2019-03-22 19:37:14 +00:00
|
|
|
package xds
|
|
|
|
|
|
|
|
import (
|
2019-04-29 16:27:57 +00:00
|
|
|
"bytes"
|
2020-07-09 22:04:51 +00:00
|
|
|
"path/filepath"
|
2019-07-02 19:53:06 +00:00
|
|
|
"sort"
|
2019-03-22 19:37:14 +00:00
|
|
|
"testing"
|
2019-04-29 16:27:57 +00:00
|
|
|
"text/template"
|
2020-03-17 19:50:14 +00:00
|
|
|
"time"
|
2019-03-22 19:37:14 +00:00
|
|
|
|
2019-07-02 19:53:06 +00:00
|
|
|
envoy "github.com/envoyproxy/go-control-plane/envoy/api/v2"
|
2020-09-02 21:13:50 +00:00
|
|
|
"github.com/golang/protobuf/ptypes/wrappers"
|
2019-03-22 19:37:14 +00:00
|
|
|
"github.com/hashicorp/consul/agent/proxycfg"
|
2019-07-02 13:43:35 +00:00
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2020-07-31 20:52:49 +00:00
|
|
|
"github.com/hashicorp/consul/agent/xds/proxysupport"
|
2020-01-28 23:50:41 +00:00
|
|
|
"github.com/hashicorp/consul/sdk/testutil"
|
2019-06-18 00:52:01 +00:00
|
|
|
testinf "github.com/mitchellh/go-testing-interface"
|
2019-04-29 16:27:57 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2019-03-22 19:37:14 +00:00
|
|
|
)
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
func TestClustersFromSnapshot(t *testing.T) {
|
|
|
|
|
2019-03-22 19:37:14 +00:00
|
|
|
tests := []struct {
|
2019-06-18 00:52:01 +00:00
|
|
|
name string
|
|
|
|
create func(t testinf.T) *proxycfg.ConfigSnapshot
|
2019-04-29 16:27:57 +00:00
|
|
|
// Setup is called before the test starts. It is passed the snapshot from
|
2019-06-18 00:52:01 +00:00
|
|
|
// create func and is allowed to modify it in any way to setup the
|
2019-04-29 16:27:57 +00:00
|
|
|
// test input.
|
|
|
|
setup func(snap *proxycfg.ConfigSnapshot)
|
|
|
|
overrideGoldenName string
|
2019-03-22 19:37:14 +00:00
|
|
|
}{
|
|
|
|
{
|
2019-06-18 00:52:01 +00:00
|
|
|
name: "defaults",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
|
|
|
setup: nil, // Default snapshot
|
2019-04-29 16:27:57 +00:00
|
|
|
},
|
|
|
|
{
|
2019-06-18 00:52:01 +00:00
|
|
|
name: "custom-local-app",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Config["envoy_local_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "mylocal",
|
|
|
|
IncludeType: false,
|
|
|
|
})
|
2019-03-22 19:37:14 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2019-04-29 16:27:57 +00:00
|
|
|
name: "custom-local-app-typed",
|
2019-06-18 00:52:01 +00:00
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
overrideGoldenName: "custom-local-app",
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Config["envoy_local_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "mylocal",
|
|
|
|
IncludeType: true,
|
|
|
|
})
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2019-06-18 00:52:01 +00:00
|
|
|
name: "custom-upstream",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "myservice",
|
|
|
|
IncludeType: false,
|
|
|
|
})
|
|
|
|
},
|
|
|
|
},
|
2019-08-22 20:11:56 +00:00
|
|
|
{
|
|
|
|
name: "custom-upstream-default-chain",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainDefault,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "myservice",
|
|
|
|
IncludeType: false,
|
|
|
|
})
|
|
|
|
},
|
|
|
|
},
|
2019-04-29 16:27:57 +00:00
|
|
|
{
|
|
|
|
name: "custom-upstream-typed",
|
2019-06-18 00:52:01 +00:00
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
overrideGoldenName: "custom-upstream",
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "myservice",
|
|
|
|
IncludeType: true,
|
|
|
|
})
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "custom-upstream-ignores-tls",
|
2019-06-18 00:52:01 +00:00
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
overrideGoldenName: "custom-upstream", // should be the same
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
|
|
|
customAppClusterJSON(t, customClusterJSONOptions{
|
|
|
|
Name: "myservice",
|
|
|
|
IncludeType: true,
|
|
|
|
// Attempt to override the TLS context should be ignored
|
|
|
|
TLSContext: `{"commonTlsContext": {}}`,
|
|
|
|
})
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2019-06-18 00:52:01 +00:00
|
|
|
name: "custom-timeouts",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
2019-04-29 16:27:57 +00:00
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Config["local_connect_timeout_ms"] = 1234
|
|
|
|
snap.Proxy.Upstreams[0].Config["connect_timeout_ms"] = 2345
|
2019-03-22 19:37:14 +00:00
|
|
|
},
|
|
|
|
},
|
2019-12-03 20:13:33 +00:00
|
|
|
{
|
|
|
|
name: "custom-limits-max-connections-only",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
for i := range snap.Proxy.Upstreams {
|
|
|
|
// We check if Config is nil because the prepared_query upstream is
|
|
|
|
// initialized without a Config map. Use Upstreams[i] syntax to
|
|
|
|
// modify the actual ConfigSnapshot instead of copying the Upstream
|
|
|
|
// in the range.
