2013-12-23 21:52:10 +00:00
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
2014-11-24 08:36:03 +00:00
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
2013-12-23 21:52:10 +00:00
|
|
|
"fmt"
|
2013-12-30 22:42:41 +00:00
|
|
|
"io"
|
2013-12-23 21:52:10 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
2014-09-18 05:31:32 +00:00
|
|
|
"path/filepath"
|
2014-11-25 03:24:32 +00:00
|
|
|
"reflect"
|
2013-12-23 21:52:10 +00:00
|
|
|
"sync/atomic"
|
|
|
|
"testing"
|
|
|
|
"time"
|
2014-11-19 19:51:25 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/consul"
|
|
|
|
"github.com/hashicorp/consul/consul/structs"
|
|
|
|
"github.com/hashicorp/consul/testutil"
|
2013-12-23 21:52:10 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var offset uint64
|
|
|
|
|
|
|
|
func nextConfig() *Config {
|
2014-04-11 22:46:55 +00:00
|
|
|
idx := int(atomic.AddUint64(&offset, 1))
|
2013-12-23 21:52:10 +00:00
|
|
|
conf := DefaultConfig()
|
|
|
|
|
2014-01-21 00:22:59 +00:00
|
|
|
conf.AdvertiseAddr = "127.0.0.1"
|
2013-12-25 00:53:30 +00:00
|
|
|
conf.Bootstrap = true
|
2013-12-24 00:20:51 +00:00
|
|
|
conf.Datacenter = "dc1"
|
2013-12-30 22:42:41 +00:00
|
|
|
conf.NodeName = fmt.Sprintf("Node %d", idx)
|
2014-04-11 22:46:55 +00:00
|
|
|
conf.BindAddr = "127.0.0.1"
|
2014-11-19 19:51:25 +00:00
|
|
|
conf.Ports.DNS = 19000 + idx
|
|
|
|
conf.Ports.HTTP = 18800 + idx
|
|
|
|
conf.Ports.RPC = 18600 + idx
|
2014-04-11 22:46:55 +00:00
|
|
|
conf.Ports.SerfLan = 18200 + idx
|
2014-11-19 19:51:25 +00:00
|
|
|
conf.Ports.SerfWan = 18400 + idx
|
|
|
|
conf.Ports.Server = 18000 + idx
|
2013-12-23 21:52:10 +00:00
|
|
|
conf.Server = true
|
2014-08-12 21:48:36 +00:00
|
|
|
conf.ACLDatacenter = "dc1"
|
2014-08-19 21:28:49 +00:00
|
|
|
conf.ACLMasterToken = "root"
|
2013-12-23 21:52:10 +00:00
|
|
|
|
|
|
|
cons := consul.DefaultConfig()
|
|
|
|
conf.ConsulConfig = cons
|
|
|
|
|
2014-01-06 21:21:48 +00:00
|
|
|
cons.SerfLANConfig.MemberlistConfig.SuspicionMult = 3
|
2013-12-30 22:42:41 +00:00
|
|
|
cons.SerfLANConfig.MemberlistConfig.ProbeTimeout = 100 * time.Millisecond
|
|
|
|
cons.SerfLANConfig.MemberlistConfig.ProbeInterval = 100 * time.Millisecond
|
2013-12-23 21:52:10 +00:00
|
|
|
cons.SerfLANConfig.MemberlistConfig.GossipInterval = 100 * time.Millisecond
|
|
|
|
|
2014-01-06 21:21:48 +00:00
|
|
|
cons.SerfWANConfig.MemberlistConfig.SuspicionMult = 3
|
2013-12-30 22:42:41 +00:00
|
|
|
cons.SerfWANConfig.MemberlistConfig.ProbeTimeout = 100 * time.Millisecond
|
|
|
|
cons.SerfWANConfig.MemberlistConfig.ProbeInterval = 100 * time.Millisecond
|
2013-12-23 21:52:10 +00:00
|
|
|
cons.SerfWANConfig.MemberlistConfig.GossipInterval = 100 * time.Millisecond
|
|
|
|
|
2014-05-30 18:57:39 +00:00
|
|
|
cons.RaftConfig.LeaderLeaseTimeout = 20 * time.Millisecond
|
2013-12-23 21:52:10 +00:00
|
|
|
cons.RaftConfig.HeartbeatTimeout = 40 * time.Millisecond
|
|
|
|
cons.RaftConfig.ElectionTimeout = 40 * time.Millisecond
|
|
|
|
|
|
|
|
return conf
|
|
|
|
}
|
|
|
|
|
2013-12-30 22:42:41 +00:00
|
|
|
func makeAgentLog(t *testing.T, conf *Config, l io.Writer) (string, *Agent) {
|
2013-12-23 21:52:10 +00:00
|
|
|
dir, err := ioutil.TempDir("", "agent")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf(fmt.Sprintf("err: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
conf.DataDir = dir
|
2013-12-30 22:42:41 +00:00
|
|
|
agent, err := Create(conf, l)
|
2013-12-23 21:52:10 +00:00
|
|
|
if err != nil {
|
|
|
|
os.RemoveAll(dir)
|
|
|
|
t.Fatalf(fmt.Sprintf("err: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
return dir, agent
|
|
|
|
}
|
|
|
|
|
2014-09-18 05:31:32 +00:00
|
|
|
func makeAgentKeyring(t *testing.T, conf *Config, key string) (string, *Agent) {
|
|
|
|
dir, err := ioutil.TempDir("", "agent")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
conf.DataDir = dir
|
|
|
|
|
2014-10-04 20:43:10 +00:00
|
|
|
fileLAN := filepath.Join(dir, serfLANKeyring)
|
2014-10-10 18:13:30 +00:00
|
|
|
if err := initKeyring(fileLAN, key); err != nil {
|
2014-09-18 05:31:32 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2014-10-04 20:43:10 +00:00
|
|
|
fileWAN := filepath.Join(dir, serfWANKeyring)
|
2014-10-10 18:13:30 +00:00
|
|
|
if err := initKeyring(fileWAN, key); err != nil {
|
2014-09-18 05:31:32 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
agent, err := Create(conf, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return dir, agent
|
|
|
|
}
|
|
|
|
|
2013-12-30 22:42:41 +00:00
|
|
|
func makeAgent(t *testing.T, conf *Config) (string, *Agent) {
|
|
|
|
return makeAgentLog(t, conf, nil)
|
|
|
|
}
|
|
|
|
|
2013-12-23 21:52:10 +00:00
|
|
|
func TestAgentStartStop(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
if err := agent.Leave(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if err := agent.Shutdown(); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-agent.ShutdownCh():
