1563 lines
40 KiB
Go
1563 lines
40 KiB
Go
package agent
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"encoding/base64"
|
|
"errors"
|
|
"io/ioutil"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/structs"
|
|
"github.com/hashicorp/consul/testutil"
|
|
"github.com/pascaldekloe/goe/verify"
|
|
)
|
|
|
|
func TestConfigEncryptBytes(t *testing.T) {
|
|
t.Parallel()
|
|
// Test with some input
|
|
src := []byte("abc")
|
|
c := &Config{
|
|
EncryptKey: base64.StdEncoding.EncodeToString(src),
|
|
}
|
|
|
|
result, err := c.EncryptBytes()
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if !bytes.Equal(src, result) {
|
|
t.Fatalf("bad: %#v", result)
|
|
}
|
|
|
|
// Test with no input
|
|
c = &Config{}
|
|
result, err = c.EncryptBytes()
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if len(result) > 0 {
|
|
t.Fatalf("bad: %#v", result)
|
|
}
|
|
}
|
|
|
|
func TestDecodeConfig(t *testing.T) {
|
|
tests := []struct {
|
|
desc string
|
|
in string
|
|
c *Config
|
|
err error
|
|
}{
|
|
// special flows
|
|
{
|
|
in: `{"bad": "no way jose"}`,
|
|
err: errors.New("Config has invalid keys: bad"),
|
|
},
|
|
|
|
// happy flows in alphabeical order
|
|
{
|
|
in: `{"acl_agent_master_token":"a"}`,
|
|
c: &Config{ACLAgentMasterToken: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_agent_token":"a"}`,
|
|
c: &Config{ACLAgentToken: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_datacenter":"a"}`,
|
|
c: &Config{ACLDatacenter: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_default_policy":"a"}`,
|
|
c: &Config{ACLDefaultPolicy: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_down_policy":"a"}`,
|
|
c: &Config{ACLDownPolicy: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_enforce_version_8":true}`,
|
|
c: &Config{ACLEnforceVersion8: Bool(true)},
|
|
},
|
|
{
|
|
in: `{"acl_master_token":"a"}`,
|
|
c: &Config{ACLMasterToken: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_replication_token":"a"}`,
|
|
c: &Config{ACLReplicationToken: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_token":"a"}`,
|
|
c: &Config{ACLToken: "a"},
|
|
},
|
|
{
|
|
in: `{"acl_ttl":"2s"}`,
|
|
c: &Config{ACLTTL: 2 * time.Second, ACLTTLRaw: "2s"},
|
|
},
|
|
{
|
|
in: `{"addresses":{"dns":"a"}}`,
|
|
c: &Config{Addresses: AddressConfig{DNS: "a"}},
|
|
},
|
|
{
|
|
in: `{"addresses":{"http":"a"}}`,
|
|
c: &Config{Addresses: AddressConfig{HTTP: "a"}},
|
|
},
|
|
{
|
|
in: `{"addresses":{"https":"a"}}`,
|
|
c: &Config{Addresses: AddressConfig{HTTPS: "a"}},
|
|
},
|
|
{
|
|
in: `{"addresses":{"rpc":"a"}}`,
|
|
c: &Config{Addresses: AddressConfig{RPC: "a"}},
|
|
},
|
|
{
|
|
in: `{"advertise_addr":"a"}`,
|
|
c: &Config{AdvertiseAddr: "a"},
|
|
},
|
|
{
|
|
in: `{"advertise_addr_wan":"a"}`,
|
|
c: &Config{AdvertiseAddrWan: "a"},
|
|
},
|
|
{
|
|
in: `{"advertise_addrs":{"rpc":"1.2.3.4:5678"}}`,
|
|
c: &Config{
|
|
AdvertiseAddrs: AdvertiseAddrsConfig{
|
|
RPC: &net.TCPAddr{IP: net.ParseIP("1.2.3.4"), Port: 5678},
|
|
RPCRaw: "1.2.3.4:5678",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
in: `{"advertise_addrs":{"serf_lan":"1.2.3.4:5678"}}`,
|
|
c: &Config{
|
|
AdvertiseAddrs: AdvertiseAddrsConfig{
|
|
SerfLan: &net.TCPAddr{IP: net.ParseIP("1.2.3.4"), Port: 5678},
|
|
SerfLanRaw: "1.2.3.4:5678",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
in: `{"advertise_addrs":{"serf_wan":"1.2.3.4:5678"}}`,
|
|
c: &Config{
|
|
AdvertiseAddrs: AdvertiseAddrsConfig{
|
|
SerfWan: &net.TCPAddr{IP: net.ParseIP("1.2.3.4"), Port: 5678},
|
|
SerfWanRaw: "1.2.3.4:5678",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
in: `{"atlas_acl_token":"a"}`,
|
|
c: &Config{DeprecatedAtlasACLToken: "a"},
|
|
},
|
|
{
|
|
in: `{"atlas_endpoint":"a"}`,
|
|
c: &Config{DeprecatedAtlasEndpoint: "a"},
|
|
},
|
|
{
|
|
in: `{"atlas_infrastructure":"a"}`,
|
|
c: &Config{DeprecatedAtlasInfrastructure: "a"},
|
|
},
|
|
{
|
|
in: `{"atlas_join":true}`,
|
|
c: &Config{DeprecatedAtlasJoin: true},
|
|
},
|
|
{
|
|
in: `{"atlas_token":"a"}`,
|
|
c: &Config{DeprecatedAtlasToken: "a"},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"cleanup_dead_servers":true}}`,
|
|
c: &Config{Autopilot: Autopilot{CleanupDeadServers: Bool(true)}},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"disable_upgrade_migration":true}}`,
|
|
c: &Config{Autopilot: Autopilot{DisableUpgradeMigration: Bool(true)}},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"last_contact_threshold":"2s"}}`,
|
|
c: &Config{Autopilot: Autopilot{LastContactThreshold: Duration(2 * time.Second), LastContactThresholdRaw: "2s"}},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"max_trailing_logs":10}}`,
|
|
c: &Config{Autopilot: Autopilot{MaxTrailingLogs: Uint64(10)}},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"server_stabilization_time":"2s"}}`,
|
|
c: &Config{Autopilot: Autopilot{ServerStabilizationTime: Duration(2 * time.Second), ServerStabilizationTimeRaw: "2s"}},
|
|
},
|
|
{
|
|
in: `{"autopilot":{"cleanup_dead_servers":true}}`,
|
|
c: &Config{Autopilot: Autopilot{CleanupDeadServers: Bool(true)}},
|
|
},
|
|
{
|
|
in: `{"bind_addr":"a"}`,
|
|
c: &Config{BindAddr: "a"},
|
|
},
|
|
{
|
|
in: `{"bootstrap":true}`,
|
|
c: &Config{Bootstrap: true},
