agentCloser := agent.New(agent.Options{
|
2022-10-24 03:35:08 +00:00
|
|
|
Client: agentClient,
|
|
|
|
Logger: slogtest.Make(t, nil).Named("agent").Leveled(slog.LevelDebug),
|
2022-04-29 22:30:10 +00:00
|
|
|
})
|
2022-07-25 16:22:02 +00:00
|
|
|
defer func() {
|
2022-04-29 22:30:10 +00:00
|
|
|
_ = agentCloser.Close()
|
2022-07-25 16:22:02 +00:00
|
|
|
}()
|
2022-10-03 21:01:13 +00:00
|
|
|
resources := coderdtest.AwaitWorkspaceAgents(t, client, workspace.ID)
|
2022-08-09 17:17:00 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
conn, err := client.WorkspaceAgentReconnectingPTY(ctx, resources[0].Agents[0].ID, uuid.New(), 80, 80, "/bin/bash")
|
2022-04-29 22:30:10 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
// First attempt to resize the TTY.
|
|
|
|
// The websocket will close if it fails!
|
2022-09-23 19:51:04 +00:00
|
|
|
data, err := json.Marshal(codersdk.ReconnectingPTYRequest{
|
2022-04-29 22:30:10 +00:00
|
|
|
Height: 250,
|
|
|
|
Width: 250,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
_, err = conn.Write(data)
|
|
|
|
require.NoError(t, err)
|
2022-05-18 17:06:17 +00:00
|
|
|
bufRead := bufio.NewReader(conn)
|
|
|
|
|
|
|
|
// Brief pause to reduce the likelihood that we send keystrokes while
|
|
|
|
// the shell is simultaneously sending a prompt.
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
2022-04-29 22:30:10 +00:00
|
|
|
|
2022-09-23 19:51:04 +00:00
|
|
|
data, err = json.Marshal(codersdk.ReconnectingPTYRequest{
|
2022-04-29 22:30:10 +00:00
|
|
|
Data: "echo test\r\n",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
_, err = conn.Write(data)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2022-05-18 17:06:17 +00:00
|
|
|
expectLine := func(matcher func(string) bool) {
|
2022-04-29 22:30:10 +00:00
|
|
|
for {
|
2022-05-18 17:06:17 +00:00
|
|
|
line, err := bufRead.ReadString('\n')
|
2022-04-29 22:30:10 +00:00
|
|
|
require.NoError(t, err)
|
2022-05-18 17:06:17 +00:00
|
|
|
if matcher(line) {
|
|
|
|
break
|
2022-04-29 22:30:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-05-18 17:06:17 +00:00
|
|
|
matchEchoCommand := func(line string) bool {
|
|
|
|
return strings.Contains(line, "echo test")
|
|
|
|
}
|
|
|
|
matchEchoOutput := func(line string) bool {
|
|
|
|
return strings.Contains(line, "test") && !strings.Contains(line, "echo")
|
|
|
|
}
|
2022-04-29 22:30:10 +00:00
|
|
|
|
2022-05-18 17:06:17 +00:00
|
|
|
expectLine(matchEchoCommand)
|
|
|
|
expectLine(matchEchoOutput)
|
2022-04-29 22:30:10 +00:00
|
|
|
}
|
2022-09-23 19:51:04 +00:00
|
|
|
|
2022-10-06 12:38:22 +00:00
|
|
|
func TestWorkspaceAgentListeningPorts(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
setup := func(t *testing.T, apps []*proto.App) (*codersdk.Client, uint16, uuid.UUID) {
|
2023-02-24 11:11:28 +00:00
|
|
|
t.Helper()
|
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
coderdPort, err := strconv.Atoi(client.URL.Port())
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2022-11-11 22:45:58 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-10-11 15:10:02 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
Apps: apps,
|
|
|
|
}},
|
2022-10-06 12:38:22 +00:00
|
|
|
}},
|
2022-10-11 15:10:02 +00:00
|
|
|
},
|
2022-10-06 12:38:22 +00:00
|
|
|
},
|
2022-10-11 15:10:02 +00:00
