peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
package consul
import (
"context"
"encoding/base64"
"encoding/json"
2022-07-29 20:04:32 +00:00
"errors"
2022-07-22 19:05:08 +00:00
"fmt"
2022-07-15 18:15:50 +00:00
"io/ioutil"
2022-10-10 19:54:36 +00:00
"net"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
"testing"
"time"
2022-07-22 19:05:08 +00:00
"github.com/armon/go-metrics"
2022-10-10 19:54:36 +00:00
"github.com/google/tcpproxy"
2022-09-29 19:37:19 +00:00
msgpackrpc "github.com/hashicorp/consul-net-rpc/net-rpc-msgpackrpc"
2022-07-29 20:04:32 +00:00
"github.com/hashicorp/go-hclog"
2022-08-10 15:53:25 +00:00
"github.com/stretchr/testify/assert"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
"github.com/stretchr/testify/require"
"google.golang.org/grpc"
2022-07-29 20:04:32 +00:00
"google.golang.org/grpc/codes"
grpcstatus "google.golang.org/grpc/status"
2022-08-26 14:27:13 +00:00
"google.golang.org/protobuf/proto"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-06-21 18:04:08 +00:00
"github.com/hashicorp/consul/acl"
2022-09-29 03:27:11 +00:00
"github.com/hashicorp/consul/agent/connect"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
"github.com/hashicorp/consul/agent/consul/state"
"github.com/hashicorp/consul/agent/structs"
2022-06-21 18:04:08 +00:00
"github.com/hashicorp/consul/api"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
"github.com/hashicorp/consul/proto/pbpeering"
2022-07-15 18:58:33 +00:00
"github.com/hashicorp/consul/sdk/freeport"
2022-08-26 14:27:13 +00:00
"github.com/hashicorp/consul/sdk/testutil"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
"github.com/hashicorp/consul/sdk/testutil/retry"
"github.com/hashicorp/consul/testrpc"
2022-07-15 17:20:43 +00:00
"github.com/hashicorp/consul/types"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
)
func TestLeader_PeeringSync_Lifecycle_ClientDeletion ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
2022-09-29 03:27:11 +00:00
ca := connect . TestCA ( t , nil )
2022-08-01 21:06:18 +00:00
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
2022-09-29 03:27:11 +00:00
}
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
2022-08-01 21:06:18 +00:00
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
2022-08-01 21:06:18 +00:00
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
2022-08-01 21:06:18 +00:00
acceptorClient := pbpeering . NewPeeringServiceClient ( conn )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
req := pbpeering . GenerateTokenRequest {
2022-08-01 21:06:18 +00:00
PeerName : "my-peer-dialer" ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
}
2022-08-01 21:06:18 +00:00
resp , err := acceptorClient . GenerateToken ( ctx , & req )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
2022-08-01 21:06:18 +00:00
// S1 should not have a stream tracked for dc2 because acceptor generated a token for baz, and therefore needs to wait to be dialed.
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
time . Sleep ( 1 * time . Second )
2022-08-01 21:06:18 +00:00
_ , found := acceptor . peerStreamServer . StreamStatus ( token . PeerID )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . False ( t , found )
2022-08-01 21:06:18 +00:00
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
2022-08-01 21:06:18 +00:00
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-08-01 21:06:18 +00:00
// Create a peering at dialer by establishing a peering with acceptor's token
2022-08-01 14:33:18 +00:00
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
2022-08-01 21:06:18 +00:00
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-01 14:33:18 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
2022-08-01 21:06:18 +00:00
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
2022-08-01 14:33:18 +00:00
establishReq := pbpeering . EstablishRequest {
2022-08-01 21:06:18 +00:00
PeerName : "my-peer-acceptor" ,
2022-08-01 14:33:18 +00:00
PeeringToken : resp . PeeringToken ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
}
2022-08-01 21:06:18 +00:00
_ , err = dialerClient . Establish ( ctx , & establishReq )
2022-08-01 14:33:18 +00:00
require . NoError ( t , err )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-08-01 21:06:18 +00:00
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
2022-08-01 14:33:18 +00:00
require . NoError ( t , err )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
retry . Run ( t , func ( r * retry . R ) {
status , found := acceptor . peerStreamServer . StreamStatus ( p . Peering . PeerID )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . True ( r , found )
require . True ( r , status . Connected )
} )
2022-06-13 14:22:46 +00:00
// Delete the peering to trigger the termination sequence.
deleted := & pbpeering . Peering {
2022-08-29 18:00:30 +00:00
ID : p . Peering . ID ,
Name : "my-peer-acceptor" ,
State : pbpeering . PeeringState_DELETING ,
PeerServerAddresses : p . Peering . PeerServerAddresses ,
DeletedAt : structs . TimeToProto ( time . Now ( ) ) ,
2022-06-13 14:22:46 +00:00
}
2022-08-01 21:06:18 +00:00
require . NoError ( t , dialer . fsm . State ( ) . PeeringWrite ( 2000 , & pbpeering . PeeringWriteRequest { Peering : deleted } ) )
dialer . logger . Trace ( "deleted peering for my-peer-acceptor" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
_ , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . False ( r , found )
} )
2022-08-01 21:06:18 +00:00
// acceptor should have also marked the peering as terminated.
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
_ , peering , err := acceptor . fsm . State ( ) . PeeringRead ( nil , state . Query {
Value : "my-peer-dialer" ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
require . NoError ( r , err )
2022-06-14 14:39:23 +00:00
require . Equal ( r , pbpeering . PeeringState_TERMINATED , peering . State )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
}
2022-09-29 19:37:19 +00:00
func TestLeader_PeeringSync_Lifecycle_UnexportWhileDown ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
// Reserve a gRPC port so we can restart the accepting server with the same port.
2022-10-07 15:34:16 +00:00
dialingServerPort := freeport . GetOne ( t )
2022-09-29 19:37:19 +00:00
2022-10-07 15:34:16 +00:00
ca := connect . TestCA ( t , nil )
2022-09-29 19:37:19 +00:00
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-10-07 15:34:16 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-09-29 19:37:19 +00:00
} )
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-09-29 19:37:19 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
acceptorClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialer" ,
}
resp , err := acceptorClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
2022-10-07 15:34:16 +00:00
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
2022-09-29 19:37:19 +00:00
c . GRPCPort = dialingServerPort
} )
2022-10-07 15:34:16 +00:00
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
2022-09-29 19:37:19 +00:00
// Create a peering at dialer by establishing a peering with acceptor's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-09-29 19:37:19 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-acceptor" ,
PeeringToken : resp . PeeringToken ,
}
_ , err = dialerClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
require . NoError ( t , err )
retry . Run ( t , func ( r * retry . R ) {
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
retry . Run ( t , func ( r * retry . R ) {
status , found := acceptor . peerStreamServer . StreamStatus ( p . Peering . PeerID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
acceptorCodec := rpcClient ( t , acceptor )
{
exportedServices := structs . ConfigEntryRequest {
Op : structs . ConfigEntryUpsert ,
Datacenter : "dc1" ,
Entry : & structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService {
{
Name : "foo" ,
2022-10-04 18:46:15 +00:00
Consumers : [ ] structs . ServiceConsumer { { Peer : "my-peer-dialer" } } ,
2022-09-29 19:37:19 +00:00
} ,
} ,
} ,
}
var configOutput bool
require . NoError ( t , msgpackrpc . CallWithCodec ( acceptorCodec , "ConfigEntry.Apply" , & exportedServices , & configOutput ) )
require . True ( t , configOutput )
}
insertNode := func ( i int ) {
req := structs . RegisterRequest {
Datacenter : "dc1" ,
2022-10-18 20:19:24 +00:00
ID : types . NodeID ( generateUUID ( ) ) ,
2022-09-29 19:37:19 +00:00
Node : fmt . Sprintf ( "node%d" , i + 1 ) ,
Address : fmt . Sprintf ( "127.0.0.%d" , i + 1 ) ,
NodeMeta : map [ string ] string {
"group" : fmt . Sprintf ( "%d" , i / 5 ) ,
"instance_type" : "t2.micro" ,
} ,
Service : & structs . NodeService {
Service : "foo" ,
Port : 8000 ,
} ,
WriteRequest : structs . WriteRequest { Token : "root" } ,
}
var reply struct { }
if err := msgpackrpc . CallWithCodec ( acceptorCodec , "Catalog.Register" , & req , & reply ) ; err != nil {
t . Fatalf ( "err: %v" , err )
}
}
for i := 0 ; i < 5 ; i ++ {
insertNode ( i )
}
retry . Run ( t , func ( r * retry . R ) {
_ , nodes , err := dialer . fsm . State ( ) . CheckServiceNodes ( nil , "foo" , nil , "my-peer-acceptor" )
require . NoError ( r , err )
require . Len ( r , nodes , 5 )
} )
// Shutdown the dialing server.
