client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
2021-07-07 16:14:45 +00:00
|
|
|
"fmt"
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
"testing"
|
2021-01-22 19:45:26 +00:00
|
|
|
"time"
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/api"
|
2022-03-15 12:42:43 +00:00
|
|
|
"github.com/hashicorp/nomad/ci"
|
2022-03-15 08:38:30 +00:00
|
|
|
"github.com/hashicorp/nomad/client/serviceregistration"
|
2021-01-22 19:45:26 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/testlog"
|
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2022-05-31 15:06:39 +00:00
|
|
|
"github.com/shoenig/test/must"
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
2021-06-16 21:10:57 +00:00
|
|
|
func TestSyncLogic_agentServiceUpdateRequired(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2021-06-16 21:10:57 +00:00
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
// the service as known by nomad
|
2021-06-16 21:10:57 +00:00
|
|
|
wanted := func() api.AgentServiceRegistration {
|
|
|
|
return api.AgentServiceRegistration{
|
|
|
|
Kind: "",
|
|
|
|
ID: "aca4c175-1778-5ef4-0220-2ab434147d35",
|
|
|
|
Name: "myservice",
|
|
|
|
Tags: []string{"a", "b"},
|
|
|
|
Port: 9000,
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Meta: map[string]string{"foo": "1"},
|
2022-05-31 15:06:39 +00:00
|
|
|
TaggedAddresses: map[string]api.ServiceAddress{
|
|
|
|
"public_wan": {Address: "1.2.3.4", Port: 8080},
|
|
|
|
},
|
2021-06-16 21:10:57 +00:00
|
|
|
Connect: &api.AgentServiceConnect{
|
|
|
|
Native: false,
|
|
|
|
SidecarService: &api.AgentServiceRegistration{
|
|
|
|
Kind: "connect-proxy",
|
|
|
|
ID: "_nomad-task-8e8413af-b5bb-aa67-2c24-c146c45f1ec9-group-mygroup-myservice-9001-sidecar-proxy",
|
|
|
|
Name: "name-sidecar-proxy",
|
|
|
|
Tags: []string{"x", "y", "z"},
|
|
|
|
Proxy: &api.AgentServiceConnectProxyConfig{
|
|
|
|
Upstreams: []api.Upstream{{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
DestinationName: "dest1",
|
|
|
|
}},
|
|
|
|
},
|
|
|
|
},
|
2020-02-14 19:44:34 +00:00
|
|
|
},
|
2021-06-16 21:10:57 +00:00
|
|
|
}
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
}
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
// the service (and + connect proxy) as known by consul
|
2021-06-16 21:10:57 +00:00
|
|
|
existing := &api.AgentService{
|
2020-02-14 19:44:34 +00:00
|
|
|
Kind: "",
|
|
|
|
ID: "aca4c175-1778-5ef4-0220-2ab434147d35",
|
|
|
|
Service: "myservice",
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
Tags: []string{"a", "b"},
|
|
|
|
Port: 9000,
|
|
|
|
Address: "1.1.1.1",
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Meta: map[string]string{"foo": "1"},
|
2022-05-31 15:06:39 +00:00
|
|
|
TaggedAddresses: map[string]api.ServiceAddress{
|
|
|
|
"public_wan": {Address: "1.2.3.4", Port: 8080},
|
|
|
|
},
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
}
|
|
|
|
|
2021-06-16 21:10:57 +00:00
|
|
|
sidecar := &api.AgentService{
|
2020-02-14 19:44:34 +00:00
|
|
|
Kind: "connect-proxy",
|
|
|
|
ID: "_nomad-task-8e8413af-b5bb-aa67-2c24-c146c45f1ec9-group-mygroup-myservice-9001-sidecar-proxy",
|
|
|
|
Service: "myservice-sidecar-proxy",
|
|
|
|
Tags: []string{"x", "y", "z"},
|
2021-06-16 21:10:57 +00:00
|
|
|
Proxy: &api.AgentServiceConnectProxyConfig{
|
|
|
|
Upstreams: []api.Upstream{{
|
|
|
|
Datacenter: "dc1",
|
|
|
|
DestinationName: "dest1",
|
|
|
|
}},
|
|
|
|
},
|
2020-02-14 19:44:34 +00:00
|
|
|
}
|
|
|
|
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
// By default wanted and existing match. Each test should modify wanted in
|
|
|
|
// 1 way, and / or configure the type of sync operation that is being
|
|
|
|
// considered, then evaluate the result of the update-required algebra.
