2020-09-11 18:15:02 +00:00
|
|
|
package grpc
|
|
|
|
|
|
|
|
import (
|
2021-08-22 18:06:26 +00:00
|
|
|
"bytes"
|
2020-09-11 18:15:02 +00:00
|
|
|
"context"
|
|
|
|
"fmt"
|
2020-09-15 18:11:48 +00:00
|
|
|
"net"
|
2020-09-11 18:15:02 +00:00
|
|
|
"strings"
|
2020-10-14 20:47:16 +00:00
|
|
|
"sync/atomic"
|
2020-09-11 18:15:02 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2020-10-14 20:47:16 +00:00
|
|
|
"github.com/hashicorp/go-hclog"
|
2020-10-13 22:45:17 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2021-08-22 18:06:26 +00:00
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
2020-10-13 22:45:17 +00:00
|
|
|
|
2020-09-11 18:15:02 +00:00
|
|
|
"github.com/hashicorp/consul/agent/grpc/internal/testservice"
|
|
|
|
"github.com/hashicorp/consul/agent/grpc/resolver"
|
|
|
|
"github.com/hashicorp/consul/agent/metadata"
|
2020-10-14 20:47:16 +00:00
|
|
|
"github.com/hashicorp/consul/tlsutil"
|
2020-09-11 18:15:02 +00:00
|
|
|
)
|
|
|
|
|
2021-01-06 16:21:22 +00:00
|
|
|
// useTLSForDcAlwaysTrue tell GRPC to always return the TLS is enabled
|
|
|
|
func useTLSForDcAlwaysTrue(_ string) bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-09-15 18:11:48 +00:00
|
|
|
func TestNewDialer_WithTLSWrapper(t *testing.T) {
|
|
|
|
lis, err := net.Listen("tcp", "127.0.0.1:0")
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(logError(t, lis.Close))
|
|
|
|
|
|
|
|
builder := resolver.NewServerResolverBuilder(resolver.Config{})
|
|
|
|
builder.AddServer(&metadata.Server{
|
|
|
|
Name: "server-1",
|
|
|
|
ID: "ID1",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Addr: lis.Addr(),
|
|
|
|
UseTLS: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
var called bool
|
|
|
|
wrapper := func(_ string, conn net.Conn) (net.Conn, error) {
|
|
|
|
called = true
|
|
|
|
return conn, nil
|
|
|
|
}
|
2021-01-06 16:21:22 +00:00
|
|
|
dial := newDialer(builder, wrapper, useTLSForDcAlwaysTrue)
|
2020-09-15 18:11:48 +00:00
|
|
|
ctx := context.Background()
|
|
|
|
conn, err := dial(ctx, lis.Addr().String())
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, conn.Close())
|
|
|
|
require.True(t, called, "expected TLSWrapper to be called")
|
2020-09-11 18:15:02 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 20:47:16 +00:00
|
|
|
func TestNewDialer_IntegrationWithTLSEnabledHandler(t *testing.T) {
|
|
|
|
res := resolver.NewServerResolverBuilder(newConfig(t))
|
|
|
|
registerWithGRPC(t, res)
|
|
|
|
|
2021-08-22 18:06:26 +00:00
|
|
|
srv := newSimpleTestServer(t, "server-1", "dc1")
|
2020-10-14 20:47:16 +00:00
|
|
|
tlsConf, err := tlsutil.NewConfigurator(tlsutil.Config{
|
|
|
|
VerifyIncoming: true,
|
|
|
|
VerifyOutgoing: true,
|
|
|
|
CAFile: "../../test/hostname/CertAuth.crt",
|
|
|
|
CertFile: "../../test/hostname/Alice.crt",
|
|
|
|
KeyFile: "../../test/hostname/Alice.key",
|
|
|
|
}, hclog.New(nil))
|
|
|
|
require.NoError(t, err)
|
|
|
|
srv.rpc.tlsConf = tlsConf
|
|
|
|
|
|
|
|
res.AddServer(srv.Metadata())
|
|
|
|
t.Cleanup(srv.shutdown)
|
|
|
|
|
2021-01-06 16:21:22 +00:00
|
|
|
pool := NewClientConnPool(res, TLSWrapper(tlsConf.OutgoingRPCWrapper()), tlsConf.UseTLS)
|
