|
@@ -1,7 +1,10 @@
|
|
|
package discov
|
|
|
|
|
|
import (
|
|
|
+ "context"
|
|
|
"errors"
|
|
|
+ "net"
|
|
|
+ "os"
|
|
|
"sync"
|
|
|
"testing"
|
|
|
"time"
|
|
@@ -13,6 +16,83 @@ import (
|
|
|
"github.com/zeromicro/go-zero/core/logx"
|
|
|
"github.com/zeromicro/go-zero/core/stringx"
|
|
|
clientv3 "go.etcd.io/etcd/client/v3"
|
|
|
+ "golang.org/x/net/http2"
|
|
|
+ "google.golang.org/grpc"
|
|
|
+ "google.golang.org/grpc/credentials/insecure"
|
|
|
+ "google.golang.org/grpc/resolver"
|
|
|
+ "google.golang.org/grpc/resolver/manual"
|
|
|
+)
|
|
|
+
|
|
|
+const (
|
|
|
+ certContent = `-----BEGIN CERTIFICATE-----
|
|
|
+MIIDazCCAlOgAwIBAgIUEg9GVO2oaPn+YSmiqmFIuAo10WIwDQYJKoZIhvcNAQEM
|
|
|
+BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
|
|
+GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAgFw0yMzAzMTExMzIxMjNaGA8yMTIz
|
|
|
+MDIxNTEzMjEyM1owRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
|
|
+ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDCCASIwDQYJKoZIhvcN
|
|
|
+AQEBBQADggEPADCCAQoCggEBALplXlWsIf0O/IgnIplmiZHKGnxyfyufyE2FBRNk
|
|
|
+OofRqbKuPH8GNqbkvZm7N29fwTDAQ+mViAggCkDht4hOzoWJMA7KYJt8JnTSWL48
|
|
|
+M1lcrpc9DL2gszC/JF/FGvyANbBtLklkZPFBGdHUX14pjrT937wqPtm+SqUHSvRT
|
|
|
+B7bmwmm2drRcmhpVm98LSlV7uQ2EgnJgsLjBPITKUejLmVLHfgX0RwQ2xIpX9pS4
|
|
|
+FCe1BTacwl2gGp7Mje7y4Mfv3o0ArJW6Tuwbjx59ZXwb1KIP71b7bT04AVS8ZeYO
|
|
|
+UMLKKuB5UR9x9Rn6cLXOTWBpcMVyzDgrAFLZjnE9LPUolZMCAwEAAaNRME8wHwYD
|
|
|
+VR0jBBgwFoAUeW8w8pmhncbRgTsl48k4/7wnfx8wCQYDVR0TBAIwADALBgNVHQ8E
|
|
|
+BAMCBPAwFAYDVR0RBA0wC4IJbG9jYWxob3N0MA0GCSqGSIb3DQEBDAUAA4IBAQAI
|
|
|
+y9xaoS88CLPBsX6mxfcTAFVfGNTRW9VN9Ng1cCnUR+YGoXGM/l+qP4f7p8ocdGwK
|
|
|
+iYZErVTzXYIn+D27//wpY3klJk3gAnEUBT3QRkStBw7XnpbeZ2oPBK+cmDnCnZPS
|
|
|
+BIF1wxPX7vIgaxs5Zsdqwk3qvZ4Djr2wP7LabNWTLSBKgQoUY45Liw6pffLwcGF9
|
|
|
+UKlu54bvGze2SufISCR3ib+I+FLvqpvJhXToZWYb/pfI/HccuCL1oot1x8vx6DQy
|
|
|
+U+TYxlZsKS5mdNxAX3dqEkEMsgEi+g/tzDPXJImfeCGGBhIOXLm8SRypiuGdEbc9
|
|
|
+xkWYxRPegajuEZGvCqVs
|
|
|
+-----END CERTIFICATE-----`
|
|
|
+ keyContent = `-----BEGIN RSA PRIVATE KEY-----
|
|
|
+MIIEowIBAAKCAQEAumVeVawh/Q78iCcimWaJkcoafHJ/K5/ITYUFE2Q6h9Gpsq48
|
|
|
+fwY2puS9mbs3b1/BMMBD6ZWICCAKQOG3iE7OhYkwDspgm3wmdNJYvjwzWVyulz0M
|
|
|
+vaCzML8kX8Ua/IA1sG0uSWRk8UEZ0dRfXimOtP3fvCo+2b5KpQdK9FMHtubCabZ2
|
|
|
+tFyaGlWb3wtKVXu5DYSCcmCwuME8hMpR6MuZUsd+BfRHBDbEilf2lLgUJ7UFNpzC
|
|
|
+XaAansyN7vLgx+/ejQCslbpO7BuPHn1lfBvUog/vVvttPTgBVLxl5g5Qwsoq4HlR
