2013-12-19 20:18:06 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2015-01-19 17:54:12 +00:00
|
|
|
"bytes"
|
2014-10-12 19:27:03 +00:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"os"
|
2015-10-15 21:15:41 +00:00
|
|
|
"path/filepath"
|
2015-08-26 03:22:22 +00:00
|
|
|
"strings"
|
2013-12-19 20:18:06 +00:00
|
|
|
"testing"
|
2014-10-12 19:27:03 +00:00
|
|
|
|
2016-11-04 04:14:56 +00:00
|
|
|
"github.com/hashicorp/consul/logger"
|
2014-10-12 19:27:03 +00:00
|
|
|
"github.com/hashicorp/consul/testutil"
|
|
|
|
"github.com/mitchellh/cli"
|
2017-01-11 21:07:11 +00:00
|
|
|
"reflect"
|
2013-12-19 20:18:06 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCommand_implements(t *testing.T) {
|
|
|
|
var _ cli.Command = new(Command)
|
|
|
|
}
|
2014-06-09 18:57:15 +00:00
|
|
|
|
|
|
|
func TestValidDatacenter(t *testing.T) {
|
|
|
|
shouldMatch := []string{
|
|
|
|
"dc1",
|
|
|
|
"east-aws-001",
|
|
|
|
"PROD_aws01-small",
|
|
|
|
}
|
|
|
|
noMatch := []string{
|
|
|
|
"east.aws",
|
|
|
|
"east!aws",
|
|
|
|
"first,second",
|
|
|
|
}
|
|
|
|
for _, m := range shouldMatch {
|
|
|
|
if !validDatacenter.MatchString(m) {
|
|
|
|
t.Fatalf("expected match: %s", m)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, m := range noMatch {
|
|
|
|
if validDatacenter.MatchString(m) {
|
|
|
|
t.Fatalf("expected no match: %s", m)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-10-12 19:27:03 +00:00
|
|
|
|
|
|
|
func TestRetryJoin(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
conf2 := nextConfig()
|
|
|
|
tmpDir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
doneCh := make(chan struct{})
|
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
close(shutdownCh)
|
|
|
|
<-doneCh
|
|
|
|
}()
|
|
|
|
|
|
|
|
cmd := &Command{
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
|
|
|
serfAddr := fmt.Sprintf(
|
|
|
|
"%s:%d",
|
|
|
|
agent.config.BindAddr,
|
|
|
|
agent.config.Ports.SerfLan)
|
|
|
|
|
2014-11-19 21:53:17 +00:00
|
|
|
serfWanAddr := fmt.Sprintf(
|
|
|
|
"%s:%d",
|
|
|
|
agent.config.BindAddr,
|
|
|
|
agent.config.Ports.SerfWan)
|
|
|
|
|
2014-10-12 19:27:03 +00:00
|
|
|
args := []string{
|
2014-11-19 21:53:17 +00:00
|
|
|
"-server",
|
2014-10-12 19:27:03 +00:00
|
|
|
"-data-dir", tmpDir,
|
2014-10-15 00:49:17 +00:00
|
|
|
"-node", fmt.Sprintf(`"%s"`, conf2.NodeName),
|
2015-12-23 23:47:15 +00:00
|
|
|
"-advertise", agent.config.BindAddr,
|
2014-10-12 19:27:03 +00:00
|
|
|
"-retry-join", serfAddr,
|
|
|
|
"-retry-interval", "1s",
|
2014-11-19 21:53:17 +00:00
|
|
|
"-retry-join-wan", serfWanAddr,
|
|
|
|
"-retry-interval-wan", "1s",
|
2014-10-12 19:27:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
if code := cmd.Run(args); code != 0 {
|
|
|
|
log.Printf("bad: %d", code)
|
|
|
|
}
|
|
|
|
close(doneCh)
|
|
|
|
}()
|
|
|
|
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
mem := agent.LANMembers()
|
|
|
|
if len(mem) != 2 {
|
|
|
|
return false, fmt.Errorf("bad: %#v", mem)
|
|
|
|
}
|
2014-11-19 21:53:17 +00:00
|
|
|
mem = agent.WANMembers()
|
|
|
|
if len(mem) != 2 {
|
|
|
|
return false, fmt.Errorf("bad (wan): %#v", mem)
|
|
|
|
}
|
2014-10-12 19:27:03 +00:00
|
|
|
return true, nil
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-03-28 14:48:06 +00:00