|
|
|
|
default:
|
|
|
|
t.Fatalf("should be closed")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-16 01:24:15 +00:00
|
|
|
func TestAgent_RPCPing(t *testing.T) {
|
2013-12-23 21:52:10 +00:00
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
var out struct{}
|
|
|
|
if err := agent.RPC("Status.Ping", struct{}{}, &out); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2014-01-30 21:39:02 +00:00
|
|
|
|
|
|
|
func TestAgent_AddService(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
2015-01-14 01:52:17 +00:00
|
|
|
// Service registration with a single check
|
|
|
|
{
|
|
|
|
srv := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
chkTypes := CheckTypes{
|
|
|
|
&CheckType{
|
|
|
|
TTL: time.Minute,
|
|
|
|
Notes: "redis heath check 2",
|
|
|
|
},
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddService(srv, chkTypes, false, "")
|
2015-01-14 01:52:17 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a state mapping
|
|
|
|
if _, ok := agent.state.Services()["redis"]; !ok {
|
|
|
|
t.Fatalf("missing redis service")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the check is registered
|
|
|
|
if _, ok := agent.state.Checks()["service:redis"]; !ok {
|
|
|
|
t.Fatalf("missing redis check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if _, ok := agent.checkTTLs["service:redis"]; !ok {
|
|
|
|
t.Fatalf("missing redis check ttl")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the notes are passed through
|
|
|
|
if agent.state.Checks()["service:redis"].Notes == "" {
|
|
|
|
t.Fatalf("missing redis check notes")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Service registration with multiple checks
|
|
|
|
{
|
|
|
|
srv := &structs.NodeService{
|
|
|
|
ID: "memcache",
|
|
|
|
Service: "memcache",
|
|
|
|
Tags: []string{"bar"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
chkTypes := CheckTypes{
|
|
|
|
&CheckType{
|
|
|
|
TTL: time.Minute,
|
|
|
|
Notes: "memcache health check 1",
|
|
|
|
},
|
|
|
|
&CheckType{
|
|
|
|
TTL: time.Second,
|
|
|
|
Notes: "memcache heath check 2",
|
|
|
|
},
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(srv, chkTypes, false, ""); err != nil {
|
2015-01-14 01:52:17 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a state mapping
|
|
|
|
if _, ok := agent.state.Services()["memcache"]; !ok {
|
|
|
|
t.Fatalf("missing memcache service")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure both checks were added
|
|
|
|
if _, ok := agent.state.Checks()["service:memcache:1"]; !ok {
|
|
|
|
t.Fatalf("missing memcache:1 check")
|
|
|
|
}
|
|
|
|
if _, ok := agent.state.Checks()["service:memcache:2"]; !ok {
|
|
|
|
t.Fatalf("missing memcache:2 check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if _, ok := agent.checkTTLs["service:memcache:1"]; !ok {
|
|
|
|
t.Fatalf("missing memcache:1 check ttl")
|
|
|
|
}
|
|
|
|
if _, ok := agent.checkTTLs["service:memcache:2"]; !ok {
|
|
|
|
t.Fatalf("missing memcache:2 check ttl")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the notes are passed through
|
|
|
|
if agent.state.Checks()["service:memcache:1"].Notes == "" {
|
|
|
|
t.Fatalf("missing redis check notes")
|
|
|
|
}
|
|
|
|
if agent.state.Checks()["service:memcache:2"].Notes == "" {
|
|
|
|
t.Fatalf("missing redis check notes")
|
|
|
|
}
|
2014-11-07 02:24:04 +00:00
|
|
|
}
|
2014-01-30 21:39:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAgent_RemoveService(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
// Remove a service that doesn't exist
|
2014-11-26 07:58:02 +00:00
|
|
|
if err := agent.RemoveService("redis", false); err != nil {
|
2014-01-30 21:39:02 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2014-10-14 22:05:41 +00:00
|
|
|
// Remove the consul service
|
2014-11-26 07:58:02 +00:00
|
|
|
if err := agent.RemoveService("consul", false); err == nil {
|
2014-10-14 22:05:41 +00:00
|
|
|
t.Fatalf("should have errored")
|
|
|
|
}
|
|
|
|
|
2015-01-27 09:10:56 +00:00
|
|
|
// Remove without an ID
|
|
|
|
if err := agent.RemoveService("", false); err == nil {
|
|
|
|
t.Fatalf("should have errored")
|
|
|
|
}
|
|
|
|
|
2015-01-14 01:52:17 +00:00
|
|
|
// Removing a service with a single check works
|
|
|
|
{
|
|
|
|
srv := &structs.NodeService{
|
|
|
|
ID: "memcache",
|
|
|
|
Service: "memcache",
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
chkTypes := CheckTypes{&CheckType{TTL: time.Minute}}
|
|
|
|
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(srv, chkTypes, false, ""); err != nil {
|
2015-01-14 01:52:17 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := agent.RemoveService("memcache", false); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if _, ok := agent.state.Checks()["service:memcache"]; ok {
|
|
|
|
