mirror of https://github.com/status-im/consul.git
505 lines
13 KiB
Go
505 lines
13 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package catalogv2
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
pbauth "github.com/hashicorp/consul/proto-public/pbauth/v2beta1"
|
|
pbcatalog "github.com/hashicorp/consul/proto-public/pbcatalog/v2beta1"
|
|
pbmesh "github.com/hashicorp/consul/proto-public/pbmesh/v2beta1"
|
|
"github.com/hashicorp/consul/proto-public/pbresource"
|
|
libassert "github.com/hashicorp/consul/test/integration/consul-container/libs/assert"
|
|
"github.com/hashicorp/consul/test/integration/consul-container/libs/utils"
|
|
"github.com/hashicorp/consul/testing/deployer/sprawl/sprawltest"
|
|
"github.com/hashicorp/consul/testing/deployer/topology"
|
|
|
|
"github.com/hashicorp/consul/test-integ/topoutil"
|
|
)
|
|
|
|
func TestSplitterFeaturesL7ExplicitDestinations(t *testing.T) {
|
|
tenancies := []*pbresource.Tenancy{
|
|
{
|
|
Partition: "default",
|
|
Namespace: "default",
|
|
},
|
|
}
|
|
if utils.IsEnterprise() {
|
|
tenancies = append(tenancies, &pbresource.Tenancy{
|
|
Partition: "part1",
|
|
Namespace: "default",
|
|
})
|
|
tenancies = append(tenancies, &pbresource.Tenancy{
|
|
Partition: "part1",
|
|
Namespace: "nsa",
|
|
})
|
|
tenancies = append(tenancies, &pbresource.Tenancy{
|
|
Partition: "default",
|
|
Namespace: "nsa",
|
|
})
|
|
}
|
|
cfg := testSplitterFeaturesL7ExplicitDestinationsCreator{
|
|
tenancies: tenancies,
|
|
}.NewConfig(t)
|
|
|
|
sp := sprawltest.Launch(t, cfg)
|
|
|
|
var (
|
|
asserter = topoutil.NewAsserter(sp)
|
|
|
|
topo = sp.Topology()
|
|
cluster = topo.Clusters["dc1"]
|
|
|
|
ships = topo.ComputeRelationships()
|
|
)
|
|
|
|
clientV2 := sp.ResourceServiceClientForCluster(cluster.Name)
|
|
|
|
t.Log(topology.RenderRelationships(ships))
|
|
|
|
for _, tenancy := range tenancies {
|
|
// Make sure things are in v2.
|
|
libassert.CatalogV2ServiceHasEndpointCount(t, clientV2, "static-client", tenancy, 1)
|
|
libassert.CatalogV2ServiceHasEndpointCount(t, clientV2, "static-server-v1", tenancy, 1)
|
|
libassert.CatalogV2ServiceHasEndpointCount(t, clientV2, "static-server-v2", tenancy, 1)
|
|
libassert.CatalogV2ServiceHasEndpointCount(t, clientV2, "static-server", tenancy, 0)
|
|
}
|
|
|
|
// Check relationships
|
|
for _, ship := range ships {
|
|
t.Run("relationship: "+ship.String(), func(t *testing.T) {
|
|
var (
|
|
wrk = ship.Caller
|
|
dest = ship.Destination
|
|
)
|
|
|
|
v1ID := dest.ID
|
|
v1ID.Name = "static-server-v1"
|
|
v1ClusterPrefix := clusterPrefix(dest.PortName, v1ID, dest.Cluster)
|
|
|
|
v2ID := dest.ID
|
|
v2ID.Name = "static-server-v2"
|
|
v2ClusterPrefix := clusterPrefix(dest.PortName, v2ID, dest.Cluster)
|
|
|
|
// we expect 2 clusters, one for each leg of the split
|
|
asserter.DestinationEndpointStatus(t, wrk, v1ClusterPrefix+".", "HEALTHY", 1)
|
|
asserter.DestinationEndpointStatus(t, wrk, v2ClusterPrefix+".", "HEALTHY", 1)
|
|
|
|
// Both should be possible.
