2020-11-17 20:00:36 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-07-21 20:58:42 +00:00
|
|
|
"errors"
|
2020-11-17 20:00:36 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"strings"
|
|
|
|
"sync/atomic"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/require"
|
2021-07-21 20:58:42 +00:00
|
|
|
"golang.org/x/sync/errgroup"
|
2020-11-17 20:00:36 +00:00
|
|
|
gogrpc "google.golang.org/grpc"
|
|
|
|
|
2022-07-13 15:33:48 +00:00
|
|
|
grpc "github.com/hashicorp/consul/agent/grpc-internal"
|
2023-01-05 10:21:27 +00:00
|
|
|
"github.com/hashicorp/consul/agent/grpc-internal/balancer"
|
2022-07-13 15:33:48 +00:00
|
|
|
"github.com/hashicorp/consul/agent/grpc-internal/resolver"
|
2020-11-17 20:00:36 +00:00
|
|
|
"github.com/hashicorp/consul/agent/router"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2023-02-17 21:14:46 +00:00
|
|
|
"github.com/hashicorp/consul/proto/private/pbservice"
|
|
|
|
"github.com/hashicorp/consul/proto/private/pbsubscribe"
|
2023-01-05 10:21:27 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil"
|
2020-11-17 20:00:36 +00:00
|
|
|
"github.com/hashicorp/consul/testrpc"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestSubscribeBackend_IntegrationWithServer_TLSEnabled(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2021-08-24 21:28:44 +00:00
|
|
|
// TODO(rb): add tests for the wanfed/alpn variations
|
|
|
|
|
2020-11-17 20:00:36 +00:00
|
|
|
_, conf1 := testServerConfig(t)
|
2022-03-18 10:46:58 +00:00
|
|
|
conf1.TLSConfig.InternalRPC.VerifyIncoming = true
|
|
|
|
conf1.TLSConfig.InternalRPC.VerifyOutgoing = true
|
2020-11-17 20:00:36 +00:00
|
|
|
conf1.RPCConfig.EnableStreaming = true
|
|
|
|
configureTLS(conf1)
|
|
|
|
server, err := newServer(t, conf1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer server.Shutdown()
|
|
|
|
|
2023-02-28 10:18:38 +00:00
|
|
|
client, resolverBuilder := newClientWithGRPCPlumbing(t, configureTLS, clientConfigVerifyOutgoing)
|
2020-11-17 20:00:36 +00:00
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a dummy node with our service on it.
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out struct{}
|
2022-12-14 15:24:22 +00:00
|
|
|
require.NoError(t, server.RPC(context.Background(), "Catalog.Register", &req, &out))
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint from the client.
|
|
|
|
{
|
2021-08-24 21:28:44 +00:00
|
|
|
pool := grpc.NewClientConnPool(grpc.ClientConnPoolConfig{
|
2023-01-05 10:21:27 +00:00
|
|
|
Servers: resolverBuilder,
|
2021-08-24 21:28:44 +00:00
|
|
|
TLSWrapper: grpc.TLSWrapper(client.tlsConfigurator.OutgoingRPCWrapper()),
|
|
|
|
UseTLSForDC: client.tlsConfigurator.UseTLS,
|
|
|
|
DialingFromServer: true,
|
|
|
|
DialingFromDatacenter: "dc1",
|
|
|
|
})
|
2020-11-17 20:00:36 +00:00
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
req := &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Subject: &pbsubscribe.SubscribeRequest_NamedSubject{
|
|
|
|
NamedSubject: &pbsubscribe.NamedSubject{
|
|
|
|
Key: "redis",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2020-11-17 20:00:36 +00:00
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
|
|
|
go receiveSubscribeEvents(t, eventCh, streamHandle)
|
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the snapshot events come back with no issues.
|
|
|
|
require.Len(t, snapshotEvents, 2)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint from the server's loopback client.
