mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2631 lines
71 KiB
2631 lines
71 KiB
// Copyright (c) HashiCorp, Inc. |
|
// SPDX-License-Identifier: BUSL-1.1 |
|
|
|
package local_test |
|
|
|
import ( |
|
"context" |
|
"errors" |
|
"fmt" |
|
"os" |
|
"path/filepath" |
|
"sort" |
|
"testing" |
|
"time" |
|
|
|
"github.com/hashicorp/go-hclog" |
|
"github.com/hashicorp/go-uuid" |
|
"github.com/mitchellh/copystructure" |
|
"github.com/stretchr/testify/assert" |
|
"github.com/stretchr/testify/require" |
|
|
|
"github.com/hashicorp/consul/acl" |
|
"github.com/hashicorp/consul/acl/resolver" |
|
"github.com/hashicorp/consul/agent" |
|
"github.com/hashicorp/consul/agent/config" |
|
"github.com/hashicorp/consul/agent/local" |
|
"github.com/hashicorp/consul/agent/structs" |
|
"github.com/hashicorp/consul/agent/token" |
|
"github.com/hashicorp/consul/api" |
|
"github.com/hashicorp/consul/sdk/testutil" |
|
"github.com/hashicorp/consul/sdk/testutil/retry" |
|
"github.com/hashicorp/consul/testrpc" |
|
"github.com/hashicorp/consul/types" |
|
) |
|
|
|
func unNilMap(in map[string]string) map[string]string { |
|
if in == nil { |
|
return make(map[string]string) |
|
} |
|
return in |
|
} |
|
|
|
func TestAgentAntiEntropy_Services(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
// Register info |
|
args := &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
} |
|
|
|
// Exists both, same (noop) |
|
var out struct{} |
|
srv1 := &structs.NodeService{ |
|
ID: "mysql", |
|
Service: "mysql", |
|
Tags: []string{"primary"}, |
|
Port: 5000, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
assert.False(t, a.State.ServiceExists(structs.ServiceID{ID: srv1.ID})) |
|
a.State.AddServiceWithChecks(srv1, nil, "", false) |
|
assert.True(t, a.State.ServiceExists(structs.ServiceID{ID: srv1.ID})) |
|
args.Service = srv1 |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists both, different (update) |
|
srv2 := &structs.NodeService{ |
|
ID: "redis", |
|
Service: "redis", |
|
Tags: []string{}, |
|
Port: 8000, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv2, nil, "", false) |
|
|
|
srv2_mod := new(structs.NodeService) |
|
*srv2_mod = *srv2 |
|
srv2_mod.Port = 9000 |
|
args.Service = srv2_mod |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists local (create) |
|
srv3 := &structs.NodeService{ |
|
ID: "web", |
|
Service: "web", |
|
Tags: []string{}, |
|
Port: 80, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv3, nil, "", false) |
|
|
|
// Exists remote (delete) |
|
srv4 := &structs.NodeService{ |
|
ID: "lb", |
|
Service: "lb", |
|
Tags: []string{}, |
|
Port: 443, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
args.Service = srv4 |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists both, different address (update) |
|
srv5 := &structs.NodeService{ |
|
ID: "api", |
|
Service: "api", |
|
Tags: []string{}, |
|
Address: "127.0.0.10", |
|
Port: 8000, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv5, nil, "", false) |
|
|
|
srv5_mod := new(structs.NodeService) |
|
*srv5_mod = *srv5 |
|
srv5_mod.Address = "127.0.0.1" |
|
args.Service = srv5_mod |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists local, in sync, remote missing (create) |
|
srv6 := &structs.NodeService{ |
|
ID: "cache", |
|
Service: "cache", |
|
Tags: []string{}, |
|
Port: 11211, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.SetServiceState(&local.ServiceState{ |
|
Service: srv6, |
|
InSync: true, |
|
}) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
var services structs.IndexedNodeServices |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
|
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Make sure we sent along our node info when we synced. |
|
id := services.NodeServices.Node.ID |
|
addrs := services.NodeServices.Node.TaggedAddresses |
|
meta := services.NodeServices.Node.Meta |
|
delete(meta, structs.MetaSegmentKey) // Added later, not in config. |
|
delete(meta, structs.MetaConsulVersion) // Added later, not in config. |
|
assert.Equal(t, a.Config.NodeID, id) |
|
assert.Equal(t, a.Config.TaggedAddresses, addrs) |
|
assert.Equal(t, unNilMap(a.Config.NodeMeta), meta) |
|
|
|
// We should have 6 services (consul included) |
|
if len(services.NodeServices.Services) != 6 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql": |
|
require.Equal(t, srv1, serv) |
|
case "redis": |
|
require.Equal(t, srv2, serv) |
|
case "web": |
|
require.Equal(t, srv3, serv) |
|
case "api": |
|
require.Equal(t, srv5, serv) |
|
case "cache": |
|
require.Equal(t, srv6, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 5, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
// Remove one of the services |
|
a.State.RemoveService(structs.NewServiceID("api", nil)) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 5 services (consul included) |
|
if len(services.NodeServices.Services) != 5 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql": |
|
require.Equal(t, srv1, serv) |
|
case "redis": |
|
require.Equal(t, srv2, serv) |
|
case "web": |
|
require.Equal(t, srv3, serv) |
|
case "cache": |
|
require.Equal(t, srv6, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 4, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_Services_ConnectProxy(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
|
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
clone := func(ns *structs.NodeService) *structs.NodeService { |
|
raw, err := copystructure.Copy(ns) |
|
require.NoError(t, err) |
|
return raw.(*structs.NodeService) |
|
} |
|
|
|
// Register node info |
|
var out struct{} |
|
|
|
// Exists both same (noop) |
|
srv1 := &structs.NodeService{ |
|
Kind: structs.ServiceKindConnectProxy, |
|
ID: "mysql-proxy", |
|
Service: "mysql-proxy", |
|
Port: 5000, |
|
Proxy: structs.ConnectProxyConfig{DestinationServiceName: "db"}, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv1, nil, "", false) |
|
require.NoError(t, a.RPC(context.Background(), "Catalog.Register", &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
Service: srv1, |
|
}, &out)) |
|
|
|
// Exists both, different (update) |
|
srv2 := &structs.NodeService{ |
|
ID: "redis-proxy", |
|
Service: "redis-proxy", |
|
Port: 8000, |
|
Kind: structs.ServiceKindConnectProxy, |
|
Proxy: structs.ConnectProxyConfig{DestinationServiceName: "redis"}, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv2, nil, "", false) |
|
|
|
srv2_mod := clone(srv2) |
|
srv2_mod.Port = 9000 |
|
require.NoError(t, a.RPC(context.Background(), "Catalog.Register", &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
Service: srv2_mod, |
|
}, &out)) |
|
|
|
// Exists local (create) |
|
srv3 := &structs.NodeService{ |
|
ID: "web-proxy", |
|
Service: "web-proxy", |
|
Port: 80, |
|
Kind: structs.ServiceKindConnectProxy, |
|
Proxy: structs.ConnectProxyConfig{DestinationServiceName: "web"}, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv3, nil, "", false) |
|
|
|
// Exists remote (delete) |
|
srv4 := &structs.NodeService{ |
|
ID: "lb-proxy", |
|
Service: "lb-proxy", |
|
Port: 443, |
|
Kind: structs.ServiceKindConnectProxy, |
|
Proxy: structs.ConnectProxyConfig{DestinationServiceName: "lb"}, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
require.NoError(t, a.RPC(context.Background(), "Catalog.Register", &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
Service: srv4, |
|
}, &out)) |
|
|
|
// Exists local, in sync, remote missing (create) |
|
srv5 := &structs.NodeService{ |
|
ID: "cache-proxy", |
|
Service: "cache-proxy", |
|
Port: 11211, |
|
Kind: structs.ServiceKindConnectProxy, |
|
Proxy: structs.ConnectProxyConfig{DestinationServiceName: "cache-proxy"}, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.SetServiceState(&local.ServiceState{ |
|
Service: srv5, |
|
InSync: true, |
|
}) |
|
|
|
require.NoError(t, a.State.SyncFull()) |
|
|
|
var services structs.IndexedNodeServices |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
require.NoError(t, a.RPC(context.Background(), "Catalog.NodeServices", &req, &services)) |
|
|
|
// We should have 5 services (consul included) |
|
require.Len(t, services.NodeServices.Services, 5) |
|
|
|