|
|
|
|
|
|
|
|
type asr = api.AgentServiceRegistration
|
|
|
|
type tweaker func(w asr) *asr // create a conveniently modifiable copy
|
|
|
|
|
|
|
|
try := func(
|
|
|
|
t *testing.T,
|
|
|
|
exp bool,
|
|
|
|
reason syncReason,
|
|
|
|
tweak tweaker) {
|
2021-06-16 21:10:57 +00:00
|
|
|
result := agentServiceUpdateRequired(reason, tweak(wanted()), existing, sidecar)
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
require.Equal(t, exp, result)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("matching", func(t *testing.T) {
|
|
|
|
try(t, false, syncNewOps, func(w asr) *asr {
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different kind", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Kind = "other"
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different id", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.ID = "_other"
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different port", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Port = 9001
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different address", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Address = "2.2.2.2"
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different name", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Name = "bob"
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different enable_tag_override", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.EnableTagOverride = false
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different meta", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Meta = map[string]string{"foo": "2"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2021-06-16 21:10:57 +00:00
|
|
|
t.Run("different sidecar upstream", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Connect.SidecarService.Proxy.Upstreams[0].DestinationName = "dest2"
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("remove sidecar upstream", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Connect.SidecarService.Proxy.Upstreams = nil
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("additional sidecar upstream", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Connect.SidecarService.Proxy.Upstreams = append(
|
|
|
|
w.Connect.SidecarService.Proxy.Upstreams,
|
|
|
|
api.Upstream{
|
|
|
|
Datacenter: "dc2",
|
|
|
|
DestinationName: "dest2",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("nil proxy block", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Connect.SidecarService.Proxy = nil
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
t.Run("different tags syncNewOps eto=true", func(t *testing.T) {
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
// sync is required even though eto=true, because NewOps indicates the
|
|
|
|
// service definition in nomad has changed (e.g. job run a modified job)
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
t.Run("different tags syncPeriodic eto=true", func(t *testing.T) {
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
// sync is not required since eto=true and this is a periodic sync
|
|
|
|
// with consul - in which case we keep Consul's definition of the tags
|
|
|
|
try(t, false, syncPeriodic, func(w asr) *asr {
|
|
|
|
w.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
t.Run("different sidecar tags on syncPeriodic eto=true", func(t *testing.T) {
|
|
|
|
try(t, false, syncPeriodic, func(w asr) *asr {
|
|
|
|
// like the parent service, the sidecar's tags do not get enforced
|
|
|
|
// if ETO is true and this is a periodic sync
|
|
|
|
w.Connect.SidecarService.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different sidecar tags on syncNewOps eto=true", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
// like the parent service, the sidecar's tags always get enforced
|
|
|
|
// regardless of ETO if this is a sync due to applied operations
|
|
|
|
w.Connect.SidecarService.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2022-05-31 15:06:39 +00:00
|
|
|
t.Run("different tagged addresses", func(t *testing.T) {
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
|
|
|
w.TaggedAddresses = map[string]api.ServiceAddress{
|
|
|
|
"public_wan": {Address: "5.6.7.8", Port: 8080},
|
|
|
|
}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
