2019-04-23 06:39:02 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2019-09-24 15:04:48 +00:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2019-04-23 06:39:02 +00:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2019-09-24 15:04:48 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil/retry"
|
2019-04-23 06:39:02 +00:00
|
|
|
"github.com/hashicorp/consul/testrpc"
|
2021-03-11 04:05:11 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
2019-04-23 06:39:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestServiceManager_RegisterService(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-04-23 06:39:02 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2020-10-01 14:19:14 +00:00
|
|
|
a := NewTestAgent(t, "")
|
2019-04-23 06:39:02 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
2019-05-01 23:39:31 +00:00
|
|
|
// Register a global proxy and service config
|
2019-09-24 15:04:48 +00:00
|
|
|
testApplyConfigEntries(t, a,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
2019-05-01 23:39:31 +00:00
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "redis",
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
)
|
2019-04-23 06:39:02 +00:00
|
|
|
|
2019-05-01 23:39:31 +00:00
|
|
|
// Now register a service locally with no sidecar, it should be a no-op.
|
2019-04-23 06:39:02 +00:00
|
|
|
svc := &structs.NodeService{
|
2019-12-10 02:26:41 +00:00
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Port: 8000,
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-04-23 06:39:02 +00:00
|
|
|
}
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, false, "", ConfigSourceLocal))
|
2019-05-01 23:39:31 +00:00
|
|
|
|
|
|
|
// Verify both the service and sidecar.
|
2019-12-10 02:26:41 +00:00
|
|
|
redisService := a.State.Service(structs.NewServiceID("redis", nil))
|
2019-05-01 23:39:31 +00:00
|
|
|
require.NotNil(redisService)
|
2019-04-23 06:39:02 +00:00
|
|
|
require.Equal(&structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Port: 8000,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-05-01 23:39:31 +00:00
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-05-01 23:39:31 +00:00
|
|
|
}, redisService)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceManager_RegisterSidecar(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-05-01 23:39:31 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2020-10-01 14:19:14 +00:00
|
|
|
a := NewTestAgent(t, "")
|
2019-05-01 23:39:31 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
2019-09-24 15:04:48 +00:00
|
|
|
testApplyConfigEntries(t, a,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
2019-05-01 23:39:31 +00:00
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "web",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "redis",
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
)
|
2019-05-01 23:39:31 +00:00
|
|
|
|
|
|
|
// Now register a sidecar proxy. Note we don't use SidecarService here because
|
|
|
|
// that gets resolved earlier in config handling than the AddService call
|
|
|
|
// here.
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
2019-04-23 06:39:02 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
2019-05-01 23:39:31 +00:00
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-05-01 23:39:31 +00:00
|
|
|
}
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, false, "", ConfigSourceLocal))
|
2019-05-01 23:39:31 +00:00
|
|
|
|
|
|
|
// Verify sidecar got global config loaded
|
2019-12-10 02:26:41 +00:00
|
|
|
sidecarService := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-05-01 23:39:31 +00:00
|
|
|
require.NotNil(sidecarService)
|
|
|
|
require.Equal(&structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-05-01 23:39:31 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
2019-04-23 06:39:02 +00:00
|
|
|
Config: map[string]interface{}{
|
2019-05-01 23:39:31 +00:00
|
|
|
"foo": int64(1),
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
|
|
|
},
|
2019-04-23 06:39:02 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-05-01 23:39:31 +00:00
|
|
|
}, sidecarService)
|
2019-04-23 06:39:02 +00:00
|
|
|
}
|
2019-04-24 13:11:08 +00:00
|
|
|
|
2019-08-09 20:07:01 +00:00
|
|
|
func TestServiceManager_RegisterMeshGateway(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-08-09 20:07:01 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2020-10-01 14:19:14 +00:00
|
|
|
a := NewTestAgent(t, "")
|
2019-08-09 20:07:01 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
2019-09-24 15:04:48 +00:00
|
|
|
testApplyConfigEntries(t, a,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
2019-08-09 20:07:01 +00:00
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "mesh-gateway",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
)
|
2019-08-09 20:07:01 +00:00
|
|
|
|
|
|
|
// Now register a mesh-gateway.
