2020-09-09 18:04:33 +00:00
|
|
|
package subscribe
|
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
gogrpc "google.golang.org/grpc"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/state"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/stream"
|
|
|
|
"github.com/hashicorp/consul/agent/grpc"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/consul/proto/pbcommon"
|
|
|
|
"github.com/hashicorp/consul/proto/pbservice"
|
|
|
|
"github.com/hashicorp/consul/proto/pbsubscribe"
|
|
|
|
"github.com/hashicorp/consul/types"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestServer_Subscribe_IntegrationWithBackend(t *testing.T) {
|
|
|
|
backend, err := newTestBackend()
|
|
|
|
require.NoError(t, err)
|
|
|
|
srv := &Server{Backend: backend, Logger: hclog.New(nil)}
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
addr := newTestServer(t, srv)
|
|
|
|
ids := newCounter()
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "other",
|
|
|
|
Address: "2.3.4.5",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "api1",
|
|
|
|
Service: "api",
|
|
|
|
Address: "2.3.4.5",
|
|
|
|
Port: 9000,
|
|
|
|
},
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
require.NoError(t, backend.store.EnsureRegistration(ids.Next("other"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
require.NoError(t, backend.store.EnsureRegistration(ids.Next("reg2"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node2",
|
|
|
|
Address: "1.2.3.4",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
require.NoError(t, backend.store.EnsureRegistration(ids.Next("reg3"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
conn, err := gogrpc.DialContext(ctx, addr.String(), gogrpc.WithInsecure())
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(logError(t, conn.Close))
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(conn)
|
2020-09-09 18:04:33 +00:00
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
|
|
|
})
|
2020-09-25 23:40:10 +00:00
|
|
|
require.NoError(t, err)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
chEvents := make(chan eventOrError, 0)
|
|
|
|
go recvEvents(chEvents, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 3; i++ {
|
2020-09-25 23:40:10 +00:00
|
|
|
snapshotEvents = append(snapshotEvents, getEvent(t, chEvents))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
expected := []*pbsubscribe.Event{
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-25 23:40:10 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
2020-09-25 23:40:10 +00:00
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
2020-09-09 18:04:33 +00:00
|
|
|
Node: "node1",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Address: "3.4.5.6",
|
2020-09-25 23:40:10 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg2", "reg2"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
Service: &pbservice.NodeService{
|
2020-09-09 18:04:33 +00:00
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
2020-09-25 23:40:10 +00:00
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
2020-09-09 18:04:33 +00:00
|
|
|
// Sad empty state
|
2020-09-25 23:40:10 +00:00
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg2", "reg2"),
|
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-25 23:40:10 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
2020-09-25 23:40:10 +00:00
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
2020-09-09 18:04:33 +00:00
|
|
|
Node: "node2",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Address: "1.2.3.4",
|
2020-09-25 23:40:10 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
Service: &pbservice.NodeService{
|
2020-09-09 18:04:33 +00:00
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
2020-09-25 23:40:10 +00:00
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
2020-09-09 18:04:33 +00:00
|
|
|
// Sad empty state
|
2020-09-25 23:40:10 +00:00
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-25 23:40:10 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_EndOfSnapshot{EndOfSnapshot: true},
|
|
|
|
},
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
assertDeepEqual(t, expected, snapshotEvents)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
// Update the registration by adding a check.
|
|
|
|
req.Check = &structs.HealthCheck{
|
|
|
|
Node: "node2",
|
|
|
|
CheckID: types.CheckID("check1"),
|
|
|
|
ServiceID: "redis1",
|
|
|
|
ServiceName: "redis",
|
|
|
|
Name: "check 1",
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
require.NoError(t, backend.store.EnsureRegistration(ids.Next("update"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
event := getEvent(t, chEvents)
|
|
|
|
expectedEvent := &pbsubscribe.Event{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
|
|
|
Index: ids.Last(),
|
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
|
|
|
Node: "node2",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Address: "1.2.3.4",
|
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
|
|
|
},
|
|
|
|
Service: &pbservice.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
|
|
|
// Sad empty state
|
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
|
|
|
},
|
|
|
|
Checks: []*pbservice.HealthCheck{
|
|
|
|
{
|
|
|
|
CheckID: "check1",
|
|
|
|
Name: "check 1",
|
|
|
|
Node: "node2",
|
|
|
|
Status: "critical",
|
|
|
|
ServiceID: "redis1",
|
|
|
|
ServiceName: "redis",
|
|
|
|
RaftIndex: raftIndex(ids, "update", "update"),
|
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-09-25 23:40:10 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
assertDeepEqual(t, expectedEvent, event)
|
|
|
|
}
|
|
|
|
|
|
|
|
type eventOrError struct {
|
|
|
|
event *pbsubscribe.Event
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
|
|
|
// recvEvents from handle and sends them to the provided channel.