require . NoError ( t , dialer . Shutdown ( ) )
// Have to manually shut down the gRPC server otherwise it stays bound to the port.
dialer . externalGRPCServer . Stop ( )
{
exportedServices := structs . ConfigEntryRequest {
Op : structs . ConfigEntryUpsert ,
Datacenter : "dc1" ,
Entry : & structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService { } ,
} ,
}
var configOutput bool
require . NoError ( t , msgpackrpc . CallWithCodec ( acceptorCodec , "ConfigEntry.Apply" , & exportedServices , & configOutput ) )
require . True ( t , configOutput )
}
// Restart the server by re-using the previous acceptor's data directory and node id.
_ , dialerRestart := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . GRPCPort = dialingServerPort
c . DataDir = dialer . config . DataDir
c . NodeID = dialer . config . NodeID
} )
// The dialing peer should eventually reconnect.
retry . Run ( t , func ( r * retry . R ) {
connStreams := dialerRestart . peerStreamServer . ConnectedStreams ( )
require . Contains ( r , connStreams , p . Peering . ID )
} )
// The un-export results in the foo nodes being deleted.
retry . Run ( t , func ( r * retry . R ) {
_ , nodes , err := dialerRestart . fsm . State ( ) . CheckServiceNodes ( nil , "foo" , nil , "my-peer-acceptor" )
require . NoError ( r , err )
require . Len ( r , nodes , 0 )
} )
}
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
func TestLeader_PeeringSync_Lifecycle_ServerDeletion ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
2022-09-29 03:27:11 +00:00
ca := connect . TestCA ( t , nil )
2022-08-01 21:06:18 +00:00
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
2022-09-29 03:27:11 +00:00
}
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
2022-08-01 21:06:18 +00:00
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-08-01 21:06:18 +00:00
// Define a peering by generating a token for dialer
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
2022-08-01 21:06:18 +00:00
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
peeringClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
2022-08-01 21:06:18 +00:00
PeerName : "my-peer-dialer" ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
}
resp , err := peeringClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
2022-08-01 21:06:18 +00:00
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
2022-08-01 21:06:18 +00:00
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-08-01 21:06:18 +00:00
// Create a peering at dialer by establishing a peering with acceptor's token
2022-08-01 14:33:18 +00:00
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
2022-08-01 21:06:18 +00:00
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-01 14:33:18 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
2022-08-01 21:06:18 +00:00
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
2022-08-01 14:33:18 +00:00
establishReq := pbpeering . EstablishRequest {
2022-08-01 21:06:18 +00:00
PeerName : "my-peer-acceptor" ,
2022-08-01 14:33:18 +00:00
PeeringToken : resp . PeeringToken ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
}
2022-08-01 21:06:18 +00:00
_ , err = dialerClient . Establish ( ctx , & establishReq )
2022-08-01 14:33:18 +00:00
require . NoError ( t , err )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
2022-08-01 21:06:18 +00:00
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
2022-08-01 14:33:18 +00:00
require . NoError ( t , err )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
retry . Run ( t , func ( r * retry . R ) {
status , found := acceptor . peerStreamServer . StreamStatus ( p . Peering . PeerID )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . True ( r , found )
require . True ( r , status . Connected )
} )
2022-06-13 14:22:46 +00:00
// Delete the peering from the server peer to trigger the termination sequence.
deleted := & pbpeering . Peering {
2022-08-01 14:33:18 +00:00
ID : p . Peering . PeerID ,
2022-08-01 21:06:18 +00:00
Name : "my-peer-dialer" ,
2022-08-29 18:00:30 +00:00
State : pbpeering . PeeringState_DELETING ,
2022-06-13 14:22:46 +00:00
DeletedAt : structs . TimeToProto ( time . Now ( ) ) ,
}
2022-08-01 21:06:18 +00:00
require . NoError ( t , acceptor . fsm . State ( ) . PeeringWrite ( 2000 , & pbpeering . PeeringWriteRequest { Peering : deleted } ) )
acceptor . logger . Trace ( "deleted peering for my-peer-dialer" )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
_ , found := acceptor . peerStreamServer . StreamStatus ( p . Peering . PeerID )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
require . False ( r , found )
} )
2022-08-01 21:06:18 +00:00
// dialer should have received the termination message and updated the peering state.
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 21:06:18 +00:00
_ , peering , err := dialer . fsm . State ( ) . PeeringRead ( nil , state . Query {
Value : "my-peer-acceptor" ,
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
require . NoError ( r , err )
2022-06-14 14:39:23 +00:00
require . Equal ( r , pbpeering . PeeringState_TERMINATED , peering . State )
peering: initial sync (#12842)
- Add endpoints related to peering: read, list, generate token, initiate peering
- Update node/service/check table indexing to account for peers
- Foundational changes for pushing service updates to a peer
- Plumb peer name through Health.ServiceNodes path
see: ENT-1765, ENT-1280, ENT-1283, ENT-1283, ENT-1756, ENT-1739, ENT-1750, ENT-1679,
ENT-1709, ENT-1704, ENT-1690, ENT-1689, ENT-1702, ENT-1701, ENT-1683, ENT-1663,
ENT-1650, ENT-1678, ENT-1628, ENT-1658, ENT-1640, ENT-1637, ENT-1597, ENT-1634,
ENT-1613, ENT-1616, ENT-1617, ENT-1591, ENT-1588, ENT-1596, ENT-1572, ENT-1555
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
Co-authored-by: freddygv <freddy@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Evan Culver <eculver@hashicorp.com>
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
2022-04-21 22:34:40 +00:00
} )
}
2022-06-14 01:50:59 +00:00
2022-07-15 18:15:50 +00:00
func TestLeader_PeeringSync_FailsForTLSError ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
t . Run ( "server-name-validation" , func ( t * testing . T ) {
2022-08-01 14:33:18 +00:00
testLeader_PeeringSync_failsForTLSError ( t , func ( token * structs . PeeringToken ) {
token . ServerName = "wrong.name"
2022-09-29 21:49:58 +00:00
} , ` transport: authentication handshake failed: x509: certificate is valid for server.dc1.peering.11111111-2222-3333-4444-555555555555.consul, not wrong.name ` )
2022-07-15 18:15:50 +00:00
} )
t . Run ( "bad-ca-roots" , func ( t * testing . T ) {
wrongRoot , err := ioutil . ReadFile ( "../../test/client_certs/rootca.crt" )
require . NoError ( t , err )
2022-08-01 14:33:18 +00:00
testLeader_PeeringSync_failsForTLSError ( t , func ( token * structs . PeeringToken ) {
token . CA = [ ] string { string ( wrongRoot ) }
2022-07-15 18:15:50 +00:00
} , ` transport: authentication handshake failed: x509: certificate signed by unknown authority ` )
} )
}
2022-08-01 14:33:18 +00:00
func testLeader_PeeringSync_failsForTLSError ( t * testing . T , tokenMutateFn func ( token * structs . PeeringToken ) , expectErr string ) {
require . NotNil ( t , tokenMutateFn )
2022-07-15 18:15:50 +00:00
2022-09-29 21:49:58 +00:00
ca := connect . TestCA ( t , nil )
2022-07-15 18:15:50 +00:00
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "bob"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-07-15 18:15:50 +00:00
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , s1 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s1 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-07-15 18:15:50 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
peeringClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-s2" ,
}
resp , err := peeringClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
2022-08-01 14:33:18 +00:00
// Mutate token for test case
tokenMutateFn ( & token )
2022-07-15 18:15:50 +00:00
// S1 should not have a stream tracked for dc2 because s1 generated a token
// for baz, and therefore needs to wait to be dialed.
time . Sleep ( 1 * time . Second )
_ , found := s1 . peerStreamServer . StreamStatus ( token . PeerID )
require . False ( t , found )
2022-08-01 14:33:18 +00:00
// Bring up s2 and establish a peering with s1's token so that it attempts to dial.