|
|
|
|
svc := &structs.NodeService{
|
2019-12-10 02:26:41 +00:00
|
|
|
Kind: structs.ServiceKindMeshGateway,
|
|
|
|
ID: "mesh-gateway",
|
|
|
|
Service: "mesh-gateway",
|
|
|
|
Port: 443,
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-08-09 20:07:01 +00:00
|
|
|
}
|
|
|
|
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, false, "", ConfigSourceLocal))
|
2019-08-09 20:07:01 +00:00
|
|
|
|
|
|
|
// Verify gateway got global config loaded
|
2019-12-10 02:26:41 +00:00
|
|
|
gateway := a.State.Service(structs.NewServiceID("mesh-gateway", nil))
|
2019-08-09 20:07:01 +00:00
|
|
|
require.NotNil(gateway)
|
|
|
|
require.Equal(&structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
Kind: structs.ServiceKindMeshGateway,
|
|
|
|
ID: "mesh-gateway",
|
|
|
|
Service: "mesh-gateway",
|
|
|
|
Port: 443,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-08-09 20:07:01 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
2020-03-26 16:20:56 +00:00
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": int64(1),
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
}, gateway)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceManager_RegisterTerminatingGateway(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2020-03-26 16:20:56 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2020-10-01 14:19:14 +00:00
|
|
|
a := NewTestAgent(t, "")
|
2020-03-26 16:20:56 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
|
|
|
testApplyConfigEntries(t, a,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "terminating-gateway",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// Now register a terminating-gateway.
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindTerminatingGateway,
|
|
|
|
ID: "terminating-gateway",
|
|
|
|
Service: "terminating-gateway",
|
|
|
|
Port: 443,
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
}
|
|
|
|
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, false, "", ConfigSourceLocal))
|
2020-03-26 16:20:56 +00:00
|
|
|
|
|
|
|
// Verify gateway got global config loaded
|
|
|
|
gateway := a.State.Service(structs.NewServiceID("terminating-gateway", nil))
|
|
|
|
require.NotNil(gateway)
|
|
|
|
require.Equal(&structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindTerminatingGateway,
|
|
|
|
ID: "terminating-gateway",
|
|
|
|
Service: "terminating-gateway",
|
|
|
|
Port: 443,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
2019-08-09 20:07:01 +00:00
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": int64(1),
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-08-09 20:07:01 +00:00
|
|
|
}, gateway)
|
|
|
|
}
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
func TestServiceManager_PersistService_API(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// This is the ServiceManager version of TestAgent_PersistService and
|
|
|
|
// TestAgent_PurgeService.
|
|
|
|
t.Parallel()
|
|
|
|
|
2019-04-24 13:11:08 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// Launch a server to manage the config entries.
|
2020-10-01 14:19:14 +00:00
|
|
|
serverAgent := NewTestAgent(t, "")
|
2019-09-24 15:04:48 +00:00
|
|
|
defer serverAgent.Shutdown()
|
|
|
|
testrpc.WaitForLeader(t, serverAgent.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
|
|
|
testApplyConfigEntries(t, serverAgent,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "web",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "redis",
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// Now launch a single client agent
|
|
|
|
cfg := `
|
|
|
|
server = false
|
|
|
|
bootstrap = false
|
|
|
|
`
|
2020-08-13 21:17:21 +00:00
|
|
|
a := StartTestAgent(t, TestAgent{HCL: cfg})
|
2019-04-24 13:11:08 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// Join first
|
|
|
|
_, err := a.JoinLAN([]string{
|
|
|
|
fmt.Sprintf("127.0.0.1:%d", serverAgent.Config.SerfPortLAN),
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
|
|
|
|
2019-04-24 13:11:08 +00:00
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// Now register a sidecar proxy via the API.
