homogenization of templates: Docker
This commit is contained in:
parent
617b8b20f0
commit
750878d668
11 changed files with 2786 additions and 1170 deletions
|
@ -235,32 +235,36 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
[backends]
|
[backends]
|
||||||
{{range $backendName, $backend := .Backends}}
|
{{range $backendName, $backend := .Backends}}
|
||||||
|
|
||||||
{{if hasCircuitBreakerLabel $backend}}
|
{{ $circuitBreaker := getCircuitBreaker $backend }}
|
||||||
[backends.backend-{{$backendName}}.circuitBreaker]
|
{{if $circuitBreaker }}
|
||||||
expression = "{{getCircuitBreakerExpression $backend}}"
|
[backends."backend-{{ $backendName }}".circuitBreaker]
|
||||||
|
expression = "{{ $circuitBreaker.Expression }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasLoadBalancerLabel $backend}}
|
{{ $loadBalancer := getLoadBalancer $backend }}
|
||||||
[backends.backend-{{$backendName}}.loadBalancer]
|
{{if $loadBalancer }}
|
||||||
method = "{{getLoadBalancerMethod $backend}}"
|
[backends."backend-{{ $backendName }}".loadBalancer]
|
||||||
sticky = {{getSticky $backend}}
|
method = "{{ $loadBalancer.Method }}"
|
||||||
{{if hasStickinessLabel $backend}}
|
sticky = {{ $loadBalancer.Sticky }}
|
||||||
[backends.backend-{{$backendName}}.loadBalancer.stickiness]
|
{{if $loadBalancer.Stickiness }}
|
||||||
cookieName = "{{getStickinessCookieName $backend}}"
|
[backends."backend-{{ $backendName }}".loadBalancer.stickiness]
|
||||||
|
cookieName = "{{ $loadBalancer.Stickiness.CookieName }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasMaxConnLabels $backend}}
|
{{ $maxConn := getMaxConn $backend }}
|
||||||
[backends.backend-{{$backendName}}.maxConn]
|
{{if $maxConn }}
|
||||||
amount = {{getMaxConnAmount $backend}}
|
[backends."backend-{{ $backendName }}".maxConn]
|
||||||
extractorFunc = "{{getMaxConnExtractorFunc $backend}}"
|
extractorFunc = "{{ $maxConn.ExtractorFunc }}"
|
||||||
|
amount = {{ $maxConn.Amount }}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasHealthCheckLabels $backend}}
|
{{ $healthCheck := getHealthCheck $backend }}
|
||||||
|
{{if $healthCheck }}
|
||||||
[backends.backend-{{ $backendName }}.healthCheck]
|
[backends.backend-{{ $backendName }}.healthCheck]
|
||||||
path = "{{getHealthCheckPath $backend}}"
|
path = "{{ $healthCheck.Path }}"
|
||||||
port = {{getHealthCheckPort $backend}}
|
port = {{ $healthCheck.Port }}
|
||||||
interval = "{{getHealthCheckInterval $backend}}"
|
interval = "{{ $healthCheck.Interval }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ $servers := index $backendServers $backendName }}
|
{{ $servers := index $backendServers $backendName }}
|
||||||
|
@ -268,7 +272,7 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
{{if hasServices $server }}
|
{{if hasServices $server }}
|
||||||
{{ $services := getServiceNames $server }}
|
{{ $services := getServiceNames $server }}
|
||||||
{{range $serviceIndex, $serviceName := $services }}
|
{{range $serviceIndex, $serviceName := $services }}
|
||||||
[backends.backend-{{getServiceBackend $server $serviceName}}.servers.service-{{$serverName}}]
|
[backends.backend-{{ getServiceBackendName $server $serviceName }}.servers.service-{{ $serverName }}]
|
||||||
url = "{{ getServiceProtocol $server $serviceName }}://{{ getIPAddress $server }}:{{ getServicePort $server $serviceName }}"
|
url = "{{ getServiceProtocol $server $serviceName }}://{{ getIPAddress $server }}:{{ getServicePort $server $serviceName }}"
|
||||||
weight = {{ getServiceWeight $server $serviceName }}
|
weight = {{ getServiceWeight $server $serviceName }}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -282,15 +286,17 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends]
|
[frontends]
|
||||||
{{range $frontend, $containers := .Frontends}}
|
{{range $frontendName, $containers := .Frontends }}
|
||||||
{{$container := index $containers 0}}
|
{{$container := index $containers 0}}
|
||||||
|
|
||||||
{{if hasServices $container }}
|
{{if hasServices $container }}
|
||||||
{{ $services := getServiceNames $container }}
|
{{ $services := getServiceNames $container }}
|
||||||
|
|
||||||
{{range $serviceIndex, $serviceName := $services }}
|
{{range $serviceIndex, $serviceName := $services }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}"]
|
{{ $ServiceFrontendName := getServiceBackendName $container $serviceName }}
|
||||||
backend = "backend-{{getServiceBackend $container $serviceName}}"
|
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}"]
|
||||||
|
backend = "backend-{{ $ServiceFrontendName }}"
|
||||||
priority = {{ getServicePriority $container $serviceName }}
|
priority = {{ getServicePriority $container $serviceName }}
|
||||||
passHostHeader = {{ getServicePassHostHeader $container $serviceName }}
|
passHostHeader = {{ getServicePassHostHeader $container $serviceName }}
|
||||||
passTLSCert = {{ getServicePassTLSCert $container $serviceName }}
|
passTLSCert = {{ getServicePassTLSCert $container $serviceName }}
|
||||||
|
@ -299,8 +305,9 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if getServiceWhitelistSourceRange $container $serviceName}}
|
{{ $whitelistSourceRange := getServiceWhitelistSourceRange $container $serviceName }}
|
||||||
whitelistSourceRange = [{{range getServiceWhitelistSourceRange $container $serviceName}}
|
{{if $whitelistSourceRange }}
|
||||||
|
whitelistSourceRange = [{{range $whitelistSourceRange }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -309,17 +316,19 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if hasServiceRedirect $container $serviceName}}
|
{{ $redirect := getServiceRedirect $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".redirect]
|
{{if $redirect }}
|
||||||
entryPoint = "{{getServiceRedirectEntryPoint $container $serviceName}}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".redirect]
|
||||||
regex = "{{getServiceRedirectRegex $container $serviceName}}"
|
entryPoint = "{{ $redirect.EntryPoint }}"
|
||||||
replacement = "{{getServiceRedirectReplacement $container $serviceName}}"
|
regex = "{{ $redirect.Regex }}"
|
||||||
|
replacement = "{{ $redirect.Replacement }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasServiceErrorPages $container $serviceName }}
|
{{ $errorPages := getServiceErrorPages $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".errors]
|
{{if $errorPages }}
|
||||||
{{ range $pageName, $page := getServiceErrorPages $container $serviceName }}
|
[frontends."frontend-{{ $ServiceFrontendName }}".errors]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".errors.{{$pageName}}]
|
{{ range $pageName, $page := $errorPages }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".errors.{{ $pageName }}]
|
||||||
status = [{{range $page.Status }}
|
status = [{{range $page.Status }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
@ -328,41 +337,81 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasServiceRateLimits $container $serviceName }}
|
{{ $rateLimit := getServiceRateLimit $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit]
|
{{if $rateLimit }}
|
||||||
extractorFunc = "{{ getRateLimitsExtractorFunc $container $serviceName }}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit.rateSet]
|
extractorFunc = "{{ $rateLimit.ExtractorFunc }}"
|
||||||
{{ range $limitName, $rateLimit := getServiceRateLimits $container $serviceName }}
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit.rateSet]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit.rateSet.{{ $limitName }}]
|
{{range $limitName, $limit := $rateLimit.RateSet }}
|
||||||
period = "{{ $rateLimit.Period }}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit.rateSet.{{ $limitName }}]
|
||||||
average = {{ $rateLimit.Average }}
|
period = "{{ $limit.Period }}"
|
||||||
burst = {{ $rateLimit.Burst }}
|
average = {{ $limit.Average }}
|
||||||
|
burst = {{ $limit.Burst }}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".routes."service-{{$serviceName | replace "/" "" | replace "." "-"}}"]
|
{{ $headers := getServiceHeaders $container $serviceName }}
|
||||||
|
{{if $headers }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers]
|
||||||
|
SSLRedirect = {{ $headers.SSLRedirect }}
|
||||||
|
SSLTemporaryRedirect = {{ $headers.SSLTemporaryRedirect }}
|
||||||
|
SSLHost = "{{ $headers.SSLHost }}"
|
||||||
|
STSSeconds = {{ $headers.STSSeconds }}
|
||||||
|
STSIncludeSubdomains = {{ $headers.STSIncludeSubdomains }}
|
||||||
|
STSPreload = {{ $headers.STSPreload }}
|
||||||
|
ForceSTSHeader = {{ $headers.ForceSTSHeader }}
|
||||||
|
FrameDeny = {{ $headers.FrameDeny }}
|
||||||
|
CustomFrameOptionsValue = "{{ $headers.CustomFrameOptionsValue }}"
|
||||||
|
ContentTypeNosniff = {{ $headers.ContentTypeNosniff }}
|
||||||
|
BrowserXSSFilter = {{ $headers.BrowserXSSFilter }}
|
||||||
|
ContentSecurityPolicy = "{{ $headers.ContentSecurityPolicy }}"
|
||||||
|
PublicKey = "{{ $headers.PublicKey }}"
|
||||||
|
ReferrerPolicy = "{{ $headers.ReferrerPolicy }}"
|
||||||
|
IsDevelopment = {{ $headers.IsDevelopment }}
|
||||||
|
|
||||||
|
{{if $headers.AllowedHosts }}
|
||||||
|
AllowedHosts = [{{range $headers.AllowedHosts }}
|
||||||
|
"{{.}}",
|
||||||
|
{{end}}]
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.HostsProxyHeaders }}
|
||||||
|
HostsProxyHeaders = [{{range $headers.HostsProxyHeaders }}
|
||||||
|
"{{.}}",
|
||||||
|
{{end}}]
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.CustomRequestHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.customRequestHeaders]
|
||||||
|
{{range $k, $v := $headers.CustomRequestHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.CustomResponseHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.customResponseHeaders]
|
||||||
|
{{range $k, $v := $headers.CustomResponseHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.SSLProxyHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.SSLProxyHeaders]
|
||||||
|
{{range $k, $v := $headers.SSLProxyHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".routes."service-{{ $serviceName | replace "/" "" | replace "." "-" }}"]
|
||||||
rule = "{{ getServiceFrontendRule $container $serviceName }}"
|
rule = "{{ getServiceFrontendRule $container $serviceName }}"
|
||||||
|
|
||||||
{{if hasServiceRequestHeaders $container $serviceName}}
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".headers.customRequestHeaders]
|
|
||||||
{{range $k, $v := getServiceRequestHeaders $container $serviceName}}
|
|
||||||
{{$k}} = "{{$v}}"
|
|
||||||
{{end}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{if hasServiceResponseHeaders $container $serviceName}}
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".headers.customResponseHeaders]
|
|
||||||
{{range $k, $v := getServiceResponseHeaders $container $serviceName}}
|
|
||||||
{{$k}} = "{{$v}}"
|
|
||||||
{{end}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{end}} ## end range services
|
{{end}} ## end range services
|
||||||
|
|
||||||
{{else}}
|
{{else}}
|
||||||
|
|
||||||
[frontends."frontend-{{$frontend}}"]
|
[frontends."frontend-{{ $frontendName }}"]
|
||||||
backend = "backend-{{getBackend $container}}"
|
backend = "backend-{{ getBackendName $container }}"
|
||||||
priority = {{ getPriority $container }}
|
priority = {{ getPriority $container }}
|
||||||
passHostHeader = {{ getPassHostHeader $container }}
|
passHostHeader = {{ getPassHostHeader $container }}
|
||||||
passTLSCert = {{ getPassTLSCert $container }}
|
passTLSCert = {{ getPassTLSCert $container }}
|
||||||
|
@ -371,8 +420,9 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if getWhitelistSourceRange $container}}
|
{{ $whitelistSourceRange := getWhitelistSourceRange $container}}
|
||||||
whitelistSourceRange = [{{range getWhitelistSourceRange $container}}
|
{{if $whitelistSourceRange }}
|
||||||
|
whitelistSourceRange = [{{range $whitelistSourceRange }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -381,17 +431,19 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if hasRedirect $container}}
|
{{ $redirect := getRedirect $container }}
|
||||||
[frontends."frontend-{{$frontend}}".redirect]
|
{{if $redirect }}
|
||||||
entryPoint = "{{getRedirectEntryPoint $container}}"
|
[frontends."frontend-{{ $frontendName }}".redirect]
|
||||||
regex = "{{getRedirectRegex $container}}"
|
entryPoint = "{{ $redirect.EntryPoint }}"
|
||||||
replacement = "{{getRedirectReplacement $container}}"
|
regex = "{{ $redirect.Regex }}"
|
||||||
|
replacement = "{{ $redirect.Replacement }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasErrorPages $container }}
|
{{ $errorPages := getErrorPages $container }}
|
||||||
[frontends."frontend-{{$frontend}}".errors]
|
{{if $errorPages }}
|
||||||
{{ range $pageName, $page := getErrorPages $container }}
|
[frontends."frontend-{{ $frontendName }}".errors]
|
||||||
[frontends."frontend-{{$frontend}}".errors.{{ $pageName }}]
|
{{range $pageName, $page := $errorPages }}
|
||||||
|
[frontends."frontend-{{ $frontendName }}".errors.{{ $pageName }}]
|
||||||
status = [{{range $page.Status }}
|
status = [{{range $page.Status }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
@ -400,101 +452,73 @@ var _templatesDockerTmpl = []byte(`{{$backendServers := .Servers}}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasRateLimits $container }}
|
{{ $rateLimit := getRateLimit $container }}
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit]
|
{{if $rateLimit }}
|
||||||
extractorFunc = "{{ getRateLimitsExtractorFunc $container }}"
|
[frontends."frontend-{{ $frontendName }}".rateLimit]
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit.rateSet]
|
extractorFunc = "{{ $rateLimit.ExtractorFunc }}"
|
||||||
{{ range $limitName, $rateLimit := getRateLimits $container }}
|
[frontends."frontend-{{ $frontendName }}".rateLimit.rateSet]
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit.rateSet.{{ $limitName }}]
|
{{ range $limitName, $limit := $rateLimit.RateSet }}
|
||||||
period = "{{ $rateLimit.Period }}"
|
[frontends."frontend-{{ $frontendName }}".rateLimit.rateSet.{{ $limitName }}]
|
||||||
average = {{ $rateLimit.Average }}
|
period = "{{ $limit.Period }}"
|
||||||
burst = {{ $rateLimit.Burst }}
|
average = {{ $limit.Average }}
|
||||||
|
burst = {{ $limit.Burst }}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasHeaders $container}}
|
{{ $headers := getHeaders $container }}
|
||||||
[frontends."frontend-{{$frontend}}".headers]
|
{{if $headers }}
|
||||||
{{if hasSSLRedirectHeaders $container}}
|
[frontends."frontend-{{ $frontendName }}".headers]
|
||||||
SSLRedirect = {{getSSLRedirectHeaders $container}}
|
SSLRedirect = {{ $headers.SSLRedirect }}
|
||||||
{{end}}
|
SSLTemporaryRedirect = {{ $headers.SSLTemporaryRedirect }}
|
||||||
{{if hasSSLTemporaryRedirectHeaders $container}}
|
SSLHost = "{{ $headers.SSLHost }}"
|
||||||
SSLTemporaryRedirect = {{getSSLTemporaryRedirectHeaders $container}}
|
STSSeconds = {{ $headers.STSSeconds }}
|
||||||
{{end}}
|
STSIncludeSubdomains = {{ $headers.STSIncludeSubdomains }}
|
||||||
{{if hasSSLHostHeaders $container}}
|
STSPreload = {{ $headers.STSPreload }}
|
||||||
SSLHost = "{{getSSLHostHeaders $container}}"
|
ForceSTSHeader = {{ $headers.ForceSTSHeader }}
|
||||||
{{end}}
|
FrameDeny = {{ $headers.FrameDeny }}
|
||||||
{{if hasSTSSecondsHeaders $container}}
|
CustomFrameOptionsValue = "{{ $headers.CustomFrameOptionsValue }}"
|
||||||
STSSeconds = {{getSTSSecondsHeaders $container}}
|
ContentTypeNosniff = {{ $headers.ContentTypeNosniff }}
|
||||||
{{end}}
|
BrowserXSSFilter = {{ $headers.BrowserXSSFilter }}
|
||||||
{{if hasSTSIncludeSubdomainsHeaders $container}}
|
ContentSecurityPolicy = "{{ $headers.ContentSecurityPolicy }}"
|
||||||
STSIncludeSubdomains = {{getSTSIncludeSubdomainsHeaders $container}}
|
PublicKey = "{{ $headers.PublicKey }}"
|
||||||
{{end}}
|
ReferrerPolicy = "{{ $headers.ReferrerPolicy }}"
|
||||||
{{if hasSTSPreloadHeaders $container}}
|
IsDevelopment = {{ $headers.IsDevelopment }}
|
||||||
STSPreload = {{getSTSPreloadHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasForceSTSHeaderHeaders $container}}
|
|
||||||
ForceSTSHeader = {{getForceSTSHeaderHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasFrameDenyHeaders $container}}
|
|
||||||
FrameDeny = {{getFrameDenyHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasCustomFrameOptionsValueHeaders $container}}
|
|
||||||
CustomFrameOptionsValue = "{{getCustomFrameOptionsValueHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasContentTypeNosniffHeaders $container}}
|
|
||||||
ContentTypeNosniff = {{getContentTypeNosniffHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasBrowserXSSFilterHeaders $container}}
|
|
||||||
BrowserXSSFilter = {{getBrowserXSSFilterHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasContentSecurityPolicyHeaders $container}}
|
|
||||||
ContentSecurityPolicy = "{{getContentSecurityPolicyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasPublicKeyHeaders $container}}
|
|
||||||
PublicKey = "{{getPublicKeyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasReferrerPolicyHeaders $container}}
|
|
||||||
ReferrerPolicy = "{{getReferrerPolicyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasIsDevelopmentHeaders $container}}
|
|
||||||
IsDevelopment = {{getIsDevelopmentHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{if hasAllowedHostsHeaders $container}}
|
{{if $headers.AllowedHosts }}
|
||||||
AllowedHosts = [{{range getAllowedHostsHeaders $container}}
|
AllowedHosts = [{{range $headers.AllowedHosts }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasHostsProxyHeaders $container}}
|
{{if $headers.HostsProxyHeaders }}
|
||||||
HostsProxyHeaders = [{{range getHostsProxyHeaders $container}}
|
HostsProxyHeaders = [{{range $headers.HostsProxyHeaders }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasRequestHeaders $container}}
|
{{if $headers.CustomRequestHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.customRequestHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.customRequestHeaders]
|
||||||
{{range $k, $v := getRequestHeaders $container}}
|
{{range $k, $v := $headers.CustomRequestHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasResponseHeaders $container}}
|
{{if $headers.CustomResponseHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.customResponseHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.customResponseHeaders]
|
||||||
{{range $k, $v := getResponseHeaders $container}}
|
{{range $k, $v := $headers.CustomResponseHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasSSLProxyHeaders $container}}
|
{{if $headers.SSLProxyHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.SSLProxyHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.SSLProxyHeaders]
|
||||||
{{range $k, $v := getSSLProxyHeaders $container}}
|
{{range $k, $v := $headers.SSLProxyHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends."frontend-{{$frontend}}".routes."route-frontend-{{$frontend}}"]
|
[frontends."frontend-{{ $frontendName }}".routes."route-frontend-{{ $frontendName }}"]
|
||||||
rule = "{{ getFrontendRule $container }}"
|
rule = "{{ getFrontendRule $container }}"
|
||||||
|
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
|
@ -184,7 +184,7 @@ func (s *DockerSuite) TestDockerContainersWithOneMissingLabels(c *check.C) {
|
||||||
defer os.Remove(file)
|
defer os.Remove(file)
|
||||||
// Start a container with some labels
|
// Start a container with some labels
|
||||||
labels := map[string]string{
|
labels := map[string]string{
|
||||||
label.TraefikFrontendValue: "my.super.host",
|
"traefik.frontend.value": "my.super.host",
|
||||||
}
|
}
|
||||||
s.startContainerWithLabels(c, "swarm:1.0.0", labels, "manage", "token://blabla")
|
s.startContainerWithLabels(c, "swarm:1.0.0", labels, "manage", "token://blabla")
|
||||||
|
|
||||||
|
|
|
@ -14,117 +14,78 @@ import (
|
||||||
func (p *Provider) buildConfiguration(containersInspected []dockerData) *types.Configuration {
|
func (p *Provider) buildConfiguration(containersInspected []dockerData) *types.Configuration {
|
||||||
var DockerFuncMap = template.FuncMap{
|
var DockerFuncMap = template.FuncMap{
|
||||||
"getDomain": getFuncStringLabel(label.TraefikDomain, p.Domain),
|
"getDomain": getFuncStringLabel(label.TraefikDomain, p.Domain),
|
||||||
|
"getSubDomain": getSubDomain,
|
||||||
"isBackendLBSwarm": isBackendLBSwarm, // FIXME dead ?