|
|
v1Expect := fmt.Sprintf("%s::%s", cluster.Name, v1ID.String())
|
|
v2Expect := fmt.Sprintf("%s::%s", cluster.Name, v2ID.String())
|
|
|
|
switch dest.PortName {
|
|
case "tcp":
|
|
asserter.CheckBlankspaceNameTrafficSplitViaTCP(t, wrk, dest,
|
|
map[string]int{v1Expect: 10, v2Expect: 90})
|
|
case "grpc":
|
|
asserter.CheckBlankspaceNameTrafficSplitViaGRPC(t, wrk, dest,
|
|
map[string]int{v1Expect: 10, v2Expect: 90})
|
|
case "http":
|
|
asserter.CheckBlankspaceNameTrafficSplitViaHTTP(t, wrk, dest, false, "/",
|
|
map[string]int{v1Expect: 10, v2Expect: 90})
|
|
case "http2":
|
|
asserter.CheckBlankspaceNameTrafficSplitViaHTTP(t, wrk, dest, true, "/",
|
|
map[string]int{v1Expect: 10, v2Expect: 90})
|
|
default:
|
|
t.Fatalf("unexpected port name: %s", dest.PortName)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type testSplitterFeaturesL7ExplicitDestinationsCreator struct {
|
|
tenancies []*pbresource.Tenancy
|
|
}
|
|
|
|
func (c testSplitterFeaturesL7ExplicitDestinationsCreator) NewConfig(t *testing.T) *topology.Config {
|
|
const clusterName = "dc1"
|
|
|
|
servers := topoutil.NewTopologyServerSet(clusterName+"-server", 3, []string{clusterName, "wan"}, nil)
|
|
|
|
cluster := &topology.Cluster{
|
|
Enterprise: utils.IsEnterprise(),
|
|
Name: clusterName,
|
|
Nodes: servers,
|
|
Services: make(map[topology.ID]*pbcatalog.Service),
|
|
}
|
|
|
|
lastNode := 0
|
|
nodeName := func() string {
|
|
lastNode++
|
|
return fmt.Sprintf("%s-box%d", clusterName, lastNode)
|
|
}
|
|
|
|
for _, ten := range c.tenancies {
|
|
c.topologyConfigAddNodes(t, cluster, nodeName, ten)
|
|
}
|
|
|
|
return &topology.Config{
|
|
Images: utils.TargetImages(),
|
|
Networks: []*topology.Network{
|
|
{Name: clusterName},
|
|
{Name: "wan", Type: "wan"},
|
|
},
|
|
Clusters: []*topology.Cluster{
|
|
cluster,
|
|
},
|
|
}
|
|
}
|
|
|
|
func (c testSplitterFeaturesL7ExplicitDestinationsCreator) topologyConfigAddNodes(
|
|
t *testing.T,
|
|
cluster *topology.Cluster,
|
|
nodeName func() string,
|
|
currentTenancy *pbresource.Tenancy,
|
|
) {
|
|
clusterName := cluster.Name
|
|
|
|
newID := func(name string, tenancy *pbresource.Tenancy) topology.ID {
|
|
return topology.ID{
|
|
Partition: tenancy.Partition,
|
|
Namespace: tenancy.Namespace,
|
|
Name: name,
|
|
}
|
|
}
|
|
|
|
tenancy := &pbresource.Tenancy{
|
|
Partition: currentTenancy.Partition,
|
|
Namespace: currentTenancy.Namespace,
|
|
}
|
|
|
|
v1ServerNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: currentTenancy.Partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewBlankspaceWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("static-server-v1", tenancy),
|
|
topology.NodeVersionV2,
|
|
func(wrk *topology.Workload) {
|
|
wrk.V2Services = []string{"static-server-v1", "static-server"}
|
|
wrk.Meta = map[string]string{
|
|
"version": "v1",
|
|
}
|
|
wrk.WorkloadIdentity = "static-server-v1"
|
|
},
|
|
),
|
|
},
|
|
}
|
|
v2ServerNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: currentTenancy.Partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewBlankspaceWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("static-server-v2", tenancy),
|
|
topology.NodeVersionV2,
|
|
func(wrk *topology.Workload) {
|
|
