2015-09-06 00:06:05 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2017-04-19 04:28:25 +00:00
|
|
|
"encoding/json"
|
2015-09-06 00:06:05 +00:00
|
|
|
"io/ioutil"
|
2017-05-03 00:37:09 +00:00
|
|
|
"log"
|
2015-09-06 00:06:05 +00:00
|
|
|
"os"
|
2015-09-11 19:02:22 +00:00
|
|
|
"strings"
|
2015-09-06 00:06:05 +00:00
|
|
|
"testing"
|
2015-09-06 01:41:00 +00:00
|
|
|
"time"
|
|
|
|
|
2017-05-03 00:37:09 +00:00
|
|
|
"github.com/hashicorp/nomad/helper"
|
2016-06-17 05:26:45 +00:00
|
|
|
sconfig "github.com/hashicorp/nomad/nomad/structs/config"
|
2017-09-06 18:23:58 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
2015-09-06 00:06:05 +00:00
|
|
|
)
|
|
|
|
|
2016-05-18 01:05:00 +00:00
|
|
|
func tmpDir(t testing.TB) string {
|
2015-09-06 00:06:05 +00:00
|
|
|
dir, err := ioutil.TempDir("", "nomad")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
return dir
|
|
|
|
}
|
|
|
|
|
2015-09-06 00:07:36 +00:00
|
|
|
func TestAgent_RPCPing(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-10-19 04:45:18 +00:00
|
|
|
agent := NewTestAgent(t, t.Name(), nil)
|
2015-09-06 00:07:36 +00:00
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
var out struct{}
|
|
|
|
if err := agent.RPC("Status.Ping", struct{}{}, &out); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
|
|
|
|
func TestAgent_ServerConfig(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2015-09-11 19:02:22 +00:00
|
|
|
conf := DefaultConfig()
|
2016-11-09 19:37:41 +00:00
|
|
|
conf.DevMode = true // allow localhost for advertise addrs
|
2015-09-11 19:02:22 +00:00
|
|
|
a := &Agent{config: conf}
|
|
|
|
|
|
|
|
conf.AdvertiseAddrs.Serf = "127.0.0.1:4000"
|
|
|
|
conf.AdvertiseAddrs.RPC = "127.0.0.1:4001"
|
2016-05-25 01:33:24 +00:00
|
|
|
conf.AdvertiseAddrs.HTTP = "10.10.11.1:4005"
|
2017-08-13 21:11:06 +00:00
|
|
|
conf.ACL.Enabled = true
|
2015-09-11 19:02:22 +00:00
|
|
|
|
|
|
|
// Parses the advertise addrs correctly
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
out, err := a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
serfAddr := out.SerfConfig.MemberlistConfig.AdvertiseAddr
|
|
|
|
if serfAddr != "127.0.0.1" {
|
|
|
|
t.Fatalf("expect 127.0.0.1, got: %s", serfAddr)
|
|
|
|
}
|
|
|
|
serfPort := out.SerfConfig.MemberlistConfig.AdvertisePort
|
|
|
|
if serfPort != 4000 {
|
|
|
|
t.Fatalf("expected 4000, got: %d", serfPort)
|
|
|
|
}
|
2017-08-13 21:11:06 +00:00
|
|
|
if out.AuthoritativeRegion != "global" {
|
|
|
|
t.Fatalf("bad: %#v", out.AuthoritativeRegion)
|
|
|
|
}
|
|
|
|
if !out.ACLEnabled {
|
|
|
|
t.Fatalf("ACL not enabled")
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
|
|
|
|
// Assert addresses weren't changed
|
|
|
|
if addr := conf.AdvertiseAddrs.RPC; addr != "127.0.0.1:4001" {
|
2015-09-11 19:02:22 +00:00