|
|
|
|
{
|
2021-08-24 21:28:44 +00:00
|
|
|
pool := grpc.NewClientConnPool(grpc.ClientConnPoolConfig{
|
2023-01-05 10:21:27 +00:00
|
|
|
Servers: resolverBuilder,
|
2021-08-24 21:28:44 +00:00
|
|
|
TLSWrapper: grpc.TLSWrapper(client.tlsConfigurator.OutgoingRPCWrapper()),
|
|
|
|
UseTLSForDC: client.tlsConfigurator.UseTLS,
|
|
|
|
DialingFromServer: true,
|
|
|
|
DialingFromDatacenter: "dc1",
|
|
|
|
})
|
2020-11-17 20:00:36 +00:00
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
retryFailedConn(t, conn)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
req := &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Subject: &pbsubscribe.SubscribeRequest_NamedSubject{
|
|
|
|
NamedSubject: &pbsubscribe.NamedSubject{
|
|
|
|
Key: "redis",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2020-11-17 20:00:36 +00:00
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
|
|
|
go receiveSubscribeEvents(t, eventCh, streamHandle)
|
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the snapshot events come back with no issues.
|
|
|
|
require.Len(t, snapshotEvents, 2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// receiveSubscribeEvents and send them to the channel.
|
|
|
|
func receiveSubscribeEvents(t *testing.T, ch chan *pbsubscribe.Event, handle pbsubscribe.StateChangeSubscription_SubscribeClient) {
|
|
|
|
for {
|
|
|
|
event, err := handle.Recv()
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), "context deadline exceeded") ||
|
|
|
|
strings.Contains(err.Error(), "context canceled") {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
t.Log(err)
|
|
|
|
}
|
|
|
|
ch <- event
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSubscribeBackend_IntegrationWithServer_TLSReload(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Set up a server with initially bad certificates.
|
|
|
|
_, conf1 := testServerConfig(t)
|
2022-03-18 10:46:58 +00:00
|
|
|
conf1.TLSConfig.InternalRPC.VerifyIncoming = true
|
|
|
|
conf1.TLSConfig.InternalRPC.VerifyOutgoing = true
|
|
|
|
conf1.TLSConfig.InternalRPC.CAFile = "../../test/ca/root.cer"
|
|
|
|
conf1.TLSConfig.InternalRPC.CertFile = "../../test/key/ssl-cert-snakeoil.pem"
|
|
|
|
conf1.TLSConfig.InternalRPC.KeyFile = "../../test/key/ssl-cert-snakeoil.key"
|
2020-11-17 20:00:36 +00:00
|
|
|
conf1.RPCConfig.EnableStreaming = true
|
|
|
|
|
|
|
|
server, err := newServer(t, conf1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer server.Shutdown()
|
|
|
|
|
|
|
|
// Set up a client with valid certs and verify_outgoing = true
|
2023-02-28 10:18:38 +00:00
|
|
|
client, resolverBuilder := newClientWithGRPCPlumbing(t, configureTLS, clientConfigVerifyOutgoing)
|
2020-11-17 20:00:36 +00:00
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
|
|
|
|
// Subscribe calls should fail initially
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
|
2021-08-24 21:28:44 +00:00
|
|
|
pool := grpc.NewClientConnPool(grpc.ClientConnPoolConfig{
|
2023-01-05 10:21:27 +00:00
|
|
|
Servers: resolverBuilder,
|
2021-08-24 21:28:44 +00:00
|
|
|
TLSWrapper: grpc.TLSWrapper(client.tlsConfigurator.OutgoingRPCWrapper()),
|
|
|
|
UseTLSForDC: client.tlsConfigurator.UseTLS,
|
|
|
|
DialingFromServer: true,
|
|
|
|
DialingFromDatacenter: "dc1",
|
|
|
|
})
|
2020-11-17 20:00:36 +00:00
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
|
|
defer cancel()
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
req := &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Subject: &pbsubscribe.SubscribeRequest_NamedSubject{
|
|
|
|
NamedSubject: &pbsubscribe.NamedSubject{
|
|
|
|
Key: "redis",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2020-11-17 20:00:36 +00:00
|
|
|
_, err = streamClient.Subscribe(ctx, req)
|
|
|
|
require.Error(t, err)
|
|
|
|
|
|
|
|
// Reload the server with valid certs
|
2021-07-09 22:17:42 +00:00
|
|
|
newConf := server.config.TLSConfig
|
2022-03-18 10:46:58 +00:00
|
|
|
newConf.InternalRPC.CertFile = "../../test/key/ourdomain.cer"
|
|
|
|
newConf.InternalRPC.KeyFile = "../../test/key/ourdomain.key"
|
2020-11-17 20:00:36 +00:00
|
|
|
server.tlsConfigurator.Update(newConf)
|
|
|
|
|
|
|
|
// Try the subscribe call again
|
|
|
|
retryFailedConn(t, conn)
|
|
|
|
|
|
|
|
streamClient = pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
|
|
|
_, err = streamClient.Subscribe(ctx, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func clientConfigVerifyOutgoing(config *Config) {
|
2022-03-18 10:46:58 +00:00
|
|
|
config.TLSConfig.InternalRPC.VerifyOutgoing = true
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// retryFailedConn forces the ClientConn to reset its backoff timer and retry the connection,
|
|
|
|
// to simulate the client eventually retrying after the initial failure. This is used both to simulate
|
|
|
|
// retrying after an expected failure as well as to avoid flakiness when running many tests in parallel.