2020-10-14 20:47:16 +00:00
|
|
|
|
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
client := testservice.NewSimpleClient(conn)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "server-1", resp.ServerName)
|
|
|
|
require.True(t, atomic.LoadInt32(&srv.rpc.tlsConnEstablished) > 0)
|
|
|
|
}
|
2020-09-15 18:11:48 +00:00
|
|
|
|
2020-09-11 18:15:02 +00:00
|
|
|
func TestClientConnPool_IntegrationWithGRPCResolver_Failover(t *testing.T) {
|
|
|
|
count := 4
|
2020-10-14 20:47:16 +00:00
|
|
|
res := resolver.NewServerResolverBuilder(newConfig(t))
|
|
|
|
registerWithGRPC(t, res)
|
2021-01-06 16:21:22 +00:00
|
|
|
pool := NewClientConnPool(res, nil, useTLSForDcAlwaysTrue)
|
2020-09-11 18:15:02 +00:00
|
|
|
|
|
|
|
for i := 0; i < count; i++ {
|
|
|
|
name := fmt.Sprintf("server-%d", i)
|
2021-08-22 18:06:26 +00:00
|
|
|
srv := newSimpleTestServer(t, name, "dc1")
|
2020-09-11 18:15:02 +00:00
|
|
|
res.AddServer(srv.Metadata())
|
|
|
|
t.Cleanup(srv.shutdown)
|
|
|
|
}
|
|
|
|
|
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
client := testservice.NewSimpleClient(conn)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
first, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
2020-09-14 20:16:44 +00:00
|
|
|
|
2020-09-11 18:15:02 +00:00
|
|
|
res.RemoveServer(&metadata.Server{ID: first.ServerName, Datacenter: "dc1"})
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotEqual(t, resp.ServerName, first.ServerName)
|
|
|
|
}
|
|
|
|
|
2020-10-14 20:47:16 +00:00
|
|
|
func newConfig(t *testing.T) resolver.Config {
|
|
|
|
n := t.Name()
|
2020-09-11 18:15:02 +00:00
|
|
|
s := strings.Replace(n, "/", "", -1)
|
|
|
|
s = strings.Replace(s, "_", "", -1)
|
2021-06-01 22:31:52 +00:00
|
|
|
return resolver.Config{Authority: strings.ToLower(s)}
|
2020-09-11 18:15:02 +00:00
|
|
|
}
|
|
|
|
|
2020-09-14 20:16:44 +00:00
|
|
|
func TestClientConnPool_IntegrationWithGRPCResolver_Rebalance(t *testing.T) {
|
2020-10-14 18:17:31 +00:00
|
|
|
count := 5
|
2020-10-14 20:47:16 +00:00
|
|
|
res := resolver.NewServerResolverBuilder(newConfig(t))
|
|
|
|
registerWithGRPC(t, res)
|
2021-01-06 16:21:22 +00:00
|
|
|
pool := NewClientConnPool(res, nil, useTLSForDcAlwaysTrue)
|
2020-09-11 18:15:02 +00:00
|
|
|
|
2020-09-14 20:16:44 +00:00
|
|
|
for i := 0; i < count; i++ {
|
|
|
|
name := fmt.Sprintf("server-%d", i)
|
2021-08-22 18:06:26 +00:00
|
|
|
srv := newSimpleTestServer(t, name, "dc1")
|
2020-09-14 20:16:44 +00:00
|
|
|
res.AddServer(srv.Metadata())
|
|
|
|
t.Cleanup(srv.shutdown)
|
|
|
|
}
|
|
|
|
|
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
client := testservice.NewSimpleClient(conn)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
first, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
t.Run("rebalance a different DC, does nothing", func(t *testing.T) {
|
|
|
|
res.NewRebalancer("dc-other")()
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, resp.ServerName, first.ServerName)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("rebalance the dc", func(t *testing.T) {
|
|
|
|
// Rebalance is random, but if we repeat it a few times it should give us a
|
|
|
|
// new server.
