mirror of https://github.com/status-im/consul.git
132 lines
3.5 KiB
Go
132 lines
3.5 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package peering
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
"github.com/hashicorp/consul/sdk/testutil/retry"
|
|
libassert "github.com/hashicorp/consul/test/integration/consul-container/libs/assert"
|
|
"github.com/hashicorp/consul/testing/deployer/topology"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
type ac5_1NoSvcMeshSuite struct {
|
|
DC string
|
|
Peer string
|
|
|
|
serverSID topology.ID
|
|
clientSID topology.ID
|
|
}
|
|
|
|
var (
|
|
ac5_1NoSvcMeshSuites []sharedTopoSuite = []sharedTopoSuite{
|
|
&ac5_1NoSvcMeshSuite{DC: "dc1", Peer: "dc2"},
|
|
&ac5_1NoSvcMeshSuite{DC: "dc2", Peer: "dc1"},
|
|
}
|
|
)
|
|
|
|
func TestAC5ServiceMeshDisabledSuite(t *testing.T) {
|
|
runShareableSuites(t, ac5_1NoSvcMeshSuites)
|
|
}
|
|
|
|
func (s *ac5_1NoSvcMeshSuite) testName() string {
|
|
return fmt.Sprintf("ac5.1 no service mesh %s->%s", s.DC, s.Peer)
|
|
}
|
|
|
|
// creates clients in s.DC and servers in s.Peer
|
|
func (s *ac5_1NoSvcMeshSuite) setup(t *testing.T, ct *commonTopo) {
|
|
clu := ct.ClusterByDatacenter(t, s.DC)
|
|
peerClu := ct.ClusterByDatacenter(t, s.Peer)
|
|
|
|
// TODO: handle all partitions
|
|
partition := "default"
|
|
peer := LocalPeerName(peerClu, partition)
|
|
|
|
serverSID := topology.ID{
|
|
Name: "ac5-server-http",
|
|
Partition: partition,
|
|
}
|
|
|
|
// Make client which will dial server
|
|
clientSID := topology.ID{
|
|
Name: "ac5-http-client",
|
|
Partition: partition,
|
|
}
|
|
|
|
// disable service mesh for client in s.DC
|
|
client := serviceExt{
|
|
Workload: NewFortioServiceWithDefaults(
|
|
clu.Datacenter,
|
|
clientSID,
|
|
func(s *topology.Workload) {
|
|
s.EnvoyAdminPort = 0
|
|
s.DisableServiceMesh = true
|
|
},
|
|
),
|
|
Config: &api.ServiceConfigEntry{
|
|
Kind: api.ServiceDefaults,
|
|
Name: clientSID.Name,
|
|
Partition: ConfigEntryPartition(clientSID.Partition),
|
|
Protocol: "http",
|
|
},
|
|
Exports: []api.ServiceConsumer{{Peer: peer}},
|
|
}
|
|
ct.AddServiceNode(clu, client)
|
|
|
|
server := serviceExt{
|
|
Workload: NewFortioServiceWithDefaults(
|
|
clu.Datacenter,
|
|
serverSID,
|
|
nil,
|
|
),
|
|
Exports: []api.ServiceConsumer{{Peer: peer}},
|
|
}
|
|
|
|
ct.AddServiceNode(clu, server)
|
|
|
|
s.clientSID = clientSID
|
|
s.serverSID = serverSID
|
|
}
|
|
|
|
func (s *ac5_1NoSvcMeshSuite) test(t *testing.T, ct *commonTopo) {
|
|
dc := ct.Sprawl.Topology().Clusters[s.DC]
|
|
peer := ct.Sprawl.Topology().Clusters[s.Peer]
|
|
cl := ct.APIClientForCluster(t, dc)
|
|
peerName := LocalPeerName(peer, "default")
|
|
|
|
s.testServiceHealthInCatalog(t, ct, cl, peerName)
|
|
s.testProxyDisabledInDC2(t, cl, peerName)
|
|
}
|
|
|
|
func (s *ac5_1NoSvcMeshSuite) testServiceHealthInCatalog(t *testing.T, _ *commonTopo, cl *api.Client, peer string) {
|
|
t.Run("validate service health in catalog", func(t *testing.T) {
|
|
libassert.CatalogServiceExists(t, cl, s.clientSID.Name, &api.QueryOptions{
|
|
Peer: peer,
|
|
})
|
|
require.NotEqual(t, s.serverSID.Name, s.Peer)
|
|
assertServiceHealth(t, cl, s.serverSID.Name, 1)
|
|
})
|
|
}
|
|
|
|
func (s *ac5_1NoSvcMeshSuite) testProxyDisabledInDC2(t *testing.T, cl *api.Client, peer string) {
|
|
t.Run("service mesh is disabled", func(t *testing.T) {
|
|
var (
|
|
services map[string][]string
|
|
err error
|
|
expected = fmt.Sprintf("%s-sidecar-proxy", s.clientSID.Name)
|
|
)
|
|
retry.Run(t, func(r *retry.R) {
|
|
services, _, err = cl.Catalog().Services(&api.QueryOptions{
|
|
Peer: peer,
|
|
})
|
|
require.NoError(r, err, "error reading service data")
|
|
require.Greater(r, len(services), 0, "did not find service(s) in catalog")
|
|
})
|
|
require.NotContains(t, services, expected, fmt.Sprintf("error: should not create proxy for service: %s", services))
|
|
})
|
|
}
|