|
|
|
t.Fatalf("bad rpc advertise addr: %#v", addr)
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
if addr := conf.AdvertiseAddrs.HTTP; addr != "10.10.11.1:4005" {
|
2016-05-25 01:33:24 +00:00
|
|
|
t.Fatalf("expect 10.11.11.1:4005, got: %v", addr)
|
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.Addresses.RPC; addr != "0.0.0.0" {
|
|
|
|
t.Fatalf("expect 0.0.0.0, got: %v", addr)
|
2016-06-01 08:08:15 +00:00
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
|
|
|
|
// Sets up the ports properly
|
2016-11-09 00:02:20 +00:00
|
|
|
conf.Addresses.RPC = ""
|
|
|
|
conf.Addresses.Serf = ""
|
2015-09-11 19:02:22 +00:00
|
|
|
conf.Ports.RPC = 4003
|
|
|
|
conf.Ports.Serf = 4004
|
|
|
|
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if addr := out.RPCAddr.Port; addr != 4003 {
|
|
|
|
t.Fatalf("expect 4003, got: %d", out.RPCAddr.Port)
|
|
|
|
}
|
|
|
|
if port := out.SerfConfig.MemberlistConfig.BindPort; port != 4004 {
|
|
|
|
t.Fatalf("expect 4004, got: %d", port)
|
|
|
|
}
|
|
|
|
|
2016-06-01 08:08:15 +00:00
|
|
|
// Prefers advertise over bind addr
|
2015-09-11 19:02:22 +00:00
|
|
|
conf.BindAddr = "127.0.0.3"
|
2016-11-09 00:02:20 +00:00
|
|
|
conf.Addresses.HTTP = "127.0.0.2"
|
2015-09-11 19:02:22 +00:00
|
|
|
conf.Addresses.RPC = "127.0.0.2"
|
|
|
|
conf.Addresses.Serf = "127.0.0.2"
|
2016-11-01 01:08:49 +00:00
|
|
|
conf.AdvertiseAddrs.HTTP = "10.0.0.10"
|
2016-09-02 23:23:45 +00:00
|
|
|
conf.AdvertiseAddrs.RPC = ""
|
2016-09-11 18:02:11 +00:00
|
|
|
conf.AdvertiseAddrs.Serf = "10.0.0.12:4004"
|
2015-09-11 19:02:22 +00:00
|
|
|
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if addr := out.RPCAddr.IP.String(); addr != "127.0.0.2" {
|
|
|
|
t.Fatalf("expect 127.0.0.2, got: %s", addr)
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
if port := out.RPCAddr.Port; port != 4003 {
|
|
|
|
t.Fatalf("expect 4647, got: %d", port)
|
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
if addr := out.SerfConfig.MemberlistConfig.BindAddr; addr != "127.0.0.2" {
|
|
|
|
t.Fatalf("expect 127.0.0.2, got: %s", addr)
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
if port := out.SerfConfig.MemberlistConfig.BindPort; port != 4004 {
|
2016-11-09 21:16:56 +00:00
|
|
|
t.Fatalf("expect 4648, got: %d", port)
|
2016-09-02 23:23:45 +00:00
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.Addresses.HTTP; addr != "127.0.0.2" {
|
|
|
|
t.Fatalf("expect 127.0.0.2, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.Addresses.RPC; addr != "127.0.0.2" {
|
|
|
|
t.Fatalf("expect 127.0.0.2, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.Addresses.Serf; addr != "127.0.0.2" {
|
|
|
|
t.Fatalf("expect 10.0.0.12, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.normalizedAddrs.HTTP; addr != "127.0.0.2:4646" {