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
2022-10-06 12:38:22 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-10-11 15:10:02 +00:00
|
|
|
agentCloser := agent.New(agent.Options{
|
2022-10-24 03:35:08 +00:00
|
|
|
Client: agentClient,
|
|
|
|
Logger: slogtest.Make(t, nil).Named("agent").Leveled(slog.LevelDebug),
|
2022-10-11 15:10:02 +00:00
|
|
|
})
|
|
|
|
t.Cleanup(func() {
|
|
|
|
_ = agentCloser.Close()
|
|
|
|
})
|
|
|
|
resources := coderdtest.AwaitWorkspaceAgents(t, client, workspace.ID)
|
|
|
|
|
|
|
|
return client, uint16(coderdPort), resources[0].Agents[0].ID
|
|
|
|
}
|
|
|
|
|
|
|
|
willFilterPort := func(port int) bool {
|
2023-01-29 21:47:24 +00:00
|
|
|
if port < codersdk.WorkspaceAgentMinimumListeningPort || port > 65535 {
|
2022-10-11 15:10:02 +00:00
|
|
|
return true
|
|
|
|
}
|
2023-01-29 21:47:24 +00:00
|
|
|
if _, ok := codersdk.WorkspaceAgentIgnoredListeningPorts[uint16(port)]; ok {
|
2022-10-11 15:10:02 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
generateUnfilteredPort := func(t *testing.T) (net.Listener, uint16) {
|
|
|
|
var (
|
|
|
|
l net.Listener
|
|
|
|
port uint16
|
|
|
|
)
|
|
|
|
require.Eventually(t, func() bool {
|
|
|
|
var err error
|
|
|
|
l, err = net.Listen("tcp", "localhost:0")
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
tcpAddr, _ := l.Addr().(*net.TCPAddr)
|
|
|
|
if willFilterPort(tcpAddr.Port) {
|
|
|
|
_ = l.Close()
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
t.Cleanup(func() {
|
|
|
|
_ = l.Close()
|
|
|
|
})
|
|
|
|
|
|
|
|
port = uint16(tcpAddr.Port)
|
|
|
|
return true
|
|
|
|
}, testutil.WaitShort, testutil.IntervalFast)
|
|
|
|
|
|
|
|
return l, port
|
|
|
|
}
|
|
|
|
|
|
|
|
generateFilteredPort := func(t *testing.T) (net.Listener, uint16) {
|
|
|
|
var (
|
|
|
|
l net.Listener
|
|
|
|
port uint16
|
|
|
|
)
|
|
|
|
require.Eventually(t, func() bool {
|
2023-01-29 21:47:24 +00:00
|
|
|
for ignoredPort := range codersdk.WorkspaceAgentIgnoredListeningPorts {
|
2022-10-11 15:10:02 +00:00
|
|
|
if ignoredPort < 1024 || ignoredPort == 5432 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
l, err = net.Listen("tcp", fmt.Sprintf("localhost:%d", ignoredPort))
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
t.Cleanup(func() {
|
|
|
|
_ = l.Close()
|
|
|
|
})
|
|
|
|
|
|
|
|
port = ignoredPort
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}, testutil.WaitShort, testutil.IntervalFast)
|
|
|
|
|
|
|
|
return l, port
|
|
|
|
}
|
2022-10-06 12:38:22 +00:00
|
|
|
|
|
|
|
t.Run("LinuxAndWindows", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
if runtime.GOOS != "linux" && runtime.GOOS != "windows" {
|
|
|
|
t.Skip("only runs on linux and windows")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
t.Run("OK", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2022-10-06 12:38:22 +00:00
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
client, coderdPort, agentID := setup(t, nil)
|
2022-10-06 12:38:22 +00:00
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
2022-10-06 12:38:22 +00:00
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
// Generate a random unfiltered port.
|
|
|
|
l, lPort := generateUnfilteredPort(t)
|
|
|
|
|
|
|
|
// List ports and ensure that the port we expect to see is there.