// check that virtual ips have been set |
|
vips := make(map[string]struct{}) |
|
serviceToVIP := make(map[string]string) |
|
for _, serv := range services.NodeServices.Services { |
|
if serv.TaggedAddresses != nil { |
|
serviceVIP := serv.TaggedAddresses[structs.TaggedAddressVirtualIP].Address |
|
require.NotEmpty(t, serviceVIP) |
|
vips[serviceVIP] = struct{}{} |
|
serviceToVIP[serv.ID] = serviceVIP |
|
} |
|
} |
|
require.Len(t, vips, 4) |
|
|
|
// Update our assertions for the tagged addresses. |
|
srv1.TaggedAddresses = map[string]structs.ServiceAddress{ |
|
structs.TaggedAddressVirtualIP: { |
|
Address: serviceToVIP["mysql-proxy"], |
|
Port: srv1.Port, |
|
}, |
|
} |
|
srv2.TaggedAddresses = map[string]structs.ServiceAddress{ |
|
structs.TaggedAddressVirtualIP: { |
|
Address: serviceToVIP["redis-proxy"], |
|
Port: srv2.Port, |
|
}, |
|
} |
|
srv3.TaggedAddresses = map[string]structs.ServiceAddress{ |
|
structs.TaggedAddressVirtualIP: { |
|
Address: serviceToVIP["web-proxy"], |
|
Port: srv3.Port, |
|
}, |
|
} |
|
srv5.TaggedAddresses = map[string]structs.ServiceAddress{ |
|
structs.TaggedAddressVirtualIP: { |
|
Address: serviceToVIP["cache-proxy"], |
|
Port: srv5.Port, |
|
}, |
|
} |
|
|
|
// All the services should match |
|
// Retry to mitigate data races between local and remote state |
|
retry.Run(t, func(r *retry.R) { |
|
require.NoError(r, a.State.SyncFull()) |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql-proxy": |
|
require.Equal(r, srv1, serv) |
|
case "redis-proxy": |
|
require.Equal(r, srv2, serv) |
|
case "web-proxy": |
|
require.Equal(r, srv3, serv) |
|
case "cache-proxy": |
|
require.Equal(r, srv5, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
r.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
}) |
|
|
|
require.NoError(t, servicesInSync(a.State, 4, structs.DefaultEnterpriseMetaInDefaultPartition())) |
|
|
|
// Remove one of the services |
|
a.State.RemoveService(structs.NewServiceID("cache-proxy", nil)) |
|
require.NoError(t, a.State.SyncFull()) |
|
require.NoError(t, a.RPC(context.Background(), "Catalog.NodeServices", &req, &services)) |
|
|
|
// We should have 4 services (consul included) |
|
require.Len(t, services.NodeServices.Services, 4) |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql-proxy": |
|
require.Equal(t, srv1, serv) |
|
case "redis-proxy": |
|
require.Equal(t, srv2, serv) |
|
case "web-proxy": |
|
require.Equal(t, srv3, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
require.NoError(t, servicesInSync(a.State, 3, structs.DefaultEnterpriseMetaInDefaultPartition())) |
|
} |
|
|
|
func TestAgent_ServiceWatchCh(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
// register a local service |
|
srv1 := &structs.NodeService{ |
|
ID: "svc_id1", |
|
Service: "svc1", |
|
Tags: []string{"tag1"}, |
|
Port: 6100, |
|
} |
|
require.NoError(t, a.State.AddServiceWithChecks(srv1, nil, "", false)) |
|
|
|
verifyState := func(ss *local.ServiceState) { |
|
require.NotNil(t, ss) |
|
require.NotNil(t, ss.WatchCh) |
|
|
|
// Sanity check WatchCh blocks |
|
select { |
|
case <-ss.WatchCh: |
|
t.Fatal("should block until service changes") |
|
default: |
|
} |
|
} |
|
|
|
// Should be able to get a ServiceState |
|
ss := a.State.ServiceState(srv1.CompoundServiceID()) |
|
verifyState(ss) |
|
|
|
// Update service in another go routine |
|
go func() { |
|
srv2 := srv1 |
|
srv2.Port = 6200 |
|
require.NoError(t, a.State.AddServiceWithChecks(srv2, nil, "", false)) |
|
}() |
|
|
|
// We should observe WatchCh close |
|
select { |
|
case <-ss.WatchCh: |
|
// OK! |
|
case <-time.After(500 * time.Millisecond): |
|
t.Fatal("timeout waiting for WatchCh to close") |
|
} |
|
|
|
// Should also fire for state being set explicitly |
|
ss = a.State.ServiceState(srv1.CompoundServiceID()) |
|
verifyState(ss) |
|
|
|
go func() { |
|
a.State.SetServiceState(&local.ServiceState{ |
|
Service: ss.Service, |
|
Token: "foo", |
|
}) |
|
}() |
|
|
|
// We should observe WatchCh close |
|
select { |
|
case <-ss.WatchCh: |
|
// OK! |
|
case <-time.After(500 * time.Millisecond): |
|
t.Fatal("timeout waiting for WatchCh to close") |
|
} |
|
|
|
// Should also fire for service being removed |
|
ss = a.State.ServiceState(srv1.CompoundServiceID()) |
|
verifyState(ss) |
|
|
|
go func() { |
|
require.NoError(t, a.State.RemoveService(srv1.CompoundServiceID())) |
|
}() |
|
|
|
// We should observe WatchCh close |
|
select { |
|
case <-ss.WatchCh: |
|
// OK! |
|
case <-time.After(500 * time.Millisecond): |
|
t.Fatal("timeout waiting for WatchCh to close") |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_EnableTagOverride(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
args := &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
} |
|
var out struct{} |
|
|
|
// register a local service with tag override enabled |
|
srv1 := &structs.NodeService{ |
|
ID: "svc_id1", |
|
Service: "svc1", |
|
Tags: []string{"tag1"}, |
|
Port: 6100, |
|
EnableTagOverride: true, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv1, nil, "", false) |
|
|
|
// register a local service with tag override disabled |
|
srv2 := &structs.NodeService{ |
|
ID: "svc_id2", |
|
Service: "svc2", |
|
Tags: []string{"tag2"}, |
|
Port: 6200, |
|
EnableTagOverride: false, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv2, nil, "", false) |
|
|
|
// make sure they are both in the catalog |
|
if err := a.State.SyncChanges(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// update the services in the catalog and change the tags and port. |
|
// Only tag changes should be propagated for services where tag |
|
// override is enabled. |
|
args.Service = &structs.NodeService{ |
|
ID: srv1.ID, |
|
Service: srv1.Service, |
|
Tags: []string{"tag1_mod"}, |
|
Port: 7100, |
|
EnableTagOverride: true, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
args.Service = &structs.NodeService{ |
|
ID: srv2.ID, |
|
Service: srv2.Service, |
|
Tags: []string{"tag2_mod"}, |
|
Port: 7200, |
|
EnableTagOverride: false, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// sync catalog and local state |
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var services structs.IndexedNodeServices |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "svc_id1": |
|
// tags should be modified but not the port |
|
got := serv |
|
want := &structs.NodeService{ |
|
ID: "svc_id1", |
|
Service: "svc1", |
|
Tags: []string{"tag1_mod"}, |
|
Port: 6100, |
|
EnableTagOverride: true, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
assert.Equal(r, want, got) |
|
case "svc_id2": |
|
got, want := serv, srv2 |
|
assert.Equal(r, want, got) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
r.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 2, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
r.Fatal(err) |
|
} |
|
}) |
|
} |
|
|
|
func TestAgentAntiEntropy_Services_WithChecks(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
{ |
|
// Single check |
|
srv := &structs.NodeService{ |
|
ID: "mysql", |
|
Service: "mysql", |
|
Tags: []string{"primary"}, |
|
Port: 5000, |
|
} |
|
a.State.AddServiceWithChecks(srv, nil, "", false) |
|
|
|
chk := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "mysql", |
|
Name: "mysql", |
|
ServiceID: "mysql", |
|
Status: api.HealthPassing, |
|
} |
|
a.State.AddCheck(chk, "", false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatal("sync failed: ", err) |
|
} |
|
|
|
// We should have 2 services (consul included) |
|
svcReq := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &svcReq, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if len(services.NodeServices.Services) != 2 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// We should have one health check |
|
chkReq := structs.ServiceSpecificRequest{ |
|
Datacenter: "dc1", |
|
ServiceName: "mysql", |
|
} |
|
var checks structs.IndexedHealthChecks |
|
if err := a.RPC(context.Background(), "Health.ServiceChecks", &chkReq, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if len(checks.HealthChecks) != 1 { |
|
t.Fatalf("bad: %v", checks) |
|
} |
|
} |
|
|
|
{ |
|
// Multiple checks |
|
srv := &structs.NodeService{ |
