Merge pull request #11869 from jwhonce/wip/pprof

Enable /debug/pprof API service endpoints
This commit is contained in:
OpenShift Merge Robot
2021-10-10 12:54:29 +02:00
committed by GitHub
7 changed files with 278 additions and 114 deletions

View File

@ -35,12 +35,14 @@ Enable a listening service for API access to Podman commands.
Long: srvDescription, Long: srvDescription,
RunE: service, RunE: service,
ValidArgsFunction: common.AutocompleteDefaultOneArg, ValidArgsFunction: common.AutocompleteDefaultOneArg,
Example: `podman system service --time=0 unix:///tmp/podman.sock`, Example: `podman system service --time=0 unix:///tmp/podman.sock
podman system service --time=0 tcp://localhost:8888`,
} }
srvArgs = struct { srvArgs = struct {
Timeout int64
CorsHeaders string CorsHeaders string
PProfAddr string
Timeout uint
}{} }{}
) )
@ -51,15 +53,20 @@ func init() {
}) })
flags := srvCmd.Flags() flags := srvCmd.Flags()
cfg := registry.PodmanConfig() cfg := registry.PodmanConfig()
timeFlagName := "time" timeFlagName := "time"
flags.Int64VarP(&srvArgs.Timeout, timeFlagName, "t", int64(cfg.Engine.ServiceTimeout), "Time until the service session expires in seconds. Use 0 to disable the timeout") flags.UintVarP(&srvArgs.Timeout, timeFlagName, "t", cfg.Engine.ServiceTimeout,
"Time until the service session expires in seconds. Use 0 to disable the timeout")
_ = srvCmd.RegisterFlagCompletionFunc(timeFlagName, completion.AutocompleteNone) _ = srvCmd.RegisterFlagCompletionFunc(timeFlagName, completion.AutocompleteNone)
flags.SetNormalizeFunc(aliasTimeoutFlag)
flags.StringVarP(&srvArgs.CorsHeaders, "cors", "", "", "Set CORS Headers") flags.StringVarP(&srvArgs.CorsHeaders, "cors", "", "", "Set CORS Headers")
_ = srvCmd.RegisterFlagCompletionFunc("cors", completion.AutocompleteNone) _ = srvCmd.RegisterFlagCompletionFunc("cors", completion.AutocompleteNone)
flags.SetNormalizeFunc(aliasTimeoutFlag) flags.StringVarP(&srvArgs.PProfAddr, "pprof-address", "", "",
"Binding network address for pprof profile endpoints, default: do not expose endpoints")
flags.MarkHidden("pprof-address")
} }
func aliasTimeoutFlag(_ *pflag.FlagSet, name string) pflag.NormalizedName { func aliasTimeoutFlag(_ *pflag.FlagSet, name string) pflag.NormalizedName {
@ -74,7 +81,7 @@ func service(cmd *cobra.Command, args []string) error {
if err != nil { if err != nil {
return err return err
} }
logrus.Infof("Using API endpoint: '%s'", apiURI)
// Clean up any old existing unix domain socket // Clean up any old existing unix domain socket
if len(apiURI) > 0 { if len(apiURI) > 0 {
uri, err := url.Parse(apiURI) uri, err := url.Parse(apiURI)
@ -92,33 +99,31 @@ func service(cmd *cobra.Command, args []string) error {
} }
} }
opts := entities.ServiceOptions{ return restService(cmd.Flags(), registry.PodmanConfig(), entities.ServiceOptions{
URI: apiURI,
Command: cmd,
CorsHeaders: srvArgs.CorsHeaders, CorsHeaders: srvArgs.CorsHeaders,
} PProfAddr: srvArgs.PProfAddr,
Timeout: time.Duration(srvArgs.Timeout) * time.Second,
opts.Timeout = time.Duration(srvArgs.Timeout) * time.Second URI: apiURI,
return restService(opts, cmd.Flags(), registry.PodmanConfig()) })
} }
func resolveAPIURI(_url []string) (string, error) { func resolveAPIURI(uri []string) (string, error) {
// When determining _*THE*_ listening endpoint -- // When determining _*THE*_ listening endpoint --
// 1) User input wins always // 1) User input wins always
// 2) systemd socket activation // 2) systemd socket activation
// 3) rootless honors XDG_RUNTIME_DIR // 3) rootless honors XDG_RUNTIME_DIR
// 4) lastly adapter.DefaultAPIAddress // 4) lastly adapter.DefaultAPIAddress
if len(_url) == 0 { if len(uri) == 0 {
if v, found := os.LookupEnv("PODMAN_SOCKET"); found { if v, found := os.LookupEnv("PODMAN_SOCKET"); found {
logrus.Debugf("PODMAN_SOCKET='%s' used to determine API endpoint", v) logrus.Debugf("PODMAN_SOCKET=%q used to determine API endpoint", v)
_url = []string{v} uri = []string{v}
} }
} }
switch { switch {
case len(_url) > 0 && _url[0] != "": case len(uri) > 0 && uri[0] != "":
return _url[0], nil return uri[0], nil
case systemd.SocketActivated(): case systemd.SocketActivated():
logrus.Info("Using systemd socket activation to determine API endpoint") logrus.Info("Using systemd socket activation to determine API endpoint")
return "", nil return "", nil