t.Fatalf("have memcache check")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Removing a service with multiple checks works
|
|
|
|
{
|
|
|
|
srv := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
chkTypes := CheckTypes{
|
|
|
|
&CheckType{TTL: time.Minute},
|
|
|
|
&CheckType{TTL: 30 * time.Second},
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(srv, chkTypes, false, ""); err != nil {
|
2015-01-14 01:52:17 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the service
|
|
|
|
if err := agent.RemoveService("redis", false); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a state mapping
|
|
|
|
if _, ok := agent.state.Services()["redis"]; ok {
|
|
|
|
t.Fatalf("have redis service")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure checks were removed
|
|
|
|
if _, ok := agent.state.Checks()["service:redis:1"]; ok {
|
|
|
|
t.Fatalf("check redis:1 should be removed")
|
|
|
|
}
|
|
|
|
if _, ok := agent.state.Checks()["service:redis:2"]; ok {
|
|
|
|
t.Fatalf("check redis:2 should be removed")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if _, ok := agent.checkTTLs["service:redis:1"]; ok {
|
|
|
|
t.Fatalf("check ttl for redis:1 should be removed")
|
|
|
|
}
|
|
|
|
if _, ok := agent.checkTTLs["service:redis:2"]; ok {
|
|
|
|
t.Fatalf("check ttl for redis:2 should be removed")
|
|
|
|
}
|
2014-01-30 21:39:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAgent_AddCheck(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
health := &structs.HealthCheck{
|
|
|
|
Node: "foo",
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory util",
|
2014-10-15 17:14:46 +00:00
|
|
|
Status: structs.HealthCritical,
|
2014-01-30 21:39:02 +00:00
|
|
|
}
|
|
|
|
chk := &CheckType{
|
|
|
|
Script: "exit 0",
|
|
|
|
Interval: 15 * time.Second,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddCheck(health, chk, false, "")
|
2014-01-30 21:39:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a check mapping
|
|
|
|
if _, ok := agent.state.Checks()["mem"]; !ok {
|
|
|
|
t.Fatalf("missing mem check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if _, ok := agent.checkMonitors["mem"]; !ok {
|
|
|
|
t.Fatalf("missing mem monitor")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-21 21:42:42 +00:00
|
|
|
func TestAgent_AddCheck_MinInterval(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
health := &structs.HealthCheck{
|
|
|
|
Node: "foo",
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory util",
|
2014-10-15 17:14:46 +00:00
|
|
|
Status: structs.HealthCritical,
|
2014-04-21 21:42:42 +00:00
|
|
|
}
|
|
|
|
chk := &CheckType{
|
|
|
|
Script: "exit 0",
|
|
|
|
Interval: time.Microsecond,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddCheck(health, chk, false, "")
|
2014-04-21 21:42:42 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a check mapping
|
|
|
|
if _, ok := agent.state.Checks()["mem"]; !ok {
|
|
|
|
t.Fatalf("missing mem check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if mon, ok := agent.checkMonitors["mem"]; !ok {
|
|
|
|
t.Fatalf("missing mem monitor")
|
|
|
|
} else if mon.Interval != MinInterval {
|
|
|
|
t.Fatalf("bad mem monitor interval")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-14 01:52:17 +00:00
|
|
|
func TestAgent_AddCheck_MissingService(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
health := &structs.HealthCheck{
|
|
|
|
Node: "foo",
|
|
|
|
CheckID: "baz",
|
|
|
|
Name: "baz check 1",
|
|
|
|
ServiceID: "baz",
|
|
|
|
}
|
|
|
|
chk := &CheckType{
|
|
|
|
Script: "exit 0",
|
|
|
|
Interval: time.Microsecond,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddCheck(health, chk, false, "")
|
2015-01-14 01:52:17 +00:00
|
|
|
if err == nil || err.Error() != `ServiceID "baz" does not exist` {
|
|
|
|
t.Fatalf("expected service id error, got: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-30 21:39:02 +00:00
|
|
|
func TestAgent_RemoveCheck(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
// Remove check that doesn't exist
|
2014-11-26 07:58:02 +00:00
|
|
|
if err := agent.RemoveCheck("mem", false); err != nil {
|
2014-01-30 21:39:02 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-01-27 09:10:56 +00:00
|
|
|
// Remove without an ID
|
|
|
|
if err := agent.RemoveCheck("", false); err == nil {
|
|
|
|
t.Fatalf("should have errored")
|
|
|
|
}
|
|
|
|
|
2014-01-30 21:39:02 +00:00
|
|
|
health := &structs.HealthCheck{
|
|
|
|
Node: "foo",
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory util",
|
2014-10-15 17:14:46 +00:00
|
|
|
Status: structs.HealthCritical,
|
2014-01-30 21:39:02 +00:00
|
|
|
}
|
|
|
|
chk := &CheckType{
|
|
|
|
Script: "exit 0",
|
|
|
|
Interval: 15 * time.Second,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddCheck(health, chk, false, "")
|
2014-01-30 21:39:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove check
|
2014-11-26 07:58:02 +00:00