|
|
},
|
|
{
|
|
in: `{"bootstrap_expect":3}`,
|
|
c: &Config{BootstrapExpect: 3},
|
|
},
|
|
{
|
|
in: `{"ca_file":"a"}`,
|
|
c: &Config{CAFile: "a"},
|
|
},
|
|
{
|
|
in: `{"ca_path":"a"}`,
|
|
c: &Config{CAPath: "a"},
|
|
},
|
|
{
|
|
in: `{"check_update_interval":"2s"}`,
|
|
c: &Config{CheckUpdateInterval: 2 * time.Second, CheckUpdateIntervalRaw: "2s"},
|
|
},
|
|
{
|
|
in: `{"cert_file":"a"}`,
|
|
c: &Config{CertFile: "a"},
|
|
},
|
|
{
|
|
in: `{"client_addr":"a"}`,
|
|
c: &Config{ClientAddr: "a"},
|
|
},
|
|
{
|
|
in: `{"data_dir":"a"}`,
|
|
c: &Config{DataDir: "a"},
|
|
},
|
|
{
|
|
in: `{"datacenter":"a"}`,
|
|
c: &Config{Datacenter: "a"},
|
|
},
|
|
{
|
|
in: `{"disable_coordinates":true}`,
|
|
c: &Config{DisableCoordinates: true},
|
|
},
|
|
{
|
|
in: `{"disable_host_node_id":false}`,
|
|
c: &Config{DisableHostNodeID: Bool(false)},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"allow_stale":true}}`,
|
|
c: &Config{DNSConfig: DNSConfig{AllowStale: Bool(true)}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"disable_compression":true}}`,
|
|
c: &Config{DNSConfig: DNSConfig{DisableCompression: true}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"enable_truncate":true}}`,
|
|
c: &Config{DNSConfig: DNSConfig{EnableTruncate: true}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"max_stale":"2s"}}`,
|
|
c: &Config{DNSConfig: DNSConfig{MaxStale: 2 * time.Second, MaxStaleRaw: "2s"}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"node_ttl":"2s"}}`,
|
|
c: &Config{DNSConfig: DNSConfig{NodeTTL: 2 * time.Second, NodeTTLRaw: "2s"}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"only_passing":true}}`,
|
|
c: &Config{DNSConfig: DNSConfig{OnlyPassing: true}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"recursor_timeout":"2s"}}`,
|
|
c: &Config{DNSConfig: DNSConfig{RecursorTimeout: 2 * time.Second, RecursorTimeoutRaw: "2s"}},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"service_ttl":{"*":"2s","a":"456s"}}}`,
|
|
c: &Config{
|
|
DNSConfig: DNSConfig{
|
|
ServiceTTL: map[string]time.Duration{"*": 2 * time.Second, "a": 456 * time.Second},
|
|
ServiceTTLRaw: map[string]string{"*": "2s", "a": "456s"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
in: `{"dns_config":{"udp_answer_limit":123}}`,
|
|
c: &Config{DNSConfig: DNSConfig{UDPAnswerLimit: 123}},
|
|
},
|
|
{
|
|
in: `{"disable_anonymous_signature":true}`,
|
|
c: &Config{DisableAnonymousSignature: true},
|
|
},
|
|
{
|
|
in: `{"disable_remote_exec":false}`,
|
|
c: &Config{DisableRemoteExec: Bool(false)},
|
|
},
|
|
{
|
|
in: `{"disable_update_check":true}`,
|
|
c: &Config{DisableUpdateCheck: true},
|
|
},
|
|
{
|
|
in: `{"dogstatsd_addr":"a"}`,
|
|
c: &Config{Telemetry: Telemetry{DogStatsdAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"dogstatsd_tags":["a:b","c:d"]}`,
|
|
c: &Config{Telemetry: Telemetry{DogStatsdTags: []string{"a:b", "c:d"}}},
|
|
},
|
|
{
|
|
in: `{"domain":"a"}`,
|
|
c: &Config{Domain: "a"},
|
|
},
|
|
{
|
|
in: `{"enable_debug":true}`,
|
|
c: &Config{EnableDebug: true},
|
|
},
|
|
{
|
|
in: `{"enable_syslog":true}`,
|
|
c: &Config{EnableSyslog: true},
|
|
},
|
|
{
|
|
in: `{"disable_keyring_file":true}`,
|
|
c: &Config{DisableKeyringFile: true},
|
|
},
|
|
{
|
|
in: `{"enable_script_checks":true}`,
|
|
c: &Config{EnableScriptChecks: true},
|
|
},
|
|
{
|
|
in: `{"encrypt_verify_incoming":true}`,
|
|
c: &Config{EncryptVerifyIncoming: Bool(true)},
|
|
},
|
|
{
|
|
in: `{"encrypt_verify_outgoing":true}`,
|
|
c: &Config{EncryptVerifyOutgoing: Bool(true)},
|
|
},
|
|
{
|
|
in: `{"http_config":{"block_endpoints":["a","b","c","d"]}}`,
|
|
c: &Config{HTTPConfig: HTTPConfig{BlockEndpoints: []string{"a", "b", "c", "d"}}},
|
|
},
|
|
{
|
|
in: `{"http_api_response_headers":{"a":"b","c":"d"}}`,
|
|
c: &Config{HTTPConfig: HTTPConfig{ResponseHeaders: map[string]string{"a": "b", "c": "d"}}},
|
|
},
|
|
{
|
|
in: `{"http_config":{"response_headers":{"a":"b","c":"d"}}}`,
|
|
c: &Config{HTTPConfig: HTTPConfig{ResponseHeaders: map[string]string{"a": "b", "c": "d"}}},
|
|
},
|
|
{
|
|
in: `{"key_file":"a"}`,
|
|
c: &Config{KeyFile: "a"},
|
|
},
|
|
{
|
|
in: `{"leave_on_terminate":true}`,
|
|
c: &Config{LeaveOnTerm: Bool(true)},
|
|
},
|
|
{
|
|
in: `{"log_level":"a"}`,
|
|
c: &Config{LogLevel: "a"},
|
|
},
|
|
{
|
|
in: `{"node_id":"a"}`,
|
|
c: &Config{NodeID: "a"},
|
|
},
|
|
{
|
|
in: `{"node_meta":{"a":"b","c":"d"}}`,
|
|
c: &Config{Meta: map[string]string{"a": "b", "c": "d"}},
|
|
},
|
|
{
|
|
in: `{"node_name":"a"}`,
|
|
c: &Config{NodeName: "a"},
|
|
},
|
|
{
|
|
in: `{"performance": { "raft_multiplier": 3 }}`,
|
|
c: &Config{Performance: Performance{RaftMultiplier: 3}},
|
|
},
|
|
{
|
|
in: `{"performance": { "raft_multiplier": 11 }}`,
|
|
err: errors.New("Performance.RaftMultiplier must be <= 10"),
|
|
},
|
|
{
|
|
in: `{"pid_file":"a"}`,
|
|
c: &Config{PidFile: "a"},
|
|
},
|
|
{
|
|
in: `{"ports":{"dns":1234}}`,
|
|
c: &Config{Ports: PortConfig{DNS: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"http":1234}}`,
|
|
c: &Config{Ports: PortConfig{HTTP: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"https":1234}}`,
|
|