View File

@ -5,9 +5,9 @@ package system
import ( import (
"context" "context"
"net" "net"
"net/url"
"os" "os"
"path/filepath" "path/filepath"
"strings"
api "github.com/containers/podman/v3/pkg/api/server" api "github.com/containers/podman/v3/pkg/api/server"
"github.com/containers/podman/v3/pkg/domain/entities" "github.com/containers/podman/v3/pkg/domain/entities"
@ -20,23 +20,24 @@ import (
"golang.org/x/sys/unix" "golang.org/x/sys/unix"
) )
func restService(opts entities.ServiceOptions, flags *pflag.FlagSet, cfg *entities.PodmanConfig) error { func restService(flags *pflag.FlagSet, cfg *entities.PodmanConfig, opts entities.ServiceOptions) error {
var ( var (
listener *net.Listener listener *net.Listener
err error err error
) )
if opts.URI != "" { if opts.URI != "" {
fields := strings.Split(opts.URI, ":") uri, err := url.Parse(opts.URI)
if len(fields) == 1 { if err != nil {
return errors.Errorf("%s is an invalid socket destination", opts.URI) return errors.Errorf("%s is an invalid socket destination", opts.URI)
} }
path := opts.URI
if fields[0] == "unix" { switch uri.Scheme {
if path, err = filepath.Abs(fields[1]); err != nil { case "unix":
path, err := filepath.Abs(uri.Path)
if err != nil {
return err return err
} }
}
util.SetSocketPath(path) util.SetSocketPath(path)
if os.Getenv("LISTEN_FDS") != "" { if os.Getenv("LISTEN_FDS") != "" {
// If it is activated by systemd, use the first LISTEN_FD (3) // If it is activated by systemd, use the first LISTEN_FD (3)
@ -48,14 +49,26 @@ func restService(opts entities.ServiceOptions, flags *pflag.FlagSet, cfg *entiti
} }
listener = &l listener = &l
} else { } else {
network := fields[0] l, err := net.Listen(uri.Scheme, path)
address := strings.Join(fields[1:], ":")
l, err := net.Listen(network, address)
if err != nil { if err != nil {
return errors.Wrapf(err, "unable to create socket") return errors.Wrapf(err, "unable to create socket")
} }
listener = &l listener = &l
} }
case "tcp":
host := uri.Host
if host == "" {
// For backward compatibility, support "tcp:<host>:<port>" and "tcp://<host>:<port>"
host = uri.Opaque
}
l, err := net.Listen(uri.Scheme, host)
if err != nil {
return errors.Wrapf(err, "unable to create socket %v", host)
}
listener = &l
default:
logrus.Debugf("Attempting API Service endpoint scheme %q", uri.Scheme)
}
} }
// Close stdin, so shortnames will not prompt // Close stdin, so shortnames will not prompt
@ -75,12 +88,12 @@ func restService(opts entities.ServiceOptions, flags *pflag.FlagSet, cfg *entiti
servicereaper.Start() servicereaper.Start()
infra.StartWatcher(rt) infra.StartWatcher(rt)
server, err := api.NewServerWithSettings(rt, listener, api.Options{Timeout: opts.Timeout, CorsHeaders: opts.CorsHeaders}) server, err := api.NewServerWithSettings(rt, listener, opts)
if err != nil { if err != nil {
return err return err
} }
defer func() { defer func() {
if err := server.Shutdown(); err != nil { if err := server.Shutdown(false); err != nil {
logrus.Warnf("Error when stopping API service: %s", err) logrus.Warnf("Error when stopping API service: %s", err)
} }
}() }()

