2015-09-07 02:08:05 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2016-10-17 17:48:04 +00:00
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
2015-09-07 02:08:05 +00:00
|
|
|
"fmt"
|
2018-01-26 19:12:09 +00:00
|
|
|
"net"
|
2015-09-07 02:08:05 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2018-01-26 01:56:47 +00:00
|
|
|
"net/url"
|
2015-09-07 02:08:05 +00:00
|
|
|
"testing"
|
2018-01-26 19:12:09 +00:00
|
|
|
"time"
|
2016-10-17 17:48:04 +00:00
|
|
|
|
2018-01-26 19:12:09 +00:00
|
|
|
msgpackrpc "github.com/hashicorp/net-rpc-msgpackrpc"
|
2017-10-06 19:02:53 +00:00
|
|
|
"github.com/hashicorp/nomad/acl"
|
2018-01-26 19:12:09 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/pool"
|
2017-10-06 19:02:53 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
2016-10-17 17:48:04 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2018-01-26 01:56:47 +00:00
|
|
|
"github.com/hashicorp/nomad/testutil"
|
|
|
|
"github.com/stretchr/testify/require"
|
2015-09-07 02:08:05 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestHTTP_AgentSelf(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:14:36 +00:00
|
|
|
httpTest(t, nil, func(s *TestAgent) {
|
2015-09-07 02:08:05 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/self", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.AgentSelfRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the job
|
|
|
|
self := obj.(agentSelf)
|
|
|
|
if self.Config == nil {
|
|
|
|
t.Fatalf("bad: %#v", self)
|
|
|
|
}
|
|
|
|
if len(self.Stats) == 0 {
|
|
|
|
t.Fatalf("bad: %#v", self)
|
|
|
|
}
|
2017-08-08 04:33:18 +00:00
|
|
|
|
|
|
|
// Check the Vault config
|
|
|
|
if self.Config.Vault.Token != "" {
|
|
|
|
t.Fatalf("bad: %#v", self)
|
|
|
|
}
|
|
|
|
|
2018-01-26 01:56:47 +00:00
|
|
|
// Assign a Vault token and require it is redacted.
|
2017-08-08 04:33:18 +00:00
|
|
|
s.Config.Vault.Token = "badc0deb-adc0-deba-dc0d-ebadc0debadc"
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
obj, err = s.Server.AgentSelfRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
self = obj.(agentSelf)
|
|
|
|
if self.Config.Vault.Token != "<redacted>" {
|
|
|
|
t.Fatalf("bad: %#v", self)
|
|
|
|
}
|
2015-09-07 02:08:05 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
func TestHTTP_AgentSelf_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/self", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.AgentSelfRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.NodePolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentSelfRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.AgentPolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
obj, err := s.Server.AgentSelfRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
self := obj.(agentSelf)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(self.Config)
|
|
|
|
require.NotNil(self.Stats)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
obj, err := s.Server.AgentSelfRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
self := obj.(agentSelf)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(self.Config)
|
|
|
|
require.NotNil(self.Stats)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-09-07 02:08:05 +00:00
|
|
|
func TestHTTP_AgentJoin(t *testing.T) {
|
2018-01-26 01:56:47 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:14:36 +00:00
|
|
|
httpTest(t, nil, func(s *TestAgent) {
|
2015-09-07 02:08:05 +00:00
|
|
|
// Determine the join address
|
|
|
|
member := s.Agent.Server().LocalMember()
|
|
|
|
addr := fmt.Sprintf("%s:%d", member.Addr, member.Port)
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("PUT",
|
|
|
|
fmt.Sprintf("/v1/agent/join?address=%s&address=%s", addr, addr), nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.AgentJoinRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the job
|
|
|
|
join := obj.(joinResult)
|
|
|
|
if join.NumJoined != 2 {
|
|
|
|
t.Fatalf("bad: %#v", join)
|
|
|
|
}
|
|
|
|
if join.Error != "" {
|
|
|
|
t.Fatalf("bad: %#v", join)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_AgentMembers(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:14:36 +00:00
|
|
|
httpTest(t, nil, func(s *TestAgent) {
|
2015-09-07 02:08:05 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/members", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
