2018-10-03 19:37:53 +00:00
|
|
|
package envoy
|
|
|
|
|
|
|
|
import (
|
2019-04-29 16:27:57 +00:00
|
|
|
"encoding/json"
|
2018-10-09 09:57:26 +00:00
|
|
|
"flag"
|
|
|
|
"io/ioutil"
|
2019-07-30 13:56:56 +00:00
|
|
|
"net"
|
2019-04-29 16:27:57 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2018-10-09 09:57:26 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2018-10-03 19:37:53 +00:00
|
|
|
"strings"
|
|
|
|
"testing"
|
2018-10-09 09:57:26 +00:00
|
|
|
|
2019-08-01 16:53:34 +00:00
|
|
|
"github.com/hashicorp/consul/agent"
|
2019-04-29 16:27:57 +00:00
|
|
|
"github.com/hashicorp/consul/agent/xds"
|
|
|
|
"github.com/hashicorp/consul/api"
|
2019-04-30 14:59:00 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil"
|
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
"github.com/stretchr/testify/require"
|
2018-10-03 19:37:53 +00:00
|
|
|
)
|
|
|
|
|
2018-10-09 09:57:26 +00:00
|
|
|
var update = flag.Bool("update", false, "update golden files")
|
|
|
|
|
2019-07-30 13:56:56 +00:00
|
|
|
func TestEnvoyCommand_noTabs(t *testing.T) {
|
2018-10-03 19:37:53 +00:00
|
|
|
t.Parallel()
|
|
|
|
if strings.ContainsRune(New(nil).Help(), '\t') {
|
|
|
|
t.Fatal("help has tabs")
|
|
|
|
}
|
|
|
|
}
|
2018-10-09 09:57:26 +00:00
|
|
|
|
|
|
|
// testSetAndResetEnv sets the env vars passed as KEY=value strings in the
|
|
|
|
// current ENV and returns a func() that will undo it's work at the end of the
|
|
|
|
// test for use with defer.
|
|
|
|
func testSetAndResetEnv(t *testing.T, env []string) func() {
|
|
|
|
old := make(map[string]*string)
|
|
|
|
for _, e := range env {
|
|
|
|
pair := strings.SplitN(e, "=", 2)
|
|
|
|
current := os.Getenv(pair[0])
|
|
|
|
if current != "" {
|
|
|
|
old[pair[0]] = ¤t
|
|
|
|
} else {
|
|
|
|
// save it as a nil so we know to remove again
|
|
|
|
old[pair[0]] = nil
|
|
|
|
}
|
|
|
|
os.Setenv(pair[0], pair[1])
|
|
|
|
}
|
|
|
|
// Return a func that will reset to old values
|
|
|
|
return func() {
|
|
|
|
for k, v := range old {
|
|
|
|
if v == nil {
|
|
|
|
os.Unsetenv(k)
|
|
|
|
} else {
|
|
|
|
os.Setenv(k, *v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// This tests the args we use to generate the template directly because they
|
|
|
|
// encapsulate all the argument and default handling code which is where most of
|
|
|
|
// the logic is. We also allow generating golden files but only for cases that
|
|
|
|
// pass the test of having their template args generated as expected.
