2022-11-01 19:03:23 +00:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
2023-01-20 22:02:44 +00:00
|
|
|
"io"
|
2023-01-11 21:34:27 +00:00
|
|
|
"path/filepath"
|
|
|
|
"strconv"
|
2022-11-01 19:03:23 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/testcontainers/testcontainers-go"
|
|
|
|
"github.com/testcontainers/testcontainers-go/wait"
|
|
|
|
|
2023-01-04 20:28:15 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
2023-01-11 21:34:27 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/test/integration/consul-container/libs/cluster"
|
|
|
|
libcluster "github.com/hashicorp/consul/test/integration/consul-container/libs/cluster"
|
2022-11-01 19:03:23 +00:00
|
|
|
"github.com/hashicorp/consul/test/integration/consul-container/libs/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
// gatewayContainer
|
|
|
|
type gatewayContainer struct {
|
2023-01-04 20:28:15 +00:00
|
|
|
ctx context.Context
|
|
|
|
container testcontainers.Container
|
|
|
|
ip string
|
|
|
|
port int
|
2023-01-11 21:34:27 +00:00
|
|
|
adminPort int
|
2023-01-04 20:28:15 +00:00
|
|
|
serviceName string
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
2023-01-11 21:34:27 +00:00
|
|
|
var _ Service = (*gatewayContainer)(nil)
|
|
|
|
|
2023-01-20 22:02:44 +00:00
|
|
|
func (g gatewayContainer) Export(partition, peer string, client *api.Client) error {
|
|
|
|
return fmt.Errorf("gatewayContainer export unimplemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g gatewayContainer) GetAddr() (string, int) {
|
|
|
|
return g.ip, g.port
|
|
|
|
}
|
|
|
|
|
|
|
|
func (g gatewayContainer) GetLogs() (string, error) {
|
|
|
|
rc, err := g.container.Logs(context.Background())
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("could not get logs for gateway service %s: %w", g.GetServiceName(), err)
|
|
|
|
}
|
|
|
|
defer rc.Close()
|
|
|
|
|
|
|
|
out, err := io.ReadAll(rc)
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("could not read from logs for gateway service %s: %w", g.GetServiceName(), err)
|
|
|
|
}
|
|
|
|
return string(out), nil
|
|
|
|
}
|
|
|
|
|
2022-11-01 19:03:23 +00:00
|
|
|
func (g gatewayContainer) GetName() string {
|
|
|
|
name, err := g.container.Name(g.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return name
|
|
|
|
}
|
|
|
|
|
2023-01-20 22:02:44 +00:00
|
|
|
func (g gatewayContainer) GetServiceName() string {
|
|
|
|
return g.serviceName
|
2023-01-11 21:34:27 +00:00
|
|
|
}
|
|
|
|
|
2022-11-01 19:03:23 +00:00
|
|
|
func (g gatewayContainer) Start() error {
|
|
|
|
if g.container == nil {
|
|
|
|
return fmt.Errorf("container has not been initialized")
|
|
|
|
}
|
|
|
|
return g.container.Start(context.Background())
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c gatewayContainer) Terminate() error {
|
2023-01-11 21:34:27 +00:00
|
|
|
return cluster.TerminateContainer(c.ctx, c.container, true)
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
2023-01-20 22:02:44 +00:00
|
|
|
func (g gatewayContainer) GetAdminAddr() (string, int) {
|
|
|
|
return "localhost", g.adminPort
|
2023-01-04 20:28:15 +00:00
|
|
|
}
|
|
|
|
|
2023-01-27 16:25:48 +00:00
|
|
|
func (g gatewayContainer) Restart() error {
|
2023-02-01 15:48:54 +00:00
|
|
|
_, err := g.container.State(g.ctx)
|
2023-01-27 16:25:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error get gateway state %s", err)
|
|
|
|
}
|
|
|
|
|
2023-02-01 15:48:54 +00:00
|
|
|
err = g.container.Stop(g.ctx, nil)
|
2023-01-27 16:25:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error stop gateway %s", err)
|
|
|
|
}
|
2023-02-01 15:48:54 +00:00
|
|
|
err = g.container.Start(g.ctx)
|
2023-01-27 16:25:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error start gateway %s", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-02-01 15:48:54 +00:00
|
|
|
func (g gatewayContainer) GetStatus() (string, error) {
|
|
|
|
state, err := g.container.State(g.ctx)
|
|
|
|
return state.Status, err
