2020-08-31 17:19:28 +00:00
|
|
|
package stream
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-10-08 18:27:52 +00:00
|
|
|
"sync/atomic"
|
2020-08-31 17:19:28 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2020-12-01 16:11:34 +00:00
|
|
|
"github.com/hashicorp/go-memdb"
|
|
|
|
"github.com/hashicorp/nomad/acl"
|
|
|
|
"github.com/hashicorp/nomad/nomad/mock"
|
2020-10-06 20:21:58 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
|
2020-08-31 17:19:28 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
2020-10-08 18:27:52 +00:00
|
|
|
func TestEventBroker_PublishChangesAndSubscribe(t *testing.T) {
|
2020-08-31 17:19:28 +00:00
|
|
|
subscription := &SubscribeRequest{
|
2020-10-04 19:12:35 +00:00
|
|
|
Topics: map[structs.Topic][]string{
|
2020-10-08 18:27:52 +00:00
|
|
|
"Test": {"sub-key"},
|
2020-08-31 17:19:28 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 2*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-12-01 16:11:34 +00:00
|
|
|
publisher, err := NewEventBroker(ctx, nil, EventBrokerCfg{EventBufferSize: 100})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2020-08-31 17:19:28 +00:00
|
|
|
sub, err := publisher.Subscribe(subscription)
|
|
|
|
require.NoError(t, err)
|
|
|
|
eventCh := consumeSubscription(ctx, sub)
|
|
|
|
|
|
|
|
// Now subscriber should block waiting for updates
|
|
|
|
assertNoResult(t, eventCh)
|
|
|
|
|
2020-10-04 19:12:35 +00:00
|
|
|
events := []structs.Event{{
|
2020-08-31 17:19:28 +00:00
|
|
|
Index: 1,
|
|
|
|
Topic: "Test",
|
|
|
|
Key: "sub-key",
|
|
|
|
Payload: "sample payload",
|
|
|
|
}}
|
2020-10-06 20:21:58 +00:00
|
|
|
publisher.Publish(&structs.Events{Index: 1, Events: events})
|
2020-08-31 17:19:28 +00:00
|
|
|
|
|
|
|
// Subscriber should see the published event
|
|
|
|
result := nextResult(t, eventCh)
|
|
|
|
require.NoError(t, result.Err)
|
2020-10-04 19:12:35 +00:00
|
|
|
expected := []structs.Event{{Payload: "sample payload", Key: "sub-key", Topic: "Test", Index: 1}}
|
2020-08-31 17:19:28 +00:00
|
|
|
require.Equal(t, expected, result.Events)
|
|
|
|
|
|
|
|
// Now subscriber should block waiting for updates
|
|
|
|
assertNoResult(t, eventCh)
|
|
|
|
|
|
|
|
// Publish a second event
|
2020-10-04 19:12:35 +00:00
|
|
|
events = []structs.Event{{
|
2020-08-31 17:19:28 +00:00
|
|
|
Index: 2,
|
|
|
|
Topic: "Test",
|
|
|
|
Key: "sub-key",
|
|
|
|
Payload: "sample payload 2",
|
|
|
|
}}
|
2020-10-06 20:21:58 +00:00
|
|
|
publisher.Publish(&structs.Events{Index: 2, Events: events})
|
2020-08-31 17:19:28 +00:00
|
|
|
|
|
|
|
result = nextResult(t, eventCh)
|
|
|
|
require.NoError(t, result.Err)
|
2020-10-04 19:12:35 +00:00
|
|
|
expected = []structs.Event{{Payload: "sample payload 2", Key: "sub-key", Topic: "Test", Index: 2}}
|
2020-08-31 17:19:28 +00:00
|
|
|
require.Equal(t, expected, result.Events)
|
|
|
|
}
|
|
|
|
|
2020-10-08 18:27:52 +00:00
|
|
|
func TestEventBroker_ShutdownClosesSubscriptions(t *testing.T) {
|
2020-08-31 17:19:28 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
2020-12-01 16:11:34 +00:00
|
|
|
publisher, err := NewEventBroker(ctx, nil, EventBrokerCfg{})
|
|
|
|
require.NoError(t, err)
|
2020-08-31 17:19:28 +00:00
|
|
|
|
|
|
|
sub1, err := publisher.Subscribe(&SubscribeRequest{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer sub1.Unsubscribe()
|
|
|
|
|
|
|
|
sub2, err := publisher.Subscribe(&SubscribeRequest{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer sub2.Unsubscribe()
|
|
|
|
|
|
|
|
cancel() // Shutdown
|
|
|
|
|
|
|
|
err = consumeSub(context.Background(), sub1)
|
|
|
|
require.Equal(t, err, ErrSubscriptionClosed)
|
|
|
|
|
|
|
|
_, err = sub2.Next(context.Background())
|
|
|
|