|
|
|
|
if snap.Proxy.Upstreams[i].Config == nil {
|
|
|
|
snap.Proxy.Upstreams[i].Config = map[string]interface{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
snap.Proxy.Upstreams[i].Config["limits"] = map[string]interface{}{
|
|
|
|
"max_connections": 500,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "custom-limits-set-to-zero",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
for i := range snap.Proxy.Upstreams {
|
|
|
|
if snap.Proxy.Upstreams[i].Config == nil {
|
|
|
|
snap.Proxy.Upstreams[i].Config = map[string]interface{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
snap.Proxy.Upstreams[i].Config["limits"] = map[string]interface{}{
|
|
|
|
"max_connections": 0,
|
|
|
|
"max_pending_requests": 0,
|
|
|
|
"max_concurrent_requests": 0,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "custom-limits",
|
|
|
|
create: proxycfg.TestConfigSnapshot,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
for i := range snap.Proxy.Upstreams {
|
|
|
|
if snap.Proxy.Upstreams[i].Config == nil {
|
|
|
|
snap.Proxy.Upstreams[i].Config = map[string]interface{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
snap.Proxy.Upstreams[i].Config["limits"] = map[string]interface{}{
|
|
|
|
"max_connections": 500,
|
|
|
|
"max_pending_requests": 600,
|
|
|
|
"max_concurrent_requests": 700,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2019-07-12 19:16:21 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-with-chain",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChain,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-08-19 17:19:44 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-with-chain-external-sni",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainExternalSNI,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-08-02 03:03:34 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-with-chain-and-overrides",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithOverrides,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-07-12 19:16:21 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-with-chain-and-failover",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithFailover,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-08-05 18:30:35 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-failover-through-remote-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithFailoverThroughRemoteGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-failover-through-remote-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithFailoverThroughRemoteGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-double-failover-through-remote-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithDoubleFailoverThroughRemoteGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-double-failover-through-remote-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithDoubleFailoverThroughRemoteGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-failover-through-local-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithFailoverThroughLocalGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-failover-through-local-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithFailoverThroughLocalGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-double-failover-through-local-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithDoubleFailoverThroughLocalGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "connect-proxy-with-tcp-chain-double-failover-through-local-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithDoubleFailoverThroughLocalGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-07-12 19:16:21 +00:00
|
|
|
{
|
|
|
|
name: "splitter-with-resolver-redirect",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChain_SplitterWithResolverRedirectMultiDC,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
{
|
|
|
|
name: "connect-proxy-lb-in-resolver",
|
|
|
|
create: proxycfg.TestConfigSnapshotDiscoveryChainWithLB,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-09-26 02:55:52 +00:00
|
|
|
{
|
|
|
|
name: "expose-paths-local-app-paths",
|
|
|
|
create: proxycfg.TestConfigSnapshotExposeConfig,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "expose-paths-new-cluster-http2",
|
|
|
|
create: proxycfg.TestConfigSnapshotExposeConfig,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.Proxy.Expose.Paths[1] = structs.ExposePath{
|
|
|
|
LocalPathPort: 9090,
|
|
|
|
Path: "/grpc.health.v1.Health/Check",
|
|
|
|
ListenerPort: 21501,
|
|
|
|
Protocol: "http2",
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-04-02 07:35:04 +00:00
|
|
|
{
|
|
|
|
name: "expose-paths-grpc-new-cluster-http1",
|
|
|
|
create: proxycfg.TestConfigSnapshotGRPCExposeHTTP1,
|
|
|
|
},
|
2019-06-18 00:52:01 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-03-09 20:59:02 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-using-federation-states",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGatewayUsingFederationStates,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-10-17 21:46:49 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-no-services",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGatewayNoServices,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-07-02 13:43:35 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-service-subsets",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.MeshGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
