2018-10-01 15:27:59 +00:00
|
|
|
package services
|
2018-09-28 06:52:17 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
2019-11-15 15:06:33 +00:00
|
|
|
"time"
|
2018-09-28 06:52:17 +00:00
|
|
|
|
2020-12-21 18:25:32 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
2018-10-02 19:45:00 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
2018-10-01 15:05:57 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2018-09-28 06:52:17 +00:00
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
)
|
|
|
|
|
2018-10-02 19:45:00 +00:00
|
|
|
// This test ensures that dev mode doesn't register services by default.
|
|
|
|
// We depend on this behavior for ServiesFromFiles so we want to fail
|
|
|
|
// tests if that ever changes.
|
|
|
|
func TestDevModeHasNoServices(t *testing.T) {
|
|
|
|
devMode := true
|
2020-12-21 18:46:41 +00:00
|
|
|
result, err := config.Load(config.LoadOpts{DevMode: &devMode})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, result.Warnings, 0)
|
|
|
|
require.Len(t, result.RuntimeConfig.Services, 0)
|
2018-10-02 19:45:00 +00:00
|
|
|
}
|
|
|
|
|
2018-10-01 15:05:57 +00:00
|
|
|
func TestStructsToAgentService(t *testing.T) {
|
2018-10-02 19:45:00 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2018-09-28 06:52:17 +00:00
|
|
|
cases := []struct {
|
|
|
|
Name string
|
2018-10-01 15:05:57 +00:00
|
|
|
Input *structs.ServiceDefinition
|
2018-09-28 06:52:17 +00:00
|
|
|
Output *api.AgentServiceRegistration
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"Basic service with port",
|
2018-10-01 15:05:57 +00:00
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
2018-09-28 06:52:17 +00:00
|
|
|
Tags: []string{"leader"},
|
2018-10-01 15:05:57 +00:00
|
|
|
Port: 1234,
|
2018-09-28 06:52:17 +00:00
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web",
|
|
|
|
Tags: []string{"leader"},
|
|
|
|
Port: 1234,
|
|
|
|
},
|
|
|
|
},
|
2018-10-01 02:17:45 +00:00
|
|
|
{
|
|
|
|
"Service with a check",
|
2018-10-01 15:05:57 +00:00
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
|
|
|
Check: structs.CheckType{
|
|
|
|
Name: "ping",
|
2018-10-01 02:17:45 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web",
|
|
|
|
Check: &api.AgentServiceCheck{
|
|
|
|
Name: "ping",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-11-15 15:06:33 +00:00
|
|
|
{
|
|
|
|
"Service with an unnamed check",
|
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
|
|
|
Check: structs.CheckType{
|
|
|
|
TTL: 5 * time.Second,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web",
|
|
|
|
Check: &api.AgentServiceCheck{
|
|
|
|
TTL: "5s",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Service with a zero-value check",
|
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
|
|
|
Check: structs.CheckType{},
|
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web",
|
|
|
|
Check: nil,
|
|
|
|
},
|
|
|
|
},
|
2018-10-01 02:17:45 +00:00
|
|
|
{
|
|
|
|
"Service with checks",
|
2018-10-01 15:05:57 +00:00
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web",
|
|
|
|
Checks: structs.CheckTypes{
|
|
|
|
&structs.CheckType{
|
|
|
|
Name: "ping",
|
2018-10-01 02:17:45 +00:00
|
|
|
},
|
2018-10-01 15:05:57 +00:00
|
|
|
&structs.CheckType{
|
|
|
|
Name: "pong",
|
2018-10-01 02:17:45 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web",
|
|
|
|
Checks: api.AgentServiceChecks{
|
|
|
|
&api.AgentServiceCheck{
|
|
|
|
Name: "ping",
|
|
|
|
},
|
|
|
|
&api.AgentServiceCheck{
|
|
|
|
Name: "pong",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2018-10-04 13:08:12 +00:00
|
|
|
{
|
|
|
|
"Proxy service",
|
|
|
|
&structs.ServiceDefinition{
|
|
|
|
Name: "web-proxy",
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
Tags: []string{"leader"},
|
|
|
|
Port: 1234,
|
|
|
|
Proxy: &structs.ConnectProxyConfig{
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8181,
|
|
|
|
Upstreams: structs.TestUpstreams(t),
|
2021-04-13 22:08:41 +00:00
|
|
|
Mode: structs.ProxyModeTransparent,
|
|
|
|
TransparentProxy: structs.TransparentProxyConfig{
|
|
|
|
OutboundListenerPort: 808,
|
|
|
|
},
|
2018-10-04 13:08:12 +00:00
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&api.AgentServiceRegistration{
|
|
|
|
Name: "web-proxy",
|
|
|
|
Tags: []string{"leader"},
|
|
|
|
Port: 1234,
|
|
|
|
Kind: api.ServiceKindConnectProxy,
|
|
|
|
Proxy: &api.AgentServiceConnectProxyConfig{
|
|
|
|
DestinationServiceID: "web1",
|
|
|
|
DestinationServiceName: "web",
|
|
|
|
LocalServiceAddress: "127.0.0.1",
|
|
|
|
LocalServicePort: 8181,
|
|
|
|
Upstreams: structs.TestUpstreams(t).ToAPI(),
|
2021-04-13 22:08:41 +00:00
|
|
|
Mode: api.ProxyModeTransparent,
|
|
|
|
TransparentProxy: &api.TransparentProxyConfig{
|
|
|
|
OutboundListenerPort: 808,
|
|
|
|
},
|
2018-10-04 13:08:12 +00:00
|
|
|
Config: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2018-09-28 06:52:17 +00:00
|
|
|
}
|
|
|
|
|
2018-10-04 13:08:12 +00:00
|
|
|
for _, tt := range cases {
|
|
|
|
// Capture the loop variable locally otherwise parallel will cause us to run
|
|
|
|
// N copies of the last test case but with different names!!
|
|
|
|
tc := tt
|
2018-09-28 06:52:17 +00:00
|
|
|
t.Run(tc.Name, func(t *testing.T) {
|
2018-10-02 19:45:00 +00:00
|
|
|
t.Parallel()
|
2018-09-28 06:52:17 +00:00
|
|
|
require := require.New(t)
|
2018-10-01 15:05:57 +00:00
|
|
|
actual, err := serviceToAgentService(tc.Input)
|
2018-09-28 06:52:17 +00:00
|
|
|
require.NoError(err)
|
|
|
|
require.Equal(tc.Output, actual)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|