2022-07-15 18:15:50 +00:00
_ , s2 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "betty"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
testrpc . WaitForLeader ( t , s2 . RPC , "dc2" )
2022-08-01 14:33:18 +00:00
// Create a peering at s2 by establishing a peering with s1's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , s2 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s2 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-01 14:33:18 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
2022-07-15 18:15:50 +00:00
2022-08-01 14:33:18 +00:00
s2Client := pbpeering . NewPeeringServiceClient ( conn )
2022-07-15 18:15:50 +00:00
2022-08-01 14:33:18 +00:00
// Re-encode the mutated token and use it for the peering establishment.
tokenJSON , err = json . Marshal ( & token )
require . NoError ( t , err )
tokenB64 := base64 . StdEncoding . EncodeToString ( tokenJSON )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-s1" ,
PeeringToken : tokenB64 ,
}
// Since the Establish RPC dials the remote cluster, it will yield the TLS error.
2022-10-10 19:45:30 +00:00
ctx , cancel = context . WithTimeout ( context . Background ( ) , 10 * time . Second )
2022-08-01 14:33:18 +00:00
t . Cleanup ( cancel )
_ , err = s2Client . Establish ( ctx , & establishReq )
require . Contains ( t , err . Error ( ) , expectErr )
2022-07-15 18:15:50 +00:00
}
2022-06-14 01:50:59 +00:00
func TestLeader_Peering_DeferredDeletion ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s1.dc1"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
2022-06-14 01:50:59 +00:00
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
var (
2022-06-21 18:04:08 +00:00
peerID = "cc56f0b8-3885-4e78-8d7b-614a0c45712d"
2022-06-14 01:50:59 +00:00
peerName = "my-peer-s2"
defaultMeta = acl . DefaultEnterpriseMeta ( )
lastIdx = uint64 ( 0 )
)
// Simulate a peering initiation event by writing a peering to the state store.
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s1 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest {
Peering : & pbpeering . Peering {
ID : peerID ,
Name : peerName ,
} ,
2022-06-14 01:50:59 +00:00
} ) )
// Insert imported data: nodes, services, checks, trust bundle
lastIdx = insertTestPeeringData ( t , s1 . fsm . State ( ) , peerName , lastIdx )
// Mark the peering for deletion to trigger the termination sequence.
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s1 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest {
Peering : & pbpeering . Peering {
ID : peerID ,
Name : peerName ,
2022-08-29 18:00:30 +00:00
State : pbpeering . PeeringState_DELETING ,
2022-08-01 14:33:18 +00:00
DeletedAt : structs . TimeToProto ( time . Now ( ) ) ,
} ,
2022-06-14 01:50:59 +00:00
} ) )
// Ensure imported data is gone:
retry . Run ( t , func ( r * retry . R ) {
_ , csn , err := s1 . fsm . State ( ) . ServiceDump ( nil , "" , false , defaultMeta , peerName )
require . NoError ( r , err )
require . Len ( r , csn , 0 )
_ , checks , err := s1 . fsm . State ( ) . ChecksInState ( nil , api . HealthAny , defaultMeta , peerName )
require . NoError ( r , err )
require . Len ( r , checks , 0 )
_ , nodes , err := s1 . fsm . State ( ) . NodeDump ( nil , defaultMeta , peerName )
require . NoError ( r , err )
require . Len ( r , nodes , 0 )
_ , tb , err := s1 . fsm . State ( ) . PeeringTrustBundleRead ( nil , state . Query { Value : peerName } )
require . NoError ( r , err )
require . Nil ( r , tb )
} )
// The leader routine should pick up the deletion and finish deleting the peering.
retry . Run ( t , func ( r * retry . R ) {
_ , peering , err := s1 . fsm . State ( ) . PeeringRead ( nil , state . Query {
Value : peerName ,
} )
require . NoError ( r , err )
require . Nil ( r , peering )
} )
}
2022-10-05 13:10:19 +00:00
func TestLeader_Peering_RemoteInfo ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
ca := connect . TestCA ( t , nil )
_ , acceptingServer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "accepting-server"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . PeeringEnabled = true
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
} )
testrpc . WaitForLeader ( t , acceptingServer . RPC , "dc1" )
// Create a peering by generating a token.
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptingServer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptingServer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-05 13:10:19 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
acceptingClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialing-server" ,
}
resp , err := acceptingClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
// Ensure that the token contains the correct partition and dc
require . Equal ( t , "dc1" , token . Remote . Datacenter )
require . Contains ( t , [ ] string { "" , "default" } , token . Remote . Partition )
// Bring up dialingServer and store acceptingServer's token so that it attempts to dial.
_ , dialingServer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialing-server"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
c . PeeringEnabled = true
} )
testrpc . WaitForLeader ( t , dialingServer . RPC , "dc2" )
// Create a peering at s2 by establishing a peering with s1's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialingServer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialingServer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-05 13:10:19 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialingClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-s1" ,
PeeringToken : resp . PeeringToken ,
}
_ , err = dialingClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
// Ensure that the dialer's remote info contains the acceptor's dc.
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
p , err := dialingClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-s1" } )
require . NoError ( t , err )
require . Equal ( t , "dc1" , p . Peering . Remote . Datacenter )
require . Contains ( t , [ ] string { "" , "default" } , p . Peering . Remote . Partition )
// Retry fetching the until the peering is active in the acceptor.
ctx , cancel = context . WithTimeout ( context . Background ( ) , 10 * time . Second )
t . Cleanup ( cancel )
p = nil
retry . Run ( t , func ( r * retry . R ) {
p , err = acceptingClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-dialing-server" } )
require . NoError ( r , err )
require . Equal ( r , pbpeering . PeeringState_ACTIVE , p . Peering . State )
} )
// Ensure that the acceptor's remote info contains the dialer's dc.
require . NotNil ( t , p )
require . Equal ( t , "dc2" , p . Peering . Remote . Datacenter )
require . Contains ( t , [ ] string { "" , "default" } , p . Peering . Remote . Partition )
}
2022-07-15 18:58:33 +00:00
// Test that the dialing peer attempts to reestablish connections when the accepting peer
// shuts down without sending a Terminated message.
//
// To test this, we start the two peer servers (accepting and dialing), set up peering, and then shut down
// the accepting peer. This terminates the connection without sending a Terminated message.
2022-08-02 22:20:07 +00:00
// We then restart the accepting peer and assert that the dialing peer reestablishes the connection.
2022-07-15 18:58:33 +00:00
func TestLeader_Peering_DialerReestablishesConnectionOnError ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
// Reserve a gRPC port so we can restart the accepting server with the same port.
2022-09-29 21:49:58 +00:00
acceptingServerPort := freeport . GetOne ( t )
2022-07-15 18:58:33 +00:00
2022-09-29 21:49:58 +00:00
ca := connect . TestCA ( t , nil )
2022-07-15 18:58:33 +00:00
_ , acceptingServer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptingServer.dc1"
c . Datacenter = "dc1"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = acceptingServerPort
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-07-15 18:58:33 +00:00
} )
testrpc . WaitForLeader ( t , acceptingServer . RPC , "dc1" )
// Create a peering by generating a token.
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptingServer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptingServer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-07-15 18:58:33 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
2022-08-01 14:33:18 +00:00
acceptingClient := pbpeering . NewPeeringServiceClient ( conn )
2022-07-15 18:58:33 +00:00
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialing-server" ,
}
2022-08-01 14:33:18 +00:00
resp , err := acceptingClient . GenerateToken ( ctx , & req )
2022-07-15 18:58:33 +00:00
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
var (
2022-08-01 14:33:18 +00:00
dialingServerPeerID = token . PeerID
2022-07-15 18:58:33 +00:00
)
// Bring up dialingServer and store acceptingServer's token so that it attempts to dial.