wrk.V2Services = []string{"static-server-v2", "static-server"}
|
|
wrk.Meta = map[string]string{
|
|
"version": "v2",
|
|
}
|
|
wrk.WorkloadIdentity = "static-server-v2"
|
|
},
|
|
),
|
|
},
|
|
}
|
|
clientNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: currentTenancy.Partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewBlankspaceWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("static-client", tenancy),
|
|
topology.NodeVersionV2,
|
|
func(wrk *topology.Workload) {
|
|
wrk.V2Services = []string{"static-client"}
|
|
for i, tenancy := range c.tenancies {
|
|
wrk.Destinations = append(wrk.Destinations, &topology.Destination{
|
|
|
|
ID: newID("static-server", tenancy),
|
|
PortName: "http",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5000 + (i * 4),
|
|
},
|
|
&topology.Destination{
|
|
|
|
ID: newID("static-server", tenancy),
|
|
PortName: "http2",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5001 + (i * 4),
|
|
},
|
|
&topology.Destination{
|
|
|
|
ID: newID("static-server", tenancy),
|
|
PortName: "grpc",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5002 + (i * 4),
|
|
},
|
|
&topology.Destination{
|
|
|
|
ID: newID("static-server", tenancy),
|
|
PortName: "tcp",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5003 + (i * 4),
|
|
},
|
|
)
|
|
}
|
|
},
|
|
),
|
|
},
|
|
}
|
|
|
|
var sources []*pbauth.Source
|
|
for _, ten := range c.tenancies {
|
|
sources = append(sources, &pbauth.Source{
|
|
IdentityName: "static-client",
|
|
Namespace: ten.Namespace,
|
|
Partition: ten.Partition,
|
|
})
|
|
}
|
|
|
|
v1TrafficPerms := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbauth.TrafficPermissionsType,
|
|
Name: "static-server-v1-perms",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbauth.TrafficPermissions{
|
|
Destination: &pbauth.Destination{
|
|
IdentityName: "static-server-v1",
|
|
},
|
|
Action: pbauth.Action_ACTION_ALLOW,
|
|
Permissions: []*pbauth.Permission{{
|
|
Sources: sources,
|
|
}},
|
|
})
|
|
|
|
v2TrafficPerms := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbauth.TrafficPermissionsType,
|
|
Name: "static-server-v2-perms",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbauth.TrafficPermissions{
|
|
Destination: &pbauth.Destination{
|
|
IdentityName: "static-server-v2",
|
|
},
|
|
Action: pbauth.Action_ACTION_ALLOW,
|
|
Permissions: []*pbauth.Permission{{
|
|
Sources: sources,
|
|
}},
|
|
})
|
|
|
|
portsFunc := func(offset uint32) []*pbcatalog.ServicePort {
|
|
return []*pbcatalog.ServicePort{
|
|
{
|
|
TargetPort: "http",
|
|
VirtualPort: 8005 + offset,
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_HTTP,
|
|
},
|
|
{
|
|
TargetPort: "http2",
|
|
VirtualPort: 8006 + offset,
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_HTTP2,
|
|
},
|
|
{
|
|
TargetPort: "grpc",
|
|
VirtualPort: 9005 + offset,
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_GRPC,
|
|
},
|
|
{
|
|
TargetPort: "tcp",
|
|
VirtualPort: 10005 + offset,
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_TCP,
|
|
},
|
|
{
|
|
TargetPort: "mesh",
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_MESH,
|
|
},
|
|
}
|
|
}
|
|
|
|
// Differ parent and backend virtual ports to verify we route to each correctly.
