Merge pull request #9160 from hashicorp/dnephin/go-test-race-in-to-out-list

ci: change go-test-race package list to exclude list
This commit is contained in:
Daniel Nephin 2020-11-17 13:13:38 -05:00 committed by GitHub
commit d9af48afce
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
11 changed files with 27 additions and 54 deletions

View file

@ -236,16 +236,15 @@ jobs:
name: go test -race name: go test -race
command: | command: |
mkdir -p $TEST_RESULTS_DIR /tmp/jsonfile mkdir -p $TEST_RESULTS_DIR /tmp/jsonfile
pkgs="$(go list ./... | \
grep -E -v '^github.com/hashicorp/consul/agent(/consul|/local|/xds|/routine-leak-checker)?$' | \
grep -E -v '^github.com/hashicorp/consul/command/')"
gotestsum \ gotestsum \
--format=short-verbose \
--jsonfile /tmp/jsonfile/go-test-race.log \ --jsonfile /tmp/jsonfile/go-test-race.log \
--junitfile $TEST_RESULTS_DIR/gotestsum-report.xml -- \ --junitfile $TEST_RESULTS_DIR/gotestsum-report.xml -- \
-tags="$GOTAGS" -p 2 \ -tags="$GOTAGS" -p 2 \
-race -gcflags=all=-d=checkptr=0 \ -race -gcflags=all=-d=checkptr=0 \
./agent/{ae,cache,cache-types,checks,config,pool,proxycfg,router}/... \ $pkgs
./agent/consul/{authmethod,fsm,state,stream}/... \
./agent/{grpc,rpc,rpcclient,submatview}/... \
./snapshot
- store_test_results: - store_test_results:
path: *TEST_RESULTS_DIR path: *TEST_RESULTS_DIR

View file

@ -195,8 +195,6 @@ func (m *mockAuthorizer) Snapshot(ctx *AuthorizerContext) EnforcementDecision {
} }
func TestACL_Enforce(t *testing.T) { func TestACL_Enforce(t *testing.T) {
t.Parallel()
type testCase struct { type testCase struct {
method string method string
resource Resource resource Resource

View file

@ -94,11 +94,7 @@ func (authz testAuthorizer) Snapshot(*AuthorizerContext) EnforcementDecision {
} }
func TestChainedAuthorizer(t *testing.T) { func TestChainedAuthorizer(t *testing.T) {
t.Parallel()
t.Run("No Authorizers", func(t *testing.T) { t.Run("No Authorizers", func(t *testing.T) {
t.Parallel()
authz := NewChainedAuthorizer([]Authorizer{}) authz := NewChainedAuthorizer([]Authorizer{})
checkDenyACLRead(t, authz, "foo", nil) checkDenyACLRead(t, authz, "foo", nil)
checkDenyACLWrite(t, authz, "foo", nil) checkDenyACLWrite(t, authz, "foo", nil)
@ -129,8 +125,6 @@ func TestChainedAuthorizer(t *testing.T) {
}) })
t.Run("Authorizer Defaults", func(t *testing.T) { t.Run("Authorizer Defaults", func(t *testing.T) {
t.Parallel()
authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Default)}) authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Default)})
checkDenyACLRead(t, authz, "foo", nil) checkDenyACLRead(t, authz, "foo", nil)
checkDenyACLWrite(t, authz, "foo", nil) checkDenyACLWrite(t, authz, "foo", nil)
@ -161,8 +155,6 @@ func TestChainedAuthorizer(t *testing.T) {
}) })
t.Run("Authorizer No Defaults", func(t *testing.T) { t.Run("Authorizer No Defaults", func(t *testing.T) {
t.Parallel()
authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Allow)}) authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Allow)})
checkAllowACLRead(t, authz, "foo", nil) checkAllowACLRead(t, authz, "foo", nil)
checkAllowACLWrite(t, authz, "foo", nil) checkAllowACLWrite(t, authz, "foo", nil)
@ -193,8 +185,6 @@ func TestChainedAuthorizer(t *testing.T) {
}) })
t.Run("First Found", func(t *testing.T) { t.Run("First Found", func(t *testing.T) {
t.Parallel()
authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Deny), testAuthorizer(Allow)}) authz := NewChainedAuthorizer([]Authorizer{testAuthorizer(Deny), testAuthorizer(Allow)})
checkDenyACLRead(t, authz, "foo", nil) checkDenyACLRead(t, authz, "foo", nil)
checkDenyACLWrite(t, authz, "foo", nil) checkDenyACLWrite(t, authz, "foo", nil)