// for remaining tests, EnableTagOverride = false
|
|
|
|
existing.EnableTagOverride = false
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
t.Run("different tags syncPeriodic eto=false", func(t *testing.T) {
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
// sync is required because eto=false and the tags do not match
|
|
|
|
try(t, true, syncPeriodic, func(w asr) *asr {
|
2021-06-16 21:10:57 +00:00
|
|
|
w.EnableTagOverride = false
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
w.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2020-02-14 19:44:34 +00:00
|
|
|
t.Run("different tags syncNewOps eto=false", func(t *testing.T) {
|
|
|
|
// sync is required because eto=false and the tags do not match
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
2021-06-16 21:10:57 +00:00
|
|
|
w.EnableTagOverride = false
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
w.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
2020-02-14 19:44:34 +00:00
|
|
|
|
|
|
|
t.Run("different sidecar tags on syncPeriodic eto=false", func(t *testing.T) {
|
|
|
|
// like the parent service, sync is required because eto=false and the
|
|
|
|
// sidecar's tags do not match
|
|
|
|
try(t, true, syncPeriodic, func(w asr) *asr {
|
2021-06-16 21:10:57 +00:00
|
|
|
w.EnableTagOverride = false
|
2020-02-14 19:44:34 +00:00
|
|
|
w.Connect.SidecarService.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("different sidecar tags syncNewOps eto=false", func(t *testing.T) {
|
|
|
|
// like the parent service, sync is required because eto=false and the
|
|
|
|
// sidecar's tags do not match
|
|
|
|
try(t, true, syncNewOps, func(w asr) *asr {
|
2021-06-16 21:10:57 +00:00
|
|
|
w.EnableTagOverride = false
|
2020-02-14 19:44:34 +00:00
|
|
|
w.Connect.SidecarService.Tags = []string{"other", "tags"}
|
|
|
|
return &w
|
|
|
|
})
|
|
|
|
})
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
}
|
|
|
|
|
2021-02-16 18:44:41 +00:00
|
|
|
func TestSyncLogic_sidecarTagsDifferent(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
|
|
|
|
2021-02-16 18:44:41 +00:00
|
|
|
type tc struct {
|
|
|
|
parent, wanted, sidecar []string
|
|
|
|
expect bool
|
|
|
|
}
|
|
|
|
|
|
|
|
try := func(t *testing.T, test tc) {
|
|
|
|
result := sidecarTagsDifferent(test.parent, test.wanted, test.sidecar)
|
|
|
|
require.Equal(t, test.expect, result)
|
|
|
|
}
|
|
|
|
|
|
|
|
try(t, tc{parent: nil, wanted: nil, sidecar: nil, expect: false})
|
|
|
|
|
|
|
|
// wanted is nil, compare sidecar to parent
|
|
|
|
try(t, tc{parent: []string{"foo"}, wanted: nil, sidecar: nil, expect: true})
|
|
|
|
try(t, tc{parent: []string{"foo"}, wanted: nil, sidecar: []string{"foo"}, expect: false})
|
|
|
|
try(t, tc{parent: []string{"foo"}, wanted: nil, sidecar: []string{"bar"}, expect: true})
|
|
|
|
try(t, tc{parent: nil, wanted: nil, sidecar: []string{"foo"}, expect: true})
|
|
|
|
|
|
|
|
// wanted is non-nil, compare sidecar to wanted
|
|
|
|
try(t, tc{parent: nil, wanted: []string{"foo"}, sidecar: nil, expect: true})
|
|
|
|
try(t, tc{parent: nil, wanted: []string{"foo"}, sidecar: []string{"foo"}, expect: false})
|
|
|
|
try(t, tc{parent: nil, wanted: []string{"foo"}, sidecar: []string{"bar"}, expect: true})
|
|
|
|
try(t, tc{parent: []string{"foo"}, wanted: []string{"foo"}, sidecar: []string{"bar"}, expect: true})
|
|
|
|
}
|
|
|
|
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
func TestSyncLogic_maybeTweakTags(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2020-02-14 19:44:34 +00:00
|
|
|
|
|
|
|
differentPointers := func(a, b []string) bool {
|
|
|
|
return &(a) != &(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
try := func(inConsul, inConsulSC []string, eto bool) {
|
|
|
|
wanted := &api.AgentServiceRegistration{
|
|
|
|
Tags: []string{"original"},
|
|
|
|
Connect: &api.AgentServiceConnect{
|
|
|
|
SidecarService: &api.AgentServiceRegistration{
|
|
|
|
Tags: []string{"original-sidecar"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
EnableTagOverride: eto,
|
|
|
|
}
|
|
|
|
|
|
|
|
existing := &api.AgentService{Tags: inConsul}
|
|
|
|
sidecar := &api.AgentService{Tags: inConsulSC}
|
|
|
|
|
|
|
|
maybeTweakTags(wanted, existing, sidecar)
|
|
|
|
|
|
|
|
switch eto {
|
|
|
|
case false:
|
|
|
|