|
|
|
|
func recvEvents(ch chan eventOrError, handle pbsubscribe.StateChangeSubscription_SubscribeClient) {
|
|
|
|
defer close(ch)
|
|
|
|
for {
|
|
|
|
event, err := handle.Recv()
|
|
|
|
switch {
|
|
|
|
case errors.Is(err, io.EOF):
|
|
|
|
return
|
|
|
|
case errors.Is(err, context.Canceled), errors.Is(err, context.DeadlineExceeded):
|
|
|
|
return
|
|
|
|
case err != nil:
|
|
|
|
ch <- eventOrError{err: err}
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
ch <- eventOrError{event: event}
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
}
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
func getEvent(t *testing.T, ch chan eventOrError) *pbsubscribe.Event {
|
|
|
|
t.Helper()
|
2020-09-09 18:04:33 +00:00
|
|
|
select {
|
2020-09-25 23:40:10 +00:00
|
|
|
case item := <-ch:
|
|
|
|
require.NoError(t, item.err)
|
|
|
|
return item.event
|
|
|
|
case <-time.After(10 * time.Second):
|
|
|
|
t.Fatalf("timeout waiting on event from server")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func assertDeepEqual(t *testing.T, x, y interface{}) {
|
|
|
|
t.Helper()
|
|
|
|
if diff := cmp.Diff(x, y); diff != "" {
|
|
|
|
t.Fatalf("assertion failed: values are not equal\n--- expected\n+++ actual\n%v", diff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type testBackend struct {
|
2020-09-28 19:43:29 +00:00
|
|
|
store *state.Store
|
|
|
|
authorizer acl.Authorizer
|
|
|
|
forwardConn *gogrpc.ClientConn
|
2020-09-25 23:40:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b testBackend) ResolveToken(_ string) (acl.Authorizer, error) {
|
|
|
|
return b.authorizer, nil
|
|
|
|
}
|
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
func (b testBackend) Forward(_ string, fn func(*gogrpc.ClientConn) error) (handled bool, err error) {
|
|
|
|
if b.forwardConn != nil {
|
|
|
|
return true, fn(b.forwardConn)
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b testBackend) Subscribe(req *stream.SubscribeRequest) (*stream.Subscription, error) {
|
|
|
|
return b.store.EventPublisher().Subscribe(req)
|
|
|
|
}
|
|
|
|
|
|
|
|
func newTestBackend() (*testBackend, error) {
|
|
|
|
gc, err := state.NewTombstoneGC(time.Second, time.Millisecond)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
store, err := state.NewStateStore(gc)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
return &testBackend{store: store, authorizer: acl.AllowAll()}, nil
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
var _ Backend = (*testBackend)(nil)
|
|
|
|
|
|
|
|
func newTestServer(t *testing.T, server *Server) net.Addr {
|
|
|
|
addr := &net.IPAddr{IP: net.ParseIP("127.0.0.1")}
|
|
|
|
var grpcServer *gogrpc.Server
|
|
|
|
handler := grpc.NewHandler(addr, func(srv *gogrpc.Server) {
|
|
|
|
grpcServer = srv
|
|
|
|
pbsubscribe.RegisterStateChangeSubscriptionServer(srv, server)
|
|
|
|
})
|
|
|
|
|
|
|
|
lis, err := net.Listen("tcp", "127.0.0.1:0")
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(logError(t, lis.Close))
|
|
|
|
|
|
|
|
go grpcServer.Serve(lis)
|
|
|
|
g := new(errgroup.Group)
|
|
|
|
g.Go(func() error {
|
|
|
|
return grpcServer.Serve(lis)
|
|
|
|
})
|
|
|
|
t.Cleanup(func() {
|
|
|
|
if err := handler.Shutdown(); err != nil {
|
|
|
|
t.Logf("grpc server shutdown: %v", err)
|
|
|
|
}
|
|
|
|
if err := g.Wait(); err != nil {
|
|
|
|
t.Logf("grpc server error: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
return lis.Addr()
|
|
|
|
}
|
|
|
|
|
|
|
|
type counter struct {
|
|
|
|
value uint64
|
|
|
|
labels map[string]uint64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *counter) Next(label string) uint64 {
|
|
|
|
c.value++
|
|
|
|
c.labels[label] = c.value
|
|
|
|
return c.value
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *counter) For(label string) uint64 {
|
|
|
|
return c.labels[label]
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *counter) Last() uint64 {
|
|
|
|
return c.value
|
|
|
|
}
|
|
|
|
|
|
|
|
func newCounter() *counter {
|
|
|
|
return &counter{labels: make(map[string]uint64)}
|
|
|
|
}
|
|
|
|
|
|
|
|
func raftIndex(ids *counter, created, modified string) pbcommon.RaftIndex {
|
|
|
|
return pbcommon.RaftIndex{
|
|
|
|
CreateIndex: ids.For(created),
|
|
|
|
ModifyIndex: ids.For(modified),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
func TestServer_Subscribe_IntegrationWithBackend_ForwardToDC(t *testing.T) {
|
|
|
|
backendLocal, err := newTestBackend()
|