c: &Config{Ports: PortConfig{HTTPS: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"serf_lan":1234}}`,
|
|
c: &Config{Ports: PortConfig{SerfLan: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"serf_wan":1234}}`,
|
|
c: &Config{Ports: PortConfig{SerfWan: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"server":1234}}`,
|
|
c: &Config{Ports: PortConfig{Server: 1234}},
|
|
},
|
|
{
|
|
in: `{"ports":{"rpc":1234}}`,
|
|
c: &Config{Ports: PortConfig{RPC: 1234}},
|
|
},
|
|
{
|
|
in: `{"raft_protocol":3}`,
|
|
c: &Config{RaftProtocol: 3},
|
|
},
|
|
{
|
|
in: `{"reconnect_timeout":"4h"}`,
|
|
err: errors.New("ReconnectTimeoutLan must be >= 8h0m0s"),
|
|
},
|
|
{
|
|
in: `{"reconnect_timeout":"8h"}`,
|
|
c: &Config{ReconnectTimeoutLan: 8 * time.Hour, ReconnectTimeoutLanRaw: "8h"},
|
|
},
|
|
{
|
|
in: `{"reconnect_timeout_wan":"4h"}`,
|
|
err: errors.New("ReconnectTimeoutWan must be >= 8h0m0s"),
|
|
},
|
|
{
|
|
in: `{"reconnect_timeout_wan":"8h"}`,
|
|
c: &Config{ReconnectTimeoutWan: 8 * time.Hour, ReconnectTimeoutWanRaw: "8h"},
|
|
},
|
|
{
|
|
in: `{"recursor":"a"}`,
|
|
c: &Config{DNSRecursor: "a", DNSRecursors: []string{"a"}},
|
|
},
|
|
{
|
|
in: `{"recursors":["a","b"]}`,
|
|
c: &Config{DNSRecursors: []string{"a", "b"}},
|
|
},
|
|
{
|
|
in: `{"rejoin_after_leave":true}`,
|
|
c: &Config{RejoinAfterLeave: true},
|
|
},
|
|
{
|
|
in: `{"retry_interval":"2s"}`,
|
|
c: &Config{RetryInterval: 2 * time.Second, RetryIntervalRaw: "2s"},
|
|
},
|
|
{
|
|
in: `{"retry_interval_wan":"2s"}`,
|
|
c: &Config{RetryIntervalWan: 2 * time.Second, RetryIntervalWanRaw: "2s"},
|
|
},
|
|
{
|
|
in: `{"retry_join":["a","b"]}`,
|
|
c: &Config{RetryJoin: []string{"a", "b"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"client_id":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{ClientID: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"tag_name":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{TagName: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"tag_value":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{TagValue: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"secret_access_key":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{SecretAccessKey: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"subscription_id":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{SubscriptionID: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_azure":{"tenant_id":"a"}}`,
|
|
c: &Config{RetryJoinAzure: RetryJoinAzure{TenantID: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_ec2":{"access_key_id":"a"}}`,
|
|
c: &Config{RetryJoinEC2: RetryJoinEC2{AccessKeyID: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_ec2":{"region":"a"}}`,
|
|
c: &Config{RetryJoinEC2: RetryJoinEC2{Region: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_ec2":{"tag_key":"a"}}`,
|
|
c: &Config{RetryJoinEC2: RetryJoinEC2{TagKey: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_ec2":{"tag_value":"a"}}`,
|
|
c: &Config{RetryJoinEC2: RetryJoinEC2{TagValue: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_ec2":{"secret_access_key":"a"}}`,
|
|
c: &Config{RetryJoinEC2: RetryJoinEC2{SecretAccessKey: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_gce":{"credentials_file":"a"}}`,
|
|
c: &Config{RetryJoinGCE: RetryJoinGCE{CredentialsFile: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_gce":{"project_name":"a"}}`,
|
|
c: &Config{RetryJoinGCE: RetryJoinGCE{ProjectName: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_gce":{"tag_value":"a"}}`,
|
|
c: &Config{RetryJoinGCE: RetryJoinGCE{TagValue: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_gce":{"zone_pattern":"a"}}`,
|
|
c: &Config{RetryJoinGCE: RetryJoinGCE{ZonePattern: "a"}},
|
|
},
|
|
{
|
|
in: `{"retry_join_wan":["a","b"]}`,
|
|
c: &Config{RetryJoinWan: []string{"a", "b"}},
|
|
},
|
|
{
|
|
in: `{"retry_max":123}`,
|
|
c: &Config{RetryMaxAttempts: 123},
|
|
},
|
|
{
|
|
in: `{"retry_max_wan":123}`,
|
|
c: &Config{RetryMaxAttemptsWan: 123},
|
|
},
|
|
{
|
|
in: `{"serf_lan_bind":"a"}`,
|
|
c: &Config{SerfLanBindAddr: "a"},
|
|
},
|
|
{
|
|
in: `{"serf_wan_bind":"a"}`,
|
|
c: &Config{SerfWanBindAddr: "a"},
|
|
},
|
|
{
|
|
in: `{"server":true}`,
|
|
c: &Config{Server: true},
|
|
},
|
|
{
|
|
in: `{"server_name":"a"}`,
|
|
c: &Config{ServerName: "a"},
|
|
},
|
|
{
|
|
in: `{"session_ttl_min":"2s"}`,
|
|
c: &Config{SessionTTLMin: 2 * time.Second, SessionTTLMinRaw: "2s"},
|
|
},
|
|
{
|
|
in: `{"skip_leave_on_interrupt":true}`,
|
|
c: &Config{SkipLeaveOnInt: Bool(true)},
|
|
},
|
|
{
|
|
in: `{"start_join":["a","b"]}`,
|
|
c: &Config{StartJoin: []string{"a", "b"}},
|
|
},
|
|
{
|
|
in: `{"start_join_wan":["a","b"]}`,
|
|
c: &Config{StartJoinWan: []string{"a", "b"}},
|
|
},
|
|
{
|
|
in: `{"statsd_addr":"a"}`,
|
|
c: &Config{Telemetry: Telemetry{StatsdAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"statsite_addr":"a"}`,
|
|
c: &Config{Telemetry: Telemetry{StatsiteAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"statsite_prefix":"a"}`,
|
|
c: &Config{Telemetry: Telemetry{StatsitePrefix: "a"}},
|
|
},
|
|
{
|
|
in: `{"syslog_facility":"a"}`,
|
|