|
ID: "redis", |
|
Service: "redis", |
|
Tags: []string{"primary"}, |
|
Port: 5000, |
|
} |
|
a.State.AddServiceWithChecks(srv, nil, "", false) |
|
|
|
chk1 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "redis:1", |
|
Name: "redis:1", |
|
ServiceID: "redis", |
|
Status: api.HealthPassing, |
|
} |
|
a.State.AddCheck(chk1, "", false) |
|
|
|
chk2 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "redis:2", |
|
Name: "redis:2", |
|
ServiceID: "redis", |
|
Status: api.HealthPassing, |
|
} |
|
a.State.AddCheck(chk2, "", false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatal("sync failed: ", err) |
|
} |
|
|
|
// We should have 3 services (consul included) |
|
svcReq := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &svcReq, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if len(services.NodeServices.Services) != 3 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// We should have two health checks |
|
chkReq := structs.ServiceSpecificRequest{ |
|
Datacenter: "dc1", |
|
ServiceName: "redis", |
|
} |
|
var checks structs.IndexedHealthChecks |
|
if err := a.RPC(context.Background(), "Health.ServiceChecks", &chkReq, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if len(checks.HealthChecks) != 2 { |
|
t.Fatalf("bad: %v", checks) |
|
} |
|
} |
|
} |
|
|
|
var testRegisterRules = ` |
|
service "api" { |
|
policy = "write" |
|
} |
|
|
|
service "consul" { |
|
policy = "write" |
|
} |
|
` |
|
|
|
func TestAgentAntiEntropy_Services_ACLDeny(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, ` |
|
primary_datacenter = "dc1" |
|
|
|
acl { |
|
enabled = true |
|
default_policy = "deny" |
|
|
|
tokens { |
|
initial_management = "root" |
|
} |
|
} |
|
`) |
|
defer a.Shutdown() |
|
testrpc.WaitForLeader(t, a.RPC, "dc1") |
|
|
|
// The agent token is the only token used for deleteService. |
|
setAgentToken(t, a) |
|
|
|
token := createToken(t, a, testRegisterRules) |
|
|
|
// Create service (disallowed) |
|
srv1 := &structs.NodeService{ |
|
ID: "mysql", |
|
Service: "mysql", |
|
Tags: []string{"primary"}, |
|
Port: 5000, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv1, nil, token, false) |
|
|
|
// Create service (allowed) |
|
srv2 := &structs.NodeService{ |
|
ID: "api", |
|
Service: "api", |
|
Tags: []string{"foo"}, |
|
Port: 5001, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 0, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv2, nil, token, false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
{ |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{ |
|
Token: "root", |
|
}, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 2 services (consul included) |
|
if len(services.NodeServices.Services) != 2 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql": |
|
t.Fatalf("should not be permitted") |
|
case "api": |
|
require.Equal(t, srv2, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 2, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
} |
|
|
|
// Now remove the service and re-sync |
|
a.State.RemoveService(structs.NewServiceID("api", nil)) |
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
{ |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{ |
|
Token: "root", |
|
}, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 1 service (just consul) |
|
if len(services.NodeServices.Services) != 1 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql": |
|
t.Fatalf("should not be permitted") |
|
case "api": |
|
t.Fatalf("should be deleted") |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 1, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
} |
|
|
|
// Make sure the token got cleaned up. |
|
if token := a.State.ServiceToken(structs.NewServiceID("api", nil)); token != "" { |
|
t.Fatalf("bad: %s", token) |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_ConfigFileRegistrationToken(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
|
|
tokens := map[string]string{ |
|
"api": "5ece2854-989a-4e7a-8145-4801c13350d5", |
|
"web": "b85e99b7-8d97-45a3-a175-5f33e167177b", |
|
} |
|
|
|
// Configure the agent with the config_file_service_registration token. |
|
agentConfig := fmt.Sprintf(` |
|
primary_datacenter = "dc1" |
|
|
|
acl { |
|
enabled = true |
|
default_policy = "deny" |
|
tokens { |
|
initial_management = "root" |
|
config_file_service_registration = "%s" |
|
} |
|
} |
|
`, tokens["api"]) |
|
|
|
// We need separate files because we can't put multiple 'service' stanzas in one config string/file. |
|
dir := testutil.TempDir(t, "config") |
|
apiFile := filepath.Join(dir, "api.hcl") |
|
dbFile := filepath.Join(dir, "db.hcl") |
|
webFile := filepath.Join(dir, "web.hcl") |
|
|
|
// The "api" service and checks are able to register because the config_file_service_registration token |
|
// has service:write for the "api" service. |
|
require.NoError(t, os.WriteFile(apiFile, []byte(` |
|
service { |
|
name = "api" |
|
id = "api" |
|
|
|
check { |
|
id = "api inline check" |
|
status = "passing" |
|
ttl = "99999h" |
|
} |
|
} |
|
|
|
check { |
|
id = "api standalone check" |
|
status = "passing" |
|
service_id = "api" |
|
ttl = "99999h" |
|
} |
|
`), 0600)) |
|
|
|
// The "db" service and check is unable to register because the config_file_service_registration token |
|
// does not have service:write for "db" and there are no inline tokens. |
|
require.NoError(t, os.WriteFile(dbFile, []byte(` |
|
service { |
|
name = "db" |
|
id = "db" |
|
} |
|
|
|
check { |
|
id = "db standalone check" |
|
service_id = "db" |
|
status = "passing" |
|
ttl = "99999h" |
|
} |
|
`), 0600)) |
|
|
|
// The "web" service is able to register because the inline tokens have service:write for "web". |
|
// This tests that inline tokens take precedence over the config_file_service_registration token. |
|
require.NoError(t, os.WriteFile(webFile, []byte(fmt.Sprintf(` |
|
service { |
|
name = "web" |
|
id = "web" |
|
token = "%[1]s" |
|
} |
|
|
|
check { |
|
id = "web standalone check" |
|
service_id = "web" |
|
status = "passing" |
|
ttl = "99999h" |
|
token = "%[1]s" |
|
} |
|
`, tokens["web"])), 0600)) |
|
|
|
a := agent.NewTestAgentWithConfigFile(t, agentConfig, []string{apiFile, dbFile, webFile}) |
|
defer a.Shutdown() |
|
testrpc.WaitForLeader(t, a.RPC, "dc1") |
|
|
|
// Create the tokens referenced in the config files. |
|
for svc, secret := range tokens { |
|
req := structs.ACLTokenSetRequest{ |
|
ACLToken: structs.ACLToken{ |
|
SecretID: secret, |
|
ServiceIdentities: []*structs.ACLServiceIdentity{{ServiceName: svc}}, |
|
}, |
|
WriteRequest: structs.WriteRequest{Token: "root"}, |
|
} |
|
if err := a.RPC(context.Background(), "ACL.TokenSet", &req, &structs.ACLToken{}); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
} |
|
|
|
// All services are added from files into local state. |
|
assert.True(t, a.State.ServiceExists(structs.ServiceID{ID: "api"})) |
|
assert.True(t, a.State.ServiceExists(structs.ServiceID{ID: "db"})) |
|
assert.True(t, a.State.ServiceExists(structs.ServiceID{ID: "web"})) |
|
|
|
// Sync services with the remote. |
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Validate which services were able to register. |
|
var services structs.IndexedNodeServices |
|
require.NoError(t, a.RPC( |
|
context.Background(), |
|
"Catalog.NodeServices", |
|
&structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{Token: "root"}, |
|
}, |
|
&services, |
|
)) |
|
|
|
assert.Len(t, services.NodeServices.Services, 3) |
|
assert.Contains(t, services.NodeServices.Services, "api") |
|
assert.Contains(t, services.NodeServices.Services, "consul") |
|
assert.Contains(t, services.NodeServices.Services, "web") |
|
// No token with permission to register the "db" service. |
|
assert.NotContains(t, services.NodeServices.Services, "db") |
|
|
|
// Validate which checks were able to register. |
|
var checks structs.IndexedHealthChecks |
|
require.NoError(t, a.RPC( |
|
context.Background(), |
|
"Health.NodeChecks", |
|
&structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{Token: "root"}, |
|
}, |
|
&checks, |
|
)) |
|
|
|
sort.Slice(checks.HealthChecks, func(i, j int) bool { |
|