|
|
|
|
func TestGenerateConfig(t *testing.T) {
|
|
|
|
cases := []struct {
|
2019-04-29 16:27:57 +00:00
|
|
|
Name string
|
|
|
|
Flags []string
|
|
|
|
Env []string
|
2019-04-30 14:59:00 +00:00
|
|
|
Files map[string]string
|
2019-04-29 16:27:57 +00:00
|
|
|
ProxyConfig map[string]interface{}
|
2019-08-01 16:53:34 +00:00
|
|
|
GRPCPort int // only used for testing custom-configured grpc port
|
2019-04-29 16:27:57 +00:00
|
|
|
WantArgs BootstrapTplArgs
|
|
|
|
WantErr string
|
2018-10-09 09:57:26 +00:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
Name: "no-args",
|
|
|
|
Flags: []string{},
|
|
|
|
Env: []string{},
|
|
|
|
WantErr: "No proxy ID specified",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "defaults",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
2019-04-29 16:27:57 +00:00
|
|
|
WantArgs: BootstrapTplArgs{
|
2018-10-09 09:57:26 +00:00
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502", // Note this is the gRPC port
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2018-10-09 09:57:26 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-04-30 14:59:00 +00:00
|
|
|
{
|
|
|
|
Name: "token-arg",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy",
|
|
|
|
"-token", "c9a52720-bf6c-4aa6-b8bc-66881a5ade95"},
|
|
|
|
Env: []string{},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502", // Note this is the gRPC port
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-30 14:59:00 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
Token: "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "token-env",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{
|
|
|
|
"CONSUL_HTTP_TOKEN=c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502", // Note this is the gRPC port
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-30 14:59:00 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
Token: "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "token-file-arg",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy",
|
|
|
|
"-token-file", "@@TEMPDIR@@token.txt",
|
|
|
|
},
|
|
|
|
Env: []string{},
|
|
|
|
Files: map[string]string{
|
|
|
|
"token.txt": "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502", // Note this is the gRPC port
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-30 14:59:00 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
Token: "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "token-file-env",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{
|
|
|
|
"CONSUL_HTTP_TOKEN_FILE=@@TEMPDIR@@token.txt",
|
|
|
|
},
|
|
|
|
Files: map[string]string{
|
|
|
|
"token.txt": "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502", // Note this is the gRPC port
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-30 14:59:00 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
Token: "c9a52720-bf6c-4aa6-b8bc-66881a5ade95",
|
|
|
|
},
|
|
|
|
},
|
2018-10-09 09:57:26 +00:00
|
|
|
{
|
|
|
|
Name: "grpc-addr-flag",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy",
|
|
|
|
"-grpc-addr", "localhost:9999"},
|
|
|
|
Env: []string{},
|
2019-04-29 16:27:57 +00:00
|
|
|
WantArgs: BootstrapTplArgs{
|
2018-10-09 09:57:26 +00:00
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "9999",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2018-10-09 09:57:26 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "grpc-addr-env",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{
|
|
|
|
"CONSUL_GRPC_ADDR=localhost:9999",
|
|
|
|
},
|
2019-04-29 16:27:57 +00:00
|
|
|
WantArgs: BootstrapTplArgs{
|
2018-10-09 09:57:26 +00:00
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "9999",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-07-05 15:06:47 +00:00
|
|
|
{
|
|
|
|
Name: "grpc-addr-unix",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy",
|
|
|
|
"-grpc-addr", "unix:///var/run/consul.sock"},
|
|
|
|
Env: []string{},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentSocket: "/var/run/consul.sock",
|
|
|
|
AdminAccessLogPath: "/dev/null",
|
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-08-01 16:53:34 +00:00
|
|
|
{
|
|
|
|
Name: "grpc-addr-config",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
GRPCPort: 9999,
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "9999",
|
|
|
|
AdminAccessLogPath: "/dev/null",
|
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-06-07 09:26:43 +00:00
|
|
|
{
|
|
|
|
Name: "access-log-path",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy", "-admin-access-log-path", "/some/path/access.log"},
|
|
|
|
Env: []string{},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
|
|
|
AdminAccessLogPath: "/some/path/access.log",
|
2018-10-09 09:57:26 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-12-13 16:44:48 +00:00
|
|
|
{
|
|
|
|
Name: "missing-ca-file",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy", "-ca-file", "some/path"},
|
|
|
|
Env: []string{},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
|
|
|
},
|
|
|
|
WantErr: "Error loading CA File: open some/path: no such file or directory",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "existing-ca-file",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy", "-ca-file", "../../../test/ca/root.cer"},
|
|
|
|
Env: []string{"CONSUL_HTTP_SSL=1"},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
// Should resolve IP, note this might not resolve the same way
|
|
|
|
// everywhere which might make this test brittle but not sure what else
|
|
|
|
// to do.