|
2016-09-02 23:23:45 +00:00
|
|
|
t.Fatalf("expect 127.0.0.2:4646, got: %s", addr)
|
2016-05-25 01:33:24 +00:00
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.normalizedAddrs.RPC; addr != "127.0.0.2:4003" {
|
2016-09-11 18:02:11 +00:00
|
|
|
t.Fatalf("expect 127.0.0.2:4003, got: %s", addr)
|
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.normalizedAddrs.Serf; addr != "127.0.0.2:4004" {
|
2016-09-11 18:02:11 +00:00
|
|
|
t.Fatalf("expect 10.0.0.12:4004, got: %s", addr)
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
if addr := conf.AdvertiseAddrs.HTTP; addr != "10.0.0.10:4646" {
|
|
|
|
t.Fatalf("expect 10.0.0.10:4646, got: %s", addr)
|
2016-09-11 18:40:52 +00:00
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.AdvertiseAddrs.RPC; addr != "127.0.0.2:4003" {
|
|
|
|
t.Fatalf("expect 127.0.0.2:4003, got: %s", addr)
|
2016-09-11 18:40:52 +00:00
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
if addr := conf.AdvertiseAddrs.Serf; addr != "10.0.0.12:4004" {
|
|
|
|
t.Fatalf("expect 10.0.0.12:4004, got: %s", addr)
|
2016-09-11 18:02:11 +00:00
|
|
|
}
|
|
|
|
|
2015-10-29 13:47:06 +00:00
|
|
|
conf.Server.NodeGCThreshold = "42g"
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-10-29 13:47:06 +00:00
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "unknown unit") {
|
|
|
|
t.Fatalf("expected unknown unit error, got: %#v", err)
|
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
|
2015-10-29 13:47:06 +00:00
|
|
|
conf.Server.NodeGCThreshold = "10s"
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-10-29 13:47:06 +00:00
|
|
|
out, err = a.serverConfig()
|
|
|
|
if threshold := out.NodeGCThreshold; threshold != time.Second*10 {
|
|
|
|
t.Fatalf("expect 10s, got: %s", threshold)
|
|
|
|
}
|
|
|
|
|
2017-07-19 16:38:35 +00:00
|
|
|
conf.Server.HeartbeatGrace = 37 * time.Second
|
2016-03-04 23:44:12 +00:00
|
|
|
out, err = a.serverConfig()
|
2017-07-19 16:38:35 +00:00
|
|
|
if threshold := out.HeartbeatGrace; threshold != time.Second*37 {
|
|
|
|
t.Fatalf("expect 37s, got: %s", threshold)
|
2016-03-04 23:44:12 +00:00
|
|
|
}
|
2016-11-09 00:02:20 +00:00
|
|
|
|
2017-07-19 16:38:35 +00:00
|
|
|
conf.Server.MinHeartbeatTTL = 37 * time.Second
|
|
|
|
out, err = a.serverConfig()
|
|
|
|
if min := out.MinHeartbeatTTL; min != time.Second*37 {
|
|
|
|
t.Fatalf("expect 37s, got: %s", min)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2017-07-19 16:38:35 +00:00
|
|
|
|
|
|
|
conf.Server.MaxHeartbeatsPerSecond = 11.0
|
2016-03-04 23:44:12 +00:00
|
|
|
out, err = a.serverConfig()
|
2017-07-19 16:38:35 +00:00
|
|
|
if max := out.MaxHeartbeatsPerSecond; max != 11.0 {
|
2017-07-19 18:53:18 +00:00
|
|
|
t.Fatalf("expect 11, got: %v", max)
|
2016-03-04 23:44:12 +00:00
|
|
|
}
|
|
|
|
|
