agent: only use TestAgent when appropriate (#5502)

This commit is contained in:
Hans Hasselberg 2019-03-18 17:06:16 +01:00 committed by GitHub
parent 6ef970a191
commit e7134a0dab
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 10 additions and 25 deletions

View File

@ -3584,8 +3584,8 @@ func TestAgent_ReloadConfigOutgoingRPCConfig(t *testing.T) {
key_file = "../test/key/ourdomain.key" key_file = "../test/key/ourdomain.key"
verify_server_hostname = false verify_server_hostname = false
` `
a, err := NewUnstartedAgent(t, t.Name(), hcl) a := NewTestAgent(t, t.Name(), hcl)
require.NoError(t, err) defer a.Shutdown()
tlsConf := a.tlsConfigurator.OutgoingRPCConfig() tlsConf := a.tlsConfigurator.OutgoingRPCConfig()
require.True(t, tlsConf.InsecureSkipVerify) require.True(t, tlsConf.InsecureSkipVerify)
require.Len(t, tlsConf.ClientCAs.Subjects(), 1) require.Len(t, tlsConf.ClientCAs.Subjects(), 1)
@ -3619,11 +3619,11 @@ func TestAgent_ReloadConfigIncomingRPCConfig(t *testing.T) {
key_file = "../test/key/ourdomain.key" key_file = "../test/key/ourdomain.key"
verify_server_hostname = false verify_server_hostname = false
` `
a, err := NewUnstartedAgent(t, t.Name(), hcl) a := NewTestAgent(t, t.Name(), hcl)
require.NoError(t, err) defer a.Shutdown()
tlsConf := a.tlsConfigurator.IncomingRPCConfig() tlsConf := a.tlsConfigurator.IncomingRPCConfig()
require.NotNil(t, tlsConf.GetConfigForClient) require.NotNil(t, tlsConf.GetConfigForClient)
tlsConf, err = tlsConf.GetConfigForClient(nil) tlsConf, err := tlsConf.GetConfigForClient(nil)
require.NoError(t, err) require.NoError(t, err)
require.NotNil(t, tlsConf) require.NotNil(t, tlsConf)
require.True(t, tlsConf.InsecureSkipVerify) require.True(t, tlsConf.InsecureSkipVerify)
@ -3659,8 +3659,8 @@ func TestAgent_ReloadConfigTLSConfigFailure(t *testing.T) {
key_file = "../test/key/ourdomain.key" key_file = "../test/key/ourdomain.key"
verify_server_hostname = false verify_server_hostname = false
` `
a, err := NewUnstartedAgent(t, t.Name(), hcl) a := NewTestAgent(t, t.Name(), hcl)
require.NoError(t, err) defer a.Shutdown()
tlsConf := a.tlsConfigurator.IncomingRPCConfig() tlsConf := a.tlsConfigurator.IncomingRPCConfig()
hcl = ` hcl = `
@ -3669,7 +3669,7 @@ func TestAgent_ReloadConfigTLSConfigFailure(t *testing.T) {
` `
c := TestConfig(config.Source{Name: t.Name(), Format: "hcl", Data: hcl}) c := TestConfig(config.Source{Name: t.Name(), Format: "hcl", Data: hcl})
require.Error(t, a.ReloadConfig(c)) require.Error(t, a.ReloadConfig(c))
tlsConf, err = tlsConf.GetConfigForClient(nil) tlsConf, err := tlsConf.GetConfigForClient(nil)
require.NoError(t, err) require.NoError(t, err)
require.Equal(t, tls.NoClientCert, tlsConf.ClientAuth) require.Equal(t, tls.NoClientCert, tlsConf.ClientAuth)
require.Len(t, tlsConf.ClientCAs.Subjects(), 1) require.Len(t, tlsConf.ClientCAs.Subjects(), 1)

View File

@ -18,17 +18,14 @@ import (
metrics "github.com/armon/go-metrics" metrics "github.com/armon/go-metrics"
uuid "github.com/hashicorp/go-uuid" uuid "github.com/hashicorp/go-uuid"
"github.com/hashicorp/consul/agent/ae"
"github.com/hashicorp/consul/agent/config" "github.com/hashicorp/consul/agent/config"
"github.com/hashicorp/consul/agent/connect" "github.com/hashicorp/consul/agent/connect"
"github.com/hashicorp/consul/agent/consul" "github.com/hashicorp/consul/agent/consul"
"github.com/hashicorp/consul/agent/local"
"github.com/hashicorp/consul/agent/structs" "github.com/hashicorp/consul/agent/structs"
"github.com/hashicorp/consul/api" "github.com/hashicorp/consul/api"
"github.com/hashicorp/consul/lib/freeport" "github.com/hashicorp/consul/lib/freeport"
"github.com/hashicorp/consul/logger" "github.com/hashicorp/consul/logger"
"github.com/hashicorp/consul/testutil/retry" "github.com/hashicorp/consul/testutil/retry"
"github.com/hashicorp/consul/tlsutil"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
) )
@ -111,15 +108,6 @@ func NewUnstartedAgent(t *testing.T, name string, hcl string) (*Agent, error) {
if err != nil { if err != nil {
return nil, err return nil, err
} }
a.State = local.NewState(LocalConfig(c), a.logger, a.tokens)
a.sync = ae.NewStateSyncer(a.State, c.AEInterval, a.shutdownCh, a.logger)
a.delegate = &consul.Client{}
a.State.TriggerSyncChanges = a.sync.SyncChanges.Trigger
tlsConfigurator, err := tlsutil.NewConfigurator(c.ToTLSUtilConfig(), nil)
if err != nil {
return nil, err
}
a.tlsConfigurator = tlsConfigurator
return a, nil return a, nil
} }
@ -169,9 +157,6 @@ func (a *TestAgent) Start(t *testing.T) *TestAgent {
agent.LogWriter = a.LogWriter agent.LogWriter = a.LogWriter
agent.logger = log.New(logOutput, a.Name+" - ", log.LstdFlags|log.Lmicroseconds) agent.logger = log.New(logOutput, a.Name+" - ", log.LstdFlags|log.Lmicroseconds)
agent.MemSink = metrics.NewInmemSink(1*time.Second, time.Minute) agent.MemSink = metrics.NewInmemSink(1*time.Second, time.Minute)
tlsConfigurator, err := tlsutil.NewConfigurator(a.Config.ToTLSUtilConfig(), nil)
require.NoError(err)
agent.tlsConfigurator = tlsConfigurator
// we need the err var in the next exit condition // we need the err var in the next exit condition
if err := agent.Start(); err == nil { if err := agent.Start(); err == nil {