View File

@ -87,12 +87,12 @@ func Stop() error {
return nil return nil
} }
// Temporarily inhibit signals from shutting down Libpod. // Inhibit temporarily inhibit signals from shutting down Libpod.
func Inhibit() { func Inhibit() {
shutdownInhibit.RLock() shutdownInhibit.RLock()
} }
// Stop inhibiting signals from shutting down Libpod. // Uninhibit stop inhibiting signals from shutting down Libpod.
func Uninhibit() { func Uninhibit() {
shutdownInhibit.RUnlock() shutdownInhibit.RUnlock()
} }

View File

@ -6,6 +6,7 @@ import (
"log" "log"
"net" "net"
"net/http" "net/http"
"net/http/pprof"
"os" "os"
"runtime" "runtime"
"strings" "strings"
@ -18,6 +19,7 @@ import (
"github.com/containers/podman/v3/pkg/api/handlers" "github.com/containers/podman/v3/pkg/api/handlers"
"github.com/containers/podman/v3/pkg/api/server/idle" "github.com/containers/podman/v3/pkg/api/server/idle"
"github.com/containers/podman/v3/pkg/api/types" "github.com/containers/podman/v3/pkg/api/types"
"github.com/containers/podman/v3/pkg/domain/entities"
"github.com/coreos/go-systemd/v22/activation" "github.com/coreos/go-systemd/v22/activation"
"github.com/coreos/go-systemd/v22/daemon" "github.com/coreos/go-systemd/v22/daemon"
"github.com/gorilla/mux" "github.com/gorilla/mux"
@ -27,14 +29,14 @@ import (
type APIServer struct { type APIServer struct {
http.Server // The HTTP work happens here http.Server // The HTTP work happens here
*schema.Decoder // Decoder for Query parameters to structs
context.Context // Context to carry objects to handlers
*libpod.Runtime // Where the real work happens
net.Listener // mux for routing HTTP API calls to libpod routines net.Listener // mux for routing HTTP API calls to libpod routines
*libpod.Runtime // Where the real work happens
*schema.Decoder // Decoder for Query parameters to structs
context.CancelFunc // Stop APIServer context.CancelFunc // Stop APIServer
context.Context // Context to carry objects to handlers
CorsHeaders string // Inject Cross-Origin Resource Sharing (CORS) headers
PProfAddr string // Binding network address for pprof profiles
idleTracker *idle.Tracker // Track connections to support idle shutdown idleTracker *idle.Tracker // Track connections to support idle shutdown
pprof *http.Server // Sidecar http server for providing performance data
CorsHeaders string // Inject CORS headers to each request
} }
// Number of seconds to wait for next request, if exceeded shutdown server // Number of seconds to wait for next request, if exceeded shutdown server
@ -49,22 +51,20 @@ var (
shutdownOnce sync.Once shutdownOnce sync.Once
) )
type Options struct {
Timeout time.Duration
CorsHeaders string
}
// NewServer will create and configure a new API server with all defaults // NewServer will create and configure a new API server with all defaults
func NewServer(runtime *libpod.Runtime) (*APIServer, error) { func NewServer(runtime *libpod.Runtime) (*APIServer, error) {
return newServer(runtime, DefaultServiceDuration, nil, DefaultCorsHeaders) return newServer(runtime, nil, entities.ServiceOptions{
CorsHeaders: DefaultCorsHeaders,
Timeout: DefaultServiceDuration,
})
} }
// NewServerWithSettings will create and configure a new API server using provided settings // NewServerWithSettings will create and configure a new API server using provided settings
func NewServerWithSettings(runtime *libpod.Runtime, listener *net.Listener, opts Options) (*APIServer, error) { func NewServerWithSettings(runtime *libpod.Runtime, listener *net.Listener, opts entities.ServiceOptions) (*APIServer, error) {
return newServer(runtime, opts.Timeout, listener, opts.CorsHeaders) return newServer(runtime, listener, opts)
} }