|
|
|
|
func retryFailedConn(t *testing.T, conn *gogrpc.ClientConn) {
|
|
|
|
state := conn.GetState()
|
|
|
|
if state.String() != "TRANSIENT_FAILURE" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the connection has failed, retry and wait for a state change.
|
|
|
|
conn.ResetConnectBackoff()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
require.True(t, conn.WaitForStateChange(ctx, state))
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSubscribeBackend_IntegrationWithServer_DeliversAllMessages(t *testing.T) {
|
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for -short run")
|
|
|
|
}
|
|
|
|
// This is a fuzz/probabilistic test to try to provoke streaming into dropping
|
|
|
|
// messages. There is a bug in the initial implementation that should make
|
|
|
|
// this fail. While we can't be certain a pass means it's correct, it is
|
|
|
|
// useful for finding bugs in our concurrency design.
|
|
|
|
|
|
|
|
// The issue is that when updates are coming in fast such that updates occur
|
|
|
|
// in between us making the snapshot and beginning the stream updates, we
|
|
|
|
// shouldn't miss anything.
|
|
|
|
|
|
|
|
// To test this, we will run a background goroutine that will write updates as
|
|
|
|
// fast as possible while we then try to stream the results and ensure that we
|
|
|
|
// see every change. We'll make the updates monotonically increasing so we can
|
|
|
|
// easily tell if we missed one.
|
|
|
|
|
|
|
|
_, server := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.Bootstrap = true
|
|
|
|
c.RPCConfig.EnableStreaming = true
|
|
|
|
})
|
|
|
|
defer server.Shutdown()
|
|
|
|
codec := rpcClient(t, server)
|
|
|
|
defer codec.Close()
|
|
|
|
|
2023-02-28 10:18:38 +00:00
|
|
|
client, resolverBuilder := newClientWithGRPCPlumbing(t)
|
2020-11-17 20:00:36 +00:00
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a whole bunch of service instances so that the initial snapshot on
|
|
|
|
// subscribe is big enough to take a bit of time to load giving more
|
|
|
|
// opportunity for missed updates if there is a bug.
|
|
|
|
for i := 0; i < 1000; i++ {
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: fmt.Sprintf("node-redis-%03d", i),
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: fmt.Sprintf("redis-%03d", i),
|
|
|
|
Service: "redis",
|
|
|
|
Port: 11211,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out struct{}
|
2022-12-14 15:24:22 +00:00
|
|
|
require.NoError(t, server.RPC(context.Background(), "Catalog.Register", &req, &out))
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start background writer
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// Update the registration with a monotonically increasing port as fast as
|
|
|
|
// we can.
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis-canary",
|
|
|
|
Service: "redis",
|
|
|
|
Port: 0,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var out struct{}
|
2022-12-14 15:24:22 +00:00
|
|
|
require.NoError(t, server.RPC(context.Background(), "Catalog.Register", &req, &out))
|
2020-11-17 20:00:36 +00:00
|
|
|
req.Service.Port++
|
|
|
|
if req.Service.Port > 100 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
time.Sleep(1 * time.Millisecond)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2021-08-24 21:28:44 +00:00
|
|
|
pool := grpc.NewClientConnPool(grpc.ClientConnPoolConfig{
|
2023-01-05 10:21:27 +00:00
|
|
|
Servers: resolverBuilder,
|
2021-08-24 21:28:44 +00:00
|
|
|
TLSWrapper: grpc.TLSWrapper(client.tlsConfigurator.OutgoingRPCWrapper()),
|
|
|
|
UseTLSForDC: client.tlsConfigurator.UseTLS,
|
|
|
|
DialingFromServer: true,
|
|
|
|
DialingFromDatacenter: "dc1",
|
|
|
|
})
|
2020-11-17 20:00:36 +00:00
|
|
|
conn, err := pool.ClientConn("dc1")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
|
|
|
|
|
|
|
// Now start a whole bunch of streamers in parallel to maximise chance of
|
|
|
|
// catching a race.