c: &Config{SyslogFacility: "a"},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_api_app":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusAPIApp: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_api_token":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusAPIToken: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_api_url":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusAPIURL: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_broker_id":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusBrokerID: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_broker_select_tag":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusBrokerSelectTag: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_display_name":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckDisplayName: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_force_metric_activation":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckForceMetricActivation: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_id":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckID: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_instance_id":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckInstanceID: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_search_tag":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckSearchTag: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_check_tags":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckTags: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_submission_interval":"2s"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusSubmissionInterval: "2s"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"circonus_submission_url":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{CirconusCheckSubmissionURL: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"disable_hostname":true}}`,
|
|
c: &Config{Telemetry: Telemetry{DisableHostname: true}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"dogstatsd_addr":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{DogStatsdAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"dogstatsd_tags":["a","b"]}}`,
|
|
c: &Config{Telemetry: Telemetry{DogStatsdTags: []string{"a", "b"}}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"statsd_address":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{StatsdAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"statsite_address":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{StatsiteAddr: "a"}},
|
|
},
|
|
{
|
|
in: `{"telemetry":{"statsite_prefix":"a"}}`,
|
|
c: &Config{Telemetry: Telemetry{StatsitePrefix: "a"}},
|
|
},
|
|
{
|
|
in: `{"tls_cipher_suites":"TLS_RSA_WITH_AES_256_CBC_SHA"}`,
|
|
c: &Config{
|
|
TLSCipherSuites: []uint16{tls.TLS_RSA_WITH_AES_256_CBC_SHA},
|
|
TLSCipherSuitesRaw: "TLS_RSA_WITH_AES_256_CBC_SHA",
|
|
},
|
|
},
|
|
{
|
|
in: `{"tls_min_version":"a"}`,
|
|
c: &Config{TLSMinVersion: "a"},
|
|
},
|
|
{
|
|
in: `{"tls_prefer_server_cipher_suites":true}`,
|
|
c: &Config{TLSPreferServerCipherSuites: true},
|
|
},
|
|
{
|
|
in: `{"translate_wan_addrs":true}`,
|
|
c: &Config{TranslateWanAddrs: true},
|
|
},
|
|
{
|
|
in: `{"ui":true}`,
|
|
c: &Config{EnableUI: true},
|
|
},
|
|
{
|
|
in: `{"ui_dir":"a"}`,
|
|
c: &Config{UIDir: "a"},
|
|
},
|
|
{
|
|
in: `{"unix_sockets":{"user":"a"}}`,
|
|
c: &Config{UnixSockets: UnixSocketConfig{UnixSocketPermissions{Usr: "a"}}},
|
|
},
|
|
{
|
|
in: `{"unix_sockets":{"group":"a"}}`,
|
|
c: &Config{UnixSockets: UnixSocketConfig{UnixSocketPermissions{Grp: "a"}}},
|
|
},
|
|
{
|
|
in: `{"unix_sockets":{"mode":"a"}}`,
|
|
c: &Config{UnixSockets: UnixSocketConfig{UnixSocketPermissions{Perms: "a"}}},
|
|
},
|
|
{
|
|
in: `{"verify_incoming":true}`,
|
|
c: &Config{VerifyIncoming: true},
|
|
},
|
|
{
|
|
in: `{"verify_incoming_https":true}`,
|
|
c: &Config{VerifyIncomingHTTPS: true},
|
|
},
|
|
{
|
|
in: `{"verify_incoming_rpc":true}`,
|
|
c: &Config{VerifyIncomingRPC: true},
|
|
},
|
|
{
|
|
in: `{"verify_outgoing":true}`,
|
|
c: &Config{VerifyOutgoing: true},
|
|
},
|
|
{
|
|
in: `{"verify_server_hostname":true}`,
|
|
c: &Config{VerifyServerHostname: true},
|
|
},
|
|
{
|
|
in: `{"watches":[{"type":"a","prefix":"b","handler":"c"}]}`,
|
|
c: &Config{
|
|
Watches: []map[string]interface{}{
|
|
map[string]interface{}{
|
|
"type": "a",
|
|
"prefix": "b",
|
|
"handler": "c",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
|
|
// complex flows
|
|
{
|
|
desc: "single service with check",
|
|
in: `{
|
|
"service": {
|
|
"ID": "a",
|
|
"Name": "b",
|
|
"Tags": ["c", "d"],
|
|
"Address": "e",
|
|
"Token": "f",
|
|
"Port": 123,
|
|
"EnableTagOverride": true,
|
|
"Check": {
|
|
"CheckID": "g",
|
|
"Name": "h",
|
|
"Status": "i",
|
|
"Notes": "j",
|
|
"Script": "k",
|
|
"HTTP": "l",
|
|
"Header": {"a":["b"], "c":["d", "e"]},
|
|
"Method": "x",
|
|
"TCP": "m",
|
|
"DockerContainerID": "n",
|
|
"Shell": "o",
|
|
"TLSSkipVerify": true,
|
|
"Interval": "2s",
|
|
"Timeout": "3s",
|
|
"TTL": "4s",
|
|
"DeregisterCriticalServiceAfter": "5s"
|
|
}
|
|
}
|
|
}`,
|
|
c: &Config{
|
|
Services: []*structs.ServiceDefinition{
|
|
&structs.ServiceDefinition{
|
|
ID: "a",
|
|
Name: "b",
|
|
Tags: []string{"c", "d"},
|
|
Address: "e",
|
|
Port: 123,
|
|
Token: "f",
|
|
EnableTagOverride: true,
|
|
Check: structs.CheckType{
|