return checks.HealthChecks[i].CheckID < checks.HealthChecks[j].CheckID |
|
}) |
|
assert.Len(t, checks.HealthChecks, 4) |
|
assert.Equal(t, checks.HealthChecks[0].CheckID, types.CheckID("api inline check")) |
|
assert.Equal(t, checks.HealthChecks[1].CheckID, types.CheckID("api standalone check")) |
|
assert.Equal(t, checks.HealthChecks[2].CheckID, types.CheckID("serfHealth")) |
|
assert.Equal(t, checks.HealthChecks[3].CheckID, types.CheckID("web standalone check")) |
|
} |
|
|
|
type RPC interface { |
|
RPC(ctx context.Context, method string, args interface{}, reply interface{}) error |
|
} |
|
|
|
func createToken(t *testing.T, rpc RPC, policyRules string) string { |
|
t.Helper() |
|
|
|
uniqueId, err := uuid.GenerateUUID() |
|
require.NoError(t, err) |
|
policyName := "the-policy-" + uniqueId |
|
|
|
reqPolicy := structs.ACLPolicySetRequest{ |
|
Datacenter: "dc1", |
|
Policy: structs.ACLPolicy{ |
|
Name: policyName, |
|
Rules: policyRules, |
|
}, |
|
WriteRequest: structs.WriteRequest{Token: "root"}, |
|
} |
|
err = rpc.RPC(context.Background(), "ACL.PolicySet", &reqPolicy, &structs.ACLPolicy{}) |
|
require.NoError(t, err) |
|
|
|
token, err := uuid.GenerateUUID() |
|
require.NoError(t, err) |
|
|
|
reqToken := structs.ACLTokenSetRequest{ |
|
Datacenter: "dc1", |
|
ACLToken: structs.ACLToken{ |
|
SecretID: token, |
|
Policies: []structs.ACLTokenPolicyLink{{Name: policyName}}, |
|
}, |
|
WriteRequest: structs.WriteRequest{Token: "root"}, |
|
} |
|
err = rpc.RPC(context.Background(), "ACL.TokenSet", &reqToken, &structs.ACLToken{}) |
|
require.NoError(t, err) |
|
return token |
|
} |
|
|
|
// setAgentToken sets the 'agent' token for this agent. It creates a new token |
|
// with node:write for the agent's node name, and service:write for any |
|
// service. |
|
func setAgentToken(t *testing.T, a *agent.TestAgent) { |
|
var policy = fmt.Sprintf(` |
|
node "%s" { |
|
policy = "write" |
|
} |
|
service_prefix "" { |
|
policy = "read" |
|
} |
|
`, a.Config.NodeName) |
|
|
|
token := createToken(t, a, policy) |
|
|
|
_, err := a.Client().Agent().UpdateAgentACLToken(token, &api.WriteOptions{Token: "root"}) |
|
if err != nil { |
|
t.Fatalf("setting agent token: %v", err) |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_Checks(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
|
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
// Register info |
|
args := &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
} |
|
|
|
// Exists both, same (noop) |
|
var out struct{} |
|
chk1 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "mysql", |
|
Name: "mysql", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddCheck(chk1, "", false) |
|
args.Check = chk1 |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists both, different (update) |
|
chk2 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "redis", |
|
Name: "redis", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddCheck(chk2, "", false) |
|
|
|
chk2_mod := new(structs.HealthCheck) |
|
*chk2_mod = *chk2 |
|
chk2_mod.Status = api.HealthCritical |
|
args.Check = chk2_mod |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists local (create) |
|
chk3 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "web", |
|
Name: "web", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddCheck(chk3, "", false) |
|
|
|
// Exists remote (delete) |
|
chk4 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "lb", |
|
Name: "lb", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
args.Check = chk4 |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists local, in sync, remote missing (create) |
|
chk5 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "cache", |
|
Name: "cache", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.SetCheckState(&local.CheckState{ |
|
Check: chk5, |
|
InSync: true, |
|
}) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var checks structs.IndexedHealthChecks |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
|
|
// Verify that we are in sync |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 5 checks (serf included) |
|
if len(checks.HealthChecks) != 5 { |
|
r.Fatalf("bad: %v", checks) |
|
} |
|
|
|
// All the checks should match |
|
for _, chk := range checks.HealthChecks { |
|
chk.CreateIndex, chk.ModifyIndex = 0, 0 |
|
switch chk.CheckID { |
|
case "mysql": |
|
require.Equal(r, chk, chk1) |
|
case "redis": |
|
require.Equal(r, chk, chk2) |
|
case "web": |
|
require.Equal(r, chk, chk3) |
|
case "cache": |
|
require.Equal(r, chk, chk5) |
|
case "serfHealth": |
|
// ignore |
|
default: |
|
r.Fatalf("unexpected check: %v", chk) |
|
} |
|
} |
|
|
|
if err := checksInSync(a.State, 4, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
r.Fatal(err) |
|
} |
|
}) |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
|
|
// Make sure we sent along our node info addresses when we synced. |
|
{ |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
id := services.NodeServices.Node.ID |
|
addrs := services.NodeServices.Node.TaggedAddresses |
|
meta := services.NodeServices.Node.Meta |
|
delete(meta, structs.MetaSegmentKey) // Added later, not in config. |
|
delete(meta, structs.MetaConsulVersion) // Added later, not in config. |
|
assert.Equal(r, a.Config.NodeID, id) |
|
assert.Equal(r, a.Config.TaggedAddresses, addrs) |
|
assert.Equal(r, unNilMap(a.Config.NodeMeta), meta) |
|
} |
|
}) |
|
retry.Run(t, func(r *retry.R) { |
|
|
|
// Remove one of the checks |
|
a.State.RemoveCheck(structs.NewCheckID("redis", nil)) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 5 checks (serf included) |
|
if len(checks.HealthChecks) != 4 { |
|
r.Fatalf("bad: %v", checks) |
|
} |
|
|
|
// All the checks should match |
|
for _, chk := range checks.HealthChecks { |
|
chk.CreateIndex, chk.ModifyIndex = 0, 0 |
|
switch chk.CheckID { |
|
case "mysql": |
|
require.Equal(r, chk1, chk) |
|
case "web": |
|
require.Equal(r, chk3, chk) |
|
case "cache": |
|
require.Equal(r, chk5, chk) |
|
case "serfHealth": |
|
// ignore |
|
default: |
|
r.Fatalf("unexpected check: %v", chk) |
|
} |
|
} |
|
|
|
if err := checksInSync(a.State, 3, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
r.Fatal(err) |
|
} |
|
}) |
|
} |
|
|
|
func TestAgentAntiEntropy_RemovingServiceAndCheck(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
|
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
// Register info |
|
args := &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
} |
|
|
|
var out struct{} |
|
|
|
// Exists remote (delete) |
|
svcID := "deleted-check-service" |
|
srv := &structs.NodeService{ |
|
ID: svcID, |
|
Service: "echo", |
|
Tags: []string{}, |
|
Address: "127.0.0.1", |
|
Port: 8080, |
|
} |
|
args.Service = srv |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Exists remote (delete) |
|
chk := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "lb", |
|
Name: "lb", |
|
ServiceID: svcID, |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
|
|
args.Check = chk |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
var services structs.IndexedNodeServices |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
|
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// The consul service will still be registered |
|
if len(services.NodeServices.Services) != 1 { |
|
t.Fatalf("Expected all services to be deleted, got: %#v", services.NodeServices.Services) |
|
} |
|
|
|
var checks structs.IndexedHealthChecks |
|
// Verify that we are in sync |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// The serfHealth check will still be here |
|
if len(checks.HealthChecks) != 1 { |
|
t.Fatalf("Expected the health check to be deleted, got: %#v", checks.HealthChecks) |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_Checks_ACLDeny(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
dc := "dc1" |
|
a := &agent.TestAgent{HCL: ` |
|
primary_datacenter = "` + dc + `" |
|
|
|
acl { |
|
enabled = true |
|
default_policy = "deny" |
|
|
|
tokens { |
|
initial_management = "root" |
|
} |
|
} |
|
`} |
|
if err := a.Start(t); err != nil { |
|
t.Fatal(err) |
|
} |
|
defer a.Shutdown() |
|
|
|
testrpc.WaitForLeader(t, a.RPC, dc) |