|
|
|
|
n := 5
|
2021-07-21 20:58:42 +00:00
|
|
|
var g errgroup.Group
|
2020-11-17 20:00:36 +00:00
|
|
|
var updateCount uint64
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
i := i
|
2021-07-21 20:58:42 +00:00
|
|
|
g.Go(func() error {
|
|
|
|
return verifyMonotonicStreamUpdates(ctx, t, streamClient, i, &updateCount)
|
|
|
|
})
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Wait until all subscribers have verified the first bunch of updates all got
|
|
|
|
// delivered.
|
2021-07-21 20:58:42 +00:00
|
|
|
require.NoError(t, g.Wait())
|
2020-11-17 20:00:36 +00:00
|
|
|
|
|
|
|
// Sanity check that at least some non-snapshot messages were delivered. We
|
|
|
|
// can't know exactly how many because it's timing dependent based on when
|
|
|
|
// each subscribers snapshot occurs.
|
|
|
|
require.True(t, atomic.LoadUint64(&updateCount) > 0,
|
|
|
|
"at least some of the subscribers should have received non-snapshot updates")
|
|
|
|
}
|
|
|
|
|
2023-02-28 10:18:38 +00:00
|
|
|
func newClientWithGRPCPlumbing(t *testing.T, ops ...func(*Config)) (*Client, *resolver.ServerResolverBuilder) {
|
2020-11-17 20:00:36 +00:00
|
|
|
_, config := testClientConfig(t)
|
|
|
|
for _, op := range ops {
|
|
|
|
op(config)
|
|
|
|
}
|
|
|
|
|
2023-01-05 10:21:27 +00:00
|
|
|
resolverBuilder := resolver.NewServerResolverBuilder(newTestResolverConfig(t,
|
2021-09-22 18:14:26 +00:00
|
|
|
"client."+config.Datacenter+"."+string(config.NodeID)))
|
|
|
|
|
2023-01-05 10:21:27 +00:00
|
|
|
resolver.Register(resolverBuilder)
|
2021-09-22 18:14:26 +00:00
|
|
|
t.Cleanup(func() {
|
2023-01-05 10:21:27 +00:00
|
|
|
resolver.Deregister(resolverBuilder.Authority())
|
2021-09-22 18:14:26 +00:00
|
|
|
})
|
|
|
|
|
2023-01-05 10:21:27 +00:00
|
|
|
balancerBuilder := balancer.NewBuilder(resolverBuilder.Authority(), testutil.Logger(t))
|
|
|
|
balancerBuilder.Register()
|
2023-02-28 10:18:38 +00:00
|
|
|
t.Cleanup(balancerBuilder.Deregister)
|
2023-01-05 10:21:27 +00:00
|
|
|
|
2020-11-17 20:00:36 +00:00
|
|
|
deps := newDefaultDeps(t, config)
|
|
|
|
deps.Router = router.NewRouter(
|
|
|
|
deps.Logger,
|
|
|
|
config.Datacenter,
|
|
|
|
fmt.Sprintf("%s.%s", config.NodeName, config.Datacenter),
|
2023-01-05 10:21:27 +00:00
|
|
|
grpc.NewTracker(resolverBuilder, balancerBuilder),
|
|
|
|
)
|
2020-11-17 20:00:36 +00:00
|
|
|
|
|
|
|
client, err := NewClient(config, deps)
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(func() {
|
|
|
|
client.Shutdown()
|
|
|
|
})
|
2023-02-28 10:18:38 +00:00
|
|
|
return client, resolverBuilder
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type testLogger interface {
|
|
|
|
Logf(format string, args ...interface{})
|
|
|
|
}
|
|
|
|
|
2021-07-21 20:58:42 +00:00
|
|
|
func verifyMonotonicStreamUpdates(ctx context.Context, logger testLogger, client pbsubscribe.StateChangeSubscriptionClient, i int, updateCount *uint64) error {
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
req := &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Subject: &pbsubscribe.SubscribeRequest_NamedSubject{
|
|
|
|
NamedSubject: &pbsubscribe.NamedSubject{
|
|
|
|
