2018-11-14 09:18:03 +00:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2019-06-12 22:42:06 +00:00
|
|
|
"strings"
|
2018-11-14 09:18:03 +00:00
|
|
|
"testing"
|
|
|
|
|
2019-03-15 08:42:03 +00:00
|
|
|
"github.com/containous/traefik/pkg/config"
|
|
|
|
"github.com/containous/traefik/pkg/server/internal"
|
|
|
|
"github.com/containous/traefik/pkg/testhelpers"
|
2018-11-14 09:18:03 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
type MockForwarder struct{}
|
|
|
|
|
|
|
|
func (MockForwarder) ServeHTTP(http.ResponseWriter, *http.Request) {
|
|
|
|
panic("implement me")
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetLoadBalancer(t *testing.T) {
|
|
|
|
sm := Manager{}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
desc string
|
|
|
|
serviceName string
|
|
|
|
service *config.LoadBalancerService
|
|
|
|
fwd http.Handler
|
|
|
|
expectError bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "Fails when provided an invalid URL",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: ":",
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
fwd: &MockForwarder{},
|
|
|
|
expectError: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Succeeds when there are no servers",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{},
|
|
|
|
fwd: &MockForwarder{},
|
|
|
|
expectError: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Succeeds when stickiness is set",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Stickiness: &config.Stickiness{},
|
|
|
|
},
|
|
|
|
fwd: &MockForwarder{},
|
|
|
|
expectError: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range testCases {
|
|
|
|
test := test
|
|
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
2019-01-18 14:18:04 +00:00
|
|
|
handler, err := sm.getLoadBalancer(context.Background(), test.serviceName, test.service, test.fwd)
|
2018-11-14 09:18:03 +00:00
|
|
|
if test.expectError {
|
|
|
|
require.Error(t, err)
|
|
|
|
assert.Nil(t, handler)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.NotNil(t, handler)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetLoadBalancerServiceHandler(t *testing.T) {
|
|
|
|
sm := NewManager(nil, http.DefaultTransport)
|
|
|
|
|
|
|
|
server1 := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-From", "first")
|
|
|
|
}))
|
|
|
|
defer server1.Close()
|
|
|
|
|
|
|
|
server2 := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-From", "second")
|
|
|
|
}))
|
|
|
|
defer server2.Close()
|
|
|
|
|
|
|
|
serverPassHost := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-From", "passhost")
|
|
|
|
assert.Equal(t, "callme", r.Host)
|
|
|
|
}))
|
|
|
|
defer serverPassHost.Close()
|
|
|
|
|
|
|
|
serverPassHostFalse := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("X-From", "passhostfalse")
|
|
|
|
assert.NotEqual(t, "callme", r.Host)
|
|
|
|
}))
|
|
|
|
defer serverPassHostFalse.Close()
|
|
|
|
|
|
|
|
type ExpectedResult struct {
|
2019-06-12 22:42:06 +00:00
|
|
|
StatusCode int
|
|
|
|
XFrom string
|
|
|
|
SecureCookie bool
|
|
|
|
HTTPOnlyCookie bool
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
desc string
|
|
|
|
serviceName string
|
|
|
|
service *config.LoadBalancerService
|
|
|
|
responseModifier func(*http.Response) error
|
|
|
|
|
|
|
|
expected []ExpectedResult
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "Load balances between the two servers",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: server1.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: server2.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "first",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "second",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "StatusBadGateway when the server is not reachable",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: "http://foo",
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusBadGateway,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "ServiceUnavailable when no servers are available",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Servers: []config.Server{},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusServiceUnavailable,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Always call the same server when stickiness is true",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Stickiness: &config.Stickiness{},
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: server1.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: server2.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "first",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "first",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2019-06-12 22:42:06 +00:00
|
|
|
{
|
|
|
|