|
|
parentServicePorts := portsFunc(0)
|
|
backendServicePorts := portsFunc(100)
|
|
|
|
// Explicitly define backend services s.t. they are not inferred from workload,
|
|
// which would assign random virtual ports.
|
|
cluster.Services[newID("static-client", tenancy)] = &pbcatalog.Service{
|
|
Ports: []*pbcatalog.ServicePort{
|
|
{
|
|
TargetPort: "mesh",
|
|
Protocol: pbcatalog.Protocol_PROTOCOL_MESH,
|
|
},
|
|
},
|
|
}
|
|
cluster.Services[newID("static-server", tenancy)] = &pbcatalog.Service{
|
|
Ports: parentServicePorts,
|
|
}
|
|
cluster.Services[newID("static-server-v1", tenancy)] = &pbcatalog.Service{
|
|
Ports: backendServicePorts,
|
|
}
|
|
cluster.Services[newID("static-server-v2", tenancy)] = &pbcatalog.Service{
|
|
Ports: backendServicePorts,
|
|
}
|
|
|
|
httpServerRoute := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbmesh.HTTPRouteType,
|
|
Name: "static-server-http-route",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbmesh.HTTPRoute{
|
|
ParentRefs: []*pbmesh.ParentReference{
|
|
{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "8005", // use mix of target and virtual parent ports
|
|
},
|
|
{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "http2",
|
|
},
|
|
},
|
|
Rules: []*pbmesh.HTTPRouteRule{{
|
|
BackendRefs: []*pbmesh.HTTPBackendRef{
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v1",
|
|
Tenancy: tenancy,
|
|
},
|
|
},
|
|
Weight: 10,
|
|
},
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v2",
|
|
Tenancy: tenancy,
|
|
},
|
|
},
|
|
Weight: 90,
|
|
},
|
|
},
|
|
}},
|
|
})
|
|
|
|
grpcServerRoute := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbmesh.GRPCRouteType,
|
|
Name: "static-server-grpc-route",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbmesh.GRPCRoute{
|
|
ParentRefs: []*pbmesh.ParentReference{{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "grpc",
|
|
}},
|
|
Rules: []*pbmesh.GRPCRouteRule{{
|
|
BackendRefs: []*pbmesh.GRPCBackendRef{
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v1",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "9105", // use mix of virtual and target (inferred from parent) ports
|
|
},
|
|
Weight: 10,
|
|
},
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v2",
|
|
Tenancy: tenancy,
|
|
},
|
|
},
|
|
Weight: 90,
|
|
},
|
|
},
|
|
}},
|
|
})
|
|
|
|
tcpServerRoute := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbmesh.TCPRouteType,
|
|
Name: "static-server-tcp-route",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbmesh.TCPRoute{
|
|
ParentRefs: []*pbmesh.ParentReference{{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "10005", // use virtual parent port
|
|
}},
|
|
Rules: []*pbmesh.TCPRouteRule{{
|
|
BackendRefs: []*pbmesh.TCPBackendRef{
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v1",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "10105", // use explicit virtual port
|
|
},
|
|
Weight: 10,
|
|
},
|
|
{
|
|
BackendRef: &pbmesh.BackendReference{
|
|
Ref: &pbresource.Reference{
|
|
Type: pbcatalog.ServiceType,
|
|
Name: "static-server-v2",
|
|
Tenancy: tenancy,
|
|
},
|
|
Port: "tcp", // use explicit target port
|
|
},
|
|
Weight: 90,
|
|
},
|
|
},
|
|
}},
|
|
})
|
|
|
|
cluster.Nodes = append(cluster.Nodes,
|
|
clientNode,
|
|
v1ServerNode,
|
|
v2ServerNode,
|
|
)
|
|
|
|
cluster.InitialResources = append(cluster.InitialResources,
|
|
v1TrafficPerms,
|
|
v2TrafficPerms,
|
|
httpServerRoute,
|
|
grpcServerRoute,
|
|
tcpServerRoute,
|
|
)
|
|
}
|