|
|
|
|
res, err := client.WorkspaceAgentListeningPorts(ctx, agentID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2023-02-19 00:32:09 +00:00
|
|
|
expected := map[uint16]bool{
|
|
|
|
// expect the listener we made
|
|
|
|
lPort: false,
|
|
|
|
// expect the coderdtest server
|
|
|
|
coderdPort: false,
|
|
|
|
}
|
2022-10-11 15:10:02 +00:00
|
|
|
for _, port := range res.Ports {
|
2023-01-29 21:47:24 +00:00
|
|
|
if port.Network == "tcp" {
|
2022-10-11 15:10:02 +00:00
|
|
|
if val, ok := expected[port.Port]; ok {
|
|
|
|
if val {
|
|
|
|
t.Fatalf("expected to find TCP port %d only once in response", port.Port)
|
|
|
|
}
|
2022-10-06 12:38:22 +00:00
|
|
|
}
|
2022-10-11 15:10:02 +00:00
|
|
|
expected[port.Port] = true
|
2022-10-06 12:38:22 +00:00
|
|
|
}
|
|
|
|
}
|
2022-10-11 15:10:02 +00:00
|
|
|
for port, found := range expected {
|
|
|
|
if !found {
|
|
|
|
t.Fatalf("expected to find TCP port %d in response", port)
|
|
|
|
}
|
2022-10-06 12:38:22 +00:00
|
|
|
}
|
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
// Close the listener and check that the port is no longer in the response.
|
|
|
|
require.NoError(t, l.Close())
|
|
|
|
time.Sleep(2 * time.Second) // avoid cache
|
|
|
|
res, err = client.WorkspaceAgentListeningPorts(ctx, agentID)
|
|
|
|
require.NoError(t, err)
|
2022-10-06 12:38:22 +00:00
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
for _, port := range res.Ports {
|
2023-01-29 21:47:24 +00:00
|
|
|
if port.Network == "tcp" && port.Port == lPort {
|
2022-10-11 15:10:02 +00:00
|
|
|
t.Fatalf("expected to not find TCP port %d in response", lPort)
|
|
|
|
}
|
2022-10-06 12:38:22 +00:00
|
|
|
}
|
2022-10-11 15:10:02 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Filter", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Generate an unfiltered port that we will create an app for and
|
|
|
|
// should not exist in the response.
|
|
|
|
_, appLPort := generateUnfilteredPort(t)
|
|
|
|
app := &proto.App{
|
2022-11-07 23:35:01 +00:00
|
|
|
Slug: "test-app",
|
|
|
|
Url: fmt.Sprintf("http://localhost:%d", appLPort),
|
2022-10-11 15:10:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Generate a filtered port that should not exist in the response.
|
|
|
|
_, filteredLPort := generateFilteredPort(t)
|
|
|
|
|
|
|
|
client, coderdPort, agentID := setup(t, []*proto.App{app})
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
res, err := client.WorkspaceAgentListeningPorts(ctx, agentID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
sawCoderdPort := false
|
|
|
|
for _, port := range res.Ports {
|
2023-01-29 21:47:24 +00:00
|
|
|
if port.Network == "tcp" {
|
2022-10-11 15:10:02 +00:00
|
|
|
if port.Port == appLPort {
|
|
|
|
t.Fatalf("expected to not find TCP port (app port) %d in response", appLPort)
|
|
|
|
}
|
|
|
|
if port.Port == filteredLPort {
|
|
|
|
t.Fatalf("expected to not find TCP port (filtered port) %d in response", filteredLPort)
|
|
|
|
}
|
|
|
|
if port.Port == coderdPort {
|
|
|
|
sawCoderdPort = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !sawCoderdPort {
|
|
|
|
t.Fatalf("expected to find TCP port (coderd port) %d in response", coderdPort)
|
|
|
|
}
|
|
|
|
})
|
2022-10-06 12:38:22 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Darwin", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
if runtime.GOOS != "darwin" {
|
|
|
|
t.Skip("only runs on darwin")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-10-11 15:10:02 +00:00
|
|
|
client, _, agentID := setup(t, nil)
|
|
|
|
|
2022-10-06 12:38:22 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create a TCP listener on a random port.
|
|
|
|
l, err := net.Listen("tcp", "localhost:0")
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer l.Close()
|
|
|
|
|
|
|
|
// List ports and ensure that the list is empty because we're on darwin.