_ , dialingServer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialing-server.dc2"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
2022-08-01 14:33:18 +00:00
c . PeeringEnabled = true
2022-07-15 18:58:33 +00:00
} )
testrpc . WaitForLeader ( t , dialingServer . RPC , "dc2" )
2022-08-01 14:33:18 +00:00
// Create a peering at s2 by establishing a peering with s1's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialingServer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialingServer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-01 14:33:18 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialingClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-s1" ,
PeeringToken : resp . PeeringToken ,
2022-07-15 18:58:33 +00:00
}
2022-08-01 14:33:18 +00:00
_ , err = dialingClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
p , err := dialingClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-s1" } )
require . NoError ( t , err )
2022-07-15 18:58:33 +00:00
// Wait for the stream to be connected.
retry . Run ( t , func ( r * retry . R ) {
2022-08-01 14:33:18 +00:00
status , found := dialingServer . peerStreamServer . StreamStatus ( p . Peering . ID )
2022-07-15 18:58:33 +00:00
require . True ( r , found )
require . True ( r , status . Connected )
} )
// Wait until the dialing server has sent its roots over. This avoids a race condition where the accepting server
// shuts down, but the dialing server is still sending messages to the stream. When this happens, an error is raised
// which causes the stream to restart.
// In this test, we want to test what happens when the stream is closed when there are _no_ messages being sent.
retry . Run ( t , func ( r * retry . R ) {
_ , bundle , err := acceptingServer . fsm . State ( ) . PeeringTrustBundleRead ( nil , state . Query { Value : "my-peer-dialing-server" } )
require . NoError ( r , err )
require . NotNil ( r , bundle )
} )
2022-08-01 14:33:18 +00:00
// Capture the existing peering and associated secret so that they can be restored after the restart.
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
peering , err := acceptingClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-dialing-server" } )
require . NoError ( t , err )
require . NotNil ( t , peering )
secrets , err := acceptingServer . fsm . State ( ) . PeeringSecretsRead ( nil , token . PeerID )
require . NoError ( t , err )
require . NotNil ( t , secrets )
2022-07-15 18:58:33 +00:00
// Shutdown the accepting server.
require . NoError ( t , acceptingServer . Shutdown ( ) )
2022-08-01 14:33:18 +00:00
2022-07-15 18:58:33 +00:00
// Have to manually shut down the gRPC server otherwise it stays bound to the port.
acceptingServer . externalGRPCServer . Stop ( )
2022-08-02 22:20:07 +00:00
// Restart the server by re-using the previous acceptor's data directory and node id.
2022-07-15 18:58:33 +00:00
_ , acceptingServerRestart := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptingServer.dc1"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-08-02 22:20:07 +00:00
c . DataDir = acceptingServer . config . DataDir
c . NodeID = acceptingServer . config . NodeID
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = acceptingServerPort
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-07-15 18:58:33 +00:00
} )
2022-08-02 22:20:07 +00:00
testrpc . WaitForLeader ( t , acceptingServerRestart . RPC , "dc1" )
2022-07-15 18:58:33 +00:00
// The dialing peer should eventually reconnect.
retry . Run ( t , func ( r * retry . R ) {
connStreams := acceptingServerRestart . peerStreamServer . ConnectedStreams ( )
require . Contains ( r , connStreams , dialingServerPeerID )
} )
}
2022-06-14 01:50:59 +00:00
func insertTestPeeringData ( t * testing . T , store * state . Store , peer string , lastIdx uint64 ) uint64 {
lastIdx ++
require . NoError ( t , store . PeeringTrustBundleWrite ( lastIdx , & pbpeering . PeeringTrustBundle {
TrustDomain : "952e6bd1-f4d6-47f7-83ff-84b31babaa17" ,
PeerName : peer ,
RootPEMs : [ ] string { "certificate bundle" } ,
} ) )
lastIdx ++
require . NoError ( t , store . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
Node : "aaa" ,
Address : "10.0.0.1" ,
PeerName : peer ,
Service : & structs . NodeService {
Service : "a-service" ,
ID : "a-service-1" ,
Port : 8080 ,
PeerName : peer ,
} ,
Checks : structs . HealthChecks {
{
CheckID : "a-service-1-check" ,
ServiceName : "a-service" ,
ServiceID : "a-service-1" ,
Node : "aaa" ,
PeerName : peer ,
} ,
} ,
} ) )
lastIdx ++
require . NoError ( t , store . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
Node : "bbb" ,
Address : "10.0.0.2" ,
PeerName : peer ,
Service : & structs . NodeService {
Service : "b-service" ,
ID : "b-service-1" ,
Port : 8080 ,
PeerName : peer ,
} ,
Checks : structs . HealthChecks {
{
CheckID : "b-service-1-check" ,
ServiceName : "b-service" ,
ServiceID : "b-service-1" ,
Node : "bbb" ,
PeerName : peer ,
} ,
} ,
} ) )
lastIdx ++
require . NoError ( t , store . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
Node : "ccc" ,
Address : "10.0.0.3" ,
PeerName : peer ,
Service : & structs . NodeService {
Service : "c-service" ,
ID : "c-service-1" ,
Port : 8080 ,
PeerName : peer ,
} ,
Checks : structs . HealthChecks {
{
CheckID : "c-service-1-check" ,
ServiceName : "c-service" ,
ServiceID : "c-service-1" ,
Node : "ccc" ,
PeerName : peer ,
} ,
2022-07-15 17:20:43 +00:00
} ,
} ) )
return lastIdx
}
2022-07-22 19:05:08 +00:00
// TODO(peering): once we move away from keeping state in stream tracker only on leaders, move this test to consul/server_test maybe
2022-07-18 17:20:04 +00:00
func TestLeader_Peering_ImportedExportedServicesCount ( t * testing . T ) {
2022-07-15 17:20:43 +00:00
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
2022-09-29 21:49:58 +00:00
ca := connect . TestCA ( t , nil )
2022-07-15 17:20:43 +00:00
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s1.dc1"
c . Datacenter = "dc1"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-07-15 17:20:43 +00:00
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
2022-08-01 14:33:18 +00:00
ctx , cancel := context . WithTimeout ( context . Background ( ) , 30 * time . Second )
2022-07-15 17:20:43 +00:00
t . Cleanup ( cancel )
2022-08-01 14:33:18 +00:00
// Create a peering by generating a token
2022-07-15 17:20:43 +00:00
conn , err := grpc . DialContext ( ctx , s1 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s1 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-07-15 17:20:43 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
peeringClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-s2" ,
}
resp , err := peeringClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
_ , s2 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s2.dc2"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
2022-08-01 14:33:18 +00:00
c . PeeringEnabled = true
2022-07-15 17:20:43 +00:00
} )
testrpc . WaitForLeader ( t , s2 . RPC , "dc2" )
2022-08-01 14:33:18 +00:00
conn , err = grpc . DialContext ( ctx , s2 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s2 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-01 14:33:18 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
s2Client := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
// Create a peering at s2 by establishing a peering with s1's token
// Bring up s2 and store s1's token so that it attempts to dial.
