Merge pull request #25842 from remilapeyre/consul-path-slash

Sanitize lock path for the Consul backend when it ends with a /
This commit is contained in:
Alisdair McDiarmid 2020-09-11 11:14:49 -04:00 committed by GitHub
commit 92abaadc02
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 97 additions and 60 deletions

View File

@ -1,6 +1,7 @@
package consul package consul
import ( import (
"flag"
"fmt" "fmt"
"io/ioutil" "io/ioutil"
"os" "os"
@ -39,6 +40,10 @@ func newConsulTestServer() (*testutil.TestServer, error) {
srv, err := testutil.NewTestServerConfig(func(c *testutil.TestServerConfig) { srv, err := testutil.NewTestServerConfig(func(c *testutil.TestServerConfig) {
c.LogLevel = "warn" c.LogLevel = "warn"
if !flag.Parsed() {
flag.Parse()
}
if !testing.Verbose() { if !testing.Verbose() {
c.Stdout = ioutil.Discard c.Stdout = ioutil.Discard
c.Stderr = ioutil.Discard c.Stderr = ioutil.Discard

View File

@ -9,6 +9,7 @@ import (
"errors" "errors"
"fmt" "fmt"
"log" "log"
"strings"
"sync" "sync"
"time" "time"
@ -161,13 +162,19 @@ func (c *RemoteClient) Delete() error {
return err return err
} }
func (c *RemoteClient) lockPath() string {
// we sanitize the path for the lock as Consul does not like having
// two consecutive slashes for the lock path
return strings.TrimRight(c.Path, "/")
}
func (c *RemoteClient) putLockInfo(info *statemgr.LockInfo) error { func (c *RemoteClient) putLockInfo(info *statemgr.LockInfo) error {
info.Path = c.Path info.Path = c.Path
info.Created = time.Now().UTC() info.Created = time.Now().UTC()
kv := c.Client.KV() kv := c.Client.KV()
_, err := kv.Put(&consulapi.KVPair{ _, err := kv.Put(&consulapi.KVPair{
Key: c.Path + lockInfoSuffix, Key: c.lockPath() + lockInfoSuffix,
Value: info.Marshal(), Value: info.Marshal(),
}, nil) }, nil)
@ -175,7 +182,7 @@ func (c *RemoteClient) putLockInfo(info *statemgr.LockInfo) error {
} }
func (c *RemoteClient) getLockInfo() (*statemgr.LockInfo, error) { func (c *RemoteClient) getLockInfo() (*statemgr.LockInfo, error) {
path := c.Path + lockInfoSuffix path := c.lockPath() + lockInfoSuffix
pair, _, err := c.Client.KV().Get(path, nil) pair, _, err := c.Client.KV().Get(path, nil)
if err != nil { if err != nil {
return nil, err return nil, err
@ -234,7 +241,7 @@ func (c *RemoteClient) lock() (string, error) {
c.info.Info = "consul session: " + lockSession c.info.Info = "consul session: " + lockSession
opts := &consulapi.LockOptions{ opts := &consulapi.LockOptions{
Key: c.Path + lockSuffix, Key: c.lockPath() + lockSuffix,
Session: lockSession, Session: lockSession,
// only wait briefly, so terraform has the choice to fail fast or // only wait briefly, so terraform has the choice to fail fast or
@ -419,7 +426,7 @@ func (c *RemoteClient) unlock(id string) error {
var errs error var errs error
if _, err := kv.Delete(c.Path+lockInfoSuffix, nil); err != nil { if _, err := kv.Delete(c.lockPath()+lockInfoSuffix, nil); err != nil {
errs = multierror.Append(errs, err) errs = multierror.Append(errs, err)
} }

