aeea7628d6
Logging in the backend is a good thing. This is a noisy interface change but should be a functional noop.
501 lines
10 KiB
Go
501 lines
10 KiB
Go
package physical
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
)
|
|
|
|
type consulConf map[string]string
|
|
|
|
var (
|
|
addrCount int = 0
|
|
)
|
|
|
|
func testHostIP() string {
|
|
a := addrCount
|
|
addrCount++
|
|
return fmt.Sprintf("127.0.0.%d", a)
|
|
}
|
|
|
|
func testConsulBackend(t *testing.T) *ConsulBackend {
|
|
return testConsulBackendConfig(t, &consulConf{})
|
|
}
|
|
|
|
func testConsulBackendConfig(t *testing.T, conf *consulConf) *ConsulBackend {
|
|
logger := log.New(os.Stderr, "", log.LstdFlags)
|
|
be, err := newConsulBackend(*conf, logger)
|
|
if err != nil {
|
|
t.Fatalf("Expected Consul to initialize: %v", err)
|
|
}
|
|
|
|
c, ok := be.(*ConsulBackend)
|
|
if !ok {
|
|
t.Fatalf("Expected ConsulBackend")
|
|
}
|
|
|
|
c.consulClientConf = api.DefaultConfig()
|
|
|
|
c.service = &api.AgentServiceRegistration{
|
|
ID: c.serviceID(),
|
|
Name: c.serviceName,
|
|
Tags: serviceTags(c.active),
|
|
Port: 8200,
|
|
Address: testHostIP(),
|
|
EnableTagOverride: false,
|
|
}
|
|
|
|
c.sealedCheck = &api.AgentCheckRegistration{
|
|
ID: c.checkID(),
|
|
Name: "Vault Sealed Status",
|
|
Notes: "Vault service is healthy when Vault is in an unsealed status and can become an active Vault server",
|
|
ServiceID: c.serviceID(),
|
|
AgentServiceCheck: api.AgentServiceCheck{
|
|
TTL: c.checkTimeout.String(),
|
|
Status: api.HealthPassing,
|
|
},
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
func testConsul_testConsulBackend(t *testing.T) {
|
|
c := testConsulBackend(t)
|
|
if c == nil {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if c.active != false {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if c.unsealed != false {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if c.service == nil {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if c.sealedCheck == nil {
|
|
t.Fatalf("bad")
|
|
}
|
|
}
|
|
|
|
func TestConsul_newConsulBackend(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
consulConfig map[string]string
|
|
fail bool
|
|
advertiseAddr string
|
|
checkTimeout time.Duration
|
|
path string
|
|
service string
|
|
address string
|
|
scheme string
|
|
token string
|
|
max_parallel int
|
|
disableReg bool
|
|
}{
|
|
{
|
|
name: "Valid default config",
|
|
consulConfig: map[string]string{},
|
|
checkTimeout: 5 * time.Second,
|
|
advertiseAddr: "http://127.0.0.1:8200",
|
|
path: "vault/",
|
|
service: "vault",
|
|
address: "127.0.0.1:8500",
|
|
scheme: "http",
|
|
token: "",
|
|
max_parallel: 4,
|
|
disableReg: false,
|
|
},
|
|
{
|
|
name: "Valid modified config",
|
|
consulConfig: map[string]string{
|
|
"path": "seaTech/",
|
|
"service": "astronomy",
|
|
"advertiseAddr": "http://127.0.0.2:8200",
|
|
"check_timeout": "6s",
|
|
"address": "127.0.0.2",
|
|
"scheme": "https",
|
|
"token": "deadbeef-cafeefac-deadc0de-feedface",
|
|
"max_parallel": "4",
|
|
"disable_registration": "false",
|
|
},
|
|
checkTimeout: 6 * time.Second,
|
|
path: "seaTech/",
|
|
service: "astronomy",
|
|
advertiseAddr: "http://127.0.0.2:8200",
|
|
address: "127.0.0.2",
|
|
scheme: "https",
|
|
token: "deadbeef-cafeefac-deadc0de-feedface",
|
|
max_parallel: 4,
|
|
},
|
|
{
|
|
name: "check timeout too short",
|
|
fail: true,
|
|
consulConfig: map[string]string{
|
|
"check_timeout": "99ms",
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
logger := log.New(os.Stderr, "", log.LstdFlags)
|
|
be, err := newConsulBackend(test.consulConfig, logger)
|
|
if test.fail {
|
|
if err == nil {
|
|
t.Fatalf(`Expected config "%s" to fail`, test.name)
|
|
} else {
|
|
continue
|
|
}
|
|
} else if !test.fail && err != nil {
|
|
t.Fatalf("Expected config %s to not fail: %v", test.name, err)
|
|
}
|
|
|
|
c, ok := be.(*ConsulBackend)
