github.com/reds/docker@v1.11.2-rc1/pkg/discovery/kv/kv_test.go (about)

     1  package kv
     2  
     3  import (
     4  	"errors"
     5  	"io/ioutil"
     6  	"os"
     7  	"path"
     8  	"testing"
     9  	"time"
    10  
    11  	"github.com/docker/docker/pkg/discovery"
    12  	"github.com/docker/libkv"
    13  	"github.com/docker/libkv/store"
    14  
    15  	"github.com/go-check/check"
    16  )
    17  
    18  // Hook up gocheck into the "go test" runner.
    19  func Test(t *testing.T) { check.TestingT(t) }
    20  
    21  type DiscoverySuite struct{}
    22  
    23  var _ = check.Suite(&DiscoverySuite{})
    24  
    25  func (ds *DiscoverySuite) TestInitialize(c *check.C) {
    26  	storeMock := &FakeStore{
    27  		Endpoints: []string{"127.0.0.1"},
    28  	}
    29  	d := &Discovery{backend: store.CONSUL}
    30  	d.Initialize("127.0.0.1", 0, 0, nil)
    31  	d.store = storeMock
    32  
    33  	s := d.store.(*FakeStore)
    34  	c.Assert(s.Endpoints, check.HasLen, 1)
    35  	c.Assert(s.Endpoints[0], check.Equals, "127.0.0.1")
    36  	c.Assert(d.path, check.Equals, defaultDiscoveryPath)
    37  
    38  	storeMock = &FakeStore{
    39  		Endpoints: []string{"127.0.0.1:1234"},
    40  	}
    41  	d = &Discovery{backend: store.CONSUL}
    42  	d.Initialize("127.0.0.1:1234/path", 0, 0, nil)
    43  	d.store = storeMock
    44  
    45  	s = d.store.(*FakeStore)
    46  	c.Assert(s.Endpoints, check.HasLen, 1)
    47  	c.Assert(s.Endpoints[0], check.Equals, "127.0.0.1:1234")
    48  	c.Assert(d.path, check.Equals, "path/"+defaultDiscoveryPath)
    49  
    50  	storeMock = &FakeStore{
    51  		Endpoints: []string{"127.0.0.1:1234", "127.0.0.2:1234", "127.0.0.3:1234"},
    52  	}
    53  	d = &Discovery{backend: store.CONSUL}
    54  	d.Initialize("127.0.0.1:1234,127.0.0.2:1234,127.0.0.3:1234/path", 0, 0, nil)
    55  	d.store = storeMock
    56  
    57  	s = d.store.(*FakeStore)
    58  	c.Assert(s.Endpoints, check.HasLen, 3)
    59  	c.Assert(s.Endpoints[0], check.Equals, "127.0.0.1:1234")
    60  	c.Assert(s.Endpoints[1], check.Equals, "127.0.0.2:1234")
    61  	c.Assert(s.Endpoints[2], check.Equals, "127.0.0.3:1234")
    62  
    63  	c.Assert(d.path, check.Equals, "path/"+defaultDiscoveryPath)
    64  }
    65  
    66  // Extremely limited mock store so we can test initialization
    67  type Mock struct {
    68  	// Endpoints passed to InitializeMock
    69  	Endpoints []string
    70  
    71  	// Options passed to InitializeMock
    72  	Options *store.Config
    73  }
    74  
    75  func NewMock(endpoints []string, options *store.Config) (store.Store, error) {
    76  	s := &Mock{}
    77  	s.Endpoints = endpoints
    78  	s.Options = options
    79  	return s, nil
    80  }
    81  func (s *Mock) Put(key string, value []byte, opts *store.WriteOptions) error {
    82  	return errors.New("Put not supported")
    83  }
    84  func (s *Mock) Get(key string) (*store.KVPair, error) {
    85  	return nil, errors.New("Get not supported")
    86  }
    87  func (s *Mock) Delete(key string) error {
    88  	return errors.New("Delete not supported")
    89  }
    90  
    91  // Exists mock
    92  func (s *Mock) Exists(key string) (bool, error) {
    93  	return false, errors.New("Exists not supported")
    94  }
    95  
    96  // Watch mock