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
|
|
|
AgentTLS: true,
|
|
|
|
AgentCAPEM: []byte(`-----BEGIN CERTIFICATE-----
|
|
|
|
MIIEtzCCA5+gAwIBAgIJAIewRMI8OnvTMA0GCSqGSIb3DQEBBQUAMIGYMQswCQYD
|
|
|
|
VQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcTDVNhbiBGcmFuY2lzY28xHDAa
|
|
|
|
BgNVBAoTE0hhc2hpQ29ycCBUZXN0IENlcnQxDDAKBgNVBAsTA0RldjEWMBQGA1UE
|
|
|
|
AxMNdGVzdC5pbnRlcm5hbDEgMB4GCSqGSIb3DQEJARYRdGVzdEBpbnRlcm5hbC5j
|
|
|
|
b20wHhcNMTQwNDA3MTkwMTA4WhcNMjQwNDA0MTkwMTA4WjCBmDELMAkGA1UEBhMC
|
|
|
|
VVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRwwGgYDVQQK
|
|
|
|
ExNIYXNoaUNvcnAgVGVzdCBDZXJ0MQwwCgYDVQQLEwNEZXYxFjAUBgNVBAMTDXRl
|
|
|
|
c3QuaW50ZXJuYWwxIDAeBgkqhkiG9w0BCQEWEXRlc3RAaW50ZXJuYWwuY29tMIIB
|
|
|
|
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxrs6JK4NpiOItxrpNR/1ppUU
|
|
|
|
mH7p2BgLCBZ6eHdclle9J56i68adt8J85zaqphCfz6VDP58DsFx+N50PZyjQaDsU
|
|
|
|
d0HejRqfHRMtg2O+UQkv4Z66+Vo+gc6uGuANi2xMtSYDVTAqqzF48OOPQDgYkzcG
|
|
|
|
xcFZzTRFFZt2vPnyHj8cHcaFo/NMNVh7C3yTXevRGNm9u2mrbxCEeiHzFC2WUnvg
|
|
|
|
U2jQuC7Fhnl33Zd3B6d3mQH6O23ncmwxTcPUJe6xZaIRrDuzwUcyhLj5Z3faag/f
|
|
|
|
pFIIcHSiHRfoqHLGsGg+3swId/zVJSSDHr7pJUu7Cre+vZa63FqDaooqvnisrQID
|
|
|
|
AQABo4IBADCB/TAdBgNVHQ4EFgQUo/nrOfqvbee2VklVKIFlyQEbuJUwgc0GA1Ud
|
|
|
|
IwSBxTCBwoAUo/nrOfqvbee2VklVKIFlyQEbuJWhgZ6kgZswgZgxCzAJBgNVBAYT
|
|
|
|
AlVTMQswCQYDVQQIEwJDQTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNjbzEcMBoGA1UE
|
|
|
|
ChMTSGFzaGlDb3JwIFRlc3QgQ2VydDEMMAoGA1UECxMDRGV2MRYwFAYDVQQDEw10
|
|
|
|
ZXN0LmludGVybmFsMSAwHgYJKoZIhvcNAQkBFhF0ZXN0QGludGVybmFsLmNvbYIJ
|
|
|
|
AIewRMI8OnvTMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBADa9fV9h
|
|
|
|
gjapBlkNmu64WX0Ufub5dsJrdHS8672P30S7ILB7Mk0W8sL65IezRsZnG898yHf9
|
|
|
|
2uzmz5OvNTM9K380g7xFlyobSVq+6yqmmSAlA/ptAcIIZT727P5jig/DB7fzJM3g
|
|
|
|
jctDlEGOmEe50GQXc25VKpcpjAsNQi5ER5gowQ0v3IXNZs+yU+LvxLHc0rUJ/XSp
|
|
|
|
lFCAMOqd5uRoMOejnT51G6krvLNzPaQ3N9jQfNVY4Q0zfs0M+6dRWvqfqB9Vyq8/
|
|
|
|
POLMld+HyAZEBk9zK3ZVIXx6XS4dkDnSNR91njLq7eouf6M7+7s/oMQZZRtAfQ6r
|
|
|
|
wlW975rYa1ZqEdA=
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
`),
|
|
|
|
AdminAccessLogPath: "/dev/null",
|
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2019-04-29 16:27:57 +00:00
|
|
|
{
|
|
|
|
Name: "custom-bootstrap",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
// Add a completely custom bootstrap template. Never mind if this is
|
|
|
|
// invalid envoy config just as long as it works and gets the variables
|
|
|
|
// interplated.
|
|
|
|
"envoy_bootstrap_json_tpl": `
|
|
|
|
{
|
|
|
|
"admin": {
|
|
|
|
"access_log_path": "/dev/null",
|
|
|
|
"address": {
|
|
|
|
"socket_address": {
|
|
|
|
"address": "{{ .AdminBindAddress }}",
|
|
|
|
"port_value": {{ .AdminBindPort }}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"node": {
|
|
|
|
"cluster": "{{ .ProxyCluster }}",
|
|
|
|
"id": "{{ .ProxyID }}"
|
|
|
|
},
|
2019-08-16 14:30:17 +00:00
|
|
|
"custom_field": "foo"
|
2019-04-29 16:27:57 +00:00
|
|
|
}`,
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-29 16:27:57 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "extra_-single",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
// Add a custom sections with interpolated variables. These are all
|
|
|
|
// invalid config syntax too but we are just testing they have the right
|
|
|
|
// effect.