obj, err := s.Server.AgentMembersRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the job
|
2016-11-08 21:01:56 +00:00
|
|
|
members := obj.(structs.ServerMembersResponse)
|
|
|
|
if len(members.Members) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", members.Members)
|
2015-09-07 02:08:05 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
func TestHTTP_AgentMembers_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/members", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.AgentMembersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.AgentPolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentMembersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
obj, err := s.Server.AgentMembersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
members := obj.(structs.ServerMembersResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(members.Members, 1)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
obj, err := s.Server.AgentMembersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
members := obj.(structs.ServerMembersResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(members.Members, 1)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-09-07 02:08:05 +00:00
|
|
|
func TestHTTP_AgentForceLeave(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:14:36 +00:00
|
|
|
httpTest(t, nil, func(s *TestAgent) {
|
2015-09-07 02:08:05 +00:00
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("PUT", "/v1/agent/force-leave?node=foo", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request
|
|
|
|
_, err = s.Server.AgentForceLeaveRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2015-09-25 03:39:03 +00:00
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
func TestHTTP_AgentForceLeave_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("PUT", "/v1/agent/force-leave?node=foo", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.AgentForceLeaveRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentForceLeaveRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.AgentPolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentForceLeaveRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
_, err := s.Server.AgentForceLeaveRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2015-09-25 03:39:03 +00:00
|
|
|
func TestHTTP_AgentSetServers(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-07-20 05:14:36 +00:00
|
|
|
httpTest(t, nil, func(s *TestAgent) {
|
2018-01-26 19:12:09 +00:00
|
|
|
addr := s.Config.AdvertiseAddrs.RPC
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
conn, err := net.DialTimeout("tcp", addr, 100*time.Millisecond)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
// Write the Consul RPC byte to set the mode
|
|
|
|
if _, err := conn.Write([]byte{byte(pool.RpcNomad)}); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
codec := pool.NewClientCodec(conn)
|
|
|
|
args := &structs.GenericRequest{}
|
|
|
|
var leader string
|
|
|
|
err = msgpackrpc.CallWithCodec(codec, "Status.Leader", args, &leader)
|
|
|
|
return leader != "", err
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("failed to find leader: %v", err)
|
|
|
|
})
|
|
|
|
|
2015-09-25 03:39:03 +00:00
|
|
|
// Create the request
|
2017-09-26 22:26:33 +00:00
|
|
|
req, err := http.NewRequest("PUT", "/v1/agent/servers", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2015-09-25 03:39:03 +00:00
|
|
|
|
|
|
|
// Send the request
|
2017-09-26 22:26:33 +00:00
|
|
|
respW := httptest.NewRecorder()
|
2015-09-25 03:39:03 +00:00
|
|
|
_, err = s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Contains(err.Error(), "missing server address")
|
2015-09-25 03:39:03 +00:00
|
|
|
|
|
|
|
// Create a valid request
|
2016-09-26 18:57:06 +00:00
|
|
|
req, err = http.NewRequest("PUT", "/v1/agent/servers?address=127.0.0.1%3A4647&address=127.0.0.2%3A4647&address=127.0.0.3%3A4647", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2015-09-25 03:39:03 +00:00
|
|
|
|
2018-01-26 01:56:47 +00:00
|
|
|
// Send the request which should fail
|
2015-09-25 03:39:03 +00:00
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
_, err = s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
2015-09-25 03:39:03 +00:00
|
|
|
|
|
|
|
// Retrieve the servers again
|
|
|
|
req, err = http.NewRequest("GET", "/v1/agent/servers", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2015-09-25 03:39:03 +00:00