require.Equal(t, err, ErrSubscriptionClosed)
|
|
|
|
}
|
|
|
|
|
2020-10-08 18:27:52 +00:00
|
|
|
// TestEventBroker_EmptyReqToken_DistinctSubscriptions tests subscription
|
|
|
|
// hanlding behavior when ACLs are disabled (request Token is empty).
|
|
|
|
// Subscriptions are mapped by their request token. when that token is empty,
|
|
|
|
// the subscriptions should still be handled indeppendtly of each other when
|
|
|
|
// unssubscribing.
|
|
|
|
func TestEventBroker_EmptyReqToken_DistinctSubscriptions(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
2020-12-01 16:11:34 +00:00
|
|
|
publisher, err := NewEventBroker(ctx, nil, EventBrokerCfg{})
|
|
|
|
require.NoError(t, err)
|
2020-10-08 18:27:52 +00:00
|
|
|
|
|
|
|
// first subscription, empty token
|
|
|
|
sub1, err := publisher.Subscribe(&SubscribeRequest{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer sub1.Unsubscribe()
|
|
|
|
|
|
|
|
// second subscription, empty token
|
|
|
|
sub2, err := publisher.Subscribe(&SubscribeRequest{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, sub2)
|
|
|
|
|
|
|
|
sub1.Unsubscribe()
|
|
|
|
|
|
|
|
require.Equal(t, subscriptionStateOpen, atomic.LoadUint32(&sub2.state))
|
|
|
|
}
|
|
|
|
|
2020-12-11 15:40:50 +00:00
|
|
|
func TestEventBroker_handleACLUpdates_TokenDeleted(t *testing.T) {
|
2020-12-01 16:11:34 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
publisher, err := NewEventBroker(ctx, nil, EventBrokerCfg{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
sub1, err := publisher.Subscribe(&SubscribeRequest{
|
|
|
|
Topics: map[structs.Topic][]string{
|
|
|
|
"*": {"*"},
|
|
|
|
},
|
|
|
|
Token: "foo",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
defer sub1.Unsubscribe()
|
|
|
|
|
|
|
|
aclEvent := structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenDeleted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: "foo"}),
|
2020-12-01 16:11:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
publisher.Publish(&structs.Events{Index: 100, Events: []structs.Event{aclEvent}})
|
|
|
|
for {
|
|
|
|
_, err := sub1.Next(ctx)
|
|
|
|
if err == ErrSubscriptionClosed {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
out, err := sub1.Next(ctx)
|
|
|
|
require.Error(t, err)
|
|
|
|
require.Equal(t, ErrSubscriptionClosed, err)
|
|
|
|
require.Equal(t, structs.Events{}, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
type fakeACLDelegate struct {
|
|
|
|
tokenProvider ACLTokenProvider
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *fakeACLDelegate) TokenProvider() ACLTokenProvider {
|
|
|
|
return d.tokenProvider
|
|
|
|
}
|
|
|
|
|
|
|
|
type fakeACLTokenProvider struct {
|
|
|
|
policy *structs.ACLPolicy
|
|
|
|
policyErr error
|
|
|
|
token *structs.ACLToken
|
|
|
|
tokenErr error
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *fakeACLTokenProvider) ACLTokenBySecretID(ws memdb.WatchSet, secretID string) (*structs.ACLToken, error) {
|
|
|
|
return p.token, p.tokenErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *fakeACLTokenProvider) ACLPolicyByName(ws memdb.WatchSet, policyName string) (*structs.ACLPolicy, error) {
|
|
|
|
return p.policy, p.policyErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestEventBroker_handleACLUpdates_policyupdated(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
t.Cleanup(cancel)
|
|
|
|
|
|
|
|
secretID := "some-secret-id"
|
|
|
|
cases := []struct {
|
|
|
|
policyBeforeRules string
|
|
|
|
policyAfterRules string
|
|
|
|
topics map[structs.Topic][]string
|
|
|
|
desc string
|
|
|
|
event structs.Event
|
|
|
|
policyEvent structs.Event
|
|
|
|
shouldUnsubscribe bool
|
|
|
|