|
|
|
|
"envoy_extra_static_clusters_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_cluster_1"
|
|
|
|
}`,
|
|
|
|
"envoy_extra_static_listeners_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_listener_1"
|
|
|
|
}`,
|
|
|
|
"envoy_extra_stats_sinks_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_sink_1"
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-29 16:27:57 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "extra_-multiple",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
// Add a custom sections with interpolated variables. These are all
|
|
|
|
// invalid config syntax too but we are just testing they have the right
|
|
|
|
// effect.
|
|
|
|
"envoy_extra_static_clusters_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_cluster_1"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"name": "fake_cluster_2"
|
|
|
|
}`,
|
|
|
|
"envoy_extra_static_listeners_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_listener_1"
|
|
|
|
},{
|
|
|
|
"name": "fake_listener_2"
|
|
|
|
}`,
|
|
|
|
"envoy_extra_stats_sinks_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_sink_1"
|
|
|
|
} , { "name": "fake_sink_2" }`,
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-29 16:27:57 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "stats-config-override",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
// Add a custom sections with interpolated variables. These are all
|
|
|
|
// invalid config syntax too but we are just testing they have the right
|
|
|
|
// effect.
|
|
|
|
"envoy_stats_config_json": `
|
|
|
|
{
|
|
|
|
"name": "fake_config"
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-29 16:27:57 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "zipkin-tracing-config",
|
|
|
|
Flags: []string{"-proxy-id", "test-proxy"},
|
|
|
|
Env: []string{},
|
|
|
|
ProxyConfig: map[string]interface{}{
|
|
|
|
// Add a custom sections with interpolated variables. These are all
|
|
|
|
// invalid config syntax too but we are just testing they have the right
|
|
|
|
// effect.
|
|
|
|
"envoy_tracing_json": `{
|
|
|
|
"http": {
|
|
|
|
"name": "envoy.zipkin",
|
|
|
|
"config": {
|
|
|
|
"collector_cluster": "zipkin",
|
|
|
|
"collector_endpoint": "/api/v1/spans"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
// Need to setup the cluster to send that too as well
|
|
|
|
"envoy_extra_static_clusters_json": `{
|
|
|
|
"name": "zipkin",
|
|
|
|
"type": "STRICT_DNS",
|
|
|
|
"connect_timeout": "5s",
|
|
|
|
"load_assignment": {
|
|
|
|
"cluster_name": "zipkin",
|
|
|
|
"endpoints": [
|
|
|
|
{
|
|
|
|
"lb_endpoints": [
|
|
|
|
{
|
|
|
|
"endpoint": {
|
|
|
|
"address": {
|
|
|
|
"socket_address": {
|
|
|
|
"address": "zipkin.service.consul",
|
|
|
|
"port_value": 9411
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
},
|
|
|
|
WantArgs: BootstrapTplArgs{
|
|
|
|
ProxyCluster: "test-proxy",
|
|
|
|
ProxyID: "test-proxy",
|
|
|
|
AgentAddress: "127.0.0.1",
|
|
|
|
AgentPort: "8502",
|
2019-06-07 09:26:43 +00:00
|
|
|
AdminAccessLogPath: "/dev/null",
|
2019-04-29 16:27:57 +00:00
|
|
|
AdminBindAddress: "127.0.0.1",
|
|
|
|
AdminBindPort: "19000",
|
|
|
|
LocalAgentClusterName: xds.LocalAgentClusterName,
|
|
|
|
},
|
|
|
|
},
|
2018-10-09 09:57:26 +00:00
|
|
|
}
|
|
|
|
|
2019-04-30 14:59:00 +00:00
|
|
|
copyAndReplaceAll := func(s []string, old, new string) []string {
|
|
|
|
out := make([]string, len(s))
|
|
|
|
for i, v := range s {
|
|
|
|
out[i] = strings.ReplaceAll(v, old, new)
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
2018-10-09 09:57:26 +00:00
|
|
|
for _, tc := range cases {
|
|
|
|
t.Run(tc.Name, func(t *testing.T) {
|
|
|
|
require := require.New(t)
|
|
|
|
|
2019-04-30 14:59:00 +00:00
|
|
|
testDir := testutil.TempDir(t, "envoytest")
|
|
|
|
defer os.RemoveAll(testDir)
|
|
|
|
|
|
|
|
if len(tc.Files) > 0 {
|
|
|
|
for fn, fv := range tc.Files {
|
|
|
|
fullname := filepath.Join(testDir, fn)
|
|
|
|
require.NoError(ioutil.WriteFile(fullname, []byte(fv), 0600))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-09 09:57:26 +00:00
|
|
|
ui := cli.NewMockUi()
|
|
|
|
c := New(ui)
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
// Run a mock agent API that just always returns the proxy config in the
|
|
|
|
// test.