require.Equal(t, []string{"original"}, wanted.Tags)
|
|
|
|
require.Equal(t, []string{"original-sidecar"}, wanted.Connect.SidecarService.Tags)
|
|
|
|
require.True(t, differentPointers(wanted.Tags, wanted.Connect.SidecarService.Tags))
|
|
|
|
case true:
|
|
|
|
require.Equal(t, inConsul, wanted.Tags)
|
|
|
|
require.Equal(t, inConsulSC, wanted.Connect.SidecarService.Tags)
|
|
|
|
require.True(t, differentPointers(wanted.Tags, wanted.Connect.SidecarService.Tags))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
try([]string{"original"}, []string{"original-sidecar"}, true)
|
|
|
|
try([]string{"original"}, []string{"original-sidecar"}, false)
|
|
|
|
try([]string{"modified"}, []string{"original-sidecar"}, true)
|
|
|
|
try([]string{"modified"}, []string{"original-sidecar"}, false)
|
|
|
|
try([]string{"original"}, []string{"modified-sidecar"}, true)
|
|
|
|
try([]string{"original"}, []string{"modified-sidecar"}, false)
|
|
|
|
try([]string{"modified"}, []string{"modified-sidecar"}, true)
|
|
|
|
try([]string{"modified"}, []string{"modified-sidecar"}, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSyncLogic_maybeTweakTags_emptySC(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2020-02-14 19:44:34 +00:00
|
|
|
|
|
|
|
// Check the edge cases where the connect service is deleted on the nomad
|
|
|
|
// side (i.e. are we checking multiple nil pointers).
|
|
|
|
|
|
|
|
try := func(asr *api.AgentServiceRegistration) {
|
2021-06-16 21:10:57 +00:00
|
|
|
existing := &api.AgentService{Tags: []string{"a", "b"}}
|
|
|
|
sidecar := &api.AgentService{Tags: []string{"a", "b"}}
|
2020-02-14 19:44:34 +00:00
|
|
|
maybeTweakTags(asr, existing, sidecar)
|
2022-10-17 19:14:52 +00:00
|
|
|
must.NotEq(t, []string{"original"}, asr.Tags)
|
2020-02-14 19:44:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
try(&api.AgentServiceRegistration{
|
|
|
|
Tags: []string{"original"},
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Connect: nil, // ooh danger!
|
|
|
|
})
|
|
|
|
|
|
|
|
try(&api.AgentServiceRegistration{
|
|
|
|
Tags: []string{"original"},
|
|
|
|
EnableTagOverride: true,
|
|
|
|
Connect: &api.AgentServiceConnect{
|
|
|
|
SidecarService: nil, // ooh danger!
|
|
|
|
},
|
|
|
|
})
|
client: enable configuring enable_tag_override for services
Consul provides a feature of Service Definitions where the tags
associated with a service can be modified through the Catalog API,
overriding the value(s) configured in the agent's service configuration.
To enable this feature, the flag enable_tag_override must be configured
in the service definition.
Previously, Nomad did not allow configuring this flag, and thus the default
value of false was used. Now, it is configurable.
Because Nomad itself acts as a state machine around the the service definitions
of the tasks it manages, it's worth describing what happens when this feature
is enabled and why.
Consider the basic case where there is no Nomad, and your service is provided
to consul as a boring JSON file. The ultimate source of truth for the definition
of that service is the file, and is stored in the agent. Later, Consul performs
"anti-entropy" which synchronizes the Catalog (stored only the leaders). Then
with enable_tag_override=true, the tags field is available for "external"
modification through the Catalog API (rather than directly configuring the
service definition file, or using the Agent API). The important observation
is that if the service definition ever changes (i.e. the file is changed &
config reloaded OR the Agent API is used to modify the service), those
"external" tag values are thrown away, and the new service definition is
once again the source of truth.
In the Nomad case, Nomad itself is the source of truth over the Agent in
the same way the JSON file was the source of truth in the example above.
That means any time Nomad sets a new service definition, any externally
configured tags are going to be replaced. When does this happen? Only on
major lifecycle events, for example when a task is modified because of an
updated job spec from the 'nomad job run <existing>' command. Otherwise,
Nomad's periodic re-sync's with Consul will now no longer try to restore
the externally modified tag values (as long as enable_tag_override=true).