|
|
|
|
}
|
|
|
|
|
2023-01-11 21:34:27 +00:00
|
|
|
func NewGatewayService(ctx context.Context, name string, kind string, node libcluster.Agent) (Service, error) {
|
|
|
|
nodeConfig := node.GetConfig()
|
|
|
|
if nodeConfig.ScratchDir == "" {
|
|
|
|
return nil, fmt.Errorf("node ScratchDir is required")
|
|
|
|
}
|
|
|
|
|
2022-11-01 19:03:23 +00:00
|
|
|
namePrefix := fmt.Sprintf("%s-service-gateway-%s", node.GetDatacenter(), name)
|
|
|
|
containerName := utils.RandName(namePrefix)
|
|
|
|
|
|
|
|
envoyVersion := getEnvoyVersion()
|
2023-01-17 22:16:55 +00:00
|
|
|
agentConfig := node.GetConfig()
|
2022-11-01 19:03:23 +00:00
|
|
|
buildargs := map[string]*string{
|
|
|
|
"ENVOY_VERSION": utils.StringToPointer(envoyVersion),
|
2023-01-17 22:16:55 +00:00
|
|
|
"CONSUL_IMAGE": utils.StringToPointer(agentConfig.DockerImage()),
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
dockerfileCtx, err := getDevContainerDockerfile()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
dockerfileCtx.BuildArgs = buildargs
|
|
|
|
|
2023-01-27 15:19:10 +00:00
|
|
|
adminPort, err := node.ClaimAdminPort()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-11-01 19:03:23 +00:00
|
|
|
|
|
|
|
req := testcontainers.ContainerRequest{
|
|
|
|
FromDockerfile: dockerfileCtx,
|
|
|
|
WaitingFor: wait.ForLog("").WithStartupTimeout(10 * time.Second),
|
|
|
|
AutoRemove: false,
|
|
|
|
Name: containerName,
|
|
|
|
Cmd: []string{
|
|
|
|
"consul", "connect", "envoy",
|
|
|
|
fmt.Sprintf("-gateway=%s", kind),
|
|
|
|
"-register",
|
|
|
|
"-service", name,
|
|
|
|
"-address", "{{ GetInterfaceIP \"eth0\" }}:8443",
|
2023-01-11 21:34:27 +00:00
|
|
|
"-admin-bind", fmt.Sprintf("0.0.0.0:%d", adminPort),
|
2022-11-01 19:03:23 +00:00
|
|
|
"--",
|
2023-01-11 21:34:27 +00:00
|
|
|
"--log-level", envoyLogLevel,
|
2022-11-01 19:03:23 +00:00
|
|
|
},
|
2023-01-11 21:34:27 +00:00
|
|
|
Env: make(map[string]string),
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
2023-01-11 21:34:27 +00:00
|
|
|
|
|
|
|
nodeInfo := node.GetInfo()
|
|
|
|
if nodeInfo.UseTLSForAPI || nodeInfo.UseTLSForGRPC {
|
|
|
|
req.Mounts = append(req.Mounts, testcontainers.ContainerMount{
|
|
|
|
Source: testcontainers.DockerBindMountSource{
|
|
|
|
// See cluster.NewConsulContainer for this info
|
|
|
|
HostPath: filepath.Join(nodeConfig.ScratchDir, "ca.pem"),
|
|
|
|
},
|
|
|
|
Target: "/ca.pem",
|
|
|
|
ReadOnly: true,
|
|
|
|
})
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
2023-01-11 21:34:27 +00:00
|
|
|
|
|
|
|
if nodeInfo.UseTLSForAPI {
|
|
|
|
req.Env["CONSUL_HTTP_ADDR"] = fmt.Sprintf("https://127.0.0.1:%d", 8501)
|
|
|
|
req.Env["CONSUL_HTTP_SSL"] = "1"
|
|
|
|
req.Env["CONSUL_CACERT"] = "/ca.pem"
|
|
|
|
} else {
|
|
|
|
req.Env["CONSUL_HTTP_ADDR"] = fmt.Sprintf("http://127.0.0.1:%d", 8500)
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
2023-01-11 21:34:27 +00:00
|
|
|
|
|
|
|
if nodeInfo.UseTLSForGRPC {
|
|
|
|
req.Env["CONSUL_GRPC_ADDR"] = fmt.Sprintf("https://127.0.0.1:%d", 8503)
|
|
|
|
req.Env["CONSUL_GRPC_CACERT"] = "/ca.pem"
|
|
|
|
} else {
|
|
|
|
req.Env["CONSUL_GRPC_ADDR"] = fmt.Sprintf("http://127.0.0.1:%d", 8502)
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
2023-01-11 21:34:27 +00:00
|
|
|
var (
|
|
|
|
portStr = "8443"
|
|
|
|
adminPortStr = strconv.Itoa(adminPort)
|
|
|
|
)
|
|
|
|
|
|
|
|
info, err := cluster.LaunchContainerOnNode(ctx, node, req, []string{
|
|
|
|
portStr,
|
|
|
|
adminPortStr,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
2023-01-11 21:34:27 +00:00
|
|
|
out := &gatewayContainer{
|
|
|
|
ctx: ctx,
|
|
|
|
container: info.Container,
|
|
|
|
ip: info.IP,
|
|
|
|
port: info.MappedPorts[portStr].Int(),
|
|
|
|
adminPort: info.MappedPorts[adminPortStr].Int(),
|
|
|
|
serviceName: name,
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|
|
|
|
|
2023-01-11 21:34:27 +00:00
|
|
|
return out, nil
|
2022-11-01 19:03:23 +00:00
|
|
|
}
|