mirror of
https://github.com/coder/coder.git
synced 2025-07-06 15:41:45 +00:00
* feat: HA tailnet coordinator * fixup! feat: HA tailnet coordinator * fixup! feat: HA tailnet coordinator * remove printlns * close all connections on coordinator * impelement high availability feature * fixup! impelement high availability feature * fixup! impelement high availability feature * fixup! impelement high availability feature * fixup! impelement high availability feature * Add replicas * Add DERP meshing to arbitrary addresses * Move packages to highavailability folder * Move coordinator to high availability package * Add flags for HA * Rename to replicasync * Denest packages for replicas * Add test for multiple replicas * Fix coordination test * Add HA to the helm chart * Rename function pointer * Add warnings for HA * Add the ability to block endpoints * Add flag to disable P2P connections * Wow, I made the tests pass * Add replicas endpoint * Ensure close kills replica * Update sql * Add database latency to high availability * Pipe TLS to DERP mesh * Fix DERP mesh with TLS * Add tests for TLS * Fix replica sync TLS * Fix RootCA for replica meshing * Remove ID from replicasync * Fix getting certificates for meshing * Remove excessive locking * Fix linting * Store mesh key in the database * Fix replica key for tests * Fix types gen * Fix unlocking unlocked * Fix race in tests * Update enterprise/derpmesh/derpmesh.go Co-authored-by: Colin Adler <colin1adler@gmail.com> * Rename to syncReplicas * Reuse http client * Delete old replicas on a CRON * Fix race condition in connection tests * Fix linting * Fix nil type * Move pubsub to in-memory for twenty test * Add comment for configuration tweaking * Fix leak with transport * Fix close leak in derpmesh * Fix race when creating server * Remove handler update * Skip test on Windows * Fix DERP mesh test * Wrap HTTP handler replacement in mutex * Fix error message for relay * Fix API handler for normal tests * Fix speedtest * Fix replica resend * Fix derpmesh send * Ping async * Increase wait time of template version jobd * Fix race when closing replica sync * Add name to client * Log the derpmap being used * Don't connect if DERP is empty * Improve agent coordinator logging * Fix lock in coordinator * Fix relay addr * Fix race when updating durations * Fix client publish race * Run pubsub loop in a queue * Store agent nodes in order * Fix coordinator locking * Check for closed pipe Co-authored-by: Colin Adler <colin1adler@gmail.com>
97 lines
3.0 KiB
Go
97 lines
3.0 KiB
Go
package coderdenttest_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/http"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/coder/coder/coderd/coderdtest"
|
|
"github.com/coder/coder/coderd/rbac"
|
|
"github.com/coder/coder/codersdk"
|
|
"github.com/coder/coder/enterprise/coderd/coderdenttest"
|
|
"github.com/coder/coder/testutil"
|
|
)
|
|
|
|
func TestNew(t *testing.T) {
|
|
t.Parallel()
|
|
_ = coderdenttest.New(t, nil)
|
|
}
|
|
|
|
func TestAuthorizeAllEndpoints(t *testing.T) {
|
|
t.Parallel()
|
|
client, _, api := coderdenttest.NewWithAPI(t, &coderdenttest.Options{
|
|
Options: &coderdtest.Options{
|
|
// Required for any subdomain-based proxy tests to pass.
|
|
AppHostname: "*.test.coder.com",
|
|
Authorizer: &coderdtest.RecordingAuthorizer{},
|
|
IncludeProvisionerDaemon: true,
|
|
},
|
|
})
|
|
ctx, _ := testutil.Context(t)
|
|
admin := coderdtest.CreateFirstUser(t, client)
|
|
license := coderdenttest.AddLicense(t, client, coderdenttest.LicenseOptions{
|
|
TemplateRBAC: true,
|
|
})
|
|
group, err := client.CreateGroup(ctx, admin.OrganizationID, codersdk.CreateGroupRequest{
|
|
Name: "testgroup",
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
groupObj := rbac.ResourceGroup.InOrg(admin.OrganizationID)
|
|
a := coderdtest.NewAuthTester(ctx, t, client, api.AGPL, admin)
|
|
a.URLParams["licenses/{id}"] = fmt.Sprintf("licenses/%d", license.ID)
|
|
a.URLParams["groups/{group}"] = fmt.Sprintf("groups/%s", group.ID.String())
|
|
|
|
skipRoutes, assertRoute := coderdtest.AGPLRoutes(a)
|
|
assertRoute["GET:/api/v2/entitlements"] = coderdtest.RouteCheck{
|
|
NoAuthorize: true,
|
|
}
|
|
assertRoute["POST:/api/v2/licenses"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionCreate,
|
|
AssertObject: rbac.ResourceLicense,
|
|
}
|
|
assertRoute["GET:/api/v2/licenses"] = coderdtest.RouteCheck{
|
|
StatusCode: http.StatusOK,
|
|
AssertAction: rbac.ActionRead,
|
|
AssertObject: rbac.ResourceLicense,
|
|
}
|
|
assertRoute["GET:/api/v2/replicas"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionRead,
|
|
AssertObject: rbac.ResourceReplicas,
|
|
}
|
|
assertRoute["DELETE:/api/v2/licenses/{id}"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionDelete,
|
|
AssertObject: rbac.ResourceLicense,
|
|
}
|
|
assertRoute["GET:/api/v2/templates/{template}/acl"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionRead,
|
|
AssertObject: rbac.ResourceTemplate,
|
|
}
|
|
assertRoute["PATCH:/api/v2/templates/{template}/acl"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionCreate,
|
|
AssertObject: rbac.ResourceTemplate,
|
|
}
|
|
assertRoute["GET:/api/v2/organizations/{organization}/groups"] = coderdtest.RouteCheck{
|
|
StatusCode: http.StatusOK,
|
|
AssertAction: rbac.ActionRead,
|
|
AssertObject: groupObj,
|
|
}
|
|
assertRoute["PATCH:/api/v2/groups/{group}"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionRead,
|
|
AssertObject: groupObj,
|
|
}
|
|
assertRoute["PATCH:/api/v2/groups/{group}"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionUpdate,
|
|
AssertObject: groupObj,
|
|
}
|
|
assertRoute["DELETE:/api/v2/groups/{group}"] = coderdtest.RouteCheck{
|
|
AssertAction: rbac.ActionDelete,
|
|
AssertObject: groupObj,
|
|
}
|
|
|
|
a.Test(context.Background(), assertRoute, skipRoutes)
|
|
}
|