|
|
|
+H3H1Gfpwtc5NYGlwxXLMOCsAUtmOcT0s9SiVkwIDAQABAoIBAD5meTJNMgO55Kjg
|
|
|
+ESExxpRcCIno+tHr5+6rvYtEXqPheOIsmmwb9Gfi4+Z3WpOaht5/Pz0Ppj6yGzyl
|
|
|
+U//6AgGKb+BDuBvVcDpjwPnOxZIBCSHwejdxeQu0scSuA97MPS0XIAvJ5FEv7ijk
|
|
|
+5Bht6SyGYURpECltHygoTNuGgGqmO+McCJRLE9L09lTBI6UQ/JQwWJqSr7wx6iPU
|
|
|
+M1Ze/srIV+7cyEPu6i0DGjS1gSQKkX68Lqn1w6oE290O+OZvleO0gZ02fLDWCZke
|
|
|
+aeD9+EU/Pw+rqm3H6o0szOFIpzhRp41FUdW9sybB3Yp3u7c/574E+04Z/e30LMKs
|
|
|
+TCtE1QECgYEA3K7KIpw0NH2HXL5C3RHcLmr204xeBfS70riBQQuVUgYdmxak2ima
|
|
|
+80RInskY8hRhSGTg0l+VYIH8cmjcUyqMSOELS5XfRH99r4QPiK8AguXg80T4VumY
|
|
|
+W3Pf+zEC2ssgP/gYthV0g0Xj5m2QxktOF9tRw5nkg739ZR4dI9lm/iECgYEA2Dnf
|
|
|
+uwEDGqHiQRF6/fh5BG/nGVMvrefkqx6WvTJQ3k/M/9WhxB+lr/8yH46TuS8N2b29
|
|
|
+FoTf3Mr9T7pr/PWkOPzoY3P56nYbKU8xSwCim9xMzhBMzj8/N9ukJvXy27/VOz56
|
|
|
+eQaKqnvdXNGtPJrIMDGHps2KKWlKLyAlapzjVTMCgYAA/W++tACv85g13EykfT4F
|
|
|
+n0k4LbsGP9DP4zABQLIMyiY72eAncmRVjwrcW36XJ2xATOONTgx3gF3HjZzfaqNy
|
|
|
+eD/6uNNllUTVEryXGmHgNHPL45VRnn6memCY2eFvZdXhM5W4y2PYaunY0MkDercA
|
|
|
++GTngbs6tBF88KOk04bYwQKBgFl68cRgsdkmnwwQYNaTKfmVGYzYaQXNzkqmWPko
|
|
|
+xmCJo6tHzC7ubdG8iRCYHzfmahPuuj6EdGPZuSRyYFgJi5Ftz/nAN+84OxtIQ3zn
|
|
|
+YWOgskQgaLh9YfsKsQ7Sf1NDOsnOnD5TX7UXl07fEpLe9vNCvAFiU8e5Y9LGudU5
|
|
|
+4bYTAoGBAMdX3a3bXp4cZvXNBJ/QLVyxC6fP1Q4haCR1Od3m+T00Jth2IX2dk/fl
|
|
|
+p6xiJT1av5JtYabv1dFKaXOS5s1kLGGuCCSKpkvFZm826aQ2AFm0XGqEQDLeei5b
|
|
|
+A52Kpy/YJ+RkG4BTFtAooFq6DmA0cnoP6oPvG2h6XtDJwDTPInJb
|
|
|
+-----END RSA PRIVATE KEY-----`
|
|
|
+ caContent = `-----BEGIN CERTIFICATE-----
|
|
|
+MIIDbTCCAlWgAwIBAgIUBJvFoCowKich7MMfseJ+DYzzirowDQYJKoZIhvcNAQEM
|
|
|
+BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
|
|
+GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAgFw0yMzAzMTExMzIxMDNaGA8yMTIz
|
|
|
+MDIxNTEzMjEwM1owRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
|
|
+ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDCCASIwDQYJKoZIhvcN
|
|
|
+AQEBBQADggEPADCCAQoCggEBAO4to2YMYj0bxgr2FCiweSTSFuPx33zSw2x/s9Wf
|
|
|
+OR41bm2DFsyYT5f3sOIKlXZEdLmOKty2e3ho3yC0EyNpVHdykkkHT3aDI17quZax
|
|
|
+kYi/URqqtl1Z08A22txolc04hAZisg2BypGi3vql81UW1t3zyloGnJoIAeXR9uca
|
|
|
+ljP6Bk3bwsxoVBLi1JtHrO0hHLQaeHmKhAyrys06X0LRdn7Px48yRZlt6FaLSa8X
|
|
|
+YiRM0G44bVy/h6BkoQjMYGwVmCVk6zjJ9U7ZPFqdnDMNxAfR+hjDnYodqdLDMTTR
|
|
|
+1NPVrnEnNwFx0AMLvgt/ba/45vZCEAmSZnFXFAJJcM7ai9ECAwEAAaNTMFEwHQYD
|
|
|
+VR0OBBYEFHlvMPKZoZ3G0YE7JePJOP+8J38fMB8GA1UdIwQYMBaAFHlvMPKZoZ3G