|
|
|
func TestReadCliConfig(t *testing.T) {
|
2016-04-01 00:45:14 +00:00
|
|
|
tmpDir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
2015-03-28 14:48:06 +00:00
|
|
|
|
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
defer close(shutdownCh)
|
|
|
|
|
2016-03-31 21:47:55 +00:00
|
|
|
// Test config parse
|
|
|
|
{
|
|
|
|
cmd := &Command{
|
|
|
|
args: []string{
|
|
|
|
"-data-dir", tmpDir,
|
|
|
|
"-node", `"a"`,
|
|
|
|
"-advertise-wan", "1.2.3.4",
|
2016-11-03 19:58:58 +00:00
|
|
|
"-serf-wan-bind", "4.3.2.1",
|
|
|
|
"-serf-lan-bind", "4.3.2.2",
|
2017-01-11 21:07:11 +00:00
|
|
|
"-node-meta", "somekey:somevalue",
|
2016-03-31 21:47:55 +00:00
|
|
|
},
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
|
|
|
config := cmd.readConfig()
|
|
|
|
if config.AdvertiseAddrWan != "1.2.3.4" {
|
|
|
|
t.Fatalf("expected -advertise-addr-wan 1.2.3.4 got %s", config.AdvertiseAddrWan)
|
|
|
|
}
|
2016-11-03 19:58:58 +00:00
|
|
|
if config.SerfWanBindAddr != "4.3.2.1" {
|
|
|
|
t.Fatalf("expected -serf-wan-bind 4.3.2.1 got %s", config.SerfWanBindAddr)
|
|
|
|
}
|
|
|
|
if config.SerfLanBindAddr != "4.3.2.2" {
|
|
|
|
t.Fatalf("expected -serf-lan-bind 4.3.2.2 got %s", config.SerfLanBindAddr)
|
|
|
|
}
|
2017-01-11 21:07:11 +00:00
|
|
|
if len(config.Meta) != 1 || config.Meta["somekey"] != "somevalue" {
|
|
|
|
t.Fatalf("expected somekey=somevalue, got %v", config.Meta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test multiple node meta flags
|
|
|
|
{
|
|
|
|
cmd := &Command{
|
|
|
|
args: []string{
|
|
|
|
"-data-dir", tmpDir,
|
|
|
|
"-node-meta", "somekey:somevalue",
|
|
|
|
"-node-meta", "otherkey:othervalue",
|
|
|
|
},
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
expected := map[string]string{
|
|
|
|
"somekey": "somevalue",
|
|
|
|
"otherkey": "othervalue",
|
|
|
|
}
|
|
|
|
config := cmd.readConfig()
|
|
|
|
if !reflect.DeepEqual(config.Meta, expected) {
|
|
|
|
t.Fatalf("bad: %v %v", config.Meta, expected)
|
|
|
|
}
|
2015-03-28 14:48:06 +00:00
|
|
|
}
|
|
|
|
|
2016-09-01 06:39:11 +00:00
|
|
|
// Test LeaveOnTerm and SkipLeaveOnInt defaults for server mode
|
2016-03-31 21:47:55 +00:00
|
|
|
{
|
2016-04-01 00:45:14 +00:00
|
|
|
ui := new(cli.MockUi)
|
2016-03-31 21:47:55 +00:00
|
|
|
cmd := &Command{
|
|
|
|
args: []string{
|
2016-04-01 00:45:14 +00:00
|
|
|
"-node", `"server1"`,
|
|
|
|
"-server",
|
|
|
|
"-data-dir", tmpDir,
|
2016-03-31 21:47:55 +00:00
|
|
|
},
|
|
|
|
ShutdownCh: shutdownCh,
|
2016-04-01 00:45:14 +00:00
|
|
|
Ui: ui,
|
|
|
|
}
|
|
|
|
|
|
|
|
config := cmd.readConfig()
|
|
|
|
if config == nil {
|
|
|
|
t.Fatalf(`Expected non-nil config object: %s`, ui.ErrorWriter.String())
|
|
|
|
}
|
|
|
|
if config.Server != true {
|
|
|
|
t.Errorf(`Expected -server to be true`)
|
|
|
|
}
|
2016-09-01 06:39:11 +00:00
|
|
|
if (*config.LeaveOnTerm) != false {
|
|
|
|
t.Errorf(`Expected LeaveOnTerm to be false in server mode`)
|
|
|
|
}
|
2016-04-01 00:45:14 +00:00
|
|
|
if (*config.SkipLeaveOnInt) != true {
|
|
|
|
t.Errorf(`Expected SkipLeaveOnInt to be true in server mode`)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-01 06:39:11 +00:00
|
|
|
// Test LeaveOnTerm and SkipLeaveOnInt defaults for client mode