|
CheckID: "g",
|
|
Name: "h",
|
|
Status: "i",
|
|
Notes: "j",
|
|
Script: "k",
|
|
HTTP: "l",
|
|
Header: map[string][]string{"a": []string{"b"}, "c": []string{"d", "e"}},
|
|
Method: "x",
|
|
TCP: "m",
|
|
DockerContainerID: "n",
|
|
Shell: "o",
|
|
TLSSkipVerify: true,
|
|
Interval: 2 * time.Second,
|
|
Timeout: 3 * time.Second,
|
|
TTL: 4 * time.Second,
|
|
DeregisterCriticalServiceAfter: 5 * time.Second,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "single service with multiple checks",
|
|
in: `{
|
|
"service": {
|
|
"ID": "a",
|
|
"Name": "b",
|
|
"Tags": ["c", "d"],
|
|
"Address": "e",
|
|
"Token": "f",
|
|
"Port": 123,
|
|
"EnableTagOverride": true,
|
|
"Checks": [
|
|
{
|
|
"CheckID": "g",
|
|
"Name": "h",
|
|
"Status": "i",
|
|
"Notes": "j",
|
|
"Script": "k",
|
|
"HTTP": "l",
|
|
"Header": {"a":["b"], "c":["d", "e"]},
|
|
"Method": "x",
|
|
"TCP": "m",
|
|
"DockerContainerID": "n",
|
|
"Shell": "o",
|
|
"TLSSkipVerify": true,
|
|
"Interval": "2s",
|
|
"Timeout": "3s",
|
|
"TTL": "4s",
|
|
"DeregisterCriticalServiceAfter": "5s"
|
|
},
|
|
{
|
|
"CheckID": "gg",
|
|
"Name": "hh",
|
|
"Status": "ii",
|
|
"Notes": "jj",
|
|
"Script": "kk",
|
|
"HTTP": "ll",
|
|
"Header": {"aa":["bb"], "cc":["dd", "ee"]},
|
|
"Method": "xx",
|
|
"TCP": "mm",
|
|
"DockerContainerID": "nn",
|
|
"Shell": "oo",
|
|
"TLSSkipVerify": false,
|
|
"Interval": "22s",
|
|
"Timeout": "33s",
|
|
"TTL": "44s",
|
|
"DeregisterCriticalServiceAfter": "55s"
|
|
}
|
|
]
|
|
}
|
|
}`,
|
|
c: &Config{
|
|
Services: []*structs.ServiceDefinition{
|
|
&structs.ServiceDefinition{
|
|
ID: "a",
|
|
Name: "b",
|
|
Tags: []string{"c", "d"},
|
|
Address: "e",
|
|
Port: 123,
|
|
Token: "f",
|
|
EnableTagOverride: true,
|
|
Checks: []*structs.CheckType{
|
|
{
|
|
CheckID: "g",
|
|
Name: "h",
|
|
Status: "i",
|
|
Notes: "j",
|
|
Script: "k",
|
|
HTTP: "l",
|
|
Header: map[string][]string{"a": []string{"b"}, "c": []string{"d", "e"}},
|
|
Method: "x",
|
|
TCP: "m",
|
|
DockerContainerID: "n",
|
|
Shell: "o",
|
|
TLSSkipVerify: true,
|
|
Interval: 2 * time.Second,
|
|
Timeout: 3 * time.Second,
|
|
TTL: 4 * time.Second,
|
|
DeregisterCriticalServiceAfter: 5 * time.Second,
|
|
},
|
|
{
|
|
CheckID: "gg",
|
|
Name: "hh",
|
|
Status: "ii",
|
|
Notes: "jj",
|
|
Script: "kk",
|
|
HTTP: "ll",
|
|
Header: map[string][]string{"aa": []string{"bb"}, "cc": []string{"dd", "ee"}},
|
|
Method: "xx",
|
|
TCP: "mm",
|
|
DockerContainerID: "nn",
|
|
Shell: "oo",
|
|
TLSSkipVerify: false,
|
|
Interval: 22 * time.Second,
|
|
Timeout: 33 * time.Second,
|
|
TTL: 44 * time.Second,
|
|
DeregisterCriticalServiceAfter: 55 * time.Second,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "multiple services with check",
|
|
in: `{
|
|
"services": [
|
|
{
|
|
"ID": "a",
|
|
"Name": "b",
|
|
"Tags": ["c", "d"],
|
|
"Address": "e",
|
|
"Token": "f",
|
|
"Port": 123,
|
|
"EnableTagOverride": true,
|
|
"Check": {
|
|
"CheckID": "g",
|
|
"Name": "h",
|
|
"Status": "i",
|
|
"Notes": "j",
|
|
"Script": "k",
|
|
"HTTP": "l",
|
|
"Header": {"a":["b"], "c":["d", "e"]},
|
|
"Method": "x",
|
|
"TCP": "m",
|
|
"DockerContainerID": "n",
|
|
"Shell": "o",
|
|
"TLSSkipVerify": true,
|
|
"Interval": "2s",
|
|
"Timeout": "3s",
|
|
"TTL": "4s",
|
|
"DeregisterCriticalServiceAfter": "5s"
|
|
}
|
|
},
|
|
{
|
|
"ID": "aa",
|
|
"Name": "bb",
|
|
"Tags": ["cc", "dd"],
|
|
"Address": "ee",
|
|
"Token": "ff",
|
|
"Port": 246,
|
|
"EnableTagOverride": false,
|
|
"Check": {
|
|
"CheckID": "gg",
|
|
"Name": "hh",
|
|
"Status": "ii",
|
|
"Notes": "jj",
|
|
"Script": "kk",
|
|
"HTTP": "ll",
|
|
"Header": {"aa":["bb"], "cc":["dd", "ee"]},
|
|
"Method": "xx",
|
|
"TCP": "mm",
|
|
"DockerContainerID": "nn",
|
|
"Shell": "oo",
|
|
"TLSSkipVerify": false,
|
|
"Interval": "22s",
|
|
"Timeout": "33s",
|
|
"TTL": "44s",
|
|
"DeregisterCriticalServiceAfter": "55s"
|
|
}
|
|
}
|
|
]
|
|
}`,
|
|
c: &Config{
|
|
Services: []*structs.ServiceDefinition{
|
|
&structs.ServiceDefinition{
|
|
ID: "a",
|
|
Name: "b",
|
|
Tags: []string{"c", "d"},
|
|
Address: "e",
|
|
Port: 123,
|
|
Token: "f",
|
|
EnableTagOverride: true,
|
|
Check: structs.CheckType{
|
|
CheckID: "g",
|
|
Name: "h",
|
|
Status: "i",
|
|
Notes: "j",
|
|
Script: "k",
|
|
HTTP: "l",
|
|
Header: map[string][]string{"a": []string{"b"}, "c": []string{"d", "e"}},
|
|
Method: "x",
|
|
TCP: "m",
|
|
DockerContainerID: "n",
|
|
Shell: "o",
|
|
TLSSkipVerify: true,
|
|
Interval: 2 * time.Second,
|
|
Timeout: 3 * time.Second,
|
|
TTL: 4 * time.Second,
|
|
DeregisterCriticalServiceAfter: 5 * time.Second,
|
|
},
|
|
},
|
|
&structs.ServiceDefinition{
|
|
ID: "aa",
|
|
Name: "bb",
|
|
Tags: []string{"cc", "dd"},
|
|
Address: "ee",
|
|
Port: 246,
|
|
Token: "ff",
|
|
EnableTagOverride: false,
|
|
Check: structs.CheckType{
|
|
CheckID: "gg",
|
|
Name: "hh",
|
|
Status: "ii",
|
|
Notes: "jj",
|
|
Script: "kk",
|
|
HTTP: "ll",
|
|
Header: map[string][]string{"aa": []string{"bb"}, "cc": []string{"dd", "ee"}},
|
|
Method: "xx",
|
|
TCP: "mm",
|
|
DockerContainerID: "nn",
|
|
Shell: "oo",
|
|
TLSSkipVerify: false,
|
|
Interval: 22 * time.Second,
|
|
Timeout: 33 * time.Second,
|
|
TTL: 44 * time.Second,
|
|
DeregisterCriticalServiceAfter: 55 * time.Second,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