|
|
|
require.NoError(t, err)
|
|
|
|
addrLocal := newTestServer(t, &Server{Backend: backendLocal, Logger: hclog.New(nil)})
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
backendRemoteDC, err := newTestBackend()
|
|
|
|
require.NoError(t, err)
|
|
|
|
srvRemoteDC := &Server{Backend: backendRemoteDC, Logger: hclog.New(nil)}
|
|
|
|
addrRemoteDC := newTestServer(t, srvRemoteDC)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
|
|
t.Cleanup(cancel)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
connRemoteDC, err := gogrpc.DialContext(ctx, addrRemoteDC.String(), gogrpc.WithInsecure())
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(logError(t, connRemoteDC.Close))
|
|
|
|
backendLocal.forwardConn = connRemoteDC
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
ids := newCounter()
|
2020-09-09 18:04:33 +00:00
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "other",
|
|
|
|
Address: "2.3.4.5",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "api1",
|
|
|
|
Service: "api",
|
|
|
|
Address: "2.3.4.5",
|
|
|
|
Port: 9000,
|
|
|
|
},
|
|
|
|
}
|
2020-09-28 19:43:29 +00:00
|
|
|
require.NoError(t, backendRemoteDC.store.EnsureRegistration(ids.Next("req1"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
2020-09-28 19:43:29 +00:00
|
|
|
require.NoError(t, backendRemoteDC.store.EnsureRegistration(ids.Next("reg2"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node2",
|
|
|
|
Address: "1.2.3.4",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
2020-09-28 19:43:29 +00:00
|
|
|
require.NoError(t, backendRemoteDC.store.EnsureRegistration(ids.Next("reg3"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
connLocal, err := gogrpc.DialContext(ctx, addrLocal.String(), gogrpc.WithInsecure())
|
|
|
|
require.NoError(t, err)
|
|
|
|
t.Cleanup(logError(t, connLocal.Close))
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
streamClient := pbsubscribe.NewStateChangeSubscriptionClient(connLocal)
|
2020-09-09 18:04:33 +00:00
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
})
|
2020-09-28 19:43:29 +00:00
|
|
|
require.NoError(t, err)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
chEvents := make(chan eventOrError, 0)
|
|
|
|
go recvEvents(chEvents, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 3; i++ {
|
2020-09-28 19:43:29 +00:00
|
|
|
snapshotEvents = append(snapshotEvents, getEvent(t, chEvents))
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
expected := []*pbsubscribe.Event{
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-28 19:43:29 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
2020-09-28 19:43:29 +00:00
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
2020-09-09 18:04:33 +00:00
|
|
|
Node: "node1",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Address: "3.4.5.6",
|
2020-09-28 19:43:29 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg2", "reg2"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
Service: &pbservice.NodeService{
|
2020-09-09 18:04:33 +00:00
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
2020-09-28 19:43:29 +00:00
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
2020-09-09 18:04:33 +00:00
|
|
|
// Sad empty state
|
2020-09-28 19:43:29 +00:00
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
|
|
|
RaftIndex: raftIndex(ids, "reg2", "reg2"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-28 19:43:29 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
2020-09-28 19:43:29 +00:00
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
2020-09-09 18:04:33 +00:00
|
|
|
Node: "node2",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Address: "1.2.3.4",
|
2020-09-28 19:43:29 +00:00
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
Service: &pbservice.NodeService{
|
2020-09-09 18:04:33 +00:00
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
2020-09-28 19:43:29 +00:00
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
2020-09-09 18:04:33 +00:00
|
|
|
// Sad empty state
|
2020-09-28 19:43:29 +00:00
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
2020-09-28 19:43:29 +00:00
|
|
|
Index: ids.Last(),
|
2020-09-09 18:04:33 +00:00
|
|
|
Payload: &pbsubscribe.Event_EndOfSnapshot{EndOfSnapshot: true},
|
|
|
|
},
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
assertDeepEqual(t, expected, snapshotEvents)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
// Update the registration by adding a check.
