2014-03-31 23:10:49 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
2014-08-15 02:25:12 +00:00
|
|
|
"strings"
|
2014-03-31 23:10:49 +00:00
|
|
|
"testing"
|
2014-05-19 19:50:29 +00:00
|
|
|
"time"
|
2014-08-15 02:25:12 +00:00
|
|
|
|
pkg refactor
command/agent/* -> agent/*
command/consul/* -> agent/consul/*
command/agent/command{,_test}.go -> command/agent{,_test}.go
command/base/command.go -> command/base.go
command/base/* -> command/*
commands.go -> command/commands.go
The script which did the refactor is:
(
cd $GOPATH/src/github.com/hashicorp/consul
git mv command/agent/command.go command/agent.go
git mv command/agent/command_test.go command/agent_test.go
git mv command/agent/flag_slice_value{,_test}.go command/
git mv command/agent .
git mv command/base/command.go command/base.go
git mv command/base/config_util{,_test}.go command/
git mv commands.go command/
git mv consul agent
rmdir command/base/
gsed -i -e 's|package agent|package command|' command/agent{,_test}.go
gsed -i -e 's|package agent|package command|' command/flag_slice_value{,_test}.go
gsed -i -e 's|package base|package command|' command/base.go command/config_util{,_test}.go
gsed -i -e 's|package main|package command|' command/commands.go
gsed -i -e 's|base.Command|BaseCommand|' command/commands.go
gsed -i -e 's|agent.Command|AgentCommand|' command/commands.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/commands.go
gsed -i -e 's|base\.||' command/commands.go
gsed -i -e 's|command\.||' command/commands.go
gsed -i -e 's|command|c|' main.go
gsed -i -e 's|range Commands|range command.Commands|' main.go
gsed -i -e 's|Commands: Commands|Commands: command.Commands|' main.go
gsed -i -e 's|base\.BoolValue|BoolValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.DurationValue|DurationValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.StringValue|StringValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.UintValue|UintValue|' command/operator_autopilot_set.go
gsed -i -e 's|\bCommand\b|BaseCommand|' command/base.go
gsed -i -e 's|BaseCommand Options|Command Options|' command/base.go
gsed -i -e 's|base.Command|BaseCommand|' command/*.go
gsed -i -e 's|c\.Command|c.BaseCommand|g' command/*.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/*_test.go
gsed -i -e 's|base\.||' command/*_test.go
gsed -i -e 's|\bCommand\b|AgentCommand|' command/agent{,_test}.go
gsed -i -e 's|cmd.AgentCommand|cmd.BaseCommand|' command/agent.go
gsed -i -e 's|cli.AgentCommand = new(Command)|cli.Command = new(AgentCommand)|' command/agent_test.go
gsed -i -e 's|exec.AgentCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|exec.BaseCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|NewTestAgent|agent.NewTestAgent|' command/agent_test.go
gsed -i -e 's|= TestConfig|= agent.TestConfig|' command/agent_test.go
gsed -i -e 's|: RetryJoin|: agent.RetryJoin|' command/agent_test.go
gsed -i -e 's|\.\./\.\./|../|' command/config_util_test.go
gsed -i -e 's|\bverifyUniqueListeners|VerifyUniqueListeners|' agent/config{,_test}.go command/agent.go
gsed -i -e 's|\bserfLANKeyring\b|SerfLANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bserfWANKeyring\b|SerfWANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bNewAgent\b|agent.New|g' command/agent{,_test}.go
gsed -i -e 's|\bNewAgent|New|' agent/{acl_test,agent,testagent}.go
gsed -i -e 's|\bAgent\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bBool\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDefaultConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDevConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bMergeConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bReadConfigPaths\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bParseMetaPair\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfLANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfWANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|circonus\.agent|circonus|g' command/agent{,_test}.go
gsed -i -e 's|logger\.agent|logger|g' command/agent{,_test}.go
gsed -i -e 's|metrics\.agent|metrics|g' command/agent{,_test}.go
gsed -i -e 's|// agent.Agent|// agent|' command/agent{,_test}.go
gsed -i -e 's|a\.agent\.Config|a.Config|' command/agent{,_test}.go
gsed -i -e 's|agent\.AppendSliceValue|AppendSliceValue|' command/{configtest,validate}.go
gsed -i -e 's|consul/consul|agent/consul|' GNUmakefile
gsed -i -e 's|\.\./test|../../test|' agent/consul/server_test.go
# fix imports
f=$(grep -rl 'github.com/hashicorp/consul/command/agent' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/command/agent|github.com/hashicorp/consul/agent|' $f
goimports -w $f
f=$(grep -rl 'github.com/hashicorp/consul/consul' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/consul|github.com/hashicorp/consul/agent/consul|' $f
goimports -w $f
goimports -w command/*.go main.go
)
2017-06-09 22:28:28 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul/structs"
|
2017-04-19 23:00:11 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
"github.com/hashicorp/consul/testrpc"
|