|
"isBackendLBSwarm": isBackendLBSwarm, // FIXME dead ?
|
||||||
|
|
||||||
// Backend functions
|
// Backend functions
|
||||||
"getIPAddress": p.getIPAddress,
|
"getIPAddress": p.getIPAddress,
|
||||||
"getPort": getPort,
|
"getPort": getPort,
|
||||||
"getWeight": getFuncStringLabel(label.TraefikWeight, label.DefaultWeight),
|
"getWeight": getFuncIntLabel(label.TraefikWeight, label.DefaultWeightInt),
|
||||||
"getProtocol": getFuncStringLabel(label.TraefikProtocol, label.DefaultProtocol),
|
"getProtocol": getFuncStringLabel(label.TraefikProtocol, label.DefaultProtocol),
|
||||||
"hasHealthCheckLabels": hasFunc(label.TraefikBackendHealthCheckPath),
|
"getMaxConn": getMaxConn,
|
||||||
"getHealthCheckPath": getFuncStringLabel(label.TraefikBackendHealthCheckPath, ""),
|
"getHealthCheck": getHealthCheck,
|
||||||
"getHealthCheckPort": getFuncIntLabel(label.TraefikBackendHealthCheckPort, label.DefaultBackendHealthCheckPort),
|
"getCircuitBreaker": getCircuitBreaker,
|
||||||
"getHealthCheckInterval": getFuncStringLabel(label.TraefikBackendHealthCheckInterval, ""),
|
"getLoadBalancer": getLoadBalancer,
|
||||||
|
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"hasCircuitBreakerLabel": hasFunc(label.TraefikBackendCircuitBreakerExpression),
|
"hasCircuitBreakerLabel": hasFunc(label.TraefikBackendCircuitBreakerExpression),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getCircuitBreakerExpression": getFuncStringLabel(label.TraefikBackendCircuitBreakerExpression, label.DefaultCircuitBreakerExpression),
|
"getCircuitBreakerExpression": getFuncStringLabel(label.TraefikBackendCircuitBreakerExpression, label.DefaultCircuitBreakerExpression),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"hasLoadBalancerLabel": hasLoadBalancerLabel,
|
"hasLoadBalancerLabel": hasLoadBalancerLabel,
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getLoadBalancerMethod": getFuncStringLabel(label.TraefikBackendLoadBalancerMethod, label.DefaultBackendLoadBalancerMethod),
|
"getLoadBalancerMethod": getFuncStringLabel(label.TraefikBackendLoadBalancerMethod, label.DefaultBackendLoadBalancerMethod),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"hasMaxConnLabels": hasMaxConnLabels,
|
"hasMaxConnLabels": hasMaxConnLabels,
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getMaxConnAmount": getFuncInt64Label(label.TraefikBackendMaxConnAmount, math.MaxInt64),
|
"getMaxConnAmount": getFuncInt64Label(label.TraefikBackendMaxConnAmount, math.MaxInt64),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getMaxConnExtractorFunc": getFuncStringLabel(label.TraefikBackendMaxConnExtractorFunc, label.DefaultBackendMaxconnExtractorFunc),
|
"getMaxConnExtractorFunc": getFuncStringLabel(label.TraefikBackendMaxConnExtractorFunc, label.DefaultBackendMaxconnExtractorFunc),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getSticky": getSticky,
|
"getSticky": getSticky,
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"hasStickinessLabel": hasFunc(label.TraefikBackendLoadBalancerStickiness),
|
"hasStickinessLabel": hasFunc(label.TraefikBackendLoadBalancerStickiness),
|
||||||
|
// TODO Deprecated [breaking]
|
||||||
"getStickinessCookieName": getFuncStringLabel(label.TraefikBackendLoadBalancerStickinessCookieName, label.DefaultBackendLoadbalancerStickinessCookieName),
|
"getStickinessCookieName": getFuncStringLabel(label.TraefikBackendLoadBalancerStickinessCookieName, label.DefaultBackendLoadbalancerStickinessCookieName),
|
||||||
|
|
||||||
// Frontend functions
|
// Frontend functions
|
||||||
"getBackend": getBackend,
|
"getBackend": getBackendName, // TODO Deprecated [breaking] replaced by getBackendName
|
||||||
"getPriority": getFuncStringLabel(label.TraefikFrontendPriority, label.DefaultFrontendPriority),
|
"getBackendName": getBackendName,
|
||||||
"getPassHostHeader": getFuncStringLabel(label.TraefikFrontendPassHostHeader, label.DefaultPassHostHeader),
|
"getPriority": getFuncIntLabel(label.TraefikFrontendPriority, label.DefaultFrontendPriorityInt),
|
||||||
|
"getPassHostHeader": getFuncBoolLabel(label.TraefikFrontendPassHostHeader, label.DefaultPassHostHeaderBool),
|
||||||
"getPassTLSCert": getFuncBoolLabel(label.TraefikFrontendPassTLSCert, label.DefaultPassTLSCert),
|
"getPassTLSCert": getFuncBoolLabel(label.TraefikFrontendPassTLSCert, label.DefaultPassTLSCert),
|
||||||
"getEntryPoints": getFuncSliceStringLabel(label.TraefikFrontendEntryPoints),
|
"getEntryPoints": getFuncSliceStringLabel(label.TraefikFrontendEntryPoints),
|
||||||
"getBasicAuth": getFuncSliceStringLabel(label.TraefikFrontendAuthBasic),
|
"getBasicAuth": getFuncSliceStringLabel(label.TraefikFrontendAuthBasic),
|
||||||
"getWhitelistSourceRange": getFuncSliceStringLabel(label.TraefikFrontendWhitelistSourceRange),
|
"getWhitelistSourceRange": getFuncSliceStringLabel(label.TraefikFrontendWhitelistSourceRange),
|
||||||
"getFrontendRule": p.getFrontendRule,
|
"getFrontendRule": p.getFrontendRule,
|
||||||
"hasRedirect": hasRedirect,
|
|
||||||
"getRedirectEntryPoint": getFuncStringLabel(label.TraefikFrontendRedirectEntryPoint, label.DefaultFrontendRedirectEntryPoint),
|
"getRedirect": getRedirect,
|
||||||
"getRedirectRegex": getFuncStringLabel(label.TraefikFrontendRedirectRegex, ""),
|
|
||||||
"getRedirectReplacement": getFuncStringLabel(label.TraefikFrontendRedirectReplacement, ""),
|
|
||||||
"hasErrorPages": hasErrorPages,
|
|
||||||
"getErrorPages": getErrorPages,
|
"getErrorPages": getErrorPages,
|
||||||
"hasRateLimits": hasFunc(label.TraefikFrontendRateLimitExtractorFunc),
|
"getRateLimit": getRateLimit,
|
||||||
"getRateLimitsExtractorFunc": getFuncStringLabel(label.TraefikFrontendRateLimitExtractorFunc, ""),
|
"getHeaders": getHeaders,
|
||||||
"getRateLimits": getRateLimits,
|
|
||||||
// Headers
|
|
||||||
"hasHeaders": hasHeaders,
|
|
||||||
"hasRequestHeaders": hasFunc(label.TraefikFrontendRequestHeaders),
|
|
||||||
"getRequestHeaders": getFuncMapLabel(label.TraefikFrontendRequestHeaders),
|
|
||||||
"hasResponseHeaders": hasFunc(label.TraefikFrontendResponseHeaders),
|
|
||||||
"getResponseHeaders": getFuncMapLabel(label.TraefikFrontendResponseHeaders),
|
|
||||||
"hasAllowedHostsHeaders": hasFunc(label.TraefikFrontendAllowedHosts),
|
|
||||||
"getAllowedHostsHeaders": getFuncSliceStringLabel(label.TraefikFrontendAllowedHosts),
|
|
||||||
"hasHostsProxyHeaders": hasFunc(label.TraefikFrontendHostsProxyHeaders),
|
|
||||||
"getHostsProxyHeaders": getFuncSliceStringLabel(label.TraefikFrontendHostsProxyHeaders),
|
|
||||||
"hasSSLRedirectHeaders": hasFunc(label.TraefikFrontendSSLRedirect),
|
|
||||||
"getSSLRedirectHeaders": getFuncBoolLabel(label.TraefikFrontendSSLRedirect, false),
|
|
||||||
"hasSSLTemporaryRedirectHeaders": hasFunc(label.TraefikFrontendSSLTemporaryRedirect),
|
|
||||||
"getSSLTemporaryRedirectHeaders": getFuncBoolLabel(label.TraefikFrontendSSLTemporaryRedirect, false),
|
|
||||||
"hasSSLHostHeaders": hasFunc(label.TraefikFrontendSSLHost),
|
|
||||||
"getSSLHostHeaders": getFuncStringLabel(label.TraefikFrontendSSLHost, ""),
|
|
||||||
"hasSSLProxyHeaders": hasFunc(label.TraefikFrontendSSLProxyHeaders),
|
|
||||||
"getSSLProxyHeaders": getFuncMapLabel(label.TraefikFrontendSSLProxyHeaders),
|
|
||||||
"hasSTSSecondsHeaders": hasFunc(label.TraefikFrontendSTSSeconds),
|
|
||||||
"getSTSSecondsHeaders": getFuncInt64Label(label.TraefikFrontendSTSSeconds, 0),
|
|
||||||
"hasSTSIncludeSubdomainsHeaders": hasFunc(label.TraefikFrontendSTSIncludeSubdomains),
|
|
||||||
"getSTSIncludeSubdomainsHeaders": getFuncBoolLabel(label.TraefikFrontendSTSIncludeSubdomains, false),
|
|
||||||
"hasSTSPreloadHeaders": hasFunc(label.TraefikFrontendSTSPreload),
|
|
||||||
"getSTSPreloadHeaders": getFuncBoolLabel(label.TraefikFrontendSTSPreload, false),
|
|
||||||
"hasForceSTSHeaderHeaders": hasFunc(label.TraefikFrontendForceSTSHeader),
|
|
||||||
"getForceSTSHeaderHeaders": getFuncBoolLabel(label.TraefikFrontendForceSTSHeader, false),
|
|
||||||
"hasFrameDenyHeaders": hasFunc(label.TraefikFrontendFrameDeny),
|
|
||||||
"getFrameDenyHeaders": getFuncBoolLabel(label.TraefikFrontendFrameDeny, false),
|
|
||||||
"hasCustomFrameOptionsValueHeaders": hasFunc(label.TraefikFrontendCustomFrameOptionsValue),
|
|
||||||
"getCustomFrameOptionsValueHeaders": getFuncStringLabel(label.TraefikFrontendCustomFrameOptionsValue, ""),
|
|
||||||
"hasContentTypeNosniffHeaders": hasFunc(label.TraefikFrontendContentTypeNosniff),
|
|
||||||
"getContentTypeNosniffHeaders": getFuncBoolLabel(label.TraefikFrontendContentTypeNosniff, false),
|
|
||||||
"hasBrowserXSSFilterHeaders": hasFunc(label.TraefikFrontendBrowserXSSFilter),
|
|
||||||
"getBrowserXSSFilterHeaders": getFuncBoolLabel(label.TraefikFrontendBrowserXSSFilter, false),
|
|
||||||
"hasContentSecurityPolicyHeaders": hasFunc(label.TraefikFrontendContentSecurityPolicy),
|
|
||||||
"getContentSecurityPolicyHeaders": getFuncStringLabel(label.TraefikFrontendContentSecurityPolicy, ""),
|
|
||||||
"hasPublicKeyHeaders": hasFunc(label.TraefikFrontendPublicKey),
|
|
||||||
"getPublicKeyHeaders": getFuncStringLabel(label.TraefikFrontendPublicKey, ""),
|
|
||||||
"hasReferrerPolicyHeaders": hasFunc(label.TraefikFrontendReferrerPolicy),
|
|
||||||
"getReferrerPolicyHeaders": getFuncStringLabel(label.TraefikFrontendReferrerPolicy, ""),
|
|
||||||
"hasIsDevelopmentHeaders": hasFunc(label.TraefikFrontendIsDevelopment),
|
|
||||||
"getIsDevelopmentHeaders": getFuncBoolLabel(label.TraefikFrontendIsDevelopment, false),
|
|
||||||
|
|
||||||
// Services
|
// Services
|
||||||
"hasServices": hasServices,
|
"hasServices": hasServices,
|
||||||
"getServiceNames": getServiceNames,
|
"getServiceNames": getServiceNames,
|
||||||
"getServiceBackend": getServiceBackend,
|
"getServiceBackend": getServiceBackendName, // TODO Deprecated [breaking] replaced by getServiceBackendName
|
||||||
|
"getServiceBackendName": getServiceBackendName,
|
||||||
// Services - Backend server functions
|
// Services - Backend server functions
|
||||||
"getServicePort": getServicePort,
|
"getServicePort": getServicePort,
|
||||||
"getServiceProtocol": getFuncServiceStringLabel(label.SuffixProtocol, label.DefaultProtocol),
|
"getServiceProtocol": getFuncServiceStringLabel(label.SuffixProtocol, label.DefaultProtocol),
|
||||||
"getServiceWeight": getFuncServiceStringLabel(label.SuffixWeight, label.DefaultWeight),
|
"getServiceWeight": getFuncServiceStringLabel(label.SuffixWeight, label.DefaultWeight),
|
||||||
// Services - Frontend functions
|
// Services - Frontend functions
|
||||||
"getServiceEntryPoints": getFuncServiceSliceStringLabel(label.SuffixFrontendEntryPoints),
|
"getServiceEntryPoints": getFuncServiceSliceStringLabel(label.SuffixFrontendEntryPoints),
|
||||||
"getServiceWhitelistSourceRange": getFuncServiceSliceStringLabel(label.TraefikFrontendWhitelistSourceRange),
|
"getServiceWhitelistSourceRange": getFuncServiceSliceStringLabel(label.SuffixFrontendWhitelistSourceRange),
|
||||||
"getServiceBasicAuth": getFuncServiceSliceStringLabel(label.SuffixFrontendAuthBasic),
|
"getServiceBasicAuth": getFuncServiceSliceStringLabel(label.SuffixFrontendAuthBasic),
|
||||||
"getServiceFrontendRule": p.getServiceFrontendRule,
|
"getServiceFrontendRule": p.getServiceFrontendRule,
|
||||||
"getServicePassHostHeader": getFuncServiceStringLabel(label.SuffixFrontendPassHostHeader, label.DefaultPassHostHeader),
|
"getServicePassHostHeader": getFuncServiceBoolLabel(label.SuffixFrontendPassHostHeader, label.DefaultPassHostHeaderBool),
|
||||||
"getServicePassTLSCert": getFuncServiceBoolLabel(label.SuffixFrontendPassTLSCert, label.DefaultPassTLSCert),
|
"getServicePassTLSCert": getFuncServiceBoolLabel(label.SuffixFrontendPassTLSCert, label.DefaultPassTLSCert),
|
||||||
"getServicePriority": getFuncServiceStringLabel(label.SuffixFrontendPriority, label.DefaultFrontendPriority),
|
"getServicePriority": getFuncServiceIntLabel(label.SuffixFrontendPriority, label.DefaultFrontendPriorityInt),
|
||||||
"hasServiceRedirect": hasServiceRedirect,
|
|
||||||
"getServiceRedirectEntryPoint": getFuncServiceStringLabel(label.SuffixFrontendRedirectEntryPoint, label.DefaultFrontendRedirectEntryPoint),
|
"getServiceRedirect": getServiceRedirect,
|
||||||
"getServiceRedirectReplacement": getFuncServiceStringLabel(label.SuffixFrontendRedirectReplacement, ""),
|
|
||||||
"getServiceRedirectRegex": getFuncServiceStringLabel(label.SuffixFrontendRedirectRegex, ""),
|
|
||||||
"hasServiceRequestHeaders": hasFuncServiceLabel(label.SuffixFrontendRequestHeaders),
|
|
||||||
"getServiceRequestHeaders": getFuncServiceMapLabel(label.SuffixFrontendRequestHeaders),
|
|
||||||
"hasServiceResponseHeaders": hasFuncServiceLabel(label.SuffixFrontendResponseHeaders),
|
|
||||||
"getServiceResponseHeaders": getFuncServiceMapLabel(label.SuffixFrontendResponseHeaders),
|
|
||||||
"hasServiceErrorPages": hasServiceErrorPages,
|
|
||||||
"getServiceErrorPages": getServiceErrorPages,
|
"getServiceErrorPages": getServiceErrorPages,
|
||||||
"hasServiceRateLimits": hasFuncServiceLabel(label.SuffixFrontendRateLimitExtractorFunc),
|
"getServiceRateLimit": getServiceRateLimit,
|
||||||
"getServiceRateLimits": getServiceRateLimits,
|
"getServiceHeaders": getServiceHeaders,
|
||||||
}
|
}
|
||||||
// filter containers
|
// filter containers
|
||||||
filteredContainers := fun.Filter(func(container dockerData) bool {
|
filteredContainers := fun.Filter(func(container dockerData) bool {
|
||||||
|
@ -143,7 +104,7 @@ func (p *Provider) buildConfiguration(containersInspected []dockerData) *types.C
|
||||||
serviceNames[container.ServiceName] = struct{}{}
|
serviceNames[container.ServiceName] = struct{}{}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
backendName := getBackend(container)
|
backendName := getBackendName(container)
|
||||||
backends[backendName] = container
|
backends[backendName] = container
|
||||||
servers[backendName] = append(servers[backendName], container)
|
servers[backendName] = append(servers[backendName], container)
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,6 +2,7 @@ package docker
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"math"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
@ -99,21 +100,7 @@ func (p Provider) getIPAddress(container dockerData) string {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasLoadBalancerLabel(container dockerData) bool {
|
func getBackendName(container dockerData) string {
|
||||||
method := label.Has(container.Labels, label.TraefikBackendLoadBalancerMethod)
|
|
||||||
sticky := label.Has(container.Labels, label.TraefikBackendLoadBalancerSticky)
|
|
||||||
stickiness := label.Has(container.Labels, label.TraefikBackendLoadBalancerStickiness)
|
|
||||||
cookieName := label.Has(container.Labels, label.TraefikBackendLoadBalancerStickinessCookieName)
|
|
||||||
return method || sticky || stickiness || cookieName
|
|
||||||
}
|
|
||||||
|
|
||||||
func hasMaxConnLabels(container dockerData) bool {
|
|
||||||
mca := label.Has(container.Labels, label.TraefikBackendMaxConnAmount)
|
|
||||||
mcef := label.Has(container.Labels, label.TraefikBackendMaxConnExtractorFunc)
|
|
||||||
return mca && mcef
|
|
||||||
}
|
|
||||||
|
|
||||||
func getBackend(container dockerData) string {
|
|
||||||
if value := label.GetStringValue(container.Labels, label.TraefikBackend, ""); len(value) != 0 {
|
if value := label.GetStringValue(container.Labels, label.TraefikBackend, ""); len(value) != 0 {
|
||||||
return provider.Normalize(value)
|
return provider.Normalize(value)
|
||||||
}
|
}
|
||||||
|
@ -154,27 +141,95 @@ func getSubDomain(name string) string {
|
||||||
return strings.Replace(strings.Replace(strings.TrimPrefix(name, "/"), "/", "-", -1), "_", "-", -1)
|
return strings.Replace(strings.Replace(strings.TrimPrefix(name, "/"), "/", "-", -1), "_", "-", -1)
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Deprecated
|
|
||||||
// Deprecated replaced by Stickiness
|
|
||||||
func getSticky(container dockerData) string {
|
|
||||||
if label.Has(container.Labels, label.TraefikBackendLoadBalancerSticky) {
|
|
||||||
log.Warnf("Deprecated configuration found: %s. Please use %s.", label.TraefikBackendLoadBalancerSticky, label.TraefikBackendLoadBalancerStickiness)
|
|
||||||
}
|
|
||||||
|
|
||||||
return label.GetStringValue(container.Labels, label.TraefikBackendLoadBalancerSticky, "false")
|
|
||||||
}
|
|
||||||
|
|
||||||
func isBackendLBSwarm(container dockerData) bool {
|
func isBackendLBSwarm(container dockerData) bool {
|
||||||
return label.GetBoolValue(container.Labels, labelBackendLoadBalancerSwarm, false)
|
return label.GetBoolValue(container.Labels, labelBackendLoadBalancerSwarm, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasRedirect(container dockerData) bool {
|
func getMaxConn(container dockerData) *types.MaxConn {
|
||||||
return label.Has(container.Labels, label.TraefikFrontendRedirectEntryPoint) ||
|
amount := label.GetInt64Value(container.Labels, label.TraefikBackendMaxConnAmount, math.MinInt64)
|
||||||
label.Has(container.Labels, label.TraefikFrontendRedirectReplacement) && label.Has(container.Labels, label.TraefikFrontendRedirectRegex)
|
extractorFunc := label.GetStringValue(container.Labels, label.TraefikBackendMaxConnExtractorFunc, label.DefaultBackendMaxconnExtractorFunc)
|
||||||
|
|
||||||
|
if amount == math.MinInt64 || len(extractorFunc) == 0 {
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasErrorPages(container dockerData) bool {
|
return &types.MaxConn{
|
||||||
return label.HasPrefix(container.Labels, label.Prefix+label.BaseFrontendErrorPage)
|
Amount: amount,
|
||||||
|
ExtractorFunc: extractorFunc,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func getLoadBalancer(container dockerData) *types.LoadBalancer {
|
||||||
|
if !label.HasPrefix(container.Labels, label.TraefikBackendLoadBalancer) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