|
|
|
// The agent token is the only token used for deleteCheck. |
|
setAgentToken(t, a) |
|
|
|
token := createToken(t, a, testRegisterRules) |
|
|
|
// Create services using the root token |
|
srv1 := &structs.NodeService{ |
|
ID: "mysql", |
|
Service: "mysql", |
|
Tags: []string{"primary"}, |
|
Port: 5000, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv1, nil, "root", false) |
|
srv2 := &structs.NodeService{ |
|
ID: "api", |
|
Service: "api", |
|
Tags: []string{"foo"}, |
|
Port: 5001, |
|
Weights: &structs.Weights{ |
|
Passing: 1, |
|
Warning: 1, |
|
}, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddServiceWithChecks(srv2, nil, "root", false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
{ |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: dc, |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{ |
|
Token: "root", |
|
}, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 3 services (consul included) |
|
if len(services.NodeServices.Services) != 3 { |
|
t.Fatalf("bad: %v", services.NodeServices.Services) |
|
} |
|
|
|
// All the services should match |
|
for id, serv := range services.NodeServices.Services { |
|
serv.CreateIndex, serv.ModifyIndex = 0, 0 |
|
switch id { |
|
case "mysql": |
|
require.Equal(t, srv1, serv) |
|
case "api": |
|
require.Equal(t, srv2, serv) |
|
case structs.ConsulServiceID: |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected service: %v", id) |
|
} |
|
} |
|
|
|
if err := servicesInSync(a.State, 2, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
} |
|
|
|
// This check won't be allowed. |
|
chk1 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
ServiceID: "mysql", |
|
ServiceName: "mysql", |
|
ServiceTags: []string{"primary"}, |
|
CheckID: "mysql-check", |
|
Name: "mysql", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddCheck(chk1, token, false) |
|
|
|
// This one will be allowed. |
|
chk2 := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
ServiceID: "api", |
|
ServiceName: "api", |
|
ServiceTags: []string{"foo"}, |
|
CheckID: "api-check", |
|
Name: "api", |
|
Status: api.HealthPassing, |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
a.State.AddCheck(chk2, token, false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: dc, |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{ |
|
Token: "root", |
|
}, |
|
} |
|
var checks structs.IndexedHealthChecks |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 2 checks (serf included) |
|
if len(checks.HealthChecks) != 2 { |
|
t.Fatalf("bad: %v", checks) |
|
} |
|
|
|
// All the checks should match |
|
for _, chk := range checks.HealthChecks { |
|
chk.CreateIndex, chk.ModifyIndex = 0, 0 |
|
switch chk.CheckID { |
|
case "mysql-check": |
|
t.Fatalf("should not be permitted") |
|
case "api-check": |
|
require.Equal(t, chk, chk2) |
|
case "serfHealth": |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected check: %v", chk) |
|
} |
|
} |
|
|
|
if err := checksInSync(a.State, 2, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
// Now delete the check and wait for sync. |
|
a.State.RemoveCheck(structs.NewCheckID("api-check", nil)) |
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
{ |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: dc, |
|
Node: a.Config.NodeName, |
|
QueryOptions: structs.QueryOptions{ |
|
Token: "root", |
|
}, |
|
} |
|
var checks structs.IndexedHealthChecks |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// We should have 1 check (just serf) |
|
if len(checks.HealthChecks) != 1 { |
|
t.Fatalf("bad: %v", checks) |
|
} |
|
|
|
// All the checks should match |
|
for _, chk := range checks.HealthChecks { |
|
chk.CreateIndex, chk.ModifyIndex = 0, 0 |
|
switch chk.CheckID { |
|
case "mysql-check": |
|
t.Fatalf("should not be permitted") |
|
case "api-check": |
|
t.Fatalf("should be deleted") |
|
case "serfHealth": |
|
// ignore |
|
default: |
|
t.Fatalf("unexpected check: %v", chk) |
|
} |
|
} |
|
} |
|
|
|
if err := checksInSync(a.State, 1, structs.DefaultEnterpriseMetaInDefaultPartition()); err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
// Make sure the token got cleaned up. |
|
if token := a.State.CheckToken(structs.NewCheckID("api-check", nil)); token != "" { |
|
t.Fatalf("bad: %s", token) |
|
} |
|
} |
|
|
|
func TestAgent_UpdateCheck_DiscardOutput(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := agent.NewTestAgent(t, ` |
|
discard_check_output = true |
|
check_update_interval = "0s" # set to "0s" since otherwise output checks are deferred |
|
`) |
|
defer a.Shutdown() |
|
testrpc.WaitForLeader(t, a.RPC, "dc1") |
|
|
|
inSync := func(id string) bool { |
|
s := a.State.CheckState(structs.NewCheckID(types.CheckID(id), nil)) |
|
if s == nil { |
|
return false |
|
} |
|
return s.InSync |
|
} |
|
|
|
// register a check |
|
check := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "web", |
|
Name: "web", |
|
Status: api.HealthPassing, |
|
Output: "first output", |
|
} |
|
if err := a.State.AddCheck(check, "", false); err != nil { |
|
t.Fatalf("bad: %s", err) |
|
} |
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("bad: %s", err) |
|
} |
|
if !inSync("web") { |
|
t.Fatal("check should be in sync") |
|
} |
|
|
|
// update the check with the same status but different output |
|
// and the check should still be in sync. |
|
a.State.UpdateCheck(check.CompoundCheckID(), api.HealthPassing, "second output") |
|
if !inSync("web") { |
|
t.Fatal("check should be in sync") |
|
} |
|
|
|
// disable discarding of check output and update the check again with different |
|
// output. Then the check should be out of sync. |
|
a.State.SetDiscardCheckOutput(false) |
|
a.State.UpdateCheck(check.CompoundCheckID(), api.HealthPassing, "third output") |
|
if inSync("web") { |
|
t.Fatal("check should be out of sync") |
|
} |
|
} |
|
|
|
func TestAgentAntiEntropy_Check_DeferSync(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
a := &agent.TestAgent{HCL: ` |
|
check_update_interval = "500ms" |
|
`} |
|
if err := a.Start(t); err != nil { |
|
t.Fatal(err) |
|
} |
|
defer a.Shutdown() |
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
// Create a check |
|
check := &structs.HealthCheck{ |
|
Node: a.Config.NodeName, |
|
CheckID: "web", |
|
Name: "web", |
|
Status: api.HealthPassing, |
|
Output: "", |
|
} |
|
a.State.AddCheck(check, "", false) |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that we are in sync |
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var checks structs.IndexedHealthChecks |
|
retry.Run(t, func(r *retry.R) { |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
if got, want := len(checks.HealthChecks), 2; got != want { |
|
r.Fatalf("got %d health checks want %d", got, want) |
|
} |
|
}) |
|
|
|
// Update the check output! Should be deferred |
|
a.State.UpdateCheck(structs.NewCheckID("web", nil), api.HealthPassing, "output") |
|
|
|
// We are going to wait up to 850ms for the deferred check update to run. The update |
|
// can happen any time within: check_update_interval / 2 + random(min: 0, max: check_update_interval) |
|
// For this test that means it will get deferred for 250ms - 750ms. We add up to 100ms on top of that to |
|
// account for potentially slow tests on a overloaded system. |
|
timer := &retry.Timer{Timeout: 850 * time.Millisecond, Wait: 50 * time.Millisecond} |
|
start := time.Now() |
|
retry.RunWith(timer, t, func(r *retry.R) { |
|
cs := a.State.CheckState(structs.NewCheckID("web", nil)) |
|
if cs == nil { |
|
r.Fatalf("check is not registered") |
|
} |
|
|
|
if cs.DeferCheck != nil { |
|
r.Fatalf("Deferred Check timeout not removed yet") |
|
} |
|
}) |
|
elapsed := time.Since(start) |
|
|
|
// ensure the check deferral didn't update too fast |
|
if elapsed < 240*time.Millisecond { |
|
t.Fatalf("early update: elapsed %v\n\n%+v", elapsed, checks) |
|
} |
|
|
|
// ensure the check deferral didn't update too late |
|
if elapsed > 850*time.Millisecond { |
|
t.Fatalf("late update: elapsed: %v\n\n%+v", elapsed, checks) |
|
} |
|
|
|
// Wait for a deferred update. TODO (slackpad) This isn't a great test |
|
