-
Notifications
You must be signed in to change notification settings - Fork 4.2k
/
consulhelper.go
105 lines (93 loc) · 2.56 KB
/
consulhelper.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
package consul
import (
"fmt"
"os"
"strings"
"testing"
consulapi "github.com/hashicorp/consul/api"
"github.com/hashicorp/vault/helper/testhelpers/docker"
"github.com/ory/dockertest"
)
func PrepareTestContainer(t *testing.T, version string) (cleanup func(), retAddress string, consulToken string) {
t.Logf("preparing test container")
consulToken = os.Getenv("CONSUL_HTTP_TOKEN")
retAddress = os.Getenv("CONSUL_HTTP_ADDR")
if retAddress != "" {
return func() {}, retAddress, consulToken
}
pool, err := dockertest.NewPool("")
if err != nil {
t.Fatalf("Failed to connect to docker: %s", err)
}
config := `acl { enabled = true default_policy = "deny" }`
if strings.HasPrefix(version, "1.3") {
config = `datacenter = "test" acl_default_policy = "deny" acl_datacenter = "test" acl_master_token = "test"`
}
dockerOptions := &dockertest.RunOptions{
Repository: "consul",
Tag: version,
Cmd: []string{"agent", "-dev", "-client", "0.0.0.0", "-hcl", config},
}
resource, err := pool.RunWithOptions(dockerOptions)
if err != nil {
t.Fatalf("Could not start local Consul %s docker container: %s", version, err)
}
cleanup = func() {
docker.CleanupResource(t, pool, resource)
}
retAddress = fmt.Sprintf("localhost:%s", resource.GetPort("8500/tcp"))
// exponential backoff-retry
if err = pool.Retry(func() error {
var err error
consulConfig := consulapi.DefaultNonPooledConfig()
consulConfig.Address = retAddress
consul, err := consulapi.NewClient(consulConfig)
if err != nil {
return err
}
// For version of Consul < 1.4
if strings.HasPrefix(version, "1.3") {
consulToken = "test"
_, err = consul.KV().Put(&consulapi.KVPair{
Key: "setuptest",
Value: []byte("setuptest"),
}, &consulapi.WriteOptions{
Token: consulToken,
})
if err != nil {
return err
}
return nil
}
// New default behavior
aclbootstrap, _, err := consul.ACL().Bootstrap()
if err != nil {
return err
}
consulToken = aclbootstrap.SecretID
t.Logf("Generated Master token: %s", consulToken)
policy := &consulapi.ACLPolicy{
Name: "test",
Description: "test",
Rules: `node_prefix "" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
`,
}
q := &consulapi.WriteOptions{
Token: consulToken,
}
_, _, err = consul.ACL().PolicyCreate(policy, q)
if err != nil {
return err
}
return nil
}); err != nil {
cleanup()
t.Fatalf("Could not connect to docker: %s", err)
}
return cleanup, retAddress, consulToken
}