method := label.GetStringValue(container.Labels, label.TraefikBackendLoadBalancerMethod, label.DefaultBackendLoadBalancerMethod)
|
||||||
|
|
||||||
|
lb := &types.LoadBalancer{
|
||||||
|
Method: method,
|
||||||
|
Sticky: getSticky(container),
|
||||||
|
}
|
||||||
|
|
||||||
|
if label.GetBoolValue(container.Labels, label.TraefikBackendLoadBalancerStickiness, false) {
|
||||||
|
cookieName := label.GetStringValue(container.Labels, label.TraefikBackendLoadBalancerStickinessCookieName, label.DefaultBackendLoadbalancerStickinessCookieName)
|
||||||
|
lb.Stickiness = &types.Stickiness{CookieName: cookieName}
|
||||||
|
}
|
||||||
|
|
||||||
|
return lb
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO: Deprecated
|
||||||
|
// replaced by Stickiness
|
||||||
|
// Deprecated
|
||||||
|
func getSticky(container dockerData) bool {
|
||||||
|
if label.Has(container.Labels, label.TraefikBackendLoadBalancerSticky) {
|
||||||
|
log.Warnf("Deprecated configuration found: %s. Please use %s.", label.TraefikBackendLoadBalancerSticky, label.TraefikBackendLoadBalancerStickiness)
|
||||||
|
}
|
||||||
|
|
||||||
|
return label.GetBoolValue(container.Labels, label.TraefikBackendLoadBalancerSticky, false)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getCircuitBreaker(container dockerData) *types.CircuitBreaker {
|
||||||
|
circuitBreaker := label.GetStringValue(container.Labels, label.TraefikBackendCircuitBreakerExpression, "")
|
||||||
|
if len(circuitBreaker) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return &types.CircuitBreaker{Expression: circuitBreaker}
|
||||||
|
}
|
||||||
|
|
||||||
|
func getHealthCheck(container dockerData) *types.HealthCheck {
|
||||||
|
path := label.GetStringValue(container.Labels, label.TraefikBackendHealthCheckPath, "")
|
||||||
|
if len(path) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
port := label.GetIntValue(container.Labels, label.TraefikBackendHealthCheckPort, label.DefaultBackendHealthCheckPort)
|
||||||
|
interval := label.GetStringValue(container.Labels, label.TraefikBackendHealthCheckInterval, "")
|
||||||
|
|
||||||
|
return &types.HealthCheck{
|
||||||
|
Path: path,
|
||||||
|
Port: port,
|
||||||
|
Interval: interval,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRedirect(container dockerData) *types.Redirect {
|
||||||
|
if label.Has(container.Labels, label.TraefikFrontendRedirectEntryPoint) {
|
||||||
|
return &types.Redirect{
|
||||||
|
EntryPoint: label.GetStringValue(container.Labels, label.TraefikFrontendRedirectEntryPoint, ""),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if label.Has(container.Labels, label.TraefikFrontendRedirectRegex) &&
|
||||||
|
label.Has(container.Labels, label.TraefikFrontendRedirectReplacement) {
|
||||||
|
return &types.Redirect{
|
||||||
|
Regex: label.GetStringValue(container.Labels, label.TraefikFrontendRedirectRegex, ""),
|
||||||
|
Replacement: label.GetStringValue(container.Labels, label.TraefikFrontendRedirectReplacement, ""),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func getErrorPages(container dockerData) map[string]*types.ErrorPage {
|
func getErrorPages(container dockerData) map[string]*types.ErrorPage {
|
||||||
|
@ -182,46 +237,76 @@ func getErrorPages(container dockerData) map[string]*types.ErrorPage {
|
||||||
return label.ParseErrorPages(container.Labels, prefix, label.RegexpFrontendErrorPage)
|
return label.ParseErrorPages(container.Labels, prefix, label.RegexpFrontendErrorPage)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getRateLimits(container dockerData) map[string]*types.Rate {
|
func getRateLimit(container dockerData) *types.RateLimit {
|
||||||
prefix := label.Prefix + label.BaseFrontendRateLimit
|
extractorFunc := label.GetStringValue(container.Labels, label.TraefikFrontendRateLimitExtractorFunc, "")
|
||||||
return label.ParseRateSets(container.Labels, prefix, label.RegexpFrontendRateLimit)
|
if len(extractorFunc) == 0 {
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasHeaders(container dockerData) bool {
|
prefix := label.Prefix + label.BaseFrontendRateLimit
|
||||||
for key := range container.Labels {
|
limits := label.ParseRateSets(container.Labels, prefix, label.RegexpFrontendRateLimit)
|
||||||
if strings.HasPrefix(key, label.TraefikFrontendHeaders) {
|
|
||||||
return true
|
return &types.RateLimit{
|
||||||
|
ExtractorFunc: extractorFunc,
|
||||||
|
RateSet: limits,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return false
|
|
||||||
|
func getHeaders(container dockerData) *types.Headers {
|
||||||
|
headers := &types.Headers{
|
||||||
|
CustomRequestHeaders: label.GetMapValue(container.Labels, label.TraefikFrontendRequestHeaders),
|
||||||
|
CustomResponseHeaders: label.GetMapValue(container.Labels, label.TraefikFrontendResponseHeaders),
|
||||||
|
SSLProxyHeaders: label.GetMapValue(container.Labels, label.TraefikFrontendSSLProxyHeaders),
|
||||||
|
AllowedHosts: label.GetSliceStringValue(container.Labels, label.TraefikFrontendAllowedHosts),
|
||||||
|
HostsProxyHeaders: label.GetSliceStringValue(container.Labels, label.TraefikFrontendHostsProxyHeaders),
|
||||||
|
STSSeconds: label.GetInt64Value(container.Labels, label.TraefikFrontendSTSSeconds, 0),
|
||||||
|
SSLRedirect: label.GetBoolValue(container.Labels, label.TraefikFrontendSSLRedirect, false),
|
||||||
|
SSLTemporaryRedirect: label.GetBoolValue(container.Labels, label.TraefikFrontendSSLTemporaryRedirect, false),
|
||||||
|
STSIncludeSubdomains: label.GetBoolValue(container.Labels, label.TraefikFrontendSTSIncludeSubdomains, false),
|
||||||
|
STSPreload: label.GetBoolValue(container.Labels, label.TraefikFrontendSTSPreload, false),
|
||||||
|
ForceSTSHeader: label.GetBoolValue(container.Labels, label.TraefikFrontendForceSTSHeader, false),
|
||||||
|
FrameDeny: label.GetBoolValue(container.Labels, label.TraefikFrontendFrameDeny, false),
|
||||||
|
ContentTypeNosniff: label.GetBoolValue(container.Labels, label.TraefikFrontendContentTypeNosniff, false),
|
||||||
|
BrowserXSSFilter: label.GetBoolValue(container.Labels, label.TraefikFrontendBrowserXSSFilter, false),
|
||||||
|
IsDevelopment: label.GetBoolValue(container.Labels, label.TraefikFrontendIsDevelopment, false),
|
||||||
|
SSLHost: label.GetStringValue(container.Labels, label.TraefikFrontendSSLHost, ""),
|
||||||
|
CustomFrameOptionsValue: label.GetStringValue(container.Labels, label.TraefikFrontendCustomFrameOptionsValue, ""),
|
||||||
|
ContentSecurityPolicy: label.GetStringValue(container.Labels, label.TraefikFrontendContentSecurityPolicy, ""),
|
||||||
|
PublicKey: label.GetStringValue(container.Labels, label.TraefikFrontendPublicKey, ""),
|
||||||
|
ReferrerPolicy: label.GetStringValue(container.Labels, label.TraefikFrontendReferrerPolicy, ""),
|
||||||
|
}
|
||||||
|
|
||||||
|
if !headers.HasSecureHeadersDefined() && !headers.HasCustomHeadersDefined() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return headers
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated
|
||||||
|
func hasLoadBalancerLabel(container dockerData) bool {
|
||||||
|
method := label.Has(container.Labels, label.TraefikBackendLoadBalancerMethod)
|
||||||
|
sticky := label.Has(container.Labels, label.TraefikBackendLoadBalancerSticky)
|
||||||
|
stickiness := label.Has(container.Labels, label.TraefikBackendLoadBalancerStickiness)
|
||||||
|
cookieName := label.Has(container.Labels, label.TraefikBackendLoadBalancerStickinessCookieName)
|
||||||
|
return method || sticky || stickiness || cookieName
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated
|
||||||
|
func hasMaxConnLabels(container dockerData) bool {
|
||||||
|
mca := label.Has(container.Labels, label.TraefikBackendMaxConnAmount)
|
||||||
|
mcef := label.Has(container.Labels, label.TraefikBackendMaxConnExtractorFunc)
|
||||||
|
return mca && mcef
|
||||||
}
|
}
|
||||||
|
|
||||||
// Label functions
|
// Label functions
|
||||||
|
|
||||||
func getFuncInt64Label(labelName string, defaultValue int64) func(container dockerData) int64 {
|
|
||||||
return func(container dockerData) int64 {
|
|
||||||
return label.GetInt64Value(container.Labels, labelName, defaultValue)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getFuncMapLabel(labelName string) func(container dockerData) map[string]string {
|
|
||||||
return func(container dockerData) map[string]string {
|
|
||||||
return label.GetMapValue(container.Labels, labelName)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getFuncStringLabel(labelName string, defaultValue string) func(container dockerData) string {
|
func getFuncStringLabel(labelName string, defaultValue string) func(container dockerData) string {
|
||||||
return func(container dockerData) string {
|
return func(container dockerData) string {
|
||||||
return label.GetStringValue(container.Labels, labelName, defaultValue)
|
return label.GetStringValue(container.Labels, labelName, defaultValue)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func getFuncIntLabel(labelName string, defaultValue int) func(container dockerData) int {
|
|
||||||
return func(container dockerData) int {
|
|
||||||
return label.GetIntValue(container.Labels, labelName, defaultValue)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getFuncBoolLabel(labelName string, defaultValue bool) func(container dockerData) bool {
|
func getFuncBoolLabel(labelName string, defaultValue bool) func(container dockerData) bool {
|
||||||
return func(container dockerData) bool {
|
return func(container dockerData) bool {
|
||||||
return label.GetBoolValue(container.Labels, labelName, defaultValue)
|
return label.GetBoolValue(container.Labels, labelName, defaultValue)
|
||||||
|
@ -234,6 +319,19 @@ func getFuncSliceStringLabel(labelName string) func(container dockerData) []stri
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getFuncIntLabel(labelName string, defaultValue int) func(container dockerData) int {
|
||||||
|
return func(container dockerData) int {
|
||||||
|
return label.GetIntValue(container.Labels, labelName, defaultValue)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func getFuncInt64Label(labelName string, defaultValue int64) func(container dockerData) int64 {
|
||||||
|
return func(container dockerData) int64 {
|
||||||
|
return label.GetInt64Value(container.Labels, labelName, defaultValue)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated
|
||||||
func hasFunc(labelName string) func(container dockerData) bool {
|
func hasFunc(labelName string) func(container dockerData) bool {
|
||||||
return func(container dockerData) bool {
|
return func(container dockerData) bool {
|
||||||
return label.Has(container.Labels, labelName)
|
return label.Has(container.Labels, labelName)
|
||||||
|
|
|
@ -18,16 +18,19 @@ import (
|
||||||
|
|
||||||
func TestDockerBuildConfiguration(t *testing.T) {
|
func TestDockerBuildConfiguration(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
containers []docker.ContainerJSON
|
containers []docker.ContainerJSON
|
||||||
expectedFrontends map[string]*types.Frontend
|
expectedFrontends map[string]*types.Frontend
|
||||||
expectedBackends map[string]*types.Backend
|
expectedBackends map[string]*types.Backend
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
|
desc: "when no container",
|
||||||
containers: []docker.ContainerJSON{},
|
containers: []docker.ContainerJSON{},
|
||||||
expectedFrontends: map[string]*types.Frontend{},
|
expectedFrontends: map[string]*types.Frontend{},
|
||||||
expectedBackends: map[string]*types.Backend{},
|
expectedBackends: map[string]*types.Backend{},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
desc: "when basic container configuration",
|
||||||
containers: []docker.ContainerJSON{
|
containers: []docker.ContainerJSON{
|
||||||
containerJSON(
|
containerJSON(
|
||||||
name("test"),
|
name("test"),
|
||||||
|
@ -63,23 +66,15 @@ func TestDockerBuildConfiguration(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
desc: "when container has label 'enable' to false",
|
||||||
containers: []docker.ContainerJSON{
|
containers: []docker.ContainerJSON{
|
||||||
containerJSON(
|
containerJSON(
|
||||||
name("test1"),
|
name("test"),
|
||||||
labels(map[string]string{
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
label.TraefikFrontendEntryPoints: "http,https",
|
|
||||||
label.TraefikFrontendAuthBasic: "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
|
||||||
label.TraefikFrontendRedirectEntryPoint: "https",
|
|
||||||
}),
|
|
||||||
ports(nat.PortMap{
|
|
||||||
"80/tcp": {},
|
|
||||||
}),
|
|
||||||
withNetwork("bridge", ipv4("127.0.0.1")),
|
|
||||||
),
|
|
||||||
containerJSON(
|
|
||||||
name("test2"),
|
|
||||||
labels(map[string]string{
|
labels(map[string]string{
|
||||||
|
label.TraefikEnable: "false",
|
||||||
|
label.TraefikPort: "666",
|
||||||
|
label.TraefikProtocol: "https",
|
||||||
|
label.TraefikWeight: "12",
|
||||||
label.TraefikBackend: "foobar",
|
label.TraefikBackend: "foobar",
|
||||||
}),
|
}),
|
||||||
ports(nat.PortMap{
|
ports(nat.PortMap{
|
||||||
|
@ -88,162 +83,71 @@ func TestDockerBuildConfiguration(t *testing.T) {
|
||||||
withNetwork("bridge", ipv4("127.0.0.1")),
|
withNetwork("bridge", ipv4("127.0.0.1")),
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
expectedFrontends: map[string]*types.Frontend{},
|
||||||
"frontend-Host-test1-docker-localhost-0": {
|
expectedBackends: map[string]*types.Backend{},
|
||||||
Backend: "backend-foobar",
|
|
||||||
PassHostHeader: true,
|
|
||||||
EntryPoints: []string{"http", "https"},
|
|
||||||
BasicAuth: []string{"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/", "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"},
|
|
||||||
Redirect: &types.Redirect{
|
|
||||||
EntryPoint: "https",
|
|
||||||
},
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test1-docker-localhost-0": {
|
|
||||||
Rule: "Host:test1.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"frontend-Host-test2-docker-localhost-1": {
|
|
||||||
Backend: "backend-foobar",
|
|
||||||
PassHostHeader: true,
|
|
||||||
EntryPoints: []string{},
|
|
||||||
BasicAuth: []string{},
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test2-docker-localhost-1": {
|
|
||||||
Rule: "Host:test2.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedBackends: map[string]*types.Backend{
|
|
||||||
"backend-foobar": {
|
|
||||||
Servers: map[string]types.Server{
|
|
||||||
"server-test1": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
"server-test2": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
CircuitBreaker: nil,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
desc: "when all labels are set",
|
||||||
containers: []docker.ContainerJSON{
|
containers: []docker.ContainerJSON{
|
||||||
containerJSON(
|
containerJSON(
|
||||||
name("test1"),
|
name("test1"),
|
||||||
labels(map[string]string{
|
labels(map[string]string{
|
||||||
|
label.TraefikPort: "666",
|
||||||
|
label.TraefikProtocol: "https",
|
||||||
|
label.TraefikWeight: "12",
|
||||||
|
|
||||||
label.TraefikBackend: "foobar",
|
label.TraefikBackend: "foobar",
|
||||||
label.TraefikFrontendEntryPoints: "http,https",
|
|
||||||
label.TraefikBackendMaxConnAmount: "1000",
|
|
||||||
label.TraefikBackendMaxConnExtractorFunc: "somethingelse",
|
|
||||||
label.TraefikBackendLoadBalancerMethod: "drr",
|
|
||||||
label.TraefikBackendCircuitBreakerExpression: "NetworkErrorRatio() > 0.5",
|
label.TraefikBackendCircuitBreakerExpression: "NetworkErrorRatio() > 0.5",
|
||||||
}),
|
label.TraefikBackendHealthCheckPath: "/health",
|
||||||
ports(nat.PortMap{
|
label.TraefikBackendHealthCheckPort: "880",
|
||||||
"80/tcp": {},
|
label.TraefikBackendHealthCheckInterval: "6",
|
||||||
}),
|
label.TraefikBackendLoadBalancerMethod: "drr",
|
||||||
withNetwork("bridge", ipv4("127.0.0.1")),
|
label.TraefikBackendLoadBalancerSticky: "true",
|
||||||
),
|
label.TraefikBackendLoadBalancerStickiness: "true",
|
||||||
},
|
label.TraefikBackendLoadBalancerStickinessCookieName: "chocolate",
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
label.TraefikBackendMaxConnAmount: "666",
|
||||||
"frontend-Host-test1-docker-localhost-0": {
|
label.TraefikBackendMaxConnExtractorFunc: "client.ip",
|
||||||
Backend: "backend-foobar",
|
|
||||||
PassHostHeader: true,
|
label.TraefikFrontendAuthBasic: "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
||||||
EntryPoints: []string{"http", "https"},
|
label.TraefikFrontendEntryPoints: "http,https",
|
||||||
BasicAuth: []string{},
|
label.TraefikFrontendPassHostHeader: "true",
|
||||||
Routes: map[string]types.Route{
|
label.TraefikFrontendPassTLSCert: "true",
|
||||||
"route-frontend-Host-test1-docker-localhost-0": {
|
label.TraefikFrontendPriority: "666",
|
||||||
Rule: "Host:test1.docker.localhost",
|
label.TraefikFrontendRedirectEntryPoint: "https",
|
||||||
},
|
label.TraefikFrontendRedirectRegex: "nope",
|
||||||
},
|
label.TraefikFrontendRedirectReplacement: "nope",
|
||||||
},
|
label.TraefikFrontendRule: "Host:traefik.io",
|
||||||
},
|
label.TraefikFrontendWhitelistSourceRange: "10.10.10.10",
|
||||||
expectedBackends: map[string]*types.Backend{
|
|
||||||
"backend-foobar": {
|
label.TraefikFrontendRequestHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
Servers: map[string]types.Server{
|
label.TraefikFrontendResponseHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
"server-test1": {
|
label.TraefikFrontendSSLProxyHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
URL: "http://127.0.0.1:80",
|
label.TraefikFrontendAllowedHosts: "foo,bar,bor",
|
||||||
Weight: 0,
|
label.TraefikFrontendHostsProxyHeaders: "foo,bar,bor",
|
||||||
},
|
label.TraefikFrontendSSLHost: "foo",
|
||||||
},
|
label.TraefikFrontendCustomFrameOptionsValue: "foo",
|
||||||