2020-06-16 17:19:31 +00:00
|
|
|
structs.NewServiceName("bar", nil): {
|
2019-07-02 13:43:35 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "bar",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
2020-06-16 17:19:31 +00:00
|
|
|
"v1": {
|
2019-07-02 13:43:35 +00:00
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
2020-06-16 17:19:31 +00:00
|
|
|
"v2": {
|
2019-07-02 13:43:35 +00:00
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-02-19 16:57:55 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-ignore-extra-resolvers",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.MeshGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
2020-06-16 17:19:31 +00:00
|
|
|
structs.NewServiceName("bar", nil): {
|
2020-02-19 16:57:55 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "bar",
|
|
|
|
DefaultSubset: "v2",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
2020-06-16 17:19:31 +00:00
|
|
|
"v1": {
|
2020-02-19 16:57:55 +00:00
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
2020-06-16 17:19:31 +00:00
|
|
|
"v2": {
|
2020-02-19 16:57:55 +00:00
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-06-16 17:19:31 +00:00
|
|
|
structs.NewServiceName("notfound", nil): {
|
2020-02-19 16:57:55 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "notfound",
|
|
|
|
DefaultSubset: "v2",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
2020-06-16 17:19:31 +00:00
|
|
|
"v1": {
|
2020-02-19 16:57:55 +00:00
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
2020-06-16 17:19:31 +00:00
|
|
|
"v2": {
|
2020-02-19 16:57:55 +00:00
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-03-17 19:50:14 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-service-timeouts",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.MeshGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
2020-06-16 17:19:31 +00:00
|
|
|
structs.NewServiceName("bar", nil): {
|
2020-03-17 19:50:14 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "bar",
|
|
|
|
ConnectTimeout: 10 * time.Second,
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
2020-06-16 17:19:31 +00:00
|
|
|
"v1": {
|
2020-03-17 19:50:14 +00:00
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
2020-06-16 17:19:31 +00:00
|
|
|
"v2": {
|
2020-03-17 19:50:14 +00:00
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
{
|
|
|
|
name: "mesh-gateway-non-hash-lb-injected",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.MeshGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("bar", nil): {
|
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "bar",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
2020-09-02 15:10:50 +00:00
|
|
|
LoadBalancer: &structs.LoadBalancer{
|
2020-09-02 21:13:50 +00:00
|
|
|
EnvoyConfig: &structs.EnvoyLBConfig{
|
2020-09-02 15:10:50 +00:00
|
|
|
Policy: "least_request",
|
|
|
|
LeastRequestConfig: &structs.LeastRequestConfig{
|
|
|
|
ChoiceCount: 5,
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "mesh-gateway-hash-lb-ignored",
|
|
|
|
create: proxycfg.TestConfigSnapshotMeshGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.MeshGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("bar", nil): {
|
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "bar",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
2020-09-02 15:10:50 +00:00
|
|
|
LoadBalancer: &structs.LoadBalancer{
|
2020-09-02 21:13:50 +00:00
|
|
|
EnvoyConfig: &structs.EnvoyLBConfig{
|
2020-09-02 15:10:50 +00:00
|
|
|
Policy: "ring_hash",
|
|
|
|
RingHashConfig: &structs.RingHashConfig{
|
|
|
|
MinimumRingSize: 20,
|
|
|
|
MaximumRingSize: 50,
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-04-16 21:00:48 +00:00
|
|
|
{
|
|
|
|
name: "ingress-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-gateway-no-services",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressGatewayNoServices,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-04-14 21:30:00 +00:00
|
|
|
{
|
|
|
|
name: "ingress-with-chain",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngress,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-chain-external-sni",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressExternalSNI,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-chain-and-overrides",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithOverrides,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-chain-and-failover",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithFailover,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-failover-through-remote-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithFailoverThroughRemoteGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-failover-through-remote-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithFailoverThroughRemoteGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-double-failover-through-remote-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithDoubleFailoverThroughRemoteGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-double-failover-through-remote-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithDoubleFailoverThroughRemoteGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-failover-through-local-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithFailoverThroughLocalGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-failover-through-local-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithFailoverThroughLocalGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-double-failover-through-local-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithDoubleFailoverThroughLocalGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-with-tcp-chain-double-failover-through-local-gateway-triggered",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithDoubleFailoverThroughLocalGatewayTriggered,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ingress-splitter-with-resolver-redirect",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngress_SplitterWithResolverRedirectMultiDC,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