2015-09-11 19:02:22 +00:00
|
|
|
// Defaults to the global bind addr
|
|
|
|
conf.Addresses.RPC = ""
|
|
|
|
conf.Addresses.Serf = ""
|
2016-05-25 01:33:24 +00:00
|
|
|
conf.Addresses.HTTP = ""
|
2016-06-01 08:08:15 +00:00
|
|
|
conf.AdvertiseAddrs.RPC = ""
|
|
|
|
conf.AdvertiseAddrs.HTTP = ""
|
|
|
|
conf.AdvertiseAddrs.Serf = ""
|
|
|
|
conf.Ports.HTTP = 4646
|
|
|
|
conf.Ports.RPC = 4647
|
|
|
|
conf.Ports.Serf = 4648
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:02:20 +00:00
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if addr := out.RPCAddr.IP.String(); addr != "127.0.0.3" {
|
|
|
|
t.Fatalf("expect 127.0.0.3, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := out.SerfConfig.MemberlistConfig.BindAddr; addr != "127.0.0.3" {
|
|
|
|
t.Fatalf("expect 127.0.0.3, got: %s", addr)
|
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.Addresses.HTTP; addr != "127.0.0.3" {
|
|
|
|
t.Fatalf("expect 127.0.0.3, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.Addresses.RPC; addr != "127.0.0.3" {
|
|
|
|
t.Fatalf("expect 127.0.0.3, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.Addresses.Serf; addr != "127.0.0.3" {
|
|
|
|
t.Fatalf("expect 127.0.0.3, got: %s", addr)
|
|
|
|
}
|
|
|
|
if addr := conf.normalizedAddrs.HTTP; addr != "127.0.0.3:4646" {
|
2016-05-25 01:33:24 +00:00
|
|
|
t.Fatalf("expect 127.0.0.3:4646, got: %s", addr)
|
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.normalizedAddrs.RPC; addr != "127.0.0.3:4647" {
|
2016-06-01 08:08:15 +00:00
|
|
|
t.Fatalf("expect 127.0.0.3:4647, got: %s", addr)
|
|
|
|
}
|
2016-11-09 19:37:41 +00:00
|
|
|
if addr := conf.normalizedAddrs.Serf; addr != "127.0.0.3:4648" {
|
2016-06-01 08:08:15 +00:00
|
|
|
t.Fatalf("expect 127.0.0.3:4648, got: %s", addr)
|
|
|
|
}
|
2015-09-22 21:25:43 +00:00
|
|
|
|
|
|
|
// Properly handles the bootstrap flags
|
|
|
|
conf.Server.BootstrapExpect = 1
|
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if !out.Bootstrap {
|
|
|
|
t.Fatalf("should have set bootstrap mode")
|
|
|
|
}
|
|
|
|
if out.BootstrapExpect != 0 {
|
|
|
|
t.Fatalf("boostrap expect should be 0")
|
|
|
|
}
|
|
|
|
|
|
|
|
conf.Server.BootstrapExpect = 3
|
|
|
|
out, err = a.serverConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if out.Bootstrap {
|
|
|
|
t.Fatalf("bootstrap mode should be disabled")
|
|
|
|
}
|
|
|
|
if out.BootstrapExpect != 3 {
|
|
|
|
t.Fatalf("should have bootstrap-expect = 3")
|
|
|
|
}
|
2015-09-11 19:02:22 +00:00
|
|
|
}
|
2016-02-16 21:42:48 +00:00
|
|
|
|
|
|
|
func TestAgent_ClientConfig(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2016-02-16 21:42:48 +00:00
|
|
|
conf := DefaultConfig()
|
|
|
|
conf.Client.Enabled = true
|
2016-11-18 19:51:27 +00:00
|
|
|
|
|
|
|
// For Clients HTTP and RPC must be set (Serf can be skipped)