|
|
|
|
req.Check = &structs.HealthCheck{
|
|
|
|
Node: "node2",
|
|
|
|
CheckID: types.CheckID("check1"),
|
|
|
|
ServiceID: "redis1",
|
|
|
|
ServiceName: "redis",
|
|
|
|
Name: "check 1",
|
|
|
|
}
|
2020-09-28 19:43:29 +00:00
|
|
|
require.NoError(t, backendRemoteDC.store.EnsureRegistration(ids.Next("update"), req))
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
event := getEvent(t, chEvents)
|
|
|
|
expectedEvent := &pbsubscribe.Event{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
|
|
|
Index: ids.Last(),
|
|
|
|
Payload: &pbsubscribe.Event_ServiceHealth{
|
|
|
|
ServiceHealth: &pbsubscribe.ServiceHealthUpdate{
|
|
|
|
Op: pbsubscribe.CatalogOp_Register,
|
|
|
|
CheckServiceNode: &pbservice.CheckServiceNode{
|
|
|
|
Node: &pbservice.Node{
|
|
|
|
Node: "node2",
|
|
|
|
Datacenter: "dc2",
|
|
|
|
Address: "1.2.3.4",
|
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
|
|
|
},
|
|
|
|
Service: &pbservice.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
Port: 8080,
|
|
|
|
RaftIndex: raftIndex(ids, "reg3", "reg3"),
|
|
|
|
Weights: &pbservice.Weights{Passing: 1, Warning: 1},
|
|
|
|
// Sad empty state
|
|
|
|
Proxy: pbservice.ConnectProxyConfig{
|
|
|
|
MeshGateway: pbservice.MeshGatewayConfig{},
|
|
|
|
Expose: pbservice.ExposeConfig{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
|
|
|
},
|
|
|
|
Checks: []*pbservice.HealthCheck{
|
|
|
|
{
|
|
|
|
CheckID: "check1",
|
|
|
|
Name: "check 1",
|
|
|
|
Node: "node2",
|
|
|
|
Status: "critical",
|
|
|
|
ServiceID: "redis1",
|
|
|
|
ServiceName: "redis",
|
|
|
|
RaftIndex: raftIndex(ids, "update", "update"),
|
|
|
|
EnterpriseMeta: pbcommon.EnterpriseMeta{},
|
2020-09-09 18:04:33 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-09-28 19:43:29 +00:00
|
|
|
},
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
2020-09-28 19:43:29 +00:00
|
|
|
assertDeepEqual(t, expectedEvent, event)
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|
|
|
|
|
2020-09-28 19:43:29 +00:00
|
|
|
/* TODO
|
2020-09-09 18:04:33 +00:00
|
|
|
func TestStreaming_Subscribe_SkipSnapshot(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
dir1, server := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.Bootstrap = true
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer server.Shutdown()
|
|
|
|
codec := rpcClient(t, server)
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
dir2, client := testClientWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.NodeName = uniqueNodeName(t.Name())
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a dummy node with our service on it.
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out struct{}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "Catalog.Register", &req, &out))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint.
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
|
|
|
|
var index uint64
|
|
|
|
{
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save the index from the event
|
|
|
|
index = snapshotEvents[0].Index
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start another Subscribe call passing the index from the last event.
|
|
|
|
{
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "redis",
|
|
|
|
Index: index,
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
// We should get no snapshot and the first event should be "resume stream"
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
require.True(event.GetResumeStream())
|
|
|
|
case <-time.After(500 * time.Millisecond):
|
|
|
|
t.Fatalf("never got event")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait and make sure there aren't any events coming. The server shouldn't send
|
|
|
|
// a snapshot and we haven't made any updates to the catalog that would trigger
|
|
|
|
// more events.
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
t.Fatalf("got another event: %v", event)
|
|
|
|
case <-time.After(500 * time.Millisecond):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStreaming_Subscribe_FilterACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
dir, _, server, codec := testACLFilterServerWithConfigFn(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLsEnabled = true
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
c.ACLEnforceVersion8 = true
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer server.Shutdown()
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
dir2, client := testClientWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.NodeName = uniqueNodeName(t.Name())
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1", testrpc.WithToken("root"))
|
|
|
|
|
|
|
|
// Create a policy for the test token.
|
|
|
|
policyReq := structs.ACLPolicySetRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Policy: structs.ACLPolicy{
|
|
|
|
Description: "foobar",
|
|
|
|
Name: "baz",
|
|
|
|
Rules: fmt.Sprintf(`
|
|
|
|
service "foo" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
node "%s" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
`, server.config.NodeName),
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
resp := structs.ACLPolicy{}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "ACL.PolicySet", &policyReq, &resp))
|
|
|
|
|
|
|
|
// Create a new token that only has access to one node.
|
|
|
|
var token structs.ACLToken
|
|
|
|
arg := structs.ACLTokenSetRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
ACLToken: structs.ACLToken{
|
|
|
|
Policies: []structs.ACLTokenPolicyLink{
|
|
|
|
structs.ACLTokenPolicyLink{
|
|
|
|
ID: resp.ID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "ACL.TokenSet", &arg, &token))
|
|
|
|
auth, err := server.ResolveToken(token.SecretID)
|
|
|
|
require.NoError(err)
|
|
|
|
require.Equal(auth.NodeRead("denied", nil), acl.Deny)
|
|
|
|
|
|
|
|
// Register another instance of service foo on a fake node the token doesn't have access to.
|
|
|
|
regArg := structs.RegisterRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Node: "denied",
|
|
|
|
Address: "127.0.0.1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "foo",
|
|
|
|
Service: "foo",
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "Catalog.Register", ®Arg, nil))
|
|
|
|
|
|
|
|
// Set up the gRPC client.
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint for the service we have access to.
|
|
|
|
{
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "foo",
|
|
|
|
Token: token.SecretID,
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
// Read events off the pbsubscribe. We should not see any events for the filtered node.