func newServer(runtime *libpod.Runtime, duration time.Duration, listener *net.Listener, corsHeaders string) (*APIServer, error) { func newServer(runtime *libpod.Runtime, listener *net.Listener, opts entities.ServiceOptions) (*APIServer, error) {
// If listener not provided try socket activation protocol // If listener not provided try socket activation protocol
if listener == nil { if listener == nil {
if _, found := os.LookupEnv("LISTEN_PID"); !found { if _, found := os.LookupEnv("LISTEN_PID"); !found {
@ -80,15 +80,15 @@ func newServer(runtime *libpod.Runtime, duration time.Duration, listener *net.Li
} }
listener = &listeners[0] listener = &listeners[0]
} }
if corsHeaders == "" { if opts.CorsHeaders == "" {
logrus.Debug("CORS Headers were not set") logrus.Debug("CORS Headers were not set")
} else { } else {
logrus.Debugf("CORS Headers were set to %s", corsHeaders) logrus.Debugf("CORS Headers were set to %q", opts.CorsHeaders)
} }
logrus.Infof("API service listening on %q", (*listener).Addr()) logrus.Infof("API service listening on %q", (*listener).Addr())
router := mux.NewRouter().UseEncodedPath() router := mux.NewRouter().UseEncodedPath()
tracker := idle.NewTracker(duration) tracker := idle.NewTracker(opts.Timeout)
server := APIServer{ server := APIServer{
Server: http.Server{ Server: http.Server{
@ -98,10 +98,11 @@ func newServer(runtime *libpod.Runtime, duration time.Duration, listener *net.Li
ConnState: tracker.ConnState, ConnState: tracker.ConnState,
ErrorLog: log.New(logrus.StandardLogger().Out, "", 0), ErrorLog: log.New(logrus.StandardLogger().Out, "", 0),
Handler: router, Handler: router,
IdleTimeout: duration * 2, IdleTimeout: opts.Timeout * 2,
}, },
CorsHeaders: corsHeaders, CorsHeaders: opts.CorsHeaders,
Listener: *listener, Listener: *listener,
PProfAddr: opts.PProfAddr,
idleTracker: tracker, idleTracker: tracker,
} }
@ -181,18 +182,18 @@ func newServer(runtime *libpod.Runtime, duration time.Duration, listener *net.Li
return &server, nil return &server, nil
} }
// If the NOTIFY_SOCKET is set, communicate the PID and readiness, and // setupSystemd notifies systemd API service is ready
// further unset NOTIFY_SOCKET to prevent containers from sending // If the NOTIFY_SOCKET is set, communicate the PID and readiness, and unset INVOCATION_ID
// messages and unset INVOCATION_ID so conmon and containers are in // so conmon and containers are in the correct cgroup.
// the correct cgroup. func (s *APIServer) setupSystemd() {
func setupSystemd() { if _, found := os.LookupEnv("NOTIFY_SOCKET"); !found {
if len(os.Getenv("NOTIFY_SOCKET")) == 0 {
return return
} }
payload := fmt.Sprintf("MAINPID=%d\n", os.Getpid()) payload := fmt.Sprintf("MAINPID=%d\n", os.Getpid())
payload += daemon.SdNotifyReady payload += daemon.SdNotifyReady
if sent, err := daemon.SdNotify(true, payload); err != nil { if sent, err := daemon.SdNotify(true, payload); err != nil {
logrus.Error("API service error notifying systemd of Conmon PID: " + err.Error()) logrus.Error("API service failed to notify systemd of Conmon PID: " + err.Error())
} else if !sent { } else if !sent {
logrus.Warn("API service unable to successfully send SDNotify") logrus.Warn("API service unable to successfully send SDNotify")
} }
@ -204,10 +205,10 @@ func setupSystemd() {
// Serve starts responding to HTTP requests. // Serve starts responding to HTTP requests.
func (s *APIServer) Serve() error { func (s *APIServer) Serve() error {
setupSystemd() s.setupPprof()
if err := shutdown.Register("server", func(sig os.Signal) error { if err := shutdown.Register("server", func(sig os.Signal) error {
return s.Shutdown() return s.Shutdown(true)
}); err != nil { }); err != nil {
return err return err