|
|
|
if err := agent.RemoveCheck("mem", false); err != nil {
|
2014-01-30 21:39:02 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a check mapping
|
|
|
|
if _, ok := agent.state.Checks()["mem"]; ok {
|
|
|
|
t.Fatalf("have mem check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure a TTL is setup
|
|
|
|
if _, ok := agent.checkMonitors["mem"]; ok {
|
|
|
|
t.Fatalf("have mem monitor")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAgent_UpdateCheck(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
health := &structs.HealthCheck{
|
|
|
|
Node: "foo",
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory util",
|
2014-10-15 17:14:46 +00:00
|
|
|
Status: structs.HealthCritical,
|
2014-01-30 21:39:02 +00:00
|
|
|
}
|
|
|
|
chk := &CheckType{
|
|
|
|
TTL: 15 * time.Second,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
err := agent.AddCheck(health, chk, false, "")
|
2014-01-30 21:39:02 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove check
|
|
|
|
if err := agent.UpdateCheck("mem", structs.HealthPassing, "foo"); err != nil {
|
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we have a check mapping
|
|
|
|
status := agent.state.Checks()["mem"]
|
|
|
|
if status.Status != structs.HealthPassing {
|
|
|
|
t.Fatalf("bad: %v", status)
|
|
|
|
}
|
2014-04-21 23:20:22 +00:00
|
|
|
if status.Output != "foo" {
|
2014-01-30 21:39:02 +00:00
|
|
|
t.Fatalf("bad: %v", status)
|
|
|
|
}
|
|
|
|
}
|
2014-10-14 22:05:41 +00:00
|
|
|
|
|
|
|
func TestAgent_ConsulService(t *testing.T) {
|
|
|
|
dir, agent := makeAgent(t, nextConfig())
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
2014-10-17 21:43:52 +00:00
|
|
|
testutil.WaitForLeader(t, agent.RPC, "dc1")
|
|
|
|
|
|
|
|
// Consul service is registered
|
2014-10-14 22:05:41 +00:00
|
|
|
services := agent.state.Services()
|
2014-10-14 22:42:49 +00:00
|
|
|
if _, ok := services[consul.ConsulServiceID]; !ok {
|
|
|
|
t.Fatalf("%s service should be registered", consul.ConsulServiceID)
|
2014-10-14 22:05:41 +00:00
|
|
|
}
|
2014-10-17 21:43:52 +00:00
|
|
|
|
|
|
|
// Perform anti-entropy on consul service
|
|
|
|
if err := agent.state.syncService(consul.ConsulServiceID); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Consul service should be in sync
|
|
|
|
if !agent.state.serviceStatus[consul.ConsulServiceID].inSync {
|
|
|
|
t.Fatalf("%s service should be in sync", consul.ConsulServiceID)
|
|
|
|
}
|
2014-10-14 22:05:41 +00:00
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
|
|
|
|
func TestAgent_PersistService(t *testing.T) {
|
|
|
|
config := nextConfig()
|
2014-12-05 18:36:01 +00:00
|
|
|
config.Server = false
|
2014-11-24 08:36:03 +00:00
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-24 08:36:03 +00:00
|
|
|
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, servicesDir, stringHash(svc.ID))
|
2014-11-25 03:24:32 +00:00
|
|
|
|
|
|
|
// Check is not persisted unless requested
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, false, ""); err != nil {
|
2014-11-25 03:24:32 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := os.Stat(file); err == nil {
|
|
|
|
t.Fatalf("should not persist")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Persists to file if requested
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, true, "mytoken"); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := os.Stat(file); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
expected, err := json.Marshal(persistedService{
|
2015-05-05 00:36:17 +00:00
|
|
|
Token: "mytoken",
|
2015-04-28 05:46:01 +00:00
|
|
|
Service: svc,
|
|
|
|
})
|
2014-11-24 08:36:03 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
content, err := ioutil.ReadFile(file)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(expected, content) {
|
|
|
|
t.Fatalf("bad: %s", string(content))
|
|
|
|
}
|
|
|
|
agent.Shutdown()
|
|
|
|
|
|
|
|
// Should load it back during later start
|
|
|
|
agent2, err := Create(config, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer agent2.Shutdown()
|
|
|
|
|
|
|
|
if _, ok := agent2.state.services[svc.ID]; !ok {
|
|
|
|
t.Fatalf("bad: %#v", agent2.state.services)
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if agent2.state.serviceTokens[svc.ID] != "mytoken" {
|
2015-04-28 05:46:01 +00:00
|
|
|
t.Fatalf("bad: %#v", agent2.state.services[svc.ID])
|
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
func TestAgent_persistedService_compat(t *testing.T) {
|
2015-04-28 19:18:41 +00:00
|
|
|
// Tests backwards compatibility of persisted services from pre-0.5.1
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Encode the NodeService directly. This is what previous versions
|
|
|
|
// would serialize to the file (without the wrapper)
|
|
|
|
encoded, err := json.Marshal(svc)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the content to the file