|
2022-10-11 15:10:02 +00:00
|
|
|
res, err := client.WorkspaceAgentListeningPorts(ctx, agentID)
|
2022-10-06 12:38:22 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, res.Ports, 0)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-09-23 19:51:04 +00:00
|
|
|
func TestWorkspaceAgentAppHealth(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
apps := []*proto.App{
|
|
|
|
{
|
2022-11-07 23:35:01 +00:00
|
|
|
Slug: "code-server",
|
|
|
|
Command: "some-command",
|
|
|
|
Url: "http://localhost:3000",
|
|
|
|
Icon: "/code.svg",
|
2022-09-23 19:51:04 +00:00
|
|
|
},
|
|
|
|
{
|
2022-10-28 17:41:31 +00:00
|
|
|
Slug: "code-server-2",
|
|
|
|
DisplayName: "code-server-2",
|
|
|
|
Command: "some-command",
|
|
|
|
Url: "http://localhost:3000",
|
|
|
|
Icon: "/code.svg",
|
2022-09-23 19:51:04 +00:00
|
|
|
Healthcheck: &proto.Healthcheck{
|
|
|
|
Url: "http://localhost:3000",
|
|
|
|
Interval: 5,
|
|
|
|
Threshold: 6,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
|
|
|
Parse: echo.ParseComplete,
|
2022-11-11 22:45:58 +00:00
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-09-23 19:51:04 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
Apps: apps,
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
|
|
defer cancel()
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-09-23 19:51:04 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
metadata, err := agentClient.Metadata(ctx)
|
2022-09-23 19:51:04 +00:00
|
|
|
require.NoError(t, err)
|
2022-10-24 03:35:08 +00:00
|
|
|
require.EqualValues(t, codersdk.WorkspaceAppHealthDisabled, metadata.Apps[0].Health)
|
|
|
|
require.EqualValues(t, codersdk.WorkspaceAppHealthInitializing, metadata.Apps[1].Health)
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{})
|
2022-09-23 19:51:04 +00:00
|
|
|
require.Error(t, err)
|
|
|
|
// empty
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{})
|
2022-09-23 19:51:04 +00:00
|
|
|
require.Error(t, err)
|
2022-11-07 23:35:01 +00:00
|
|
|
// healthcheck disabled
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{
|
2022-11-07 23:35:01 +00:00
|
|
|
Healths: map[uuid.UUID]codersdk.WorkspaceAppHealth{
|
|
|
|
metadata.Apps[0].ID: codersdk.WorkspaceAppHealthInitializing,
|
2022-09-23 19:51:04 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
require.Error(t, err)
|
|
|
|
// invalid value
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{
|
2022-11-07 23:35:01 +00:00
|
|
|
Healths: map[uuid.UUID]codersdk.WorkspaceAppHealth{
|
|
|
|
metadata.Apps[1].ID: codersdk.WorkspaceAppHealth("bad-value"),
|
2022-09-23 19:51:04 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
require.Error(t, err)
|
|
|
|
// update to healthy
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{
|
2022-11-07 23:35:01 +00:00
|
|
|
Healths: map[uuid.UUID]codersdk.WorkspaceAppHealth{
|
|
|
|
metadata.Apps[1].ID: codersdk.WorkspaceAppHealthHealthy,
|
2022-09-23 19:51:04 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
2023-01-29 21:47:24 +00:00
|
|
|
metadata, err = agentClient.Metadata(ctx)
|
2022-09-23 19:51:04 +00:00
|
|
|
require.NoError(t, err)
|
2022-10-24 03:35:08 +00:00
|
|
|
require.EqualValues(t, codersdk.WorkspaceAppHealthHealthy, metadata.Apps[1].Health)
|
2022-09-23 19:51:04 +00:00
|
|
|
// update to unhealthy
|
2023-01-29 21:47:24 +00:00
|
|
|
err = agentClient.PostAppHealth(ctx, agentsdk.PostAppHealthsRequest{
|
2022-11-07 23:35:01 +00:00
|
|
|
Healths: map[uuid.UUID]codersdk.WorkspaceAppHealth{
|
|
|
|
metadata.Apps[1].ID: codersdk.WorkspaceAppHealthUnhealthy,
|
2022-09-23 19:51:04 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
2023-01-29 21:47:24 +00:00
|
|
|
metadata, err = agentClient.Metadata(ctx)
|
2022-09-23 19:51:04 +00:00
|
|
|
require.NoError(t, err)
|
2022-10-24 03:35:08 +00:00
|
|
|
require.EqualValues(t, codersdk.WorkspaceAppHealthUnhealthy, metadata.Apps[1].Health)
|
2022-09-23 19:51:04 +00:00
|
|
|
}
|
2022-10-25 00:46:24 +00:00
|
|
|
|
|
|
|
// nolint:bodyclose
|
|
|
|