2015-10-13 23:43:52 +00:00
|
|
|
"github.com/hashicorp/net-rpc-msgpackrpc"
|
2014-03-31 23:10:49 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestKVS_Apply(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-03-31 23:10:49 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-03-31 23:10:49 +00:00
|
|
|
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-03-31 23:10:49 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "test",
|
|
|
|
Flags: 42,
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-03-31 23:10:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify
|
2015-10-13 05:21:39 +00:00
|
|
|
state := s1.fsm.State()
|
2017-01-24 19:20:51 +00:00
|
|
|
_, d, err := state.KVSGet(nil, "test")
|
2014-03-31 23:10:49 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if d == nil {
|
|
|
|
t.Fatalf("should not be nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do a check and set
|
2017-04-19 23:00:11 +00:00
|
|
|
arg.Op = api.KVCAS
|
2014-03-31 23:10:49 +00:00
|
|
|
arg.DirEnt.ModifyIndex = d.ModifyIndex
|
|
|
|
arg.DirEnt.Flags = 43
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-03-31 23:10:49 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check this was applied
|
|
|
|
if out != true {
|
|
|
|
t.Fatalf("bad: %v", out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify
|
2017-01-24 19:20:51 +00:00
|
|
|
_, d, err = state.KVSGet(nil, "test")
|
2014-03-31 23:10:49 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if d.Flags != 43 {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
}
|
2014-03-31 23:18:44 +00:00
|
|
|
|
2014-08-15 02:25:12 +00:00
|
|
|
func TestKVS_Apply_ACLDeny(t *testing.T) {
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-08-15 02:25:12 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-08-15 02:25:12 +00:00
|
|
|
|
|
|
|
// Create the ACL
|
|
|
|
arg := structs.ACLRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.ACLSet,
|
|
|
|
ACL: structs.ACL{
|
|
|
|
Name: "User token",
|
|
|
|
Type: structs.ACLTypeClient,
|
|
|
|
Rules: testListRules,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out string
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "ACL.Apply", &arg, &out); err != nil {
|
2014-08-15 02:25:12 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
id := out
|
|
|
|
|
|
|
|
// Try a write
|
|
|
|
argR := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-08-15 02:25:12 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "foo/bar",
|
|
|
|
Flags: 42,
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: id},
|
|
|
|
}
|
|
|
|
var outR bool
|
2015-10-13 23:43:52 +00:00
|
|
|
err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &argR, &outR)
|
2014-08-15 02:25:12 +00:00
|
|
|
if err == nil || !strings.Contains(err.Error(), permissionDenied) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try a recursive delete
|
|
|
|
argR = structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVDeleteTree,
|
2014-08-15 02:25:12 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "test",
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: id},
|
|
|
|
}
|
2015-10-13 23:43:52 +00:00
|
|
|
err = msgpackrpc.CallWithCodec(codec, "KVS.Apply", &argR, &outR)
|
2014-08-15 02:25:12 +00:00
|
|
|
if err == nil || !strings.Contains(err.Error(), permissionDenied) {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-31 23:18:44 +00:00
|
|
|
func TestKVS_Get(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-03-31 23:18:44 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-03-31 23:18:44 +00:00
|
|
|
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-03-31 23:18:44 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "test",
|
|
|
|
Flags: 42,
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-03-31 23:18:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "test",
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Get", &getR, &dirent); err != nil {
|
2014-03-31 23:18:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 1 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
d := dirent.Entries[0]
|
|
|
|
if d.Flags != 42 {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
if string(d.Value) != "test" {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-13 19:09:39 +00:00
|
|
|
func TestKVS_Get_ACLDeny(t *testing.T) {
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-08-13 19:09:39 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-08-13 19:09:39 +00:00
|
|
|
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-08-13 19:09:39 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
2014-08-15 02:25:12 +00:00
|
|
|
Key: "zip",
|
2014-08-13 19:09:39 +00:00
|
|
|
Flags: 42,
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
2014-08-15 02:25:12 +00:00
|
|
|
Key: "zip",
|
2014-08-13 19:09:39 +00:00
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Get", &getR, &dirent); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-31 23:18:44 +00:00
|
|
|
func TestKVSEndpoint_List(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-03-31 23:18:44 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-03-31 23:18:44 +00:00