|
|
|
|
conf.Addresses.HTTP = "169.254.0.1"
|
|
|
|
conf.Addresses.RPC = "169.254.0.1"
|
2016-02-16 21:42:48 +00:00
|
|
|
conf.Ports.HTTP = 5678
|
2016-11-18 19:51:27 +00:00
|
|
|
a := &Agent{config: conf}
|
2016-02-16 21:42:48 +00:00
|
|
|
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:35:11 +00:00
|
|
|
}
|
2016-02-16 21:42:48 +00:00
|
|
|
c, err := a.clientConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("got err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-11-18 19:51:27 +00:00
|
|
|
expectedHttpAddr := "169.254.0.1:5678"
|
2016-02-16 21:42:48 +00:00
|
|
|
if c.Node.HTTPAddr != expectedHttpAddr {
|
|
|
|
t.Fatalf("Expected http addr: %v, got: %v", expectedHttpAddr, c.Node.HTTPAddr)
|
|
|
|
}
|
2016-02-17 01:54:17 +00:00
|
|
|
|
|
|
|
conf = DefaultConfig()
|
2016-11-09 00:35:11 +00:00
|
|
|
conf.DevMode = true
|
2016-02-17 01:54:17 +00:00
|
|
|
a = &Agent{config: conf}
|
|
|
|
conf.Client.Enabled = true
|
2016-11-18 19:51:27 +00:00
|
|
|
conf.Addresses.HTTP = "169.254.0.1"
|
2016-02-17 01:54:17 +00:00
|
|
|
|
2016-11-09 19:37:41 +00:00
|
|
|
if err := conf.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
2016-11-09 00:35:11 +00:00
|
|
|
}
|
2016-02-17 01:54:17 +00:00
|
|
|
c, err = a.clientConfig()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("got err: %v", err)
|
|
|
|
}
|
|
|
|
|
2016-11-18 19:51:27 +00:00
|
|
|
expectedHttpAddr = "169.254.0.1:4646"
|
2016-02-17 01:54:17 +00:00
|
|
|
if c.Node.HTTPAddr != expectedHttpAddr {
|
|
|
|
t.Fatalf("Expected http addr: %v, got: %v", expectedHttpAddr, c.Node.HTTPAddr)
|
|
|
|
}
|
2016-02-16 21:42:48 +00:00
|
|
|
}
|
2017-04-19 04:28:25 +00:00
|
|
|
|
2017-09-06 18:23:58 +00:00
|
|
|
// Clients should inherit telemetry configuration
|
|
|
|
func TestAget_Client_TelemetryConfiguration(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
conf := DefaultConfig()
|
|
|
|
conf.DevMode = true
|
|
|
|
conf.Telemetry.DisableTaggedMetrics = true
|
|
|
|
conf.Telemetry.BackwardsCompatibleMetrics = true
|
|
|
|
|
|
|
|
a := &Agent{config: conf}
|
|
|
|
|
|
|
|
c, err := a.clientConfig()
|
|
|
|
assert.Nil(err)
|
|
|
|
|
|
|
|
telemetry := conf.Telemetry
|
|
|
|
|
|
|
|
assert.Equal(c.StatsCollectionInterval, telemetry.collectionInterval)
|
|
|
|
assert.Equal(c.PublishNodeMetrics, telemetry.PublishNodeMetrics)
|
|
|
|
assert.Equal(c.PublishAllocationMetrics, telemetry.PublishAllocationMetrics)
|
|
|
|
assert.Equal(c.DisableTaggedMetrics, telemetry.DisableTaggedMetrics)
|
|
|
|
assert.Equal(c.BackwardsCompatibleMetrics, telemetry.BackwardsCompatibleMetrics)
|
|
|
|
}
|
|
|
|
|
2017-05-03 00:37:09 +00:00
|
|
|
// TestAgent_HTTPCheck asserts Agent.agentHTTPCheck properly alters the HTTP
|
|
|
|
// API health check depending on configuration.
