open-nomad/nomad/structs/config/vault_test.go
Seth Hoenig 87ec5fdee5
deps: update set and test (#14680)
This PR updates go-set and shoenig/test, which introduced some breaking
API changes.
2022-09-26 08:28:03 -05:00

142 lines
3.5 KiB
Go

package config
import (
"reflect"
"testing"
"time"
"github.com/hashicorp/nomad/ci"
"github.com/hashicorp/nomad/helper/pointer"
"github.com/shoenig/test/must"
)
func TestVaultConfig_Merge(t *testing.T) {
ci.Parallel(t)
c1 := &VaultConfig{
Enabled: pointer.Of(false),
Token: "1",
Role: "1",
AllowUnauthenticated: pointer.Of(true),
TaskTokenTTL: "1",
Addr: "1",
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "1",
}
c2 := &VaultConfig{
Enabled: pointer.Of(true),
Token: "2",
Role: "2",
AllowUnauthenticated: pointer.Of(false),
TaskTokenTTL: "2",
Addr: "2",
TLSCaFile: "2",
TLSCaPath: "2",
TLSCertFile: "2",
TLSKeyFile: "2",
TLSSkipVerify: nil,
TLSServerName: "2",
}
e := &VaultConfig{
Enabled: pointer.Of(true),
Token: "2",
Role: "2",
AllowUnauthenticated: pointer.Of(false),
TaskTokenTTL: "2",
Addr: "2",
TLSCaFile: "2",
TLSCaPath: "2",
TLSCertFile: "2",
TLSKeyFile: "2",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "2",
}
result := c1.Merge(c2)
if !reflect.DeepEqual(result, e) {
t.Fatalf("bad:\n%#v\n%#v", result, e)
}
}
func TestVaultConfig_Equals(t *testing.T) {
ci.Parallel(t)
c1 := &VaultConfig{
Enabled: pointer.Of(false),
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "1",
}
c2 := &VaultConfig{
Enabled: pointer.Of(false),
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "1",
}
must.Equal(t, c1, c2)
c3 := &VaultConfig{
Enabled: pointer.Of(true),
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "1",
}
c4 := &VaultConfig{
Enabled: pointer.Of(false),
Token: "1",
Role: "1",
Namespace: "1",
AllowUnauthenticated: pointer.Of(true),
TaskTokenTTL: "1",
Addr: "1",
ConnectionRetryIntv: time.Second,
TLSCaFile: "1",
TLSCaPath: "1",
TLSCertFile: "1",
TLSKeyFile: "1",
TLSSkipVerify: pointer.Of(true),
TLSServerName: "1",
}
must.NotEqual(t, c3, c4)
}