2019-04-29 16:27:57 +00:00
|
|
|
#!/usr/bin/env bats
|
|
|
|
|
|
|
|
load helpers
|
|
|
|
|
2019-06-21 15:06:25 +00:00
|
|
|
@test "s1 proxy is running correct version" {
|
|
|
|
assert_envoy_version 19000
|
|
|
|
}
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
@test "s1 proxy admin is up on :19000" {
|
|
|
|
retry_default curl -f -s localhost:19000/stats -o /dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "s2 proxy admin is up on :19001" {
|
|
|
|
retry_default curl -f -s localhost:19001/stats -o /dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "s1 proxy listener should be up and have right cert" {
|
|
|
|
assert_proxy_presents_cert_uri localhost:21000 s1
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "s2 proxy listener should be up and have right cert" {
|
|
|
|
assert_proxy_presents_cert_uri localhost:21001 s2
|
|
|
|
}
|
|
|
|
|
2019-07-10 20:58:25 +00:00
|
|
|
@test "s2 proxy should be healthy" {
|
|
|
|
assert_service_has_healthy_instances s2 1
|
|
|
|
}
|
|
|
|
|
2019-07-12 16:12:56 +00:00
|
|
|
@test "s1 upstream should have healthy endpoints for s2" {
|
2019-07-24 21:01:42 +00:00
|
|
|
assert_upstream_has_endpoints_in_status 127.0.0.1:19000 s2.default.primary HEALTHY 1
|
2019-07-12 16:12:56 +00:00
|
|
|
}
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
@test "s1 upstream should be able to connect to s2" {
|
|
|
|
run retry_default curl -s -f -d hello localhost:5000
|
|
|
|
[ "$status" -eq 0 ]
|
|
|
|
[ "$output" = "hello" ]
|
|
|
|
}
|
2020-08-27 17:20:58 +00:00
|
|
|
|
|
|
|
@test "s1 proxy should have been configured with one rbac listener filter at L4" {
|
|
|
|
LISTEN_FILTERS=$(get_envoy_listener_filters localhost:19000)
|
|
|
|
PUB=$(echo "$LISTEN_FILTERS" | grep -E "^public_listener:" | cut -f 2 -d ' ' )
|
|
|
|
UPS=$(echo "$LISTEN_FILTERS" | grep -E "^s2:" | cut -f 2 -d ' ' )
|
|
|
|
|
|
|
|
echo "LISTEN_FILTERS = $LISTEN_FILTERS"
|
|
|
|
echo "PUB = $PUB"
|
|
|
|
echo "UPS = $UPS"
|
|
|
|
|
|
|
|
[ "$PUB" = "envoy.filters.network.rbac,envoy.tcp_proxy" ]
|
|
|
|
[ "$UPS" = "envoy.tcp_proxy" ]
|
|
|
|
}
|