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(5 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
require.Len(snapshotEvents, 2)
|
|
|
|
require.Equal("foo", snapshotEvents[0].GetServiceHealth().CheckServiceNode.Service.Service)
|
|
|
|
require.Equal(server.config.NodeName, snapshotEvents[0].GetServiceHealth().CheckServiceNode.Node.Node)
|
|
|
|
require.True(snapshotEvents[1].GetEndOfSnapshot())
|
|
|
|
|
|
|
|
// Update the service with a new port to trigger a new event.
|
|
|
|
regArg := structs.RegisterRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Node: server.config.NodeName,
|
|
|
|
Address: "127.0.0.1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "foo",
|
|
|
|
Service: "foo",
|
|
|
|
Port: 1234,
|
|
|
|
},
|
|
|
|
Check: &structs.HealthCheck{
|
|
|
|
CheckID: "service:foo",
|
|
|
|
Name: "service:foo",
|
|
|
|
ServiceID: "foo",
|
|
|
|
Status: api.HealthPassing,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "Catalog.Register", ®Arg, nil))
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
service := event.GetServiceHealth().CheckServiceNode.Service
|
|
|
|
require.Equal("foo", service.Service)
|
|
|
|
require.Equal(1234, service.Port)
|
|
|
|
case <-time.After(5 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now update the service on the denied node and make sure we don't see an event.
|
|
|
|
regArg = structs.RegisterRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Node: "denied",
|
|
|
|
Address: "127.0.0.1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "foo",
|
|
|
|
Service: "foo",
|
|
|
|
Port: 2345,
|
|
|
|
},
|
|
|
|
Check: &structs.HealthCheck{
|
|
|
|
CheckID: "service:foo",
|
|
|
|
Name: "service:foo",
|
|
|
|
ServiceID: "foo",
|
|
|
|
Status: api.HealthPassing,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "Catalog.Register", ®Arg, nil))
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
t.Fatalf("should not have received event: %v", event)
|
|
|
|
case <-time.After(500 * time.Millisecond):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start another subscribe call for bar, which the token shouldn't have access to.
|
|
|
|
{
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "bar",
|
|
|
|
Token: token.SecretID,
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
require.True(event.GetEndOfSnapshot())
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatal("did not receive event")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the service and make sure we don't get a new event.
|
|
|
|
regArg := structs.RegisterRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Node: server.config.NodeName,
|
|
|
|
Address: "127.0.0.1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "bar",
|
|
|
|
Service: "bar",
|
|
|
|
Port: 2345,
|
|
|
|
},
|
|
|
|
Check: &structs.HealthCheck{
|
|
|
|
CheckID: "service:bar",
|
|
|
|
Name: "service:bar",
|
|
|
|
ServiceID: "bar",
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "Catalog.Register", ®Arg, nil))
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
t.Fatalf("should not have received event: %v", event)
|
|
|
|
case <-time.After(500 * time.Millisecond):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStreaming_Subscribe_ACLUpdate(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
dir, _, server, codec := testACLFilterServerWithConfigFn(t, func(c *Config) {
|
|
|
|
c.ACLDatacenter = "dc1"
|
|
|
|
c.ACLsEnabled = true
|
|
|
|
c.ACLMasterToken = "root"
|
|
|
|
c.ACLDefaultPolicy = "deny"
|
|
|
|
c.ACLEnforceVersion8 = true
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer server.Shutdown()
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
dir2, client := testClientWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.NodeName = uniqueNodeName(t.Name())
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1", testrpc.WithToken("root"))
|
|
|
|
|
|
|
|
// Create a new token/policy that only has access to one node.
|
|
|
|
var token structs.ACLToken
|
|
|
|
|
|
|
|
policy, err := upsertTestPolicyWithRules(codec, "root", "dc1", fmt.Sprintf(`
|
|
|
|
service "foo" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
node "%s" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
`, server.config.NodeName))
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
arg := structs.ACLTokenSetRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
ACLToken: structs.ACLToken{
|
|
|
|
Description: "Service/node token",
|
|
|
|
Policies: []structs.ACLTokenPolicyLink{
|
|
|
|
structs.ACLTokenPolicyLink{
|
|
|
|
ID: policy.ID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Local: false,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "ACL.TokenSet", &arg, &token))
|
|
|
|
auth, err := server.ResolveToken(token.SecretID)
|
|
|
|
require.NoError(err)
|
|
|
|
require.Equal(auth.NodeRead("denied", nil), acl.Deny)
|
|
|
|
|
|
|
|
// Set up the gRPC client.
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint for the service we have access to.
|
|
|
|
{
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: pbsubscribe.Topic_ServiceHealth,
|
|
|
|
Key: "foo",
|
|
|
|
Token: token.SecretID,
|
|
|
|
})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
// Read events off the pbsubscribe.