PeerName : "my-peer-s1" ,
PeeringToken : resp . PeeringToken ,
2022-07-15 17:20:43 +00:00
}
2022-08-01 14:33:18 +00:00
_ , err = s2Client . Establish ( ctx , & establishReq )
require . NoError ( t , err )
2022-07-15 17:20:43 +00:00
2022-08-01 14:33:18 +00:00
var lastIdx uint64
2022-07-15 17:20:43 +00:00
2022-08-01 14:33:18 +00:00
// Add services to S1 to be synced to S2
2022-07-15 17:20:43 +00:00
lastIdx ++
require . NoError ( t , s1 . FSM ( ) . State ( ) . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
ID : types . NodeID ( generateUUID ( ) ) ,
Node : "aaa" ,
Address : "10.0.0.1" ,
Service : & structs . NodeService {
Service : "a-service" ,
ID : "a-service-1" ,
Port : 8080 ,
} ,
Checks : structs . HealthChecks {
2022-06-14 01:50:59 +00:00
{
2022-07-15 17:20:43 +00:00
CheckID : "a-service-1-check" ,
ServiceName : "a-service" ,
ServiceID : "a-service-1" ,
Node : "aaa" ,
2022-06-14 01:50:59 +00:00
} ,
} ,
} ) )
2022-07-15 17:20:43 +00:00
lastIdx ++
require . NoError ( t , s1 . FSM ( ) . State ( ) . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
ID : types . NodeID ( generateUUID ( ) ) ,
Node : "bbb" ,
Address : "10.0.0.2" ,
Service : & structs . NodeService {
Service : "b-service" ,
ID : "b-service-1" ,
Port : 8080 ,
} ,
Checks : structs . HealthChecks {
{
CheckID : "b-service-1-check" ,
ServiceName : "b-service" ,
ServiceID : "b-service-1" ,
Node : "bbb" ,
} ,
} ,
} ) )
lastIdx ++
require . NoError ( t , s1 . FSM ( ) . State ( ) . EnsureRegistration ( lastIdx , & structs . RegisterRequest {
ID : types . NodeID ( generateUUID ( ) ) ,
Node : "ccc" ,
Address : "10.0.0.3" ,
Service : & structs . NodeService {
Service : "c-service" ,
ID : "c-service-1" ,
Port : 8080 ,
} ,
Checks : structs . HealthChecks {
{
CheckID : "c-service-1-check" ,
ServiceName : "c-service" ,
ServiceID : "c-service-1" ,
Node : "ccc" ,
} ,
} ,
} ) )
2022-08-01 14:33:18 +00:00
// Finished adding services
2022-07-15 17:20:43 +00:00
type testCase struct {
2022-07-19 18:43:29 +00:00
name string
description string
exportedService structs . ExportedServicesConfigEntry
2022-09-29 19:37:19 +00:00
expectedImportedServsCount int
expectedExportedServsCount int
2022-07-15 17:20:43 +00:00
}
testCases := [ ] testCase {
{
name : "wildcard" ,
description : "for a wildcard exported services, we want to see all services synced" ,
exportedService : structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService {
{
Name : structs . WildcardSpecifier ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
} ,
} ,
2022-10-07 21:45:49 +00:00
expectedImportedServsCount : 3 , // 3 services from above
expectedExportedServsCount : 3 , // 3 services from above
2022-07-15 17:20:43 +00:00
} ,
{
name : "no sync" ,
description : "update the config entry to allow no service sync" ,
exportedService : structs . ExportedServicesConfigEntry {
Name : "default" ,
} ,
2022-10-07 21:45:49 +00:00
expectedImportedServsCount : 0 , // we want to see this decremented from 3 --> 0
expectedExportedServsCount : 0 , // we want to see this decremented from 3 --> 0
2022-07-15 17:20:43 +00:00
} ,
{
name : "just a, b services" ,
description : "export just two services" ,
exportedService : structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService {
{
Name : "a-service" ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
{
Name : "b-service" ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
} ,
} ,
2022-07-19 18:43:29 +00:00
expectedImportedServsCount : 2 ,
expectedExportedServsCount : 2 ,
2022-07-15 17:20:43 +00:00
} ,
{
name : "unexport b service" ,
description : "by unexporting b we want to see the count decrement eventually" ,
exportedService : structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService {
{
Name : "a-service" ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
} ,
} ,
2022-07-19 18:43:29 +00:00
expectedImportedServsCount : 1 ,
expectedExportedServsCount : 1 ,
2022-07-15 17:20:43 +00:00
} ,
{
name : "export c service" ,
description : "now export the c service and expect the count to increment" ,
exportedService : structs . ExportedServicesConfigEntry {
Name : "default" ,
Services : [ ] structs . ExportedService {
{
Name : "a-service" ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
{
Name : "c-service" ,
Consumers : [ ] structs . ServiceConsumer {
{
2022-10-04 18:46:15 +00:00
Peer : "my-peer-s2" ,
2022-07-15 17:20:43 +00:00
} ,
} ,
} ,
} ,
} ,
2022-07-19 18:43:29 +00:00
expectedImportedServsCount : 2 ,
expectedExportedServsCount : 2 ,
2022-07-15 17:20:43 +00:00
} ,
}
conn2 , err := grpc . DialContext ( ctx , s2 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s2 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-07-15 17:20:43 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn2 . Close ( )
peeringClient2 := pbpeering . NewPeeringServiceClient ( conn2 )
for _ , tc := range testCases {
t . Run ( tc . name , func ( t * testing . T ) {
lastIdx ++
require . NoError ( t , s1 . fsm . State ( ) . EnsureConfigEntry ( lastIdx , & tc . exportedService ) )
2022-07-18 17:20:04 +00:00
// Check that imported services count on S2 are what we expect
2022-07-15 17:20:43 +00:00
retry . Run ( t , func ( r * retry . R ) {
2022-07-18 17:20:04 +00:00
// on Read
2022-08-01 14:33:18 +00:00
resp , err := peeringClient2 . PeeringRead ( context . Background ( ) , & pbpeering . PeeringReadRequest { Name : "my-peer-s1" } )
2022-07-15 17:20:43 +00:00
require . NoError ( r , err )
2022-07-18 17:20:04 +00:00
require . NotNil ( r , resp . Peering )
2022-09-23 21:51:41 +00:00
require . Equal ( r , tc . expectedImportedServsCount , len ( resp . Peering . StreamStatus . ImportedServices ) )
2022-07-18 17:20:04 +00:00
// on List
2022-08-01 14:33:18 +00:00
resp2 , err2 := peeringClient2 . PeeringList ( context . Background ( ) , & pbpeering . PeeringListRequest { } )
2022-07-18 17:20:04 +00:00
require . NoError ( r , err2 )
require . NotEmpty ( r , resp2 . Peerings )
2022-09-23 21:51:41 +00:00
require . Equal ( r , tc . expectedExportedServsCount , len ( resp2 . Peerings [ 0 ] . StreamStatus . ImportedServices ) )
2022-07-18 17:20:04 +00:00
} )
// Check that exported services count on S1 are what we expect
retry . Run ( t , func ( r * retry . R ) {
// on Read
2022-08-01 14:33:18 +00:00
resp , err := peeringClient . PeeringRead ( context . Background ( ) , & pbpeering . PeeringReadRequest { Name : "my-peer-s2" } )
2022-07-18 17:20:04 +00:00
require . NoError ( r , err )
require . NotNil ( r , resp . Peering )
2022-09-23 21:51:41 +00:00
require . Equal ( r , tc . expectedImportedServsCount , len ( resp . Peering . StreamStatus . ExportedServices ) )
2022-07-18 17:20:04 +00:00
// on List
2022-08-01 14:33:18 +00:00
resp2 , err2 := peeringClient . PeeringList ( context . Background ( ) , & pbpeering . PeeringListRequest { } )
2022-07-18 17:20:04 +00:00
require . NoError ( r , err2 )
2022-07-15 17:20:43 +00:00
require . NotEmpty ( r , resp2 . Peerings )
2022-09-23 21:51:41 +00:00
require . Equal ( r , tc . expectedExportedServsCount , len ( resp2 . Peerings [ 0 ] . StreamStatus . ExportedServices ) )
2022-07-15 17:20:43 +00:00
} )
} )
}
2022-06-14 01:50:59 +00:00
}
2022-07-22 19:05:08 +00:00
// TODO(peering): once we move away from keeping state in stream tracker only on leaders, move this test to consul/server_test maybe
func TestLeader_PeeringMetrics_emitPeeringMetrics ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
var (
s2PeerID1 = generateUUID ( )
s2PeerID2 = generateUUID ( )
2022-08-25 23:32:59 +00:00
s2PeerID3 = generateUUID ( )
2022-07-22 19:05:08 +00:00
testContextTimeout = 60 * time . Second
lastIdx = uint64 ( 0 )
)
2022-09-29 21:49:58 +00:00
ca := connect . TestCA ( t , nil )
2022-07-22 19:05:08 +00:00
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s1.dc1"
c . Datacenter = "dc1"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-07-22 19:05:08 +00:00
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , testContextTimeout )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , s1 . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( s1 . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-07-22 19:05:08 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
peeringClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-s2" ,
}
resp , err := peeringClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
tokenJSON , err := base64 . StdEncoding . DecodeString ( resp . PeeringToken )
require . NoError ( t , err )
var token structs . PeeringToken
require . NoError ( t , json . Unmarshal ( tokenJSON , & token ) )
// Bring up s2 and store s1's token so that it attempts to dial.