{
|
|
|
|
name: "ingress-lb-in-resolver",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngressWithLB,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-04-13 16:33:01 +00:00
|
|
|
{
|
|
|
|
name: "terminating-gateway",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGateway,
|
|
|
|
setup: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "terminating-gateway-no-services",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGatewayNoServices,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2020-04-14 14:59:23 +00:00
|
|
|
{
|
|
|
|
name: "terminating-gateway-service-subsets",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.TerminatingGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("web", nil): {
|
2020-04-14 14:59:23 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "web",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-06-19 19:31:39 +00:00
|
|
|
structs.NewServiceName("cache", nil): {
|
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "cache",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"prod": {
|
|
|
|
Filter: "Service.Meta.Env == prod",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-04-14 14:59:23 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-06-03 21:28:45 +00:00
|
|
|
{
|
|
|
|
name: "terminating-gateway-hostname-service-subsets",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.TerminatingGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("api", nil): {
|
2020-06-03 21:28:45 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "api",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"alt": {
|
|
|
|
Filter: "Service.Meta.domain == alt",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-06-19 19:31:39 +00:00
|
|
|
structs.NewServiceName("cache", nil): {
|
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "cache",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"prod": {
|
|
|
|
Filter: "Service.Meta.Env == prod",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-06-03 21:28:45 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-04-14 14:59:23 +00:00
|
|
|
{
|
|
|
|
name: "terminating-gateway-ignore-extra-resolvers",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
2020-06-12 14:57:41 +00:00
|
|
|
snap.TerminatingGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("web", nil): {
|
2020-04-14 14:59:23 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "web",
|
|
|
|
DefaultSubset: "v2",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2020-06-12 14:57:41 +00:00
|
|
|
structs.NewServiceName("notfound", nil): {
|
2020-04-14 14:59:23 +00:00
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "notfound",
|
|
|
|
DefaultSubset: "v2",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
{
|
|
|
|
name: "terminating-gateway-lb-config",
|
|
|
|
create: proxycfg.TestConfigSnapshotTerminatingGateway,
|
|
|
|
setup: func(snap *proxycfg.ConfigSnapshot) {
|
|
|
|
snap.TerminatingGateway.ServiceResolvers = map[structs.ServiceName]*structs.ServiceResolverConfigEntry{
|
|
|
|
structs.NewServiceName("web", nil): {
|
|
|
|
Kind: structs.ServiceResolver,
|
|
|
|
Name: "web",
|
|
|
|
DefaultSubset: "v2",
|
|
|
|
Subsets: map[string]structs.ServiceResolverSubset{
|
|
|
|
"v1": {
|
|
|
|
Filter: "Service.Meta.Version == 1",
|
|
|
|
},
|
|
|
|
"v2": {
|
|
|
|
Filter: "Service.Meta.Version == 2",
|
|
|
|
OnlyPassing: true,
|
|
|
|
},
|
|
|
|
},
|
2020-09-02 15:10:50 +00:00
|
|
|
LoadBalancer: &structs.LoadBalancer{
|
2020-09-02 21:13:50 +00:00
|
|
|
EnvoyConfig: &structs.EnvoyLBConfig{
|
2020-09-02 15:10:50 +00:00
|
|
|
Policy: "ring_hash",
|
|
|
|
RingHashConfig: &structs.RingHashConfig{
|
|
|
|
MinimumRingSize: 20,
|
|
|
|
MaximumRingSize: 50,
|
|
|
|
},
|
2020-08-28 20:27:40 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
2020-04-21 21:06:23 +00:00
|
|
|
{
|
|
|
|
name: "ingress-multiple-listeners-duplicate-service",
|
|
|
|
create: proxycfg.TestConfigSnapshotIngress_MultipleListenersDuplicateService,
|
|
|
|
setup: nil,
|
|
|
|
},
|
2019-03-22 19:37:14 +00:00
|
|
|
}
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-31 20:52:49 +00:00
|
|
|
for _, envoyVersion := range proxysupport.EnvoyVersions {
|
|
|
|
sf, err := determineSupportedProxyFeaturesFromString(envoyVersion)
|
|
|
|
require.NoError(t, err)
|
2020-07-09 22:04:51 +00:00
|
|
|
t.Run("envoy-"+envoyVersion, func(t *testing.T) {
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
require := require.New(t)
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
// Sanity check default with no overrides first
|
|
|
|
snap := tt.create(t)
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
// We need to replace the TLS certs with deterministic ones to make golden
|
|
|
|
// files workable. Note we don't update these otherwise they'd change
|
|
|
|
// golder files for every test case and so not be any use!