// because we might be stuck in the random stagger from the full sync |
|
// after the leader election (~3 seconds) so it's easy to exceed the |
|
// default retry timeout here. Extending this makes the test a little |
|
// less flaky, but this isn't very clean for this first deferred update |
|
// since the full sync might pick it up, not the timer trigger. The |
|
// good news is that the later update below should be well past the full |
|
// sync so we are getting some coverage. We should rethink this a bit and |
|
// rework the deferred update stuff to be more testable. |
|
// |
|
// TODO - figure out why after the deferred check calls TriggerSyncChanges that this |
|
// takes so long to happen. I have seen it take upwards of 1.5s before the check gets |
|
// synced. |
|
timer = &retry.Timer{Timeout: 6 * time.Second, Wait: 100 * time.Millisecond} |
|
retry.RunWith(timer, t, func(r *retry.R) { |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
r.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify updated |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "output" { |
|
r.Fatalf("no update: %v", chk) |
|
} |
|
} |
|
} |
|
}) |
|
|
|
// Change the output in the catalog to force it out of sync. |
|
eCopy := check.Clone() |
|
eCopy.Output = "changed" |
|
reg := structs.RegisterRequest{ |
|
Datacenter: a.Config.Datacenter, |
|
Node: a.Config.NodeName, |
|
Address: a.Config.AdvertiseAddrLAN.IP.String(), |
|
TaggedAddresses: a.Config.TaggedAddresses, |
|
Check: eCopy, |
|
WriteRequest: structs.WriteRequest{}, |
|
} |
|
var out struct{} |
|
if err := a.RPC(context.Background(), "Catalog.Register", ®, &out); err != nil { |
|
t.Fatalf("err: %s", err) |
|
} |
|
|
|
// Verify that the output is out of sync. |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "changed" { |
|
t.Fatalf("unexpected update: %v", chk) |
|
} |
|
} |
|
} |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that the output was synced back to the agent's value. |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "output" { |
|
t.Fatalf("missed update: %v", chk) |
|
} |
|
} |
|
} |
|
|
|
// Reset the catalog again. |
|
if err := a.RPC(context.Background(), "Catalog.Register", ®, &out); err != nil { |
|
t.Fatalf("err: %s", err) |
|
} |
|
|
|
// Verify that the output is out of sync. |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "changed" { |
|
t.Fatalf("unexpected update: %v", chk) |
|
} |
|
} |
|
} |
|
|
|
// Now make an update that should be deferred. |
|
a.State.UpdateCheck(structs.NewCheckID("web", nil), api.HealthPassing, "deferred") |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Verify that the output is still out of sync since there's a deferred |
|
// update pending. |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "changed" { |
|
t.Fatalf("unexpected update: %v", chk) |
|
} |
|
} |
|
} |
|
// Wait for the deferred update. |
|
retry.Run(t, func(r *retry.R) { |
|
if err := a.RPC(context.Background(), "Health.NodeChecks", &req, &checks); err != nil { |
|
r.Fatal(err) |
|
} |
|
|
|
// Verify updated |
|
for _, chk := range checks.HealthChecks { |
|
switch chk.CheckID { |
|
case "web": |
|
if chk.Output != "deferred" { |
|
r.Fatalf("no update: %v", chk) |
|
} |
|
} |
|
} |
|
}) |
|
|
|
} |
|
|
|
func TestAgentAntiEntropy_NodeInfo(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
nodeID := types.NodeID("40e4a748-2192-161a-0510-9bf59fe950b5") |
|
nodeMeta := map[string]string{ |
|
"somekey": "somevalue", |
|
} |
|
a := &agent.TestAgent{HCL: ` |
|
node_id = "40e4a748-2192-161a-0510-9bf59fe950b5" |
|
node_meta { |
|
somekey = "somevalue" |
|
} |
|
locality { |
|
region = "us-west-1" |
|
zone = "us-west-1a" |
|
}`} |
|
if err := a.Start(t); err != nil { |
|
t.Fatal(err) |
|
} |
|
defer a.Shutdown() |
|
testrpc.WaitForLeader(t, a.RPC, "dc1") |
|
|
|
// Register info |
|
args := &structs.RegisterRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
Address: "127.0.0.1", |
|
} |
|
var out struct{} |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
req := structs.NodeSpecificRequest{ |
|
Datacenter: "dc1", |
|
Node: a.Config.NodeName, |
|
} |
|
var services structs.IndexedNodeServices |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
id := services.NodeServices.Node.ID |
|
addrs := services.NodeServices.Node.TaggedAddresses |
|
meta := services.NodeServices.Node.Meta |
|
nodeLocality := services.NodeServices.Node.Locality |
|
delete(meta, structs.MetaSegmentKey) // Added later, not in config. |
|
delete(meta, structs.MetaConsulVersion) // Added later, not in config. |
|
require.Equal(t, a.Config.NodeID, id) |
|
require.Equal(t, a.Config.TaggedAddresses, addrs) |
|
require.Equal(t, a.Config.StructLocality(), nodeLocality) |
|
require.Equal(t, unNilMap(a.Config.NodeMeta), meta) |
|
|
|
// Blow away the catalog version of the node info |
|
if err := a.RPC(context.Background(), "Catalog.Register", args, &out); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if err := a.State.SyncFull(); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Wait for the sync - this should have been a sync of just the node info |
|
if err := a.RPC(context.Background(), "Catalog.NodeServices", &req, &services); err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
{ |
|
id := services.NodeServices.Node.ID |
|
addrs := services.NodeServices.Node.TaggedAddresses |
|
meta := services.NodeServices.Node.Meta |
|
nodeLocality := services.NodeServices.Node.Locality |
|
delete(meta, structs.MetaSegmentKey) // Added later, not in config. |
|
delete(meta, structs.MetaConsulVersion) // Added later, not in config. |
|
require.Equal(t, nodeID, id) |
|
require.Equal(t, a.Config.TaggedAddresses, addrs) |
|
require.Equal(t, a.Config.StructLocality(), nodeLocality) |
|
require.Equal(t, nodeMeta, meta) |
|
} |
|
} |
|
|
|
func TestState_ServiceTokens(t *testing.T) { |
|
tokens := new(token.Store) |
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, tokens) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
id := structs.NewServiceID("redis", nil) |
|
|
|
t.Run("defaults to empty string", func(t *testing.T) { |
|
require.Equal(t, "", l.ServiceToken(id)) |
|
}) |
|
|
|
t.Run("empty string when there is no token", func(t *testing.T) { |
|
err := l.AddServiceWithChecks(&structs.NodeService{ID: "redis"}, nil, "", false) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "", l.ServiceToken(id)) |
|
}) |
|
|
|
t.Run("returns configured token", func(t *testing.T) { |
|
err := l.AddServiceWithChecks(&structs.NodeService{ID: "redis"}, nil, "abc123", false) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "abc123", l.ServiceToken(id)) |
|
}) |
|
|
|
t.Run("RemoveCheck keeps token around for the delete", func(t *testing.T) { |
|
err := l.RemoveService(structs.NewServiceID("redis", nil)) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "abc123", l.ServiceToken(id)) |
|
}) |
|
} |
|
|
|
func loadRuntimeConfig(t *testing.T, hcl string) *config.RuntimeConfig { |
|
t.Helper() |
|
result, err := config.Load(config.LoadOpts{HCL: []string{hcl}}) |
|
require.NoError(t, err) |
|
require.Len(t, result.Warnings, 0) |
|
return result.RuntimeConfig |
|
} |
|
|
|
func TestState_CheckTokens(t *testing.T) { |
|
tokens := new(token.Store) |
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, tokens) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
id := structs.NewCheckID("mem", nil) |
|
|
|
t.Run("defaults to empty string", func(t *testing.T) { |
|
require.Equal(t, "", l.CheckToken(id)) |
|
}) |
|
|
|
t.Run("empty string when there is no token", func(t *testing.T) { |
|
err := l.AddCheck(&structs.HealthCheck{CheckID: "mem"}, "", false) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "", l.CheckToken(id)) |
|
}) |
|
|
|
t.Run("returns configured token", func(t *testing.T) { |
|
err := l.AddCheck(&structs.HealthCheck{CheckID: "mem"}, "abc123", false) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "abc123", l.CheckToken(id)) |
|
}) |
|
|
|
t.Run("RemoveCheck keeps token around for the delete", func(t *testing.T) { |
|
err := l.RemoveCheck(structs.NewCheckID("mem", nil)) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, "abc123", l.CheckToken(id)) |