} }
@ -216,32 +217,17 @@ func (s *APIServer) Serve() error {
return err return err
} }
errChan := make(chan error, 1)
go func() { go func() {
<-s.idleTracker.Done() <-s.idleTracker.Done()
logrus.Debug("API service shutting down, idle for " + s.idleTracker.Duration.Round(time.Second).String()) logrus.Debugf("API service(s) shutting down, idle for %ds", int(s.idleTracker.Duration.Seconds()))
_ = s.Shutdown() _ = s.Shutdown(false)
}() }()
if logrus.IsLevelEnabled(logrus.DebugLevel) { // Before we start serving, ensure umask is properly set for container creation.
go func() {
pprofMux := mux.NewRouter()
pprofMux.PathPrefix("/debug/pprof").Handler(http.DefaultServeMux)
runtime.SetMutexProfileFraction(1)
runtime.SetBlockProfileRate(1)
s.pprof = &http.Server{Addr: "localhost:8888", Handler: pprofMux}
err := s.pprof.ListenAndServe()
if err != nil && err != http.ErrServerClosed {
logrus.Warnf("API profiler service failed: %v", err)
}
}()
}
// Before we start serving, ensure umask is properly set for container
// creation.
_ = syscall.Umask(0022) _ = syscall.Umask(0022)
errChan := make(chan error, 1)
s.setupSystemd()
go func() { go func() {
err := s.Server.Serve(s.Listener) err := s.Server.Serve(s.Listener)
if err != nil && err != http.ErrServerClosed { if err != nil && err != http.ErrServerClosed {
@ -254,10 +240,40 @@ func (s *APIServer) Serve() error {
return <-errChan return <-errChan
} }
// setupPprof enables pprof default endpoints
// Note: These endpoints and the podman flag --cpu-profile are mutually exclusive
//
// Examples:
// #1 go tool pprof -http localhost:8889 localhost:8888/debug/pprof/heap?seconds=120
// Note: web page will only render after a sample has been recorded
// #2 curl http://localhost:8888/debug/pprof/heap > heap.pprof && go tool pprof heap.pprof
func (s *APIServer) setupPprof() {
if s.PProfAddr == "" {
return
}
logrus.Infof("pprof service listening on %q", s.PProfAddr)
go func() {
old := runtime.SetMutexProfileFraction(1)
defer runtime.SetMutexProfileFraction(old)
runtime.SetBlockProfileRate(1)
defer runtime.SetBlockProfileRate(0)
router := mux.NewRouter()
router.PathPrefix("/debug/pprof/").HandlerFunc(pprof.Index)
err := http.ListenAndServe(s.PProfAddr, router)
if err != nil && err != http.ErrServerClosed {
logrus.Warnf("pprof service failed: %v", err)
}
}()
}
// Shutdown is a clean shutdown waiting on existing clients // Shutdown is a clean shutdown waiting on existing clients
func (s *APIServer) Shutdown() error { func (s *APIServer) Shutdown(halt bool) error {
if s.idleTracker.Duration == UnlimitedServiceDuration { if s.idleTracker.Duration == UnlimitedServiceDuration && !halt {
logrus.Debug("API service shutdown ignored as Duration is UnlimitedService") logrus.Debug("API service shutdown request ignored as Duration is UnlimitedService")
return nil return nil
} }
@ -266,17 +282,6 @@ func (s *APIServer) Shutdown() error {
_, file, line, _ := runtime.Caller(1) _, file, line, _ := runtime.Caller(1)
logrus.Debugf("API service shutdown by %s:%d, %d/%d connection(s)", logrus.Debugf("API service shutdown by %s:%d, %d/%d connection(s)",
file, line, s.idleTracker.ActiveConnections(), s.idleTracker.TotalConnections()) file, line, s.idleTracker.ActiveConnections(), s.idleTracker.TotalConnections())
go func() {
ctx, cancel := context.WithTimeout(context.Background(), s.idleTracker.Duration)
go func() {
defer cancel()
if err := s.pprof.Shutdown(ctx); err != nil {
logrus.Warnf("Failed to cleanly shutdown API pprof service: %v", err)
}
}()
<-ctx.Done()
}()
} }
// Gracefully shutdown server(s), duration of wait same as idle window // Gracefully shutdown server(s), duration of wait same as idle window