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(5 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
require.Len(snapshotEvents, 2)
|
|
|
|
require.Equal("foo", snapshotEvents[0].GetServiceHealth().CheckServiceNode.Service.Service)
|
|
|
|
require.Equal(server.config.NodeName, snapshotEvents[0].GetServiceHealth().CheckServiceNode.Node.Node)
|
|
|
|
require.True(snapshotEvents[1].GetEndOfSnapshot())
|
|
|
|
|
|
|
|
// Update a different token and make sure we don't see an event.
|
|
|
|
arg2 := structs.ACLTokenSetRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
ACLToken: structs.ACLToken{
|
|
|
|
Description: "Ignored token",
|
|
|
|
Policies: []structs.ACLTokenPolicyLink{
|
|
|
|
structs.ACLTokenPolicyLink{
|
|
|
|
ID: policy.ID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Local: false,
|
|
|
|
},
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
var ignoredToken structs.ACLToken
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "ACL.TokenSet", &arg2, &ignoredToken))
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
t.Fatalf("should not have received event: %v", event)
|
|
|
|
case <-time.After(500 * time.Millisecond):
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update our token to trigger a refresh event.
|
|
|
|
token.Policies = []structs.ACLTokenPolicyLink{}
|
|
|
|
arg := structs.ACLTokenSetRequest{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
ACLToken: token,
|
|
|
|
WriteRequest: structs.WriteRequest{Token: "root"},
|
|
|
|
}
|
|
|
|
require.NoError(msgpackrpc.CallWithCodec(codec, "ACL.TokenSet", &arg, &token))
|
|
|
|
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
require.True(event.GetResetStream())
|
|
|
|
// 500 ms was not enough in CI apparently...
|
|
|
|
case <-time.After(2 * time.Second):
|
|
|
|
t.Fatalf("did not receive reload event")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStreaming_TLSEnabled(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
dir1, conf1 := testServerConfig(t)
|
|
|
|
conf1.VerifyIncoming = true
|
|
|
|
conf1.VerifyOutgoing = true
|
|
|
|
conf1.GRPCEnabled = true
|
|
|
|
configureTLS(conf1)
|
|
|
|
server, err := newServer(conf1)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer server.Shutdown()
|
|
|
|
|
|
|
|
dir2, conf2 := testClientConfig(t)
|
|
|
|
conf2.VerifyOutgoing = true
|
|
|
|
conf2.GRPCEnabled = true
|
|
|
|
configureTLS(conf2)
|
|
|
|
client, err := NewClient(conf2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a dummy node with our service on it.
|
|
|
|
{
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis1",
|
|
|
|
Service: "redis",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Port: 8080,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out struct{}
|
|
|
|
require.NoError(server.RPC("Catalog.Register", &req, &out))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint from the client.
|
|
|
|
{
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the snapshot events come back with no issues.
|
|
|
|
require.Len(snapshotEvents, 2)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start a Subscribe call to our streaming endpoint from the server's loopback client.
|
|
|
|
{
|
|
|
|
conn, err := server.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
retryFailedConn(t, conn)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamHandle, err := streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// Start a goroutine to read updates off the pbsubscribe.
|
|
|
|
eventCh := make(chan *pbsubscribe.Event, 0)
|
2020-09-25 23:40:10 +00:00
|
|
|
go recvEvents(t, eventCh, streamHandle)
|
2020-09-09 18:04:33 +00:00
|
|
|
|
|
|
|
var snapshotEvents []*pbsubscribe.Event
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
select {
|
|
|
|
case event := <-eventCh:
|
|
|
|
snapshotEvents = append(snapshotEvents, event)
|
|
|
|
case <-time.After(3 * time.Second):
|
|
|
|
t.Fatalf("did not receive events past %d", len(snapshotEvents))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the snapshot events come back with no issues.
|
|
|
|
require.Len(snapshotEvents, 2)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStreaming_TLSReload(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Set up a server with initially bad certificates.
|
|
|
|
require := require.New(t)
|
|
|
|
dir1, conf1 := testServerConfig(t)
|
|
|
|
conf1.VerifyIncoming = true
|
|
|
|
conf1.VerifyOutgoing = true
|
|
|
|
conf1.CAFile = "../../test/ca/root.cer"
|
|
|
|
conf1.CertFile = "../../test/key/ssl-cert-snakeoil.pem"
|
|
|
|
conf1.KeyFile = "../../test/key/ssl-cert-snakeoil.key"
|
|
|
|
conf1.GRPCEnabled = true
|
|
|
|
|
|
|
|
server, err := newServer(conf1)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer server.Shutdown()
|
|
|
|
|
|
|
|
// Set up a client with valid certs and verify_outgoing = true
|
|
|
|
dir2, conf2 := testClientConfig(t)
|
|
|
|
conf2.VerifyOutgoing = true
|
|
|
|
conf2.GRPCEnabled = true
|
|
|
|
configureTLS(conf2)
|
|
|
|
client, err := NewClient(conf2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
|
|
|
|
// Subscribe calls should fail initially
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
{
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
_, err = streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
require.Error(err, "tls: bad certificate")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reload the server with valid certs
|
|
|
|
newConf := server.config.ToTLSUtilConfig()
|
|
|
|
newConf.CertFile = "../../test/key/ourdomain.cer"
|
|
|
|
newConf.KeyFile = "../../test/key/ourdomain.key"
|
|
|
|
server.tlsConfigurator.Update(newConf)
|
|
|
|
|
|
|
|
// Try the subscribe call again
|
|
|
|
{
|
|
|
|
retryFailedConn(t, conn)
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
_, err = streamClient.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
require.NoError(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// retryFailedConn forces the ClientConn to reset its backoff timer and retry the connection,
|
|
|
|
// to simulate the client eventually retrying after the initial failure. This is used both to simulate
|
|
|
|
// retrying after an expected failure as well as to avoid flakiness when running many tests in parallel.