Key: "redis",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2020-11-17 20:00:36 +00:00
|
|
|
streamHandle, err := client.Subscribe(ctx, req)
|
2021-07-21 20:58:42 +00:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded):
|
|
|
|
logger.Logf("subscriber %05d: context cancelled before loop")
|
|
|
|
return nil
|
|
|
|
case err != nil:
|
|
|
|
return err
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
snapshotDone := false
|
|
|
|
expectPort := int32(0)
|
|
|
|
for {
|
|
|
|
event, err := streamHandle.Recv()
|
2021-07-21 20:58:42 +00:00
|
|
|
switch {
|
|
|
|
case err == io.EOF:
|
|
|
|
return nil
|
|
|
|
case errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded):
|
|
|
|
return nil
|
|
|
|
case err != nil:
|
|
|
|
return err
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case event.GetEndOfSnapshot():
|
|
|
|
snapshotDone = true
|
2021-07-21 20:58:42 +00:00
|
|
|
logger.Logf("subscriber %05d: snapshot done at index %d, expect next port to be %d", i, event.Index, expectPort)
|
2020-11-17 20:00:36 +00:00
|
|
|
case snapshotDone:
|
|
|
|
// Verify we get all updates in order
|
|
|
|
svc, err := svcOrErr(event)
|
|
|
|
if err != nil {
|
2021-07-21 20:58:42 +00:00
|
|
|
return err
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
2022-10-31 17:10:43 +00:00
|
|
|
switch svc.Port {
|
|
|
|
case expectPort:
|
|
|
|
atomic.AddUint64(updateCount, 1)
|
|
|
|
logger.Logf("subscriber %05d: got event with correct port=%d at index %d", i, expectPort, event.Index)
|
|
|
|
expectPort++
|
|
|
|
case expectPort - 1:
|
|
|
|
logger.Logf("subscriber %05d: got event with repeated prior port=%d at index %d", i, expectPort-1, event.Index)
|
|
|
|
default:
|
2021-07-21 20:58:42 +00:00
|
|
|
return fmt.Errorf("subscriber %05d: at index %d: expected port %d, got %d",
|
|
|
|
i, event.Index, expectPort, svc.Port)
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
default:
|
2021-07-21 20:58:42 +00:00
|
|
|
// snapshot events
|
2020-11-17 20:00:36 +00:00
|
|
|
svc, err := svcOrErr(event)
|
|
|
|
if err != nil {
|
2021-07-21 20:58:42 +00:00
|
|
|
return err
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
if svc.ID == "redis-canary" {
|
|
|
|
// Update the expected port we see in the next update to be one more
|
|
|
|
// than the port in the snapshot.
|
|
|
|
expectPort = svc.Port + 1
|
2021-07-21 20:58:42 +00:00
|
|
|
logger.Logf("subscriber %05d: saw canary in snapshot with port %d at index %d", i, svc.Port, event.Index)
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if expectPort > 100 {
|
2021-07-21 20:58:42 +00:00
|
|
|
return nil
|
2020-11-17 20:00:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func svcOrErr(event *pbsubscribe.Event) (*pbservice.NodeService, error) {
|
|
|
|
health := event.GetServiceHealth()
|
|
|
|
if health == nil {
|
|
|
|
return nil, fmt.Errorf("not a health event: %#v", event)
|
|
|
|
}
|
|
|
|
csn := health.CheckServiceNode
|
|
|
|
if csn == nil {
|
|
|
|
return nil, fmt.Errorf("nil CSN: %#v", event)
|
|
|
|
}
|
|
|
|
if csn.Service == nil {
|
|
|
|
return nil, fmt.Errorf("nil service: %#v", event)
|
|
|
|
}
|
|
|
|
return csn.Service, nil
|
|
|
|
}
|