View File

@ -19,20 +19,29 @@ func TestRemoteClient_impl(t *testing.T) {
} }
func TestRemoteClient(t *testing.T) { func TestRemoteClient(t *testing.T) {
// Get the backend testCases := []string{
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{ fmt.Sprintf("tf-unit/%s", time.Now().String()),
"address": srv.HTTPAddr, fmt.Sprintf("tf-unit/%s/", time.Now().String()),
"path": fmt.Sprintf("tf-unit/%s", time.Now().String()),
}))
// Grab the client
state, err := b.StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatalf("err: %s", err)
} }
// Test for _, path := range testCases {
remote.TestClient(t, state.(*remote.State).Client) t.Run(path, func(*testing.T) {
// Get the backend
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
"address": srv.HTTPAddr,
"path": path,
}))
// Grab the client
state, err := b.StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatalf("err: %s", err)
}
// Test
remote.TestClient(t, state.(*remote.State).Client)
})
}
} }
// test the gzip functionality of the client // test the gzip functionality of the client
@ -72,62 +81,78 @@ func TestRemoteClient_gzipUpgrade(t *testing.T) {
} }
func TestConsul_stateLock(t *testing.T) { func TestConsul_stateLock(t *testing.T) {
path := fmt.Sprintf("tf-unit/%s", time.Now().String()) testCases := []string{
fmt.Sprintf("tf-unit/%s", time.Now().String()),
// create 2 instances to get 2 remote.Clients fmt.Sprintf("tf-unit/%s/", time.Now().String()),
sA, err := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
"address": srv.HTTPAddr,
"path": path,
})).StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatal(err)
} }
sB, err := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{ for _, path := range testCases {
"address": srv.HTTPAddr, t.Run(path, func(*testing.T) {
"path": path, // create 2 instances to get 2 remote.Clients
})).StateMgr(backend.DefaultStateName) sA, err := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
if err != nil { "address": srv.HTTPAddr,
t.Fatal(err) "path": path,
} })).StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatal(err)
}
remote.TestRemoteLocks(t, sA.(*remote.State).Client, sB.(*remote.State).Client) sB, err := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
"address": srv.HTTPAddr,
"path": path,
})).StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatal(err)
}
remote.TestRemoteLocks(t, sA.(*remote.State).Client, sB.(*remote.State).Client)
})
}
} }
func TestConsul_destroyLock(t *testing.T) { func TestConsul_destroyLock(t *testing.T) {
// Get the backend testCases := []string{
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{ fmt.Sprintf("tf-unit/%s", time.Now().String()),
"address": srv.HTTPAddr, fmt.Sprintf("tf-unit/%s/", time.Now().String()),
"path": fmt.Sprintf("tf-unit/%s", time.Now().String()),
}))
// Grab the client
s, err := b.StateMgr(backend.DefaultStateName)
if err != nil {
t.Fatalf("err: %s", err)
} }
c := s.(*remote.State).Client.(*RemoteClient) for _, path := range testCases {
t.Run(path, func(*testing.T) {
// Get the backend
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
"address": srv.HTTPAddr,
"path": path,
}))
info := statemgr.NewLockInfo() // Grab the client
id, err := c.Lock(info) s, err := b.StateMgr(backend.DefaultStateName)
if err != nil { if err != nil {
t.Fatal(err) t.Fatalf("err: %s", err)
} }
lockPath := c.Path + lockSuffix c := s.(*remote.State).Client.(*RemoteClient)
if err := c.Unlock(id); err != nil { info := statemgr.NewLockInfo()
t.Fatal(err) id, err := c.Lock(info)
} if err != nil {
t.Fatal(err)
}
// get the lock val lockPath := c.Path + lockSuffix
pair, _, err := c.Client.KV().Get(lockPath, nil)
if err != nil { if err := c.Unlock(id); err != nil {
t.Fatal(err) t.Fatal(err)
} }
if pair != nil {
t.Fatalf("lock key not cleaned up at: %s", pair.Key) // get the lock val
pair, _, err := c.Client.KV().Get(lockPath, nil)
if err != nil {
t.Fatal(err)
}
if pair != nil {
t.Fatalf("lock key not cleaned up at: %s", pair.Key)
}
})
} }
} }