|
2016-04-01 00:45:14 +00:00
|
|
|
{
|
|
|
|
ui := new(cli.MockUi)
|
|
|
|
cmd := &Command{
|
|
|
|
args: []string{
|
|
|
|
"-data-dir", tmpDir,
|
|
|
|
"-node", `"client"`,
|
|
|
|
},
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: ui,
|
|
|
|
}
|
|
|
|
|
|
|
|
config := cmd.readConfig()
|
|
|
|
if config == nil {
|
|
|
|
t.Fatalf(`Expected non-nil config object: %s`, ui.ErrorWriter.String())
|
|
|
|
}
|
|
|
|
if config.Server != false {
|
|
|
|
t.Errorf(`Expected server to be false`)
|
|
|
|
}
|
2016-09-01 06:39:11 +00:00
|
|
|
if (*config.LeaveOnTerm) != true {
|
|
|
|
t.Errorf(`Expected LeaveOnTerm to be true in client mode`)
|
|
|
|
}
|
2016-04-01 00:45:14 +00:00
|
|
|
if *config.SkipLeaveOnInt != false {
|
|
|
|
t.Errorf(`Expected SkipLeaveOnInt to be false in client mode`)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test empty node name
|
|
|
|
{
|
|
|
|
cmd := &Command{
|
|
|
|
args: []string{"-node", `""`},
|
|
|
|
ShutdownCh: shutdownCh,
|
2016-03-31 21:47:55 +00:00
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
|
|
|
config := cmd.readConfig()
|
|
|
|
if config != nil {
|
|
|
|
t.Errorf(`Expected -node="" to fail`)
|
|
|
|
}
|
2015-03-28 14:48:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-12 19:27:03 +00:00
|
|
|
func TestRetryJoinFail(t *testing.T) {
|
|
|
|
conf := nextConfig()
|
|
|
|
tmpDir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
defer close(shutdownCh)
|
|
|
|
|
|
|
|
cmd := &Command{
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
|
|
|
serfAddr := fmt.Sprintf("%s:%d", conf.BindAddr, conf.Ports.SerfLan)
|
|
|
|
|
|
|
|
args := []string{
|
|
|
|
"-data-dir", tmpDir,
|
|
|
|
"-retry-join", serfAddr,
|
|
|
|
"-retry-max", "1",
|
|
|
|
}
|
|
|
|
|
|
|
|
if code := cmd.Run(args); code == 0 {
|
|
|
|
t.Fatalf("bad: %d", code)
|
|
|
|
}
|
|
|
|
}
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
func TestRetryJoinWanFail(t *testing.T) {
|
2014-11-14 15:02:42 +00:00
|
|
|
conf := nextConfig()
|
|
|
|
tmpDir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
defer close(shutdownCh)
|
|
|
|
|
|
|
|
cmd := &Command{
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
|
|
|
serfAddr := fmt.Sprintf("%s:%d", conf.BindAddr, conf.Ports.SerfWan)
|
|
|
|
|
|
|
|
args := []string{
|
2014-11-19 21:53:17 +00:00
|
|
|
"-server",
|
2014-11-14 15:02:42 +00:00
|
|
|
"-data-dir", tmpDir,
|
2014-11-17 22:14:59 +00:00
|
|
|
"-retry-join-wan", serfAddr,
|
2014-11-19 21:53:17 +00:00
|
|
|
"-retry-max-wan", "1",
|
2014-11-14 15:02:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if code := cmd.Run(args); code == 0 {
|
|
|
|
t.Fatalf("bad: %d", code)
|
|
|
|
}
|
|
|
|
}
|
2015-01-19 17:54:12 +00:00
|
|
|
|
2016-11-01 18:45:42 +00:00
|
|
|
func TestDiscoverEC2Hosts(t *testing.T) {
|
2016-11-01 22:20:23 +00:00
|
|
|
if os.Getenv("AWS_REGION") == "" {
|
|
|
|
t.Skip("AWS_REGION not set, skipping")
|
|
|
|
}
|
|
|
|
|
2016-11-01 18:45:42 +00:00
|
|
|
if os.Getenv("AWS_ACCESS_KEY_ID") == "" {
|
|
|
|
t.Skip("AWS_ACCESS_KEY_ID not set, skipping")
|
|
|
|
}
|
|
|
|
|
|
|
|
if os.Getenv("AWS_SECRET_ACCESS_KEY") == "" {
|
|
|
|
t.Skip("AWS_SECRET_ACCESS_KEY not set, skipping")
|
|
|
|
}
|
|
|
|
|
|
|
|
c := &Config{
|