    97  func (s *Mock) Watch(key string, stopCh <-chan struct{}) (<-chan *store.KVPair, error) {
    98  	return nil, errors.New("Watch not supported")
    99  }
   100  
   101  // WatchTree mock
   102  func (s *Mock) WatchTree(prefix string, stopCh <-chan struct{}) (<-chan []*store.KVPair, error) {
   103  	return nil, errors.New("WatchTree not supported")
   104  }
   105  
   106  // NewLock mock
   107  func (s *Mock) NewLock(key string, options *store.LockOptions) (store.Locker, error) {
   108  	return nil, errors.New("NewLock not supported")
   109  }
   110  
   111  // List mock
   112  func (s *Mock) List(prefix string) ([]*store.KVPair, error) {
   113  	return nil, errors.New("List not supported")
   114  }
   115  
   116  // DeleteTree mock
   117  func (s *Mock) DeleteTree(prefix string) error {
   118  	return errors.New("DeleteTree not supported")
   119  }
   120  
   121  // AtomicPut mock
   122  func (s *Mock) AtomicPut(key string, value []byte, previous *store.KVPair, opts *store.WriteOptions) (bool, *store.KVPair, error) {
   123  	return false, nil, errors.New("AtomicPut not supported")
   124  }
   125  
   126  // AtomicDelete mock
   127  func (s *Mock) AtomicDelete(key string, previous *store.KVPair) (bool, error) {
   128  	return false, errors.New("AtomicDelete not supported")
   129  }
   130  
   131  // Close mock
   132  func (s *Mock) Close() {
   133  	return
   134  }
   135  
   136  func (ds *DiscoverySuite) TestInitializeWithCerts(c *check.C) {
   137  	cert := `-----BEGIN CERTIFICATE-----
   138  MIIDCDCCAfKgAwIBAgIICifG7YeiQOEwCwYJKoZIhvcNAQELMBIxEDAOBgNVBAMT
   139  B1Rlc3QgQ0EwHhcNMTUxMDAxMjMwMDAwWhcNMjAwOTI5MjMwMDAwWjASMRAwDgYD
   140  VQQDEwdUZXN0IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1wRC
   141  O+flnLTK5ImjTurNRHwSejuqGbc4CAvpB0hS+z0QlSs4+zE9h80aC4hz+6caRpds
   142  +J908Q+RvAittMHbpc7VjbZP72G6fiXk7yPPl6C10HhRSoSi3nY+B7F2E8cuz14q
   143  V2e+ejhWhSrBb/keyXpcyjoW1BOAAJ2TIclRRkICSCZrpXUyXxAvzXfpFXo1RhSb
   144  UywN11pfiCQzDUN7sPww9UzFHuAHZHoyfTr27XnJYVUerVYrCPq8vqfn//01qz55
   145  Xs0hvzGdlTFXhuabFtQnKFH5SNwo/fcznhB7rePOwHojxOpXTBepUCIJLbtNnWFT
   146  V44t9gh5IqIWtoBReQIDAQABo2YwZDAOBgNVHQ8BAf8EBAMCAAYwEgYDVR0TAQH/
   147  BAgwBgEB/wIBAjAdBgNVHQ4EFgQUZKUI8IIjIww7X/6hvwggQK4bD24wHwYDVR0j
   148  BBgwFoAUZKUI8IIjIww7X/6hvwggQK4bD24wCwYJKoZIhvcNAQELA4IBAQDES2cz
   149  7sCQfDCxCIWH7X8kpi/JWExzUyQEJ0rBzN1m3/x8ySRxtXyGekimBqQwQdFqlwMI
   150  xzAQKkh3ue8tNSzRbwqMSyH14N1KrSxYS9e9szJHfUasoTpQGPmDmGIoRJuq1h6M
   151  ej5x1SCJ7GWCR6xEXKUIE9OftXm9TdFzWa7Ja3OHz/mXteii8VXDuZ5ACq6EE5bY
   152  8sP4gcICfJ5fTrpTlk9FIqEWWQrCGa5wk95PGEj+GJpNogjXQ97wVoo/Y3p1brEn
   153  t5zjN9PAq4H1fuCMdNNA+p1DHNwd+ELTxcMAnb2ajwHvV6lKPXutrTFc4umJToBX
   154  FpTxDmJHEV4bzUzh
   155  -----END CERTIFICATE-----
   156  `
   157  	key := `-----BEGIN RSA PRIVATE KEY-----
   158  MIIEpQIBAAKCAQEA1wRCO+flnLTK5ImjTurNRHwSejuqGbc4CAvpB0hS+z0QlSs4
   159  +zE9h80aC4hz+6caRpds+J908Q+RvAittMHbpc7VjbZP72G6fiXk7yPPl6C10HhR
   160  SoSi3nY+B7F2E8cuz14qV2e+ejhWhSrBb/keyXpcyjoW1BOAAJ2TIclRRkICSCZr
   161  pXUyXxAvzXfpFXo1RhSbUywN11pfiCQzDUN7sPww9UzFHuAHZHoyfTr27XnJYVUe
   162  rVYrCPq8vqfn//01qz55Xs0hvzGdlTFXhuabFtQnKFH5SNwo/fcznhB7rePOwHoj
   163  xOpXTBepUCIJLbtNnWFTV44t9gh5IqIWtoBReQIDAQABAoIBAHSWipORGp/uKFXj