|
|
|
|
setupTLSRootsAndLeaf(t, snap)
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
if tt.setup != nil {
|
|
|
|
tt.setup(snap)
|
|
|
|
}
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
// Need server just for logger dependency
|
|
|
|
logger := testutil.Logger(t)
|
|
|
|
s := Server{
|
|
|
|
Logger: logger,
|
|
|
|
}
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
cInfo := connectionInfo{
|
|
|
|
Token: "my-token",
|
|
|
|
ProxyFeatures: sf,
|
|
|
|
}
|
|
|
|
clusters, err := s.clustersFromSnapshot(cInfo, snap)
|
|
|
|
require.NoError(err)
|
|
|
|
sort.Slice(clusters, func(i, j int) bool {
|
|
|
|
return clusters[i].(*envoy.Cluster).Name < clusters[j].(*envoy.Cluster).Name
|
|
|
|
})
|
|
|
|
r, err := createResponse(ClusterType, "00000001", "00000001", clusters)
|
|
|
|
require.NoError(err)
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
gotJSON := responseToJSON(t, r)
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
gName := tt.name
|
|
|
|
if tt.overrideGoldenName != "" {
|
|
|
|
gName = tt.overrideGoldenName
|
|
|
|
}
|
2019-03-22 19:37:14 +00:00
|
|
|
|
2020-07-09 22:04:51 +00:00
|
|
|
require.JSONEq(goldenEnvoy(t, filepath.Join("clusters", gName), envoyVersion, gotJSON), gotJSON)
|
|
|
|
})
|
|
|
|
}
|
2019-03-22 19:37:14 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-04-29 16:27:57 +00:00
|
|
|
|
2020-06-23 17:18:22 +00:00
|
|
|
func expectClustersJSONResources(snap *proxycfg.ConfigSnapshot) map[string]string {
|
2019-04-29 16:27:57 +00:00
|
|
|
return map[string]string{
|
|
|
|
"local_app": `
|
|
|
|
{
|
|
|
|
"@type": "type.googleapis.com/envoy.api.v2.Cluster",
|
|
|
|
"name": "local_app",
|
2019-06-07 12:10:43 +00:00
|
|
|
"type": "STATIC",
|
2019-04-29 16:27:57 +00:00
|
|
|
"connectTimeout": "5s",
|
|
|
|
"loadAssignment": {
|
|
|
|
"clusterName": "local_app",
|
|
|
|
"endpoints": [
|
|
|
|
{
|
|
|
|
"lbEndpoints": [
|
|
|
|
{
|
|
|
|
"endpoint": {
|
|
|
|
"address": {
|
|
|
|
"socketAddress": {
|
|
|
|
"address": "127.0.0.1",
|
|
|
|
"portValue": 8080
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
"db": `
|
|
|
|
{
|
|
|
|
"@type": "type.googleapis.com/envoy.api.v2.Cluster",
|
2019-07-08 11:48:48 +00:00
|
|
|
"name": "db.default.dc1.internal.11111111-2222-3333-4444-555555555555.consul",
|
2019-04-29 16:27:57 +00:00
|
|
|
"type": "EDS",
|
|
|
|
"edsClusterConfig": {
|
|
|
|
"edsConfig": {
|
|
|
|
"ads": {
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"outlierDetection": {
|
|
|
|
|
2019-12-03 20:13:33 +00:00
|
|
|
},
|
|
|
|
"circuitBreakers": {
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
},
|
2019-08-22 20:11:56 +00:00
|
|
|
"altStatName": "db.default.dc1.internal.11111111-2222-3333-4444-555555555555.consul",
|
|
|
|
"commonLbConfig": {
|
|
|
|
"healthyPanicThreshold": {}
|
|
|
|
},
|
|
|
|
"connectTimeout": "5s",
|
2020-06-23 17:18:22 +00:00
|
|
|
"tlsContext": ` + expectedUpstreamTLSContextJSON(snap, "db.default.dc1.internal.11111111-2222-3333-4444-555555555555.consul") + `
|
2019-04-29 16:27:57 +00:00
|
|
|
}`,
|
|
|
|
"prepared_query:geo-cache": `
|
|
|
|
{
|
|
|
|
"@type": "type.googleapis.com/envoy.api.v2.Cluster",
|
2019-07-08 11:48:48 +00:00