|
|
{
|
|
desc: "single check",
|
|
in: `{
|
|
"check": {
|
|
"id": "a",
|
|
"name": "b",
|
|
"notes": "c",
|
|
"service_id": "x",
|
|
"token": "y",
|
|
"status": "z",
|
|
"script": "d",
|
|
"shell": "e",
|
|
"http": "f",
|
|
"Header": {"a":["b"], "c":["d", "e"]},
|
|
"Method": "x",
|
|
"tcp": "g",
|
|
"docker_container_id": "h",
|
|
"tls_skip_verify": true,
|
|
"interval": "2s",
|
|
"timeout": "3s",
|
|
"ttl": "4s",
|
|
"deregister_critical_service_after": "5s"
|
|
}
|
|
}`,
|
|
c: &Config{
|
|
Checks: []*structs.CheckDefinition{
|
|
&structs.CheckDefinition{
|
|
ID: "a",
|
|
Name: "b",
|
|
Notes: "c",
|
|
ServiceID: "x",
|
|
Token: "y",
|
|
Status: "z",
|
|
Script: "d",
|
|
Shell: "e",
|
|
HTTP: "f",
|
|
Header: map[string][]string{"a": []string{"b"}, "c": []string{"d", "e"}},
|
|
Method: "x",
|
|
TCP: "g",
|
|
DockerContainerID: "h",
|
|
TLSSkipVerify: true,
|
|
Interval: 2 * time.Second,
|
|
Timeout: 3 * time.Second,
|
|
TTL: 4 * time.Second,
|
|
DeregisterCriticalServiceAfter: 5 * time.Second,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "multiple checks",
|
|
in: `{
|
|
"checks": [
|
|
{
|
|
"id": "a",
|
|
"name": "b",
|
|
"notes": "c",
|
|
"service_id": "d",
|
|
"token": "e",
|
|
"status": "f",
|
|
"script": "g",
|
|
"shell": "h",
|
|
"http": "i",
|
|
"Header": {"a":["b"], "c":["d", "e"]},
|
|
"Method": "x",
|
|
"tcp": "j",
|
|
"docker_container_id": "k",
|
|
"tls_skip_verify": true,
|
|
"interval": "2s",
|
|
"timeout": "3s",
|
|
"ttl": "4s",
|
|
"deregister_critical_service_after": "5s"
|
|
},
|
|
{
|
|
"id": "aa",
|
|
"name": "bb",
|
|
"notes": "cc",
|
|
"service_id": "dd",
|
|
"token": "ee",
|
|
"status": "ff",
|
|
"script": "gg",
|
|
"shell": "hh",
|
|
"http": "ii",
|
|
"Header": {"aa":["bb"], "cc":["dd", "ee"]},
|
|
"Method": "xx",
|
|
"tcp": "jj",
|
|
"docker_container_id": "kk",
|
|
"tls_skip_verify": false,
|
|
"interval": "22s",
|
|
"timeout": "33s",
|
|
"ttl": "44s",
|
|
"deregister_critical_service_after": "55s"
|
|
}
|
|
]
|
|
}`,
|
|
c: &Config{
|
|
Checks: []*structs.CheckDefinition{
|
|
&structs.CheckDefinition{
|
|
ID: "a",
|
|
Name: "b",
|
|
Notes: "c",
|
|
ServiceID: "d",
|
|
Token: "e",
|
|
Status: "f",
|
|
Script: "g",
|
|
Shell: "h",
|
|
HTTP: "i",
|
|
Header: map[string][]string{"a": []string{"b"}, "c": []string{"d", "e"}},
|
|
Method: "x",
|
|
TCP: "j",
|
|
DockerContainerID: "k",
|
|
TLSSkipVerify: true,
|
|
Interval: 2 * time.Second,
|
|
Timeout: 3 * time.Second,
|
|
TTL: 4 * time.Second,
|
|
DeregisterCriticalServiceAfter: 5 * time.Second,
|
|
},
|
|
&structs.CheckDefinition{
|
|
ID: "aa",
|
|
Name: "bb",
|
|
Notes: "cc",
|
|
ServiceID: "dd",
|
|
Token: "ee",
|
|
Status: "ff",
|
|
Script: "gg",
|
|
Shell: "hh",
|
|
HTTP: "ii",
|
|
Header: map[string][]string{"aa": []string{"bb"}, "cc": []string{"dd", "ee"}},
|
|
Method: "xx",
|
|
TCP: "jj",
|
|
DockerContainerID: "kk",
|
|
TLSSkipVerify: false,
|
|
Interval: 22 * time.Second,
|
|
Timeout: 33 * time.Second,
|
|
TTL: 44 * time.Second,
|
|
DeregisterCriticalServiceAfter: 55 * time.Second,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
desc := tt.desc
|
|
if desc == "" {
|
|
desc = tt.in
|
|
}
|
|
t.Run(desc, func(t *testing.T) {
|
|
c, err := DecodeConfig(strings.NewReader(tt.in))
|
|
if got, want := err, tt.err; !reflect.DeepEqual(got, want) {
|
|
t.Fatalf("got error %v want %v", got, want)
|
|
}
|
|
got, want := c, tt.c
|
|
verify.Values(t, "", got, want)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDecodeConfig_ACLTokenPreference(t *testing.T) {
|
|
tests := []struct {
|
|
in string
|
|
tok string
|
|
}{
|
|
{
|
|
in: `{}`,
|
|
tok: "",
|
|
},
|
|
{
|
|
in: `{"acl_token":"a"}`,
|
|
tok: "a",
|
|
},
|
|
{
|
|
in: `{"acl_token":"a","acl_agent_token":"b"}`,
|
|
tok: "b",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.in, func(t *testing.T) {
|
|
c, err := DecodeConfig(strings.NewReader(tt.in))
|
|
if err != nil {
|
|
t.Fatalf("got error %v want nil", err)
|
|
}
|
|
if got, want := c.GetTokenForAgent(), tt.tok; got != want {
|
|
t.Fatalf("got token for agent %q want %q", got, want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDecodeConfig_VerifyUniqueListeners(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
desc string
|
|
in string
|
|
err error
|
|
}{
|
|
{
|
|
"http_dns1",
|
|
`{"addresses": {"http": "0.0.0.0", "dns": "127.0.0.1"}, "ports": {"dns": 8000}}`,
|
|
nil,
|
|
},
|
|
{
|
|
"http_dns IP identical",
|
|
`{"addresses": {"http": "0.0.0.0", "dns": "0.0.0.0"}, "ports": {"http": 8000, "dns": 8000}}`,
|
|
errors.New("HTTP address already configured for DNS"),
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.desc, func(t *testing.T) {
|
|
c, err := DecodeConfig(strings.NewReader(tt.in))
|
|
if err != nil {
|
|
t.Fatalf("got error %v want nil", err)
|
|
}
|
|
|
|
err = c.VerifyUniqueListeners()
|
|
if got, want := err, tt.err; !reflect.DeepEqual(got, want) {
|
|
t.Fatalf("got error %v want %v", got, want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDefaultConfig(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
// ACL flag for Consul version 0.8 features (broken out since we will
|
|
// eventually remove this).
