3b3f786d68
This commit adds support for OpenCensus tracing and metrics collection. This required support for context.Context propogation throughout the cluster codebase, and in particular, the ipfscluster component interfaces. The tracing propogates across RPC and HTTP boundaries. The current default tracing backend is Jaeger. The metrics currently exports the metrics exposed by the opencensus http plugin as well as the pprof metrics to a prometheus endpoint for scraping. The current default metrics backend is Prometheus. Metrics are currently exposed by default due to low overhead, can be turned off if desired, whereas tracing is off by default as it has a much higher performance overhead, though the extent of the performance hit can be adjusted with smaller sampling rates. License: MIT Signed-off-by: Adrian Lanzafame <adrianlanzafame92@gmail.com>
86 lines
2.4 KiB
Go
86 lines
2.4 KiB
Go
package ipfscluster
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
)
|
|
|
|
func TestClusterSecretFormat(t *testing.T) {
|
|
goodSecret := "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"
|
|
emptySecret := ""
|
|
tooShort := "0123456789abcdef"
|
|
tooLong := "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0"
|
|
unsupportedChars := "0123456789abcdef0123456789!!!!!!0123456789abcdef0123456789abcdef"
|
|
|
|
_, err := DecodeClusterSecret(goodSecret)
|
|
if err != nil {
|
|
t.Fatal("Failed to decode well-formatted secret.")
|
|
}
|
|
decodedEmptySecret, err := DecodeClusterSecret(emptySecret)
|
|
if decodedEmptySecret != nil || err != nil {
|
|
t.Fatal("Unsuspected output of decoding empty secret.")
|
|
}
|
|
_, err = DecodeClusterSecret(tooShort)
|
|
if err == nil {
|
|
t.Fatal("Successfully decoded secret that should haved failed (too short).")
|
|
}
|
|
_, err = DecodeClusterSecret(tooLong)
|
|
if err == nil {
|
|
t.Fatal("Successfully decoded secret that should haved failed (too long).")
|
|
}
|
|
_, err = DecodeClusterSecret(unsupportedChars)
|
|
if err == nil {
|
|
t.Fatal("Successfully decoded secret that should haved failed (unsupported chars).")
|
|
}
|
|
}
|
|
|
|
func TestSimplePNet(t *testing.T) {
|
|
ctx := context.Background()
|
|
clusters, mocks := peerManagerClusters(t)
|
|
defer cleanRaft()
|
|
defer shutdownClusters(t, clusters, mocks)
|
|
|
|
if len(clusters) < 2 {
|
|
t.Skip("need at least 2 nodes for this test")
|
|
}
|
|
|
|
_, err := clusters[0].PeerAdd(ctx, clusters[1].id)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if len(clusters[0].Peers(ctx)) != len(clusters[1].Peers(ctx)) {
|
|
t.Fatal("Expected same number of peers")
|
|
}
|
|
if len(clusters[0].Peers(ctx)) != 2 {
|
|
t.Fatal("Expected 2 peers")
|
|
}
|
|
}
|
|
|
|
// // Adds one minute to tests. Disabled for the moment.
|
|
// func TestClusterSecretRequired(t *testing.T) {
|
|
// cl1Secret, err := pnet.GenerateV1Bytes()
|
|
// if err != nil {
|
|
// t.Fatal("Unable to generate cluster secret.")
|
|
// }
|
|
// cl1, _ := createOnePeerCluster(t, 1, (*cl1Secret)[:])
|
|
// cl2, _ := createOnePeerCluster(t, 2, testingClusterSecret)
|
|
// defer cleanRaft()
|
|
// defer cl1.Shutdown()
|
|
// defer cl2.Shutdown()
|
|
// peers1 := cl1.Peers()
|
|
// peers2 := cl2.Peers()
|
|
//
|
|
// _, err = cl1.PeerAdd(clusterAddr(cl2))
|
|
// if err == nil {
|
|
// t.Fatal("Peer entered private cluster without key.")
|
|
// }
|
|
|
|
// if len(peers1) != len(peers2) {
|
|
// t.Fatal("Expected same number of peers")
|
|
// }
|
|
// if len(peers1) != 1 {
|
|
// t.Fatal("Expected no peers other than self")
|
|
// }
|
|
// }
|