|
|
|
"name": "geo-cache.default.dc1.query.11111111-2222-3333-4444-555555555555.consul",
|
2019-04-29 16:27:57 +00:00
|
|
|
"type": "EDS",
|
|
|
|
"edsClusterConfig": {
|
|
|
|
"edsConfig": {
|
|
|
|
"ads": {
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"outlierDetection": {
|
|
|
|
|
2019-12-03 20:13:33 +00:00
|
|
|
},
|
|
|
|
"circuitBreakers": {
|
|
|
|
|
2019-04-29 16:27:57 +00:00
|
|
|
},
|
|
|
|
"connectTimeout": "5s",
|
2020-06-23 17:18:22 +00:00
|
|
|
"tlsContext": ` + expectedUpstreamTLSContextJSON(snap, "geo-cache.default.dc1.query.11111111-2222-3333-4444-555555555555.consul") + `
|
2019-04-29 16:27:57 +00:00
|
|
|
}`,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-23 17:18:22 +00:00
|
|
|
func expectClustersJSONFromResources(snap *proxycfg.ConfigSnapshot, v, n uint64, resourcesJSON map[string]string) string {
|
2019-04-29 16:27:57 +00:00
|
|
|
resJSON := ""
|
|
|
|
|
|
|
|
// Sort resources into specific order because that matters in JSONEq
|
|
|
|
// comparison later.
|
|
|
|
keyOrder := []string{"local_app"}
|
|
|
|
for _, u := range snap.Proxy.Upstreams {
|
|
|
|
keyOrder = append(keyOrder, u.Identifier())
|
|
|
|
}
|
|
|
|
for _, k := range keyOrder {
|
|
|
|
j, ok := resourcesJSON[k]
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if resJSON != "" {
|
|
|
|
resJSON += ",\n"
|
|
|
|
}
|
|
|
|
resJSON += j
|
|
|
|
}
|
|
|
|
|
|
|
|
return `{
|
|
|
|
"versionInfo": "` + hexString(v) + `",
|
|
|
|
"resources": [` + resJSON + `],
|
|
|
|
"typeUrl": "type.googleapis.com/envoy.api.v2.Cluster",
|
|
|
|
"nonce": "` + hexString(n) + `"
|
|
|
|
}`
|
|
|
|
}
|
|
|
|
|
2020-06-23 17:18:22 +00:00
|
|
|
func expectClustersJSON(snap *proxycfg.ConfigSnapshot, v, n uint64) string {
|
|
|
|
return expectClustersJSONFromResources(snap, v, n, expectClustersJSONResources(snap))
|
2019-04-29 16:27:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type customClusterJSONOptions struct {
|
|
|
|
Name string
|
|
|
|
IncludeType bool
|
|
|
|
TLSContext string
|
|
|
|
}
|
|
|
|
|
|
|
|
var customAppClusterJSONTpl = `{
|
|
|
|
{{ if .IncludeType -}}
|
|
|
|
"@type": "type.googleapis.com/envoy.api.v2.Cluster",
|
|
|
|
{{- end }}
|
|
|
|
{{ if .TLSContext -}}
|
|
|
|
"tlsContext": {{ .TLSContext }},
|
|
|
|
{{- end }}
|
|
|
|
"name": "{{ .Name }}",
|
2019-08-22 20:11:56 +00:00
|
|
|
"connectTimeout": "15s",
|
2019-04-29 16:27:57 +00:00
|
|
|
"hosts": [
|
|
|
|
{
|
|
|
|
"socketAddress": {
|
2020-08-28 20:27:40 +00:00
|
|
|
"address": "127.0.0.1",
|
2019-04-29 16:27:57 +00:00
|
|
|
"portValue": 8080
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}`
|
|
|
|
|
|
|
|
var customAppClusterJSONTemplate = template.Must(template.New("").Parse(customAppClusterJSONTpl))
|
|
|
|
|
|
|
|
func customAppClusterJSON(t *testing.T, opts customClusterJSONOptions) string {
|
|
|
|
t.Helper()
|
|
|
|
var buf bytes.Buffer
|
|
|
|
err := customAppClusterJSONTemplate.Execute(&buf, opts)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return buf.String()
|
|
|
|
}
|
2020-04-16 21:00:48 +00:00
|
|
|
|
|
|
|
func setupTLSRootsAndLeaf(t *testing.T, snap *proxycfg.ConfigSnapshot) {
|
|
|
|
if snap.Leaf() != nil {
|
|
|
|
switch snap.Kind {