_ , s2 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s2.dc2"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
testrpc . WaitForLeader ( t , s2 . RPC , "dc2" )
// Simulate exporting services in the tracker
{
// Simulate a peering initiation event by writing a peering with data from a peering token.
// Eventually the leader in dc2 should dial and connect to the leader in dc1.
p := & pbpeering . Peering {
ID : s2PeerID1 ,
Name : "my-peer-s1" ,
PeerID : token . PeerID ,
PeerCAPems : token . CA ,
PeerServerName : token . ServerName ,
PeerServerAddresses : token . ServerAddresses ,
}
require . True ( t , p . ShouldDial ( ) )
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s2 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest { Peering : p } ) )
2022-07-22 19:05:08 +00:00
p2 := & pbpeering . Peering {
ID : s2PeerID2 ,
Name : "my-peer-s3" ,
PeerID : token . PeerID , // doesn't much matter what these values are
PeerCAPems : token . CA ,
PeerServerName : token . ServerName ,
PeerServerAddresses : token . ServerAddresses ,
}
require . True ( t , p2 . ShouldDial ( ) )
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s2 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest { Peering : p2 } ) )
2022-07-22 19:05:08 +00:00
// connect the stream
mst1 , err := s2 . peeringServer . Tracker . Connected ( s2PeerID1 )
require . NoError ( t , err )
// mimic tracking exported services
2022-09-29 19:37:19 +00:00
mst1 . SetExportedServices ( [ ] structs . ServiceName {
{ Name : "a-service" } ,
{ Name : "b-service" } ,
{ Name : "c-service" } ,
} )
2022-07-22 19:05:08 +00:00
// connect the stream
mst2 , err := s2 . peeringServer . Tracker . Connected ( s2PeerID2 )
require . NoError ( t , err )
// mimic tracking exported services
2022-09-29 19:37:19 +00:00
mst2 . SetExportedServices ( [ ] structs . ServiceName {
{ Name : "d-service" } ,
{ Name : "e-service" } ,
} )
2022-08-25 23:32:59 +00:00
// pretend that the hearbeat happened
mst2 . TrackRecvHeartbeat ( )
}
// Simulate a peering that never connects
{
p3 := & pbpeering . Peering {
ID : s2PeerID3 ,
Name : "my-peer-s4" ,
PeerID : token . PeerID , // doesn't much matter what these values are
PeerCAPems : token . CA ,
PeerServerName : token . ServerName ,
PeerServerAddresses : token . ServerAddresses ,
}
require . True ( t , p3 . ShouldDial ( ) )
lastIdx ++
require . NoError ( t , s2 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest { Peering : p3 } ) )
2022-07-22 19:05:08 +00:00
}
// set up a metrics sink
sink := metrics . NewInmemSink ( testContextTimeout , testContextTimeout )
cfg := metrics . DefaultConfig ( "us-west" )
cfg . EnableHostname = false
met , err := metrics . New ( cfg , sink )
require . NoError ( t , err )
2022-10-24 16:48:02 +00:00
errM := s2 . emitPeeringMetricsOnce ( met )
2022-07-22 19:05:08 +00:00
require . NoError ( t , errM )
retry . Run ( t , func ( r * retry . R ) {
intervals := sink . Data ( )
require . Len ( r , intervals , 1 )
intv := intervals [ 0 ]
// the keys for a Gauge value look like: {serviceName}.{prefix}.{key_name};{label=value};...
keyMetric1 := fmt . Sprintf ( "us-west.consul.peering.exported_services;peer_name=my-peer-s1;peer_id=%s" , s2PeerID1 )
metric1 , ok := intv . Gauges [ keyMetric1 ]
require . True ( r , ok , fmt . Sprintf ( "did not find the key %q" , keyMetric1 ) )
require . Equal ( r , float32 ( 3 ) , metric1 . Value ) // for a, b, c services
keyMetric2 := fmt . Sprintf ( "us-west.consul.peering.exported_services;peer_name=my-peer-s3;peer_id=%s" , s2PeerID2 )
metric2 , ok := intv . Gauges [ keyMetric2 ]
require . True ( r , ok , fmt . Sprintf ( "did not find the key %q" , keyMetric2 ) )
require . Equal ( r , float32 ( 2 ) , metric2 . Value ) // for d, e services
2022-08-25 23:32:59 +00:00
keyHealthyMetric2 := fmt . Sprintf ( "us-west.consul.peering.healthy;peer_name=my-peer-s3;peer_id=%s" , s2PeerID2 )
healthyMetric2 , ok := intv . Gauges [ keyHealthyMetric2 ]
require . True ( r , ok , fmt . Sprintf ( "did not find the key %q" , keyHealthyMetric2 ) )
require . Equal ( r , float32 ( 1 ) , healthyMetric2 . Value )
keyHealthyMetric3 := fmt . Sprintf ( "us-west.consul.peering.healthy;peer_name=my-peer-s4;peer_id=%s" , s2PeerID3 )
healthyMetric3 , ok := intv . Gauges [ keyHealthyMetric3 ]
require . True ( r , ok , fmt . Sprintf ( "did not find the key %q" , keyHealthyMetric3 ) )
2022-10-28 14:51:12 +00:00
require . Equal ( r , float32 ( 0 ) , healthyMetric3 . Value )
2022-07-22 19:05:08 +00:00
} )
}
2022-07-22 22:20:21 +00:00
// Test that the leader doesn't start its peering deletion routing when
// peering is disabled.
func TestLeader_Peering_NoDeletionWhenPeeringDisabled ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s1.dc1"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . PeeringEnabled = false
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
var (
peerID = "cc56f0b8-3885-4e78-8d7b-614a0c45712d"
peerName = "my-peer-s2"
lastIdx = uint64 ( 0 )
)
// Simulate a peering initiation event by writing a peering to the state store.
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s1 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest {
Peering : & pbpeering . Peering {
ID : peerID ,
Name : peerName ,
} ,
2022-07-22 22:20:21 +00:00
} ) )
// Mark the peering for deletion to trigger the termination sequence.
lastIdx ++
2022-08-01 14:33:18 +00:00
require . NoError ( t , s1 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest {
Peering : & pbpeering . Peering {
ID : peerID ,
Name : peerName ,
2022-08-29 18:00:30 +00:00
State : pbpeering . PeeringState_DELETING ,
2022-08-01 14:33:18 +00:00
DeletedAt : structs . TimeToProto ( time . Now ( ) ) ,
} ,
2022-07-22 22:20:21 +00:00
} ) )
// The leader routine shouldn't be running so the peering should never get deleted.
require . Never ( t , func ( ) bool {
_ , peering , err := s1 . fsm . State ( ) . PeeringRead ( nil , state . Query {
Value : peerName ,
} )
if err != nil {
t . Logf ( "unexpected err: %s" , err )
return true
}
if peering == nil {
return true
}
return false
} , 7 * time . Second , 1 * time . Second , "peering should not have been deleted" )
}
// Test that the leader doesn't start its peering establishment routine
// when peering is disabled.
func TestLeader_Peering_NoEstablishmentWhenPeeringDisabled ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
_ , s1 := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "s1.dc1"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . PeeringEnabled = false
} )
testrpc . WaitForLeader ( t , s1 . RPC , "dc1" )
var (
peerID = "cc56f0b8-3885-4e78-8d7b-614a0c45712d"
peerName = "my-peer-s2"
lastIdx = uint64 ( 0 )
)
// Simulate a peering initiation event by writing a peering to the state store.