|
|
|
|
file := filepath.Join(agent.config.DataDir, servicesDir, stringHash(svc.ID))
|
|
|
|
if err := os.MkdirAll(filepath.Dir(file), 0700); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if err := ioutil.WriteFile(file, encoded, 0600); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the services
|
|
|
|
if err := agent.loadServices(config); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the service was restored
|
|
|
|
services := agent.state.Services()
|
|
|
|
result, ok := services["redis"]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("missing service")
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(result, svc) {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-26 07:58:02 +00:00
|
|
|
func TestAgent_PurgeService(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-26 07:58:02 +00:00
|
|
|
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, servicesDir, stringHash(svc.ID))
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, true, ""); err != nil {
|
2014-11-26 07:58:02 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not removed
|
|
|
|
if err := agent.RemoveService(svc.ID, false); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
if _, err := os.Stat(file); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
|
|
|
|
// Removed
|
|
|
|
if err := agent.RemoveService(svc.ID, true); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if _, err := os.Stat(file); !os.IsNotExist(err) {
|
|
|
|
t.Fatalf("bad: %#v", err)
|
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
}
|
|
|
|
|
2014-11-25 03:24:32 +00:00
|
|
|
func TestAgent_PurgeServiceOnDuplicate(t *testing.T) {
|
|
|
|
config := nextConfig()
|
2014-12-05 18:36:01 +00:00
|
|
|
config.Server = false
|
2014-11-25 03:24:32 +00:00
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-25 03:24:32 +00:00
|
|
|
|
|
|
|
svc1 := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
|
|
|
// First persist the service
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc1, nil, true, ""); err != nil {
|
2014-11-25 03:24:32 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
agent.Shutdown()
|
|
|
|
|
|
|
|
// Try bringing the agent back up with the service already
|
|
|
|
// existing in the config
|
|
|
|
svc2 := &ServiceDefinition{
|
|
|
|
ID: "redis",
|
|
|
|
Name: "redis",
|
|
|
|
Tags: []string{"bar"},
|
|
|
|
Port: 9000,
|
|
|
|
}
|
|
|
|
|
|
|
|
config.Services = []*ServiceDefinition{svc2}
|
|
|
|
agent2, err := Create(config, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer agent2.Shutdown()
|
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, servicesDir, stringHash(svc1.ID))
|
2014-11-25 03:24:32 +00:00
|
|
|
if _, err := os.Stat(file); err == nil {
|
|
|
|
t.Fatalf("should have removed persisted service")
|
|
|
|
}
|
|
|
|
result, ok := agent2.state.services[svc2.ID]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("missing service registration")
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(result.Tags, svc2.Tags) || result.Port != svc2.Port {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-24 08:36:03 +00:00
|
|
|
func TestAgent_PersistCheck(t *testing.T) {
|
|
|
|
config := nextConfig()
|
2014-12-05 18:36:01 +00:00
|
|
|
config.Server = false
|
2014-11-24 08:36:03 +00:00
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-24 08:36:03 +00:00
|
|
|
|
|
|
|
check := &structs.HealthCheck{
|
2015-01-14 01:52:17 +00:00
|
|
|
Node: config.NodeName,
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory check",
|
|
|
|
Status: structs.HealthPassing,
|
2014-11-24 08:36:03 +00:00
|
|
|
}
|
2014-11-29 20:25:01 +00:00
|
|
|
chkType := &CheckType{
|
|
|
|
Script: "/bin/true",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, checksDir, stringHash(check.CheckID))
|
2014-11-25 03:24:32 +00:00
|
|
|
|
|
|
|
// Not persisted if not requested
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check, chkType, false, ""); err != nil {
|
2014-11-25 03:24:32 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := os.Stat(file); err == nil {
|
|
|
|
t.Fatalf("should not persist")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should persist if requested
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check, chkType, true, "mytoken"); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := os.Stat(file); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
expected, err := json.Marshal(persistedCheck{
|
|
|
|
Check: check,
|
|
|
|
ChkType: chkType,
|
2015-05-05 00:36:17 +00:00
|
|
|
Token: "mytoken",
|
2015-04-28 19:44:46 +00:00
|
|
|
})
|
2014-11-24 08:36:03 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
content, err := ioutil.ReadFile(file)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(expected, content) {
|
|
|
|
t.Fatalf("bad: %s", string(content))
|
|
|
|
