Merge pull request #1274 from hashicorp/b-validate-interval

Validate interval values in service checks
This commit is contained in:
Sean Chittenden 2016-06-13 18:57:12 -07:00 committed by GitHub
commit 5d1265ad22
3 changed files with 42 additions and 30 deletions

View file

@ -158,7 +158,7 @@ func NewSyncer(consulConfig *config.ConsulConfig, shutdownCh chan struct{}, logg
cfg := consul.DefaultConfig() cfg := consul.DefaultConfig()
// If a nil config was provided, fall back to the default config // If a nil consulConfig was provided, fall back to the default config
if consulConfig == nil { if consulConfig == nil {
consulConfig = cconfig.DefaultConfig().ConsulConfig consulConfig = cconfig.DefaultConfig().ConsulConfig
} }

View file

@ -2486,12 +2486,6 @@ func TestTaskDiff(t *testing.T) {
Old: "foo", Old: "foo",
New: "bar", New: "bar",
}, },
{
Type: DiffTypeNone,
Name: "ServiceID",
Old: "",
New: "",
},
}, },
}, },
}, },
@ -2757,12 +2751,6 @@ func TestTaskDiff(t *testing.T) {
Old: "", Old: "",
New: "", New: "",
}, },
{
Type: DiffTypeNone,
Name: "ServiceID",
Old: "",
New: "",
},
}, },
Objects: []*ObjectDiff{ Objects: []*ObjectDiff{
{ {

View file

@ -1482,10 +1482,19 @@ func (tg *TaskGroup) GoString() string {
} }
const ( const (
// TODO add Consul TTL check
ServiceCheckHTTP = "http" ServiceCheckHTTP = "http"
ServiceCheckTCP = "tcp" ServiceCheckTCP = "tcp"
ServiceCheckDocker = "docker"
ServiceCheckScript = "script" ServiceCheckScript = "script"
// minCheckInterval is the minimum check interval permitted. Consul
// currently has its MinInterval set to 1s. Mirror that here for
// consistency.
minCheckInterval = 1 * time.Second
// minCheckTimeout is the minimum check timeout permitted for Consul
// script TTL checks.
minCheckTimeout = 1 * time.Second
) )
// The ServiceCheck data model represents the consul health check that // The ServiceCheck data model represents the consul health check that
@ -1510,22 +1519,36 @@ func (sc *ServiceCheck) Copy() *ServiceCheck {
return nsc return nsc
} }
func (sc *ServiceCheck) Validate() error { // validate a Service's ServiceCheck
t := strings.ToLower(sc.Type) func (sc *ServiceCheck) validate() error {
if t != ServiceCheckTCP && t != ServiceCheckHTTP && t != ServiceCheckScript { switch strings.ToLower(sc.Type) {
return fmt.Errorf("service check must be either http, tcp or script type") case ServiceCheckTCP:
} if sc.Timeout > 0 && sc.Timeout <= minCheckTimeout {
if sc.Type == ServiceCheckHTTP && sc.Path == "" { return fmt.Errorf("timeout %v is lower than required minimum timeout %v", sc.Timeout, minCheckInterval)
return fmt.Errorf("service checks of http type must have a valid http path") }
case ServiceCheckHTTP:
if sc.Path == "" {
return fmt.Errorf("http type must have a valid http path")
}
if sc.Timeout > 0 && sc.Timeout <= minCheckTimeout {
return fmt.Errorf("timeout %v is lower than required minimum timeout %v", sc.Timeout, minCheckInterval)
}
case ServiceCheckScript:
if sc.Command == "" {
return fmt.Errorf("script type must have a valid script path")
}
// TODO: enforce timeout on the Client side and reenable
// validation.
default:
return fmt.Errorf(`invalid type (%+q), must be one of "http", "tcp", or "script" type`, sc.Type)
} }
if sc.Type == ServiceCheckScript && sc.Command == "" { if sc.Interval > 0 && sc.Interval <= minCheckInterval {
return fmt.Errorf("service checks of script type must have a valid script path") return fmt.Errorf("interval (%v) can not be lower than %v", sc.Interval, minCheckInterval)
} }
if sc.Interval <= 0 {
return fmt.Errorf("service checks must have positive time intervals")
}
return nil return nil
} }
@ -1620,11 +1643,12 @@ func (s *Service) Validate() error {
for _, c := range s.Checks { for _, c := range s.Checks {
if s.PortLabel == "" && c.RequiresPort() { if s.PortLabel == "" && c.RequiresPort() {
mErr.Errors = append(mErr.Errors, fmt.Errorf("check %q is not valid since service %q doesn't have port", c.Name, s.Name)) mErr.Errors = append(mErr.Errors, fmt.Errorf("check %s invalid: check requires a port but the service %+q has no port", c.Name))
continue continue
} }
if err := c.Validate(); err != nil {
mErr.Errors = append(mErr.Errors, err) if err := c.validate(); err != nil {
mErr.Errors = append(mErr.Errors, fmt.Errorf("check %s invalid: %v", c.Name, err))
} }
} }
return mErr.ErrorOrNil() return mErr.ErrorOrNil()
@ -1858,7 +1882,7 @@ func validateServices(t *Task) error {
knownServices := make(map[string]struct{}) knownServices := make(map[string]struct{})
for i, service := range t.Services { for i, service := range t.Services {
if err := service.Validate(); err != nil { if err := service.Validate(); err != nil {
outer := fmt.Errorf("service %d validation failed: %s", i, err) outer := fmt.Errorf("service[%d] %+q validation failed: %s", i, service.Name, err)
mErr.Errors = append(mErr.Errors, outer) mErr.Errors = append(mErr.Errors, outer)
} }
if _, ok := knownServices[service.Name]; ok { if _, ok := knownServices[service.Name]; ok {