Fixes #2057
2020-02-07 21:22:19 +00:00
|
|
|
}
|
2021-01-22 19:45:26 +00:00
|
|
|
|
|
|
|
// TestServiceRegistration_CheckOnUpdate tests that a ServiceRegistrations
|
|
|
|
// CheckOnUpdate is populated and updated properly
|
|
|
|
func TestServiceRegistration_CheckOnUpdate(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2021-01-22 19:45:26 +00:00
|
|
|
|
2021-06-07 15:54:33 +00:00
|
|
|
mockAgent := NewMockAgent(ossFeatures)
|
|
|
|
namespacesClient := NewNamespacesClient(NewMockNamespaces(nil), mockAgent)
|
2021-01-22 19:45:26 +00:00
|
|
|
logger := testlog.HCLogger(t)
|
2021-03-16 18:22:21 +00:00
|
|
|
sc := NewServiceClient(mockAgent, namespacesClient, logger, true)
|
2021-01-22 19:45:26 +00:00
|
|
|
|
|
|
|
allocID := uuid.Generate()
|
2022-03-15 08:38:30 +00:00
|
|
|
ws := &serviceregistration.WorkloadServices{
|
2022-09-22 14:38:21 +00:00
|
|
|
AllocInfo: structs.AllocInfo{
|
|
|
|
AllocID: allocID,
|
|
|
|
Task: "taskname",
|
|
|
|
},
|
2021-01-22 19:45:26 +00:00
|
|
|
Restarter: &restartRecorder{},
|
|
|
|
Services: []*structs.Service{
|
|
|
|
{
|
|
|
|
Name: "taskname-service",
|
|
|
|
PortLabel: "x",
|
|
|
|
Tags: []string{"tag1", "tag2"},
|
|
|
|
Meta: map[string]string{"meta1": "foo"},
|
|
|
|
Checks: []*structs.ServiceCheck{
|
|
|
|
{
|
|
|
|
|
|
|
|
Name: "c1",
|
|
|
|
Type: "tcp",
|
|
|
|
Interval: time.Second,
|
|
|
|
Timeout: time.Second,
|
|
|
|
PortLabel: "x",
|
|
|
|
OnUpdate: structs.OnUpdateIgnoreWarn,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Networks: []*structs.NetworkResource{
|
|
|
|
{
|
|
|
|
DynamicPorts: []structs.Port{
|
|
|
|
{Label: "x", Value: xPort},
|
|
|
|
{Label: "y", Value: yPort},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
require.NoError(t, sc.RegisterWorkload(ws))
|
|
|
|
|
|
|
|
require.NotNil(t, sc.allocRegistrations[allocID])
|
|
|
|
|
|
|
|
allocReg := sc.allocRegistrations[allocID]
|
|
|
|
serviceReg := allocReg.Tasks["taskname"]
|
|
|
|
require.NotNil(t, serviceReg)
|
|
|
|
|
|
|
|
// Ensure that CheckOnUpdate was set correctly
|
|
|
|
require.Len(t, serviceReg.Services, 1)
|
|
|
|
for _, sreg := range serviceReg.Services {
|
|
|
|
require.NotEmpty(t, sreg.CheckOnUpdate)
|
|
|
|
for _, onupdate := range sreg.CheckOnUpdate {
|
|
|
|
require.Equal(t, structs.OnUpdateIgnoreWarn, onupdate)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update
|
2022-03-15 08:38:30 +00:00
|
|
|
wsUpdate := new(serviceregistration.WorkloadServices)
|
2021-01-22 19:45:26 +00:00
|
|
|
*wsUpdate = *ws
|
|
|
|
wsUpdate.Services[0].Checks[0].OnUpdate = structs.OnUpdateRequireHealthy
|
|
|
|
|
|
|
|
require.NoError(t, sc.UpdateWorkload(ws, wsUpdate))
|
|
|
|
|
|
|
|
require.NotNil(t, sc.allocRegistrations[allocID])
|
|
|
|
|
|
|
|
allocReg = sc.allocRegistrations[allocID]
|
|
|
|
serviceReg = allocReg.Tasks["taskname"]
|
|
|
|
require.NotNil(t, serviceReg)
|
|
|
|
|
|
|
|
// Ensure that CheckOnUpdate was updated correctly
|
|
|
|
require.Len(t, serviceReg.Services, 1)
|
|
|
|
for _, sreg := range serviceReg.Services {
|
|
|
|
require.NotEmpty(t, sreg.CheckOnUpdate)
|
|
|
|
for _, onupdate := range sreg.CheckOnUpdate {
|
|
|
|
require.Equal(t, structs.OnUpdateRequireHealthy, onupdate)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-06-16 21:10:57 +00:00
|
|
|
|
|
|
|
func TestSyncLogic_proxyUpstreamsDifferent(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2021-06-16 21:10:57 +00:00
|
|
|
|
|
|
|
