2018-09-27 13:33:12 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2018-09-27 14:00:51 +00:00
|
|
|
"fmt"
|
2018-09-27 13:33:12 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestAgent_sidecarServiceFromNodeService(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
2018-09-27 14:00:51 +00:00
|
|
|
maxPort int
|
2018-09-27 13:33:12 +00:00
|
|
|
preRegister *structs.ServiceDefinition
|
|
|
|
sd *structs.ServiceDefinition
|
|
|
|
token string
|
|
|
|
autoPortsDisabled bool
|
|
|
|
wantNS *structs.NodeService
|
|
|
|
wantChecks []*structs.CheckType
|
|
|
|
wantToken string
|
|
|
|
wantErr string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "no sidecar",
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantNS: nil,
|
|
|
|
wantChecks: nil,
|
|
|
|
wantToken: "",
|
|
|
|
wantErr: "", // Should NOT error
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "all the defaults",
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantNS: &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web1-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 2222,
|
|
|
|
LocallyRegisteredAsSidecar: true,
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 1111,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantChecks: []*structs.CheckType{
|
|
|
|
&structs.CheckType{
|
|
|
|
Name: "Connect Sidecar Listening",
|
|
|
|
TCP: "127.0.0.1:2222",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
},
|
|
|
|
&structs.CheckType{
|
|
|
|
Name: "Connect Sidecar Aliasing web1",
|
|
|
|
AliasService: "web1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantToken: "foo",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "all the allowed overrides",
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{
|
|
|
|
Name: "motorbike1",
|
|
|
|
Port: 3333,
|
|
|
|
Tags: []string{"foo", "bar"},
|
|
|
|
Address: "127.127.127.127",
|
|
|
|
Meta: map[string]string{"foo": "bar"},
|
|
|
|
Check: structs.CheckType{
|
|
|
|
ScriptArgs: []string{"sleep", "1"},
|
|
|
|
Interval: 999 * time.Second,
|
|
|
|
},
|
|
|
|
Token: "custom-token",
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Proxy: &structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
LocalServiceAddress: "127.0.127.0",
|
|
|
|
LocalServicePort: 9999,
|
|
|
|
Config: map[string]interface{}{"baz": "qux"},
|
|
|
|
Upstreams: structs.TestUpstreams(t),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantNS: &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web1-sidecar-proxy",
|
|
|
|
Service: "motorbike1",
|
|
|
|
Port: 3333,
|
|
|
|
Tags: []string{"foo", "bar"},
|
|
|
|
Address: "127.127.127.127",
|
|
|
|
Meta: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
LocallyRegisteredAsSidecar: true,
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
LocalServiceAddress: "127.0.127.0",
|
|
|
|
LocalServicePort: 9999,
|
|
|
|
Config: map[string]interface{}{"baz": "qux"},
|
|
|
|
Upstreams: structs.TestAddDefaultsToUpstreams(t, structs.TestUpstreams(t)),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantChecks: []*structs.CheckType{
|
|
|
|
&structs.CheckType{
|
|
|
|
ScriptArgs: []string{"sleep", "1"},
|
|
|
|
Interval: 999 * time.Second,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantToken: "custom-token",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no auto ports available",
|
|
|
|
// register another sidecar consuming our 1 and only allocated auto port.