|
|
config := DefaultConfig()
|
|
if *config.ACLEnforceVersion8 != true {
|
|
t.Fatalf("bad: %#v", config)
|
|
}
|
|
|
|
// Remote exec is disabled by default.
|
|
if *config.DisableRemoteExec != true {
|
|
t.Fatalf("bad: %#v", config)
|
|
}
|
|
}
|
|
|
|
func TestMergeConfig(t *testing.T) {
|
|
t.Parallel()
|
|
a := &Config{
|
|
Bootstrap: false,
|
|
BootstrapExpect: 0,
|
|
Datacenter: "dc1",
|
|
DataDir: "/tmp/foo",
|
|
Domain: "basic",
|
|
LogLevel: "debug",
|
|
NodeID: "bar",
|
|
NodeName: "foo",
|
|
ClientAddr: "127.0.0.1",
|
|
BindAddr: "127.0.0.1",
|
|
AdvertiseAddr: "127.0.0.1",
|
|
Server: false,
|
|
LeaveOnTerm: new(bool),
|
|
SkipLeaveOnInt: new(bool),
|
|
EnableDebug: false,
|
|
CheckUpdateIntervalRaw: "8m",
|
|
RetryIntervalRaw: "10s",
|
|
RetryIntervalWanRaw: "10s",
|
|
RetryJoinEC2: RetryJoinEC2{
|
|
Region: "us-east-1",
|
|
TagKey: "Key1",
|
|
TagValue: "Value1",
|
|
AccessKeyID: "nope",
|
|
SecretAccessKey: "nope",
|
|
},
|
|
Telemetry: Telemetry{
|
|
DisableHostname: false,
|
|
StatsdAddr: "nope",
|
|
StatsiteAddr: "nope",
|
|
StatsitePrefix: "nope",
|
|
DogStatsdAddr: "nope",
|
|
DogStatsdTags: []string{"nope"},
|
|
},
|
|
Meta: map[string]string{
|
|
"key": "value1",
|
|
},
|
|
}
|
|
|
|
b := &Config{
|
|
Performance: Performance{
|
|
RaftMultiplier: 99,
|
|
},
|
|
Bootstrap: true,
|
|
BootstrapExpect: 3,
|
|
Datacenter: "dc2",
|
|
DataDir: "/tmp/bar",
|
|
DNSRecursors: []string{"127.0.0.2:1001"},
|
|
DNSConfig: DNSConfig{
|
|
AllowStale: Bool(false),
|
|
EnableTruncate: true,
|
|
DisableCompression: true,
|
|
MaxStale: 30 * time.Second,
|
|
NodeTTL: 10 * time.Second,
|
|
ServiceTTL: map[string]time.Duration{
|
|
"api": 10 * time.Second,
|
|
},
|
|
UDPAnswerLimit: 4,
|
|
RecursorTimeout: 30 * time.Second,
|
|
},
|
|
Domain: "other",
|
|
LogLevel: "info",
|
|
NodeID: "bar",
|
|
DisableHostNodeID: Bool(false),
|
|
NodeName: "baz",
|
|
ClientAddr: "127.0.0.2",
|
|
BindAddr: "127.0.0.2",
|
|
AdvertiseAddr: "127.0.0.2",
|
|
AdvertiseAddrWan: "127.0.0.2",
|
|
Ports: PortConfig{
|
|
DNS: 1,
|
|
HTTP: 2,
|
|
SerfLan: 4,
|
|
SerfWan: 5,
|
|
Server: 6,
|
|
HTTPS: 7,
|
|
},
|
|
Addresses: AddressConfig{
|
|
DNS: "127.0.0.1",
|
|
HTTP: "127.0.0.2",
|
|
HTTPS: "127.0.0.4",
|
|
},
|
|
Server: true,
|
|
LeaveOnTerm: Bool(true),
|
|
SkipLeaveOnInt: Bool(true),
|
|
RaftProtocol: 3,
|
|
Autopilot: Autopilot{
|
|
CleanupDeadServers: Bool(true),
|
|
LastContactThreshold: Duration(time.Duration(10)),
|
|
MaxTrailingLogs: Uint64(10),
|
|
ServerStabilizationTime: Duration(time.Duration(100)),
|
|
},
|
|
EnableDebug: true,
|
|
VerifyIncoming: true,
|
|
VerifyOutgoing: true,
|
|
CAFile: "test/ca.pem",
|
|
CertFile: "test/cert.pem",
|
|
KeyFile: "test/key.pem",
|
|
TLSMinVersion: "tls12",
|
|
Checks: []*structs.CheckDefinition{nil},
|
|
Services: []*structs.ServiceDefinition{nil},
|
|
StartJoin: []string{"1.1.1.1"},
|
|
StartJoinWan: []string{"1.1.1.1"},
|
|
EnableUI: true,
|
|
UIDir: "/opt/consul-ui",
|
|
EnableSyslog: true,
|
|
RejoinAfterLeave: true,
|
|
RetryJoin: []string{"1.1.1.1"},
|
|
RetryIntervalRaw: "10s",
|
|
RetryInterval: 10 * time.Second,
|
|
RetryJoinWan: []string{"1.1.1.1"},
|
|
RetryIntervalWanRaw: "10s",
|
|
RetryIntervalWan: 10 * time.Second,
|
|
ReconnectTimeoutLanRaw: "24h",
|
|
ReconnectTimeoutLan: 24 * time.Hour,
|
|
ReconnectTimeoutWanRaw: "36h",
|
|
ReconnectTimeoutWan: 36 * time.Hour,
|
|
EnableScriptChecks: true,
|
|
CheckUpdateInterval: 8 * time.Minute,
|
|
CheckUpdateIntervalRaw: "8m",
|
|
ACLToken: "1111",
|
|
ACLAgentMasterToken: "2222",
|
|
ACLAgentToken: "3333",
|
|
ACLMasterToken: "4444",
|
|
ACLDatacenter: "dc2",
|
|
ACLTTL: 15 * time.Second,
|
|
ACLTTLRaw: "15s",
|
|
ACLDownPolicy: "deny",
|
|
ACLDefaultPolicy: "deny",
|
|
ACLReplicationToken: "8765309",
|
|
ACLEnforceVersion8: Bool(true),
|
|
Watches: []map[string]interface{}{
|
|
map[string]interface{}{
|
|
"type": "keyprefix",
|
|
"prefix": "foo/",
|
|
"handler": "foobar",
|
|
},
|
|
},
|
|
DisableRemoteExec: Bool(true),
|
|
Telemetry: Telemetry{
|
|
StatsiteAddr: "127.0.0.1:7250",
|
|