}
|
|
|
|
agent.Shutdown()
|
|
|
|
|
|
|
|
// Should load it back during later start
|
|
|
|
agent2, err := Create(config, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer agent2.Shutdown()
|
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
result, ok := agent2.state.checks[check.CheckID]
|
2014-11-24 09:15:18 +00:00
|
|
|
if !ok {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("bad: %#v", agent2.state.checks)
|
|
|
|
}
|
2014-11-24 09:15:18 +00:00
|
|
|
if result.Status != structs.HealthCritical {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
2014-11-29 20:25:01 +00:00
|
|
|
|
|
|
|
// Should have restored the monitor
|
2015-04-28 19:44:46 +00:00
|
|
|
if _, ok := agent2.checkMonitors[check.CheckID]; !ok {
|
2014-11-29 20:25:01 +00:00
|
|
|
t.Fatalf("bad: %#v", agent2.checkMonitors)
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if agent2.state.checkTokens[check.CheckID] != "mytoken" {
|
2015-04-28 19:44:46 +00:00
|
|
|
t.Fatalf("bad: %s", agent2.state.checkTokens[check.CheckID])
|
2015-04-28 05:46:01 +00:00
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAgent_PurgeCheck(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-26 07:58:02 +00:00
|
|
|
|
|
|
|
check := &structs.HealthCheck{
|
2015-01-14 01:52:17 +00:00
|
|
|
Node: config.NodeName,
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory check",
|
|
|
|
Status: structs.HealthPassing,
|
2014-11-26 07:58:02 +00:00
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, checksDir, stringHash(check.CheckID))
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check, nil, true, ""); err != nil {
|
2014-11-26 07:58:02 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not removed
|
|
|
|
if err := agent.RemoveCheck(check.CheckID, false); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
if _, err := os.Stat(file); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Removed
|
|
|
|
if err := agent.RemoveCheck(check.CheckID, true); err != nil {
|
2014-11-24 08:36:03 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2014-11-26 07:58:02 +00:00
|
|
|
if _, err := os.Stat(file); !os.IsNotExist(err) {
|
|
|
|
t.Fatalf("bad: %#v", err)
|
|
|
|
}
|
2014-11-24 08:36:03 +00:00
|
|
|
}
|
2014-11-25 03:24:32 +00:00
|
|
|
|
|
|
|
func TestAgent_PurgeCheckOnDuplicate(t *testing.T) {
|
|
|
|
config := nextConfig()
|
2014-12-05 18:36:01 +00:00
|
|
|
config.Server = false
|
2014-11-25 03:24:32 +00:00
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
2014-12-05 18:36:01 +00:00
|
|
|
defer agent.Shutdown()
|
2014-11-25 03:24:32 +00:00
|
|
|
|
|
|
|
check1 := &structs.HealthCheck{
|
2015-01-14 01:52:17 +00:00
|
|
|
Node: config.NodeName,
|
|
|
|
CheckID: "mem",
|
|
|
|
Name: "memory check",
|
|
|
|
Status: structs.HealthPassing,
|
2014-11-25 03:24:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// First persist the check
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check1, nil, true, ""); err != nil {
|
2014-11-25 03:24:32 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
agent.Shutdown()
|
|
|
|
|
|
|
|
// Start again with the check registered in config
|
|
|
|
check2 := &CheckDefinition{
|
2015-01-14 01:52:17 +00:00
|
|
|
ID: "mem",
|
|
|
|
Name: "memory check",
|
2014-11-25 03:24:32 +00:00
|
|
|
Notes: "my cool notes",
|
|
|
|
CheckType: CheckType{
|
|
|
|
Script: "/bin/check-redis.py",
|
|
|
|
Interval: 30 * time.Second,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
config.Checks = []*CheckDefinition{check2}
|
|
|
|
agent2, err := Create(config, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer agent2.Shutdown()
|
|
|
|
|
2015-01-08 03:11:21 +00:00
|
|
|
file := filepath.Join(agent.config.DataDir, checksDir, stringHash(check1.CheckID))
|
2014-11-25 03:24:32 +00:00
|
|
|
if _, err := os.Stat(file); err == nil {
|
|
|
|
t.Fatalf("should have removed persisted check")
|
|
|
|
}
|
|
|
|
result, ok := agent2.state.checks[check2.ID]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("missing check registration")
|
|
|
|
}
|
|
|
|
expected := check2.HealthCheck(config.NodeName)
|
|
|
|
if !reflect.DeepEqual(expected, result) {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
|
|
|
}
|
2015-01-08 06:26:40 +00:00
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
func TestAgent_loadChecks_token(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
config.Checks = append(config.Checks, &CheckDefinition{
|
|
|
|
ID: "rabbitmq",
|
|
|
|
Name: "rabbitmq",
|
|
|
|
Token: "abc123",
|
|
|
|
CheckType: CheckType{
|
|
|
|
TTL: 10 * time.Second,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
checks := agent.state.Checks()
|
|
|
|
if _, ok := checks["rabbitmq"]; !ok {
|
|
|
|
t.Fatalf("missing check")
|
|
|
|
}
|
|
|
|
if token := agent.state.CheckToken("rabbitmq"); token != "abc123" {
|
|
|
|
