Files
nats-server/test/cluster_tls_test.go
Ivan Kozlovic d6fe9d4c2d [ADDED] Support for route S2 compression
The new field `compression` in the `cluster{}` block allows to
specify which compression mode to use between servers.

It can be simply specified as a boolean or a string for the
simple modes, or as an object for the "s2_auto" mode where
a list of RTT thresholds can be specified.

By default, if no compression field is specified, the server
will use the s2_auto mode with default RTT thresholds of
10ms, 50ms and 100ms for the "uncompressed", "fast", "better"
and "best" modes.

```
cluster {
..
  # Possible values are "disabled", "off", "enabled", "on",
  # "accept", "s2_fast", "s2_better", "s2_best" or "s2_auto"
  compression: s2_fast
}
```

To specify a different list of thresholds for the s2_auto,
here is how it would look like:
```
cluster {
..
  compression: {
    mode: s2_auto
    # This means that for RTT up to 5ms (included), then
    # the compression level will be "uncompressed", then
    # from 5ms+ to 15ms, the mode will switch to "s2_fast",
    # then from 15ms+ to 50ms, the level will switch to
    # "s2_better", and anything above 50ms will result
    # in the "s2_best" compression mode.
    rtt_thresholds: [5ms, 15ms, 50ms]
  }
}
```

Note that the "accept" mode means that a server will accept
compression from a remote and switch to that same compression
mode, but will otherwise not initiate compression. That is,
if 2 servers are configured with "accept", then compression
will actually be "off". If one of the server had say s2_fast
then they would both use this mode.

If a server has compression mode set (other than "off") but
connects to an older server, there will be no compression between
those 2 routes.

Signed-off-by: Ivan Kozlovic <ivan@synadia.com>
2023-04-27 17:59:25 -06:00

176 lines
4.2 KiB
Go

// Copyright 2013-2019 The NATS Authors
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package test
import (
"fmt"
"os"
"strings"
"testing"
"time"
"github.com/nats-io/nats-server/v2/server"
)
func runTLSServers(t *testing.T) (srvA, srvB *server.Server, optsA, optsB *server.Options) {
srvA, optsA = RunServerWithConfig("./configs/srv_a_tls.conf")
srvB, optsB = RunServerWithConfig("./configs/srv_b_tls.conf")
checkClusterFormed(t, srvA, srvB)
return
}
func TestTLSClusterConfig(t *testing.T) {
srvA, srvB, _, _ := runTLSServers(t)
defer srvA.Shutdown()
defer srvB.Shutdown()
}
func TestBasicTLSClusterPubSub(t *testing.T) {
srvA, srvB, optsA, optsB := runTLSServers(t)
defer srvA.Shutdown()
defer srvB.Shutdown()
clientA := createClientConn(t, optsA.Host, optsA.Port)
defer clientA.Close()
clientB := createClientConn(t, optsB.Host, optsB.Port)
defer clientB.Close()
sendA, expectA := setupConn(t, clientA)
sendA("SUB foo 22\r\n")
sendA("PING\r\n")
expectA(pongRe)
if err := checkExpectedSubs(1, srvA, srvB); err != nil {
t.Fatalf("%v", err)
}
sendB, expectB := setupConn(t, clientB)
sendB("PUB foo 2\r\nok\r\n")
sendB("PING\r\n")
expectB(pongRe)
expectMsgs := expectMsgsCommand(t, expectA)
matches := expectMsgs(1)
checkMsg(t, matches[0], "foo", "22", "", "2", "ok")
}
type captureTLSError struct {
dummyLogger
ch chan struct{}
}
func (c *captureTLSError) Errorf(format string, v ...interface{}) {
msg := fmt.Sprintf(format, v...)
if strings.Contains(msg, "handshake error") {
select {
case c.ch <- struct{}{}:
default:
}
}
}
type captureClusterTLSInsecureLogger struct {
dummyLogger
ch chan struct{}
}
func (c *captureClusterTLSInsecureLogger) Warnf(format string, v ...interface{}) {
msg := fmt.Sprintf(format, v...)
if strings.Contains(msg, "solicited routes will not be verified") {
select {
case c.ch <- struct{}{}:
default:
}
}
}
func TestClusterTLSInsecure(t *testing.T) {
confA := createConfFile(t, []byte(`
port: -1
cluster {
name: "xyz"
listen: "127.0.0.1:-1"
pool_size: -1
compression: "disabled"
tls {
cert_file: "./configs/certs/server-noip.pem"
key_file: "./configs/certs/server-key-noip.pem"
ca_file: "./configs/certs/ca.pem"
timeout: 2
}
}
`))
srvA, optsA := RunServerWithConfig(confA)
defer srvA.Shutdown()
l := &captureTLSError{ch: make(chan struct{}, 1)}
srvA.SetLogger(l, false, false)
bConfigTemplate := `
port: -1
cluster {
name: "xyz"
listen: "127.0.0.1:-1"
pool_size: -1
compression: "disabled"
tls {
cert_file: "./configs/certs/server-noip.pem"
key_file: "./configs/certs/server-key-noip.pem"
ca_file: "./configs/certs/ca.pem"
timeout: 2
%s
}
routes [
"nats://%s:%d"
]
}
`
confB := createConfFile(t, []byte(fmt.Sprintf(bConfigTemplate,
"", optsA.Cluster.Host, optsA.Cluster.Port)))
srvB, _ := RunServerWithConfig(confB)
defer srvB.Shutdown()
// We should get errors
select {
case <-l.ch:
case <-time.After(2 * time.Second):
t.Fatalf("Did not get handshake error")
}
// Set a logger that will capture the warning
wl := &captureClusterTLSInsecureLogger{ch: make(chan struct{}, 1)}
srvB.SetLogger(wl, false, false)
// Need to add "insecure: true" and reload
if err := os.WriteFile(confB,
[]byte(fmt.Sprintf(bConfigTemplate, "insecure: true", optsA.Cluster.Host, optsA.Cluster.Port)),
0666); err != nil {
t.Fatalf("Error rewriting file: %v", err)
}
if err := srvB.Reload(); err != nil {
t.Fatalf("Error on reload: %v", err)
}
checkClusterFormed(t, srvA, srvB)
// Make sure we have the tracing
select {
case <-wl.ch:
case <-time.After(2 * time.Second):
t.Fatalf("Did not get warning about using cluster's insecure setting")
}
}