|
|
if !ok {
|
|
t.Fatalf("Expected ConsulBackend: %s", test.name)
|
|
}
|
|
c.disableRegistration = true
|
|
|
|
var shutdownCh ShutdownChannel
|
|
if err := c.RunServiceDiscovery(shutdownCh, test.advertiseAddr); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
|
|
if test.checkTimeout != c.checkTimeout {
|
|
t.Errorf("bad: %v != %v", test.checkTimeout, c.checkTimeout)
|
|
}
|
|
|
|
if test.path != c.path {
|
|
t.Errorf("bad: %s %v != %v", test.name, test.path, c.path)
|
|
}
|
|
|
|
if test.service != c.serviceName {
|
|
t.Errorf("bad: %v != %v", test.service, c.serviceName)
|
|
}
|
|
|
|
if test.address != c.consulClientConf.Address {
|
|
t.Errorf("bad: %s %v != %v", test.name, test.address, c.consulClientConf.Address)
|
|
}
|
|
|
|
if test.scheme != c.consulClientConf.Scheme {
|
|
t.Errorf("bad: %v != %v", test.scheme, c.consulClientConf.Scheme)
|
|
}
|
|
|
|
if test.token != c.consulClientConf.Token {
|
|
t.Errorf("bad: %v != %v", test.token, c.consulClientConf.Token)
|
|
}
|
|
|
|
// FIXME(sean@): Unable to test max_parallel
|
|
// if test.max_parallel != cap(c.permitPool) {
|
|
// t.Errorf("bad: %v != %v", test.max_parallel, cap(c.permitPool))
|
|
// }
|
|
}
|
|
}
|
|
|
|
func TestConsul_serviceTags(t *testing.T) {
|
|
tests := []struct {
|
|
active bool
|
|
tags []string
|
|
}{
|
|
{
|
|
active: true,
|
|
tags: []string{"active"},
|
|
},
|
|
{
|
|
active: false,
|
|
tags: []string{"standby"},
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
tags := serviceTags(test.active)
|
|
if !reflect.DeepEqual(tags[:], test.tags[:]) {
|
|
t.Errorf("Bad %v: %v %v", test.active, tags, test.tags)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestConsul_setAdvertiseAddr(t *testing.T) {
|
|
tests := []struct {
|
|
addr string
|
|
host string
|
|
port int64
|
|
pass bool
|
|
}{
|
|
{
|
|
addr: "http://127.0.0.1:8200/",
|
|
host: "127.0.0.1",
|
|
port: 8200,
|
|
pass: true,
|
|
},
|
|
{
|
|
addr: "http://127.0.0.1:8200",
|
|
host: "127.0.0.1",
|
|
port: 8200,
|
|
pass: true,
|
|
},
|
|
{
|
|
addr: "https://127.0.0.1:8200",
|
|
host: "127.0.0.1",
|
|
port: 8200,
|
|
pass: true,
|
|
},
|
|
{
|
|
addr: "unix:///tmp/.vault.addr.sock",
|
|
host: "/tmp/.vault.addr.sock",
|
|
port: -1,
|
|
pass: true,
|
|
},
|
|
{
|
|
addr: "127.0.0.1:8200",
|
|
pass: false,
|
|
},
|
|
{
|
|
addr: "127.0.0.1",
|
|
pass: false,
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
c := testConsulBackend(t)
|
|
err := c.setAdvertiseAddr(test.addr)
|
|
if test.pass {
|
|
if err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
} else {
|
|
if err == nil {
|
|
t.Fatalf("bad, expected fail")
|
|
} else {
|
|
continue
|
|
}
|
|
}
|
|
|
|
if c.advertiseHost != test.host {
|
|
t.Fatalf("bad: %v != %v", c.advertiseHost, test.host)
|
|
}
|
|
|
|
if c.advertisePort != test.port {
|
|
t.Fatalf("bad: %v != %v", c.advertisePort, test.port)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestConsul_AdvertiseActive(t *testing.T) {
|
|
addr := os.Getenv("CONSUL_HTTP_ADDR")
|
|
if addr == "" {
|
|
t.Skipf("No consul process running, skipping test")
|
|
}
|
|
|
|
c := testConsulBackend(t)
|
|
|
|
if c.active != false {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseActive(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
|
|
if err := c.AdvertiseActive(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
|
|
if err := c.AdvertiseActive(false); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
|
|
if err := c.AdvertiseActive(false); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
|
|
if err := c.AdvertiseActive(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestConsul_AdvertiseSealed(t *testing.T) {
|
|
addr := os.Getenv("CONSUL_HTTP_ADDR")
|
|
if addr == "" {
|
|
t.Skipf("No consul process running, skipping test")
|
|
}
|
|
|
|
c := testConsulBackend(t)
|
|
|
|