func TestWorkspaceAgentsGitAuth(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
t.Run("NoMatchingConfig", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{},
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-10-25 00:46:24 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2023-01-29 21:47:24 +00:00
|
|
|
_, err := agentClient.GitAuth(context.Background(), "github.com", false)
|
2022-10-25 00:46:24 +00:00
|
|
|
var apiError *codersdk.Error
|
|
|
|
require.ErrorAs(t, err, &apiError)
|
|
|
|
require.Equal(t, http.StatusNotFound, apiError.StatusCode())
|
|
|
|
})
|
|
|
|
t.Run("ReturnsURL", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{},
|
2022-10-25 00:46:24 +00:00
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2022-11-11 22:45:58 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: []*proto.Provision_Response{{
|
2022-10-25 00:46:24 +00:00
|
|
|
Type: &proto.Provision_Response_Complete{
|
|
|
|
Complete: &proto.Provision_Complete{
|
|
|
|
Resources: []*proto.Resource{{
|
|
|
|
Name: "example",
|
|
|
|
Type: "aws_instance",
|
|
|
|
Agents: []*proto.Agent{{
|
|
|
|
Id: uuid.NewString(),
|
|
|
|
Auth: &proto.Agent_Token{
|
|
|
|
Token: authToken,
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err := agentClient.GitAuth(context.Background(), "github.com/asd/asd", false)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.True(t, strings.HasSuffix(token.URL, fmt.Sprintf("/gitauth/%s", "github")))
|
|
|
|
})
|
|
|
|
t.Run("UnauthorizedCallback", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{},
|
2022-10-25 00:46:24 +00:00
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
}},
|
|
|
|
})
|
2023-02-27 16:18:19 +00:00
|
|
|
resp := coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.Equal(t, http.StatusUnauthorized, resp.StatusCode)
|
|
|
|
})
|
|
|
|
t.Run("AuthorizedCallback", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{},
|
2022-10-25 00:46:24 +00:00
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
2023-02-27 16:18:19 +00:00
|
|
|
resp := coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.Equal(t, http.StatusTemporaryRedirect, resp.StatusCode)
|
|
|
|
location, err := resp.Location()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "/gitauth", location.Path)
|
|
|
|
|
|
|
|
// Callback again to simulate updating the token.
|
2023-02-27 16:18:19 +00:00
|
|
|
resp = coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.Equal(t, http.StatusTemporaryRedirect, resp.StatusCode)
|
|
|
|
})
|
2022-11-29 18:08:27 +00:00
|
|
|
t.Run("ValidateURL", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2023-03-23 22:42:20 +00:00
|
|
|
ctx := testutil.Context(t, testutil.WaitLong)
|
2022-11-29 18:08:27 +00:00
|
|
|
|
|
|
|
srv := httptest.NewServer(nil)
|
|
|
|
defer srv.Close()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
|
|
|
ValidateURL: srv.URL,
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{},
|
2022-11-29 18:08:27 +00:00
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-11-29 18:08:27 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-29 18:08:27 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
|
2023-02-27 16:18:19 +00:00
|
|
|
resp := coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-11-29 18:08:27 +00:00
|
|
|
require.Equal(t, http.StatusTemporaryRedirect, resp.StatusCode)
|
|
|
|
|
|
|
|
// If the validation URL says unauthorized, the callback
|
|
|
|
// URL to re-authenticate should be returned.
|
|
|
|
srv.Config.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
|
|
})
|
2023-01-29 21:47:24 +00:00
|
|
|
res, err := agentClient.GitAuth(ctx, "github.com/asd/asd", false)
|
2022-11-29 18:08:27 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, res.URL)
|
|
|
|
|
|
|
|
// If the validation URL gives a non-OK status code, this
|
|
|
|
// should be treated as an internal server error.
|
|
|
|
srv.Config.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusForbidden)
|
|
|
|
w.Write([]byte("Something went wrong!"))
