Error out `consul connect envoy` if agent explicitly disabled grpc (#15794)
Co-authored-by: Paul Glass <pglass@hashicorp.com>
This commit is contained in:
parent
916d4df29c
commit
87485d05bd
|
@ -0,0 +1,3 @@
|
||||||
|
```release-note:improvement
|
||||||
|
cli: connect envoy command errors if grpc ports are not open
|
||||||
|
```
|
|
@ -8,6 +8,7 @@ import (
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"strings"
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/mitchellh/cli"
|
"github.com/mitchellh/cli"
|
||||||
"github.com/mitchellh/mapstructure"
|
"github.com/mitchellh/mapstructure"
|
||||||
|
@ -70,6 +71,8 @@ type cmd struct {
|
||||||
|
|
||||||
gatewaySvcName string
|
gatewaySvcName string
|
||||||
gatewayKind api.ServiceKind
|
gatewayKind api.ServiceKind
|
||||||
|
|
||||||
|
dialFunc func(network string, address string) (net.Conn, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
const meshGatewayVal = "mesh"
|
const meshGatewayVal = "mesh"
|
||||||
|
@ -206,6 +209,10 @@ func (c *cmd) init() {
|
||||||
flags.Merge(c.flags, c.http.ClientFlags())
|
flags.Merge(c.flags, c.http.ClientFlags())
|
||||||
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
flags.Merge(c.flags, c.http.MultiTenancyFlags())
|
||||||
c.help = flags.Usage(help, c.flags)
|
c.help = flags.Usage(help, c.flags)
|
||||||
|
|
||||||
|
c.dialFunc = func(network string, address string) (net.Conn, error) {
|
||||||
|
return net.DialTimeout(network, address, 3*time.Second)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// canBindInternal is here mainly so we can unit test this with a constant net.Addr list
|
// canBindInternal is here mainly so we can unit test this with a constant net.Addr list
|
||||||
|
@ -486,6 +493,10 @@ func (c *cmd) templateArgs() (*BootstrapTplArgs, error) {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := checkDial(xdsAddr, c.dialFunc); err != nil {
|
||||||
|
return nil, fmt.Errorf("error dialing xDS address: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
adminAddr, adminPort, err := net.SplitHostPort(c.adminBind)
|
adminAddr, adminPort, err := net.SplitHostPort(c.adminBind)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("Invalid Consul HTTP address: %s", err)
|
return nil, fmt.Errorf("Invalid Consul HTTP address: %s", err)
|
||||||
|
@ -657,14 +668,24 @@ func (c *cmd) xdsAddress() (GRPC, error) {
|
||||||
|
|
||||||
addr := c.grpcAddr
|
addr := c.grpcAddr
|
||||||
if addr == "" {
|
if addr == "" {
|
||||||
|
// This lookup is a UX optimization and requires acl policy agent:read,
|
||||||
|
// which sidecars may not have.
|
||||||
port, protocol, err := c.lookupXDSPort()
|
port, protocol, err := c.lookupXDSPort()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
if strings.Contains(err.Error(), "Permission denied") {
|
||||||
|
// Token did not have agent:read. Log and proceed with defaults.
|
||||||
|
c.UI.Info(fmt.Sprintf("Could not query /v1/agent/self for xDS ports: %s", err))
|
||||||
|
} else {
|
||||||
|
// If not a permission denied error, gRPC is explicitly disabled
|
||||||
|
// or something went fatally wrong.
|
||||||
|
return g, fmt.Errorf("Error looking up xDS port: %s", err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if port <= 0 {
|
if port <= 0 {
|
||||||
// This is the dev mode default and recommended production setting if
|
// This is the dev mode default and recommended production setting if
|
||||||
// enabled.
|
// enabled.