|
2020-10-14 18:17:31 +00:00
|
|
|
attempts := 100
|
|
|
|
for i := 0; i < attempts; i++ {
|
2020-09-14 20:16:44 +00:00
|
|
|
res.NewRebalancer("dc1")()
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
2020-10-14 18:17:31 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
if resp.ServerName != first.ServerName {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
t.Fatalf("server was not rebalanced after %v attempts", attempts)
|
2020-09-14 20:16:44 +00:00
|
|
|
})
|
2020-09-11 18:15:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestClientConnPool_IntegrationWithGRPCResolver_MultiDC(t *testing.T) {
|
|
|
|
dcs := []string{"dc1", "dc2", "dc3"}
|
|
|
|
|
2020-10-14 20:47:16 +00:00
|
|
|
res := resolver.NewServerResolverBuilder(newConfig(t))
|
|
|
|
registerWithGRPC(t, res)
|
2021-01-06 16:21:22 +00:00
|
|
|
pool := NewClientConnPool(res, nil, useTLSForDcAlwaysTrue)
|
2020-09-11 18:15:02 +00:00
|
|
|
|
|
|
|
for _, dc := range dcs {
|
|
|
|
name := "server-0-" + dc
|
2021-08-22 18:06:26 +00:00
|
|
|
srv := newSimpleTestServer(t, name, dc)
|
2020-09-11 18:15:02 +00:00
|
|
|
res.AddServer(srv.Metadata())
|
|
|
|
t.Cleanup(srv.shutdown)
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
for _, dc := range dcs {
|
|
|
|
conn, err := pool.ClientConn(dc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
client := testservice.NewSimpleClient(conn)
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, resp.Datacenter, dc)
|
|
|
|
}
|
|
|
|
}
|
2021-06-01 22:31:52 +00:00
|
|
|
|
|
|
|
func registerWithGRPC(t *testing.T, b *resolver.ServerResolverBuilder) {
|
|
|
|
resolver.Register(b)
|
|
|
|
t.Cleanup(func() {
|
|
|
|
resolver.Deregister(b.Authority())
|
|
|
|
})
|
|
|
|
}
|
2021-08-22 18:06:26 +00:00
|
|
|
|
|
|
|
func TestRecoverMiddleware(t *testing.T) {
|
|
|
|
// Prepare a logger with output to a buffer
|
|
|
|
// so we can check what it writes.
|
|
|
|
var buf bytes.Buffer
|
|
|
|
|
|
|
|
logger := hclog.New(&hclog.LoggerOptions{
|
|
|
|
Output: &buf,
|
|
|
|
})
|
|
|
|
|
|
|
|
res := resolver.NewServerResolverBuilder(newConfig(t))
|
|
|
|
registerWithGRPC(t, res)
|
|
|
|
|
|
|
|
srv := newPanicTestServer(t, logger, "server-1", "dc1")
|
|
|
|
res.AddServer(srv.Metadata())
|
|
|
|
t.Cleanup(srv.shutdown)
|
|
|
|
|
|
|
|
pool := NewClientConnPool(res, nil, useTLSForDcAlwaysTrue)
|
|
|
|
|
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
client := testservice.NewSimpleClient(conn)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
resp, err := client.Something(ctx, &testservice.Req{})
|
|
|
|
expectedErr := status.Errorf(codes.Internal, "grpc: panic serving request: panic from Something")
|
|
|
|
require.Equal(t, expectedErr, err)
|
|
|
|
require.Nil(t, resp)
|
|
|
|
|
|
|
|
// Read the log
|
|
|
|
strLog := buf.String()
|
|
|
|
// Checking the entire stack trace is not possible, let's
|
|
|
|
// make sure that it contains a couple of expected strings.
|
|
|
|
require.Contains(t, strLog, `[ERROR] panic serving grpc request: panic="panic from Something`)
|
|
|
|
require.Contains(t, strLog, `github.com/hashicorp/consul/agent/grpc.(*simplePanic).Something`)
|
|
|
|
}
|