|
2019-08-01 16:53:34 +00:00
|
|
|
srv := httptest.NewServer(testMockAgent(tc.ProxyConfig, tc.GRPCPort))
|
2019-04-29 16:27:57 +00:00
|
|
|
defer srv.Close()
|
|
|
|
|
|
|
|
// Set the agent HTTP address in ENV to be our mock
|
|
|
|
tc.Env = append(tc.Env, "CONSUL_HTTP_ADDR="+srv.URL)
|
|
|
|
|
2019-04-30 14:59:00 +00:00
|
|
|
testDirPrefix := testDir + string(filepath.Separator)
|
|
|
|
|
|
|
|
myFlags := copyAndReplaceAll(tc.Flags, "@@TEMPDIR@@", testDirPrefix)
|
|
|
|
myEnv := copyAndReplaceAll(tc.Env, "@@TEMPDIR@@", testDirPrefix)
|
|
|
|
|
|
|
|
defer testSetAndResetEnv(t, myEnv)()
|
2018-10-09 09:57:26 +00:00
|
|
|
|
|
|
|
// Run the command
|
2019-04-30 14:59:00 +00:00
|
|
|
args := append([]string{"-bootstrap"}, myFlags...)
|
2018-10-09 09:57:26 +00:00
|
|
|
code := c.Run(args)
|
|
|
|
if tc.WantErr == "" {
|
|
|
|
require.Equal(0, code, ui.ErrorWriter.String())
|
|
|
|
} else {
|
|
|
|
require.Equal(1, code, ui.ErrorWriter.String())
|
|
|
|
require.Contains(ui.ErrorWriter.String(), tc.WantErr)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify we handled the env and flags right first to get correct template
|
|
|
|
// args.
|
|
|
|
got, err := c.templateArgs()
|
|
|
|
require.NoError(err) // Error cases should have returned above
|
|
|
|
require.Equal(&tc.WantArgs, got)
|
|
|
|
|
|
|
|
// Actual template output goes to stdout direct to avoid prefix in UI, so
|
|
|
|
// generate it again here to assert on.
|
|
|
|
actual, err := c.generateConfig()
|
|
|
|
require.NoError(err)
|
|
|
|
|
|
|
|
// If we got the arg handling write, verify output
|
|
|
|
golden := filepath.Join("testdata", tc.Name+".golden")
|
|
|
|
if *update {
|
|
|
|
ioutil.WriteFile(golden, actual, 0644)
|
|
|
|
}
|
|
|
|
|
|
|
|
expected, err := ioutil.ReadFile(golden)
|
|
|
|
require.NoError(err)
|
|
|
|
require.Equal(string(expected), string(actual))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2019-08-01 16:53:34 +00:00
|
|
|
// testMockAgent combines testMockAgentProxyConfig and testMockAgentSelf,
|
|
|
|
// routing /agent/service/... requests to testMockAgentProxyConfig and
|
|
|
|
// routing /agent/self requests to testMockAgentSelf.