initialSubErr bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "subscribed to deployments and removed access",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{}),
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicDeployment,
|
|
|
|
Type: structs.TypeDeploymentUpdate,
|
|
|
|
Payload: structs.DeploymentEvent{
|
|
|
|
Deployment: &structs.Deployment{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to evals and removed access",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{}),
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
2020-12-03 16:48:18 +00:00
|
|
|
Topic: structs.TopicEvaluation,
|
2020-12-01 16:11:34 +00:00
|
|
|
Type: structs.TypeEvalUpdated,
|
2020-12-03 16:48:18 +00:00
|
|
|
Payload: structs.EvaluationEvent{
|
|
|
|
Evaluation: &structs.Evaluation{
|
2020-12-01 16:11:34 +00:00
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to allocs and removed access",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{}),
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
2020-12-03 16:48:18 +00:00
|
|
|
Topic: structs.TopicAllocation,
|
|
|
|
Type: structs.TypeAllocationUpdated,
|
|
|
|
Payload: structs.AllocationEvent{
|
|
|
|
Allocation: &structs.Allocation{
|
2020-12-01 16:11:34 +00:00
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to nodes and removed access",
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
policyAfterRules: mock.NodePolicy(acl.PolicyDeny),
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to deployments and no access change",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
shouldUnsubscribe: false,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicDeployment,
|
|
|
|
Type: structs.TypeDeploymentUpdate,
|
|
|
|
Payload: structs.DeploymentEvent{
|
|
|
|
Deployment: &structs.Deployment{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to evals and no access change",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
shouldUnsubscribe: false,
|
|
|
|
event: structs.Event{
|
2020-12-03 16:48:18 +00:00
|
|
|
Topic: structs.TopicEvaluation,
|
2020-12-01 16:11:34 +00:00
|
|
|
Type: structs.TypeEvalUpdated,
|
2020-12-03 16:48:18 +00:00
|
|
|
Payload: structs.EvaluationEvent{
|
|
|
|
Evaluation: &structs.Evaluation{
|
2020-12-01 16:11:34 +00:00
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to allocs and no access change",
|
|
|
|
policyBeforeRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
policyAfterRules: mock.NamespacePolicy(structs.DefaultNamespace, "", []string{acl.NamespaceCapabilityReadJob}),
|
|
|
|
shouldUnsubscribe: false,
|
|
|
|
event: structs.Event{
|
2020-12-03 16:48:18 +00:00
|
|
|
Topic: structs.TopicAllocation,
|
|
|
|
Type: structs.TypeAllocationUpdated,
|
|
|
|
Payload: structs.AllocationEvent{
|
|
|
|
Allocation: &structs.Allocation{
|
2020-12-01 16:11:34 +00:00
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to nodes and no access change",
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
policyAfterRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
shouldUnsubscribe: false,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "initial token insufficient privileges",
|
|
|
|
initialSubErr: true,
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyDeny),
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
2020-12-11 15:40:50 +00:00
|
|
|
Topic: structs.TopicACLToken,
|
|
|
|
Type: structs.TypeACLTokenUpserted,
|
|
|
|
Payload: structs.NewACLTokenEvent(&structs.ACLToken{SecretID: secretID}),
|
2020-12-01 16:11:34 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to nodes and policy change no change",
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
policyAfterRules: mock.NodePolicy(acl.PolicyWrite),
|
|
|
|