2016-11-02 18:35:37 +00:00
|
|
|
RetryJoinEC2: RetryJoinEC2{
|
2016-11-02 01:20:08 +00:00
|
|
|
Region: os.Getenv("AWS_REGION"),
|
|
|
|
TagKey: "ConsulRole",
|
|
|
|
TagValue: "Server",
|
2016-11-01 18:45:42 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2016-11-02 18:35:37 +00:00
|
|
|
servers, err := c.discoverEc2Hosts(&log.Logger{})
|
2016-11-01 18:45:42 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(servers) != 3 {
|
|
|
|
t.Fatalf("bad: %v", servers)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-20 22:13:36 +00:00
|
|
|
func TestSetupAgent_RPCUnixSocket_FileExists(t *testing.T) {
|
2015-01-19 17:54:12 +00:00
|
|
|
conf := nextConfig()
|
|
|
|
tmpDir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
tmpFile, err := ioutil.TempFile("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.Remove(tmpFile.Name())
|
|
|
|
socketPath := tmpFile.Name()
|
|
|
|
|
|
|
|
conf.DataDir = tmpDir
|
|
|
|
conf.Server = true
|
|
|
|
conf.Bootstrap = true
|
|
|
|
|
2015-01-20 22:13:36 +00:00
|
|
|
// Set socket address to an existing file.
|
2015-01-19 17:54:12 +00:00
|
|
|
conf.Addresses.RPC = "unix://" + socketPath
|
|
|
|
|
2015-01-21 00:57:00 +00:00
|
|
|
// Custom mode for socket file
|
2015-01-21 02:53:18 +00:00
|
|
|
conf.UnixSockets.Perms = "0777"
|
2015-01-21 00:57:00 +00:00
|
|
|
|
2015-01-19 17:54:12 +00:00
|
|
|
shutdownCh := make(chan struct{})
|
|
|
|
defer close(shutdownCh)
|
|
|
|
|
|
|
|
cmd := &Command{
|
|
|
|
ShutdownCh: shutdownCh,
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
}
|
|
|
|
|
2016-11-04 04:14:56 +00:00
|
|
|
logWriter := logger.NewLogWriter(512)
|
2015-01-19 17:54:12 +00:00
|
|
|
logOutput := new(bytes.Buffer)
|
|
|
|
|
2015-01-20 22:13:36 +00:00
|
|
|
// Ensure the server is created
|
|
|
|
if err := cmd.setupAgent(conf, logOutput, logWriter); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the file was replaced by the socket
|
|
|
|
fi, err := os.Stat(socketPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
2015-01-19 17:54:12 +00:00
|
|
|
}
|
2015-01-20 22:13:36 +00:00
|
|
|
if fi.Mode()&os.ModeSocket == 0 {
|
|
|
|
t.Fatalf("expected socket to replace file")
|
2015-01-19 17:54:12 +00:00
|
|
|
}
|
2015-01-21 00:57:00 +00:00
|
|
|
|
|
|
|
// Ensure permissions were applied to the socket file
|
|
|
|
if fi.Mode().String() != "Srwxrwxrwx" {
|
|
|
|
t.Fatalf("bad permissions: %s", fi.Mode())
|
|
|
|
}
|
2015-01-19 17:54:12 +00:00
|
|
|
}
|
2015-08-26 03:22:22 +00:00
|
|
|
|
|
|
|
func TestSetupScadaConn(t *testing.T) {
|
|
|
|
// Create a config and assign an infra name
|
|
|
|
conf1 := nextConfig()
|
|
|
|
conf1.AtlasInfrastructure = "hashicorp/test1"
|
|
|
|
conf1.AtlasToken = "abc"
|
|
|
|
|
|
|
|
dir, agent := makeAgent(t, conf1)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
cmd := &Command{
|
|
|
|
ShutdownCh: make(chan struct{}),
|
|
|
|
Ui: new(cli.MockUi),
|
|
|
|
agent: agent,
|
|
|
|
}
|
|
|
|
|
|
|
|
// First start creates the scada conn
|
|
|
|
if err := cmd.setupScadaConn(conf1); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
http1 := cmd.scadaHttp
|
|
|
|
provider1 := cmd.scadaProvider
|
|
|
|
|
|
|
|
// Performing setup again tears down original and replaces
|
|
|
|
// with a new SCADA client.