   164  i/mut776x8ofsAxhnLBARQr93ID+i49W8H7EJGkOfaDjTICYC1dbpGrri61qk8sx
   165  qX7p3v/5NzKwOIfEpirgwVIqSNYe/ncbxnhxkx6tXtUtFKmEx40JskvSpSYAhmmO
   166  1XSx0E/PWaEN/nLgX/f1eWJIlxlQkk3QeqL+FGbCXI48DEtlJ9+MzMu4pAwZTpj5
   167  5qtXo5JJ0jRGfJVPAOznRsYqv864AhMdMIWguzk6EGnbaCWwPcfcn+h9a5LMdony
   168  MDHfBS7bb5tkF3+AfnVY3IBMVx7YlsD9eAyajlgiKu4zLbwTRHjXgShy+4Oussz0
   169  ugNGnkECgYEA/hi+McrZC8C4gg6XqK8+9joD8tnyDZDz88BQB7CZqABUSwvjDqlP
   170  L8hcwo/lzvjBNYGkqaFPUICGWKjeCtd8pPS2DCVXxDQX4aHF1vUur0uYNncJiV3N
   171  XQz4Iemsa6wnKf6M67b5vMXICw7dw0HZCdIHD1hnhdtDz0uVpeevLZ8CgYEA2KCT
   172  Y43lorjrbCgMqtlefkr3GJA9dey+hTzCiWEOOqn9RqGoEGUday0sKhiLofOgmN2B
   173  LEukpKIey8s+Q/cb6lReajDVPDsMweX8i7hz3Wa4Ugp4Xa5BpHqu8qIAE2JUZ7bU
   174  t88aQAYE58pUF+/Lq1QzAQdrjjzQBx6SrBxieecCgYEAvukoPZEC8mmiN1VvbTX+
   175  QFHmlZha3QaDxChB+QUe7bMRojEUL/fVnzkTOLuVFqSfxevaI/km9n0ac5KtAchV
   176  xjp2bTnBb5EUQFqjopYktWA+xO07JRJtMfSEmjZPbbay1kKC7rdTfBm961EIHaRj
   177  xZUf6M+rOE8964oGrdgdLlECgYEA046GQmx6fh7/82FtdZDRQp9tj3SWQUtSiQZc
   178  qhO59Lq8mjUXz+MgBuJXxkiwXRpzlbaFB0Bca1fUoYw8o915SrDYf/Zu2OKGQ/qa
   179  V81sgiVmDuEgycR7YOlbX6OsVUHrUlpwhY3hgfMe6UtkMvhBvHF/WhroBEIJm1pV
   180  PXZ/CbMCgYEApNWVktFBjOaYfY6SNn4iSts1jgsQbbpglg3kT7PLKjCAhI6lNsbk
   181  dyT7ut01PL6RaW4SeQWtrJIVQaM6vF3pprMKqlc5XihOGAmVqH7rQx9rtQB5TicL
   182  BFrwkQE4HQtQBV60hYQUzzlSk44VFDz+jxIEtacRHaomDRh2FtOTz+I=
   183  -----END RSA PRIVATE KEY-----
   184  `
   185  	certFile, err := ioutil.TempFile("", "cert")
   186  	c.Assert(err, check.IsNil)
   187  	defer os.Remove(certFile.Name())
   188  	certFile.Write([]byte(cert))
   189  	certFile.Close()
   190  	keyFile, err := ioutil.TempFile("", "key")
   191  	c.Assert(err, check.IsNil)
   192  	defer os.Remove(keyFile.Name())
   193  	keyFile.Write([]byte(key))
   194  	keyFile.Close()
   195  
   196  	libkv.AddStore("mock", NewMock)
   197  	d := &Discovery{backend: "mock"}
   198  	err = d.Initialize("127.0.0.3:1234", 0, 0, map[string]string{
   199  		"kv.cacertfile": certFile.Name(),
   200  		"kv.certfile":   certFile.Name(),
   201  		"kv.keyfile":    keyFile.Name(),
   202  	})
   203  	c.Assert(err, check.IsNil)
   204  	s := d.store.(*Mock)
   205  	c.Assert(s.Options.TLS, check.NotNil)
   206  	c.Assert(s.Options.TLS.RootCAs, check.NotNil)
   207  	c.Assert(s.Options.TLS.Certificates, check.HasLen, 1)
   208  }
   209  
   210  func (ds *DiscoverySuite) TestWatch(c *check.C) {
   211  	mockCh := make(chan []*store.KVPair)
   212  
   213  	storeMock := &FakeStore{
   214  		Endpoints:  []string{"127.0.0.1:1234"},
   215  		mockKVChan: mockCh,
   216  	}
   217  
   218  	d := &Discovery{backend: store.CONSUL}
   219  	d.Initialize("127.0.0.1:1234/path", 0, 0, nil)
   220  	d.store = storeMock
   221  
   222  	expected := discovery.Entries{
   223  		&discovery.Entry{Host: "1.1.1.1", Port: "1111"},
   224  		&discovery.Entry{Host: "2.2.2.2", Port: "2222"},
   225  	}
   226  	kvs := []*store.KVPair{
   227  		{Key: path.Join("path", defaultDiscoveryPath, "1.1.1.1"), Value: []byte("1.1.1.1:1111")},
   228  		{Key: path.Join("path", defaultDiscoveryPath, "2.2.2.2"), Value: []byte("2.2.2.2:2222")},
   229  	}
   230  
   231  	stopCh := make(chan struct{})
   232  	ch, errCh := d.Watch(stopCh)
   233  
   234  	// It should fire an error since the first WatchTree call failed.