|
|
|
+0YE7JePJOP+8J38fMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggEB
|
|
|
+AMX8dNulADOo9uQgBMyFb9TVra7iY0zZjzv4GY5XY7scd52n6CnfAPvYBBDnTr/O
|
|
|
+BgNp5jaujb4+9u/2qhV3f9n+/3WOb2CmPehBgVSzlXqHeQ9lshmgwZPeem2T+8Tm
|
|
|
+Nnc/xQnsUfCFszUDxpkr55+aLVM22j02RWqcZ4q7TAaVYL+kdFVMc8FoqG/0ro6A
|
|
|
+BjE/Qn0Nn7ciX1VUjDt8l+k7ummPJTmzdi6i6E4AwO9dzrGNgGJ4aWL8cC6xYcIX
|
|
|
+goVIRTFeONXSDno/oPjWHpIPt7L15heMpKBHNuzPkKx2YVqPHE5QZxWfS+Lzgx+Q
|
|
|
+E2oTTM0rYKOZ8p6000mhvKI=
|
|
|
+-----END CERTIFICATE-----`
|
|
|
)
|
|
|
|
|
|
func init() {
|
|
@@ -37,7 +117,7 @@ func TestPublisher_register(t *testing.T) {
|
|
|
assert.Nil(t, err)
|
|
|
}
|
|
|
|
|
|
-func TestPublisher_registerWithId(t *testing.T) {
|
|
|
+func TestPublisher_registerWithOptions(t *testing.T) {
|
|
|
ctrl := gomock.NewController(t)
|
|
|
defer ctrl.Finish()
|
|
|
const id = 2
|
|
@@ -49,7 +129,15 @@ func TestPublisher_registerWithId(t *testing.T) {
|
|
|
ID: 1,
|
|
|
}, nil)
|
|
|
cli.EXPECT().Put(gomock.Any(), makeEtcdKey("thekey", id), "thevalue", gomock.Any())
|
|
|
- pub := NewPublisher(nil, "thekey", "thevalue", WithId(id))
|
|
|
+
|
|
|
+ certFile := createTempFile(t, []byte(certContent))
|
|
|
+ defer os.Remove(certFile)
|
|
|
+ keyFile := createTempFile(t, []byte(keyContent))
|
|
|
+ defer os.Remove(keyFile)
|
|
|
+ caFile := createTempFile(t, []byte(caContent))
|
|
|
+ defer os.Remove(caFile)
|
|
|
+ pub := NewPublisher(nil, "thekey", "thevalue", WithId(id),
|
|
|
+ WithPubEtcdTLS(certFile, keyFile, caFile, true))
|
|
|
_, err := pub.register(cli)
|
|
|
assert.Nil(t, err)
|
|
|
}
|
|
@@ -169,3 +257,92 @@ func TestPublisher_Resume(t *testing.T) {
|
|
|
}()
|
|
|
<-publisher.resumeChan
|
|
|
}
|
|
|
+
|
|
|
+func TestPublisher_keepAliveAsync(t *testing.T) {
|
|
|
+ ctrl := gomock.NewController(t)
|
|
|
+ defer ctrl.Finish()
|
|
|
+ const id clientv3.LeaseID = 1
|
|
|
+ conn := createMockConn(t)
|
|
|
+ defer conn.Close()
|
|
|
+ cli := internal.NewMockEtcdClient(ctrl)
|
|
|
+ cli.EXPECT().ActiveConnection().Return(conn).AnyTimes()
|
|
|
+ cli.EXPECT().Close()
|
|
|
+ defer cli.Close()
|
|
|
+ cli.ActiveConnection()
|
|
|
+ restore := setMockClient(cli)
|
|
|
+ defer restore()
|
|
|
+ cli.EXPECT().Ctx().AnyTimes()
|
|
|
+ cli.EXPECT().KeepAlive(gomock.Any(), id)
|
|
|
+ cli.EXPECT().Grant(gomock.Any(), timeToLive).Return(&clientv3.LeaseGrantResponse{
|
|
|
+ ID: 1,
|
|
|
+ }, nil)
|
|
|