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
|
|
|
|
// Make the request and check the result
|
2017-09-14 17:04:48 +00:00
|
|
|
expected := []string{
|
2018-01-26 01:56:47 +00:00
|
|
|
s.GetConfig().AdvertiseAddrs.RPC,
|
2016-06-01 07:34:46 +00:00
|
|
|
}
|
2016-09-26 18:57:06 +00:00
|
|
|
out, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2015-09-25 03:39:03 +00:00
|
|
|
servers := out.([]string)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(servers, len(expected))
|
|
|
|
require.Equal(expected, servers)
|
2015-09-25 03:39:03 +00:00
|
|
|
})
|
|
|
|
}
|
2016-10-17 17:48:04 +00:00
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
func TestHTTP_AgentSetServers_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
2018-01-26 19:12:09 +00:00
|
|
|
addr := s.Config.AdvertiseAddrs.RPC
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
conn, err := net.DialTimeout("tcp", addr, 100*time.Millisecond)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
// Write the Consul RPC byte to set the mode
|
|
|
|
if _, err := conn.Write([]byte{byte(pool.RpcNomad)}); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
codec := pool.NewClientCodec(conn)
|
|
|
|
args := &structs.GenericRequest{}
|
|
|
|
var leader string
|
|
|
|
err = msgpackrpc.CallWithCodec(codec, "Status.Leader", args, &leader)
|
|
|
|
return leader != "", err
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatalf("failed to find leader: %v", err)
|
|
|
|
})
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Make the HTTP request
|
2018-01-26 01:56:47 +00:00
|
|
|
path := fmt.Sprintf("/v1/agent/servers?address=%s", url.QueryEscape(s.GetConfig().AdvertiseAddrs.RPC))
|
|
|
|
req, err := http.NewRequest("PUT", path, nil)
|
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.AgentPolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_AgentListServers_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
|
|
|
|
// Create list request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/servers", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
expected := []string{
|
2018-01-26 01:56:47 +00:00
|
|
|
s.GetConfig().AdvertiseAddrs.RPC,
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.NodePolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
2018-01-26 01:56:47 +00:00
|
|
|
// Wait for client to have a server
|
|
|
|
testutil.WaitForResult(func() (bool, error) {
|
|
|
|
return len(s.client.GetServers()) != 0, fmt.Errorf("no servers")
|
|
|
|
}, func(err error) {
|
|
|
|
t.Fatal(err)
|
|
|
|
})
|
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.AgentPolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
out, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
servers := out.([]string)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(servers, len(expected))
|
|
|
|
require.Equal(expected, servers)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
out, err := s.Server.AgentServersRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
servers := out.([]string)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(servers, len(expected))
|
|
|
|
require.Equal(expected, servers)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2016-10-17 17:48:04 +00:00
|
|
|
func TestHTTP_AgentListKeys(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2016-10-17 17:48:04 +00:00
|
|
|
key1 := "HS5lJ+XuTlYKWaeGYyG+/A=="
|
|
|
|
|
|
|
|
httpTest(t, func(c *Config) {
|
|
|
|
c.Server.EncryptKey = key1
|
2017-07-20 05:14:36 +00:00
|
|
|
}, func(s *TestAgent) {
|
2016-10-17 17:48:04 +00:00
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/keyring/list", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
out, err := s.Server.KeyringOperationRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(t, err)
|
2016-10-17 17:48:04 +00:00
|
|
|
kresp := out.(structs.KeyringResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(t, kresp.Keys, 1)
|
2016-10-17 17:48:04 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-10-06 19:02:53 +00:00
|
|
|
func TestHTTP_AgentListKeys_ACL(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
key1 := "HS5lJ+XuTlYKWaeGYyG+/A=="
|
|
|
|
|
|
|
|
cb := func(c *Config) {
|
|
|
|
c.Server.EncryptKey = key1
|
|
|
|
}
|
|
|
|
|
|
|
|
httpACLTest(t, cb, func(s *TestAgent) {
|
|
|
|
state := s.Agent.server.State()
|
|
|
|
|
|
|
|