t.Fatalf("bad: %s", token)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 06:26:40 +00:00
|
|
|
func TestAgent_unloadChecks(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
2015-01-14 01:52:17 +00:00
|
|
|
// First register a service
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, false, ""); err != nil {
|
2015-01-14 01:52:17 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register a check
|
2015-01-08 06:26:40 +00:00
|
|
|
check1 := &structs.HealthCheck{
|
|
|
|
Node: config.NodeName,
|
2015-01-14 01:52:17 +00:00
|
|
|
CheckID: "service:redis",
|
2015-01-08 06:26:40 +00:00
|
|
|
Name: "redischeck",
|
|
|
|
Status: structs.HealthPassing,
|
|
|
|
ServiceID: "redis",
|
|
|
|
ServiceName: "redis",
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check1, nil, false, ""); err != nil {
|
2015-01-08 06:26:40 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
found := false
|
|
|
|
for check, _ := range agent.state.Checks() {
|
|
|
|
if check == check1.CheckID {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Fatalf("check should have been registered")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unload all of the checks
|
|
|
|
if err := agent.unloadChecks(); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure it was unloaded
|
|
|
|
for check, _ := range agent.state.Checks() {
|
|
|
|
if check == check1.CheckID {
|
|
|
|
t.Fatalf("should have unloaded checks")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-28 19:44:46 +00:00
|
|
|
func TestAgent_loadServices_token(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
config.Services = append(config.Services, &ServiceDefinition{
|
|
|
|
ID: "rabbitmq",
|
|
|
|
Name: "rabbitmq",
|
|
|
|
Port: 5672,
|
|
|
|
Token: "abc123",
|
|
|
|
})
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
services := agent.state.Services()
|
|
|
|
if _, ok := services["rabbitmq"]; !ok {
|
|
|
|
t.Fatalf("missing service")
|
|
|
|
}
|
|
|
|
if token := agent.state.ServiceToken("rabbitmq"); token != "abc123" {
|
|
|
|
t.Fatalf("bad: %s", token)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-08 06:26:40 +00:00
|
|
|
func TestAgent_unloadServices(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register the service
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, false, ""); err != nil {
|
2015-01-08 06:26:40 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
found := false
|
|
|
|
for id, _ := range agent.state.Services() {
|
|
|
|
if id == svc.ID {
|
|
|
|
found = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Fatalf("should have registered service")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unload all services
|
|
|
|
if err := agent.unloadServices(); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure it was unloaded and the consul service remains
|
|
|
|
found = false
|
|
|
|
for id, _ := range agent.state.Services() {
|
|
|
|
if id == svc.ID {
|
|
|
|
t.Fatalf("should have unloaded services")
|
|
|
|
}
|
|
|
|
if id == consul.ConsulServiceID {
|
|
|
|
found = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
t.Fatalf("consul service should not be removed")
|
|
|
|
}
|
|
|
|
}
|
2015-01-15 08:25:36 +00:00
|
|
|
|
2015-01-15 19:26:14 +00:00
|
|
|
func TestAgent_ServiceMaintenanceMode(t *testing.T) {
|
2015-01-15 08:25:36 +00:00
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register the service
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, false, ""); err != nil {
|
2015-01-15 08:25:36 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enter maintenance mode for the service
|
2015-01-21 20:21:57 +00:00
|
|
|
if err := agent.EnableServiceMaintenance("redis", "broken"); err != nil {
|
2015-01-15 08:25:36 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure the critical health check was added
|
2015-01-15 20:20:57 +00:00
|
|
|
checkID := serviceMaintCheckID("redis")
|
2015-01-21 20:21:57 +00:00
|
|
|
check, ok := agent.state.Checks()[checkID]
|
|
|
|
if !ok {
|
2015-01-15 19:26:14 +00:00
|
|
|
t.Fatalf("should have registered critical maintenance check")
|
2015-01-15 08:25:36 +00:00
|
|
|
}
|
|
|
|
|
2015-01-21 20:21:57 +00:00
|
|
|
// Ensure the reason was set in notes
|
|
|
|
if check.Notes != "broken" {
|
|
|
|
t.Fatalf("bad: %#v", check)
|
|
|
|
}
|
|
|
|
|
2015-01-15 08:25:36 +00:00
|
|
|
// Leave maintenance mode
|
|
|
|
if err := agent.DisableServiceMaintenance("redis"); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the check was deregistered
|
2015-01-15 20:20:57 +00:00
|
|
|
if _, ok := agent.state.Checks()[checkID]; ok {
|
2015-01-15 19:26:14 +00:00
|
|
|
t.Fatalf("should have deregistered maintenance check")
|
|
|
|
}
|
2015-01-21 20:21:57 +00:00
|
|
|
|
|
|
|
// Enter service maintenance mode without providing a reason
|
|
|
|
if err := agent.EnableServiceMaintenance("redis", ""); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the check was registered with the default notes