View File

@ -6,15 +6,14 @@ import (
"github.com/containers/podman/v3/libpod/define" "github.com/containers/podman/v3/libpod/define"
"github.com/containers/podman/v3/pkg/domain/entities/reports" "github.com/containers/podman/v3/pkg/domain/entities/reports"
"github.com/containers/podman/v3/pkg/domain/entities/types" "github.com/containers/podman/v3/pkg/domain/entities/types"
"github.com/spf13/cobra"
) )
// ServiceOptions provides the input for starting an API Service // ServiceOptions provides the input for starting an API and sidecar pprof services
type ServiceOptions struct { type ServiceOptions struct {
CorsHeaders string // Cross-Origin Resource Sharing (CORS) headers
PProfAddr string // Network address to bind pprof profiles service
Timeout time.Duration // Duration of inactivity the service should wait before shutting down
URI string // Path to unix domain socket service should listen on URI string // Path to unix domain socket service should listen on
Timeout time.Duration // duration of inactivity the service should wait before shutting down
Command *cobra.Command // CLI command provided. Used in V1 code
CorsHeaders string // CORS headers
} }
// SystemPruneOptions provides options to prune system. // SystemPruneOptions provides options to prune system.

View File

@ -0,0 +1,142 @@
package integration
import (
"io/ioutil"
"net"
"net/http"
"net/url"
"strconv"
"time"
. "github.com/containers/podman/v3/test/utils"
"github.com/containers/podman/v3/utils"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
. "github.com/onsi/gomega/gexec"
)
var _ = Describe("podman system service", func() {
var podmanTest *PodmanTestIntegration
BeforeEach(func() {
tempdir, err := CreateTempDirInTempDir()
Expect(err).ShouldNot(HaveOccurred())
podmanTest = PodmanTestCreate(tempdir)
podmanTest.Setup()
})
AfterEach(func() {
podmanTest.Cleanup()
processTestResult(CurrentGinkgoTestDescription())
})
Describe("verify timeout", func() {
It("of 2 seconds", func() {
SkipIfRemote("service subcommand not supported remotely")
address := url.URL{
Scheme: "tcp",
Host: net.JoinHostPort("localhost", randomPort()),
}
session := podmanTest.Podman([]string{
"system", "service", "--time=2", address.String(),
})
defer session.Kill()
WaitForService(address)
session.Wait(5 * time.Second)
Eventually(session, 5).Should(Exit(0))
})
})
Describe("verify pprof endpoints", func() {
// Depends on pkg/api/server/server.go:255
const magicComment = "pprof service listening on"
It("are available", func() {
SkipIfRemote("service subcommand not supported remotely")
address := url.URL{
Scheme: "tcp",
Host: net.JoinHostPort("localhost", randomPort()),
}
pprofPort := randomPort()
session := podmanTest.Podman([]string{
"system", "service", "--log-level=info", "--time=0",
"--pprof-address=localhost:" + pprofPort, address.String(),
})
defer session.Kill()
WaitForService(address)
// Combined with test below we have positive/negative test for pprof
Expect(session.Err.Contents()).Should(ContainSubstring(magicComment))
heap := url.URL{
Scheme: "http",
Host: net.JoinHostPort("localhost", pprofPort),
Path: "/debug/pprof/heap",
RawQuery: "seconds=2",
}
resp, err := http.Get(heap.String())
Expect(err).ShouldNot(HaveOccurred())
defer resp.Body.Close()
Expect(resp).To(HaveHTTPStatus(http.StatusOK))
body, err := ioutil.ReadAll(resp.Body)
Expect(err).ShouldNot(HaveOccurred())
Expect(body).ShouldNot(BeEmpty())
session.Interrupt().Wait(2 * time.Second)
Eventually(session, 2).Should(Exit(1))
})
It("are not available", func() {
SkipIfRemote("service subcommand not supported remotely")
address := url.URL{
Scheme: "tcp",
Host: net.JoinHostPort("localhost", randomPort()),
}
session := podmanTest.Podman([]string{
"system", "service", "--log-level=info", "--time=0", address.String(),
})
defer session.Kill()
WaitForService(address)
// Combined with test above we have positive/negative test for pprof
Expect(session.Err.Contents()).ShouldNot(ContainSubstring(magicComment))
session.Interrupt().Wait(2 * time.Second)
Eventually(session, 2).Should(Exit(1))
})
})
})
// WaitForService blocks, waiting for some service listening on given host:port
func WaitForService(address url.URL) {
// Wait for podman to be ready
var conn net.Conn
var err error
for i := 1; i <= 5; i++ {
conn, err = net.Dial("tcp", address.Host)
if err != nil {
// Podman not available yet...
time.Sleep(time.Duration(i) * time.Second)
}
}
Expect(err).ShouldNot(HaveOccurred())
conn.Close()
}
// randomPort leans on the go net library to find an available port...
func randomPort() string {
port, err := utils.GetRandomPort()
Expect(err).ShouldNot(HaveOccurred())
return strconv.Itoa(port)
}

View File

@ -38,7 +38,7 @@ SOCKET_FILE="$UNIT_DIR/$SERVICE_NAME.socket"
@test "podman system service - CORS enabled in logs" { @test "podman system service - CORS enabled in logs" {
skip_if_remote "system service tests are meaningless over remote" skip_if_remote "system service tests are meaningless over remote"
run_podman system service --log-level="debug" --cors="*" -t 1 run_podman system service --log-level="debug" --cors="*" -t 1
is "$output" ".*CORS Headers were set to \*.*" "debug log confirms CORS headers set" is "$output" ".*CORS Headers were set to ..\*...*" "debug log confirms CORS headers set"
} }
# vim: filetype=sh # vim: filetype=sh