|
||||||
port = 8502
|
port = 8502
|
||||||
|
c.UI.Info("-grpc-addr not provided and unable to discover a gRPC address for xDS. Defaulting to localhost:8502")
|
||||||
}
|
}
|
||||||
addr = fmt.Sprintf("%vlocalhost:%v", protocol, port)
|
addr = fmt.Sprintf("%vlocalhost:%v", protocol, port)
|
||||||
}
|
}
|
||||||
|
@ -725,6 +746,9 @@ func (c *cmd) lookupXDSPort() (int, string, error) {
|
||||||
|
|
||||||
var resp response
|
var resp response
|
||||||
if err := mapstructure.Decode(self, &resp); err == nil {
|
if err := mapstructure.Decode(self, &resp); err == nil {
|
||||||
|
if resp.XDS.Ports.TLS < 0 && resp.XDS.Ports.Plaintext < 0 {
|
||||||
|
return 0, "", fmt.Errorf("agent has grpc disabled")
|
||||||
|
}
|
||||||
if resp.XDS.Ports.TLS > 0 {
|
if resp.XDS.Ports.TLS > 0 {
|
||||||
return resp.XDS.Ports.TLS, "https://", nil
|
return resp.XDS.Ports.TLS, "https://", nil
|
||||||
}
|
}
|
||||||
|
@ -733,13 +757,13 @@ func (c *cmd) lookupXDSPort() (int, string, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Fallback to old API for the case where a new consul CLI is being used with
|
// If above TLS and Plaintext ports are both 0, fallback to
|
||||||
// an older API version.
|
// old API for the case where a new consul CLI is being used
|
||||||
|
// with an older API version.
|
||||||
cfg, ok := self["DebugConfig"]
|
cfg, ok := self["DebugConfig"]
|
||||||
if !ok {
|
if !ok {
|
||||||
return 0, "", fmt.Errorf("unexpected agent response: no debug config")
|
return 0, "", fmt.Errorf("unexpected agent response: no debug config")
|
||||||
}
|
}
|
||||||
// TODO what does this mean? What did the old API look like? How does this affect compatibility?
|
|
||||||
port, ok := cfg["GRPCPort"]
|
port, ok := cfg["GRPCPort"]
|
||||||
if !ok {
|
if !ok {
|
||||||
return 0, "", fmt.Errorf("agent does not have grpc port enabled")
|
return 0, "", fmt.Errorf("agent does not have grpc port enabled")
|
||||||
|
@ -752,6 +776,25 @@ func (c *cmd) lookupXDSPort() (int, string, error) {
|
||||||
return int(portN), "", nil
|
return int(portN), "", nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func checkDial(g GRPC, dial func(string, string) (net.Conn, error)) error {
|
||||||
|
var (
|
||||||
|
conn net.Conn
|
||||||
|
err error
|
||||||
|
)
|
||||||
|
if g.AgentSocket != "" {
|
||||||
|
conn, err = dial("unix", g.AgentSocket)
|
||||||
|
} else {
|
||||||
|
conn, err = dial("tcp", fmt.Sprintf("%s:%s", g.AgentAddress, g.AgentPort))
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if conn != nil {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func (c *cmd) Synopsis() string {
|
func (c *cmd) Synopsis() string {
|
||||||
return synopsis
|
return synopsis
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,6 +10,7 @@ import (
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
@ -116,8 +117,9 @@ type generateConfigTestCase struct {
|
||||||
Files map[string]string
|
Files map[string]string
|
||||||
ProxyConfig map[string]interface{}
|
ProxyConfig map[string]interface{}
|
||||||
NamespacesEnabled bool
|
NamespacesEnabled bool
|
||||||
XDSPorts agent.GRPCPorts // only used for testing custom-configured grpc port
|
XDSPorts agent.GRPCPorts // used to mock an agent's configured gRPC ports. Plaintext defaults to 8502 and TLS defaults to 8503.
|
||||||
AgentSelf110 bool // fake the agent API from versions v1.10 and earlier
|
AgentSelf110 bool // fake the agent API from versions v1.10 and earlier
|
||||||
|
DialFunc func(network, address string) (net.Conn, error) // defaults to a no-op function. Overwrite to test error handling.