CircuitBreaker: &types.CircuitBreaker{
|
label.TraefikFrontendContentSecurityPolicy: "foo",
|
||||||
Expression: "NetworkErrorRatio() > 0.5",
|
label.TraefikFrontendPublicKey: "foo",
|
||||||
},
|
label.TraefikFrontendReferrerPolicy: "foo",
|
||||||
LoadBalancer: &types.LoadBalancer{
|
label.TraefikFrontendSTSSeconds: "666",
|
||||||
Method: "drr",
|
label.TraefikFrontendSSLRedirect: "true",
|
||||||
},
|
label.TraefikFrontendSSLTemporaryRedirect: "true",
|
||||||
MaxConn: &types.MaxConn{
|
label.TraefikFrontendSTSIncludeSubdomains: "true",
|
||||||
Amount: 1000,
|
label.TraefikFrontendSTSPreload: "true",
|
||||||
ExtractorFunc: "somethingelse",
|
label.TraefikFrontendForceSTSHeader: "true",
|
||||||
},
|
label.TraefikFrontendFrameDeny: "true",
|
||||||
},
|
label.TraefikFrontendContentTypeNosniff: "true",
|
||||||
},
|
label.TraefikFrontendBrowserXSSFilter: "true",
|
||||||
},
|
label.TraefikFrontendIsDevelopment: "true",
|
||||||
{
|
|
||||||
containers: []docker.ContainerJSON{
|
|
||||||
containerJSON(
|
|
||||||
name("test1"),
|
|
||||||
labels(map[string]string{
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageStatus: "404",
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageStatus: "404",
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageBackend: "foobar",
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageBackend: "foobar",
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageQuery: "foo_query",
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageQuery: "foo_query",
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageStatus: "500,600",
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageStatus: "500,600",
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageBackend: "foobar",
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageBackend: "foobar",
|
||||||
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageQuery: "bar_query",
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageQuery: "bar_query",
|
||||||
}),
|
|
||||||
ports(nat.PortMap{
|
|
||||||
"80/tcp": {},
|
|
||||||
}),
|
|
||||||
withNetwork("bridge", ipv4("127.0.0.1")),
|
|
||||||
),
|
|
||||||
},
|
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
|
||||||
"frontend-Host-test1-docker-localhost-0": {
|
|
||||||
EntryPoints: []string{},
|
|
||||||
BasicAuth: []string{},
|
|
||||||
PassHostHeader: true,
|
|
||||||
Backend: "backend-foobar",
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test1-docker-localhost-0": {
|
|
||||||
Rule: "Host:test1.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
Errors: map[string]*types.ErrorPage{
|
|
||||||
"foo": {
|
|
||||||
Status: []string{"404"},
|
|
||||||
Query: "foo_query",
|
|
||||||
Backend: "foobar",
|
|
||||||
},
|
|
||||||
"bar": {
|
|
||||||
Status: []string{"500", "600"},
|
|
||||||
Query: "bar_query",
|
|
||||||
Backend: "foobar",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedBackends: map[string]*types.Backend{
|
|
||||||
"backend-foobar": {
|
|
||||||
Servers: map[string]types.Server{
|
|
||||||
"server-test1": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
containers: []docker.ContainerJSON{
|
|
||||||
containerJSON(
|
|
||||||
name("test1"),
|
|
||||||
labels(map[string]string{
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
label.TraefikFrontendRateLimitExtractorFunc: "client.ip",
|
label.TraefikFrontendRateLimitExtractorFunc: "client.ip",
|
||||||
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitPeriod: "6",
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitPeriod: "6",
|
||||||
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitAverage: "12",
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitAverage: "12",
|
||||||
|
@ -259,14 +163,76 @@ func TestDockerBuildConfiguration(t *testing.T) {
|
||||||
),
|
),
|
||||||
},
|
},
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
expectedFrontends: map[string]*types.Frontend{
|
||||||
"frontend-Host-test1-docker-localhost-0": {
|
"frontend-Host-traefik-io-0": {
|
||||||
EntryPoints: []string{},
|
EntryPoints: []string{
|
||||||
BasicAuth: []string{},
|
"http",
|
||||||
PassHostHeader: true,
|
"https",
|
||||||
|
},
|
||||||
Backend: "backend-foobar",
|
Backend: "backend-foobar",
|
||||||
Routes: map[string]types.Route{
|
Routes: map[string]types.Route{
|
||||||
"route-frontend-Host-test1-docker-localhost-0": {
|
"route-frontend-Host-traefik-io-0": {
|
||||||
Rule: "Host:test1.docker.localhost",
|
Rule: "Host:traefik.io",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
PassHostHeader: true,
|
||||||
|
PassTLSCert: true,
|
||||||
|
Priority: 666,
|
||||||
|
BasicAuth: []string{
|
||||||
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
||||||
|
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
||||||
|
},
|
||||||
|
WhitelistSourceRange: []string{
|
||||||
|
"10.10.10.10",
|
||||||
|
},
|
||||||
|
Headers: &types.Headers{
|
||||||
|
CustomRequestHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
CustomResponseHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
AllowedHosts: []string{
|
||||||
|
"foo",
|
||||||
|
"bar",
|
||||||
|
"bor",
|
||||||
|
},
|
||||||
|
HostsProxyHeaders: []string{
|
||||||
|
"foo",
|
||||||
|
"bar",
|
||||||
|
"bor",
|
||||||
|
},
|
||||||
|
SSLRedirect: true,
|
||||||
|
SSLTemporaryRedirect: true,
|
||||||
|
SSLHost: "foo",
|
||||||
|
SSLProxyHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
STSSeconds: 666,
|
||||||
|
STSIncludeSubdomains: true,
|
||||||
|
STSPreload: true,
|
||||||
|
ForceSTSHeader: true,
|
||||||
|
FrameDeny: true,
|
||||||
|
CustomFrameOptionsValue: "foo",
|
||||||
|
ContentTypeNosniff: true,
|
||||||
|
BrowserXSSFilter: true,
|
||||||
|
ContentSecurityPolicy: "foo",
|
||||||
|
PublicKey: "foo",
|
||||||
|
ReferrerPolicy: "foo",
|
||||||
|
IsDevelopment: true,
|
||||||
|
},
|
||||||
|
Errors: map[string]*types.ErrorPage{
|
||||||
|
"foo": {
|
||||||
|
Status: []string{"404"},
|
||||||
|
Query: "foo_query",
|
||||||
|
Backend: "foobar",
|
||||||
|
},
|
||||||
|
"bar": {
|
||||||
|
Status: []string{"500", "600"},
|
||||||
|
Query: "bar_query",
|
||||||
|
Backend: "foobar",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
RateLimit: &types.RateLimit{
|
RateLimit: &types.RateLimit{
|
||||||
|
@ -284,24 +250,48 @@ func TestDockerBuildConfiguration(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
Redirect: &types.Redirect{
|
||||||
|
EntryPoint: "https",
|
||||||
|
Regex: "",
|
||||||
|
Replacement: "",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
expectedBackends: map[string]*types.Backend{
|
expectedBackends: map[string]*types.Backend{
|
||||||
"backend-foobar": {
|
"backend-foobar": {
|
||||||
Servers: map[string]types.Server{
|
Servers: map[string]types.Server{
|
||||||
"server-test1": {
|
"server-test1": {
|
||||||
URL: "http://127.0.0.1:80",
|
URL: "https://127.0.0.1:666",
|
||||||
Weight: 0,
|
Weight: 12,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
CircuitBreaker: &types.CircuitBreaker{
|
||||||
|
Expression: "NetworkErrorRatio() > 0.5",
|
||||||
|
},
|
||||||
|
LoadBalancer: &types.LoadBalancer{
|
||||||
|
Method: "drr",
|
||||||
|
Sticky: true,
|
||||||
|
Stickiness: &types.Stickiness{
|
||||||
|
CookieName: "chocolate",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
MaxConn: &types.MaxConn{
|
||||||
|
Amount: 666,
|
||||||
|
ExtractorFunc: "client.ip",
|
||||||
|
},
|
||||||
|
HealthCheck: &types.HealthCheck{
|
||||||
|
Path: "/health",
|
||||||
|
Port: 880,
|
||||||
|
Interval: "6",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for caseID, test := range testCases {
|
for _, test := range testCases {
|
||||||
test := test
|
test := test
|
||||||
t.Run(strconv.Itoa(caseID), func(t *testing.T) {
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
var dockerDataList []dockerData
|
var dockerDataList []dockerData
|
||||||
for _, cont := range test.containers {
|
for _, cont := range test.containers {
|
||||||
|
@ -848,7 +838,7 @@ func TestDockerGetFrontendRule(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestDockerGetBackend(t *testing.T) {
|
func TestDockerGetBackendName(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
container docker.ContainerJSON
|
container docker.ContainerJSON
|
||||||
expected string
|
expected string
|
||||||
|
@ -881,7 +871,7 @@ func TestDockerGetBackend(t *testing.T) {
|
||||||
t.Run(strconv.Itoa(containerID), func(t *testing.T) {
|
t.Run(strconv.Itoa(containerID), func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
dData := parseContainer(test.container)
|
dData := parseContainer(test.container)
|
||||||
actual := getBackend(dData)
|
actual := getBackendName(dData)
|
||||||
if actual != test.expected {
|
if actual != test.expected {
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
}
|
}
|
||||||
|
@ -1014,6 +1004,313 @@ func TestDockerGetPort(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestDockerGetMaxConn(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.MaxConn
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no max conn labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return nil when no amount label",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendMaxConnExtractorFunc: "client.ip",
|
||||||
|
})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return default when no empty extractorFunc label",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendMaxConnExtractorFunc: "",
|
||||||
|
label.TraefikBackendMaxConnAmount: "666",
|
||||||
|
})),
|
||||||
|
expected: &types.MaxConn{
|
||||||
|
ExtractorFunc: "request.host",
|
||||||
|
Amount: 666,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when max conn labels are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendMaxConnExtractorFunc: "client.ip",
|
||||||
|
label.TraefikBackendMaxConnAmount: "666",
|
||||||
|
})),
|
||||||
|
expected: &types.MaxConn{
|
||||||
|
ExtractorFunc: "client.ip",
|
||||||
|
Amount: 666,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getMaxConn(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDockerGetCircuitBreaker(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.CircuitBreaker
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no CB labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct CB when CB labels are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendCircuitBreakerExpression: "NetworkErrorRatio() > 0.5",
|
||||||
|
})),
|
||||||
|
expected: &types.CircuitBreaker{
|
||||||
|
Expression: "NetworkErrorRatio() > 0.5",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getCircuitBreaker(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDockerGetLoadBalancer(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.LoadBalancer
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no LB labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when labels are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendLoadBalancerMethod: "drr",
|
||||||
|
label.TraefikBackendLoadBalancerSticky: "true",
|
||||||
|
label.TraefikBackendLoadBalancerStickiness: "true",
|
||||||
|
label.TraefikBackendLoadBalancerStickinessCookieName: "foo",
|
||||||
|
})),
|
||||||
|
expected: &types.LoadBalancer{
|
||||||
|
Method: "drr",
|
||||||
|
Sticky: true,
|
||||||
|
Stickiness: &types.Stickiness{
|
||||||
|
CookieName: "foo",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a nil Stickiness when Stickiness is not set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendLoadBalancerMethod: "drr",
|
||||||
|
label.TraefikBackendLoadBalancerSticky: "true",
|
||||||
|
label.TraefikBackendLoadBalancerStickinessCookieName: "foo",
|
||||||
|
})),
|
||||||
|
expected: &types.LoadBalancer{
|
||||||
|
Method: "drr",
|
||||||
|
Sticky: true,
|
||||||
|
Stickiness: nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getLoadBalancer(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDockerGetRedirect(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.Redirect
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no redirect labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should use only entry point tag when mix regex redirect and entry point redirect",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikFrontendRedirectEntryPoint: "https",
|
||||||
|
label.TraefikFrontendRedirectRegex: "(.*)",
|
||||||
|
label.TraefikFrontendRedirectReplacement: "$1",
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
expected: &types.Redirect{
|
||||||
|
EntryPoint: "https",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when entry point redirect label",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikFrontendRedirectEntryPoint: "https",
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
expected: &types.Redirect{
|
||||||
|
EntryPoint: "https",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when regex redirect labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikFrontendRedirectRegex: "(.*)",
|
||||||
|
label.TraefikFrontendRedirectReplacement: "$1",
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
expected: &types.Redirect{
|
||||||
|
Regex: "(.*)",
|
||||||
|
Replacement: "$1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getRedirect(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDockerGetRateLimit(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.RateLimit
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no rate limit labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when rate limit labels are defined",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikFrontendRateLimitExtractorFunc: "client.ip",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitPeriod: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitAverage: "12",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitBurst: "18",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitPeriod: "3",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitAverage: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitBurst: "9",
|
||||||
|
})),
|
||||||
|
expected: &types.RateLimit{
|
||||||
|
ExtractorFunc: "client.ip",
|
||||||
|
RateSet: map[string]*types.Rate{
|
||||||
|
"foo": {
|
||||||
|
Period: flaeg.Duration(6 * time.Second),
|
||||||
|
Average: 12,
|
||||||
|
Burst: 18,
|
||||||
|
},
|
||||||
|
"bar": {
|
||||||
|
Period: flaeg.Duration(3 * time.Second),
|
||||||
|
Average: 6,
|
||||||
|
Burst: 9,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return nil when ExtractorFunc is missing",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitPeriod: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitAverage: "12",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitBurst: "18",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitPeriod: "3",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitAverage: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitBurst: "9",
|
||||||
|
})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getRateLimit(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestGetErrorPages(t *testing.T) {
|
func TestGetErrorPages(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
desc string
|
desc string
|
||||||
|
@ -1069,3 +1366,145 @@ func TestGetErrorPages(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestDockerGetHealthCheck(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.HealthCheck
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no health check labels",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return nil when no health check Path label",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendHealthCheckPort: "80",
|
||||||
|
label.TraefikBackendHealthCheckInterval: "6",
|
||||||
|
})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when health check labels are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikBackendHealthCheckPath: "/health",
|
||||||
|
label.TraefikBackendHealthCheckPort: "80",
|
||||||
|
label.TraefikBackendHealthCheckInterval: "6",
|
||||||
|
})),
|
||||||
|
expected: &types.HealthCheck{
|
||||||
|
Path: "/health",
|
||||||
|
Port: 80,
|
||||||
|
Interval: "6",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getHealthCheck(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDockerGetHeaders(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
container docker.ContainerJSON
|
||||||
|
expected *types.Headers
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "should return nil when no custom headers options are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{})),
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "should return a struct when all custom headers options are set",
|
||||||
|
container: containerJSON(
|
||||||
|
name("test1"),
|
||||||
|
labels(map[string]string{
|
||||||
|
label.TraefikFrontendRequestHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendResponseHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendSSLProxyHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendAllowedHosts: "foo,bar,bor",
|
||||||
|
label.TraefikFrontendHostsProxyHeaders: "foo,bar,bor",
|
||||||
|
label.TraefikFrontendSSLHost: "foo",
|
||||||
|
label.TraefikFrontendCustomFrameOptionsValue: "foo",
|
||||||
|
label.TraefikFrontendContentSecurityPolicy: "foo",
|
||||||
|
label.TraefikFrontendPublicKey: "foo",
|
||||||
|
label.TraefikFrontendReferrerPolicy: "foo",
|
||||||
|
label.TraefikFrontendSTSSeconds: "666",
|
||||||
|
label.TraefikFrontendSSLRedirect: "true",
|
||||||
|
label.TraefikFrontendSSLTemporaryRedirect: "true",
|
||||||
|
label.TraefikFrontendSTSIncludeSubdomains: "true",
|
||||||
|
label.TraefikFrontendSTSPreload: "true",
|
||||||
|
label.TraefikFrontendForceSTSHeader: "true",
|
||||||
|
label.TraefikFrontendFrameDeny: "true",
|
||||||
|
label.TraefikFrontendContentTypeNosniff: "true",
|
||||||
|
label.TraefikFrontendBrowserXSSFilter: "true",
|
||||||
|
label.TraefikFrontendIsDevelopment: "true",