StatsitePrefix: "stats_prefix",
|
|
StatsdAddr: "127.0.0.1:7251",
|
|
DisableHostname: true,
|
|
DogStatsdAddr: "127.0.0.1:7254",
|
|
DogStatsdTags: []string{"tag_1:val_1", "tag_2:val_2"},
|
|
},
|
|
Meta: map[string]string{
|
|
"key": "value2",
|
|
},
|
|
DisableUpdateCheck: true,
|
|
DisableAnonymousSignature: true,
|
|
HTTPConfig: HTTPConfig{
|
|
BlockEndpoints: []string{
|
|
"/v1/agent/self",
|
|
"/v1/acl",
|
|
},
|
|
ResponseHeaders: map[string]string{
|
|
"Access-Control-Allow-Origin": "*",
|
|
},
|
|
},
|
|
UnixSockets: UnixSocketConfig{
|
|
UnixSocketPermissions{
|
|
Usr: "500",
|
|
Grp: "500",
|
|
Perms: "0700",
|
|
},
|
|
},
|
|
RetryJoinEC2: RetryJoinEC2{
|
|
Region: "us-east-2",
|
|
TagKey: "Key2",
|
|
TagValue: "Value2",
|
|
AccessKeyID: "foo",
|
|
SecretAccessKey: "bar",
|
|
},
|
|
SessionTTLMinRaw: "1000s",
|
|
SessionTTLMin: 1000 * time.Second,
|
|
AdvertiseAddrs: AdvertiseAddrsConfig{
|
|
SerfLan: &net.TCPAddr{},
|
|
SerfLanRaw: "127.0.0.5:1231",
|
|
SerfWan: &net.TCPAddr{},
|
|
SerfWanRaw: "127.0.0.5:1232",
|
|
RPC: &net.TCPAddr{},
|
|
RPCRaw: "127.0.0.5:1233",
|
|
},
|
|
}
|
|
|
|
c := MergeConfig(a, b)
|
|
|
|
if !reflect.DeepEqual(c, b) {
|
|
t.Fatalf("should be equal %#v %#v", c, b)
|
|
}
|
|
}
|
|
|
|
func TestReadConfigPaths_badPath(t *testing.T) {
|
|
t.Parallel()
|
|
_, err := ReadConfigPaths([]string{"/i/shouldnt/exist/ever/rainbows"})
|
|
if err == nil {
|
|
t.Fatal("should have err")
|
|
}
|
|
}
|
|
|
|
func TestReadConfigPaths_file(t *testing.T) {
|
|
t.Parallel()
|
|
tf := testutil.TempFile(t, "consul")
|
|
tf.Write([]byte(`{"node_name":"bar"}`))
|
|
tf.Close()
|
|
defer os.Remove(tf.Name())
|
|
|
|
config, err := ReadConfigPaths([]string{tf.Name()})
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if config.NodeName != "bar" {
|
|
t.Fatalf("bad: %#v", config)
|
|
}
|
|
}
|
|
|
|
func TestReadConfigPaths_dir(t *testing.T) {
|
|
t.Parallel()
|
|
td := testutil.TempDir(t, "consul")
|
|
defer os.RemoveAll(td)
|
|
|
|
err := ioutil.WriteFile(filepath.Join(td, "a.json"),
|
|
[]byte(`{"node_name": "bar"}`), 0644)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
err = ioutil.WriteFile(filepath.Join(td, "b.json"),
|
|
[]byte(`{"node_name": "baz"}`), 0644)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
// A non-json file, shouldn't be read
|
|
err = ioutil.WriteFile(filepath.Join(td, "c"),
|
|
[]byte(`{"node_name": "bad"}`), 0644)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
// An empty file shouldn't be read
|
|
err = ioutil.WriteFile(filepath.Join(td, "d.json"),
|
|
[]byte{}, 0664)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
config, err := ReadConfigPaths([]string{td})
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if config.NodeName != "baz" {
|
|
t.Fatalf("bad: %#v", config)
|
|
}
|
|
}
|
|
|
|
func TestUnixSockets(t *testing.T) {
|
|
t.Parallel()
|
|
if p := socketPath("unix:///path/to/socket"); p != "/path/to/socket" {
|
|
t.Fatalf("bad: %q", p)
|
|
}
|
|
if p := socketPath("notunix://blah"); p != "" {
|
|
t.Fatalf("bad: %q", p)
|
|
}
|
|
}
|
|
|
|
func TestCheckDefinitionToCheckType(t *testing.T) {
|
|
t.Parallel()
|
|
got := &structs.CheckDefinition{
|
|
ID: "id",
|
|
Name: "name",
|
|
Status: "green",
|
|
Notes: "notes",
|
|
|
|
ServiceID: "svcid",
|
|
Token: "tok",
|
|
Script: "/bin/foo",
|
|
HTTP: "someurl",
|
|
TCP: "host:port",
|
|
Interval: 1 * time.Second,
|
|
DockerContainerID: "abc123",
|
|
Shell: "/bin/ksh",
|
|
TLSSkipVerify: true,
|
|
Timeout: 2 * time.Second,
|
|
TTL: 3 * time.Second,
|
|
DeregisterCriticalServiceAfter: 4 * time.Second,
|
|
}
|
|
want := &structs.CheckType{
|
|
CheckID: "id",
|
|
Name: "name",
|
|
Status: "green",
|
|
Notes: "notes",
|
|
|
|
Script: "/bin/foo",
|
|
HTTP: "someurl",
|
|
TCP: "host:port",
|
|
Interval: 1 * time.Second,
|
|
DockerContainerID: "abc123",
|
|
Shell: "/bin/ksh",
|
|
TLSSkipVerify: true,
|
|
Timeout: 2 * time.Second,
|
|
TTL: 3 * time.Second,
|
|
DeregisterCriticalServiceAfter: 4 * time.Second,
|
|
}
|
|
verify.Values(t, "", got.CheckType(), want)
|
|
}
|