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
2019-05-01 23:39:31 +00:00
|
|
|
},
|
2019-04-24 13:11:08 +00:00
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-09-24 15:04:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
expectState := &structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-09-24 15:04:48 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": int64(1),
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-05-01 23:39:31 +00:00
|
|
|
}
|
2019-09-24 15:04:48 +00:00
|
|
|
|
2020-02-05 15:06:11 +00:00
|
|
|
svcID := svc.CompoundServiceID()
|
|
|
|
|
|
|
|
svcFile := filepath.Join(a.Config.DataDir, servicesDir, svcID.StringHash())
|
|
|
|
configFile := filepath.Join(a.Config.DataDir, serviceConfigDir, svcID.StringHash())
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
// Service is not persisted unless requested, but we always persist service configs.
|
2020-11-30 22:50:06 +00:00
|
|
|
err = a.AddService(AddServiceRequest{Service: svc, Source: ConfigSourceRemote})
|
|
|
|
require.NoError(err)
|
2019-09-24 15:04:48 +00:00
|
|
|
requireFileIsAbsent(t, svcFile)
|
|
|
|
requireFileIsPresent(t, configFile)
|
|
|
|
|
|
|
|
// Persists to file if requested
|
2020-11-30 22:50:06 +00:00
|
|
|
err = a.AddService(AddServiceRequest{
|
|
|
|
Service: svc,
|
|
|
|
persist: true,
|
|
|
|
token: "mytoken",
|
|
|
|
Source: ConfigSourceRemote,
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
2019-09-24 15:04:48 +00:00
|
|
|
requireFileIsPresent(t, svcFile)
|
|
|
|
requireFileIsPresent(t, configFile)
|
|
|
|
|
|
|
|
// Service definition file is sane.
|
|
|
|
expectJSONFile(t, svcFile, persistedService{
|
|
|
|
Token: "mytoken",
|
|
|
|
Service: svc,
|
|
|
|
Source: "remote",
|
|
|
|
}, nil)
|
|
|
|
|
|
|
|
// Service config file is sane.
|
2019-12-10 02:26:41 +00:00
|
|
|
pcfg := persistedServiceConfig{
|
2019-09-24 15:04:48 +00:00
|
|
|
ServiceID: "web-sidecar-proxy",
|
|
|
|
Defaults: &structs.ServiceConfigResponse{
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
2021-03-09 05:10:27 +00:00
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
structs.OpaqueUpstreamConfig{
|
2020-01-24 15:04:58 +00:00
|
|
|
Upstream: structs.NewServiceID("redis", nil),
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
}
|
|
|
|
expectJSONFile(t, configFile, pcfg, resetDefaultsQueryMeta)
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
// Verify in memory state.
|
2019-05-01 23:39:31 +00:00
|
|
|
{
|
2019-12-10 02:26:41 +00:00
|
|
|
sidecarService := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-09-24 15:04:48 +00:00
|
|
|
require.NotNil(sidecarService)
|
|
|
|
require.Equal(expectState, sidecarService)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Updates service definition on disk
|
|
|
|
svc.Proxy.LocalServicePort = 8001
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, true, "mytoken", ConfigSourceRemote))
|
2019-09-24 15:04:48 +00:00
|
|
|
requireFileIsPresent(t, svcFile)
|
|
|
|
requireFileIsPresent(t, configFile)
|
|
|
|
|
|
|
|
// Service definition file is updated.
|
|
|
|
expectJSONFile(t, svcFile, persistedService{
|
|
|
|
Token: "mytoken",
|
|
|
|
Service: svc,
|
|
|
|
Source: "remote",
|
|
|
|
}, nil)
|
|
|
|
|
|
|
|
// Service config file is the same.
|
2019-12-10 02:26:41 +00:00
|
|
|
pcfg = persistedServiceConfig{
|
2019-09-24 15:04:48 +00:00
|
|
|
ServiceID: "web-sidecar-proxy",
|
|
|
|
Defaults: &structs.ServiceConfigResponse{
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
"protocol": "http",
|
2019-05-01 23:39:31 +00:00
|
|
|
},
|
2021-03-09 05:10:27 +00:00
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
structs.OpaqueUpstreamConfig{
|
2020-01-24 15:04:58 +00:00
|
|
|
Upstream: structs.NewServiceID("redis", nil),
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
}
|
|
|
|
expectJSONFile(t, configFile, pcfg, resetDefaultsQueryMeta)
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
// Verify in memory state.
