2017-04-19 23:00:11 +00:00
|
|
|
package testrpc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2017-07-06 10:34:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2019-03-27 12:54:56 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil/retry"
|
2019-12-06 14:25:26 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2017-04-19 23:00:11 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type rpcFn func(string, interface{}, interface{}) error
|
|
|
|
|
2018-08-10 19:04:07 +00:00
|
|
|
// WaitForLeader ensures we have a leader and a node registration.
|
2017-04-19 23:00:11 +00:00
|
|
|
func WaitForLeader(t *testing.T, rpc rpcFn, dc string) {
|
2019-12-06 19:01:34 +00:00
|
|
|
t.Helper()
|
|
|
|
|
2017-04-19 23:00:11 +00:00
|
|
|
var out structs.IndexedNodes
|
2017-05-05 11:48:34 +00:00
|
|
|
retry.Run(t, func(r *retry.R) {
|
2017-04-19 23:00:11 +00:00
|
|
|
args := &structs.DCSpecificRequest{Datacenter: dc}
|
|
|
|
if err := rpc("Catalog.ListNodes", args, &out); err != nil {
|
2017-05-05 11:48:34 +00:00
|
|
|
r.Fatalf("Catalog.ListNodes failed: %v", err)
|
2017-04-19 23:00:11 +00:00
|
|
|
}
|
|
|
|
if !out.QueryMeta.KnownLeader {
|
2017-05-05 11:48:34 +00:00
|
|
|
r.Fatalf("No leader")
|
2017-04-19 23:00:11 +00:00
|
|
|
}
|
2018-08-06 23:46:09 +00:00
|
|
|
if out.Index < 2 {
|
|
|
|
r.Fatalf("Consul index should be at least 2")
|
2017-04-19 23:00:11 +00:00
|
|
|
}
|
2017-05-05 11:48:34 +00:00
|
|
|
})
|
2017-04-19 23:00:11 +00:00
|
|
|
}
|
2018-08-10 19:04:07 +00:00
|
|
|
|
2018-08-23 16:06:39 +00:00
|
|
|
// WaitUntilNoLeader ensures no leader is present, useful for testing lost leadership.
|
|
|
|
func WaitUntilNoLeader(t *testing.T, rpc rpcFn, dc string) {
|
2019-12-06 19:01:34 +00:00
|
|
|
t.Helper()
|
|
|
|
|
2018-08-23 16:06:39 +00:00
|
|
|
var out structs.IndexedNodes
|
|
|
|
retry.Run(t, func(r *retry.R) {
|
|
|
|
args := &structs.DCSpecificRequest{Datacenter: dc}
|
|
|
|
if err := rpc("Catalog.ListNodes", args, &out); err == nil {
|
2018-08-28 16:37:34 +00:00
|
|
|
r.Fatalf("It still has a leader: %#v", out)
|
2018-08-23 16:06:39 +00:00
|
|
|
}
|
|
|
|
if out.QueryMeta.KnownLeader {
|
|
|
|
r.Fatalf("Has still a leader")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-01-25 16:01:21 +00:00
|
|
|
type waitOption struct {
|
2019-10-04 18:37:34 +00:00
|
|
|
Token string
|
|
|
|
WaitForAntiEntropySync bool
|
2019-01-25 16:01:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func WithToken(token string) waitOption {
|
|
|
|
return waitOption{Token: token}
|
|
|
|
}
|
|
|
|
|
2019-10-04 18:37:34 +00:00
|
|
|
func WaitForAntiEntropySync() waitOption {
|
|
|
|
return waitOption{WaitForAntiEntropySync: true}
|
|
|
|
}
|
|
|
|
|
2018-08-10 19:04:07 +00:00
|
|
|
// WaitForTestAgent ensures we have a node with serfHealth check registered
|
2019-01-25 16:01:21 +00:00
|
|
|
func WaitForTestAgent(t *testing.T, rpc rpcFn, dc string, options ...waitOption) {
|
2019-12-06 19:01:34 +00:00
|
|
|
t.Helper()
|
|
|
|
|
2018-08-10 19:04:07 +00:00
|
|
|
var nodes structs.IndexedNodes
|
|
|
|
var checks structs.IndexedHealthChecks
|
|
|
|
|
2019-10-04 18:37:34 +00:00
|
|
|
var (
|
|
|
|
token string
|
|
|
|
waitForAntiEntropySync bool
|
|
|
|
)
|
2019-01-25 16:01:21 +00:00
|
|
|
for _, opt := range options {
|
|
|
|
if opt.Token != "" {
|
|
|
|
token = opt.Token
|
|
|
|
}
|
2019-10-04 18:37:34 +00:00
|
|
|
if opt.WaitForAntiEntropySync {
|
|
|
|
waitForAntiEntropySync = true
|
|
|
|
}
|
2019-01-25 16:01:21 +00:00
|
|
|
}
|
|
|
|
|
2018-08-10 19:04:07 +00:00
|
|
|
retry.Run(t, func(r *retry.R) {
|
2019-01-25 16:01:21 +00:00