View file

@ -13,8 +13,6 @@ import (
// ensure compatibility from version to version those tests have been only minimally altered. The tests in this // ensure compatibility from version to version those tests have been only minimally altered. The tests in this
// file are specific to the newer functionality. // file are specific to the newer functionality.
func TestPolicyAuthorizer(t *testing.T) { func TestPolicyAuthorizer(t *testing.T) {
t.Parallel()
type aclCheck struct { type aclCheck struct {
name string name string
prefix string prefix string
@ -446,8 +444,6 @@ func TestPolicyAuthorizer(t *testing.T) {
name := name name := name
tcase := tcase tcase := tcase
t.Run(name, func(t *testing.T) { t.Run(name, func(t *testing.T) {
t.Parallel()
authz, err := NewPolicyAuthorizer([]*Policy{tcase.policy}, nil) authz, err := NewPolicyAuthorizer([]*Policy{tcase.policy}, nil)
require.NoError(t, err) require.NoError(t, err)
@ -458,7 +454,6 @@ func TestPolicyAuthorizer(t *testing.T) {
} }
t.Run(checkName, func(t *testing.T) { t.Run(checkName, func(t *testing.T) {
check := check check := check
t.Parallel()
check.check(t, authz, check.prefix, nil) check.check(t, authz, check.prefix, nil)
}) })
@ -468,8 +463,6 @@ func TestPolicyAuthorizer(t *testing.T) {
} }
func TestAnyAllowed(t *testing.T) { func TestAnyAllowed(t *testing.T) {
t.Parallel()
type radixInsertion struct { type radixInsertion struct {
segment string segment string
value *policyAuthorizerRadixLeaf value *policyAuthorizerRadixLeaf
@ -719,8 +712,6 @@ func TestAnyAllowed(t *testing.T) {
} }
func TestAllAllowed(t *testing.T) { func TestAllAllowed(t *testing.T) {
t.Parallel()
type radixInsertion struct { type radixInsertion struct {
segment string segment string
value *policyAuthorizerRadixLeaf value *policyAuthorizerRadixLeaf

View file

@ -5,11 +5,7 @@ import (
) )
func TestStaticAuthorizer(t *testing.T) { func TestStaticAuthorizer(t *testing.T) {
t.Parallel()
t.Run("AllowAll", func(t *testing.T) { t.Run("AllowAll", func(t *testing.T) {
t.Parallel()
authz := AllowAll() authz := AllowAll()
checkDenyACLRead(t, authz, "foo", nil) checkDenyACLRead(t, authz, "foo", nil)
checkDenyACLWrite(t, authz, "foo", nil) checkDenyACLWrite(t, authz, "foo", nil)
@ -40,7 +36,6 @@ func TestStaticAuthorizer(t *testing.T) {
}) })
t.Run("DenyAll", func(t *testing.T) { t.Run("DenyAll", func(t *testing.T) {
t.Parallel()
authz := DenyAll() authz := DenyAll()
checkDenyACLRead(t, authz, "foo", nil) checkDenyACLRead(t, authz, "foo", nil)
checkDenyACLWrite(t, authz, "foo", nil) checkDenyACLWrite(t, authz, "foo", nil)
@ -71,7 +66,6 @@ func TestStaticAuthorizer(t *testing.T) {
}) })
t.Run("ManageAll", func(t *testing.T) { t.Run("ManageAll", func(t *testing.T) {
t.Parallel()
authz := ManageAll() authz := ManageAll()
checkAllowACLRead(t, authz, "foo", nil) checkAllowACLRead(t, authz, "foo", nil)
checkAllowACLWrite(t, authz, "foo", nil) checkAllowACLWrite(t, authz, "foo", nil)