upstream1 := func() api.Upstream {
|
|
|
|
return api.Upstream{
|
|
|
|
Datacenter: "sfo",
|
|
|
|
DestinationName: "billing",
|
|
|
|
LocalBindAddress: "127.0.0.1",
|
|
|
|
LocalBindPort: 5050,
|
|
|
|
MeshGateway: api.MeshGatewayConfig{
|
|
|
|
Mode: "remote",
|
|
|
|
},
|
|
|
|
Config: map[string]interface{}{"foo": 1},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
upstream2 := func() api.Upstream {
|
|
|
|
return api.Upstream{
|
|
|
|
Datacenter: "ny",
|
|
|
|
DestinationName: "metrics",
|
|
|
|
LocalBindAddress: "127.0.0.1",
|
|
|
|
LocalBindPort: 6060,
|
|
|
|
MeshGateway: api.MeshGatewayConfig{
|
|
|
|
Mode: "local",
|
|
|
|
},
|
|
|
|
Config: nil,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
newASC := func() *api.AgentServiceConnect {
|
|
|
|
return &api.AgentServiceConnect{
|
|
|
|
SidecarService: &api.AgentServiceRegistration{
|
|
|
|
Proxy: &api.AgentServiceConnectProxyConfig{
|
|
|
|
Upstreams: []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
upstream2(),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
original := newASC()
|
|
|
|
|
|
|
|
t.Run("same", func(t *testing.T) {
|
|
|
|
require.False(t, proxyUpstreamsDifferent(original, newASC().SidecarService.Proxy))
|
|
|
|
})
|
|
|
|
|
|
|
|
type proxy = *api.AgentServiceConnectProxyConfig
|
|
|
|
type tweaker = func(proxy)
|
|
|
|
|
|
|
|
try := func(t *testing.T, desc string, tweak tweaker) {
|
|
|
|
t.Run(desc, func(t *testing.T) {
|
|
|
|
p := newASC().SidecarService.Proxy
|
|
|
|
tweak(p)
|
|
|
|
require.True(t, proxyUpstreamsDifferent(original, p))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
try(t, "empty upstreams", func(p proxy) {
|
|
|
|
p.Upstreams = make([]api.Upstream, 0)
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "missing upstream", func(p proxy) {
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "extra upstream", func(p proxy) {
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
upstream2(),
|
|
|
|
{
|
|
|
|
Datacenter: "north",
|
|
|
|
DestinationName: "dest3",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different datacenter", func(p proxy) {
|
|
|
|
diff := upstream2()
|
|
|
|
diff.Datacenter = "south"
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
diff,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different destination", func(p proxy) {
|
|
|
|
diff := upstream2()
|
|
|
|
diff.DestinationName = "sink"
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
diff,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different local_bind_address", func(p proxy) {
|
|
|
|
diff := upstream2()
|
|
|
|
diff.LocalBindAddress = "10.0.0.1"
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
diff,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different local_bind_port", func(p proxy) {
|
|
|
|
diff := upstream2()
|
|
|
|
diff.LocalBindPort = 9999
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
diff,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different mesh gateway mode", func(p proxy) {
|
|
|
|
diff := upstream2()
|
|
|
|
diff.MeshGateway.Mode = "none"
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
upstream1(),
|
|
|
|
diff,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
try(t, "different config", func(p proxy) {
|
|
|
|
diff := upstream1()
|
|
|
|
diff.Config = map[string]interface{}{"foo": 2}
|
|
|
|
p.Upstreams = []api.Upstream{
|
|
|
|
diff,
|
|
|
|
upstream2(),
