237 lines
8.0 KiB
Go
237 lines
8.0 KiB
Go
package topology
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
libassert "github.com/hashicorp/consul/test/integration/consul-container/libs/assert"
|
|
libcluster "github.com/hashicorp/consul/test/integration/consul-container/libs/cluster"
|
|
libservice "github.com/hashicorp/consul/test/integration/consul-container/libs/service"
|
|
"github.com/hashicorp/consul/test/integration/consul-container/libs/utils"
|
|
)
|
|
|
|
const (
|
|
AcceptingPeerName = "accepting-to-dialer"
|
|
DialingPeerName = "dialing-to-acceptor"
|
|
)
|
|
|
|
type BuiltCluster struct {
|
|
Cluster *libcluster.Cluster
|
|
Context *libcluster.BuildContext
|
|
Service libservice.Service
|
|
Container *libservice.ConnectContainer
|
|
Gateway libservice.Service
|
|
}
|
|
|
|
// BasicPeeringTwoClustersSetup sets up a scenario for testing peering, which consists of
|
|
//
|
|
// - an accepting cluster with 3 servers and 1 client agent. The client should be used to
|
|
// host a service for export: staticServerSvc.
|
|
// - an dialing cluster with 1 server and 1 client. The client should be used to host a
|
|
// service connecting to staticServerSvc.
|
|
// - Create the peering, export the service from accepting cluster, and verify service
|
|
// connectivity.
|
|
//
|
|
// It returns objects of the accepting cluster, dialing cluster, staticServerSvc, and staticClientSvcSidecar
|
|
func BasicPeeringTwoClustersSetup(
|
|
t *testing.T,
|
|
consulVersion string,
|
|
) (*BuiltCluster, *BuiltCluster) {
|
|
// acceptingCluster, acceptingCtx, acceptingClient := NewPeeringCluster(t, "dc1", 3, consulVersion, true)
|
|
acceptingCluster, acceptingCtx, acceptingClient := NewPeeringCluster(t, 3, &libcluster.BuildOptions{
|
|
Datacenter: "dc1",
|
|
ConsulVersion: consulVersion,
|
|
InjectAutoEncryption: true,
|
|
})
|
|
dialingCluster, dialingCtx, dialingClient := NewPeeringCluster(t, 1, &libcluster.BuildOptions{
|
|
Datacenter: "dc2",
|
|
ConsulVersion: consulVersion,
|
|
InjectAutoEncryption: true,
|
|
})
|
|
require.NoError(t, dialingCluster.PeerWithCluster(acceptingClient, AcceptingPeerName, DialingPeerName))
|
|
|
|
libassert.PeeringStatus(t, acceptingClient, AcceptingPeerName, api.PeeringStateActive)
|
|
// libassert.PeeringExports(t, acceptingClient, acceptingPeerName, 1)
|
|
|
|
// Register an static-server service in acceptingCluster and export to dialing cluster
|
|
var serverSidecarService libservice.Service
|
|
var acceptingClusterGateway libservice.Service
|
|
{
|
|
clientNode := acceptingCluster.Clients()[0]
|
|
|
|
// Create a service and proxy instance
|
|
var err error
|
|
// Create a service and proxy instance
|
|
serviceOpts := libservice.ServiceOpts{
|
|
Name: libservice.StaticServerServiceName,
|
|
ID: "static-server",
|
|
Meta: map[string]string{"version": ""},
|
|
}
|
|
serverSidecarService, _, err := libservice.CreateAndRegisterStaticServerAndSidecar(clientNode, &serviceOpts)
|
|
require.NoError(t, err)
|
|
|
|
libassert.CatalogServiceExists(t, acceptingClient, libservice.StaticServerServiceName)
|
|
libassert.CatalogServiceExists(t, acceptingClient, "static-server-sidecar-proxy")
|
|
|
|
require.NoError(t, serverSidecarService.Export("default", AcceptingPeerName, acceptingClient))
|
|
|
|
// Create the mesh gateway for dataplane traffic
|
|
acceptingClusterGateway, err = libservice.NewGatewayService(context.Background(), "mesh", "mesh", clientNode)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Register an static-client service in dialing cluster and set upstream to static-server service
|
|
var clientSidecarService *libservice.ConnectContainer
|
|
var dialingClusterGateway libservice.Service
|
|
{
|
|
clientNode := dialingCluster.Clients()[0]
|
|
|
|
// Create a service and proxy instance
|
|
var err error
|
|
clientSidecarService, err = libservice.CreateAndRegisterStaticClientSidecar(clientNode, DialingPeerName, true)
|
|
require.NoError(t, err)
|
|
|
|
libassert.CatalogServiceExists(t, dialingClient, "static-client-sidecar-proxy")
|
|
|
|
// Create the mesh gateway for dataplane traffic
|
|
dialingClusterGateway, err = libservice.NewGatewayService(context.Background(), "mesh", "mesh", clientNode)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
_, adminPort := clientSidecarService.GetAdminAddr()
|
|
libassert.AssertUpstreamEndpointStatus(t, adminPort, fmt.Sprintf("static-server.default.%s.external", DialingPeerName), "HEALTHY", 1)
|
|
_, port := clientSidecarService.GetAddr()
|
|
libassert.HTTPServiceEchoes(t, "localhost", port, "")
|
|
|
|
return &BuiltCluster{
|
|
Cluster: acceptingCluster,
|
|
Context: acceptingCtx,
|
|
Service: serverSidecarService,
|
|
Container: nil,
|
|
Gateway: acceptingClusterGateway,
|
|
},
|
|
&BuiltCluster{
|
|
Cluster: dialingCluster,
|
|
Context: dialingCtx,
|
|
Service: nil,
|
|
Container: clientSidecarService,
|
|
Gateway: dialingClusterGateway,
|
|
}
|
|
}
|
|
|
|
// NewDialingCluster creates a cluster for peering with a single dev agent
|
|
// TODO: note: formerly called CreatingPeeringClusterAndSetup
|
|
//
|
|
// Deprecated: use NewPeeringCluster mostly
|
|
func NewDialingCluster(
|
|
t *testing.T,
|
|
version string,
|
|
dialingPeerName string,
|
|
) (*libcluster.Cluster, *api.Client, libservice.Service) {
|
|
t.Helper()
|
|
t.Logf("creating the dialing cluster")
|
|
|
|
opts := libcluster.BuildOptions{
|
|
Datacenter: "dc2",
|
|
InjectAutoEncryption: true,
|
|
InjectGossipEncryption: true,
|
|
AllowHTTPAnyway: true,
|
|
ConsulVersion: version,
|
|
}
|
|
ctx := libcluster.NewBuildContext(t, opts)
|
|
|
|
conf := libcluster.NewConfigBuilder(ctx).