|
|
|
|
expectState.Proxy.LocalServicePort = 8001
|
|
|
|
{
|
2019-12-10 02:26:41 +00:00
|
|
|
sidecarService := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-09-24 15:04:48 +00:00
|
|
|
require.NotNil(sidecarService)
|
|
|
|
require.Equal(expectState, sidecarService)
|
2019-05-01 23:39:31 +00:00
|
|
|
}
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
// Kill the agent to restart it.
|
|
|
|
a.Shutdown()
|
|
|
|
|
|
|
|
// Kill the server so that it can't phone home and must rely upon the persisted defaults.
|
|
|
|
serverAgent.Shutdown()
|
|
|
|
|
|
|
|
// Should load it back during later start.
|
2020-08-13 21:17:21 +00:00
|
|
|
a2 := StartTestAgent(t, TestAgent{HCL: cfg, DataDir: a.DataDir})
|
2019-09-24 15:04:48 +00:00
|
|
|
defer a2.Shutdown()
|
|
|
|
|
2019-05-01 23:39:31 +00:00
|
|
|
{
|
2019-12-10 02:26:41 +00:00
|
|
|
restored := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-09-24 15:04:48 +00:00
|
|
|
require.NotNil(restored)
|
|
|
|
require.Equal(expectState, restored)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now remove it.
|
2019-12-10 02:26:41 +00:00
|
|
|
require.NoError(a2.RemoveService(structs.NewServiceID("web-sidecar-proxy", nil)))
|
2019-09-24 15:04:48 +00:00
|
|
|
requireFileIsAbsent(t, svcFile)
|
|
|
|
requireFileIsAbsent(t, configFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceManager_PersistService_ConfigFiles(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// This is the ServiceManager version of TestAgent_PersistService and
|
|
|
|
// TestAgent_PurgeService but for config files.
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Launch a server to manage the config entries.
|
2020-10-01 14:19:14 +00:00
|
|
|
serverAgent := NewTestAgent(t, "")
|
2019-09-24 15:04:48 +00:00
|
|
|
defer serverAgent.Shutdown()
|
|
|
|
testrpc.WaitForLeader(t, serverAgent.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
|
|
|
testApplyConfigEntries(t, serverAgent,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
2019-05-01 23:39:31 +00:00
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "web",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "redis",
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
// Now launch a single client agent
|
|
|
|
serviceSnippet := `
|
|
|
|
service = {
|
|
|
|
kind = "connect-proxy"
|
|
|
|
id = "web-sidecar-proxy"
|
|
|
|
name = "web-sidecar-proxy"
|
|
|
|
port = 21000
|
|
|
|
token = "mytoken"
|
|
|
|
proxy {
|
|
|
|
destination_service_name = "web"
|
|
|
|
destination_service_id = "web"
|
|
|
|
local_service_address = "127.0.0.1"
|
|
|
|
local_service_port = 8000
|
|
|
|
upstreams = [{
|
|
|
|
destination_name = "redis"
|
|
|
|
local_bind_port = 5000
|
|
|
|
}]
|
|
|
|
}
|
2019-05-01 23:39:31 +00:00
|
|
|
}
|
2019-09-24 15:04:48 +00:00
|
|
|
`
|
|
|
|
|
|
|
|
cfg := `
|
|
|
|
server = false
|
|
|
|
bootstrap = false
|
|
|
|
` + serviceSnippet
|
|
|
|
|
2020-08-13 21:17:21 +00:00
|
|
|
a := StartTestAgent(t, TestAgent{HCL: cfg})
|
2019-09-24 15:04:48 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
// Join first
|
|
|
|
_, err := a.JoinLAN([]string{
|
|
|
|
fmt.Sprintf("127.0.0.1:%d", serverAgent.Config.SerfPortLAN),
|
|
|
|
})
|
2019-12-10 02:26:41 +00:00
|
|
|
require.NoError(t, err)
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
|
|
|
// Now register a sidecar proxy via the API.