|
|
|
|
case structs.ServiceKindConnectProxy:
|
2020-07-09 22:04:51 +00:00
|
|
|
snap.ConnectProxy.Leaf.CertPEM = golden(t, "test-leaf-cert", "", "")
|
|
|
|
snap.ConnectProxy.Leaf.PrivateKeyPEM = golden(t, "test-leaf-key", "", "")
|
2020-04-16 21:00:48 +00:00
|
|
|
case structs.ServiceKindIngressGateway:
|
2020-07-09 22:04:51 +00:00
|
|
|
snap.IngressGateway.Leaf.CertPEM = golden(t, "test-leaf-cert", "", "")
|
|
|
|
snap.IngressGateway.Leaf.PrivateKeyPEM = golden(t, "test-leaf-key", "", "")
|
2020-04-16 21:00:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if snap.Roots != nil {
|
2020-07-09 22:04:51 +00:00
|
|
|
snap.Roots.Roots[0].RootCert = golden(t, "test-root-cert", "", "")
|
2020-04-16 21:00:48 +00:00
|
|
|
}
|
|
|
|
}
|
2020-09-02 21:13:50 +00:00
|
|
|
|
|
|
|
func TestEnvoyLBConfig_InjectToCluster(t *testing.T) {
|
|
|
|
var tests = []struct {
|
|
|
|
name string
|
|
|
|
lb *structs.EnvoyLBConfig
|
|
|
|
expected envoy.Cluster
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "skip empty",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: "",
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "round robin",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: structs.LBPolicyRoundRobin,
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{LbPolicy: envoy.Cluster_ROUND_ROBIN},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "random",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: structs.LBPolicyRandom,
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{LbPolicy: envoy.Cluster_RANDOM},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "maglev",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: structs.LBPolicyMaglev,
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{LbPolicy: envoy.Cluster_MAGLEV},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "ring_hash",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: structs.LBPolicyRingHash,
|
|
|
|
RingHashConfig: &structs.RingHashConfig{
|
|
|
|
MinimumRingSize: 3,
|
|
|
|
MaximumRingSize: 7,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{
|
|
|
|
LbPolicy: envoy.Cluster_RING_HASH,
|
|
|
|
LbConfig: &envoy.Cluster_RingHashLbConfig_{
|
|
|
|
RingHashLbConfig: &envoy.Cluster_RingHashLbConfig{
|
|
|
|
MinimumRingSize: &wrappers.UInt64Value{Value: 3},
|
|
|
|
MaximumRingSize: &wrappers.UInt64Value{Value: 7},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "least_request",
|
|
|
|
lb: &structs.EnvoyLBConfig{
|
|
|
|
Policy: "least_request",
|
|
|
|
LeastRequestConfig: &structs.LeastRequestConfig{
|
|
|
|
ChoiceCount: 3,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: envoy.Cluster{
|
|
|
|
LbPolicy: envoy.Cluster_LEAST_REQUEST,
|
|
|
|
LbConfig: &envoy.Cluster_LeastRequestLbConfig_{
|
|
|
|
LeastRequestLbConfig: &envoy.Cluster_LeastRequestLbConfig{
|
|
|
|
ChoiceCount: &wrappers.UInt32Value{Value: 3},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range tests {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
var c envoy.Cluster
|
|
|
|
err := injectLBToCluster(tc.lb, &c)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Equal(t, tc.expected, c)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|