shouldUnsubscribe: false,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
|
|
|
Topic: structs.TopicACLPolicy,
|
|
|
|
Type: structs.TypeACLPolicyUpserted,
|
2020-12-11 15:40:50 +00:00
|
|
|
Payload: &structs.ACLPolicyEvent{
|
2020-12-01 16:11:34 +00:00
|
|
|
ACLPolicy: &structs.ACLPolicy{
|
|
|
|
Name: "some-policy",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to nodes and policy change no access",
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
policyAfterRules: mock.NodePolicy(acl.PolicyDeny),
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
|
|
|
Topic: structs.TopicACLPolicy,
|
|
|
|
Type: structs.TypeACLPolicyUpserted,
|
2020-12-11 15:40:50 +00:00
|
|
|
Payload: &structs.ACLPolicyEvent{
|
2020-12-01 16:11:34 +00:00
|
|
|
ACLPolicy: &structs.ACLPolicy{
|
|
|
|
Name: "some-policy",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "subscribed to nodes policy deleted",
|
|
|
|
policyBeforeRules: mock.NodePolicy(acl.PolicyRead),
|
|
|
|
policyAfterRules: "",
|
|
|
|
shouldUnsubscribe: true,
|
|
|
|
event: structs.Event{
|
|
|
|
Topic: structs.TopicNode,
|
|
|
|
Type: structs.TypeNodeRegistration,
|
|
|
|
Payload: structs.NodeStreamEvent{
|
|
|
|
Node: &structs.Node{
|
|
|
|
ID: "some-id",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
policyEvent: structs.Event{
|
|
|
|
Topic: structs.TopicACLPolicy,
|
|
|
|
Type: structs.TypeACLPolicyDeleted,
|
2020-12-11 15:40:50 +00:00
|
|
|
Payload: &structs.ACLPolicyEvent{
|
2020-12-01 16:11:34 +00:00
|
|
|
ACLPolicy: &structs.ACLPolicy{
|
|
|
|
Name: "some-policy",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
|
|
|
t.Run(tc.desc, func(t *testing.T) {
|
|
|
|
|
|
|
|
policy := &structs.ACLPolicy{
|
|
|
|
Name: "some-policy",
|
|
|
|
Rules: tc.policyBeforeRules,
|
|
|
|
}
|
|
|
|
policy.SetHash()
|
|
|
|
|
|
|
|
tokenProvider := &fakeACLTokenProvider{
|
|
|
|
policy: policy,
|
|
|
|
token: &structs.ACLToken{
|
|
|
|
SecretID: secretID,
|
|
|
|
Policies: []string{policy.Name},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
aclDelegate := &fakeACLDelegate{
|
|
|
|
tokenProvider: tokenProvider,
|
|
|
|
}
|
|
|
|
|
|
|
|
publisher, err := NewEventBroker(ctx, aclDelegate, EventBrokerCfg{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
sub, err := publisher.SubscribeWithACLCheck(&SubscribeRequest{
|
|
|
|
Topics: map[structs.Topic][]string{
|
|
|
|
tc.event.Topic: {"*"},
|
|
|
|
},
|
|
|
|
Namespace: structs.DefaultNamespace,
|
|
|
|
Token: secretID,
|
|
|
|
})
|
|
|
|
|
|
|
|
if tc.initialSubErr {
|
|
|
|
require.Error(t, err)
|
|
|
|
require.Nil(t, sub)
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
publisher.Publish(&structs.Events{Index: 100, Events: []structs.Event{tc.event}})
|
|
|
|
|
|
|
|
ctx, cancel := context.WithDeadline(ctx, time.Now().Add(100*time.Millisecond))
|
|
|
|
defer cancel()
|
|
|
|
_, err = sub.Next(ctx)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Update the mock provider to use the after rules
|
|
|
|
policyAfter := &structs.ACLPolicy{
|
|
|
|
Name: "some-new-policy",
|
|
|
|
Rules: tc.policyAfterRules,
|
|
|
|
ModifyIndex: 101, // The ModifyIndex is used to caclulate the acl cache key
|
|
|
|
}
|
|
|
|
policyAfter.SetHash()
|
|
|
|
|
|
|
|
tokenProvider.policy = policyAfter
|
|
|
|
|
|
|
|
// Publish ACL event triggering subscription re-evaluation
|
|
|
|
publisher.Publish(&structs.Events{Index: 101, Events: []structs.Event{tc.policyEvent}})
|
|
|
|
// Publish another event
|
|
|
|
publisher.Publish(&structs.Events{Index: 102, Events: []structs.Event{tc.event}})
|
|
|
|
|
|
|
|
// If we are expecting to unsubscribe consume the subscription
|
|
|
|
// until the expected error occurs.