|
|
Peering(true).
|
|
ToAgentConfig(t)
|
|
t.Logf("dc2 server config: \n%s", conf.JSON)
|
|
|
|
cluster, err := libcluster.NewN(t, *conf, 1)
|
|
require.NoError(t, err)
|
|
|
|
node := cluster.Agents[0]
|
|
client := node.GetClient()
|
|
libcluster.WaitForLeader(t, cluster, client)
|
|
libcluster.WaitForMembers(t, client, 1)
|
|
|
|
// Default Proxy Settings
|
|
ok, err := utils.ApplyDefaultProxySettings(client)
|
|
require.NoError(t, err)
|
|
require.True(t, ok)
|
|
|
|
// Create the mesh gateway for dataplane traffic
|
|
_, err = libservice.NewGatewayService(context.Background(), "mesh", "mesh", node)
|
|
require.NoError(t, err)
|
|
|
|
// Create a service and proxy instance
|
|
clientProxyService, err := libservice.CreateAndRegisterStaticClientSidecar(node, dialingPeerName, true)
|
|
require.NoError(t, err)
|
|
|
|
libassert.CatalogServiceExists(t, client, "static-client-sidecar-proxy")
|
|
|
|
return cluster, client, clientProxyService
|
|
}
|
|
|
|
// NewPeeringCluster creates a cluster with peering enabled. It also creates
|
|
// and registers a mesh-gateway at the client agent. The API client returned is
|
|
// pointed at the client agent.
|
|
func NewPeeringCluster(
|
|
t *testing.T,
|
|
numServers int,
|
|
buildOpts *libcluster.BuildOptions,
|
|
) (*libcluster.Cluster, *libcluster.BuildContext, *api.Client) {
|
|
require.NotEmpty(t, buildOpts.Datacenter)
|
|
require.True(t, numServers > 0)
|
|
|
|
opts := libcluster.BuildOptions{
|
|
Datacenter: buildOpts.Datacenter,
|
|
InjectAutoEncryption: buildOpts.InjectAutoEncryption,
|
|
InjectGossipEncryption: true,
|
|
AllowHTTPAnyway: true,
|
|
ConsulVersion: buildOpts.ConsulVersion,
|
|
ACLEnabled: buildOpts.ACLEnabled,
|
|
}
|
|
ctx := libcluster.NewBuildContext(t, opts)
|
|
|
|
serverConf := libcluster.NewConfigBuilder(ctx).
|
|
Bootstrap(numServers).
|
|
Peering(true).
|
|
ToAgentConfig(t)
|
|
t.Logf("%s server config: \n%s", opts.Datacenter, serverConf.JSON)
|
|
|
|
cluster, err := libcluster.NewN(t, *serverConf, numServers)
|
|
require.NoError(t, err)
|
|
|
|
var retryJoin []string
|
|
for i := 0; i < numServers; i++ {
|
|
retryJoin = append(retryJoin, fmt.Sprintf("agent-%d", i))
|
|
}
|
|
|
|
// Add a stable client to register the service
|
|
configbuiilder := libcluster.NewConfigBuilder(ctx).
|
|
Client().
|
|
Peering(true).
|
|
RetryJoin(retryJoin...)
|
|
clientConf := configbuiilder.ToAgentConfig(t)
|
|
t.Logf("%s client config: \n%s", opts.Datacenter, clientConf.JSON)
|
|
|
|
require.NoError(t, cluster.AddN(*clientConf, 1, true))
|
|
|
|
// Use the client agent as the HTTP endpoint since we will not rotate it in many tests.
|
|
clientNode := cluster.Agents[numServers]
|
|
client := clientNode.GetClient()
|
|
libcluster.WaitForLeader(t, cluster, client)
|
|
libcluster.WaitForMembers(t, client, numServers+1)
|
|
|
|
// Default Proxy Settings
|
|
ok, err := utils.ApplyDefaultProxySettings(client)
|
|
require.NoError(t, err)
|
|
require.True(t, ok)
|
|
|
|
return cluster, ctx, client
|
|
}
|