2019-04-29 16:27:57 +00:00
|
|
|
package xds
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
2020-04-27 18:53:21 +00:00
|
|
|
"time"
|
2019-04-29 16:27:57 +00:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/require"
|
2021-02-22 21:00:15 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2019-04-29 16:27:57 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestParseProxyConfig(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
input map[string]interface{}
|
|
|
|
want ProxyConfig
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "defaults - nil",
|
|
|
|
input: nil,
|
|
|
|
want: ProxyConfig{
|
|
|
|
Protocol: "tcp",
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - empty",
|
|
|
|
input: map[string]interface{}{},
|
|
|
|
want: ProxyConfig{
|
|
|
|
Protocol: "tcp",
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - other stuff",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"envoy_foo": "envoy_bar",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
Protocol: "tcp",
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "protocol override",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
Protocol: "http",
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "protocol uppercase override",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"protocol": "HTTP",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
Protocol: "http",
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
2019-07-05 15:06:47 +00:00
|
|
|
{
|
|
|
|
name: "bind address override, string",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"bind_address": "127.0.0.2",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
BindAddress: "127.0.0.2",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "bind port override, string",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"bind_port": "8888",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
BindPort: 8888,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "bind port override, int",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"bind_port": 8889,
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
BindPort: 8889,
|
|
|
|
},
|
|
|
|
},
|
2019-04-29 16:27:57 +00:00
|
|
|
{
|
|
|
|
name: "local connect timeout override, string",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_connect_timeout_ms": "1000",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local connect timeout override, float ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_connect_timeout_ms": float64(1000.0),
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local connect timeout override, int ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_connect_timeout_ms": 1000,
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
2021-01-25 19:50:00 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local request timeout override, string",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_request_timeout_ms": "1000",
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
LocalRequestTimeoutMs: intPointer(1000),
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local request timeout override, float ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_request_timeout_ms": float64(1000.0),
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
LocalRequestTimeoutMs: intPointer(1000),
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local request timeout override, int ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"local_request_timeout_ms": 1000,
|
|
|
|
},
|
|
|
|
want: ProxyConfig{
|
|
|
|
LocalConnectTimeoutMs: 5000,
|
|
|
|
LocalRequestTimeoutMs: intPointer(1000),
|
|
|
|
Protocol: "tcp",
|
2019-04-29 16:27:57 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got, err := ParseProxyConfig(tt.input)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, tt.want, got)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestParseUpstreamConfig(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
input map[string]interface{}
|
|
|
|
want UpstreamConfig
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "defaults - nil",
|
|
|
|
input: nil,
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - empty",
|
|
|
|
input: map[string]interface{}{},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - other stuff",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"envoy_foo": "envoy_bar",
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "protocol override",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "http",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect timeout override, string",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"connect_timeout_ms": "1000",
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect timeout override, float ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"connect_timeout_ms": float64(1000.0),
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect timeout override, int ",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"connect_timeout_ms": 1000,
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 1000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