|
|
|
|
func TestAgent_HTTPCheck(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-05-03 00:37:09 +00:00
|
|
|
logger := log.New(ioutil.Discard, "", 0)
|
|
|
|
if testing.Verbose() {
|
|
|
|
logger = log.New(os.Stdout, "[TestAgent_HTTPCheck] ", log.Lshortfile)
|
|
|
|
}
|
|
|
|
agent := func() *Agent {
|
|
|
|
return &Agent{
|
|
|
|
logger: logger,
|
|
|
|
config: &Config{
|
|
|
|
AdvertiseAddrs: &AdvertiseAddrs{HTTP: "advertise:4646"},
|
|
|
|
normalizedAddrs: &Addresses{HTTP: "normalized:4646"},
|
|
|
|
Consul: &sconfig.ConsulConfig{
|
|
|
|
ChecksUseAdvertise: helper.BoolToPtr(false),
|
|
|
|
},
|
|
|
|
TLSConfig: &sconfig.TLSConfig{EnableHTTP: false},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("Plain HTTP Check", func(t *testing.T) {
|
|
|
|
a := agent()
|
2017-06-21 17:41:28 +00:00
|
|
|
check := a.agentHTTPCheck(false)
|
2017-05-03 00:37:09 +00:00
|
|
|
if check == nil {
|
|
|
|
t.Fatalf("expected non-nil check")
|
|
|
|
}
|
|
|
|
if check.Type != "http" {
|
|
|
|
t.Errorf("expected http check not: %q", check.Type)
|
|
|
|
}
|
2017-10-13 22:37:44 +00:00
|
|
|
if expected := "/v1/agent/health?type=client"; check.Path != expected {
|
2017-05-03 00:37:09 +00:00
|
|
|
t.Errorf("expected %q path not: %q", expected, check.Path)
|
|
|
|
}
|
|
|
|
if check.Protocol != "http" {
|
|
|
|
t.Errorf("expected http proto not: %q", check.Protocol)
|
|
|
|
}
|
|
|
|
if expected := a.config.normalizedAddrs.HTTP; check.PortLabel != expected {
|
|
|
|
t.Errorf("expected normalized addr not %q", check.PortLabel)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("Plain HTTP + ChecksUseAdvertise", func(t *testing.T) {
|
|
|
|
a := agent()
|
|
|
|
a.config.Consul.ChecksUseAdvertise = helper.BoolToPtr(true)
|
2017-06-21 17:41:28 +00:00
|
|
|
check := a.agentHTTPCheck(false)
|
2017-05-03 00:37:09 +00:00
|
|
|
if check == nil {
|
|
|
|
t.Fatalf("expected non-nil check")
|
|
|
|
}
|
|
|
|
if expected := a.config.AdvertiseAddrs.HTTP; check.PortLabel != expected {
|
|
|
|
t.Errorf("expected advertise addr not %q", check.PortLabel)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("HTTPS + consulSupportsTLSSkipVerify", func(t *testing.T) {
|
|
|
|
a := agent()
|
|
|
|
a.consulSupportsTLSSkipVerify = true
|
|
|
|
a.config.TLSConfig.EnableHTTP = true
|
|
|
|
|
2017-06-21 17:41:28 +00:00
|
|
|
check := a.agentHTTPCheck(false)
|
2017-05-03 00:37:09 +00:00
|
|
|
if check == nil {
|
|
|
|
t.Fatalf("expected non-nil check")
|
|
|
|
}
|
|
|
|
if !check.TLSSkipVerify {
|
|
|
|
t.Errorf("expected tls skip verify")
|
|
|
|
}
|
|
|
|
if check.Protocol != "https" {
|
|
|
|
t.Errorf("expected https not: %q", check.Protocol)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("HTTPS w/o TLSSkipVerify", func(t *testing.T) {
