open-nomad/nomad/structs/config/vault_test.go

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

142 lines
3.5 KiB
Go
Raw Normal View History

2016-10-11 01:04:39 +00:00
package config
import (
"reflect"
"testing"
"time"
2018-06-07 19:34:18 +00:00
"github.com/hashicorp/nomad/ci"
"github.com/hashicorp/nomad/helper/pointer"
"github.com/shoenig/test/must"
2016-10-11 01:04:39 +00:00
)
func TestVaultConfig_Merge(t *testing.T) {
ci.Parallel(t)
2016-10-11 01:04:39 +00:00
c1 := &VaultConfig{
Enabled: pointer.Of(false),
2016-10-11 01:04:39 +00:00
Token: "1",
2017-02-02 00:37:08 +00:00
Role: "1",
AllowUnauthenticated: pointer.Of(true),
2016-10-11 01:04:39 +00:00
TaskTokenTTL: "1",
Addr: "1",
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
2016-10-11 01:04:39 +00:00
TLSServerName: "1",
}
c2 := &VaultConfig{
Enabled: pointer.Of(true),
2016-10-11 01:04:39 +00:00
Token: "2",
2017-02-02 00:37:08 +00:00
Role: "2",
AllowUnauthenticated: pointer.Of(false),
2016-10-11 01:04:39 +00:00
TaskTokenTTL: "2",
Addr: "2",
TLSCaFile: "2",
TLSCaPath: "2",
TLSCertFile: "2",
TLSKeyFile: "2",
TLSSkipVerify: nil,
TLSServerName: "2",
}
e := &VaultConfig{
Enabled: pointer.Of(true),
2016-10-11 01:04:39 +00:00
Token: "2",
2017-02-02 00:37:08 +00:00
Role: "2",
AllowUnauthenticated: pointer.Of(false),
2016-10-11 01:04:39 +00:00
TaskTokenTTL: "2",
Addr: "2",
TLSCaFile: "2",
TLSCaPath: "2",
TLSCertFile: "2",
TLSKeyFile: "2",
TLSSkipVerify: pointer.Of(true),
2016-10-11 01:04:39 +00:00
TLSServerName: "2",
}
result := c1.Merge(c2)
if !reflect.DeepEqual(result, e) {
t.Fatalf("bad:\n%#v\n%#v", result, e)
}
}
2018-06-07 19:34:18 +00:00
func TestVaultConfig_Equals(t *testing.T) {
ci.Parallel(t)
2018-06-07 19:34:18 +00:00
c1 := &VaultConfig{
Enabled: pointer.Of(false),
2018-06-07 19:34:18 +00:00
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
2018-06-07 19:34:18 +00:00
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TLSServerName: "1",
}
c2 := &VaultConfig{
Enabled: pointer.Of(false),
2018-06-07 19:34:18 +00:00
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
2018-06-07 19:34:18 +00:00
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TLSServerName: "1",
}
must.Equal(t, c1, c2)
2018-06-07 19:34:18 +00:00
c3 := &VaultConfig{
Enabled: pointer.Of(true),
2018-06-07 19:34:18 +00:00
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
2018-06-07 19:34:18 +00:00
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TLSServerName: "1",
}
c4 := &VaultConfig{
Enabled: pointer.Of(false),
2018-06-07 19:34:18 +00:00
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
2018-06-07 19:34:18 +00:00
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
2018-06-07 19:34:18 +00:00
TLSServerName: "1",
}
must.NotEqual(t, c3, c4)
2018-06-07 19:34:18 +00:00
}