|
|
|
|
|
|
|
keys := []string{
|
|
|
|
"/test/key1",
|
|
|
|
"/test/key2",
|
|
|
|
"/test/sub/key3",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-03-31 23:18:44 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: key,
|
|
|
|
Flags: 1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-03-31 23:18:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "/test",
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.List", &getR, &dirent); err != nil {
|
2014-03-31 23:18:44 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 3 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Entries)
|
|
|
|
}
|
|
|
|
for i := 0; i < len(dirent.Entries); i++ {
|
|
|
|
d := dirent.Entries[i]
|
|
|
|
if d.Key != keys[i] {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
if d.Flags != 1 {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
if d.Value != nil {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
}
|
2015-10-13 18:48:35 +00:00
|
|
|
|
|
|
|
// Try listing a nonexistent prefix
|
|
|
|
getR.Key = "/nope"
|
2015-10-15 22:09:13 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.List", &getR, &dirent); err != nil {
|
2015-10-13 18:48:35 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Entries)
|
|
|
|
}
|
2014-03-31 23:18:44 +00:00
|
|
|
}
|
2014-04-28 23:33:54 +00:00
|
|
|
|
2015-01-06 00:57:48 +00:00
|
|
|
func TestKVSEndpoint_List_Blocking(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2015-01-06 00:57:48 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2015-01-06 00:57:48 +00:00
|
|
|
|
|
|
|
keys := []string{
|
|
|
|
"/test/key1",
|
|
|
|
"/test/key2",
|
|
|
|
"/test/sub/key3",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2015-01-06 00:57:48 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: key,
|
|
|
|
Flags: 1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2015-01-06 00:57:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "/test",
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.List", &getR, &dirent); err != nil {
|
2015-01-06 00:57:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup a blocking query
|
|
|
|
getR.MinQueryIndex = dirent.Index
|
|
|
|
getR.MaxQueryTime = time.Second
|
|
|
|
|
|
|
|
// Async cause a change
|
|
|
|
start := time.Now()
|
|
|
|
go func() {
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2015-01-06 00:57:48 +00:00
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVDelete,
|
2015-01-06 00:57:48 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "/test/sub/key3",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2015-01-06 00:57:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Re-run the query
|
|
|
|
dirent = structs.IndexedDirEntries{}
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.List", &getR, &dirent); err != nil {
|
2015-01-06 00:57:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should block at least 100ms
|
|
|
|
if time.Now().Sub(start) < 100*time.Millisecond {
|
|
|
|
t.Fatalf("too fast")
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 2 {
|
|
|
|
for _, ent := range dirent.Entries {
|
|
|
|
t.Errorf("Bad: %#v", *ent)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for i := 0; i < len(dirent.Entries); i++ {
|
|
|
|
d := dirent.Entries[i]
|
|
|
|
if d.Key != keys[i] {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
if d.Flags != 1 {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
if d.Value != nil {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-13 19:09:39 +00:00
|
|
|
func TestKVSEndpoint_List_ACLDeny(t *testing.T) {
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-08-13 19:09:39 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-08-13 19:09:39 +00:00
|
|
|
|
|
|
|
keys := []string{
|
|
|
|
"abe",
|
|
|
|
"bar",
|
|
|
|
"foo",
|
|
|
|
"test",
|
|
|
|
"zip",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-08-13 19:09:39 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: key,
|
|
|
|
Flags: 1,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
arg := structs.ACLRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.ACLSet,
|
|
|
|
ACL: structs.ACL{
|
|
|
|
Name: "User token",
|
|
|
|
Type: structs.ACLTypeClient,
|
|
|
|
Rules: testListRules,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out string
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "ACL.Apply", &arg, &out); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
id := out
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "",
|
|
|
|
QueryOptions: structs.QueryOptions{Token: id},
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.List", &getR, &dirent); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 2 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Entries)
|
|
|
|
}
|
|
|
|
for i := 0; i < len(dirent.Entries); i++ {
|
|
|
|
d := dirent.Entries[i]
|
|
|
|
switch i {
|
|
|
|
case 0:
|
|
|
|
if d.Key != "foo" {
|
|
|
|
t.Fatalf("bad key")
|
|
|
|
}
|
|
|
|
case 1:
|
|
|
|
if d.Key != "test" {
|
|
|
|