|
|
|
|
ctx, cancel = context.WithDeadline(ctx, time.Now().Add(100*time.Millisecond))
|
|
|
|
defer cancel()
|
|
|
|
if tc.shouldUnsubscribe {
|
|
|
|
for {
|
|
|
|
_, err = sub.Next(ctx)
|
|
|
|
if err != nil {
|
|
|
|
if err == context.DeadlineExceeded {
|
|
|
|
require.Fail(t, err.Error())
|
|
|
|
}
|
|
|
|
if err == ErrSubscriptionClosed {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
_, err = sub.Next(ctx)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
publisher.Publish(&structs.Events{Index: 103, Events: []structs.Event{tc.event}})
|
|
|
|
|
|
|
|
ctx, cancel = context.WithDeadline(ctx, time.Now().Add(100*time.Millisecond))
|
|
|
|
defer cancel()
|
|
|
|
_, err = sub.Next(ctx)
|
|
|
|
if tc.shouldUnsubscribe {
|
|
|
|
require.Equal(t, ErrSubscriptionClosed, err)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-31 17:19:28 +00:00
|
|
|
func consumeSubscription(ctx context.Context, sub *Subscription) <-chan subNextResult {
|
|
|
|
eventCh := make(chan subNextResult, 1)
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
es, err := sub.Next(ctx)
|
|
|
|
eventCh <- subNextResult{
|
2020-10-01 18:43:28 +00:00
|
|
|
Events: es.Events,
|
2020-08-31 17:19:28 +00:00
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
return eventCh
|
|
|
|
}
|
|
|
|
|
|
|
|
type subNextResult struct {
|
2020-10-04 19:12:35 +00:00
|
|
|
Events []structs.Event
|
2020-08-31 17:19:28 +00:00
|
|
|
Err error
|
|
|
|
}
|
|
|
|
|
|
|
|
func nextResult(t *testing.T, eventCh <-chan subNextResult) subNextResult {
|
|
|
|
t.Helper()
|
|
|
|
select {
|
|
|
|
case next := <-eventCh:
|
|
|
|
return next
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
t.Fatalf("no event after 100ms")
|
|
|
|
}
|
|
|
|
return subNextResult{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func assertNoResult(t *testing.T, eventCh <-chan subNextResult) {
|
|
|
|
t.Helper()
|
|
|
|
select {
|
|
|
|
case next := <-eventCh:
|
|
|
|
require.NoError(t, next.Err)
|
|
|
|
require.Len(t, next.Events, 1)
|
|
|
|
t.Fatalf("received unexpected event: %#v", next.Events[0].Payload)
|
|
|
|
case <-time.After(100 * time.Millisecond):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func consumeSub(ctx context.Context, sub *Subscription) error {
|
|
|
|
for {
|
|
|
|
_, err := sub.Next(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|