|
|
|
|
a := agent()
|
|
|
|
a.consulSupportsTLSSkipVerify = false
|
|
|
|
a.config.TLSConfig.EnableHTTP = true
|
|
|
|
|
2017-06-21 17:41:28 +00:00
|
|
|
if check := a.agentHTTPCheck(false); check != nil {
|
2017-05-03 00:37:09 +00:00
|
|
|
t.Fatalf("expected nil check not: %#v", check)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("HTTPS + VerifyHTTPSClient", func(t *testing.T) {
|
|
|
|
a := agent()
|
|
|
|
a.consulSupportsTLSSkipVerify = true
|
|
|
|
a.config.TLSConfig.EnableHTTP = true
|
|
|
|
a.config.TLSConfig.VerifyHTTPSClient = true
|
|
|
|
|
2017-06-21 17:41:28 +00:00
|
|
|
if check := a.agentHTTPCheck(false); check != nil {
|
2017-05-03 00:37:09 +00:00
|
|
|
t.Fatalf("expected nil check not: %#v", check)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-04-19 04:28:25 +00:00
|
|
|
func TestAgent_ConsulSupportsTLSSkipVerify(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-04-19 04:28:25 +00:00
|
|
|
assertSupport := func(expected bool, blob string) {
|
|
|
|
self := map[string]map[string]interface{}{}
|
|
|
|
if err := json.Unmarshal([]byte("{"+blob+"}"), &self); err != nil {
|
|
|
|
t.Fatalf("invalid json: %v", err)
|
|
|
|
}
|
|
|
|
actual := consulSupportsTLSSkipVerify(self)
|
|
|
|
if actual != expected {
|
|
|
|
t.Errorf("expected %t but got %t for:\n%s\n", expected, actual, blob)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// 0.6.4
|
|
|
|
assertSupport(false, `"Member": {
|
|
|
|
"Addr": "127.0.0.1",
|
|
|
|
"DelegateCur": 4,
|
|
|
|
"DelegateMax": 4,
|
|
|
|
"DelegateMin": 2,
|
|
|
|
"Name": "rusty",
|
|
|
|
"Port": 8301,
|
|
|
|
"ProtocolCur": 2,
|
|
|
|
"ProtocolMax": 3,
|
|
|
|
"ProtocolMin": 1,
|
|
|
|
"Status": 1,
|
|
|
|
"Tags": {
|
|
|
|
"build": "0.6.4:26a0ef8c",
|
|
|
|
"dc": "dc1",
|
|
|
|
"port": "8300",
|
|
|
|
"role": "consul",
|
|
|
|
"vsn": "2",
|
|
|
|
"vsn_max": "3",
|
|
|
|
"vsn_min": "1"
|
|
|
|
}}`)
|
|
|
|
|
|
|
|
// 0.7.0
|
|
|
|
assertSupport(false, `"Member": {
|
|
|
|
"Addr": "127.0.0.1",
|
|
|
|
"DelegateCur": 4,
|
|
|
|
"DelegateMax": 4,
|
|
|
|
"DelegateMin": 2,
|
|
|
|
"Name": "rusty",
|
|
|
|
"Port": 8301,
|
|
|
|
"ProtocolCur": 2,
|
|
|
|
"ProtocolMax": 4,
|
|
|
|
"ProtocolMin": 1,
|
|
|
|
"Status": 1,
|
|
|
|
"Tags": {
|
|
|
|
"build": "0.7.0:'a189091",
|
|
|
|
"dc": "dc1",
|
|
|
|
"port": "8300",
|
|
|
|
"role": "consul",
|
|
|
|
"vsn": "2",
|
|
|
|
"vsn_max": "3",
|
|
|
|
"vsn_min": "2"
|
|
|
|
}}`)
|
|
|
|
|
|
|
|
// 0.7.2
|
|
|
|
assertSupport(true, `"Member": {
|
|
|
|
"Addr": "127.0.0.1",
|
|
|
|
"DelegateCur": 4,
|
|
|
|
"DelegateMax": 4,
|
|
|
|
"DelegateMin": 2,
|
|
|
|
"Name": "rusty",
|
|
|
|
"Port": 8301,
|
|
|
|
"ProtocolCur": 2,
|
|
|
|
"ProtocolMax": 5,
|
|
|
|
"ProtocolMin": 1,
|
|
|
|
"Status": 1,