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
expected: &types.Headers{
|
||||||
|
CustomRequestHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
CustomResponseHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
SSLProxyHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
AllowedHosts: []string{"foo", "bar", "bor"},
|
||||||
|
HostsProxyHeaders: []string{"foo", "bar", "bor"},
|
||||||
|
SSLHost: "foo",
|
||||||
|
CustomFrameOptionsValue: "foo",
|
||||||
|
ContentSecurityPolicy: "foo",
|
||||||
|
PublicKey: "foo",
|
||||||
|
ReferrerPolicy: "foo",
|
||||||
|
STSSeconds: 666,
|
||||||
|
SSLRedirect: true,
|
||||||
|
SSLTemporaryRedirect: true,
|
||||||
|
STSIncludeSubdomains: true,
|
||||||
|
STSPreload: true,
|
||||||
|
ForceSTSHeader: true,
|
||||||
|
FrameDeny: true,
|
||||||
|
ContentTypeNosniff: true,
|
||||||
|
BrowserXSSFilter: true,
|
||||||
|
IsDevelopment: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
dData := parseContainer(test.container)
|
||||||
|
|
||||||
|
actual := getHeaders(dData)
|
||||||
|
|
||||||
|
assert.Equal(t, test.expected, actual)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -4,7 +4,9 @@ import (
|
||||||
"reflect"
|
"reflect"
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/containous/flaeg"
|
||||||
"github.com/containous/traefik/provider/label"
|
"github.com/containous/traefik/provider/label"
|
||||||
"github.com/containous/traefik/types"
|
"github.com/containous/traefik/types"
|
||||||
docker "github.com/docker/docker/api/types"
|
docker "github.com/docker/docker/api/types"
|
||||||
|
@ -13,171 +15,56 @@ import (
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestSwarmGetFrontendName(t *testing.T) {
|
func TestSwarmBuildConfiguration(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
service swarm.Service
|
desc string
|
||||||
expected string
|
services []swarm.Service
|
||||||
|
expectedFrontends map[string]*types.Frontend
|
||||||
|
expectedBackends map[string]*types.Backend
|
||||||
networks map[string]*docker.NetworkResource
|
networks map[string]*docker.NetworkResource
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
service: swarmService(serviceName("foo")),
|
desc: "when no container",
|
||||||
expected: "Host-foo-docker-localhost-0",
|
services: []swarm.Service{},
|
||||||
|
expectedFrontends: map[string]*types.Frontend{},
|
||||||
|
expectedBackends: map[string]*types.Backend{},
|
||||||
networks: map[string]*docker.NetworkResource{},
|
networks: map[string]*docker.NetworkResource{},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
desc: "when basic container configuration",
|
||||||
label.TraefikFrontendRule: "Headers:User-Agent,bat/0.1.0",
|
services: []swarm.Service{
|
||||||
})),
|
swarmService(
|
||||||
expected: "Headers-User-Agent-bat-0-1-0-0",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
|
||||||
label.TraefikFrontendRule: "Host:foo.bar",
|
|
||||||
})),
|
|
||||||
expected: "Host-foo-bar-0",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
|
||||||
label.TraefikFrontendRule: "Path:/test",
|
|
||||||
})),
|
|
||||||
expected: "Path-test-0",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(
|
|
||||||
serviceName("test"),
|
serviceName("test"),
|
||||||
serviceLabels(map[string]string{
|
serviceLabels(map[string]string{
|
||||||
label.TraefikFrontendRule: "PathPrefix:/test2",
|
label.TraefikPort: "80",
|
||||||
}),
|
}),
|
||||||
),
|
|
||||||
expected: "PathPrefix-test2-0",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for serviceID, test := range testCases {
|
|
||||||
test := test
|
|
||||||
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
dData := parseService(test.service, test.networks)
|
|
||||||
provider := &Provider{
|
|
||||||
Domain: "docker.localhost",
|
|
||||||
SwarmMode: true,
|
|
||||||
}
|
|
||||||
actual := provider.getFrontendName(dData, 0)
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSwarmGetFrontendRule(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
service swarm.Service
|
|
||||||
expected string
|
|
||||||
networks map[string]*docker.NetworkResource
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
service: swarmService(serviceName("foo")),
|
|
||||||
expected: "Host:foo.docker.localhost",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceName("bar")),
|
|
||||||
expected: "Host:bar.docker.localhost",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
|
||||||
label.TraefikFrontendRule: "Host:foo.bar",
|
|
||||||
})),
|
|
||||||
expected: "Host:foo.bar",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
|
||||||
label.TraefikFrontendRule: "Path:/test",
|
|
||||||
})),
|
|
||||||
expected: "Path:/test",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for serviceID, test := range testCases {
|
|
||||||
test := test
|
|
||||||
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
dData := parseService(test.service, test.networks)
|
|
||||||
provider := &Provider{
|
|
||||||
Domain: "docker.localhost",
|
|
||||||
SwarmMode: true,
|
|
||||||
}
|
|
||||||
actual := provider.getFrontendRule(dData)
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSwarmGetBackend(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
service swarm.Service
|
|
||||||
expected string
|
|
||||||
networks map[string]*docker.NetworkResource
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
service: swarmService(serviceName("foo")),
|
|
||||||
expected: "foo",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceName("bar")),
|
|
||||||
expected: "bar",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(serviceLabels(map[string]string{
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
})),
|
|
||||||
expected: "foobar",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for serviceID, test := range testCases {
|
|
||||||
test := test
|
|
||||||
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
dData := parseService(test.service, test.networks)
|
|
||||||
actual := getBackend(dData)
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSwarmGetIPAddress(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
service swarm.Service
|
|
||||||
expected string
|
|
||||||
networks map[string]*docker.NetworkResource
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
service: swarmService(withEndpointSpec(modeDNSSR)),
|
|
||||||
expected: "",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
service: swarmService(
|
|
||||||
withEndpointSpec(modeVIP),
|
withEndpointSpec(modeVIP),
|
||||||
withEndpoint(virtualIP("1", "10.11.12.13/24")),
|
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
||||||
),
|
),
|
||||||
expected: "10.11.12.13",
|
},
|
||||||
|
expectedFrontends: map[string]*types.Frontend{
|
||||||
|
"frontend-Host-test-docker-localhost-0": {
|
||||||
|
Backend: "backend-test",
|
||||||
|
PassHostHeader: true,
|
||||||
|
EntryPoints: []string{},
|
||||||
|
BasicAuth: []string{},
|
||||||
|
Routes: map[string]types.Route{
|
||||||
|
"route-frontend-Host-test-docker-localhost-0": {
|
||||||
|
Rule: "Host:test.docker.localhost",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedBackends: map[string]*types.Backend{
|
||||||
|
"backend-test": {
|
||||||
|
Servers: map[string]types.Server{
|
||||||
|
"server-test": {
|
||||||
|
URL: "http://127.0.0.1:80",
|
||||||
|
Weight: 0,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
networks: map[string]*docker.NetworkResource{
|
networks: map[string]*docker.NetworkResource{
|
||||||
"1": {
|
"1": {
|
||||||
Name: "foo",
|
Name: "foo",
|
||||||
|
@ -185,71 +72,257 @@ func TestSwarmGetIPAddress(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
service: swarmService(
|
desc: "when container has label 'enable' to false",
|
||||||
|
services: []swarm.Service{
|
||||||
|
swarmService(
|
||||||
|
serviceName("test1"),
|
||||||
serviceLabels(map[string]string{
|
serviceLabels(map[string]string{
|
||||||
labelDockerNetwork: "barnet",
|
label.TraefikEnable: "false",
|
||||||
|
label.TraefikPort: "666",
|
||||||
|
label.TraefikProtocol: "https",
|
||||||
|
label.TraefikWeight: "12",
|
||||||
|
label.TraefikBackend: "foobar",
|
||||||
}),
|
}),
|
||||||
withEndpointSpec(modeVIP),
|
withEndpointSpec(modeVIP),
|
||||||
withEndpoint(
|
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
||||||
virtualIP("1", "10.11.12.13/24"),
|
|
||||||
virtualIP("2", "10.11.12.99/24"),
|
|
||||||
),
|
),
|
||||||
),
|
},
|
||||||
expected: "10.11.12.99",
|
expectedFrontends: map[string]*types.Frontend{},
|
||||||
|
expectedBackends: map[string]*types.Backend{},
|
||||||
networks: map[string]*docker.NetworkResource{
|
networks: map[string]*docker.NetworkResource{
|
||||||
"1": {
|
"1": {
|
||||||
Name: "foonet",
|
Name: "foo",
|
||||||
},
|
},
|
||||||
"2": {
|
},
|
||||||
Name: "barnet",
|
},
|
||||||
|
{
|
||||||
|
desc: "when all labels are set",
|
||||||
|
services: []swarm.Service{
|
||||||
|
swarmService(
|
||||||
|
serviceName("test1"),
|
||||||
|
serviceLabels(map[string]string{
|
||||||
|
label.TraefikPort: "666",
|
||||||
|
label.TraefikProtocol: "https",
|
||||||
|
label.TraefikWeight: "12",
|
||||||
|
|
||||||
|
label.TraefikBackend: "foobar",
|
||||||
|
|
||||||
|
label.TraefikBackendCircuitBreakerExpression: "NetworkErrorRatio() > 0.5",
|
||||||
|
label.TraefikBackendHealthCheckPath: "/health",
|
||||||
|
label.TraefikBackendHealthCheckPort: "880",
|
||||||
|
label.TraefikBackendHealthCheckInterval: "6",
|
||||||
|
label.TraefikBackendLoadBalancerMethod: "drr",
|
||||||
|
label.TraefikBackendLoadBalancerSticky: "true",
|
||||||
|
label.TraefikBackendLoadBalancerStickiness: "true",
|
||||||
|
label.TraefikBackendLoadBalancerStickinessCookieName: "chocolate",
|
||||||
|
label.TraefikBackendMaxConnAmount: "666",
|
||||||
|
label.TraefikBackendMaxConnExtractorFunc: "client.ip",
|
||||||
|
|
||||||
|
label.TraefikFrontendAuthBasic: "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
||||||
|
label.TraefikFrontendEntryPoints: "http,https",
|
||||||
|
label.TraefikFrontendPassHostHeader: "true",
|
||||||
|
label.TraefikFrontendPassTLSCert: "true",
|
||||||
|
label.TraefikFrontendPriority: "666",
|
||||||
|
label.TraefikFrontendRedirectEntryPoint: "https",
|
||||||
|
label.TraefikFrontendRedirectRegex: "nope",
|
||||||
|
label.TraefikFrontendRedirectReplacement: "nope",
|
||||||
|
label.TraefikFrontendRule: "Host:traefik.io",
|
||||||
|
label.TraefikFrontendWhitelistSourceRange: "10.10.10.10",
|
||||||
|
|
||||||
|
label.TraefikFrontendRequestHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendResponseHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendSSLProxyHeaders: "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8",
|
||||||
|
label.TraefikFrontendAllowedHosts: "foo,bar,bor",
|
||||||
|
label.TraefikFrontendHostsProxyHeaders: "foo,bar,bor",
|
||||||
|
label.TraefikFrontendSSLHost: "foo",
|
||||||
|
label.TraefikFrontendCustomFrameOptionsValue: "foo",
|
||||||
|
label.TraefikFrontendContentSecurityPolicy: "foo",
|
||||||
|
label.TraefikFrontendPublicKey: "foo",
|
||||||
|
label.TraefikFrontendReferrerPolicy: "foo",
|
||||||
|
label.TraefikFrontendSTSSeconds: "666",
|
||||||
|
label.TraefikFrontendSSLRedirect: "true",
|
||||||
|
label.TraefikFrontendSSLTemporaryRedirect: "true",
|
||||||
|
label.TraefikFrontendSTSIncludeSubdomains: "true",
|
||||||
|
label.TraefikFrontendSTSPreload: "true",
|
||||||
|
label.TraefikFrontendForceSTSHeader: "true",
|
||||||
|
label.TraefikFrontendFrameDeny: "true",
|
||||||
|
label.TraefikFrontendContentTypeNosniff: "true",
|
||||||
|
label.TraefikFrontendBrowserXSSFilter: "true",
|
||||||
|
label.TraefikFrontendIsDevelopment: "true",
|
||||||
|
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageStatus: "404",
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageBackend: "foobar",
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "foo." + label.SuffixErrorPageQuery: "foo_query",
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageStatus: "500,600",
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageBackend: "foobar",
|
||||||
|
label.Prefix + label.BaseFrontendErrorPage + "bar." + label.SuffixErrorPageQuery: "bar_query",
|
||||||
|
|
||||||
|
label.TraefikFrontendRateLimitExtractorFunc: "client.ip",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitPeriod: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitAverage: "12",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "foo." + label.SuffixRateLimitBurst: "18",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitPeriod: "3",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitAverage: "6",
|
||||||
|
label.Prefix + label.BaseFrontendRateLimit + "bar." + label.SuffixRateLimitBurst: "9",
|
||||||
|
}),
|
||||||
|
withEndpointSpec(modeVIP),
|
||||||
|
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
||||||
|
),
|
||||||
|
},
|
||||||
|
expectedFrontends: map[string]*types.Frontend{
|
||||||
|
"frontend-Host-traefik-io-0": {
|
||||||
|
EntryPoints: []string{
|
||||||
|
"http",
|
||||||
|
"https",
|
||||||
|
},
|
||||||
|
Backend: "backend-foobar",
|
||||||
|
Routes: map[string]types.Route{
|
||||||
|
"route-frontend-Host-traefik-io-0": {
|
||||||
|
Rule: "Host:traefik.io",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
PassHostHeader: true,
|
||||||
|
PassTLSCert: true,
|
||||||
|
Priority: 666,
|
||||||
|
BasicAuth: []string{
|
||||||
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
||||||
|
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
||||||
|
},
|
||||||
|
WhitelistSourceRange: []string{
|
||||||
|
"10.10.10.10",
|
||||||
|
},
|
||||||
|
Headers: &types.Headers{
|
||||||
|
CustomRequestHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
CustomResponseHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
AllowedHosts: []string{
|
||||||
|
"foo",
|
||||||
|
"bar",
|
||||||
|
"bor",
|
||||||
|
},
|
||||||
|
HostsProxyHeaders: []string{
|
||||||
|
"foo",
|
||||||
|
"bar",
|
||||||
|
"bor",
|
||||||
|
},
|
||||||
|
SSLRedirect: true,
|
||||||
|
SSLTemporaryRedirect: true,
|
||||||
|
SSLHost: "foo",
|
||||||
|
SSLProxyHeaders: map[string]string{
|
||||||
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||||
|
"Content-Type": "application/json; charset=utf-8",
|
||||||
|
},
|
||||||
|
STSSeconds: 666,
|
||||||
|
STSIncludeSubdomains: true,
|
||||||
|
STSPreload: true,
|
||||||
|
ForceSTSHeader: true,
|
||||||
|
FrameDeny: true,
|
||||||
|
CustomFrameOptionsValue: "foo",
|
||||||
|
ContentTypeNosniff: true,
|
||||||
|
BrowserXSSFilter: true,
|
||||||
|
ContentSecurityPolicy: "foo",
|
||||||
|
PublicKey: "foo",
|
||||||
|
ReferrerPolicy: "foo",
|
||||||
|
IsDevelopment: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
Errors: map[string]*types.ErrorPage{
|
||||||
|
"foo": {
|
||||||
|
Status: []string{"404"},
|
||||||
|
Query: "foo_query",
|
||||||
|
Backend: "foobar",
|
||||||
|
},
|
||||||
|
"bar": {
|
||||||
|
Status: []string{"500", "600"},
|
||||||
|
Query: "bar_query",
|
||||||
|
Backend: "foobar",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
RateLimit: &types.RateLimit{
|
||||||
|
ExtractorFunc: "client.ip",
|
||||||
|
RateSet: map[string]*types.Rate{
|
||||||
|
"foo": {
|
||||||
|
Period: flaeg.Duration(6 * time.Second),
|
||||||
|
Average: 12,
|
||||||
|
Burst: 18,
|
||||||
|
},
|
||||||
|
"bar": {
|
||||||
|
Period: flaeg.Duration(3 * time.Second),
|
||||||
|
Average: 6,
|
||||||
|
Burst: 9,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Redirect: &types.Redirect{
|
||||||
|
EntryPoint: "https",
|
||||||
|
Regex: "",
|
||||||
|
Replacement: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedBackends: map[string]*types.Backend{
|
||||||
|
"backend-foobar": {
|
||||||
|
Servers: map[string]types.Server{
|
||||||
|
"server-test1": {
|
||||||
|
URL: "https://127.0.0.1:666",
|
||||||
|
Weight: 12,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
CircuitBreaker: &types.CircuitBreaker{
|
||||||
|
Expression: "NetworkErrorRatio() > 0.5",
|
||||||
|
},
|
||||||
|
LoadBalancer: &types.LoadBalancer{
|
||||||
|
Method: "drr",
|
||||||
|
Sticky: true,
|
||||||
|
Stickiness: &types.Stickiness{
|
||||||
|
CookieName: "chocolate",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
MaxConn: &types.MaxConn{
|
||||||
|
Amount: 666,
|
||||||
|
ExtractorFunc: "client.ip",
|
||||||
|
},
|
||||||
|
HealthCheck: &types.HealthCheck{
|
||||||
|
Path: "/health",
|
||||||
|
Port: 880,
|
||||||
|
Interval: "6",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
networks: map[string]*docker.NetworkResource{
|
||||||
|
"1": {
|
||||||
|
Name: "foo",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for serviceID, test := range testCases {
|
for _, test := range testCases {
|
||||||
test := test
|
test := test
|
||||||
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
dData := parseService(test.service, test.networks)
|
var dockerDataList []dockerData
|
||||||
|
for _, service := range test.services {
|
||||||
|
dData := parseService(service, test.networks)
|
||||||
|
dockerDataList = append(dockerDataList, dData)
|
||||||
|
}
|
||||||
|
|
||||||
provider := &Provider{
|
provider := &Provider{
|
||||||
|
Domain: "docker.localhost",
|
||||||
|
ExposedByDefault: true,
|
||||||
SwarmMode: true,
|
SwarmMode: true,
|
||||||
}
|
}
|
||||||
actual := provider.getIPAddress(dData)
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSwarmGetPort(t *testing.T) {
|
actualConfig := provider.buildConfiguration(dockerDataList)
|
||||||
testCases := []struct {
|
require.NotNil(t, actualConfig, "actualConfig")
|
||||||
service swarm.Service
|
|
||||||
expected string
|
|
||||||
networks map[string]*docker.NetworkResource
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
service: swarmService(
|
|
||||||
serviceLabels(map[string]string{
|
|
||||||
label.TraefikPort: "8080",
|
|
||||||
}),
|
|
||||||
withEndpointSpec(modeDNSSR),