|
|
|
|
})
|
2023-01-29 21:47:24 +00:00
|
|
|
_, err = agentClient.GitAuth(ctx, "github.com/asd/asd", false)
|
2022-11-29 18:08:27 +00:00
|
|
|
var apiError *codersdk.Error
|
|
|
|
require.ErrorAs(t, err, &apiError)
|
|
|
|
require.Equal(t, http.StatusInternalServerError, apiError.StatusCode())
|
2023-02-27 16:18:19 +00:00
|
|
|
require.Equal(t, "validate git auth token: status 403: body: Something went wrong!", apiError.Detail)
|
2022-11-29 18:08:27 +00:00
|
|
|
})
|
2022-11-15 21:06:13 +00:00
|
|
|
|
|
|
|
t.Run("ExpiredNoRefresh", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{
|
|
|
|
Token: &oauth2.Token{
|
2022-11-15 21:06:13 +00:00
|
|
|
AccessToken: "token",
|
|
|
|
RefreshToken: "something",
|
|
|
|
Expiry: database.Now().Add(-time.Hour),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
NoRefresh: true,
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-11-15 21:06:13 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-15 21:06:13 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err := agentClient.GitAuth(context.Background(), "github.com/asd/asd", false)
|
2022-11-15 21:06:13 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, token.URL)
|
|
|
|
|
|
|
|
// In the configuration, we set our OAuth provider
|
|
|
|
// to return an expired token. Coder consumes this
|
|
|
|
// and stores it.
|
2023-02-27 16:18:19 +00:00
|
|
|
resp := coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-11-15 21:06:13 +00:00
|
|
|
require.Equal(t, http.StatusTemporaryRedirect, resp.StatusCode)
|
|
|
|
|
|
|
|
// Because the token is expired and `NoRefresh` is specified,
|
|
|
|
// a redirect URL should be returned again.
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err = agentClient.GitAuth(context.Background(), "github.com/asd/asd", false)
|
2022-11-15 21:06:13 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, token.URL)
|
|
|
|
})
|
|
|
|
|
2022-10-25 00:46:24 +00:00
|
|
|
t.Run("FullFlow", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
GitAuthConfigs: []*gitauth.Config{{
|
2023-03-22 19:37:08 +00:00
|
|
|
OAuth2Config: &testutil.OAuth2Config{},
|
2022-10-25 00:46:24 +00:00
|
|
|
ID: "github",
|
|
|
|
Regex: regexp.MustCompile(`github\.com`),
|
|
|
|
Type: codersdk.GitProviderGitHub,
|
|
|
|
}},
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-10-25 00:46:24 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-09 13:31:24 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
2022-10-25 00:46:24 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err := agentClient.GitAuth(context.Background(), "github.com/asd/asd", false)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEmpty(t, token.URL)
|
|
|
|
|
|
|
|
// Start waiting for the token callback...
|
2023-01-29 21:47:24 +00:00
|
|
|
tokenChan := make(chan agentsdk.GitAuthResponse, 1)
|
2022-10-25 00:46:24 +00:00
|
|
|
go func() {
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err := agentClient.GitAuth(context.Background(), "github.com/asd/asd", true)
|
2022-10-25 00:46:24 +00:00
|
|
|
assert.NoError(t, err)
|
|
|
|
tokenChan <- token
|
|
|
|
}()
|
|
|
|
|
|
|
|
time.Sleep(250 * time.Millisecond)
|
|
|
|
|
2023-02-27 16:18:19 +00:00
|
|
|
resp := coderdtest.RequestGitAuthCallback(t, "github", client)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.Equal(t, http.StatusTemporaryRedirect, resp.StatusCode)
|
|
|
|
token = <-tokenChan
|
2023-03-22 19:37:08 +00:00
|
|
|
require.Equal(t, "access_token", token.Username)
|
2022-10-25 00:46:24 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
token, err = agentClient.GitAuth(context.Background(), "github.com/asd/asd", false)
|
2022-10-25 00:46:24 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-11-18 22:46:53 +00:00
|
|
|
func TestWorkspaceAgentReportStats(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
t.Run("OK", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2022-11-18 22:46:53 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2022-11-18 22:46:53 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
_, err := agentClient.PostStats(context.Background(), &agentsdk.Stats{