desc: "Sticky Cookie's options set correctly",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Stickiness: &config.Stickiness{HTTPOnlyCookie: true, SecureCookie: true},
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
|
|
|
URL: server1.URL,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "first",
|
|
|
|
SecureCookie: true,
|
|
|
|
HTTPOnlyCookie: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2018-11-14 09:18:03 +00:00
|
|
|
{
|
|
|
|
desc: "PassHost passes the host instead of the IP",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Stickiness: &config.Stickiness{},
|
|
|
|
PassHostHeader: true,
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: serverPassHost.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "passhost",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "PassHost doesn't passe the host instead of the IP",
|
|
|
|
serviceName: "test",
|
|
|
|
service: &config.LoadBalancerService{
|
|
|
|
Stickiness: &config.Stickiness{},
|
|
|
|
Servers: []config.Server{
|
|
|
|
{
|
2019-06-05 20:18:06 +00:00
|
|
|
URL: serverPassHostFalse.URL,
|
2018-11-14 09:18:03 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: []ExpectedResult{
|
|
|
|
{
|
|
|
|
StatusCode: http.StatusOK,
|
|
|
|
XFrom: "passhostfalse",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range testCases {
|
|
|
|
test := test
|
|
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
|
|
|
|
|
|
handler, err := sm.getLoadBalancerServiceHandler(context.Background(), test.serviceName, test.service, test.responseModifier)
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.NotNil(t, handler)
|
|
|
|
|
|
|
|
req := testhelpers.MustNewRequest(http.MethodGet, "http://callme", nil)
|
|
|
|
for _, expected := range test.expected {
|
|
|
|
recorder := httptest.NewRecorder()
|
|
|
|
|
|
|
|
handler.ServeHTTP(recorder, req)
|
|
|
|
|
|
|
|
assert.Equal(t, expected.StatusCode, recorder.Code)
|
|
|
|
assert.Equal(t, expected.XFrom, recorder.Header().Get("X-From"))
|
|
|
|
|
2019-06-12 22:42:06 +00:00
|
|
|
cookieHeader := recorder.Header().Get("Set-Cookie")
|
|
|
|
if len(cookieHeader) > 0 {
|
|
|
|
req.Header.Set("Cookie", cookieHeader)
|
|
|
|
assert.Equal(t, expected.SecureCookie, strings.Contains(cookieHeader, "Secure"))
|
|
|
|
assert.Equal(t, expected.HTTPOnlyCookie, strings.Contains(cookieHeader, "HttpOnly"))
|
2018-11-14 09:18:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-15 13:28:04 +00:00
|
|
|
func TestManager_Build(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
desc string
|
|
|
|
serviceName string
|
2019-05-16 08:58:06 +00:00
|
|
|
configs map[string]*config.ServiceInfo
|
2019-01-15 13:28:04 +00:00
|
|
|
providerName string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "Simple service name",
|
|
|
|
serviceName: "serviceName",
|
2019-05-16 08:58:06 +00:00
|
|
|
configs: map[string]*config.ServiceInfo{
|
2019-01-15 13:28:04 +00:00
|
|
|
"serviceName": {
|
2019-05-16 08:58:06 +00:00
|
|
|
Service: &config.Service{
|
2019-06-05 20:18:06 +00:00
|
|
|
LoadBalancer: &config.LoadBalancerService{},
|
2019-05-16 08:58:06 +00:00
|
|
|
},
|
2019-01-15 13:28:04 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Service name with provider",
|
|
|
|
serviceName: "provider-1.serviceName",
|
2019-05-16 08:58:06 +00:00
|
|
|
configs: map[string]*config.ServiceInfo{
|
2019-01-15 13:28:04 +00:00
|
|
|
"provider-1.serviceName": {
|
2019-05-16 08:58:06 +00:00
|
|
|
Service: &config.Service{
|
2019-06-05 20:18:06 +00:00
|
|
|
LoadBalancer: &config.LoadBalancerService{},
|
2019-05-16 08:58:06 +00:00
|
|
|
},
|
2019-01-15 13:28:04 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Service name with provider in context",
|
|
|
|
serviceName: "serviceName",
|
2019-05-16 08:58:06 +00:00
|
|
|
configs: map[string]*config.ServiceInfo{
|
2019-01-15 13:28:04 +00:00
|
|
|
"provider-1.serviceName": {
|
2019-05-16 08:58:06 +00:00
|
|
|
Service: &config.Service{
|
2019-06-05 20:18:06 +00:00
|
|
|
LoadBalancer: &config.LoadBalancerService{},
|
2019-05-16 08:58:06 +00:00
|
|
|
},
|
2019-01-15 13:28:04 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
providerName: "provider-1",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range testCases {
|
|
|
|
test := test
|
|
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
manager := NewManager(test.configs, http.DefaultTransport)
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
if len(test.providerName) > 0 {
|
|
|
|
ctx = internal.AddProviderInContext(ctx, test.providerName+".foobar")
|
|
|
|
}
|
|
|
|
|
2019-03-14 08:30:04 +00:00
|
|
|
_, err := manager.BuildHTTP(ctx, test.serviceName, nil)
|
2019-01-15 13:28:04 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-14 09:18:03 +00:00
|
|
|
// FIXME Add healthcheck tests
|