2022-08-01 14:33:18 +00:00
require . NoError ( t , s1 . fsm . State ( ) . PeeringWrite ( lastIdx , & pbpeering . PeeringWriteRequest {
Peering : & pbpeering . Peering {
ID : peerID ,
Name : peerName ,
PeerServerAddresses : [ ] string { "1.2.3.4" } ,
} ,
2022-07-22 22:20:21 +00:00
} ) )
require . Never ( t , func ( ) bool {
2022-08-29 20:32:26 +00:00
_ , found := s1 . peerStreamServer . StreamStatus ( peerID )
2022-07-22 22:20:21 +00:00
return found
} , 7 * time . Second , 1 * time . Second , "peering should not have been established" )
}
2022-07-29 20:04:32 +00:00
// Test peeringRetryTimeout when the errors are FailedPrecondition errors because these
// errors have a different backoff.
func TestLeader_Peering_peeringRetryTimeout_failedPreconditionErrors ( t * testing . T ) {
cases := [ ] struct {
failedAttempts uint
expDuration time . Duration
} {
// Constant time backoff.
{ 0 , 8 * time . Millisecond } ,
{ 1 , 8 * time . Millisecond } ,
{ 2 , 8 * time . Millisecond } ,
{ 3 , 8 * time . Millisecond } ,
{ 4 , 8 * time . Millisecond } ,
{ 5 , 8 * time . Millisecond } ,
// Then exponential.
{ 6 , 16 * time . Millisecond } ,
{ 7 , 32 * time . Millisecond } ,
{ 13 , 2048 * time . Millisecond } ,
{ 14 , 4096 * time . Millisecond } ,
{ 15 , 8192 * time . Millisecond } ,
// Max.
{ 16 , 8192 * time . Millisecond } ,
{ 17 , 8192 * time . Millisecond } ,
}
for _ , c := range cases {
t . Run ( fmt . Sprintf ( "failed attempts %d" , c . failedAttempts ) , func ( t * testing . T ) {
err := grpcstatus . Error ( codes . FailedPrecondition , "msg" )
require . Equal ( t , c . expDuration , peeringRetryTimeout ( c . failedAttempts , err ) )
} )
}
}
// Test peeringRetryTimeout with non-FailedPrecondition errors because these errors have a different
// backoff from FailedPrecondition errors.
func TestLeader_Peering_peeringRetryTimeout_regularErrors ( t * testing . T ) {
cases := [ ] struct {
failedAttempts uint
expDuration time . Duration
} {
// Exponential.
{ 0 , 1 * time . Second } ,
{ 1 , 2 * time . Second } ,
{ 2 , 4 * time . Second } ,
{ 3 , 8 * time . Second } ,
2022-10-31 18:50:58 +00:00
{ 4 , 16 * time . Second } ,
{ 5 , 32 * time . Second } ,
2022-07-29 20:04:32 +00:00
// Until max.
2022-10-31 18:50:58 +00:00
{ 6 , 64 * time . Second } ,
{ 10 , 64 * time . Second } ,
{ 20 , 64 * time . Second } ,
2022-07-29 20:04:32 +00:00
}
for _ , c := range cases {
t . Run ( fmt . Sprintf ( "failed attempts %d" , c . failedAttempts ) , func ( t * testing . T ) {
err := errors . New ( "error" )
require . Equal ( t , c . expDuration , peeringRetryTimeout ( c . failedAttempts , err ) )
} )
}
}
// This test exercises all the functionality of retryLoopBackoffPeering.
func TestLeader_Peering_retryLoopBackoffPeering ( t * testing . T ) {
ctx := context . Background ( )
logger := hclog . NewNullLogger ( )
// loopCount counts how many times we executed loopFn.
loopCount := 0
// loopTimes holds the times at which each loopFn was executed. We use this to test the timeout functionality.
var loopTimes [ ] time . Time
// loopFn will run 5 times and do something different on each loop.
loopFn := func ( ) error {
loopCount ++
loopTimes = append ( loopTimes , time . Now ( ) )
if loopCount == 1 {
return fmt . Errorf ( "error 1" )
}
if loopCount == 2 {
return fmt . Errorf ( "error 2" )
}
if loopCount == 3 {
// On the 3rd loop, return success which ends the loop.
return nil
}
return nil
}
// allErrors collects all the errors passed into errFn.
var allErrors [ ] error
errFn := func ( e error ) {
allErrors = append ( allErrors , e )
}
retryTimeFn := func ( _ uint , _ error ) time . Duration {
return 1 * time . Millisecond
}
retryLoopBackoffPeering ( ctx , logger , loopFn , errFn , retryTimeFn )
// Ensure loopFn ran the number of expected times.
require . Equal ( t , 3 , loopCount )
// Ensure errFn ran as expected.
require . Equal ( t , [ ] error {
fmt . Errorf ( "error 1" ) ,
fmt . Errorf ( "error 2" ) ,
} , allErrors )
// Test retryTimeFn by comparing the difference between when each loopFn ran.
for i := range loopTimes {
if i == 0 {
// Can't compare first time.
continue
}
require . True ( t , loopTimes [ i ] . Sub ( loopTimes [ i - 1 ] ) >= 1 * time . Millisecond ,
"time between indices %d and %d was > 1ms" , i , i - 1 )
}
}
// Test that if the context is cancelled the loop exits.
func TestLeader_Peering_retryLoopBackoffPeering_cancelContext ( t * testing . T ) {
ctx , cancel := context . WithCancel ( context . Background ( ) )
logger := hclog . NewNullLogger ( )
// loopCount counts how many times we executed loopFn.
loopCount := 0
loopFn := func ( ) error {
loopCount ++
return fmt . Errorf ( "error %d" , loopCount )
}
// allErrors collects all the errors passed into errFn.
var allErrors [ ] error
errFn := func ( e error ) {
allErrors = append ( allErrors , e )
}
// Set the retry time to a huge number.
retryTimeFn := func ( _ uint , _ error ) time . Duration {
return 1 * time . Millisecond
}
// Cancel the context before the loop runs. It should run once and then exit.
cancel ( )
retryLoopBackoffPeering ( ctx , logger , loopFn , errFn , retryTimeFn )
// Ensure loopFn ran the number of expected times.
require . Equal ( t , 1 , loopCount )
// Ensure errFn ran as expected.
require . Equal ( t , [ ] error {
fmt . Errorf ( "error 1" ) ,
} , allErrors )
}
2022-08-10 15:53:25 +00:00
2022-10-13 20:46:51 +00:00
func Test_isErrCode ( t * testing . T ) {
tests := [ ] struct {
name string
expectedCode codes . Code
} {
{
name : "cannot establish a peering stream on a follower node" ,
expectedCode : codes . FailedPrecondition ,
} ,
{
name : "received message larger than max " ,
expectedCode : codes . ResourceExhausted ,
} ,
{
name : "deadline exceeded" ,
expectedCode : codes . DeadlineExceeded ,
} ,
}
for _ , tc := range tests {
t . Run ( tc . name , func ( t * testing . T ) {
st := grpcstatus . New ( tc . expectedCode , tc . name )
err := st . Err ( )
assert . True ( t , isErrCode ( err , tc . expectedCode ) )
// test that wrapped errors are checked correctly
werr := fmt . Errorf ( "wrapped: %w" , err )
assert . True ( t , isErrCode ( werr , tc . expectedCode ) )
} )
}
2022-08-10 15:53:25 +00:00
}
2022-08-26 14:27:13 +00:00
func Test_Leader_PeeringSync_ServerAddressUpdates ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
// We want 1s retries for this test
orig := maxRetryBackoff
maxRetryBackoff = 1
t . Cleanup ( func ( ) { maxRetryBackoff = orig } )
2022-09-29 21:49:58 +00:00
ca := connect . TestCA ( t , nil )
2022-08-26 14:27:13 +00:00
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
2022-09-29 21:49:58 +00:00
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
2022-08-26 14:27:13 +00:00
} )
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-26 14:27:13 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
acceptorClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialer" ,
}
resp , err := acceptorClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
// Create a peering at dialer by establishing a peering with acceptor's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-08-26 14:27:13 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-acceptor" ,
PeeringToken : resp . PeeringToken ,
}
_ , err = dialerClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
require . NoError ( t , err )
retry . Run ( t , func ( r * retry . R ) {
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
testutil . RunStep ( t , "calling establish with active connection does not overwrite server addresses" , func ( t * testing . T ) {
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
// generate a new token from the acceptor
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialer" ,
}
resp , err := acceptorClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
token , err := acceptor . peeringBackend . DecodeToken ( [ ] byte ( resp . PeeringToken ) )
require . NoError ( t , err )
// we will update the token with bad addresses to assert it doesn't clobber existing ones
token . ServerAddresses = [ ] string { "1.2.3.4:1234" }
badToken , err := acceptor . peeringBackend . EncodeToken ( token )
require . NoError ( t , err )
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
// Try establishing.