|
|
|
|
func testMockAgent(agentCfg map[string]interface{}, grpcPort int) http.HandlerFunc {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if strings.Contains(r.URL.Path, "/agent/service") {
|
|
|
|
testMockAgentProxyConfig(agentCfg)(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if strings.Contains(r.URL.Path, "/agent/self") {
|
|
|
|
testMockAgentSelf(grpcPort)(w, r)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
http.NotFound(w, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
func testMockAgentProxyConfig(cfg map[string]interface{}) http.HandlerFunc {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// Parse the proxy-id from the end of the URL (blindly assuming it's correct
|
|
|
|
// format)
|
|
|
|
proxyID := strings.TrimPrefix(r.URL.Path, "/v1/agent/service/")
|
|
|
|
serviceID := strings.TrimSuffix(proxyID, "-sidecar-proxy")
|
|
|
|
|
|
|
|
svc := api.AgentService{
|
|
|
|
Kind: api.ServiceKindConnectProxy,
|
|
|
|
ID: proxyID,
|
|
|
|
Service: proxyID,
|
|
|
|
Proxy: &api.AgentServiceConnectProxyConfig{
|
|
|
|
DestinationServiceName: serviceID,
|
|
|
|
DestinationServiceID: serviceID,
|
|
|
|
Config: cfg,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
cfgJSON, err := json.Marshal(svc)
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(500)
|
|
|
|
w.Write([]byte(err.Error()))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Write(cfgJSON)
|
|
|
|
})
|
|
|
|
}
|
2019-07-30 13:56:56 +00:00
|
|
|
|
|
|
|
func TestEnvoyCommand_canBindInternal(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
type testCheck struct {
|
|
|
|
expected bool
|
|
|
|
addr string
|
|
|
|
}
|
|
|
|
|
|
|
|
type testCase struct {
|
|
|
|
ifAddrs []net.Addr
|
|
|
|
checks map[string]testCheck
|
|
|
|
}
|
|
|
|
|
|
|
|
parseIPNets := func(t *testing.T, in ...string) []net.Addr {
|
|
|
|
var out []net.Addr
|
|
|
|
for _, addr := range in {
|
|
|
|
ip := net.ParseIP(addr)
|
|
|
|
require.NotNil(t, ip)
|
|
|
|
out = append(out, &net.IPNet{IP: ip})
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
parseIPs := func(t *testing.T, in ...string) []net.Addr {
|
|
|
|
var out []net.Addr
|
|
|
|
for _, addr := range in {
|
|
|
|
ip := net.ParseIP(addr)
|
|
|
|
require.NotNil(t, ip)
|
|
|
|
out = append(out, &net.IPAddr{IP: ip})
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
cases := map[string]testCase{
|
|
|
|
"IPNet": {
|
|
|
|
parseIPNets(t, "10.3.0.2", "198.18.0.1", "2001:db8:a0b:12f0::1"),
|
|
|
|
map[string]testCheck{
|
|
|
|
"ipv4": {
|
|
|
|
true,
|
|
|
|
"10.3.0.2",
|
|
|
|
},
|
|
|
|
"secondary ipv4": {
|
|
|
|
true,
|
|
|
|
"198.18.0.1",
|
|
|
|
},
|
|
|
|
"ipv6": {
|
|
|
|
true,
|
|
|
|
"2001:db8:a0b:12f0::1",
|
|
|
|
},
|
|
|
|
"ipv4 not found": {
|
|
|
|
false,
|
|
|
|
"1.2.3.4",
|
|
|
|
},
|
|
|
|
"ipv6 not found": {
|
|
|
|
false,
|
|
|
|
"::ffff:192.168.0.1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"IPAddr": {
|
|
|
|
parseIPs(t, "10.3.0.2", "198.18.0.1", "2001:db8:a0b:12f0::1"),
|
|
|
|
map[string]testCheck{
|
|
|
|
"ipv4": {
|
|
|
|
true,
|
|
|
|
"10.3.0.2",
|
|
|
|
},
|
|
|
|
"secondary ipv4": {
|
|
|
|
true,
|
|
|
|
"198.18.0.1",
|
|
|
|
},
|
|
|
|
"ipv6": {
|
|
|
|
true,
|
|
|
|
"2001:db8:a0b:12f0::1",
|
|
|
|
},
|
|
|
|
"ipv4 not found": {
|
|
|
|
false,
|
|
|
|
"1.2.3.4",
|
|
|
|
},
|
|
|
|
"ipv6 not found": {
|
|
|
|
false,
|
|
|
|
"::ffff:192.168.0.1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tcase := range cases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
for checkName, check := range tcase.checks {
|
|
|
|
t.Run(checkName, func(t *testing.T) {
|
|
|
|
require.Equal(t, check.expected, canBindInternal(check.addr, tcase.ifAddrs))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-08-02 21:19:56 +00:00
|
|
|
|
2019-08-01 16:53:34 +00:00
|
|
|
// testMockAgentSelf returns an empty /v1/agent/self response except GRPC
|
|
|
|
// port is filled in to match the given wantGRPCPort argument.
|
|
|
|
func testMockAgentSelf(wantGRPCPort int) http.HandlerFunc {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
resp := agent.Self{
|
|
|
|
DebugConfig: map[string]interface{}{
|
|
|
|
"GRPCPort": wantGRPCPort,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
selfJSON, err := json.Marshal(resp)
|
|
|
|
if err != nil {
|
|
|
|
w.WriteHeader(500)
|
|
|
|
w.Write([]byte(err.Error()))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
w.Write(selfJSON)
|
|
|
|
})
|
|
|
|
}
|