t.Fatalf("bad key")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-28 23:33:54 +00:00
|
|
|
func TestKVSEndpoint_ListKeys(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-04-28 23:33:54 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-04-28 23:33:54 +00:00
|
|
|
|
|
|
|
keys := []string{
|
|
|
|
"/test/key1",
|
|
|
|
"/test/key2",
|
|
|
|
"/test/sub/key3",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-04-28 23:33:54 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: key,
|
|
|
|
Flags: 1,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-04-28 23:33:54 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getR := structs.KeyListRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Prefix: "/test/",
|
|
|
|
Seperator: "/",
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedKeyList
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.ListKeys", &getR, &dirent); err != nil {
|
2014-04-28 23:33:54 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Keys) != 3 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
if dirent.Keys[0] != "/test/key1" {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
if dirent.Keys[1] != "/test/key2" {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
if dirent.Keys[2] != "/test/sub/" {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
2015-10-13 18:48:35 +00:00
|
|
|
|
|
|
|
// Try listing a nonexistent prefix
|
|
|
|
getR.Prefix = "/nope"
|
2015-10-15 22:09:13 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.ListKeys", &getR, &dirent); err != nil {
|
2015-10-13 18:48:35 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Keys) != 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
2014-05-19 19:50:29 +00:00
|
|
|
}
|
|
|
|
|
2014-08-13 19:09:39 +00:00
|
|
|
func TestKVSEndpoint_ListKeys_ACLDeny(t *testing.T) {
|
|
|
|
dir1, s1 := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-08-13 19:09:39 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-08-13 19:09:39 +00:00
|
|
|
|
|
|
|
keys := []string{
|
|
|
|
"abe",
|
|
|
|
"bar",
|
|
|
|
"foo",
|
|
|
|
"test",
|
|
|
|
"zip",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2014-08-13 19:09:39 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: key,
|
|
|
|
Flags: 1,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
arg := structs.ACLRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Op: structs.ACLSet,
|
|
|
|
ACL: structs.ACL{
|
|
|
|
Name: "User token",
|
|
|
|
Type: structs.ACLTypeClient,
|
|
|
|
Rules: testListRules,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var out string
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "ACL.Apply", &arg, &out); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
id := out
|
|
|
|
|
|
|
|
getR := structs.KeyListRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Prefix: "",
|
|
|
|
Seperator: "/",
|
|
|
|
QueryOptions: structs.QueryOptions{Token: id},
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedKeyList
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.ListKeys", &getR, &dirent); err != nil {
|
2014-08-13 19:09:39 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Keys) != 2 {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
if dirent.Keys[0] != "foo" {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
if dirent.Keys[1] != "test" {
|
|
|
|
t.Fatalf("Bad: %v", dirent.Keys)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-19 19:50:29 +00:00
|
|
|
func TestKVS_Apply_LockDelay(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
2015-10-13 23:43:52 +00:00
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
2014-05-19 19:50:29 +00:00
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2014-05-19 19:50:29 +00:00
|
|
|
|
2016-05-10 18:23:47 +00:00
|
|
|
// Create and invalidate a session with a lock.
|
2015-10-13 05:21:39 +00:00
|
|
|
state := s1.fsm.State()
|
2015-10-09 19:00:15 +00:00
|
|
|
if err := state.EnsureNode(1, &structs.Node{Node: "foo", Address: "127.0.0.1"}); err != nil {
|
2014-11-01 21:56:48 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
2014-05-19 19:50:29 +00:00
|
|
|
}
|
|
|
|
session := &structs.Session{
|
2014-10-09 18:54:47 +00:00
|
|
|
ID: generateUUID(),
|
2014-05-19 19:50:29 +00:00
|
|
|
Node: "foo",
|
|
|
|
LockDelay: 50 * time.Millisecond,
|
|
|
|
}
|
|
|
|
if err := state.SessionCreate(2, session); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
id := session.ID
|
|
|
|
d := &structs.DirEntry{
|
|
|
|
Key: "test",
|
|
|
|
Session: id,
|
|
|
|
}
|
|
|
|
if ok, err := state.KVSLock(3, d); err != nil || !ok {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if err := state.SessionDestroy(4, id); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2014-04-28 23:33:54 +00:00
|
|
|
|
2016-05-10 18:23:47 +00:00
|
|
|
// Make a new session that is valid.
|
2014-05-19 19:50:29 +00:00
|
|
|
if err := state.SessionCreate(5, session); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
2017-04-21 00:02:42 +00:00
|
|
|
validID := session.ID
|
2014-05-19 19:50:29 +00:00
|
|
|
|
2016-05-10 18:23:47 +00:00
|
|
|
// Make a lock request.