|
|
|
|
"Tags": {
|
|
|
|
"build": "0.7.2:'a9afa0c",
|
|
|
|
"dc": "dc1",
|
|
|
|
"port": "8300",
|
|
|
|
"role": "consul",
|
|
|
|
"vsn": "2",
|
|
|
|
"vsn_max": "3",
|
|
|
|
"vsn_min": "2"
|
|
|
|
}}`)
|
|
|
|
|
|
|
|
// 0.8.1
|
|
|
|
assertSupport(true, `"Member": {
|
|
|
|
"Addr": "127.0.0.1",
|
|
|
|
"DelegateCur": 4,
|
|
|
|
"DelegateMax": 5,
|
|
|
|
"DelegateMin": 2,
|
|
|
|
"Name": "rusty",
|
|
|
|
"Port": 8301,
|
|
|
|
"ProtocolCur": 2,
|
|
|
|
"ProtocolMax": 5,
|
|
|
|
"ProtocolMin": 1,
|
|
|
|
"Status": 1,
|
|
|
|
"Tags": {
|
|
|
|
"build": "0.8.1:'e9ca44d",
|
|
|
|
"dc": "dc1",
|
|
|
|
"id": "3ddc1b59-460e-a100-1d5c-ce3972122664",
|
|
|
|
"port": "8300",
|
|
|
|
"raft_vsn": "2",
|
|
|
|
"role": "consul",
|
|
|
|
"vsn": "2",
|
|
|
|
"vsn_max": "3",
|
|
|
|
"vsn_min": "2",
|
|
|
|
"wan_join_port": "8302"
|
|
|
|
}}`)
|
|
|
|
}
|
2017-06-21 17:41:28 +00:00
|
|
|
|
|
|
|
// TestAgent_HTTPCheckPath asserts clients and servers use different endpoints
|
|
|
|
// for healthchecks.
|
|
|
|
func TestAgent_HTTPCheckPath(t *testing.T) {
|
2017-07-20 05:42:15 +00:00
|
|
|
t.Parallel()
|
2017-06-21 17:41:28 +00:00
|
|
|
// Agent.agentHTTPCheck only needs a config and logger
|
|
|
|
a := &Agent{
|
|
|
|
config: DevConfig(),
|
|
|
|
logger: log.New(ioutil.Discard, "", 0),
|
|
|
|
}
|
|
|
|
if err := a.config.normalizeAddrs(); err != nil {
|
|
|
|
t.Fatalf("error normalizing config: %v", err)
|
|
|
|
}
|
|
|
|
if testing.Verbose() {
|
|
|
|
a.logger = log.New(os.Stderr, "", log.LstdFlags)
|
|
|
|
}
|
|
|
|
|
2017-10-13 22:37:44 +00:00
|
|
|
// Assert server check uses /v1/agent/health?type=server
|
2017-06-21 17:41:28 +00:00
|
|
|
isServer := true
|
|
|
|
check := a.agentHTTPCheck(isServer)
|
|
|
|
if expected := "Nomad Server HTTP Check"; check.Name != expected {
|
|
|
|
t.Errorf("expected server check name to be %q but found %q", expected, check.Name)
|
|
|
|
}
|
2017-10-13 22:37:44 +00:00
|
|
|
if expected := "/v1/agent/health?type=server"; check.Path != expected {
|
2017-06-21 17:41:28 +00:00
|
|
|
t.Errorf("expected server check path to be %q but found %q", expected, check.Path)
|
|
|
|
}
|
|
|
|
|
2017-10-13 22:37:44 +00:00
|
|
|
// Assert client check uses /v1/agent/health?type=client
|
2017-06-21 17:41:28 +00:00
|
|
|
isServer = false
|
|
|
|
check = a.agentHTTPCheck(isServer)
|
|
|
|
if expected := "Nomad Client HTTP Check"; check.Name != expected {
|
|
|
|
t.Errorf("expected client check name to be %q but found %q", expected, check.Name)
|
|
|
|
}
|
2017-10-13 22:37:44 +00:00
|
|
|
if expected := "/v1/agent/health?type=client"; check.Path != expected {
|
2017-06-21 17:41:28 +00:00
|
|
|
t.Errorf("expected client check path to be %q but found %q", expected, check.Path)
|
|
|
|
}
|
|
|
|
}
|