package agent
import (
"fmt"
"testing"
"time"
"github.com/stretchr/testify/require"
"github.com/hashicorp/consul/agent/structs"
)
func TestAgent_sidecarServiceFromNodeService ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
tests := [ ] struct {
name string
maxPort int
preRegister * structs . ServiceDefinition
sd * structs . ServiceDefinition
token string
autoPortsDisabled bool
wantNS * structs . NodeService
wantChecks [ ] * structs . CheckType
wantToken string
wantErr string
} {
{
name : "no sidecar" ,
sd : & structs . ServiceDefinition {
Name : "web" ,
Port : 1111 ,
} ,
token : "foo" ,
wantNS : nil ,
wantChecks : nil ,
wantToken : "" ,
wantErr : "" , // Should NOT error
} ,
{
name : "all the defaults" ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition { } ,
} ,
} ,
token : "foo" ,
wantNS : & structs . NodeService {
EnterpriseMeta : * structs . DefaultEnterpriseMeta ( ) ,
Kind : structs . ServiceKindConnectProxy ,
ID : "web1-sidecar-proxy" ,
Service : "web-sidecar-proxy" ,
Port : 2222 ,
LocallyRegisteredAsSidecar : true ,
Proxy : structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.0.1" ,
LocalServicePort : 1111 ,
} ,
} ,
wantChecks : [ ] * structs . CheckType {
{
Name : "Connect Sidecar Listening" ,
TCP : "127.0.0.1:2222" ,
Interval : 10 * time . Second ,
} ,
{
Name : "Connect Sidecar Aliasing web1" ,
AliasService : "web1" ,
} ,
} ,
wantToken : "foo" ,
} ,
{
name : "all the allowed overrides" ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Improve Connect with Prepared Queries (#5291)
Given a query like:
```
{
"Name": "tagged-connect-query",
"Service": {
"Service": "foo",
"Tags": ["tag"],
"Connect": true
}
}
```
And a Consul configuration like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {} },
"tags": ["tag"]
]
}
```
If you executed the query it would always turn up with 0 results. This was because the sidecar service was being created without any tags. You could instead make your config look like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {
"tags": ["tag"]
} },
"tags": ["tag"]
]
}
```
However that is a bit redundant for most cases. This PR ensures that the tags and service meta of the parent service get copied to the sidecar service. If there are any tags or service meta set in the sidecar service definition then this copying does not take place. After the changes, the query will now return the expected results.
A second change was made to prepared queries in this PR which is to allow filtering on ServiceMeta just like we allow for filtering on NodeMeta.
6 years ago
Tags : [ ] string { "baz" } ,
Meta : map [ string ] string { "foo" : "baz" } ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition {
Name : "motorbike1" ,
Port : 3333 ,
Tags : [ ] string { "foo" , "bar" } ,
Address : "127.127.127.127" ,
Meta : map [ string ] string { "foo" : "bar" } ,
Check : structs . CheckType {
ScriptArgs : [ ] string { "sleep" , "1" } ,
Interval : 999 * time . Second ,
} ,
Token : "custom-token" ,
EnableTagOverride : true ,
Proxy : & structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.127.0" ,
LocalServicePort : 9999 ,
Config : map [ string ] interface { } { "baz" : "qux" } ,
Upstreams : structs . TestUpstreams ( t ) ,
} ,
} ,
} ,
} ,
token : "foo" ,
wantNS : & structs . NodeService {
EnterpriseMeta : * structs . DefaultEnterpriseMeta ( ) ,
Kind : structs . ServiceKindConnectProxy ,
ID : "web1-sidecar-proxy" ,
Service : "motorbike1" ,
Port : 3333 ,
Tags : [ ] string { "foo" , "bar" } ,
Address : "127.127.127.127" ,
Meta : map [ string ] string {
"foo" : "bar" ,
} ,
LocallyRegisteredAsSidecar : true ,
EnableTagOverride : true ,
Proxy : structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.127.0" ,
LocalServicePort : 9999 ,
Config : map [ string ] interface { } { "baz" : "qux" } ,
Upstreams : structs . TestAddDefaultsToUpstreams ( t , structs . TestUpstreams ( t ) ) ,
} ,
} ,
wantChecks : [ ] * structs . CheckType {
{
ScriptArgs : [ ] string { "sleep" , "1" } ,
Interval : 999 * time . Second ,
} ,
} ,
wantToken : "custom-token" ,
} ,
{
name : "no auto ports available" ,
// register another sidecar consuming our 1 and only allocated auto port.