if c.unsealed == true {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseSealed(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
if c.unsealed == true {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseSealed(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
if c.unsealed == true {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseSealed(false); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
if c.unsealed == false {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseSealed(false); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
if c.unsealed == false {
|
|
t.Fatalf("bad")
|
|
}
|
|
|
|
if err := c.AdvertiseSealed(true); err != nil {
|
|
t.Fatalf("bad: %v", err)
|
|
}
|
|
if c.unsealed == true {
|
|
t.Fatalf("bad")
|
|
}
|
|
}
|
|
|
|
func TestConsul_checkID(t *testing.T) {
|
|
c := testConsulBackend(t)
|
|
if c.checkID() != "vault-sealed-check" {
|
|
t.Errorf("bad")
|
|
}
|
|
}
|
|
|
|
func TestConsul_serviceID(t *testing.T) {
|
|
passingTests := []struct {
|
|
name string
|
|
advertiseAddr string
|
|
serviceName string
|
|
expected string
|
|
}{
|
|
{
|
|
name: "valid host w/o slash",
|
|
advertiseAddr: "http://127.0.0.1:8200",
|
|
serviceName: "sea-tech-astronomy",
|
|
expected: "sea-tech-astronomy:127.0.0.1:8200",
|
|
},
|
|
{
|
|
name: "valid host w/ slash",
|
|
advertiseAddr: "http://127.0.0.1:8200/",
|
|
serviceName: "sea-tech-astronomy",
|
|
expected: "sea-tech-astronomy:127.0.0.1:8200",
|
|
},
|
|
{
|
|
name: "valid https host w/ slash",
|
|
advertiseAddr: "https://127.0.0.1:8200/",
|
|
serviceName: "sea-tech-astronomy",
|
|
expected: "sea-tech-astronomy:127.0.0.1:8200",
|
|
},
|
|
}
|
|
|
|
for _, test := range passingTests {
|
|
c := testConsulBackendConfig(t, &consulConf{
|
|
"service": test.serviceName,
|
|
})
|
|
|
|
if err := c.setAdvertiseAddr(test.advertiseAddr); err != nil {
|
|
t.Fatalf("bad: %s %v", test.name, err)
|
|
}
|
|
|
|
serviceID := c.serviceID()
|
|
if serviceID != test.expected {
|
|
t.Fatalf("bad: %v != %v", serviceID, test.expected)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestConsulBackend(t *testing.T) {
|
|
addr := os.Getenv("CONSUL_HTTP_ADDR")
|
|
if addr == "" {
|
|
t.Skipf("No consul process running, skipping test")
|
|
}
|
|
|
|
conf := api.DefaultConfig()
|
|
conf.Address = addr
|
|
client, err := api.NewClient(conf)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
randPath := fmt.Sprintf("vault-%d/", time.Now().Unix())
|
|
defer func() {
|
|
client.KV().DeleteTree(randPath, nil)
|
|
}()
|
|
|
|
logger := log.New(os.Stderr, "", log.LstdFlags)
|
|
b, err := NewBackend("consul", logger, map[string]string{
|
|
"address": addr,
|
|
"path": randPath,
|
|
"max_parallel": "256",
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
testBackend(t, b)
|
|
testBackend_ListPrefix(t, b)
|
|
}
|
|
|
|
func TestConsulHABackend(t *testing.T) {
|
|
addr := os.Getenv("CONSUL_HTTP_ADDR")
|
|
if addr == "" {
|
|
t.Skipf("No consul process running, skipping test")
|
|
}
|
|
|
|
conf := api.DefaultConfig()
|
|
conf.Address = addr
|
|
client, err := api.NewClient(conf)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
randPath := fmt.Sprintf("vault-%d/", time.Now().Unix())
|
|
defer func() {
|
|
client.KV().DeleteTree(randPath, nil)
|
|
}()
|
|
|
|
logger := log.New(os.Stderr, "", log.LstdFlags)
|
|
b, err := NewBackend("consul", logger, map[string]string{
|
|
"address": addr,
|
|
"path": randPath,
|
|
"max_parallel": "-1",
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
ha, ok := b.(HABackend)
|
|
if !ok {
|
|
t.Fatalf("consul does not implement HABackend")
|
|
}
|
|
testHABackend(t, ha, ha)
|
|
|
|
detect, ok := b.(AdvertiseDetect)
|
|
if !ok {
|
|
t.Fatalf("consul does not implement AdvertiseDetect")
|
|
}
|
|
host, err := detect.DetectHostAddr()
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
if host == "" {
|
|
t.Fatalf("bad addr: %v", host)
|
|
}
|
|
}
|