View file

@ -634,6 +634,7 @@ type testAutoConfig struct {
ac *AutoConfig ac *AutoConfig
tokenUpdates chan struct{} tokenUpdates chan struct{}
originalToken string originalToken string
stop func()
initialRoots *structs.IndexedCARoots initialRoots *structs.IndexedCARoots
initialCert *structs.IssuedCert initialCert *structs.IssuedCert
@ -835,6 +836,7 @@ func startedAutoConfig(t *testing.T, autoEncrypt bool) testAutoConfig {
initialRoots: indexedRoots, initialRoots: indexedRoots,
initialCert: cert, initialCert: cert,
extraCerts: extraCerts, extraCerts: extraCerts,
stop: cancel,
} }
} }
@ -1098,16 +1100,15 @@ func TestFallback(t *testing.T) {
// now wait for the fallback routine to be invoked // now wait for the fallback routine to be invoked
require.True(t, waitForChans(100*time.Millisecond, fallbackCtx.Done()), "fallback routines did not get invoked within the alotted time") require.True(t, waitForChans(100*time.Millisecond, fallbackCtx.Done()), "fallback routines did not get invoked within the alotted time")
// persisting these to disk happens after the RPC we waited on above will have fired testAC.stop()
// There is no deterministic way to know once its been written so we wrap this in a retry. <-testAC.ac.done
testretry.Run(t, func(r *testretry.R) {
resp, err := testAC.ac.readPersistedAutoConfig()
require.NoError(r, err)
// ensure the roots got persisted to disk resp, err := testAC.ac.readPersistedAutoConfig()
require.Equal(r, thirdCert.CertPEM, resp.Certificate.GetCertPEM()) require.NoError(t, err)
require.Equal(r, secondRoots.ActiveRootID, resp.CARoots.GetActiveRootID())
}) // ensure the roots got persisted to disk
require.Equal(t, thirdCert.CertPEM, resp.Certificate.GetCertPEM())
require.Equal(t, secondRoots.ActiveRootID, resp.CARoots.GetActiveRootID())
} }
func TestIntroToken(t *testing.T) { func TestIntroToken(t *testing.T) {

View file

@ -5,12 +5,12 @@ import (
"time" "time"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/hashicorp/consul/agent" "github.com/hashicorp/consul/agent"
"github.com/hashicorp/consul/api" "github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/connect" "github.com/hashicorp/consul/connect"
"github.com/hashicorp/consul/sdk/testutil" "github.com/hashicorp/consul/sdk/testutil"
"github.com/stretchr/testify/require"
) )
func TestUpstreamResolverFuncFromClient(t *testing.T) { func TestUpstreamResolverFuncFromClient(t *testing.T) {
@ -79,8 +79,6 @@ func TestUpstreamResolverFuncFromClient(t *testing.T) {
} }
func TestAgentConfigWatcherSidecarProxy(t *testing.T) { func TestAgentConfigWatcherSidecarProxy(t *testing.T) {
t.Parallel()
a := agent.StartTestAgent(t, agent.TestAgent{Name: "agent_smith"}) a := agent.StartTestAgent(t, agent.TestAgent{Name: "agent_smith"})
defer a.Shutdown() defer a.Shutdown()