   235  	c.Assert(<-errCh, check.ErrorMatches, "test error")
   236  	// We have to drain the error channel otherwise Watch will get stuck.
   237  	go func() {
   238  		for range errCh {
   239  		}
   240  	}()
   241  
   242  	// Push the entries into the store channel and make sure discovery emits.
   243  	mockCh <- kvs
   244  	c.Assert(<-ch, check.DeepEquals, expected)
   245  
   246  	// Add a new entry.
   247  	expected = append(expected, &discovery.Entry{Host: "3.3.3.3", Port: "3333"})
   248  	kvs = append(kvs, &store.KVPair{Key: path.Join("path", defaultDiscoveryPath, "3.3.3.3"), Value: []byte("3.3.3.3:3333")})
   249  	mockCh <- kvs
   250  	c.Assert(<-ch, check.DeepEquals, expected)
   251  
   252  	close(mockCh)
   253  	// Give it enough time to call WatchTree.
   254  	time.Sleep(3)
   255  
   256  	// Stop and make sure it closes all channels.
   257  	close(stopCh)
   258  	c.Assert(<-ch, check.IsNil)
   259  	c.Assert(<-errCh, check.IsNil)
   260  }
   261  
   262  // FakeStore implements store.Store methods. It mocks all store
   263  // function in a simple, naive way.
   264  type FakeStore struct {
   265  	Endpoints  []string
   266  	Options    *store.Config
   267  	mockKVChan <-chan []*store.KVPair
   268  
   269  	watchTreeCallCount int
   270  }
   271  
   272  func (s *FakeStore) Put(key string, value []byte, options *store.WriteOptions) error {
   273  	return nil
   274  }
   275  
   276  func (s *FakeStore) Get(key string) (*store.KVPair, error) {
   277  	return nil, nil
   278  }
   279  
   280  func (s *FakeStore) Delete(key string) error {
   281  	return nil
   282  }
   283  
   284  func (s *FakeStore) Exists(key string) (bool, error) {
   285  	return true, nil
   286  }
   287  
   288  func (s *FakeStore) Watch(key string, stopCh <-chan struct{}) (<-chan *store.KVPair, error) {
   289  	return nil, nil
   290  }
   291  
   292  // WatchTree will fail the first time, and return the mockKVchan afterwards.
   293  // This is the behavior we need for testing.. If we need 'moar', should update this.
   294  func (s *FakeStore) WatchTree(directory string, stopCh <-chan struct{}) (<-chan []*store.KVPair, error) {
   295  	if s.watchTreeCallCount == 0 {
   296  		s.watchTreeCallCount = 1
   297  		return nil, errors.New("test error")
   298  	}
   299  	// First calls error
   300  	return s.mockKVChan, nil
   301  }
   302  
   303  func (s *FakeStore) NewLock(key string, options *store.LockOptions) (store.Locker, error) {
   304  	return nil, nil
   305  }
   306  
   307  func (s *FakeStore) List(directory string) ([]*store.KVPair, error) {
   308  	return []*store.KVPair{}, nil
   309  }
   310  
   311  func (s *FakeStore) DeleteTree(directory string) error {
   312  	return nil
   313  }
   314  
   315  func (s *FakeStore) AtomicPut(key string, value []byte, previous *store.KVPair, options *store.WriteOptions) (bool, *store.KVPair, error) {
   316  	return true, nil, nil
   317  }
   318  
   319  func (s *FakeStore) AtomicDelete(key string, previous *store.KVPair) (bool, error) {
   320  	return true, nil
   321  }
   322  
   323  func (s *FakeStore) Close() {
   324  }