},
|
|
|
|
},
|
2019-12-03 20:13:33 +00:00
|
|
|
{
|
|
|
|
name: "connect limits map",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"limits": map[string]interface{}{
|
|
|
|
"max_connections": 50,
|
|
|
|
"max_pending_requests": 60,
|
|
|
|
"max_concurrent_requests": 70,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
Limits: UpstreamLimits{
|
|
|
|
MaxConnections: intPointer(50),
|
|
|
|
MaxPendingRequests: intPointer(60),
|
|
|
|
MaxConcurrentRequests: intPointer(70),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect limits map zero",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"limits": map[string]interface{}{
|
|
|
|
"max_connections": 0,
|
|
|
|
"max_pending_requests": 0,
|
|
|
|
"max_concurrent_requests": 0,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
Limits: UpstreamLimits{
|
|
|
|
MaxConnections: intPointer(0),
|
|
|
|
MaxPendingRequests: intPointer(0),
|
|
|
|
MaxConcurrentRequests: intPointer(0),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-04-27 18:53:21 +00:00
|
|
|
{
|
|
|
|
name: "passive health check map",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"passive_health_check": map[string]interface{}{
|
2020-05-05 20:17:24 +00:00
|
|
|
"interval": "22s",
|
2020-04-27 18:53:21 +00:00
|
|
|
"max_failures": 7,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
want: UpstreamConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
Protocol: "tcp",
|
|
|
|
PassiveHealthCheck: PassiveHealthCheck{
|
|
|
|
Interval: 22 * time.Second,
|
|
|
|
MaxFailures: 7,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-04-29 16:27:57 +00:00
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got, err := ParseUpstreamConfig(tt.input)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, tt.want, got)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-12-03 20:13:33 +00:00
|
|
|
|
2020-03-26 16:20:56 +00:00
|
|
|
func TestParseGatewayConfig(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
input map[string]interface{}
|
|
|
|
want GatewayConfig
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "defaults - nil",
|
|
|
|
input: nil,
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - empty",
|
|
|
|
input: map[string]interface{}{},
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "defaults - other stuff",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"foo": "bar",
|
|
|
|
"envoy_foo": "envoy_bar",
|
|
|
|
},
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "kitchen sink",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"envoy_gateway_bind_tagged_addresses": true,
|
|
|
|
"envoy_gateway_bind_addresses": map[string]structs.ServiceAddress{"foo": {Address: "127.0.0.1", Port: 80}},
|
|
|
|
"envoy_gateway_no_default_bind": true,
|
2020-06-03 21:28:45 +00:00
|
|
|
"envoy_dns_discovery_type": "StRiCt_DnS",
|
2020-03-26 16:20:56 +00:00
|
|
|
"connect_timeout_ms": 10,
|
|
|
|
},
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 10,
|
|
|
|
BindTaggedAddresses: true,
|
|
|
|
NoDefaultBind: true,
|
|
|
|
BindAddresses: map[string]structs.ServiceAddress{"foo": {Address: "127.0.0.1", Port: 80}},
|
2020-06-03 21:28:45 +00:00
|
|
|
DNSDiscoveryType: "strict_dns",
|
2020-03-26 16:20:56 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "deprecated kitchen sink",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
"envoy_mesh_gateway_bind_tagged_addresses": true,
|
|
|
|
"envoy_mesh_gateway_bind_addresses": map[string]structs.ServiceAddress{"foo": {Address: "127.0.0.1", Port: 80}},
|
|
|
|
"envoy_mesh_gateway_no_default_bind": true,
|
|
|
|
"connect_timeout_ms": 10,
|
|
|
|
},
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 10,
|
|
|
|
BindTaggedAddresses: true,
|
|
|
|
NoDefaultBind: true,
|
|
|
|
BindAddresses: map[string]structs.ServiceAddress{"foo": {Address: "127.0.0.1", Port: 80}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "new fields override deprecated ones",
|
|
|
|
input: map[string]interface{}{
|
|
|
|
// Deprecated
|
|
|
|
"envoy_mesh_gateway_bind_tagged_addresses": true,
|
|
|
|
"envoy_mesh_gateway_bind_addresses": map[string]structs.ServiceAddress{"foo": {Address: "127.0.0.1", Port: 80}},
|
|
|
|
"envoy_mesh_gateway_no_default_bind": true,
|
|
|
|
|
|
|
|
// New
|
|
|
|
"envoy_gateway_bind_tagged_addresses": false,
|
|
|
|
"envoy_gateway_bind_addresses": map[string]structs.ServiceAddress{"bar": {Address: "127.0.0.1", Port: 8080}},
|
|
|
|
"envoy_gateway_no_default_bind": false,
|
|
|
|
},
|
|
|
|
want: GatewayConfig{
|
|
|
|
ConnectTimeoutMs: 5000,
|
|
|
|
BindTaggedAddresses: false,
|
|
|
|
NoDefaultBind: false,
|
|
|
|
BindAddresses: map[string]structs.ServiceAddress{"bar": {Address: "127.0.0.1", Port: 8080}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got, err := ParseGatewayConfig(tt.input)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, tt.want, got)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-03 20:13:33 +00:00
|
|
|
func intPointer(i int) *int {
|
|
|
|
return &i
|
|
|
|
}
|