View file

@ -5,7 +5,7 @@ import (
"net" "net"
"testing" "testing"
"github.com/hashicorp/consul/testrpc" "github.com/stretchr/testify/require"
"github.com/hashicorp/consul/agent" "github.com/hashicorp/consul/agent"
agConnect "github.com/hashicorp/consul/agent/connect" agConnect "github.com/hashicorp/consul/agent/connect"
@ -14,12 +14,10 @@ import (
"github.com/hashicorp/consul/sdk/freeport" "github.com/hashicorp/consul/sdk/freeport"
"github.com/hashicorp/consul/sdk/testutil" "github.com/hashicorp/consul/sdk/testutil"
"github.com/hashicorp/consul/sdk/testutil/retry" "github.com/hashicorp/consul/sdk/testutil/retry"
"github.com/stretchr/testify/require" "github.com/hashicorp/consul/testrpc"
) )
func TestProxy_public(t *testing.T) { func TestProxy_public(t *testing.T) {
t.Parallel()
require := require.New(t) require := require.New(t)
ports := freeport.MustTake(1) ports := freeport.MustTake(1)

View file

@ -14,13 +14,13 @@ import (
"time" "time"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/hashicorp/consul/agent" "github.com/hashicorp/consul/agent"
"github.com/hashicorp/consul/agent/connect" "github.com/hashicorp/consul/agent/connect"
"github.com/hashicorp/consul/api" "github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/sdk/testutil/retry" "github.com/hashicorp/consul/sdk/testutil/retry"
"github.com/hashicorp/consul/testrpc" "github.com/hashicorp/consul/testrpc"
"github.com/stretchr/testify/require"
) )
// Assert io.Closer implementation // Assert io.Closer implementation
@ -89,8 +89,8 @@ func TestService_Dial(t *testing.T) {
err := testSvr.Serve() err := testSvr.Serve()
require.NoError(err) require.NoError(err)
}() }()
defer testSvr.Close()
<-testSvr.Listening <-testSvr.Listening
defer testSvr.Close()
} }
// Always expect to be connecting to a "DB" // Always expect to be connecting to a "DB"

View file

@ -10,11 +10,12 @@ import (
"net/http" "net/http"
"sync/atomic" "sync/atomic"
"github.com/hashicorp/go-hclog"
testing "github.com/mitchellh/go-testing-interface"
"github.com/hashicorp/consul/agent/connect" "github.com/hashicorp/consul/agent/connect"
"github.com/hashicorp/consul/agent/structs" "github.com/hashicorp/consul/agent/structs"
"github.com/hashicorp/consul/sdk/freeport" "github.com/hashicorp/consul/sdk/freeport"
"github.com/hashicorp/go-hclog"
testing "github.com/mitchellh/go-testing-interface"
) )
// TestService returns a Service instance based on a static TLS Config. // TestService returns a Service instance based on a static TLS Config.
@ -124,8 +125,8 @@ func (s *TestServer) Serve() error {
if err != nil { if err != nil {
return err return err
} }
close(s.Listening)
s.l = l s.l = l
close(s.Listening)
log.Printf("test connect service listening on %s", s.Addr) log.Printf("test connect service listening on %s", s.Addr)
for { for {

View file

@ -13,9 +13,10 @@ import (
"strings" "strings"
"sync" "sync"
"github.com/hashicorp/go-hclog"
"github.com/hashicorp/consul/agent/connect" "github.com/hashicorp/consul/agent/connect"
"github.com/hashicorp/consul/api" "github.com/hashicorp/consul/api"
"github.com/hashicorp/go-hclog"
) )
// parseLeafX509Cert will parse an X509 certificate // parseLeafX509Cert will parse an X509 certificate
@ -460,5 +461,7 @@ func (cfg *dynamicTLSConfig) Ready() bool {
// method will not stop returning a nil chan in that case. It is only useful // method will not stop returning a nil chan in that case. It is only useful
// for initial startup. For ongoing health Ready() should be used. // for initial startup. For ongoing health Ready() should be used.
func (cfg *dynamicTLSConfig) ReadyWait() <-chan struct{} { func (cfg *dynamicTLSConfig) ReadyWait() <-chan struct{} {
cfg.RLock()
defer cfg.RUnlock()
return cfg.readyCh return cfg.readyCh
} }