|
||||||
WantArgs BootstrapTplArgs
|
WantArgs BootstrapTplArgs
|
||||||
WantErr string
|
WantErr string
|
||||||
}
|
}
|
||||||
|
@ -139,6 +141,23 @@ func TestGenerateConfig(t *testing.T) {
|
||||||
Flags: []string{"-node-name", "test-node"},
|
Flags: []string{"-node-name", "test-node"},
|
||||||
WantErr: "'-node-name' requires '-proxy-id'",
|
WantErr: "'-node-name' requires '-proxy-id'",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Name: "gRPC disabled",
|
||||||
|
Flags: []string{"-proxy-id", "test-proxy"},
|
||||||
|
XDSPorts: agent.GRPCPorts{
|
||||||
|
Plaintext: -1,
|
||||||
|
TLS: -1,
|
||||||
|
},
|
||||||
|
WantErr: "agent has grpc disabled",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "connection not available",
|
||||||
|
Flags: []string{"-proxy-id", "test-proxy"},
|
||||||
|
DialFunc: func(network, address string) (net.Conn, error) {
|
||||||
|
return net.DialTimeout(network, address, time.Second)
|
||||||
|
},
|
||||||
|
WantErr: "connection refused",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
Name: "defaults",
|
Name: "defaults",
|
||||||
Flags: []string{"-proxy-id", "test-proxy"},
|
Flags: []string{"-proxy-id", "test-proxy"},
|
||||||
|
@ -544,22 +563,8 @@ func TestGenerateConfig(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "missing-ca-file",
|
Name: "missing-ca-file",
|
||||||
Flags: []string{"-proxy-id", "test-proxy", "-ca-file", "some/path"},
|
Flags: []string{"-proxy-id", "test-proxy", "-ca-file", "some/path"},
|
||||||
WantArgs: BootstrapTplArgs{
|
|
||||||
ProxyCluster: "test-proxy",
|
|
||||||
ProxyID: "test-proxy",
|
|
||||||
// We don't know this til after the lookup so it will be empty in the
|
|
||||||
// initial args call we are testing here.
|
|
||||||
ProxySourceService: "",
|
|
||||||
// Should resolve IP, note this might not resolve the same way
|
|
||||||
// everywhere which might make this test brittle but not sure what else
|
|
||||||
// to do.
|
|
||||||
GRPC: GRPC{
|
|
||||||
AgentAddress: "127.0.0.1",
|
|
||||||
AgentPort: "8502",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
WantErr: "Error loading CA File: open some/path: no such file or directory",
|
WantErr: "Error loading CA File: open some/path: no such file or directory",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -590,22 +595,8 @@ func TestGenerateConfig(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "missing-ca-path",
|
Name: "missing-ca-path",
|
||||||
Flags: []string{"-proxy-id", "test-proxy", "-ca-path", "some/path"},
|
Flags: []string{"-proxy-id", "test-proxy", "-ca-path", "some/path"},
|
||||||
WantArgs: BootstrapTplArgs{
|
|
||||||
ProxyCluster: "test-proxy",
|
|
||||||
ProxyID: "test-proxy",
|
|
||||||
// We don't know this til after the lookup so it will be empty in the
|
|
||||||
// initial args call we are testing here.
|
|
||||||
ProxySourceService: "",
|
|
||||||
// Should resolve IP, note this might not resolve the same way
|
|
||||||
// everywhere which might make this test brittle but not sure what else
|
|
||||||
// to do.
|
|
||||||
GRPC: GRPC{
|
|
||||||
AgentAddress: "127.0.0.1",
|
|
||||||
AgentPort: "8502",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
WantErr: "lstat some/path: no such file or directory",
|
WantErr: "lstat some/path: no such file or directory",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1084,6 +1075,11 @@ func TestGenerateConfig(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Default the ports
|
||||||
|
if tc.XDSPorts.TLS == 0 && tc.XDSPorts.Plaintext == 0 {
|
||||||
|
tc.XDSPorts.Plaintext = 8502
|
||||||
|
}
|
||||||
|
|
||||||
// Run a mock agent API that just always returns the proxy config in the
|
// Run a mock agent API that just always returns the proxy config in the
|
||||||
// test.
|
// test.
|
||||||
var srv *httptest.Server
|
var srv *httptest.Server
|
||||||
|
@ -1106,6 +1102,14 @@ func TestGenerateConfig(t *testing.T) {
|
||||||
// explicitly set the client to one which can connect to the httptest.Server
|
// explicitly set the client to one which can connect to the httptest.Server
|
||||||
c.client = client
|
c.client = client
|
||||||
|
|
||||||
|
if tc.DialFunc != nil {
|
||||||
|
c.dialFunc = tc.DialFunc
|
||||||
|
} else {
|
||||||
|
c.dialFunc = func(_, _ string) (net.Conn, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Run the command
|
// Run the command
|
||||||
myFlags := copyAndReplaceAll(tc.Flags, "@@TEMPDIR@@", testDirPrefix)
|
myFlags := copyAndReplaceAll(tc.Flags, "@@TEMPDIR@@", testDirPrefix)
|
||||||
args := append([]string{"-bootstrap"}, myFlags...)
|
args := append([]string{"-bootstrap"}, myFlags...)
|
||||||
|
|
Loading…
Reference in New Issue