|
|
|
dcReq := &structs.DCSpecificRequest{
|
|
|
|
Datacenter: dc,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token},
|
|
|
|
}
|
2018-08-10 19:04:07 +00:00
|
|
|
if err := rpc("Catalog.ListNodes", dcReq, &nodes); err != nil {
|
|
|
|
r.Fatalf("Catalog.ListNodes failed: %v", err)
|
|
|
|
}
|
|
|
|
if len(nodes.Nodes) == 0 {
|
|
|
|
r.Fatalf("No registered nodes")
|
|
|
|
}
|
|
|
|
|
2019-10-04 18:37:34 +00:00
|
|
|
if waitForAntiEntropySync {
|
|
|
|
if len(nodes.Nodes[0].TaggedAddresses) == 0 {
|
|
|
|
r.Fatalf("Not synced via anti entropy yet")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-10 19:04:07 +00:00
|
|
|
// This assumes that there is a single agent per dc, typically a TestAgent
|
2019-01-25 16:01:21 +00:00
|
|
|
nodeReq := &structs.NodeSpecificRequest{
|
|
|
|
Datacenter: dc,
|
|
|
|
Node: nodes.Nodes[0].Node,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: token},
|
|
|
|
}
|
2018-08-10 19:04:07 +00:00
|
|
|
if err := rpc("Health.NodeChecks", nodeReq, &checks); err != nil {
|
|
|
|
r.Fatalf("Health.NodeChecks failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var found bool
|
|
|
|
for _, check := range checks.HealthChecks {
|
|
|
|
if check.CheckID == "serfHealth" {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
r.Fatalf("serfHealth check not found")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2019-11-11 20:57:16 +00:00
|
|
|
|
|
|
|
// WaitForActiveCARoot polls until the server returns an active Connect root CA
|
|
|
|
// with the same ID field as expect. If expect is nil, it just waits until _any_
|
|
|
|
// active root is returned. This is useful because initializing CA happens after
|
|
|
|
// raft leadership is gained so WaitForLeader isn't sufficient to be sure that
|
|
|
|
// the CA is fully initialized.
|
|
|
|
func WaitForActiveCARoot(t *testing.T, rpc rpcFn, dc string, expect *structs.CARoot) {
|
|
|
|
retry.Run(t, func(r *retry.R) {
|
|
|
|
args := &structs.DCSpecificRequest{
|
|
|
|
Datacenter: dc,
|
|
|
|
}
|
|
|
|
var reply structs.IndexedCARoots
|
|
|
|
if err := rpc("ConnectCA.Roots", args, &reply); err != nil {
|
|
|
|
r.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var root *structs.CARoot
|
|
|
|
for _, r := range reply.Roots {
|
|
|
|
if r.ID == reply.ActiveRootID {
|
|
|
|
root = r
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if root == nil {
|
|
|
|
r.Fatal("no active root")
|
|
|
|
}
|
|
|
|
if expect != nil && root.ID != expect.ID {
|
|
|
|
r.Fatalf("current active root is %s; waiting for %s", root.ID, expect.ID)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2019-12-06 14:25:26 +00:00
|
|
|
|
|
|
|
func WaitForACLReplication(t *testing.T, rpc rpcFn, dc string, expectedReplicationType structs.ACLReplicationType, minPolicyIndex, minTokenIndex, minRoleIndex uint64) {
|
|
|
|
retry.Run(t, func(r *retry.R) {
|
|
|
|
args := structs.DCSpecificRequest{
|
|
|
|
Datacenter: dc,
|
|
|
|
}
|
|
|
|
var reply structs.ACLReplicationStatus
|
|
|
|
|
|
|
|
require.NoError(r, rpc("ACL.ReplicationStatus", &args, &reply))
|
|
|
|
|
|
|
|
require.Equal(r, expectedReplicationType, reply.ReplicationType)
|
|
|
|
require.True(r, reply.Running, "Server not running new replicator yet")
|
|
|
|
require.True(r, reply.ReplicatedIndex >= minPolicyIndex, "Server hasn't replicated enough policies")
|
|
|
|
require.True(r, reply.ReplicatedTokenIndex >= minTokenIndex, "Server hasn't replicated enough tokens")
|
|
|
|
require.True(r, reply.ReplicatedRoleIndex >= minRoleIndex, "Server hasn't replicated enough roles")
|
|
|
|
})
|
|
|
|
}
|