|
|
|
|
svcID := "web-sidecar-proxy"
|
|
|
|
|
|
|
|
expectState := &structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-09-24 15:04:48 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": int64(1),
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationType: "service",
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-04-24 13:11:08 +00:00
|
|
|
}
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
// Now wait until we've re-registered using central config updated data.
|
|
|
|
retry.Run(t, func(r *retry.R) {
|
|
|
|
a.stateLock.Lock()
|
|
|
|
defer a.stateLock.Unlock()
|
2019-12-10 02:26:41 +00:00
|
|
|
current := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-09-24 15:04:48 +00:00
|
|
|
if current == nil {
|
|
|
|
r.Fatalf("service is missing")
|
|
|
|
}
|
2019-12-10 02:26:41 +00:00
|
|
|
require.Equal(r, expectState, current)
|
2019-09-24 15:04:48 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
svcFile := filepath.Join(a.Config.DataDir, servicesDir, stringHash(svcID))
|
|
|
|
configFile := filepath.Join(a.Config.DataDir, serviceConfigDir, stringHash(svcID))
|
|
|
|
|
|
|
|
// Service is never persisted, but we always persist service configs.
|
|
|
|
requireFileIsAbsent(t, svcFile)
|
|
|
|
requireFileIsPresent(t, configFile)
|
|
|
|
|
|
|
|
// Service config file is sane.
|
|
|
|
expectJSONFile(t, configFile, persistedServiceConfig{
|
|
|
|
ServiceID: "web-sidecar-proxy",
|
|
|
|
Defaults: &structs.ServiceConfigResponse{
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
2021-03-09 05:10:27 +00:00
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
structs.OpaqueUpstreamConfig{
|
2020-01-24 15:04:58 +00:00
|
|
|
Upstream: structs.NewServiceID("redis", nil),
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
2019-09-24 15:04:48 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-09-24 15:04:48 +00:00
|
|
|
}, resetDefaultsQueryMeta)
|
|
|
|
|
|
|
|
// Verify in memory state.
|
|
|
|
{
|
2019-12-10 02:26:41 +00:00
|
|
|
sidecarService := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
|
|
|
require.NotNil(t, sidecarService)
|
|
|
|
require.Equal(t, expectState, sidecarService)
|
2019-09-24 15:04:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Kill the agent to restart it.
|
|
|
|
a.Shutdown()
|
|
|
|
|
|
|
|
// Kill the server so that it can't phone home and must rely upon the persisted defaults.
|
|
|
|
serverAgent.Shutdown()
|
|
|
|
|
|
|
|
// Should load it back during later start.
|
2020-08-13 21:17:21 +00:00
|
|
|
a2 := StartTestAgent(t, TestAgent{HCL: cfg, DataDir: a.DataDir})
|
2019-09-24 15:04:48 +00:00
|
|
|
defer a2.Shutdown()
|
|
|
|
|
|
|
|
{
|
2019-12-10 02:26:41 +00:00
|
|
|
restored := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
|
|
|
require.NotNil(t, restored)
|
|
|
|
require.Equal(t, expectState, restored)
|
2019-09-24 15:04:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now remove it.