preRegister : & structs . ServiceDefinition {
Kind : structs . ServiceKindConnectProxy ,
Name : "api-proxy-sidecar" ,
Port : 2222 , // Consume the one available auto-port
Proxy : & structs . ConnectProxyConfig {
DestinationServiceName : "api" ,
} ,
} ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition { } ,
} ,
} ,
token : "foo" ,
wantErr : "none left in the configured range [2222, 2222]" ,
} ,
{
name : "auto ports disabled" ,
autoPortsDisabled : true ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition { } ,
} ,
} ,
token : "foo" ,
wantErr : "auto-assignment disabled in config" ,
} ,
Improve Connect with Prepared Queries (#5291)
Given a query like:
```
{
"Name": "tagged-connect-query",
"Service": {
"Service": "foo",
"Tags": ["tag"],
"Connect": true
}
}
```
And a Consul configuration like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {} },
"tags": ["tag"]
]
}
```
If you executed the query it would always turn up with 0 results. This was because the sidecar service was being created without any tags. You could instead make your config look like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {
"tags": ["tag"]
} },
"tags": ["tag"]
]
}
```
However that is a bit redundant for most cases. This PR ensures that the tags and service meta of the parent service get copied to the sidecar service. If there are any tags or service meta set in the sidecar service definition then this copying does not take place. After the changes, the query will now return the expected results.
A second change was made to prepared queries in this PR which is to allow filtering on ServiceMeta just like we allow for filtering on NodeMeta.
6 years ago
{
name : "inherit tags and meta" ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Tags : [ ] string { "foo" } ,
Meta : map [ string ] string { "foo" : "bar" } ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition { } ,
} ,
} ,
wantNS : & structs . NodeService {
EnterpriseMeta : * structs . DefaultEnterpriseMeta ( ) ,
Improve Connect with Prepared Queries (#5291)
Given a query like:
```
{
"Name": "tagged-connect-query",
"Service": {
"Service": "foo",
"Tags": ["tag"],
"Connect": true
}
}
```
And a Consul configuration like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {} },
"tags": ["tag"]
]
}
```
If you executed the query it would always turn up with 0 results. This was because the sidecar service was being created without any tags. You could instead make your config look like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {
"tags": ["tag"]
} },
"tags": ["tag"]
]
}
```
However that is a bit redundant for most cases. This PR ensures that the tags and service meta of the parent service get copied to the sidecar service. If there are any tags or service meta set in the sidecar service definition then this copying does not take place. After the changes, the query will now return the expected results.
A second change was made to prepared queries in this PR which is to allow filtering on ServiceMeta just like we allow for filtering on NodeMeta.
6 years ago
Kind : structs . ServiceKindConnectProxy ,
ID : "web1-sidecar-proxy" ,
Service : "web-sidecar-proxy" ,
Port : 2222 ,
Tags : [ ] string { "foo" } ,
Meta : map [ string ] string { "foo" : "bar" } ,
LocallyRegisteredAsSidecar : true ,
Proxy : structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.0.1" ,
LocalServicePort : 1111 ,
} ,
} ,
wantChecks : [ ] * structs . CheckType {
{
Improve Connect with Prepared Queries (#5291)
Given a query like:
```
{
"Name": "tagged-connect-query",
"Service": {
"Service": "foo",
"Tags": ["tag"],
"Connect": true
}
}
```
And a Consul configuration like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {} },
"tags": ["tag"]
]
}
```
If you executed the query it would always turn up with 0 results. This was because the sidecar service was being created without any tags. You could instead make your config look like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {
"tags": ["tag"]
} },
"tags": ["tag"]
]
}
```
However that is a bit redundant for most cases. This PR ensures that the tags and service meta of the parent service get copied to the sidecar service. If there are any tags or service meta set in the sidecar service definition then this copying does not take place. After the changes, the query will now return the expected results.
A second change was made to prepared queries in this PR which is to allow filtering on ServiceMeta just like we allow for filtering on NodeMeta.
6 years ago
Name : "Connect Sidecar Listening" ,
TCP : "127.0.0.1:2222" ,
Interval : 10 * time . Second ,
} ,
{
Improve Connect with Prepared Queries (#5291)
Given a query like:
```
{
"Name": "tagged-connect-query",
"Service": {
"Service": "foo",
"Tags": ["tag"],
"Connect": true
}
}
```
And a Consul configuration like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {} },
"tags": ["tag"]
]
}
```
If you executed the query it would always turn up with 0 results. This was because the sidecar service was being created without any tags. You could instead make your config look like:
```
{
"services": [
"name": "foo",
"port": 8080,
"connect": { "sidecar_service": {
"tags": ["tag"]
} },
"tags": ["tag"]
]
}
```
However that is a bit redundant for most cases. This PR ensures that the tags and service meta of the parent service get copied to the sidecar service. If there are any tags or service meta set in the sidecar service definition then this copying does not take place. After the changes, the query will now return the expected results.