|
|
|
|
conf2 := nextConfig()
|
|
|
|
conf2.AtlasInfrastructure = "hashicorp/test2"
|
|
|
|
conf2.AtlasToken = "123"
|
|
|
|
if err := cmd.setupScadaConn(conf2); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if cmd.scadaHttp == http1 || cmd.scadaProvider == provider1 {
|
2015-08-26 03:43:57 +00:00
|
|
|
t.Fatalf("should change: %#v %#v", cmd.scadaHttp, cmd.scadaProvider)
|
2015-08-26 03:22:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Original provider and listener must be closed
|
|
|
|
if !provider1.IsShutdown() {
|
|
|
|
t.Fatalf("should be shutdown")
|
|
|
|
}
|
|
|
|
if _, err := http1.listener.Accept(); !strings.Contains(err.Error(), "closed") {
|
|
|
|
t.Fatalf("should be closed")
|
|
|
|
}
|
|
|
|
}
|
2015-10-15 21:15:41 +00:00
|
|
|
|
|
|
|
func TestProtectDataDir(t *testing.T) {
|
|
|
|
dir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
|
|
|
if err := os.MkdirAll(filepath.Join(dir, "mdb"), 0700); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cfgFile, err := ioutil.TempFile("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.Remove(cfgFile.Name())
|
|
|
|
|
|
|
|
content := fmt.Sprintf(`{"server": true, "data_dir": "%s"}`, dir)
|
|
|
|
_, err = cfgFile.Write([]byte(content))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ui := new(cli.MockUi)
|
|
|
|
cmd := &Command{
|
|
|
|
Ui: ui,
|
|
|
|
args: []string{"-config-file=" + cfgFile.Name()},
|
|
|
|
}
|
|
|
|
if conf := cmd.readConfig(); conf != nil {
|
|
|
|
t.Fatalf("should fail")
|
|
|
|
}
|
|
|
|
if out := ui.ErrorWriter.String(); !strings.Contains(out, dir) {
|
|
|
|
t.Fatalf("expected mdb dir error, got: %s", out)
|
|
|
|
}
|
|
|
|
}
|
2016-03-28 16:56:24 +00:00
|
|
|
|
|
|
|
func TestBadDataDirPermissions(t *testing.T) {
|
|
|
|
dir, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
|
|
|
|
dataDir := filepath.Join(dir, "mdb")
|
|
|
|
if err := os.MkdirAll(dataDir, 0400); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dataDir)
|
|
|
|
|
|
|
|
ui := new(cli.MockUi)
|
|
|
|
cmd := &Command{
|
|
|
|
Ui: ui,
|
|
|
|
args: []string{"-data-dir=" + dataDir, "-server=true"},
|
|
|
|
}
|
|
|
|
if conf := cmd.readConfig(); conf != nil {
|
|
|
|
t.Fatalf("Should fail with bad data directory permissions")
|
|
|
|
}
|
|
|
|
if out := ui.ErrorWriter.String(); !strings.Contains(out, "Permission denied") {
|
|
|
|
t.Fatalf("expected permission denied error, got: %s", out)
|
|
|
|
}
|
|
|
|
}
|