|
|
|
|
check, ok = agent.state.Checks()[checkID]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("should have registered critical check")
|
|
|
|
}
|
2015-01-21 22:45:09 +00:00
|
|
|
if check.Notes != defaultServiceMaintReason {
|
2015-01-21 20:21:57 +00:00
|
|
|
t.Fatalf("bad: %#v", check)
|
|
|
|
}
|
2015-01-15 19:26:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAgent_NodeMaintenanceMode(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
// Enter maintenance mode for the node
|
2015-01-21 20:21:57 +00:00
|
|
|
agent.EnableNodeMaintenance("broken")
|
2015-01-15 19:26:14 +00:00
|
|
|
|
|
|
|
// Make sure the critical health check was added
|
2015-01-21 20:21:57 +00:00
|
|
|
check, ok := agent.state.Checks()[nodeMaintCheckID]
|
|
|
|
if !ok {
|
2015-01-15 19:26:14 +00:00
|
|
|
t.Fatalf("should have registered critical node check")
|
|
|
|
}
|
|
|
|
|
2015-01-21 20:21:57 +00:00
|
|
|
// Ensure the reason was set in notes
|
|
|
|
if check.Notes != "broken" {
|
|
|
|
t.Fatalf("bad: %#v", check)
|
|
|
|
}
|
|
|
|
|
2015-01-15 19:26:14 +00:00
|
|
|
// Leave maintenance mode
|
|
|
|
agent.DisableNodeMaintenance()
|
|
|
|
|
|
|
|
// Ensure the check was deregistered
|
|
|
|
if _, ok := agent.state.Checks()[nodeMaintCheckID]; ok {
|
|
|
|
t.Fatalf("should have deregistered critical node check")
|
2015-01-15 08:25:36 +00:00
|
|
|
}
|
2015-01-21 20:21:57 +00:00
|
|
|
|
|
|
|
// Enter maintenance mode without passing a reason
|
|
|
|
agent.EnableNodeMaintenance("")
|
|
|
|
|
|
|
|
// Make sure the check was registered with the default note
|
|
|
|
check, ok = agent.state.Checks()[nodeMaintCheckID]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("should have registered critical node check")
|
|
|
|
}
|
2015-01-21 22:45:09 +00:00
|
|
|
if check.Notes != defaultNodeMaintReason {
|
2015-01-21 20:21:57 +00:00
|
|
|
t.Fatalf("bad: %#v", check)
|
|
|
|
}
|
2015-01-15 08:25:36 +00:00
|
|
|
}
|
2015-02-17 20:00:04 +00:00
|
|
|
|
|
|
|
func TestAgent_checkStateSnapshot(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
// First register a service
|
|
|
|
svc := &structs.NodeService{
|
|
|
|
ID: "redis",
|
|
|
|
Service: "redis",
|
|
|
|
Tags: []string{"foo"},
|
|
|
|
Port: 8000,
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddService(svc, nil, false, ""); err != nil {
|
2015-02-17 20:00:04 +00:00
|
|
|
t.Fatalf("err: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Register a check
|
|
|
|
check1 := &structs.HealthCheck{
|
|
|
|
Node: config.NodeName,
|
|
|
|
CheckID: "service:redis",
|
|
|
|
Name: "redischeck",
|
|
|
|
Status: structs.HealthPassing,
|
|
|
|
ServiceID: "redis",
|
|
|
|
ServiceName: "redis",
|
|
|
|
}
|
2015-05-05 00:36:17 +00:00
|
|
|
if err := agent.AddCheck(check1, nil, true, ""); err != nil {
|
2015-02-17 20:00:04 +00:00
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Snapshot the state
|
|
|
|
snap := agent.snapshotCheckState()
|
|
|
|
|
|
|
|
// Unload all of the checks
|
|
|
|
if err := agent.unloadChecks(); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reload the checks
|
|
|
|
if err := agent.loadChecks(config); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Restore the state
|
|
|
|
agent.restoreCheckState(snap)
|
|
|
|
|
|
|
|
// Search for the check
|
|
|
|
out, ok := agent.state.Checks()[check1.CheckID]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("check should have been registered")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure state was restored
|
|
|
|
if out.Status != structs.HealthPassing {
|
|
|
|
t.Fatalf("should have restored check state")
|
|
|
|
}
|
|
|
|
}
|
2015-03-11 23:13:19 +00:00
|
|
|
|
|
|
|
func TestAgent_loadChecks_checkFails(t *testing.T) {
|
|
|
|
config := nextConfig()
|
|
|
|
dir, agent := makeAgent(t, config)
|
|
|
|
defer os.RemoveAll(dir)
|
|
|
|
defer agent.Shutdown()
|
|
|
|
|
|
|
|
// Persist a health check with an invalid service ID
|
|
|
|
check := &structs.HealthCheck{
|
|
|
|
Node: config.NodeName,
|
|
|
|
CheckID: "service:redis",
|
|
|
|
Name: "redischeck",
|
|
|
|
Status: structs.HealthPassing,
|
|
|
|
ServiceID: "nope",
|
|
|
|
}
|
|
|
|
if err := agent.persistCheck(check, nil); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check to make sure the check was persisted
|
|
|
|
checkHash := stringHash(check.CheckID)
|
|
|
|
checkPath := filepath.Join(config.DataDir, checksDir, checkHash)
|
|
|
|
if _, err := os.Stat(checkPath); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try loading the checks from the persisted files
|
|
|
|
if err := agent.loadChecks(config); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the erroneous check was purged
|
|
|
|
if _, err := os.Stat(checkPath); err == nil {
|
|
|
|
t.Fatalf("should have purged check")
|
|
|
|
}
|
|
|
|
}
|