|
|
|
|
func retryFailedConn(t *testing.T, conn *grpc.ClientConn) {
|
|
|
|
state := conn.GetState()
|
|
|
|
if state.String() != "TRANSIENT_FAILURE" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the connection has failed, retry and wait for a state change.
|
|
|
|
conn.ResetConnectBackoff()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
require.True(t, conn.WaitForStateChange(ctx, state))
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestStreaming_DeliversAllMessages(t *testing.T) {
|
|
|
|
// This is a fuzz/probabilistic test to try to provoke streaming into dropping
|
|
|
|
// messages. There is a bug in the initial implementation that should make
|
|
|
|
// this fail. While we can't be certain a pass means it's correct, it is
|
|
|
|
// useful for finding bugs in our concurrency design.
|
|
|
|
|
|
|
|
// The issue is that when updates are coming in fast such that updates occur
|
|
|
|
// in between us making the snapshot and beginning the stream updates, we
|
|
|
|
// shouldn't miss anything.
|
|
|
|
|
|
|
|
// To test this, we will run a background goroutine that will write updates as
|
|
|
|
// fast as possible while we then try to stream the results and ensure that we
|
|
|
|
// see every change. We'll make the updates monotonically increasing so we can
|
|
|
|
// easily tell if we missed one.
|
|
|
|
|
|
|
|
require := require.New(t)
|
|
|
|
dir1, server := testServerWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.Bootstrap = true
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir1)
|
|
|
|
defer server.Shutdown()
|
|
|
|
codec := rpcClient(t, server)
|
|
|
|
defer codec.Close()
|
|
|
|
|
|
|
|
dir2, client := testClientWithConfig(t, func(c *Config) {
|
|
|
|
c.Datacenter = "dc1"
|
|
|
|
c.NodeName = uniqueNodeName(t.Name())
|
|
|
|
c.GRPCEnabled = true
|
|
|
|
})
|
|
|
|
defer os.RemoveAll(dir2)
|
|
|
|
defer client.Shutdown()
|
|
|
|
|
|
|
|
// Try to join
|
|
|
|
testrpc.WaitForLeader(t, server.RPC, "dc1")
|
|
|
|
joinLAN(t, client, server)
|
|
|
|
testrpc.WaitForTestAgent(t, client.RPC, "dc1")
|
|
|
|
|
|
|
|
// Register a whole bunch of service instances so that the initial snapshot on
|
|
|
|
// subscribe is big enough to take a bit of time to load giving more
|
|
|
|
// opportunity for missed updates if there is a bug.
|
|
|
|
for i := 0; i < 1000; i++ {
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: fmt.Sprintf("node-redis-%03d", i),
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: fmt.Sprintf("redis-%03d", i),
|
|
|
|
Service: "redis",
|
|
|
|
Port: 11211,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
var out struct{}
|
|
|
|
require.NoError(server.RPC("Catalog.Register", &req, &out))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start background writer
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// Update the registration with a monotonically increasing port as fast as
|
|
|
|
// we can.
|
|
|
|
req := &structs.RegisterRequest{
|
|
|
|
Node: "node1",
|
|
|
|
Address: "3.4.5.6",
|
|
|
|
Datacenter: "dc1",
|
|
|
|
Service: &structs.NodeService{
|
|
|
|
ID: "redis-canary",
|
|
|
|
Service: "redis",
|
|
|
|
Port: 0,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var out struct{}
|
|
|
|
require.NoError(server.RPC("Catalog.Register", &req, &out))
|
|
|
|
req.Service.Port++
|
|
|
|
if req.Service.Port > 100 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
time.Sleep(1 * time.Millisecond)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Now start a whole bunch of streamers in parallel to maximise chance of
|
|
|
|
// catching a race.
|
|
|
|
conn, err := client.GRPCConn()
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
streamClient := pbsubscribe.NewConsulClient(conn)
|
|
|
|
|
|
|
|
n := 5
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
var updateCount uint64
|
|
|
|
// Buffered error chan so that workers can exit and terminate wg without
|
|
|
|
// blocking on send. We collect errors this way since t isn't thread safe.
|
|
|
|
errCh := make(chan error, n)
|
|
|
|
for i := 0; i < n; i++ {
|
|
|
|
wg.Add(1)
|
|
|
|
go verifyMonotonicStreamUpdates(ctx, t, streamClient, &wg, i, &updateCount, errCh)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait until all subscribers have verified the first bunch of updates all got
|
|
|
|
// delivered.
