Merge pull request #25842 from remilapeyre/consul-path-slash
Sanitize lock path for the Consul backend when it ends with a /
This commit is contained in:
commit
92abaadc02
|
@ -1,6 +1,7 @@
|
|||
package consul
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
|
@ -39,6 +40,10 @@ func newConsulTestServer() (*testutil.TestServer, error) {
|
|||
srv, err := testutil.NewTestServerConfig(func(c *testutil.TestServerConfig) {
|
||||
c.LogLevel = "warn"
|
||||
|
||||
if !flag.Parsed() {
|
||||
flag.Parse()
|
||||
}
|
||||
|
||||
if !testing.Verbose() {
|
||||
c.Stdout = ioutil.Discard
|
||||
c.Stderr = ioutil.Discard
|
||||
|
|
|
@ -9,6 +9,7 @@ import (
|
|||
"errors"
|
||||
"fmt"
|
||||
"log"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
|
@ -161,13 +162,19 @@ func (c *RemoteClient) Delete() error {
|
|||
return err
|
||||
}
|
||||
|
||||
func (c *RemoteClient) lockPath() string {
|
||||
// we sanitize the path for the lock as Consul does not like having
|
||||
// two consecutive slashes for the lock path
|
||||
return strings.TrimRight(c.Path, "/")
|
||||
}
|
||||
|
||||
func (c *RemoteClient) putLockInfo(info *statemgr.LockInfo) error {
|
||||
info.Path = c.Path
|
||||
info.Created = time.Now().UTC()
|
||||
|
||||
kv := c.Client.KV()
|
||||
_, err := kv.Put(&consulapi.KVPair{
|
||||
Key: c.Path + lockInfoSuffix,
|
||||
Key: c.lockPath() + lockInfoSuffix,
|
||||
Value: info.Marshal(),
|
||||
}, nil)
|
||||
|
||||
|
@ -175,7 +182,7 @@ func (c *RemoteClient) putLockInfo(info *statemgr.LockInfo) error {
|
|||
}
|
||||
|
||||
func (c *RemoteClient) getLockInfo() (*statemgr.LockInfo, error) {
|
||||
path := c.Path + lockInfoSuffix
|
||||
path := c.lockPath() + lockInfoSuffix
|
||||
pair, _, err := c.Client.KV().Get(path, nil)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
@ -234,7 +241,7 @@ func (c *RemoteClient) lock() (string, error) {
|
|||
c.info.Info = "consul session: " + lockSession
|
||||
|
||||
opts := &consulapi.LockOptions{
|
||||
Key: c.Path + lockSuffix,
|
||||
Key: c.lockPath() + lockSuffix,
|
||||
Session: lockSession,
|
||||
|
||||
// only wait briefly, so terraform has the choice to fail fast or
|
||||
|
@ -419,7 +426,7 @@ func (c *RemoteClient) unlock(id string) error {
|
|||
|
||||
var errs error
|
||||
|
||||
if _, err := kv.Delete(c.Path+lockInfoSuffix, nil); err != nil {
|
||||
if _, err := kv.Delete(c.lockPath()+lockInfoSuffix, nil); err != nil {
|
||||
errs = multierror.Append(errs, err)
|
||||
}
|
||||
|
||||
|
|
|
@ -19,10 +19,17 @@ func TestRemoteClient_impl(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestRemoteClient(t *testing.T) {
|
||||
testCases := []string{
|
||||
fmt.Sprintf("tf-unit/%s", time.Now().String()),
|
||||
fmt.Sprintf("tf-unit/%s/", time.Now().String()),
|
||||
}
|
||||
|
||||
for _, path := range testCases {
|
||||
t.Run(path, func(*testing.T) {
|
||||
// Get the backend
|
||||
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
||||
"address": srv.HTTPAddr,
|
||||
"path": fmt.Sprintf("tf-unit/%s", time.Now().String()),
|
||||
"path": path,
|
||||
}))
|
||||
|
||||
// Grab the client
|
||||
|
@ -33,6 +40,8 @@ func TestRemoteClient(t *testing.T) {
|
|||
|
||||
// Test
|
||||
remote.TestClient(t, state.(*remote.State).Client)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// test the gzip functionality of the client
|
||||
|
@ -72,8 +81,13 @@ func TestRemoteClient_gzipUpgrade(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestConsul_stateLock(t *testing.T) {
|
||||
path := fmt.Sprintf("tf-unit/%s", time.Now().String())
|
||||
testCases := []string{
|
||||
fmt.Sprintf("tf-unit/%s", time.Now().String()),
|
||||
fmt.Sprintf("tf-unit/%s/", time.Now().String()),
|
||||
}
|
||||
|
||||
for _, path := range testCases {
|
||||
t.Run(path, func(*testing.T) {
|
||||
// create 2 instances to get 2 remote.Clients
|
||||
sA, err := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
||||
"address": srv.HTTPAddr,
|
||||
|
@ -92,13 +106,22 @@ func TestConsul_stateLock(t *testing.T) {
|
|||
}
|
||||
|
||||
remote.TestRemoteLocks(t, sA.(*remote.State).Client, sB.(*remote.State).Client)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestConsul_destroyLock(t *testing.T) {
|
||||
testCases := []string{
|
||||
fmt.Sprintf("tf-unit/%s", time.Now().String()),
|
||||
fmt.Sprintf("tf-unit/%s/", time.Now().String()),
|
||||
}
|
||||
|
||||
for _, path := range testCases {
|
||||
t.Run(path, func(*testing.T) {
|
||||
// Get the backend
|
||||
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
||||
"address": srv.HTTPAddr,
|
||||
"path": fmt.Sprintf("tf-unit/%s", time.Now().String()),
|
||||
"path": path,
|
||||
}))
|
||||
|
||||
// Grab the client
|
||||
|
@ -129,6 +152,8 @@ func TestConsul_destroyLock(t *testing.T) {
|
|||
if pair != nil {
|
||||
t.Fatalf("lock key not cleaned up at: %s", pair.Key)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestConsul_lostLock(t *testing.T) {
|
||||
|
|
Loading…
Reference in New Issue