|
}) |
|
} |
|
|
|
func TestAgent_CheckCriticalTime(t *testing.T) { |
|
t.Parallel() |
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, new(token.Store)) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
svc := &structs.NodeService{ID: "redis", Service: "redis", Port: 8000} |
|
l.AddServiceWithChecks(svc, nil, "", false) |
|
|
|
// Add a passing check and make sure it's not critical. |
|
checkID := types.CheckID("redis:1") |
|
chk := &structs.HealthCheck{ |
|
Node: "node", |
|
CheckID: checkID, |
|
Name: "redis:1", |
|
ServiceID: "redis", |
|
Status: api.HealthPassing, |
|
} |
|
l.AddCheck(chk, "", false) |
|
if checks := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition()); len(checks) > 0 { |
|
t.Fatalf("should not have any critical checks") |
|
} |
|
|
|
// Set it to warning and make sure that doesn't show up as critical. |
|
l.UpdateCheck(structs.NewCheckID(checkID, nil), api.HealthWarning, "") |
|
if checks := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition()); len(checks) > 0 { |
|
t.Fatalf("should not have any critical checks") |
|
} |
|
|
|
// Fail the check and make sure the time looks reasonable. |
|
l.UpdateCheck(structs.NewCheckID(checkID, nil), api.HealthCritical, "") |
|
if c, ok := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition())[structs.NewCheckID(checkID, nil)]; !ok { |
|
t.Fatalf("should have a critical check") |
|
} else if c.CriticalFor() > time.Millisecond { |
|
t.Fatalf("bad: %#v, check was critical for %v", c, c.CriticalFor()) |
|
} |
|
|
|
// Wait a while, then fail it again and make sure the time keeps track |
|
// of the initial failure, and doesn't reset here. Since we are sleeping for |
|
// 50ms the check should not be any less than that. |
|
time.Sleep(50 * time.Millisecond) |
|
l.UpdateCheck(chk.CompoundCheckID(), api.HealthCritical, "") |
|
if c, ok := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition())[structs.NewCheckID(checkID, nil)]; !ok { |
|
t.Fatalf("should have a critical check") |
|
} else if c.CriticalFor() < 50*time.Millisecond { |
|
t.Fatalf("bad: %#v, check was critical for %v", c, c.CriticalFor()) |
|
} |
|
|
|
// Set it passing again. |
|
l.UpdateCheck(structs.NewCheckID(checkID, nil), api.HealthPassing, "") |
|
if checks := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition()); len(checks) > 0 { |
|
t.Fatalf("should not have any critical checks") |
|
} |
|
|
|
// Fail the check and make sure the time looks like it started again |
|
// from the latest failure, not the original one. |
|
l.UpdateCheck(structs.NewCheckID(checkID, nil), api.HealthCritical, "") |
|
if c, ok := l.CriticalCheckStates(structs.DefaultEnterpriseMetaInDefaultPartition())[structs.NewCheckID(checkID, nil)]; !ok { |
|
t.Fatalf("should have a critical check") |
|
} else if c.CriticalFor() > time.Millisecond { |
|
t.Fatalf("bad: %#v, check was critical for %v", c, c.CriticalFor()) |
|
} |
|
} |
|
|
|
func TestAgent_AddCheckFailure(t *testing.T) { |
|
t.Parallel() |
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, new(token.Store)) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
// Add a check for a service that does not exist and verify that it fails |
|
checkID := types.CheckID("redis:1") |
|
chk := &structs.HealthCheck{ |
|
Node: "node", |
|
CheckID: checkID, |
|
Name: "redis:1", |
|
ServiceID: "redis", |
|
Status: api.HealthPassing, |
|
} |
|
wantErr := errors.New(`Check ID "redis:1" refers to non-existent service ID "redis"`) |
|
|
|
got := l.AddCheck(chk, "", false) |
|
require.Equal(t, wantErr, got) |
|
} |
|
|
|
func TestAgent_AliasCheck(t *testing.T) { |
|
t.Parallel() |
|
|
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, new(token.Store)) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
// Add checks |
|
require.NoError(t, l.AddServiceWithChecks(&structs.NodeService{Service: "s1"}, nil, "", false)) |
|
require.NoError(t, l.AddServiceWithChecks(&structs.NodeService{Service: "s2"}, nil, "", false)) |
|
require.NoError(t, l.AddCheck(&structs.HealthCheck{CheckID: types.CheckID("c1"), ServiceID: "s1"}, "", false)) |
|
require.NoError(t, l.AddCheck(&structs.HealthCheck{CheckID: types.CheckID("c2"), ServiceID: "s2"}, "", false)) |
|
|
|
// Add an alias |
|
notifyCh := make(chan struct{}, 1) |
|
require.NoError(t, l.AddAliasCheck(structs.NewCheckID(types.CheckID("a1"), nil), structs.NewServiceID("s1", nil), notifyCh)) |
|
|
|
// Update and verify we get notified |
|
l.UpdateCheck(structs.NewCheckID(types.CheckID("c1"), nil), api.HealthCritical, "") |
|
select { |
|
case <-notifyCh: |
|
default: |
|
t.Fatal("notify not received") |
|
} |
|
|
|
// Update again and verify we do not get notified |
|
l.UpdateCheck(structs.NewCheckID(types.CheckID("c1"), nil), api.HealthCritical, "") |
|
select { |
|
case <-notifyCh: |
|
t.Fatal("notify received") |
|
default: |
|
} |
|
|
|
// Update other check and verify we do not get notified |
|
l.UpdateCheck(structs.NewCheckID(types.CheckID("c2"), nil), api.HealthCritical, "") |
|
select { |
|
case <-notifyCh: |
|
t.Fatal("notify received") |
|
default: |
|
} |
|
|
|
// Update change and verify we get notified |
|
l.UpdateCheck(structs.NewCheckID(types.CheckID("c1"), nil), api.HealthPassing, "") |
|
select { |
|
case <-notifyCh: |
|
default: |
|
t.Fatal("notify not received") |
|
} |
|
} |
|
|
|
func TestAgent_AliasCheck_ServiceNotification(t *testing.T) { |
|
t.Parallel() |
|
|
|
cfg := loadRuntimeConfig(t, `bind_addr = "127.0.0.1" data_dir = "dummy" node_name = "dummy"`) |
|
l := local.NewState(agent.LocalConfig(cfg), nil, new(token.Store)) |
|
l.TriggerSyncChanges = func() {} |
|
|
|
// Add an alias check for service s1 |
|
notifyCh := make(chan struct{}, 1) |
|
require.NoError(t, l.AddAliasCheck(structs.NewCheckID(types.CheckID("a1"), nil), structs.NewServiceID("s1", nil), notifyCh)) |
|
|
|
// Add aliased service, s1, and verify we get notified |
|
require.NoError(t, l.AddServiceWithChecks(&structs.NodeService{Service: "s1"}, nil, "", false)) |
|
select { |
|
case <-notifyCh: |
|
default: |
|
t.Fatal("notify not received") |
|
} |
|
|
|
// Re-adding same service should not lead to a notification |
|
require.NoError(t, l.AddServiceWithChecks(&structs.NodeService{Service: "s1"}, nil, "", false)) |
|
select { |
|
case <-notifyCh: |
|
t.Fatal("notify received") |
|
default: |
|
} |
|
|
|
// Add different service and verify we do not get notified |
|
require.NoError(t, l.AddServiceWithChecks(&structs.NodeService{Service: "s2"}, nil, "", false)) |
|
select { |
|
case <-notifyCh: |
|
t.Fatal("notify received") |
|
default: |
|
} |
|
|
|
// Delete service and verify we get notified |
|
require.NoError(t, l.RemoveService(structs.NewServiceID("s1", nil))) |
|
select { |
|
case <-notifyCh: |
|
default: |
|
t.Fatal("notify not received") |
|
} |
|
|
|
// Delete different service and verify we do not get notified |
|
require.NoError(t, l.RemoveService(structs.NewServiceID("s2", nil))) |
|
select { |
|
case <-notifyCh: |
|
t.Fatal("notify received") |
|
default: |
|
} |
|
} |
|
|
|
func TestAgent_sendCoordinate(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
|
|
a := agent.StartTestAgent(t, agent.TestAgent{Overrides: ` |
|
sync_coordinate_interval_min = "1ms" |
|
sync_coordinate_rate_target = 10.0 |
|
consul = { |
|
coordinate = { |
|
update_period = "100ms" |
|
update_batch_size = 10 |
|
update_max_batches = 1 |
|
} |
|
} |
|
`}) |
|
defer a.Shutdown() |
|
testrpc.WaitForLeader(t, a.RPC, "dc1") |
|
|
|
t.Logf("%d %d %s", |
|
a.Config.ConsulCoordinateUpdateBatchSize, |
|
a.Config.ConsulCoordinateUpdateMaxBatches, |
|
a.Config.ConsulCoordinateUpdatePeriod.String()) |
|
|
|
// Make sure the coordinate is present. |
|
req := structs.DCSpecificRequest{ |
|
Datacenter: a.Config.Datacenter, |
|
} |
|
var reply structs.IndexedCoordinates |
|
retry.Run(t, func(r *retry.R) { |
|
if err := a.RPC(context.Background(), "Coordinate.ListNodes", &req, &reply); err != nil { |
|
r.Fatalf("err: %s", err) |
|
} |
|
if len(reply.Coordinates) != 1 { |
|
r.Fatalf("expected a coordinate: %v", reply) |
|
} |
|
coord := reply.Coordinates[0] |
|