// Make the HTTP request
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/keyring/list", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
|
|
|
|
// Try request without a token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err := s.Server.KeyringOperationRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with an invalid token and expect failure
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1005, "invalid", mock.AgentPolicy(acl.PolicyRead))
|
|
|
|
setToken(req, token)
|
|
|
|
_, err := s.Server.KeyringOperationRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
|
|
|
require.Equal(err.Error(), structs.ErrPermissionDenied.Error())
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a valid token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
token := mock.CreatePolicyAndToken(t, state, 1007, "valid", mock.AgentPolicy(acl.PolicyWrite))
|
|
|
|
setToken(req, token)
|
|
|
|
out, err := s.Server.KeyringOperationRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
kresp := out.(structs.KeyringResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(kresp.Keys, 1)
|
|
|
|
require.Contains(kresp.Keys, key1)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try request with a root token
|
|
|
|
{
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
setToken(req, s.RootToken)
|
|
|
|
out, err := s.Server.KeyringOperationRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-06 19:02:53 +00:00
|
|
|
kresp := out.(structs.KeyringResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Len(kresp.Keys, 1)
|
|
|
|
require.Contains(kresp.Keys, key1)
|
2017-10-06 19:02:53 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2016-10-17 17:48:04 +00:00
|
|
|
func TestHTTP_AgentInstallKey(t *testing.T) {
|
2018-01-26 01:56:47 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:42:15 +00:00
|
|
|
|
2016-10-17 17:48:04 +00:00
|
|
|
key1 := "HS5lJ+XuTlYKWaeGYyG+/A=="
|
|
|
|
key2 := "wH1Bn9hlJ0emgWB1JttVRA=="
|
|
|
|
|
|
|
|
httpTest(t, func(c *Config) {
|
|
|
|
c.Server.EncryptKey = key1
|
2017-07-20 05:14:36 +00:00
|
|
|
}, func(s *TestAgent) {
|
2016-10-17 17:48:04 +00:00
|
|
|
b, err := json.Marshal(&structs.KeyringRequest{Key: key2})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/keyring/install", bytes.NewReader(b))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
|
|
|
|
_, err = s.Server.KeyringOperationRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
req, err = http.NewRequest("GET", "/v1/agent/keyring/list", bytes.NewReader(b))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
|
|
|
|
out, err := s.Server.KeyringOperationRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
kresp := out.(structs.KeyringResponse)
|
|
|
|
if len(kresp.Keys) != 2 {
|
|
|
|
t.Fatalf("bad: %v", kresp)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_AgentRemoveKey(t *testing.T) {
|
2018-01-26 01:56:47 +00:00
|
|
|
t.Parallel()
|
2017-07-20 05:42:15 +00:00
|
|
|
|
2016-10-17 17:48:04 +00:00
|
|
|
key1 := "HS5lJ+XuTlYKWaeGYyG+/A=="
|
|
|
|
key2 := "wH1Bn9hlJ0emgWB1JttVRA=="
|
|
|
|
|
|
|
|
httpTest(t, func(c *Config) {
|
|
|
|
c.Server.EncryptKey = key1
|
2017-07-20 05:14:36 +00:00
|
|
|
}, func(s *TestAgent) {
|
2016-10-17 17:48:04 +00:00
|
|
|
b, err := json.Marshal(&structs.KeyringRequest{Key: key2})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/keyring/install", bytes.NewReader(b))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
_, err = s.Server.KeyringOperationRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err = http.NewRequest("GET", "/v1/agent/keyring/remove", bytes.NewReader(b))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
if _, err = s.Server.KeyringOperationRequest(respW, req); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err = http.NewRequest("GET", "/v1/agent/keyring/list", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
respW = httptest.NewRecorder()
|
|
|
|
out, err := s.Server.KeyringOperationRequest(respW, req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
kresp := out.(structs.KeyringResponse)
|
|
|
|
if len(kresp.Keys) != 1 {
|
|
|
|
t.Fatalf("bad: %v", kresp)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
func TestHTTP_AgentHealth_Ok(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
// Enable ACLs to ensure they're not enforced
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