A second change was made to prepared queries in this PR which is to allow filtering on ServiceMeta just like we allow for filtering on NodeMeta.
6 years ago
Name : "Connect Sidecar Aliasing web1" ,
AliasService : "web1" ,
} ,
} ,
} ,
{
name : "invalid check type" ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition {
Check : structs . CheckType {
TCP : "foo" ,
// Invalid since no interval specified
} ,
} ,
} ,
} ,
token : "foo" ,
wantErr : "Interval must be > 0" ,
} ,
{
name : "invalid meta" ,
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1111 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition {
Meta : map [ string ] string {
"consul-reserved-key-should-be-rejected" : "true" ,
} ,
} ,
} ,
} ,
token : "foo" ,
wantErr : "reserved for internal use" ,
} ,
{
name : "re-registering same sidecar with no port should pick same one" ,
// Allow multiple ports to be sure we get the right one
maxPort : 2500 ,
// Pre register the sidecar we want
preRegister : & structs . ServiceDefinition {
Kind : structs . ServiceKindConnectProxy ,
ID : "web1-sidecar-proxy" ,
Name : "web-sidecar-proxy" ,
Port : 2222 ,
Proxy : & structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.0.1" ,
LocalServicePort : 1111 ,
} ,
} ,
// Register same again but with different service port
sd : & structs . ServiceDefinition {
ID : "web1" ,
Name : "web" ,
Port : 1112 ,
Connect : & structs . ServiceConnect {
SidecarService : & structs . ServiceDefinition { } ,
} ,
} ,
token : "foo" ,
wantNS : & structs . NodeService {
EnterpriseMeta : * structs . DefaultEnterpriseMeta ( ) ,
Kind : structs . ServiceKindConnectProxy ,
ID : "web1-sidecar-proxy" ,
Service : "web-sidecar-proxy" ,
Port : 2222 , // Should claim the same port as before
LocallyRegisteredAsSidecar : true ,
Proxy : structs . ConnectProxyConfig {
DestinationServiceName : "web" ,
DestinationServiceID : "web1" ,
LocalServiceAddress : "127.0.0.1" ,
LocalServicePort : 1112 ,
} ,
} ,
wantChecks : [ ] * structs . CheckType {
{
Name : "Connect Sidecar Listening" ,
TCP : "127.0.0.1:2222" ,
Interval : 10 * time . Second ,
} ,
{
Name : "Connect Sidecar Aliasing web1" ,
AliasService : "web1" ,
} ,
} ,
wantToken : "foo" ,
} ,
}
for _ , tt := range tests {
t . Run ( tt . name , func ( t * testing . T ) {
// Set port range to be tiny (one availabl) to test consuming all of it.
// This allows a single assigned port at 2222 thanks to being inclusive at
// both ends.
if tt . maxPort == 0 {
tt . maxPort = 2222
}
hcl := fmt . Sprintf ( `
ports {
sidecar_min_port = 2222
sidecar_max_port = % d
}
` , tt . maxPort )
if tt . autoPortsDisabled {
hcl = `
ports {
sidecar_min_port = 0
sidecar_max_port = 0
}
`
}
require := require . New ( t )
a := StartTestAgent ( t , TestAgent { Name : "jones" , HCL : hcl } )
defer a . Shutdown ( )
if tt . preRegister != nil {
err := a . addServiceFromSource ( tt . preRegister . NodeService ( ) , nil , false , "" , ConfigSourceLocal )
require . NoError ( err )
}
ns := tt . sd . NodeService ( )
err := ns . Validate ( )
require . NoError ( err , "Invalid test case - NodeService must validate" )
gotNS , gotChecks , gotToken , err := a . sidecarServiceFromNodeService ( ns , tt . token )
if tt . wantErr != "" {
require . Error ( err )
require . Contains ( err . Error ( ) , tt . wantErr )
return
}
require . NoError ( err )
require . Equal ( tt . wantNS , gotNS )
require . Equal ( tt . wantChecks , gotChecks )
require . Equal ( tt . wantToken , gotToken )
} )
}
}