|
2023-03-02 14:06:00 +00:00
|
|
|
ConnectionsByProto: map[string]int64{"TCP": 1},
|
|
|
|
ConnectionCount: 1,
|
|
|
|
RxPackets: 1,
|
|
|
|
RxBytes: 1,
|
|
|
|
TxPackets: 1,
|
|
|
|
TxBytes: 1,
|
|
|
|
SessionCountVSCode: 1,
|
|
|
|
SessionCountJetBrains: 1,
|
|
|
|
SessionCountReconnectingPTY: 1,
|
|
|
|
SessionCountSSH: 1,
|
|
|
|
ConnectionMedianLatencyMS: 10,
|
2022-11-18 22:46:53 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
newWorkspace, err := client.Workspace(context.Background(), workspace.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
assert.True(t,
|
|
|
|
newWorkspace.LastUsedAt.After(workspace.LastUsedAt),
|
|
|
|
"%s is not after %s", newWorkspace.LastUsedAt, workspace.LastUsedAt,
|
|
|
|
)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-01-24 12:24:27 +00:00
|
|
|
func TestWorkspaceAgent_LifecycleState(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
t.Run("Set", func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
client := coderdtest.New(t, &coderdtest.Options{
|
|
|
|
IncludeProvisionerDaemon: true,
|
|
|
|
})
|
|
|
|
user := coderdtest.CreateFirstUser(t, client)
|
|
|
|
authToken := uuid.NewString()
|
|
|
|
version := coderdtest.CreateTemplateVersion(t, client, user.OrganizationID, &echo.Responses{
|
2023-03-21 18:03:38 +00:00
|
|
|
Parse: echo.ParseComplete,
|
|
|
|
ProvisionPlan: echo.ProvisionComplete,
|
|
|
|
ProvisionApply: echo.ProvisionApplyWithAgent(authToken),
|
2023-01-24 12:24:27 +00:00
|
|
|
})
|
|
|
|
template := coderdtest.CreateTemplate(t, client, user.OrganizationID, version.ID)
|
|
|
|
coderdtest.AwaitTemplateVersionJob(t, client, version.ID)
|
|
|
|
workspace := coderdtest.CreateWorkspace(t, client, user.OrganizationID, template.ID)
|
|
|
|
coderdtest.AwaitWorkspaceBuildJob(t, client, workspace.LatestBuild.ID)
|
|
|
|
|
|
|
|
for _, res := range workspace.LatestBuild.Resources {
|
|
|
|
for _, a := range res.Agents {
|
|
|
|
require.Equal(t, codersdk.WorkspaceAgentLifecycleCreated, a.LifecycleState)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
agentClient := agentsdk.New(client.URL)
|
2023-01-24 12:24:27 +00:00
|
|
|
agentClient.SetSessionToken(authToken)
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
state codersdk.WorkspaceAgentLifecycle
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
{codersdk.WorkspaceAgentLifecycleCreated, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleStarting, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleStartTimeout, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleStartError, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleReady, false},
|
2023-03-06 19:34:00 +00:00
|
|
|
{codersdk.WorkspaceAgentLifecycleShuttingDown, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleShutdownTimeout, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleShutdownError, false},
|
|
|
|
{codersdk.WorkspaceAgentLifecycleOff, false},
|
2023-01-24 12:24:27 +00:00
|
|
|
{codersdk.WorkspaceAgentLifecycle("nonexistent_state"), true},
|
|
|
|
{codersdk.WorkspaceAgentLifecycle(""), true},
|
|
|
|
}
|
|
|
|
//nolint:paralleltest // No race between setting the state and getting the workspace.
|
|
|
|
for _, tt := range tests {
|
|
|
|
tt := tt
|
|
|
|
t.Run(string(tt.state), func(t *testing.T) {
|
2023-03-23 22:42:20 +00:00
|
|
|
ctx := testutil.Context(t, testutil.WaitLong)
|
2023-01-24 12:24:27 +00:00
|
|
|
|
2023-01-29 21:47:24 +00:00
|
|
|
err := agentClient.PostLifecycle(ctx, agentsdk.PostLifecycleRequest{
|
2023-01-24 12:24:27 +00:00
|
|
|
State: tt.state,
|
|
|
|
})
|
|
|
|
if tt.wantErr {
|
|
|
|
require.Error(t, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
require.NoError(t, err, "post lifecycle state %q", tt.state)
|
|
|
|
|
|
|
|
workspace, err = client.Workspace(ctx, workspace.ID)
|
|
|
|
require.NoError(t, err, "get workspace")
|
|
|
|
|
|
|
|
for _, res := range workspace.LatestBuild.Resources {
|
|
|
|
for _, agent := range res.Agents {
|
|
|
|
require.Equal(t, tt.state, agent.LifecycleState)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|