130 lines
3.0 KiB
Go
130 lines
3.0 KiB
Go
// +build !consulent
|
|
|
|
package config
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestValidateEnterpriseConfigKeys(t *testing.T) {
|
|
// ensure that all the enterprise configurations
|
|
type testCase struct {
|
|
config Config
|
|
badKeys []string
|
|
check func(t *testing.T, c *Config)
|
|
}
|
|
|
|
boolVal := true
|
|
stringVal := "string"
|
|
|
|
cases := map[string]testCase{
|
|
"read_replica": {
|
|
config: Config{
|
|
ReadReplica: &boolVal,
|
|
},
|
|
badKeys: []string{"read_replica (or the deprecated non_voting_server)"},
|
|
},
|
|
"segment": {
|
|
config: Config{
|
|
SegmentName: &stringVal,
|
|
},
|
|
badKeys: []string{"segment"},
|
|
},
|
|
"segments": {
|
|
config: Config{
|
|
Segments: []Segment{{Name: &stringVal}},
|
|
},
|
|
badKeys: []string{"segments"},
|
|
},
|
|
"autopilot.redundancy_zone_tag": {
|
|
config: Config{
|
|
Autopilot: Autopilot{
|
|
RedundancyZoneTag: &stringVal,
|
|
},
|
|
},
|
|
badKeys: []string{"autopilot.redundancy_zone_tag"},
|
|
},
|
|
"autopilot.upgrade_version_tag": {
|
|
config: Config{
|
|
Autopilot: Autopilot{
|
|
UpgradeVersionTag: &stringVal,
|
|
},
|
|
},
|
|
badKeys: []string{"autopilot.upgrade_version_tag"},
|
|
},
|
|
"autopilot.disable_upgrade_migration": {
|
|
config: Config{
|
|
Autopilot: Autopilot{DisableUpgradeMigration: &boolVal},
|
|
},
|
|
badKeys: []string{"autopilot.disable_upgrade_migration"},
|
|
},
|
|
"dns_config.prefer_namespace": {
|
|
config: Config{
|
|
DNS: DNS{PreferNamespace: &boolVal},
|
|
},
|
|
badKeys: []string{"dns_config.prefer_namespace"},
|
|
check: func(t *testing.T, c *Config) {
|
|
require.Nil(t, c.DNS.PreferNamespace)
|
|
},
|
|
},
|
|
"acl.msp_disable_bootstrap": {
|
|
config: Config{
|
|
ACL: ACL{MSPDisableBootstrap: &boolVal},
|
|
},
|
|
badKeys: []string{"acl.msp_disable_bootstrap"},
|
|
check: func(t *testing.T, c *Config) {
|
|
require.Nil(t, c.ACL.MSPDisableBootstrap)
|
|
},
|
|
},
|
|
"acl.tokens.managed_service_provider": {
|
|
config: Config{
|
|
ACL: ACL{
|
|
Tokens: Tokens{
|
|
ManagedServiceProvider: []ServiceProviderToken{
|
|
{
|
|
AccessorID: &stringVal,
|
|
SecretID: &stringVal,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
badKeys: []string{"acl.tokens.managed_service_provider"},
|
|
check: func(t *testing.T, c *Config) {
|
|
require.Empty(t, c.ACL.Tokens.ManagedServiceProvider)
|
|
require.Nil(t, c.ACL.Tokens.ManagedServiceProvider)
|
|
},
|
|
},
|
|
"multi": {
|
|
config: Config{
|
|
ReadReplica: &boolVal,
|
|
SegmentName: &stringVal,
|
|
ACL: ACL{Tokens: Tokens{AgentMaster: &stringVal}},
|
|
},
|
|
badKeys: []string{"read_replica (or the deprecated non_voting_server)", "segment"},
|
|
},
|
|
}
|
|
|
|
for name, tcase := range cases {
|
|
t.Run(name, func(t *testing.T) {
|
|
errs := validateEnterpriseConfigKeys(&tcase.config)
|
|
if len(tcase.badKeys) == 0 {
|
|
require.Len(t, errs, 0)
|
|
return
|
|
}
|
|
|
|
var expected []error
|
|
for _, k := range tcase.badKeys {
|
|
expected = append(expected, enterpriseConfigKeyError{key: k})
|
|
}
|
|
require.ElementsMatch(t, expected, errs)
|
|
|
|
if tcase.check != nil {
|
|
tcase.check(t, &tcase.config)
|
|
}
|
|
})
|
|
}
|
|
}
|