|
|
|
|
preRegister: &structs.ServiceDefinition{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
Name: "api-proxy-sidecar",
|
|
|
|
Port: 2222, // Consume the one available auto-port
|
|
|
|
Proxy: &structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "api",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantErr: "none left in the configured range [2222, 2222]",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "auto ports disabled",
|
|
|
|
autoPortsDisabled: true,
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantErr: "auto-assignement disabled in config",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid check type",
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{
|
|
|
|
Check: structs.CheckType{
|
|
|
|
TCP: "foo",
|
|
|
|
// Invalid since no interval specified
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantErr: "Interval must be > 0",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid meta",
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1111,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{
|
|
|
|
Meta: map[string]string{
|
|
|
|
"consul-reserved-key-should-be-rejected": "true",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantErr: "reserved for internal use",
|
|
|
|
},
|
2018-09-27 14:00:51 +00:00
|
|
|
{
|
|
|
|
name: "re-registering same sidecar with no port should pick same one",
|
|
|
|
// Allow multiple ports to be sure we get the right one
|
|
|
|
maxPort: 2500,
|
|
|
|
// Pre register the sidecar we want
|
|
|
|
preRegister: &structs.ServiceDefinition{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web1-sidecar-proxy",
|
|
|
|
Name: "web-sidecar-proxy",
|
|
|
|
Port: 2222,
|
|
|
|
Proxy: &structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 1111,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
// Register same again but with different service port
|
|
|
|
sd: &structs.ServiceDefinition{
|
|
|
|
ID: "web1",
|
|
|
|
Name: "web",
|
|
|
|
Port: 1112,
|
|
|
|
Connect: &structs.ServiceConnect{
|
|
|
|
SidecarService: &structs.ServiceDefinition{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
token: "foo",
|
|
|
|
wantNS: &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web1-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 2222, // Should claim the same port as before
|
|
|
|
LocallyRegisteredAsSidecar: true,
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 1112,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantChecks: []*structs.CheckType{
|
|
|
|
&structs.CheckType{
|
|
|
|
Name: "Connect Sidecar Listening",
|
|
|
|
TCP: "127.0.0.1:2222",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
},
|
|
|
|
&structs.CheckType{
|
|
|
|
Name: "Connect Sidecar Aliasing web1",
|
|
|
|
AliasService: "web1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantToken: "foo",
|
|
|
|
},
|
2018-09-27 13:33:12 +00:00
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2018-09-27 14:00:51 +00:00
|
|
|
// Set port range to be tiny (one availabl) to test consuming all of it.
|
|
|
|
// This allows a single assigned port at 2222 thanks to being inclusive at
|
|
|
|
// both ends.
|
|
|
|
if tt.maxPort == 0 {
|
|
|
|
tt.maxPort = 2222
|
|
|
|
}
|
|
|
|
hcl := fmt.Sprintf(`
|
2018-09-27 13:33:12 +00:00
|
|
|
ports {
|
|
|
|
sidecar_min_port = 2222
|
2018-09-27 14:00:51 +00:00
|
|
|
sidecar_max_port = %d
|
2018-09-27 13:33:12 +00:00
|
|
|
}
|
2018-09-27 14:00:51 +00:00
|
|
|
`, tt.maxPort)
|
2018-09-27 13:33:12 +00:00
|
|
|
if tt.autoPortsDisabled {
|
|
|
|
hcl = `
|
|
|
|
ports {
|
|
|
|
sidecar_min_port = 0
|
|
|
|
sidecar_max_port = 0
|
|
|
|
}
|
|
|
|
`
|
|
|
|
}
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
a := NewTestAgent("jones", hcl)
|
|
|
|
|
|
|
|
if tt.preRegister != nil {
|
|
|
|
err := a.AddService(tt.preRegister.NodeService(), nil, false, "")
|
|
|
|
require.NoError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ns := tt.sd.NodeService()
|
|
|
|
err := ns.Validate()
|
|
|
|
require.NoError(err, "Invalid test case - NodeService must validate")
|
|
|
|
|
|
|
|
gotNS, gotChecks, gotToken, err := a.sidecarServiceFromNodeService(ns, tt.token)
|
|
|
|
if tt.wantErr != "" {
|
|
|
|
require.Error(err)
|
|
|
|
require.Contains(err.Error(), tt.wantErr)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
require.NoError(err)
|
|
|
|
require.Equal(tt.wantNS, gotNS)
|
|
|
|
require.Equal(tt.wantChecks, gotChecks)
|
|
|
|
require.Equal(tt.wantToken, gotToken)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|