+ cli.EXPECT().Put(gomock.Any(), makeEtcdKey("thekey", int64(id)), "thevalue", gomock.Any())
|
|
|
+ var wg sync.WaitGroup
|
|
|
+ wg.Add(1)
|
|
|
+ cli.EXPECT().Revoke(gomock.Any(), id).Do(func(_, _ any) {
|
|
|
+ wg.Done()
|
|
|
+ })
|
|
|
+ pub := NewPublisher([]string{"the-endpoint"}, "thekey", "thevalue")
|
|
|
+ pub.lease = id
|
|
|
+ assert.Nil(t, pub.KeepAlive())
|
|
|
+ pub.Stop()
|
|
|
+ wg.Wait()
|
|
|
+}
|
|
|
+
|
|
|
+func createMockConn(t *testing.T) *grpc.ClientConn {
|
|
|
+ lis, err := net.Listen("tcp", "localhost:0")
|
|
|
+ if err != nil {
|
|
|
+ t.Fatalf("Error while listening. Err: %v", err)
|
|
|
+ }
|
|
|
+ defer lis.Close()
|
|
|
+ lisAddr := resolver.Address{Addr: lis.Addr().String()}
|
|
|
+ lisDone := make(chan struct{})
|
|
|
+ dialDone := make(chan struct{})
|
|
|
+ // 1st listener accepts the connection and then does nothing
|
|
|
+ go func() {
|
|
|
+ defer close(lisDone)
|
|
|
+ conn, err := lis.Accept()
|
|
|
+ if err != nil {
|
|
|
+ t.Errorf("Error while accepting. Err: %v", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ framer := http2.NewFramer(conn, conn)
|
|
|
+ if err := framer.WriteSettings(http2.Setting{}); err != nil {
|
|
|
+ t.Errorf("Error while writing settings. Err: %v", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ <-dialDone // Close conn only after dial returns.
|
|
|
+ }()
|
|
|
+
|
|
|
+ r := manual.NewBuilderWithScheme("whatever")
|
|
|
+ r.InitialState(resolver.State{Addresses: []resolver.Address{lisAddr}})
|
|
|
+ client, err := grpc.DialContext(context.Background(), r.Scheme()+":///test.server",
|
|
|
+ grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithResolvers(r))
|
|
|
+ close(dialDone)
|
|
|
+ if err != nil {
|
|
|
+ t.Fatalf("Dial failed. Err: %v", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ timeout := time.After(1 * time.Second)
|
|
|
+ select {
|
|
|
+ case <-timeout:
|
|
|
+ t.Fatal("timed out waiting for server to finish")
|
|
|
+ case <-lisDone:
|
|
|
+ }
|
|
|
+
|
|
|
+ return client
|
|
|
+}
|
|
|
+
|
|
|
+func createTempFile(t *testing.T, body []byte) string {
|
|
|
+ tmpFile, err := os.CreateTemp(os.TempDir(), "go-unit-*.tmp")
|
|
|
+ if err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+
|
|
|
+ tmpFile.Close()
|
|
|
+ if err = os.WriteFile(tmpFile.Name(), body, os.ModePerm); err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+
|
|
|
+ return tmpFile.Name()
|
|
|
+}
|