|
|
||||||
),
|
|
||||||
expected: "8080",
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for serviceID, test := range testCases {
|
assert.EqualValues(t, test.expectedBackends, actualConfig.Backends)
|
||||||
test := test
|
assert.EqualValues(t, test.expectedFrontends, actualConfig.Frontends)
|
||||||
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
dData := parseService(test.service, test.networks)
|
|
||||||
actual := getPort(dData)
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("expected %q, got %q", test.expected, actual)
|
|
||||||
}
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -388,161 +461,6 @@ func TestSwarmTraefikFilter(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSwarmLoadDockerConfig(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
services []swarm.Service
|
|
||||||
expectedFrontends map[string]*types.Frontend
|
|
||||||
expectedBackends map[string]*types.Backend
|
|
||||||
networks map[string]*docker.NetworkResource
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
services: []swarm.Service{},
|
|
||||||
expectedFrontends: map[string]*types.Frontend{},
|
|
||||||
expectedBackends: map[string]*types.Backend{},
|
|
||||||
networks: map[string]*docker.NetworkResource{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
services: []swarm.Service{
|
|
||||||
swarmService(
|
|
||||||
serviceName("test"),
|
|
||||||
serviceLabels(map[string]string{
|
|
||||||
label.TraefikPort: "80",
|
|
||||||
}),
|
|
||||||
withEndpointSpec(modeVIP),
|
|
||||||
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
|
||||||
),
|
|
||||||
},
|
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
|
||||||
"frontend-Host-test-docker-localhost-0": {
|
|
||||||
Backend: "backend-test",
|
|
||||||
PassHostHeader: true,
|
|
||||||
EntryPoints: []string{},
|
|
||||||
BasicAuth: []string{},
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test-docker-localhost-0": {
|
|
||||||
Rule: "Host:test.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedBackends: map[string]*types.Backend{
|
|
||||||
"backend-test": {
|
|
||||||
Servers: map[string]types.Server{
|
|
||||||
"server-test": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
CircuitBreaker: nil,
|
|
||||||
LoadBalancer: nil,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
networks: map[string]*docker.NetworkResource{
|
|
||||||
"1": {
|
|
||||||
Name: "foo",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
services: []swarm.Service{
|
|
||||||
swarmService(
|
|
||||||
serviceName("test1"),
|
|
||||||
serviceLabels(map[string]string{
|
|
||||||
label.TraefikPort: "80",
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
label.TraefikFrontendEntryPoints: "http,https",
|
|
||||||
label.TraefikFrontendAuthBasic: "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
|
||||||
label.TraefikFrontendRedirectEntryPoint: "https",
|
|
||||||
}),
|
|
||||||
withEndpointSpec(modeVIP),
|
|
||||||
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
|
||||||
),
|
|
||||||
swarmService(
|
|
||||||
serviceName("test2"),
|
|
||||||
serviceLabels(map[string]string{
|
|
||||||
label.TraefikPort: "80",
|
|
||||||
label.TraefikBackend: "foobar",
|
|
||||||
}),
|
|
||||||
withEndpointSpec(modeVIP),
|
|
||||||
withEndpoint(virtualIP("1", "127.0.0.1/24")),
|
|
||||||
),
|
|
||||||
},
|
|
||||||
expectedFrontends: map[string]*types.Frontend{
|
|
||||||
"frontend-Host-test1-docker-localhost-0": {
|
|
||||||
Backend: "backend-foobar",
|
|
||||||
PassHostHeader: true,
|
|
||||||
EntryPoints: []string{"http", "https"},
|
|
||||||
BasicAuth: []string{"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/", "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"},
|
|
||||||
Redirect: &types.Redirect{
|
|
||||||
EntryPoint: "https",
|
|
||||||
},
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test1-docker-localhost-0": {
|
|
||||||
Rule: "Host:test1.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"frontend-Host-test2-docker-localhost-1": {
|
|
||||||
Backend: "backend-foobar",
|
|
||||||
PassHostHeader: true,
|
|
||||||
EntryPoints: []string{},
|
|
||||||
BasicAuth: []string{},
|
|
||||||
Routes: map[string]types.Route{
|
|
||||||
"route-frontend-Host-test2-docker-localhost-1": {
|
|
||||||
Rule: "Host:test2.docker.localhost",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedBackends: map[string]*types.Backend{
|
|
||||||
"backend-foobar": {
|
|
||||||
Servers: map[string]types.Server{
|
|
||||||
"server-test1": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
"server-test2": {
|
|
||||||
URL: "http://127.0.0.1:80",
|
|
||||||
Weight: 0,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
CircuitBreaker: nil,
|
|
||||||
LoadBalancer: nil,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
networks: map[string]*docker.NetworkResource{
|
|
||||||
"1": {
|
|
||||||
Name: "foo",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for caseID, test := range testCases {
|
|
||||||
test := test
|
|
||||||
t.Run(strconv.Itoa(caseID), func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
var dockerDataList []dockerData
|
|
||||||
for _, service := range test.services {
|
|
||||||
dData := parseService(service, test.networks)
|
|
||||||
dockerDataList = append(dockerDataList, dData)
|
|
||||||
}
|
|
||||||
|
|
||||||
provider := &Provider{
|
|
||||||
Domain: "docker.localhost",
|
|
||||||
ExposedByDefault: true,
|
|
||||||
SwarmMode: true,
|
|
||||||
}
|
|
||||||
|
|
||||||
actualConfig := provider.buildConfiguration(dockerDataList)
|
|
||||||
require.NotNil(t, actualConfig, "actualConfig")
|
|
||||||
|
|
||||||
assert.EqualValues(t, test.expectedBackends, actualConfig.Backends)
|
|
||||||
assert.EqualValues(t, test.expectedFrontends, actualConfig.Frontends)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSwarmTaskParsing(t *testing.T) {
|
func TestSwarmTaskParsing(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
service swarm.Service
|
service swarm.Service
|
||||||
|
@ -647,3 +565,244 @@ func TestSwarmGetFuncStringLabel(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSwarmGetFrontendName(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
service swarm.Service
|
||||||
|
expected string
|
||||||
|
networks map[string]*docker.NetworkResource
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
service: swarmService(serviceName("foo")),
|
||||||
|
expected: "Host-foo-docker-localhost-0",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "Headers:User-Agent,bat/0.1.0",
|
||||||
|
})),
|
||||||
|
expected: "Headers-User-Agent-bat-0-1-0-0",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "Host:foo.bar",
|
||||||
|
})),
|
||||||
|
expected: "Host-foo-bar-0",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "Path:/test",
|
||||||
|
})),
|
||||||
|
expected: "Path-test-0",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(
|
||||||
|
serviceName("test"),
|
||||||
|
serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "PathPrefix:/test2",
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
expected: "PathPrefix-test2-0",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for serviceID, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
dData := parseService(test.service, test.networks)
|
||||||
|
provider := &Provider{
|
||||||
|
Domain: "docker.localhost",
|
||||||
|
SwarmMode: true,
|
||||||
|
}
|
||||||
|
actual := provider.getFrontendName(dData, 0)
|
||||||
|
if actual != test.expected {
|
||||||
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSwarmGetFrontendRule(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
service swarm.Service
|
||||||
|
expected string
|
||||||
|
networks map[string]*docker.NetworkResource
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
service: swarmService(serviceName("foo")),
|
||||||
|
expected: "Host:foo.docker.localhost",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceName("bar")),
|
||||||
|
expected: "Host:bar.docker.localhost",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "Host:foo.bar",
|
||||||
|
})),
|
||||||
|
expected: "Host:foo.bar",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikFrontendRule: "Path:/test",
|
||||||
|
})),
|
||||||
|
expected: "Path:/test",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for serviceID, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
dData := parseService(test.service, test.networks)
|
||||||
|
provider := &Provider{
|
||||||
|
Domain: "docker.localhost",
|
||||||
|
SwarmMode: true,
|
||||||
|
}
|
||||||
|
actual := provider.getFrontendRule(dData)
|
||||||
|
if actual != test.expected {
|
||||||
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSwarmGetBackendName(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
service swarm.Service
|
||||||
|
expected string
|
||||||
|
networks map[string]*docker.NetworkResource
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
service: swarmService(serviceName("foo")),
|
||||||
|
expected: "foo",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceName("bar")),
|
||||||
|
expected: "bar",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(serviceLabels(map[string]string{
|
||||||
|
label.TraefikBackend: "foobar",
|
||||||
|
})),
|
||||||
|
expected: "foobar",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for serviceID, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
dData := parseService(test.service, test.networks)
|
||||||
|
actual := getBackendName(dData)
|
||||||
|
if actual != test.expected {
|
||||||
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSwarmGetIPAddress(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
service swarm.Service
|
||||||
|
expected string
|
||||||
|
networks map[string]*docker.NetworkResource
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
service: swarmService(withEndpointSpec(modeDNSSR)),
|
||||||
|
expected: "",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(
|
||||||
|
withEndpointSpec(modeVIP),
|
||||||
|
withEndpoint(virtualIP("1", "10.11.12.13/24")),
|
||||||
|
),
|
||||||
|
expected: "10.11.12.13",
|
||||||
|
networks: map[string]*docker.NetworkResource{
|
||||||
|
"1": {
|
||||||
|
Name: "foo",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
service: swarmService(
|
||||||
|
serviceLabels(map[string]string{
|
||||||
|
labelDockerNetwork: "barnet",
|
||||||
|
}),
|
||||||
|
withEndpointSpec(modeVIP),
|
||||||
|
withEndpoint(
|
||||||
|
virtualIP("1", "10.11.12.13/24"),
|
||||||
|
virtualIP("2", "10.11.12.99/24"),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
expected: "10.11.12.99",
|
||||||
|
networks: map[string]*docker.NetworkResource{
|
||||||
|
"1": {
|
||||||
|
Name: "foonet",
|
||||||
|
},
|
||||||
|
"2": {
|
||||||
|
Name: "barnet",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for serviceID, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
dData := parseService(test.service, test.networks)
|
||||||
|
provider := &Provider{
|
||||||
|
SwarmMode: true,
|
||||||
|
}
|
||||||
|
actual := provider.getIPAddress(dData)
|
||||||
|
if actual != test.expected {
|
||||||
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSwarmGetPort(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
service swarm.Service
|
||||||
|
expected string
|
||||||
|
networks map[string]*docker.NetworkResource
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
service: swarmService(
|
||||||
|
serviceLabels(map[string]string{
|
||||||
|
label.TraefikPort: "8080",
|
||||||
|
}),
|
||||||
|
withEndpointSpec(modeDNSSR),
|
||||||
|
),
|
||||||
|
expected: "8080",
|
||||||
|
networks: map[string]*docker.NetworkResource{},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for serviceID, test := range testCases {
|
||||||
|
test := test
|
||||||
|
t.Run(strconv.Itoa(serviceID), func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
dData := parseService(test.service, test.networks)
|
||||||
|
actual := getPort(dData)
|
||||||
|
if actual != test.expected {
|
||||||
|
t.Errorf("expected %q, got %q", test.expected, actual)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -45,14 +45,14 @@ func checkServiceLabelPort(container dockerData) error {
|
||||||
serviceLabels := make(map[string]struct{})
|
serviceLabels := make(map[string]struct{})
|
||||||
for lbl := range container.Labels {
|
for lbl := range container.Labels {
|
||||||
// Get all port service labels
|
// Get all port service labels
|
||||||
portLabel := label.PortRegexp.FindStringSubmatch(lbl)
|
portLabel := extractServicePort(lbl)
|
||||||
if len(portLabel) > 0 {
|
if len(portLabel) > 0 {
|
||||||
serviceLabelPorts[portLabel[0]] = struct{}{}
|
serviceLabelPorts[portLabel[0]] = struct{}{}
|
||||||
}
|
}
|
||||||
// Get only one instance of all service names from service labels
|
// Get only one instance of all service names from service labels
|
||||||
servicesLabelNames := label.ServicesPropertiesRegexp.FindStringSubmatch(lbl)
|
servicesLabelNames := label.FindServiceSubmatch(lbl)
|
||||||
|
|
||||||
if len(servicesLabelNames) > 0 && !strings.HasPrefix(lbl, label.TraefikFrontend) {
|
if len(servicesLabelNames) > 0 {
|
||||||
serviceLabels[strings.Split(servicesLabelNames[0], ".")[1]] = struct{}{}
|
serviceLabels[strings.Split(servicesLabelNames[0], ".")[1]] = struct{}{}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -72,12 +72,21 @@ func checkServiceLabelPort(container dockerData) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func extractServicePort(labelName string) []string {
|
||||||
|
if strings.HasPrefix(labelName, label.TraefikFrontend+".") ||
|
||||||
|
strings.HasPrefix(labelName, label.TraefikBackend+".") {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return label.PortRegexp.FindStringSubmatch(labelName)
|
||||||
|
}
|
||||||
|
|
||||||
// Extract backend from labels for a given service and a given docker container
|
// Extract backend from labels for a given service and a given docker container
|
||||||
func getServiceBackend(container dockerData, serviceName string) string {
|
func getServiceBackendName(container dockerData, serviceName string) string {
|
||||||
if value, ok := getServiceLabels(container, serviceName)[label.SuffixFrontendBackend]; ok {
|
if value, ok := getServiceLabels(container, serviceName)[label.SuffixFrontendBackend]; ok {
|
||||||
return provider.Normalize(container.ServiceName + "-" + value)
|
return provider.Normalize(container.ServiceName + "-" + value)
|
||||||
}
|
}
|
||||||
return provider.Normalize(container.ServiceName + "-" + getBackend(container) + "-" + serviceName)
|
return provider.Normalize(container.ServiceName + "-" + getBackendName(container) + "-" + serviceName)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Extract port from labels for a given service and a given docker container
|
// Extract port from labels for a given service and a given docker container
|
||||||
|
@ -88,54 +97,103 @@ func getServicePort(container dockerData, serviceName string) string {
|
||||||
return getPort(container)
|
return getPort(container)
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasServiceRedirect(container dockerData, serviceName string) bool {
|
func getServiceRedirect(container dockerData, serviceName string) *types.Redirect {
|
||||||
serviceLabels := getServiceLabels(container, serviceName)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
if len(serviceLabels) == 0 {
|
|
||||||
return false
|
if hasStrictServiceLabel(serviceLabels, label.SuffixFrontendRedirectEntryPoint) {
|
||||||
|
return &types.Redirect{
|
||||||
|
EntryPoint: getStrictServiceStringValue(serviceLabels, label.SuffixFrontendRedirectEntryPoint, label.DefaultFrontendRedirectEntryPoint),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return label.Has(serviceLabels, label.SuffixFrontendRedirectEntryPoint) ||
|
if hasStrictServiceLabel(serviceLabels, label.SuffixFrontendRedirectRegex) &&
|
||||||
label.Has(serviceLabels, label.SuffixFrontendRedirectRegex) && label.Has(serviceLabels, label.SuffixFrontendRedirectReplacement)
|
hasStrictServiceLabel(serviceLabels, label.SuffixFrontendRedirectReplacement) {
|
||||||
|
return &types.Redirect{
|
||||||
|
Regex: getStrictServiceStringValue(serviceLabels, label.SuffixFrontendRedirectRegex, ""),
|
||||||
|
Replacement: getStrictServiceStringValue(serviceLabels, label.SuffixFrontendRedirectReplacement, ""),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasServiceErrorPages(container dockerData, serviceName string) bool {
|
return getRedirect(container)
|
||||||
serviceLabels := getServiceLabels(container, serviceName)
|
|
||||||
return label.HasPrefix(serviceLabels, label.BaseFrontendErrorPage)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func getServiceErrorPages(container dockerData, serviceName string) map[string]*types.ErrorPage {
|
func getServiceErrorPages(container dockerData, serviceName string) map[string]*types.ErrorPage {
|
||||||
serviceLabels := getServiceLabels(container, serviceName)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
|
|
||||||
|
if label.HasPrefix(serviceLabels, label.BaseFrontendErrorPage) {
|
||||||
return label.ParseErrorPages(serviceLabels, label.BaseFrontendErrorPage, label.RegexpBaseFrontendErrorPage)
|
return label.ParseErrorPages(serviceLabels, label.BaseFrontendErrorPage, label.RegexpBaseFrontendErrorPage)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getServiceRateLimits(container dockerData, serviceName string) map[string]*types.Rate {
|
return getErrorPages(container)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServiceRateLimit(container dockerData, serviceName string) *types.RateLimit {
|
||||||
serviceLabels := getServiceLabels(container, serviceName)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
return label.ParseRateSets(serviceLabels, label.BaseFrontendRateLimit, label.RegexpBaseFrontendRateLimit)
