open-nomad/nomad/structs/config/consul_test.go

170 lines
4.4 KiB
Go
Raw Normal View History

package config
import (
"encoding/json"
"fmt"
"os"
"os/exec"
"testing"
"time"
consulapi "github.com/hashicorp/consul/api"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestMain(m *testing.M) {
if os.Getenv("NOMAD_ENV_TEST") != "1" {
os.Exit(m.Run())
}
// Encode the default config as json to stdout for testing env var
// handling.
if err := json.NewEncoder(os.Stdout).Encode(DefaultConsulConfig()); err != nil {
fmt.Fprintf(os.Stderr, "error encoding config: %v", err)
os.Exit(2)
}
os.Exit(0)
}
func TestConsulConfig_Merge(t *testing.T) {
yes, no := true, false
c1 := &ConsulConfig{
ServerServiceName: "1",
ServerHTTPCheckName: "1",
ServerSerfCheckName: "1",
ServerRPCCheckName: "1",
ClientServiceName: "1",
ClientHTTPCheckName: "1",
Tags: []string{"a", "1"},
AutoAdvertise: &no,
ChecksUseAdvertise: &no,
Addr: "1",
GRPCAddr: "1",
Timeout: time.Duration(1),
TimeoutHCL: "1",
Token: "1",
AllowUnauthenticated: &no,
Auth: "1",
EnableSSL: &no,
VerifySSL: &no,
CAFile: "1",
CertFile: "1",
KeyFile: "1",
ServerAutoJoin: &no,
ClientAutoJoin: &no,
ExtraKeysHCL: []string{"a", "1"},
}
c2 := &ConsulConfig{
ServerServiceName: "2",
ServerHTTPCheckName: "2",
ServerSerfCheckName: "2",
ServerRPCCheckName: "2",
ClientServiceName: "2",
ClientHTTPCheckName: "2",
Tags: []string{"b", "2"},
AutoAdvertise: &yes,
ChecksUseAdvertise: &yes,
Addr: "2",
GRPCAddr: "2",
Timeout: time.Duration(2),
TimeoutHCL: "2",
Token: "2",
AllowUnauthenticated: &yes,
Auth: "2",
EnableSSL: &yes,
VerifySSL: &yes,
CAFile: "2",
CertFile: "2",
KeyFile: "2",
ServerAutoJoin: &yes,
ClientAutoJoin: &yes,
ExtraKeysHCL: []string{"b", "2"},
}
exp := &ConsulConfig{
ServerServiceName: "2",
ServerHTTPCheckName: "2",
ServerSerfCheckName: "2",
ServerRPCCheckName: "2",
ClientServiceName: "2",
ClientHTTPCheckName: "2",
Tags: []string{"a", "1", "b", "2"},
AutoAdvertise: &yes,
ChecksUseAdvertise: &yes,
Addr: "2",
GRPCAddr: "2",
Timeout: time.Duration(2),
TimeoutHCL: "2",
Token: "2",
AllowUnauthenticated: &yes,
Auth: "2",
EnableSSL: &yes,
VerifySSL: &yes,
CAFile: "2",
CertFile: "2",
KeyFile: "2",
ServerAutoJoin: &yes,
ClientAutoJoin: &yes,
ExtraKeysHCL: []string{"a", "1"}, // not merged
}
result := c1.Merge(c2)
require.Equal(t, exp, result)
}
// TestConsulConfig_Defaults asserts Consul defaults are copied from their
// upstream API package defaults.
func TestConsulConfig_Defaults(t *testing.T) {
t.Parallel()
nomadDef := DefaultConsulConfig()
consulDef := consulapi.DefaultConfig()
require.Equal(t, consulDef.Address, nomadDef.Addr)
require.NotZero(t, nomadDef.Addr)
require.Equal(t, consulDef.Scheme == "https", *nomadDef.EnableSSL)
require.Equal(t, !consulDef.TLSConfig.InsecureSkipVerify, *nomadDef.VerifySSL)
require.Equal(t, consulDef.TLSConfig.CAFile, nomadDef.CAFile)
}
// TestConsulConfig_Exec asserts Consul defaults use env vars when they are
// set by forking a subprocess.
func TestConsulConfig_Exec(t *testing.T) {
t.Parallel()
self, err := os.Executable()
if err != nil {
t.Fatalf("error finding test binary: %v", err)
}
cmd := exec.Command(self)
cmd.Env = []string{
"NOMAD_ENV_TEST=1",
"CONSUL_CACERT=cacert",
"CONSUL_HTTP_ADDR=addr",
"CONSUL_HTTP_SSL=1",
"CONSUL_HTTP_SSL_VERIFY=1",
}
out, err := cmd.Output()
if err != nil {
if eerr, ok := err.(*exec.ExitError); ok {
t.Fatalf("exit error code %d; output:\n%s", eerr.ExitCode(), string(eerr.Stderr))
}
t.Fatalf("error running command %q: %v", self, err)
}
conf := ConsulConfig{}
require.NoError(t, json.Unmarshal(out, &conf))
assert.Equal(t, "cacert", conf.CAFile)
assert.Equal(t, "addr", conf.Addr)
require.NotNil(t, conf.EnableSSL)
assert.True(t, *conf.EnableSSL)
require.NotNil(t, conf.VerifySSL)
assert.True(t, *conf.VerifySSL)
}