|
2014-05-19 19:50:29 +00:00
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVLock,
|
2014-05-19 19:50:29 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "test",
|
2017-04-21 00:02:42 +00:00
|
|
|
Session: validID,
|
2014-05-19 19:50:29 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-05-19 19:50:29 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out != false {
|
|
|
|
t.Fatalf("should not acquire")
|
|
|
|
}
|
|
|
|
|
2016-05-10 18:23:47 +00:00
|
|
|
// Wait for lock-delay.
|
2014-05-19 19:50:29 +00:00
|
|
|
time.Sleep(50 * time.Millisecond)
|
|
|
|
|
2016-05-10 18:23:47 +00:00
|
|
|
// Should acquire.
|
2015-10-13 23:43:52 +00:00
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
2014-05-19 19:50:29 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if out != true {
|
|
|
|
t.Fatalf("should acquire")
|
|
|
|
}
|
2014-04-28 23:33:54 +00:00
|
|
|
}
|
2014-08-13 19:09:39 +00:00
|
|
|
|
2016-01-20 05:46:22 +00:00
|
|
|
func TestKVS_Issue_1626(t *testing.T) {
|
|
|
|
dir1, s1 := testServer(t)
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer s1.Shutdown()
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
testrpc.WaitForLeader(t, s1.RPC, "dc1")
|
2016-01-20 05:46:22 +00:00
|
|
|
|
|
|
|
// Set up the first key.
|
|
|
|
{
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2016-01-20 05:46:22 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "foo/test",
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retrieve the base key and snag the index.
|
|
|
|
var index uint64
|
|
|
|
{
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "foo/test",
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Get", &getR, &dirent); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if dirent.Index == 0 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 1 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
d := dirent.Entries[0]
|
|
|
|
if string(d.Value) != "test" {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
|
|
|
|
index = dirent.Index
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set up a blocking query on the base key.
|
|
|
|
doneCh := make(chan *structs.IndexedDirEntries, 1)
|
|
|
|
go func() {
|
|
|
|
codec := rpcClient(t, s1)
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
getR := structs.KeyRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Key: "foo/test",
|
|
|
|
QueryOptions: structs.QueryOptions{
|
|
|
|
MinQueryIndex: index,
|
|
|
|
MaxQueryTime: 3 * time.Second,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var dirent structs.IndexedDirEntries
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Get", &getR, &dirent); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
doneCh <- &dirent
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Now update a second key with a prefix that has the first key name
|
|
|
|
// as part of it.
|
|
|
|
{
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2016-01-20 05:46:22 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "foo/test2",
|
|
|
|
Value: []byte("test"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the blocking query didn't wake up for this update.
|
|
|
|
select {
|
|
|
|
case <-doneCh:
|
|
|
|
t.Fatalf("Blocking query should not have completed")
|
|
|
|
case <-time.After(1 * time.Second):
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now update the first key's payload.
|
|
|
|
{
|
|
|
|
arg := structs.KVSRequest{
|
|
|
|
Datacenter: "dc1",
|
2017-04-19 23:00:11 +00:00
|
|
|
Op: api.KVSet,
|
2016-01-20 05:46:22 +00:00
|
|
|
DirEnt: structs.DirEntry{
|
|
|
|
Key: "foo/test",
|
|
|
|
Value: []byte("updated"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out bool
|
|
|
|
if err := msgpackrpc.CallWithCodec(codec, "KVS.Apply", &arg, &out); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the blocking query wakes up for the final update.
|
|
|
|
select {
|
|
|
|
case dirent := <-doneCh:
|
|
|
|
if dirent.Index <= index {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
if len(dirent.Entries) != 1 {
|
|
|
|
t.Fatalf("Bad: %v", dirent)
|
|
|
|
}
|
|
|
|
d := dirent.Entries[0]
|
|
|
|
if string(d.Value) != "updated" {
|
|
|
|
t.Fatalf("bad: %v", d)
|
|
|
|
}
|
|
|
|
case <-time.After(1 * time.Second):
|
|
|
|
t.Fatalf("Blocking query should have completed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-13 19:09:39 +00:00
|
|
|
var testListRules = `
|
|
|
|
key "" {
|
|
|
|
policy = "deny"
|
|
|
|
}
|
|
|
|
key "foo" {
|
|
|
|
policy = "read"
|
|
|
|
}
|
|
|
|
key "test" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
2014-08-15 02:25:12 +00:00
|
|
|
key "test/priv" {
|
|
|
|
policy = "read"
|
|
|
|
}
|
2014-08-13 19:09:39 +00:00
|
|
|
`
|