|
|
||||||
|
if hasStrictServiceLabel(serviceLabels, label.SuffixFrontendRateLimitExtractorFunc) {
|
||||||
|
extractorFunc := getStrictServiceStringValue(serviceLabels, label.SuffixFrontendRateLimitExtractorFunc, label.DefaultBackendMaxconnExtractorFunc)
|
||||||
|
return &types.RateLimit{
|
||||||
|
ExtractorFunc: extractorFunc,
|
||||||
|
RateSet: label.ParseRateSets(serviceLabels, label.BaseFrontendRateLimit, label.RegexpBaseFrontendRateLimit),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return getRateLimit(container)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServiceHeaders(container dockerData, serviceName string) *types.Headers {
|
||||||
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
|
|
||||||
|
headers := &types.Headers{
|
||||||
|
CustomRequestHeaders: getServiceMapValue(container, serviceLabels, serviceName, label.SuffixFrontendRequestHeaders),
|
||||||
|
CustomResponseHeaders: getServiceMapValue(container, serviceLabels, serviceName, label.SuffixFrontendResponseHeaders),
|
||||||
|
SSLProxyHeaders: getServiceMapValue(container, serviceLabels, serviceName, label.SuffixFrontendHeadersSSLProxyHeaders),
|
||||||
|
AllowedHosts: getServiceSliceValue(container, serviceLabels, label.SuffixFrontendHeadersAllowedHosts),
|
||||||
|
HostsProxyHeaders: getServiceSliceValue(container, serviceLabels, label.SuffixFrontendHeadersHostsProxyHeaders),
|
||||||
|
STSSeconds: getServiceInt64Value(container, serviceLabels, label.SuffixFrontendHeadersSTSSeconds, 0),
|
||||||
|
SSLRedirect: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersSSLRedirect, false),
|
||||||
|
SSLTemporaryRedirect: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersSSLTemporaryRedirect, false),
|
||||||
|
STSIncludeSubdomains: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersSTSIncludeSubdomains, false),
|
||||||
|
STSPreload: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersSTSPreload, false),
|
||||||
|
ForceSTSHeader: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersForceSTSHeader, false),
|
||||||
|
FrameDeny: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersFrameDeny, false),
|
||||||
|
ContentTypeNosniff: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersContentTypeNosniff, false),
|
||||||
|
BrowserXSSFilter: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersBrowserXSSFilter, false),
|
||||||
|
IsDevelopment: getServiceBoolValue(container, serviceLabels, label.SuffixFrontendHeadersIsDevelopment, false),
|
||||||
|
SSLHost: getServiceStringValue(container, serviceLabels, label.SuffixFrontendHeadersSSLHost, ""),
|
||||||
|
CustomFrameOptionsValue: getServiceStringValue(container, serviceLabels, label.SuffixFrontendHeadersCustomFrameOptionsValue, ""),
|
||||||
|
ContentSecurityPolicy: getServiceStringValue(container, serviceLabels, label.SuffixFrontendHeadersContentSecurityPolicy, ""),
|
||||||
|
PublicKey: getServiceStringValue(container, serviceLabels, label.SuffixFrontendHeadersPublicKey, ""),
|
||||||
|
ReferrerPolicy: getServiceStringValue(container, serviceLabels, label.SuffixFrontendHeadersReferrerPolicy, ""),
|
||||||
|
}
|
||||||
|
|
||||||
|
if !headers.HasSecureHeadersDefined() && !headers.HasCustomHeadersDefined() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return headers
|
||||||
}
|
}
|
||||||
|
|
||||||
// Service label functions
|
// Service label functions
|
||||||
|
|
||||||
func getFuncServiceMapLabel(labelSuffix string) func(container dockerData, serviceName string) map[string]string {
|
|
||||||
return func(container dockerData, serviceName string) map[string]string {
|
|
||||||
return getServiceMapLabel(container, serviceName, labelSuffix)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getFuncServiceSliceStringLabel(labelSuffix string) func(container dockerData, serviceName string) []string {
|
func getFuncServiceSliceStringLabel(labelSuffix string) func(container dockerData, serviceName string) []string {
|
||||||
return func(container dockerData, serviceName string) []string {
|
return func(container dockerData, serviceName string) []string {
|
||||||
return getServiceSliceStringLabel(container, serviceName, labelSuffix)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
|
return getServiceSliceValue(container, serviceLabels, labelSuffix)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func getFuncServiceStringLabel(labelSuffix string, defaultValue string) func(container dockerData, serviceName string) string {
|
func getFuncServiceStringLabel(labelSuffix string, defaultValue string) func(container dockerData, serviceName string) string {
|
||||||
return func(container dockerData, serviceName string) string {
|
return func(container dockerData, serviceName string) string {
|
||||||
return getServiceStringLabel(container, serviceName, labelSuffix, defaultValue)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
|
return getServiceStringValue(container, serviceLabels, labelSuffix, defaultValue)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func getFuncServiceBoolLabel(labelSuffix string, defaultValue bool) func(container dockerData, serviceName string) bool {
|
func getFuncServiceBoolLabel(labelSuffix string, defaultValue bool) func(container dockerData, serviceName string) bool {
|
||||||
return func(container dockerData, serviceName string) bool {
|
return func(container dockerData, serviceName string) bool {
|
||||||
return getServiceBoolLabel(container, serviceName, labelSuffix, defaultValue)
|
serviceLabels := getServiceLabels(container, serviceName)
|
||||||
|
return getServiceBoolValue(container, serviceLabels, labelSuffix, defaultValue)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -145,44 +203,42 @@ func getFuncServiceIntLabel(labelSuffix string, defaultValue int) func(container
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasFuncServiceLabel(labelSuffix string) func(container dockerData, serviceName string) bool {
|
func hasStrictServiceLabel(serviceLabels map[string]string, labelSuffix string) bool {
|
||||||
return func(container dockerData, serviceName string) bool {
|
value, ok := serviceLabels[labelSuffix]
|
||||||
return hasServiceLabel(container, serviceName, labelSuffix)
|
return ok && len(value) > 0
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func hasServiceLabel(container dockerData, serviceName string, labelSuffix string) bool {
|
func getServiceStringValue(container dockerData, serviceLabels map[string]string, labelSuffix string, defaultValue string) string {
|
||||||
value, ok := getServiceLabels(container, serviceName)[labelSuffix]
|
if value, ok := serviceLabels[labelSuffix]; ok {
|
||||||
if ok && len(value) > 0 {
|
return value
|
||||||
return true
|
|
||||||
}
|
}
|
||||||
return label.Has(container.Labels, label.Prefix+labelSuffix)
|
return label.GetStringValue(container.Labels, label.Prefix+labelSuffix, defaultValue)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getServiceMapLabel(container dockerData, serviceName string, labelSuffix string) map[string]string {
|
func getStrictServiceStringValue(serviceLabels map[string]string, labelSuffix string, defaultValue string) string {
|
||||||
if value, ok := getServiceLabels(container, serviceName)[labelSuffix]; ok {
|
if value, ok := serviceLabels[labelSuffix]; ok {
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
return defaultValue
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServiceMapValue(container dockerData, serviceLabels map[string]string, serviceName string, labelSuffix string) map[string]string {
|
||||||
|
if value, ok := serviceLabels[labelSuffix]; ok {
|
||||||
lblName := label.GetServiceLabel(labelSuffix, serviceName)
|
lblName := label.GetServiceLabel(labelSuffix, serviceName)
|
||||||
return label.ParseMapValue(lblName, value)
|
return label.ParseMapValue(lblName, value)
|
||||||
}
|
}
|
||||||
return label.GetMapValue(container.Labels, label.Prefix+labelSuffix)
|
return label.GetMapValue(container.Labels, label.Prefix+labelSuffix)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getServiceSliceStringLabel(container dockerData, serviceName string, labelSuffix string) []string {
|
func getServiceSliceValue(container dockerData, serviceLabels map[string]string, labelSuffix string) []string {
|
||||||
if value, ok := getServiceLabels(container, serviceName)[labelSuffix]; ok {
|
if value, ok := serviceLabels[labelSuffix]; ok {
|
||||||
return label.SplitAndTrimString(value, ",")
|
return label.SplitAndTrimString(value, ",")
|
||||||
}
|
}
|
||||||
return label.GetSliceStringValue(container.Labels, label.Prefix+labelSuffix)
|
return label.GetSliceStringValue(container.Labels, label.Prefix+labelSuffix)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getServiceStringLabel(container dockerData, serviceName string, labelSuffix string, defaultValue string) string {
|
func getServiceBoolValue(container dockerData, serviceLabels map[string]string, labelSuffix string, defaultValue bool) bool {
|
||||||
if value, ok := getServiceLabels(container, serviceName)[labelSuffix]; ok {
|
if rawValue, ok := serviceLabels[labelSuffix]; ok {
|
||||||
return value
|
|
||||||
}
|
|
||||||
return label.GetStringValue(container.Labels, label.Prefix+labelSuffix, defaultValue)
|
|
||||||
}
|
|
||||||
|
|
||||||
func getServiceBoolLabel(container dockerData, serviceName string, labelSuffix string, defaultValue bool) bool {
|
|
||||||
if rawValue, ok := getServiceLabels(container, serviceName)[labelSuffix]; ok {
|
|
||||||
value, err := strconv.ParseBool(rawValue)
|
value, err := strconv.ParseBool(rawValue)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
return value
|
return value
|
||||||
|
@ -201,6 +257,16 @@ func getServiceIntLabel(container dockerData, serviceName string, labelSuffix st
|
||||||
return label.GetIntValue(container.Labels, label.Prefix+labelSuffix, defaultValue)
|
return label.GetIntValue(container.Labels, label.Prefix+labelSuffix, defaultValue)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getServiceInt64Value(container dockerData, serviceLabels map[string]string, labelSuffix string, defaultValue int64) int64 {
|
||||||
|
if rawValue, ok := serviceLabels[labelSuffix]; ok {
|
||||||
|
value, err := strconv.ParseInt(rawValue, 10, 64)
|
||||||
|
if err == nil {
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return label.GetInt64Value(container.Labels, label.Prefix+labelSuffix, defaultValue)
|
||||||
|
}
|
||||||
|
|
||||||
func getServiceLabels(container dockerData, serviceName string) label.ServicePropertyValues {
|
func getServiceLabels(container dockerData, serviceName string) label.ServicePropertyValues {
|
||||||
return label.ExtractServiceProperties(container.Labels)[serviceName]
|
return label.ExtractServiceProperties(container.Labels)[serviceName]
|
||||||
}
|
}
|
||||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -19,11 +19,14 @@ const (
|
||||||
|
|
||||||
// Default values
|
// Default values
|
||||||
const (
|
const (
|
||||||
DefaultWeight = "0"
|
DefaultWeight = "0" // TODO [breaking] use int value
|
||||||
|
DefaultWeightInt = 0 // TODO rename to DefaultWeight
|
||||||
DefaultProtocol = "http"
|
DefaultProtocol = "http"
|
||||||
DefaultPassHostHeader = "true"
|
DefaultPassHostHeader = "true" // TODO [breaking] use bool value
|
||||||
|
DefaultPassHostHeaderBool = true // TODO rename to DefaultPassHostHeader
|
||||||
DefaultPassTLSCert = false
|
DefaultPassTLSCert = false
|
||||||
DefaultFrontendPriority = "0"
|
DefaultFrontendPriority = "0" // TODO [breaking] int value
|
||||||
|
DefaultFrontendPriorityInt = 0 // TODO rename to DefaultFrontendPriority
|
||||||
DefaultCircuitBreakerExpression = "NetworkErrorRatio() > 1"
|
DefaultCircuitBreakerExpression = "NetworkErrorRatio() > 1"
|
||||||
DefaultFrontendRedirectEntryPoint = ""
|
DefaultFrontendRedirectEntryPoint = ""
|
||||||
DefaultBackendLoadBalancerMethod = "wrr"
|
DefaultBackendLoadBalancerMethod = "wrr"
|
||||||
|
@ -226,13 +229,24 @@ func HasPrefix(labels map[string]string, prefix string) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// FindServiceSubmatch split service label
|
||||||
|
func FindServiceSubmatch(name string) []string {
|
||||||
|
matches := ServicesPropertiesRegexp.FindStringSubmatch(name)
|
||||||
|
if matches == nil ||
|
||||||
|
strings.HasPrefix(name, TraefikFrontend+".") ||
|
||||||
|
strings.HasPrefix(name, TraefikBackend+".") {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return matches
|
||||||
|
}
|
||||||
|
|
||||||
// ExtractServiceProperties Extract services labels
|
// ExtractServiceProperties Extract services labels
|
||||||
func ExtractServiceProperties(labels map[string]string) ServiceProperties {
|
func ExtractServiceProperties(labels map[string]string) ServiceProperties {
|
||||||
v := make(ServiceProperties)
|
v := make(ServiceProperties)
|
||||||
|
|
||||||
for name, value := range labels {
|
for name, value := range labels {
|
||||||
matches := ServicesPropertiesRegexp.FindStringSubmatch(name)
|
matches := FindServiceSubmatch(name)
|
||||||
if matches == nil || strings.HasPrefix(name, TraefikFrontend) {
|
if matches == nil {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -17,10 +17,11 @@ const (
|
||||||
SuffixBackendHealthCheckPath = "backend.healthcheck.path"
|
SuffixBackendHealthCheckPath = "backend.healthcheck.path"
|
||||||
SuffixBackendHealthCheckPort = "backend.healthcheck.port"
|
SuffixBackendHealthCheckPort = "backend.healthcheck.port"
|
||||||
SuffixBackendHealthCheckInterval = "backend.healthcheck.interval"
|
SuffixBackendHealthCheckInterval = "backend.healthcheck.interval"
|
||||||
SuffixBackendLoadBalancerMethod = "backend.loadbalancer.method"
|
SuffixBackendLoadBalancer = "backend.loadbalancer"
|
||||||
SuffixBackendLoadBalancerSticky = "backend.loadbalancer.sticky"
|
SuffixBackendLoadBalancerMethod = SuffixBackendLoadBalancer + ".method"
|
||||||
SuffixBackendLoadBalancerStickiness = "backend.loadbalancer.stickiness"
|
SuffixBackendLoadBalancerSticky = SuffixBackendLoadBalancer + ".sticky"
|
||||||
SuffixBackendLoadBalancerStickinessCookieName = "backend.loadbalancer.stickiness.cookieName"
|
SuffixBackendLoadBalancerStickiness = SuffixBackendLoadBalancer + ".stickiness"
|
||||||
|
SuffixBackendLoadBalancerStickinessCookieName = SuffixBackendLoadBalancer + ".stickiness.cookieName"
|
||||||
SuffixBackendMaxConnAmount = "backend.maxconn.amount"
|
SuffixBackendMaxConnAmount = "backend.maxconn.amount"
|
||||||
SuffixBackendMaxConnExtractorFunc = "backend.maxconn.extractorfunc"
|
SuffixBackendMaxConnExtractorFunc = "backend.maxconn.extractorfunc"
|
||||||
SuffixFrontend = "frontend"
|
SuffixFrontend = "frontend"
|
||||||
|
@ -58,7 +59,6 @@ const (
|
||||||
SuffixFrontendRule = "frontend.rule"
|
SuffixFrontendRule = "frontend.rule"
|
||||||
SuffixFrontendRuleType = "frontend.rule.type"
|
SuffixFrontendRuleType = "frontend.rule.type"
|
||||||
SuffixFrontendWhitelistSourceRange = "frontend.whitelistSourceRange"
|
SuffixFrontendWhitelistSourceRange = "frontend.whitelistSourceRange"
|
||||||
SuffixFrontendValue = "frontend.value"
|
|
||||||
TraefikDomain = Prefix + SuffixDomain
|
TraefikDomain = Prefix + SuffixDomain
|
||||||
TraefikEnable = Prefix + SuffixEnable
|
TraefikEnable = Prefix + SuffixEnable
|
||||||
TraefikPort = Prefix + SuffixPort
|
TraefikPort = Prefix + SuffixPort
|
||||||
|
@ -73,6 +73,7 @@ const (
|
||||||
TraefikBackendHealthCheckPath = Prefix + SuffixBackendHealthCheckPath
|
TraefikBackendHealthCheckPath = Prefix + SuffixBackendHealthCheckPath
|
||||||
TraefikBackendHealthCheckPort = Prefix + SuffixBackendHealthCheckPort
|
TraefikBackendHealthCheckPort = Prefix + SuffixBackendHealthCheckPort
|
||||||
TraefikBackendHealthCheckInterval = Prefix + SuffixBackendHealthCheckInterval
|
TraefikBackendHealthCheckInterval = Prefix + SuffixBackendHealthCheckInterval
|
||||||
|
TraefikBackendLoadBalancer = Prefix + SuffixBackendLoadBalancer
|
||||||
TraefikBackendLoadBalancerMethod = Prefix + SuffixBackendLoadBalancerMethod
|
TraefikBackendLoadBalancerMethod = Prefix + SuffixBackendLoadBalancerMethod
|
||||||
TraefikBackendLoadBalancerSticky = Prefix + SuffixBackendLoadBalancerSticky
|
TraefikBackendLoadBalancerSticky = Prefix + SuffixBackendLoadBalancerSticky
|
||||||
TraefikBackendLoadBalancerStickiness = Prefix + SuffixBackendLoadBalancerStickiness
|
TraefikBackendLoadBalancerStickiness = Prefix + SuffixBackendLoadBalancerStickiness
|
||||||
|
@ -90,8 +91,7 @@ const (
|
||||||
TraefikFrontendRedirectRegex = Prefix + SuffixFrontendRedirectRegex
|
TraefikFrontendRedirectRegex = Prefix + SuffixFrontendRedirectRegex
|
||||||
TraefikFrontendRedirectReplacement = Prefix + SuffixFrontendRedirectReplacement
|
TraefikFrontendRedirectReplacement = Prefix + SuffixFrontendRedirectReplacement
|
||||||
TraefikFrontendRule = Prefix + SuffixFrontendRule
|
TraefikFrontendRule = Prefix + SuffixFrontendRule
|
||||||
TraefikFrontendRuleType = Prefix + SuffixFrontendRuleType
|
TraefikFrontendRuleType = Prefix + SuffixFrontendRuleType // k8s only
|
||||||
TraefikFrontendValue = Prefix + SuffixFrontendValue
|
|
||||||
TraefikFrontendWhitelistSourceRange = Prefix + SuffixFrontendWhitelistSourceRange
|
TraefikFrontendWhitelistSourceRange = Prefix + SuffixFrontendWhitelistSourceRange
|
||||||
TraefikFrontendHeaders = Prefix + SuffixFrontendHeaders
|
TraefikFrontendHeaders = Prefix + SuffixFrontendHeaders
|
||||||
TraefikFrontendRequestHeaders = Prefix + SuffixFrontendRequestHeaders
|
TraefikFrontendRequestHeaders = Prefix + SuffixFrontendRequestHeaders
|
||||||
|
|
|
@ -2,32 +2,36 @@
|
||||||
[backends]
|
[backends]
|
||||||
{{range $backendName, $backend := .Backends}}
|
{{range $backendName, $backend := .Backends}}
|
||||||
|
|
||||||
{{if hasCircuitBreakerLabel $backend}}
|
{{ $circuitBreaker := getCircuitBreaker $backend }}
|
