package agent import ( "fmt" "io/ioutil" "log" "os" "path/filepath" "reflect" "strings" "testing" "github.com/hashicorp/consul/command/base" "github.com/hashicorp/consul/testutil" "github.com/mitchellh/cli" ) func baseCommand(ui *cli.MockUi) base.Command { return base.Command{ Flags: base.FlagSetNone, Ui: ui, } } func TestCommand_implements(t *testing.T) { var _ cli.Command = new(Command) } func TestValidDatacenter(t *testing.T) { shouldMatch := []string{ "dc1", "east-aws-001", "PROD_aws01-small", } noMatch := []string{ "east.aws", "east!aws", "first,second", } for _, m := range shouldMatch { if !validDatacenter.MatchString(m) { t.Fatalf("expected match: %s", m) } } for _, m := range noMatch { if validDatacenter.MatchString(m) { t.Fatalf("expected no match: %s", m) } } } func TestRetryJoin(t *testing.T) { dir, agent := makeAgent(t, nextConfig()) defer os.RemoveAll(dir) defer agent.Shutdown() conf2 := nextConfig() tmpDir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %s", err) } defer os.RemoveAll(tmpDir) doneCh := make(chan struct{}) shutdownCh := make(chan struct{}) defer func() { close(shutdownCh) <-doneCh }() cmd := &Command{ ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } serfAddr := fmt.Sprintf( "%s:%d", agent.config.BindAddr, agent.config.Ports.SerfLan) serfWanAddr := fmt.Sprintf( "%s:%d", agent.config.BindAddr, agent.config.Ports.SerfWan) args := []string{ "-server", "-data-dir", tmpDir, "-node", fmt.Sprintf(`"%s"`, conf2.NodeName), "-advertise", agent.config.BindAddr, "-retry-join", serfAddr, "-retry-interval", "1s", "-retry-join-wan", serfWanAddr, "-retry-interval-wan", "1s", } go func() { if code := cmd.Run(args); code != 0 { log.Printf("bad: %d", code) } close(doneCh) }() testutil.WaitForResult(func() (bool, error) { mem := agent.LANMembers() if len(mem) != 2 { return false, fmt.Errorf("bad: %#v", mem) } mem = agent.WANMembers() if len(mem) != 2 { return false, fmt.Errorf("bad (wan): %#v", mem) } return true, nil }, func(err error) { t.Fatalf(err.Error()) }) } func TestReadCliConfig(t *testing.T) { tmpDir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %s", err) } defer os.RemoveAll(tmpDir) shutdownCh := make(chan struct{}) defer close(shutdownCh) // Test config parse { cmd := &Command{ args: []string{ "-data-dir", tmpDir, "-node", `"a"`, "-advertise-wan", "1.2.3.4", "-serf-wan-bind", "4.3.2.1", "-serf-lan-bind", "4.3.2.2", "-node-meta", "somekey:somevalue", }, ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } config := cmd.readConfig() if config.AdvertiseAddrWan != "1.2.3.4" { t.Fatalf("expected -advertise-addr-wan 1.2.3.4 got %s", config.AdvertiseAddrWan) } if config.SerfWanBindAddr != "4.3.2.1" { t.Fatalf("expected -serf-wan-bind 4.3.2.1 got %s", config.SerfWanBindAddr) } if config.SerfLanBindAddr != "4.3.2.2" { t.Fatalf("expected -serf-lan-bind 4.3.2.2 got %s", config.SerfLanBindAddr) } if len(config.Meta) != 1 || config.Meta["somekey"] != "somevalue" { t.Fatalf("expected somekey=somevalue, got %v", config.Meta) } } // Test multiple node meta flags { cmd := &Command{ args: []string{ "-data-dir", tmpDir, "-node-meta", "somekey:somevalue", "-node-meta", "otherkey:othervalue", }, ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } expected := map[string]string{ "somekey": "somevalue", "otherkey": "othervalue", } config := cmd.readConfig() if !reflect.DeepEqual(config.Meta, expected) { t.Fatalf("bad: %v %v", config.Meta, expected) } } // Test LeaveOnTerm and SkipLeaveOnInt defaults for server mode { ui := new(cli.MockUi) cmd := &Command{ args: []string{ "-node", `"server1"`, "-server", "-data-dir", tmpDir, }, ShutdownCh: shutdownCh, Command: baseCommand(ui), } config := cmd.readConfig() if config == nil { t.Fatalf(`Expected non-nil config object: %s`, ui.ErrorWriter.String()) } if config.Server != true { t.Errorf(`Expected -server to be true`) } if (*config.LeaveOnTerm) != false { t.Errorf(`Expected LeaveOnTerm to be false in server mode`) } if (*config.SkipLeaveOnInt) != true { t.Errorf(`Expected SkipLeaveOnInt to be true in server mode`) } } // Test LeaveOnTerm and SkipLeaveOnInt defaults for client mode { ui := new(cli.MockUi) cmd := &Command{ args: []string{ "-data-dir", tmpDir, "-node", `"client"`, }, ShutdownCh: shutdownCh, Command: baseCommand(ui), } config := cmd.readConfig() if config == nil { t.Fatalf(`Expected non-nil config object: %s`, ui.ErrorWriter.String()) } if config.Server != false { t.Errorf(`Expected server to be false`) } if (*config.LeaveOnTerm) != true { t.Errorf(`Expected LeaveOnTerm to be true in client mode`) } if *config.SkipLeaveOnInt != false { t.Errorf(`Expected SkipLeaveOnInt to be false in client mode`) } } // Test empty node name { cmd := &Command{ args: []string{"-node", `""`}, ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } config := cmd.readConfig() if config != nil { t.Errorf(`Expected -node="" to fail`) } } } func TestRetryJoinFail(t *testing.T) { conf := nextConfig() tmpDir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %s", err) } defer os.RemoveAll(tmpDir) shutdownCh := make(chan struct{}) defer close(shutdownCh) cmd := &Command{ ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } serfAddr := fmt.Sprintf("%s:%d", conf.BindAddr, conf.Ports.SerfLan) args := []string{ "-data-dir", tmpDir, "-retry-join", serfAddr, "-retry-max", "1", } if code := cmd.Run(args); code == 0 { t.Fatalf("bad: %d", code) } } func TestRetryJoinWanFail(t *testing.T) { conf := nextConfig() tmpDir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %s", err) } defer os.RemoveAll(tmpDir) shutdownCh := make(chan struct{}) defer close(shutdownCh) cmd := &Command{ ShutdownCh: shutdownCh, Command: baseCommand(new(cli.MockUi)), } serfAddr := fmt.Sprintf("%s:%d", conf.BindAddr, conf.Ports.SerfWan) args := []string{ "-server", "-data-dir", tmpDir, "-retry-join-wan", serfAddr, "-retry-max-wan", "1", } if code := cmd.Run(args); code == 0 { t.Fatalf("bad: %d", code) } } func TestDiscoverEC2Hosts(t *testing.T) { if os.Getenv("AWS_REGION") == "" { t.Skip("AWS_REGION not set, skipping") } if os.Getenv("AWS_ACCESS_KEY_ID") == "" { t.Skip("AWS_ACCESS_KEY_ID not set, skipping") } if os.Getenv("AWS_SECRET_ACCESS_KEY") == "" { t.Skip("AWS_SECRET_ACCESS_KEY not set, skipping") } c := &Config{ RetryJoinEC2: RetryJoinEC2{ Region: os.Getenv("AWS_REGION"), TagKey: "ConsulRole", TagValue: "Server", }, } servers, err := c.discoverEc2Hosts(&log.Logger{}) if err != nil { t.Fatal(err) } if len(servers) != 3 { t.Fatalf("bad: %v", servers) } } func TestDiscoverGCEHosts(t *testing.T) { if os.Getenv("GCE_PROJECT") == "" { t.Skip("GCE_PROJECT not set, skipping") } if os.Getenv("GOOGLE_APPLICATION_CREDENTIALS") == "" && os.Getenv("GCE_CONFIG_CREDENTIALS") == "" { t.Skip("GOOGLE_APPLICATION_CREDENTIALS or GCE_CONFIG_CREDENTIALS not set, skipping") } c := &Config{ RetryJoinGCE: RetryJoinGCE{ ProjectName: os.Getenv("GCE_PROJECT"), ZonePattern: os.Getenv("GCE_ZONE"), TagValue: "consulrole-server", CredentialsFile: os.Getenv("GCE_CONFIG_CREDENTIALS"), }, } servers, err := c.discoverGCEHosts(log.New(os.Stderr, "", log.LstdFlags)) if err != nil { t.Fatal(err) } if len(servers) != 3 { t.Fatalf("bad: %v", servers) } } func TestSetupScadaConn(t *testing.T) { // Create a config and assign an infra name conf1 := nextConfig() conf1.AtlasInfrastructure = "hashicorp/test1" conf1.AtlasToken = "abc" dir, agent := makeAgent(t, conf1) defer os.RemoveAll(dir) defer agent.Shutdown() cmd := &Command{ ShutdownCh: make(chan struct{}), Command: baseCommand(new(cli.MockUi)), agent: agent, } // First start creates the scada conn if err := cmd.setupScadaConn(conf1); err != nil { t.Fatalf("err: %s", err) } http1 := cmd.scadaHttp provider1 := cmd.scadaProvider // Performing setup again tears down original and replaces // with a new SCADA client. conf2 := nextConfig() conf2.AtlasInfrastructure = "hashicorp/test2" conf2.AtlasToken = "123" if err := cmd.setupScadaConn(conf2); err != nil { t.Fatalf("err: %s", err) } if cmd.scadaHttp == http1 || cmd.scadaProvider == provider1 { t.Fatalf("should change: %#v %#v", cmd.scadaHttp, cmd.scadaProvider) } // Original provider and listener must be closed if !provider1.IsShutdown() { t.Fatalf("should be shutdown") } if _, err := http1.listener.Accept(); !strings.Contains(err.Error(), "closed") { t.Fatalf("should be closed") } } func TestProtectDataDir(t *testing.T) { dir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %v", err) } defer os.RemoveAll(dir) if err := os.MkdirAll(filepath.Join(dir, "mdb"), 0700); err != nil { t.Fatalf("err: %v", err) } cfgFile, err := ioutil.TempFile("", "consul") if err != nil { t.Fatalf("err: %v", err) } defer os.Remove(cfgFile.Name()) content := fmt.Sprintf(`{"server": true, "data_dir": "%s"}`, dir) _, err = cfgFile.Write([]byte(content)) if err != nil { t.Fatalf("err: %v", err) } ui := new(cli.MockUi) cmd := &Command{ Command: baseCommand(ui), args: []string{"-config-file=" + cfgFile.Name()}, } if conf := cmd.readConfig(); conf != nil { t.Fatalf("should fail") } if out := ui.ErrorWriter.String(); !strings.Contains(out, dir) { t.Fatalf("expected mdb dir error, got: %s", out) } } func TestBadDataDirPermissions(t *testing.T) { dir, err := ioutil.TempDir("", "consul") if err != nil { t.Fatalf("err: %v", err) } defer os.RemoveAll(dir) dataDir := filepath.Join(dir, "mdb") if err := os.MkdirAll(dataDir, 0400); err != nil { t.Fatalf("err: %v", err) } defer os.RemoveAll(dataDir) ui := new(cli.MockUi) cmd := &Command{ Command: baseCommand(ui), args: []string{"-data-dir=" + dataDir, "-server=true"}, } if conf := cmd.readConfig(); conf != nil { t.Fatalf("Should fail with bad data directory permissions") } if out := ui.ErrorWriter.String(); !strings.Contains(out, "Permission denied") { t.Fatalf("expected permission denied error, got: %s", out) } }