// No ?type=
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Client)
|
|
|
|
require.True(health.Client.Ok)
|
|
|
|
require.Equal("ok", health.Client.Message)
|
|
|
|
require.NotNil(health.Server)
|
|
|
|
require.True(health.Server.Ok)
|
|
|
|
require.Equal("ok", health.Server.Message)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// type=client
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health?type=client", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Client)
|
|
|
|
require.True(health.Client.Ok)
|
|
|
|
require.Equal("ok", health.Client.Message)
|
|
|
|
require.Nil(health.Server)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// type=server
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health?type=server", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Server)
|
|
|
|
require.True(health.Server.Ok)
|
|
|
|
require.Equal("ok", health.Server.Message)
|
|
|
|
require.Nil(health.Client)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// type=client&type=server
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health?type=client&type=server", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Client)
|
|
|
|
require.True(health.Client.Ok)
|
|
|
|
require.Equal("ok", health.Client.Message)
|
|
|
|
require.NotNil(health.Server)
|
|
|
|
require.True(health.Server.Ok)
|
|
|
|
require.Equal("ok", health.Server.Message)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_AgentHealth_BadServer(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
// Enable ACLs to ensure they're not enforced
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
|
|
|
|
// Set s.Agent.server=nil to make server unhealthy if requested
|
|
|
|
s.Agent.server = nil
|
|
|
|
|
|
|
|
// No ?type= means server is just skipped
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Client)
|
|
|
|
require.True(health.Client.Ok)
|
|
|
|
require.Equal("ok", health.Client.Message)
|
|
|
|
require.Nil(health.Server)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// type=server means server is considered unhealthy
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health?type=server", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-13 23:25:25 +00:00
|
|
|
_, err = s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
2017-10-13 23:25:25 +00:00
|
|
|
httpErr, ok := err.(HTTPCodedError)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.True(ok)
|
|
|
|
require.Equal(500, httpErr.Code())
|
|
|
|
require.Equal(`{"server":{"ok":false,"message":"server not enabled"}}`, err.Error())
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHTTP_AgentHealth_BadClient(t *testing.T) {
|
|
|
|
t.Parallel()
|
2018-01-26 01:56:47 +00:00
|
|
|
require := require.New(t)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
// Enable ACLs to ensure they're not enforced
|
|
|
|
httpACLTest(t, nil, func(s *TestAgent) {
|
|
|
|
|
|
|
|
// Set s.Agent.client=nil to make server unhealthy if requested
|
|
|
|
s.Agent.client = nil
|
|
|
|
|
|
|
|
// No ?type= means client is just skipped
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
|
|
|
healthI, err := s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
|
|
|
require.Equal(http.StatusOK, respW.Code)
|
|
|
|
require.NotNil(healthI)
|
2017-10-13 22:37:44 +00:00
|
|
|
health := healthI.(*healthResponse)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(health.Server)
|
|
|
|
require.True(health.Server.Ok)
|
|
|
|
require.Equal("ok", health.Server.Message)
|
|
|
|
require.Nil(health.Client)
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// type=client means client is considered unhealthy
|
|
|
|
{
|
|
|
|
req, err := http.NewRequest("GET", "/v1/agent/health?type=client", nil)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.Nil(err)
|
2017-10-13 22:37:44 +00:00
|
|
|
|
|
|
|
respW := httptest.NewRecorder()
|
2017-10-13 23:25:25 +00:00
|
|
|
_, err = s.Server.HealthRequest(respW, req)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.NotNil(err)
|
2017-10-13 23:25:25 +00:00
|
|
|
httpErr, ok := err.(HTTPCodedError)
|
2018-01-26 01:56:47 +00:00
|
|
|
require.True(ok)
|
|
|
|
require.Equal(500, httpErr.Code())
|
|
|
|
require.Equal(`{"client":{"ok":false,"message":"client not enabled"}}`, err.Error())
|
2017-10-13 22:37:44 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|