|
2019-12-10 02:26:41 +00:00
|
|
|
require.NoError(t, a2.RemoveService(structs.NewServiceID("web-sidecar-proxy", nil)))
|
2019-09-24 15:04:48 +00:00
|
|
|
requireFileIsAbsent(t, svcFile)
|
|
|
|
requireFileIsAbsent(t, configFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestServiceManager_Disabled(t *testing.T) {
|
2020-12-07 18:42:55 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("too slow for testing.Short")
|
|
|
|
}
|
|
|
|
|
2019-09-24 15:04:48 +00:00
|
|
|
require := require.New(t)
|
|
|
|
|
2020-03-31 19:59:56 +00:00
|
|
|
a := NewTestAgent(t, "enable_central_service_config = false")
|
2019-09-24 15:04:48 +00:00
|
|
|
defer a.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, a.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a global proxy and service config
|
|
|
|
testApplyConfigEntries(t, a,
|
|
|
|
&structs.ProxyConfigEntry{
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "web",
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
&structs.ServiceConfigEntry{
|
|
|
|
Kind: structs.ServiceDefaults,
|
|
|
|
Name: "redis",
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2019-05-01 23:39:31 +00:00
|
|
|
// Now register a sidecar proxy. Note we don't use SidecarService here because
|
|
|
|
// that gets resolved earlier in config handling than the AddService call
|
|
|
|
// here.
|
2019-04-24 13:11:08 +00:00
|
|
|
svc := &structs.NodeService{
|
2019-05-01 23:39:31 +00:00
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-04-24 13:11:08 +00:00
|
|
|
}
|
2020-11-30 18:26:58 +00:00
|
|
|
require.NoError(a.addServiceFromSource(svc, nil, false, "", ConfigSourceLocal))
|
2019-05-01 23:39:31 +00:00
|
|
|
|
|
|
|
// Verify sidecar got global config loaded
|
2019-12-10 02:26:41 +00:00
|
|
|
sidecarService := a.State.Service(structs.NewServiceID("web-sidecar-proxy", nil))
|
2019-05-01 23:39:31 +00:00
|
|
|
require.NotNil(sidecarService)
|
2019-04-24 13:11:08 +00:00
|
|
|
require.Equal(&structs.NodeService{
|
2020-01-17 14:54:17 +00:00
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
ID: "web-sidecar-proxy",
|
|
|
|
Service: "web-sidecar-proxy",
|
|
|
|
Port: 21000,
|
|
|
|
TaggedAddresses: map[string]structs.ServiceAddress{},
|
2019-05-01 23:39:31 +00:00
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
DestinationServiceID: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8000,
|
|
|
|
// No config added
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
{
|
|
|
|
DestinationName: "redis",
|
|
|
|
LocalBindPort: 5000,
|
|
|
|
// No config added
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-04-24 13:11:08 +00:00
|
|
|
Weights: &structs.Weights{
|
|
|
|
Passing: 1,
|
|
|
|
Warning: 1,
|
|
|
|
},
|
2019-12-10 02:26:41 +00:00
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
2019-05-01 23:39:31 +00:00
|
|
|
}, sidecarService)
|
2019-04-24 13:11:08 +00:00
|
|
|
}
|
2019-09-24 15:04:48 +00:00
|
|
|
|
|
|
|
func testApplyConfigEntries(t *testing.T, a *TestAgent, entries ...structs.ConfigEntry) {
|
|
|
|
t.Helper()
|
|
|
|
for _, entry := range entries {
|
|
|
|
args := &structs.ConfigEntryRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Entry: entry,
|
|
|
|
}
|
|
|
|
var out bool
|
|
|
|
require.NoError(t, a.RPC("ConfigEntry.Apply", args, &out))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireFileIsAbsent(t *testing.T, file string) {
|
|
|
|
t.Helper()
|
|
|
|
if _, err := os.Stat(file); !os.IsNotExist(err) {
|
|
|
|
t.Fatalf("should not persist")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireFileIsPresent(t *testing.T, file string) {
|
|
|
|
t.Helper()
|
|
|
|
if _, err := os.Stat(file); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func expectJSONFile(t *testing.T, file string, expect interface{}, fixupContentBeforeCompareFn func([]byte) ([]byte, error)) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
expected, err := json.Marshal(expect)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
content, err := ioutil.ReadFile(file)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
if fixupContentBeforeCompareFn != nil {
|
|
|
|
content, err = fixupContentBeforeCompareFn(content)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
require.JSONEq(t, string(expected), string(content))
|
|
|
|
}
|
|
|
|
|
|
|
|
// resetDefaultsQueryMeta will reset the embedded fields from structs.QueryMeta
|
|
|
|
// to their zero values in the json object keyed under 'Defaults'.