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2021-07-07 16:14:45 +00:00
|
|
|
|
|
|
|
func TestSyncReason_String(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2021-07-07 16:14:45 +00:00
|
|
|
|
|
|
|
require.Equal(t, "periodic", fmt.Sprintf("%s", syncPeriodic))
|
|
|
|
require.Equal(t, "shutdown", fmt.Sprintf("%s", syncShutdown))
|
|
|
|
require.Equal(t, "operations", fmt.Sprintf("%s", syncNewOps))
|
|
|
|
require.Equal(t, "unexpected", fmt.Sprintf("%s", syncReason(128)))
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSyncOps_empty(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
2021-07-07 16:14:45 +00:00
|
|
|
|
|
|
|
try := func(ops *operations, exp bool) {
|
|
|
|
require.Equal(t, exp, ops.empty())
|
|
|
|
}
|
|
|
|
|
|
|
|
try(&operations{regServices: make([]*api.AgentServiceRegistration, 1)}, false)
|
|
|
|
try(&operations{regChecks: make([]*api.AgentCheckRegistration, 1)}, false)
|
|
|
|
try(&operations{deregServices: make([]string, 1)}, false)
|
|
|
|
try(&operations{deregChecks: make([]string, 1)}, false)
|
|
|
|
try(&operations{}, true)
|
|
|
|
try(nil, true)
|
|
|
|
}
|
2021-07-08 14:18:59 +00:00
|
|
|
|
|
|
|
func TestSyncLogic_maybeSidecarProxyCheck(t *testing.T) {
|
2022-03-15 12:42:43 +00:00
|
|
|
ci.Parallel(t)
|
|
|
|
|
2021-07-08 14:18:59 +00:00
|
|
|
try := func(input string, exp bool) {
|
|
|
|
result := maybeSidecarProxyCheck(input)
|
|
|
|
require.Equal(t, exp, result)
|
|
|
|
}
|
|
|
|
|
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy", true)
|
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy:1", true)
|
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy:2", true)
|
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001", false)
|
|
|
|
try("_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy:1", false)
|
2021-07-08 18:05:05 +00:00
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy:X", false)
|
|
|
|
try("service:_nomad-task-2f5fb517-57d4-44ee-7780-dc1cb6e103cd-group-api-count-api-9001-sidecar-proxy: ", false)
|
2021-07-08 14:18:59 +00:00
|
|
|
try("service", false)
|
|
|
|
}
|
2022-05-31 15:06:39 +00:00
|
|
|
|
|
|
|
func TestSyncLogic_parseTaggedAddresses(t *testing.T) {
|
|
|
|
ci.Parallel(t)
|
|
|
|
|
|
|
|
t.Run("nil", func(t *testing.T) {
|
|
|
|
m, err := parseTaggedAddresses(nil, 0)
|
|
|
|
must.NoError(t, err)
|
|
|
|
must.MapEmpty(t, m)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("parse fail", func(t *testing.T) {
|
|
|
|
ta := map[string]string{
|
|
|
|
"public_wan": "not an address",
|
|
|
|
}
|
|
|
|
result, err := parseTaggedAddresses(ta, 8080)
|
|
|
|
must.Error(t, err)
|
|
|
|
must.MapEmpty(t, result)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("parse address", func(t *testing.T) {
|
|
|
|
ta := map[string]string{
|
|
|
|
"public_wan": "1.2.3.4",
|
|
|
|
}
|
|
|
|
result, err := parseTaggedAddresses(ta, 8080)
|
|
|
|
must.NoError(t, err)
|
|
|
|
must.MapEq(t, map[string]api.ServiceAddress{
|
|
|
|
"public_wan": {Address: "1.2.3.4", Port: 8080},
|
|
|
|
}, result)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("parse address and port", func(t *testing.T) {
|
|
|
|
ta := map[string]string{
|
|
|
|
"public_wan": "1.2.3.4:9999",
|
|
|
|
}
|
|
|
|
result, err := parseTaggedAddresses(ta, 8080)
|
|
|
|
must.NoError(t, err)
|
|
|
|
must.MapEq(t, map[string]api.ServiceAddress{
|
|
|
|
"public_wan": {Address: "1.2.3.4", Port: 9999},
|
|
|
|
}, result)
|
|
|
|
})
|
|
|
|
}
|