if coord.Node != a.Config.NodeName || coord.Coord == nil { |
|
r.Fatalf("bad: %v", coord) |
|
} |
|
}) |
|
} |
|
|
|
func servicesInSync(state *local.State, wantServices int, entMeta *acl.EnterpriseMeta) error { |
|
services := state.ServiceStates(entMeta) |
|
if got, want := len(services), wantServices; got != want { |
|
return fmt.Errorf("got %d services want %d", got, want) |
|
} |
|
for id, s := range services { |
|
if !s.InSync { |
|
return fmt.Errorf("service ID %q should be in sync %+v", id.String(), s) |
|
} |
|
} |
|
return nil |
|
} |
|
|
|
func checksInSync(state *local.State, wantChecks int, entMeta *acl.EnterpriseMeta) error { |
|
checks := state.CheckStates(entMeta) |
|
if got, want := len(checks), wantChecks; got != want { |
|
return fmt.Errorf("got %d checks want %d", got, want) |
|
} |
|
for id, c := range checks { |
|
if !c.InSync { |
|
return fmt.Errorf("check %q should be in sync", id.String()) |
|
} |
|
} |
|
return nil |
|
} |
|
|
|
func TestState_RemoveServiceErrorMessages(t *testing.T) { |
|
state := local.NewState(local.Config{}, hclog.New(nil), &token.Store{}) |
|
|
|
// Stub state syncing |
|
state.TriggerSyncChanges = func() {} |
|
|
|
// Add 1 service |
|
err := state.AddServiceWithChecks(&structs.NodeService{ |
|
ID: "web-id", |
|
Service: "web-name", |
|
}, nil, "", false) |
|
require.NoError(t, err) |
|
|
|
// Attempt to remove service that doesn't exist |
|
sid := structs.NewServiceID("db", nil) |
|
err = state.RemoveService(sid) |
|
require.Contains(t, err.Error(), fmt.Sprintf(`Unknown service ID %q`, sid)) |
|
|
|
// Attempt to remove service by name (which isn't valid) |
|
sid2 := structs.NewServiceID("web-name", nil) |
|
err = state.RemoveService(sid2) |
|
require.Contains(t, err.Error(), fmt.Sprintf(`Unknown service ID %q`, sid2)) |
|
|
|
// Attempt to remove service by id (valid) |
|
err = state.RemoveService(structs.NewServiceID("web-id", nil)) |
|
require.NoError(t, err) |
|
} |
|
|
|
func TestState_Notify(t *testing.T) { |
|
t.Parallel() |
|
logger := hclog.New(&hclog.LoggerOptions{ |
|
Output: os.Stderr, |
|
}) |
|
|
|
state := local.NewState(local.Config{}, |
|
logger, &token.Store{}) |
|
|
|
// Stub state syncing |
|
state.TriggerSyncChanges = func() {} |
|
|
|
// Register a notifier |
|
notifyCh := make(chan struct{}, 1) |
|
state.Notify(notifyCh) |
|
defer state.StopNotify(notifyCh) |
|
assert.Empty(t, notifyCh) |
|
drainCh(notifyCh) |
|
|
|
// Add a service |
|
err := state.AddServiceWithChecks(&structs.NodeService{ |
|
Service: "web", |
|
}, nil, "fake-token-web", false) |
|
require.NoError(t, err) |
|
|
|
// Should have a notification |
|
assert.NotEmpty(t, notifyCh) |
|
drainCh(notifyCh) |
|
|
|
// Re-Add same service |
|
err = state.AddServiceWithChecks(&structs.NodeService{ |
|
Service: "web", |
|
Port: 4444, |
|
}, nil, "fake-token-web", false) |
|
require.NoError(t, err) |
|
|
|
// Should have a notification |
|
assert.NotEmpty(t, notifyCh) |
|
drainCh(notifyCh) |
|
|
|
// Remove service |
|
require.NoError(t, state.RemoveService(structs.NewServiceID("web", nil))) |
|
|
|
// Should have a notification |
|
assert.NotEmpty(t, notifyCh) |
|
drainCh(notifyCh) |
|
|
|
// Stopping should... stop |
|
state.StopNotify(notifyCh) |
|
|
|
// Add a service |
|
err = state.AddServiceWithChecks(&structs.NodeService{ |
|
Service: "web", |
|
}, nil, "fake-token-web", false) |
|
require.NoError(t, err) |
|
|
|
// Should NOT have a notification |
|
assert.Empty(t, notifyCh) |
|
drainCh(notifyCh) |
|
} |
|
|
|
// Test that alias check is updated after AddCheck, UpdateCheck, and RemoveCheck for the same service id |
|
func TestAliasNotifications_local(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("too slow for testing.Short") |
|
} |
|
|
|
t.Parallel() |
|
|
|
a := agent.NewTestAgent(t, "") |
|
defer a.Shutdown() |
|
|
|
testrpc.WaitForTestAgent(t, a.RPC, "dc1") |
|
|
|
// Register service with a failing TCP check |
|
svcID := "socat" |
|
srv := &structs.NodeService{ |
|
ID: svcID, |
|
Service: "echo", |
|
Tags: []string{}, |
|
Address: "127.0.0.10", |
|
Port: 8080, |
|
} |
|
a.State.AddServiceWithChecks(srv, nil, "", false) |
|
|
|
scID := "socat-sidecar-proxy" |
|
sc := &structs.NodeService{ |
|
ID: scID, |
|
Service: scID, |
|
Tags: []string{}, |
|
Address: "127.0.0.10", |
|
Port: 9090, |
|
} |
|
a.State.AddServiceWithChecks(sc, nil, "", false) |
|
|
|
tcpID := types.CheckID("service:socat-tcp") |
|
chk0 := &structs.HealthCheck{ |
|
Node: "", |
|
CheckID: tcpID, |
|
Name: "tcp check", |
|
Status: api.HealthPassing, |
|
ServiceID: svcID, |
|
} |
|
a.State.AddCheck(chk0, "", false) |
|
|
|
// Register an alias for the service |
|
proxyID := types.CheckID("service:socat-sidecar-proxy:2") |
|
chk1 := &structs.HealthCheck{ |
|
Node: "", |
|
CheckID: proxyID, |
|
Name: "Connect Sidecar Aliasing socat", |
|
Status: api.HealthPassing, |
|
ServiceID: scID, |
|
} |
|
chkt := &structs.CheckType{ |
|
AliasService: svcID, |
|
} |
|
require.NoError(t, a.AddCheck(chk1, chkt, true, "", agent.ConfigSourceLocal), false) |
|
|
|
// Add a failing check to the same service ID, alias should also fail |
|
maintID := types.CheckID("service:socat-maintenance") |
|
chk2 := &structs.HealthCheck{ |
|
Node: "", |
|
CheckID: maintID, |
|
Name: "socat:Service Maintenance Mode", |
|
Status: api.HealthCritical, |
|
ServiceID: svcID, |
|
} |
|
a.State.AddCheck(chk2, "", false) |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
check := a.State.Check(structs.NewCheckID(proxyID, nil)) |
|
require.NotNil(r, check) |
|
require.Equal(r, api.HealthCritical, check.Status) |
|
}) |
|
|
|
// Remove the failing check, alias should pass |
|
a.State.RemoveCheck(structs.NewCheckID(maintID, nil)) |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
check := a.State.Check(structs.NewCheckID(proxyID, nil)) |
|
require.NotNil(r, check) |
|
require.Equal(r, api.HealthPassing, check.Status) |
|
}) |
|
|
|
// Update TCP check to failing, alias should fail |
|
a.State.UpdateCheck(structs.NewCheckID(tcpID, nil), api.HealthCritical, "") |
|
|
|
retry.Run(t, func(r *retry.R) { |
|
check := a.State.Check(structs.NewCheckID(proxyID, nil)) |
|
require.NotNil(r, check) |
|
require.Equal(r, api.HealthCritical, check.Status) |
|
}) |
|
} |
|
|
|
// drainCh drains a channel by reading messages until it would block. |
|
func drainCh(ch chan struct{}) { |
|
for { |
|
select { |
|
case <-ch: |
|
default: |
|
return |
|
} |
|
} |
|
} |
|
|
|
func TestState_SyncChanges_DuplicateAddServiceOnlySyncsOnce(t *testing.T) { |
|
state := local.NewState(local.Config{}, hclog.New(nil), new(token.Store)) |
|
rpc := &fakeRPC{} |
|
state.Delegate = rpc |
|
state.TriggerSyncChanges = func() {} |
|
|
|
srv := &structs.NodeService{ |
|
Kind: structs.ServiceKindTypical, |
|
ID: "the-service-id", |
|
Service: "web", |
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInDefaultPartition(), |
|
} |
|
checks := []*structs.HealthCheck{ |
|
{Node: "this-node", CheckID: "the-id-1", Name: "check-healthy-1"}, |
|
{Node: "this-node", CheckID: "the-id-2", Name: "check-healthy-2"}, |
|
} |
|
tok := "the-token" |
|
err := state.AddServiceWithChecks(srv, checks, tok, false) |
|
require.NoError(t, err) |
|
require.NoError(t, state.SyncChanges()) |
|
// 4 rpc calls, one node register, one service register, two checks |
|
require.Len(t, rpc.calls, 4) |
|
|
|
// adding the service again should not catalog register |
|
err = state.AddServiceWithChecks(srv, checks, tok, false) |
|
require.NoError(t, err) |
|
require.NoError(t, state.SyncChanges()) |
|
require.Len(t, rpc.calls, 4) |
|
} |
|
|
|
type fakeRPC struct { |
|
calls []callRPC |
|
} |
|
|
|
type callRPC struct { |
|
method string |
|
args interface{} |
|
reply interface{} |
|
} |
|
|
|
func (f *fakeRPC) RPC(ctx context.Context, method string, args interface{}, reply interface{}) error { |
|
f.calls = append(f.calls, callRPC{method: method, args: args, reply: reply}) |
|
return nil |
|
} |
|
|
|
func (f *fakeRPC) ResolveTokenAndDefaultMeta(string, *acl.EnterpriseMeta, *acl.AuthorizerContext) (resolver.Result, error) { |
|
return resolver.Result{}, nil |
|
}
|
|
|