|
|
|
|
func resetDefaultsQueryMeta(content []byte) ([]byte, error) {
|
|
|
|
var raw map[string]interface{}
|
|
|
|
if err := json.Unmarshal(content, &raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
def, ok := raw["Defaults"]
|
|
|
|
if !ok {
|
|
|
|
return content, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
rawDef, ok := def.(map[string]interface{})
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("unexpected structure found in 'Defaults' key")
|
|
|
|
}
|
|
|
|
|
|
|
|
qmZero, err := convertToMap(structs.QueryMeta{})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for k, v := range qmZero {
|
|
|
|
rawDef[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
raw["Defaults"] = rawDef
|
|
|
|
|
|
|
|
return json.Marshal(raw)
|
|
|
|
}
|
|
|
|
|
|
|
|
func convertToMap(v interface{}) (map[string]interface{}, error) {
|
|
|
|
b, err := json.Marshal(v)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var raw map[string]interface{}
|
|
|
|
if err := json.Unmarshal(b, &raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return raw, nil
|
|
|
|
}
|
2021-03-11 04:05:11 +00:00
|
|
|
|
|
|
|
func Test_mergeServiceConfig_UpstreamOverrides(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
defaults *structs.ServiceConfigResponse
|
|
|
|
service *structs.NodeService
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
want *structs.NodeService
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "new config fields",
|
|
|
|
args: args{
|
|
|
|
defaults: &structs.ServiceConfigResponse{
|
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
{
|
|
|
|
Upstream: structs.ServiceID{
|
|
|
|
ID: "zap",
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
},
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"passive_health_check": map[string]interface{}{
|
|
|
|
"Interval": int64(10),
|
|
|
|
"MaxFailures": int64(2),
|
|
|
|
},
|
|
|
|
"mesh_gateway": map[string]interface{}{
|
|
|
|
"Mode": "local",
|
|
|
|
},
|
|
|
|
"protocol": "grpc",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
service: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"passive_health_check": map[string]interface{}{
|
|
|
|
"Interval": int64(10),
|
|
|
|
"MaxFailures": int64(2),
|
|
|
|
},
|
|
|
|
"protocol": "grpc",
|
|
|
|
},
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeLocal,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "upstream mode from remote defaults overrides local default",
|
|
|
|
args: args{
|
|
|
|
defaults: &structs.ServiceConfigResponse{
|
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
{
|
|
|
|
Upstream: structs.ServiceID{
|
|
|
|
ID: "zap",
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
},
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"mesh_gateway": map[string]interface{}{
|
|
|
|
"Mode": "local",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
service: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeRemote,
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeRemote,
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
Config: map[string]interface{}{},
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeLocal,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "mode in local upstream config overrides all",
|
|
|
|
args: args{
|
|
|
|
defaults: &structs.ServiceConfigResponse{
|
|
|
|
UpstreamIDConfigs: structs.OpaqueUpstreamConfigs{
|
|
|
|
{
|
|
|
|
Upstream: structs.ServiceID{
|
|
|
|
ID: "zap",
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMeta(),
|
|
|
|
},
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"mesh_gateway": map[string]interface{}{
|
|
|
|
"Mode": "local",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
service: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeRemote,
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeNone,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: &structs.NodeService{
|
|
|
|
ID: "foo-proxy",
|
|
|
|
Service: "foo-proxy",
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceName: "foo",
|
|
|
|
DestinationServiceID: "foo",
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeRemote,
|
|
|
|
},
|
|
|
|
Upstreams: structs.Upstreams{
|
|
|
|
structs.Upstream{
|
|
|
|
DestinationNamespace: "default",
|
|
|
|
DestinationName: "zap",
|
|
|
|
Config: map[string]interface{}{},
|
|
|
|
MeshGateway: structs.MeshGatewayConfig{
|
|
|
|
Mode: structs.MeshGatewayModeNone,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got, err := mergeServiceConfig(tt.args.defaults, tt.args.service)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, tt.want, got)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|