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
close(errCh)
|
|
|
|
|
|
|
|
// Require that none of them errored. Since we closed the chan above this loop
|
|
|
|
// should terminate immediately if no errors were buffered.
|
|
|
|
for err := range errCh {
|
|
|
|
require.NoError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sanity check that at least some non-snapshot messages were delivered. We
|
|
|
|
// can't know exactly how many because it's timing dependent based on when
|
|
|
|
// each subscribers snapshot occurs.
|
|
|
|
require.True(atomic.LoadUint64(&updateCount) > 0,
|
|
|
|
"at least some of the subscribers should have received non-snapshot updates")
|
|
|
|
}
|
|
|
|
|
|
|
|
type testLogger interface {
|
|
|
|
Logf(format string, args ...interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
func verifyMonotonicStreamUpdates(ctx context.Context, logger testLogger, client pbsubscribe.StateChangeSubscriptionClient, wg *sync.WaitGroup, i int, updateCount *uint64, errCh chan<- error) {
|
|
|
|
defer wg.Done()
|
|
|
|
streamHandle, err := client.Subscribe(ctx, &pbsubscribe.SubscribeRequest{Topic: pbsubscribe.Topic_ServiceHealth, Key: "redis"})
|
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), "context deadline exceeded") ||
|
|
|
|
strings.Contains(err.Error(), "context canceled") {
|
|
|
|
logger.Logf("subscriber %05d: context cancelled before loop")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
errCh <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
snapshotDone := false
|
|
|
|
expectPort := 0
|
|
|
|
for {
|
|
|
|
event, err := streamHandle.Recv()
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(err.Error(), "context deadline exceeded") ||
|
|
|
|
strings.Contains(err.Error(), "context canceled") {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
errCh <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore snapshot message
|
|
|
|
if event.GetEndOfSnapshot() || event.GetResumeStream() {
|
|
|
|
snapshotDone = true
|
|
|
|
logger.Logf("subscriber %05d: snapshot done, expect next port to be %d", i, expectPort)
|
|
|
|
} else if snapshotDone {
|
|
|
|
// Verify we get all updates in order
|
|
|
|
svc, err := svcOrErr(event)
|
|
|
|
if err != nil {
|
|
|
|
errCh <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if expectPort != svc.Port {
|
|
|
|
errCh <- fmt.Errorf("subscriber %05d: missed %d update(s)!", i, svc.Port-expectPort)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
atomic.AddUint64(updateCount, 1)
|
|
|
|
logger.Logf("subscriber %05d: got event with correct port=%d", i, expectPort)
|
|
|
|
expectPort++
|
|
|
|
} else {
|
|
|
|
// This is a snapshot update. Check if it's an update for the canary
|
|
|
|
// instance that got applied before our snapshot was sent (likely)
|
|
|
|
svc, err := svcOrErr(event)
|
|
|
|
if err != nil {
|
|
|
|
errCh <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if svc.ID == "redis-canary" {
|
|
|
|
// Update the expected port we see in the next update to be one more
|
|
|
|
// than the port in the snapshot.
|
|
|
|
expectPort = svc.Port + 1
|
|
|
|
logger.Logf("subscriber %05d: saw canary in snapshot with port %d", i, svc.Port)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if expectPort > 100 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func svcOrErr(event *pbsubscribe.Event) (*pbservice.NodeService, error) {
|
|
|
|
health := event.GetServiceHealth()
|
|
|
|
if health == nil {
|
|
|
|
return nil, fmt.Errorf("not a health event: %#v", event)
|
|
|
|
}
|
|
|
|
csn := health.CheckServiceNode
|
|
|
|
if csn == nil {
|
|
|
|
return nil, fmt.Errorf("nil CSN: %#v", event)
|
|
|
|
}
|
|
|
|
if csn.Service == nil {
|
|
|
|
return nil, fmt.Errorf("nil service: %#v", event)
|
|
|
|
}
|
|
|
|
return csn.Service, nil
|
|
|
|
}
|
2020-09-25 23:40:10 +00:00
|
|
|
*/
|
2020-09-09 18:04:33 +00:00
|
|
|
|
2020-09-25 23:40:10 +00:00
|
|
|
func logError(t *testing.T, f func() error) func() {
|
|
|
|
return func() {
|
|
|
|
if err := f(); err != nil {
|
|
|
|
t.Logf(err.Error())
|
|
|
|
}
|
|
|
|
}
|
2020-09-09 18:04:33 +00:00
|
|
|
}
|