// This call will only succeed if the bad address was not used in the calls to exchange the peering secret.
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-acceptor" ,
PeeringToken : string ( badToken ) ,
}
_ , err = dialerClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
require . NoError ( t , err )
require . NotContains ( t , p . Peering . PeerServerAddresses , "1.2.3.4:1234" )
} )
testutil . RunStep ( t , "updated server addresses are picked up by the leader" , func ( t * testing . T ) {
// force close the acceptor's gRPC server so the dialier retries with a new address.
acceptor . externalGRPCServer . Stop ( )
clone := proto . Clone ( p . Peering )
updated := clone . ( * pbpeering . Peering )
// start with a bad address so we can assert for a specific error
updated . PeerServerAddresses = append ( [ ] string {
"bad" ,
} , p . Peering . PeerServerAddresses ... )
// this write will wake up the watch on the leader to refetch server addresses
require . NoError ( t , dialer . fsm . State ( ) . PeeringWrite ( 2000 , & pbpeering . PeeringWriteRequest { Peering : updated } ) )
retry . Run ( t , func ( r * retry . R ) {
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
// We assert for this error to be set which would indicate that we iterated
// through a bad address.
require . Contains ( r , status . LastSendErrorMessage , "transport: Error while dialing dial tcp: address bad: missing port in address" )
require . False ( r , status . Connected )
} )
} )
}
2022-10-10 19:54:36 +00:00
func Test_Leader_PeeringSync_PeerThroughMeshGateways_ServerFallBack ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
ca := connect . TestCA ( t , nil )
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
} )
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-10 19:54:36 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
acceptorClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialer" ,
}
resp , err := acceptorClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
// Configure peering to go through mesh gateways
store := dialer . fsm . State ( )
require . NoError ( t , store . EnsureConfigEntry ( 1 , & structs . MeshConfigEntry {
Peering : & structs . PeeringMeshConfig {
PeerThroughMeshGateways : true ,
} ,
} ) )
// Register a gateway that isn't actually listening.
require . NoError ( t , store . EnsureRegistration ( 2 , & structs . RegisterRequest {
ID : types . NodeID ( testUUID ( ) ) ,
Node : "gateway-node-1" ,
Address : "127.0.0.1" ,
Service : & structs . NodeService {
Kind : structs . ServiceKindMeshGateway ,
ID : "mesh-gateway-1" ,
Service : "mesh-gateway" ,
Port : freeport . GetOne ( t ) ,
} ,
} ) )
// Create a peering at dialer by establishing a peering with acceptor's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-10 19:54:36 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-acceptor" ,
PeeringToken : resp . PeeringToken ,
}
_ , err = dialerClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
require . NoError ( t , err )
// The peering should eventually connect because we fall back to the token's server addresses.
retry . Run ( t , func ( r * retry . R ) {
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
}
func Test_Leader_PeeringSync_PeerThroughMeshGateways_Success ( t * testing . T ) {
if testing . Short ( ) {
t . Skip ( "too slow for testing.Short" )
}
ca := connect . TestCA ( t , nil )
_ , acceptor := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "acceptor"
c . Datacenter = "dc1"
c . TLSConfig . Domain = "consul"
c . GRPCTLSPort = freeport . GetOne ( t )
c . CAConfig = & structs . CAConfiguration {
ClusterID : connect . TestClusterID ,
Provider : structs . ConsulCAProvider ,
Config : map [ string ] interface { } {
"PrivateKey" : ca . SigningKey ,
"RootCert" : ca . RootCert ,
} ,
}
} )
testrpc . WaitForLeader ( t , acceptor . RPC , "dc1" )
// Create a peering by generating a token
ctx , cancel := context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err := grpc . DialContext ( ctx , acceptor . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( acceptor . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-10 19:54:36 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
acceptorClient := pbpeering . NewPeeringServiceClient ( conn )
req := pbpeering . GenerateTokenRequest {
PeerName : "my-peer-dialer" ,
}
resp , err := acceptorClient . GenerateToken ( ctx , & req )
require . NoError ( t , err )
// Bring up dialer and establish a peering with acceptor's token so that it attempts to dial.
_ , dialer := testServerWithConfig ( t , func ( c * Config ) {
c . NodeName = "dialer"
c . Datacenter = "dc2"
c . PrimaryDatacenter = "dc2"
} )
testrpc . WaitForLeader ( t , dialer . RPC , "dc2" )
// Configure peering to go through mesh gateways
store := dialer . fsm . State ( )
require . NoError ( t , store . EnsureConfigEntry ( 1 , & structs . MeshConfigEntry {
Peering : & structs . PeeringMeshConfig {
PeerThroughMeshGateways : true ,
} ,
} ) )
// Register a mesh gateway and a tcpproxy listening at its address.
gatewayPort := freeport . GetOne ( t )
gatewayAddr := fmt . Sprintf ( "127.0.0.1:%d" , gatewayPort )
require . NoError ( t , store . EnsureRegistration ( 3 , & structs . RegisterRequest {
ID : types . NodeID ( testUUID ( ) ) ,
Node : "gateway-node-2" ,
Address : "127.0.0.1" ,
Service : & structs . NodeService {
Kind : structs . ServiceKindMeshGateway ,
ID : "mesh-gateway-2" ,
Service : "mesh-gateway" ,
Port : gatewayPort ,
} ,
} ) )
// Configure a TCP proxy with an SNI route corresponding to the acceptor cluster.
var proxy tcpproxy . Proxy
target := & connWrapper {
proxy : tcpproxy . DialProxy {
Addr : fmt . Sprintf ( "127.0.0.1:%d" , acceptor . config . GRPCTLSPort ) ,
} ,
}
proxy . AddSNIRoute ( gatewayAddr , "server.dc1.peering.11111111-2222-3333-4444-555555555555.consul" , target )
proxy . AddStopACMESearch ( gatewayAddr )
require . NoError ( t , proxy . Start ( ) )
t . Cleanup ( func ( ) {
proxy . Close ( )
proxy . Wait ( )
} )
// Create a peering at dialer by establishing a peering with acceptor's token
ctx , cancel = context . WithTimeout ( context . Background ( ) , 3 * time . Second )
t . Cleanup ( cancel )
conn , err = grpc . DialContext ( ctx , dialer . config . RPCAddr . String ( ) ,
grpc . WithContextDialer ( newServerDialer ( dialer . config . RPCAddr . String ( ) ) ) ,
2022-11-07 16:34:30 +00:00
//nolint:staticcheck
2022-10-10 19:54:36 +00:00
grpc . WithInsecure ( ) ,
grpc . WithBlock ( ) )
require . NoError ( t , err )
defer conn . Close ( )
dialerClient := pbpeering . NewPeeringServiceClient ( conn )
establishReq := pbpeering . EstablishRequest {
PeerName : "my-peer-acceptor" ,
PeeringToken : resp . PeeringToken ,
}
_ , err = dialerClient . Establish ( ctx , & establishReq )
require . NoError ( t , err )
p , err := dialerClient . PeeringRead ( ctx , & pbpeering . PeeringReadRequest { Name : "my-peer-acceptor" } )
require . NoError ( t , err )
// The peering should eventually connect through the gateway address.
retry . Run ( t , func ( r * retry . R ) {
status , found := dialer . peerStreamServer . StreamStatus ( p . Peering . ID )
require . True ( r , found )
require . True ( r , status . Connected )
} )
// target.called is true when the tcproxy's conn handler was invoked.
// This lets us know that the "Establish" success flowed through the proxy masquerading as a gateway.
require . True ( t , target . called )
}
// connWrapper is a wrapper around tcpproxy.DialProxy to enable tracking whether the proxy handled a connection.
type connWrapper struct {
proxy tcpproxy . DialProxy
called bool
}
func ( w * connWrapper ) HandleConn ( src net . Conn ) {
w . called = true
w . proxy . HandleConn ( src )
}