||||||
[backends.backend-{{$backendName}}.circuitBreaker]
|
{{if $circuitBreaker }}
|
||||||
expression = "{{getCircuitBreakerExpression $backend}}"
|
[backends."backend-{{ $backendName }}".circuitBreaker]
|
||||||
|
expression = "{{ $circuitBreaker.Expression }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasLoadBalancerLabel $backend}}
|
{{ $loadBalancer := getLoadBalancer $backend }}
|
||||||
[backends.backend-{{$backendName}}.loadBalancer]
|
{{if $loadBalancer }}
|
||||||
method = "{{getLoadBalancerMethod $backend}}"
|
[backends."backend-{{ $backendName }}".loadBalancer]
|
||||||
sticky = {{getSticky $backend}}
|
method = "{{ $loadBalancer.Method }}"
|
||||||
{{if hasStickinessLabel $backend}}
|
sticky = {{ $loadBalancer.Sticky }}
|
||||||
[backends.backend-{{$backendName}}.loadBalancer.stickiness]
|
{{if $loadBalancer.Stickiness }}
|
||||||
cookieName = "{{getStickinessCookieName $backend}}"
|
[backends."backend-{{ $backendName }}".loadBalancer.stickiness]
|
||||||
|
cookieName = "{{ $loadBalancer.Stickiness.CookieName }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasMaxConnLabels $backend}}
|
{{ $maxConn := getMaxConn $backend }}
|
||||||
[backends.backend-{{$backendName}}.maxConn]
|
{{if $maxConn }}
|
||||||
amount = {{getMaxConnAmount $backend}}
|
[backends."backend-{{ $backendName }}".maxConn]
|
||||||
extractorFunc = "{{getMaxConnExtractorFunc $backend}}"
|
extractorFunc = "{{ $maxConn.ExtractorFunc }}"
|
||||||
|
amount = {{ $maxConn.Amount }}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasHealthCheckLabels $backend}}
|
{{ $healthCheck := getHealthCheck $backend }}
|
||||||
|
{{if $healthCheck }}
|
||||||
[backends.backend-{{ $backendName }}.healthCheck]
|
[backends.backend-{{ $backendName }}.healthCheck]
|
||||||
path = "{{getHealthCheckPath $backend}}"
|
path = "{{ $healthCheck.Path }}"
|
||||||
port = {{getHealthCheckPort $backend}}
|
port = {{ $healthCheck.Port }}
|
||||||
interval = "{{getHealthCheckInterval $backend}}"
|
interval = "{{ $healthCheck.Interval }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ $servers := index $backendServers $backendName }}
|
{{ $servers := index $backendServers $backendName }}
|
||||||
|
@ -35,7 +39,7 @@
|
||||||
{{if hasServices $server }}
|
{{if hasServices $server }}
|
||||||
{{ $services := getServiceNames $server }}
|
{{ $services := getServiceNames $server }}
|
||||||
{{range $serviceIndex, $serviceName := $services }}
|
{{range $serviceIndex, $serviceName := $services }}
|
||||||
[backends.backend-{{getServiceBackend $server $serviceName}}.servers.service-{{$serverName}}]
|
[backends.backend-{{ getServiceBackendName $server $serviceName }}.servers.service-{{ $serverName }}]
|
||||||
url = "{{ getServiceProtocol $server $serviceName }}://{{ getIPAddress $server }}:{{ getServicePort $server $serviceName }}"
|
url = "{{ getServiceProtocol $server $serviceName }}://{{ getIPAddress $server }}:{{ getServicePort $server $serviceName }}"
|
||||||
weight = {{ getServiceWeight $server $serviceName }}
|
weight = {{ getServiceWeight $server $serviceName }}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -49,15 +53,17 @@
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends]
|
[frontends]
|
||||||
{{range $frontend, $containers := .Frontends}}
|
{{range $frontendName, $containers := .Frontends }}
|
||||||
{{$container := index $containers 0}}
|
{{$container := index $containers 0}}
|
||||||
|
|
||||||
{{if hasServices $container }}
|
{{if hasServices $container }}
|
||||||
{{ $services := getServiceNames $container }}
|
{{ $services := getServiceNames $container }}
|
||||||
|
|
||||||
{{range $serviceIndex, $serviceName := $services }}
|
{{range $serviceIndex, $serviceName := $services }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}"]
|
{{ $ServiceFrontendName := getServiceBackendName $container $serviceName }}
|
||||||
backend = "backend-{{getServiceBackend $container $serviceName}}"
|
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}"]
|
||||||
|
backend = "backend-{{ $ServiceFrontendName }}"
|
||||||
priority = {{ getServicePriority $container $serviceName }}
|
priority = {{ getServicePriority $container $serviceName }}
|
||||||
passHostHeader = {{ getServicePassHostHeader $container $serviceName }}
|
passHostHeader = {{ getServicePassHostHeader $container $serviceName }}
|
||||||
passTLSCert = {{ getServicePassTLSCert $container $serviceName }}
|
passTLSCert = {{ getServicePassTLSCert $container $serviceName }}
|
||||||
|
@ -66,8 +72,9 @@
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if getServiceWhitelistSourceRange $container $serviceName}}
|
{{ $whitelistSourceRange := getServiceWhitelistSourceRange $container $serviceName }}
|
||||||
whitelistSourceRange = [{{range getServiceWhitelistSourceRange $container $serviceName}}
|
{{if $whitelistSourceRange }}
|
||||||
|
whitelistSourceRange = [{{range $whitelistSourceRange }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -76,17 +83,19 @@
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if hasServiceRedirect $container $serviceName}}
|
{{ $redirect := getServiceRedirect $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".redirect]
|
{{if $redirect }}
|
||||||
entryPoint = "{{getServiceRedirectEntryPoint $container $serviceName}}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".redirect]
|
||||||
regex = "{{getServiceRedirectRegex $container $serviceName}}"
|
entryPoint = "{{ $redirect.EntryPoint }}"
|
||||||
replacement = "{{getServiceRedirectReplacement $container $serviceName}}"
|
regex = "{{ $redirect.Regex }}"
|
||||||
|
replacement = "{{ $redirect.Replacement }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasServiceErrorPages $container $serviceName }}
|
{{ $errorPages := getServiceErrorPages $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".errors]
|
{{if $errorPages }}
|
||||||
{{ range $pageName, $page := getServiceErrorPages $container $serviceName }}
|
[frontends."frontend-{{ $ServiceFrontendName }}".errors]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".errors.{{$pageName}}]
|
{{ range $pageName, $page := $errorPages }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".errors.{{ $pageName }}]
|
||||||
status = [{{range $page.Status }}
|
status = [{{range $page.Status }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
@ -95,41 +104,81 @@
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasServiceRateLimits $container $serviceName }}
|
{{ $rateLimit := getServiceRateLimit $container $serviceName }}
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit]
|
{{if $rateLimit }}
|
||||||
extractorFunc = "{{ getRateLimitsExtractorFunc $container $serviceName }}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit.rateSet]
|
extractorFunc = "{{ $rateLimit.ExtractorFunc }}"
|
||||||
{{ range $limitName, $rateLimit := getServiceRateLimits $container $serviceName }}
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit.rateSet]
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".rateLimit.rateSet.{{ $limitName }}]
|
{{range $limitName, $limit := $rateLimit.RateSet }}
|
||||||
period = "{{ $rateLimit.Period }}"
|
[frontends."frontend-{{ $ServiceFrontendName }}".rateLimit.rateSet.{{ $limitName }}]
|
||||||
average = {{ $rateLimit.Average }}
|
period = "{{ $limit.Period }}"
|
||||||
burst = {{ $rateLimit.Burst }}
|
average = {{ $limit.Average }}
|
||||||
|
burst = {{ $limit.Burst }}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".routes."service-{{$serviceName | replace "/" "" | replace "." "-"}}"]
|
{{ $headers := getServiceHeaders $container $serviceName }}
|
||||||
|
{{if $headers }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers]
|
||||||
|
SSLRedirect = {{ $headers.SSLRedirect }}
|
||||||
|
SSLTemporaryRedirect = {{ $headers.SSLTemporaryRedirect }}
|
||||||
|
SSLHost = "{{ $headers.SSLHost }}"
|
||||||
|
STSSeconds = {{ $headers.STSSeconds }}
|
||||||
|
STSIncludeSubdomains = {{ $headers.STSIncludeSubdomains }}
|
||||||
|
STSPreload = {{ $headers.STSPreload }}
|
||||||
|
ForceSTSHeader = {{ $headers.ForceSTSHeader }}
|
||||||
|
FrameDeny = {{ $headers.FrameDeny }}
|
||||||
|
CustomFrameOptionsValue = "{{ $headers.CustomFrameOptionsValue }}"
|
||||||
|
ContentTypeNosniff = {{ $headers.ContentTypeNosniff }}
|
||||||
|
BrowserXSSFilter = {{ $headers.BrowserXSSFilter }}
|
||||||
|
ContentSecurityPolicy = "{{ $headers.ContentSecurityPolicy }}"
|
||||||
|
PublicKey = "{{ $headers.PublicKey }}"
|
||||||
|
ReferrerPolicy = "{{ $headers.ReferrerPolicy }}"
|
||||||
|
IsDevelopment = {{ $headers.IsDevelopment }}
|
||||||
|
|
||||||
|
{{if $headers.AllowedHosts }}
|
||||||
|
AllowedHosts = [{{range $headers.AllowedHosts }}
|
||||||
|
"{{.}}",
|
||||||
|
{{end}}]
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.HostsProxyHeaders }}
|
||||||
|
HostsProxyHeaders = [{{range $headers.HostsProxyHeaders }}
|
||||||
|
"{{.}}",
|
||||||
|
{{end}}]
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.CustomRequestHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.customRequestHeaders]
|
||||||
|
{{range $k, $v := $headers.CustomRequestHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.CustomResponseHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.customResponseHeaders]
|
||||||
|
{{range $k, $v := $headers.CustomResponseHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
{{if $headers.SSLProxyHeaders }}
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".headers.SSLProxyHeaders]
|
||||||
|
{{range $k, $v := $headers.SSLProxyHeaders }}
|
||||||
|
{{$k}} = "{{$v}}"
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
{{end}}
|
||||||
|
|
||||||
|
[frontends."frontend-{{ $ServiceFrontendName }}".routes."service-{{ $serviceName | replace "/" "" | replace "." "-" }}"]
|
||||||
rule = "{{ getServiceFrontendRule $container $serviceName }}"
|
rule = "{{ getServiceFrontendRule $container $serviceName }}"
|
||||||
|
|
||||||
{{if hasServiceRequestHeaders $container $serviceName}}
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".headers.customRequestHeaders]
|
|
||||||
{{range $k, $v := getServiceRequestHeaders $container $serviceName}}
|
|
||||||
{{$k}} = "{{$v}}"
|
|
||||||
{{end}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{if hasServiceResponseHeaders $container $serviceName}}
|
|
||||||
[frontends."frontend-{{getServiceBackend $container $serviceName}}".headers.customResponseHeaders]
|
|
||||||
{{range $k, $v := getServiceResponseHeaders $container $serviceName}}
|
|
||||||
{{$k}} = "{{$v}}"
|
|
||||||
{{end}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{end}} ## end range services
|
{{end}} ## end range services
|
||||||
|
|
||||||
{{else}}
|
{{else}}
|
||||||
|
|
||||||
[frontends."frontend-{{$frontend}}"]
|
[frontends."frontend-{{ $frontendName }}"]
|
||||||
backend = "backend-{{getBackend $container}}"
|
backend = "backend-{{ getBackendName $container }}"
|
||||||
priority = {{ getPriority $container }}
|
priority = {{ getPriority $container }}
|
||||||
passHostHeader = {{ getPassHostHeader $container }}
|
passHostHeader = {{ getPassHostHeader $container }}
|
||||||
passTLSCert = {{ getPassTLSCert $container }}
|
passTLSCert = {{ getPassTLSCert $container }}
|
||||||
|
@ -138,8 +187,9 @@
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if getWhitelistSourceRange $container}}
|
{{ $whitelistSourceRange := getWhitelistSourceRange $container}}
|
||||||
whitelistSourceRange = [{{range getWhitelistSourceRange $container}}
|
{{if $whitelistSourceRange }}
|
||||||
|
whitelistSourceRange = [{{range $whitelistSourceRange }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
@ -148,17 +198,19 @@
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
|
||||||
{{if hasRedirect $container}}
|
{{ $redirect := getRedirect $container }}
|
||||||
[frontends."frontend-{{$frontend}}".redirect]
|
{{if $redirect }}
|
||||||
entryPoint = "{{getRedirectEntryPoint $container}}"
|
[frontends."frontend-{{ $frontendName }}".redirect]
|
||||||
regex = "{{getRedirectRegex $container}}"
|
entryPoint = "{{ $redirect.EntryPoint }}"
|
||||||
replacement = "{{getRedirectReplacement $container}}"
|
regex = "{{ $redirect.Regex }}"
|
||||||
|
replacement = "{{ $redirect.Replacement }}"
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasErrorPages $container }}
|
{{ $errorPages := getErrorPages $container }}
|
||||||
[frontends."frontend-{{$frontend}}".errors]
|
{{if $errorPages }}
|
||||||
{{ range $pageName, $page := getErrorPages $container }}
|
[frontends."frontend-{{ $frontendName }}".errors]
|
||||||
[frontends."frontend-{{$frontend}}".errors.{{ $pageName }}]
|
{{range $pageName, $page := $errorPages }}
|
||||||
|
[frontends."frontend-{{ $frontendName }}".errors.{{ $pageName }}]
|
||||||
status = [{{range $page.Status }}
|
status = [{{range $page.Status }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
|
@ -167,101 +219,73 @@
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasRateLimits $container }}
|
{{ $rateLimit := getRateLimit $container }}
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit]
|
{{if $rateLimit }}
|
||||||
extractorFunc = "{{ getRateLimitsExtractorFunc $container }}"
|
[frontends."frontend-{{ $frontendName }}".rateLimit]
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit.rateSet]
|
extractorFunc = "{{ $rateLimit.ExtractorFunc }}"
|
||||||
{{ range $limitName, $rateLimit := getRateLimits $container }}
|
[frontends."frontend-{{ $frontendName }}".rateLimit.rateSet]
|
||||||
[frontends."frontend-{{$frontend}}".rateLimit.rateSet.{{ $limitName }}]
|
{{ range $limitName, $limit := $rateLimit.RateSet }}
|
||||||
period = "{{ $rateLimit.Period }}"
|
[frontends."frontend-{{ $frontendName }}".rateLimit.rateSet.{{ $limitName }}]
|
||||||
average = {{ $rateLimit.Average }}
|
period = "{{ $limit.Period }}"
|
||||||
burst = {{ $rateLimit.Burst }}
|
average = {{ $limit.Average }}
|
||||||
|
burst = {{ $limit.Burst }}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{ if hasHeaders $container}}
|
{{ $headers := getHeaders $container }}
|
||||||
[frontends."frontend-{{$frontend}}".headers]
|
{{if $headers }}
|
||||||
{{if hasSSLRedirectHeaders $container}}
|
[frontends."frontend-{{ $frontendName }}".headers]
|
||||||
SSLRedirect = {{getSSLRedirectHeaders $container}}
|
SSLRedirect = {{ $headers.SSLRedirect }}
|
||||||
{{end}}
|
SSLTemporaryRedirect = {{ $headers.SSLTemporaryRedirect }}
|
||||||
{{if hasSSLTemporaryRedirectHeaders $container}}
|
SSLHost = "{{ $headers.SSLHost }}"
|
||||||
SSLTemporaryRedirect = {{getSSLTemporaryRedirectHeaders $container}}
|
STSSeconds = {{ $headers.STSSeconds }}
|
||||||
{{end}}
|
STSIncludeSubdomains = {{ $headers.STSIncludeSubdomains }}
|
||||||
{{if hasSSLHostHeaders $container}}
|
STSPreload = {{ $headers.STSPreload }}
|
||||||
SSLHost = "{{getSSLHostHeaders $container}}"
|
ForceSTSHeader = {{ $headers.ForceSTSHeader }}
|
||||||
{{end}}
|
FrameDeny = {{ $headers.FrameDeny }}
|
||||||
{{if hasSTSSecondsHeaders $container}}
|
CustomFrameOptionsValue = "{{ $headers.CustomFrameOptionsValue }}"
|
||||||
STSSeconds = {{getSTSSecondsHeaders $container}}
|
ContentTypeNosniff = {{ $headers.ContentTypeNosniff }}
|
||||||
{{end}}
|
BrowserXSSFilter = {{ $headers.BrowserXSSFilter }}
|
||||||
{{if hasSTSIncludeSubdomainsHeaders $container}}
|
ContentSecurityPolicy = "{{ $headers.ContentSecurityPolicy }}"
|
||||||
STSIncludeSubdomains = {{getSTSIncludeSubdomainsHeaders $container}}
|
PublicKey = "{{ $headers.PublicKey }}"
|
||||||
{{end}}
|
ReferrerPolicy = "{{ $headers.ReferrerPolicy }}"
|
||||||
{{if hasSTSPreloadHeaders $container}}
|
IsDevelopment = {{ $headers.IsDevelopment }}
|
||||||
STSPreload = {{getSTSPreloadHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasForceSTSHeaderHeaders $container}}
|
|
||||||
ForceSTSHeader = {{getForceSTSHeaderHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasFrameDenyHeaders $container}}
|
|
||||||
FrameDeny = {{getFrameDenyHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasCustomFrameOptionsValueHeaders $container}}
|
|
||||||
CustomFrameOptionsValue = "{{getCustomFrameOptionsValueHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasContentTypeNosniffHeaders $container}}
|
|
||||||
ContentTypeNosniff = {{getContentTypeNosniffHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasBrowserXSSFilterHeaders $container}}
|
|
||||||
BrowserXSSFilter = {{getBrowserXSSFilterHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
{{if hasContentSecurityPolicyHeaders $container}}
|
|
||||||
ContentSecurityPolicy = "{{getContentSecurityPolicyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasPublicKeyHeaders $container}}
|
|
||||||
PublicKey = "{{getPublicKeyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasReferrerPolicyHeaders $container}}
|
|
||||||
ReferrerPolicy = "{{getReferrerPolicyHeaders $container}}"
|
|
||||||
{{end}}
|
|
||||||
{{if hasIsDevelopmentHeaders $container}}
|
|
||||||
IsDevelopment = {{getIsDevelopmentHeaders $container}}
|
|
||||||
{{end}}
|
|
||||||
|
|
||||||
{{if hasAllowedHostsHeaders $container}}
|
{{if $headers.AllowedHosts }}
|
||||||
AllowedHosts = [{{range getAllowedHostsHeaders $container}}
|
AllowedHosts = [{{range $headers.AllowedHosts }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasHostsProxyHeaders $container}}
|
{{if $headers.HostsProxyHeaders }}
|
||||||
HostsProxyHeaders = [{{range getHostsProxyHeaders $container}}
|
HostsProxyHeaders = [{{range $headers.HostsProxyHeaders }}
|
||||||
"{{.}}",
|
"{{.}}",
|
||||||
{{end}}]
|
{{end}}]
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasRequestHeaders $container}}
|
{{if $headers.CustomRequestHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.customRequestHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.customRequestHeaders]
|
||||||
{{range $k, $v := getRequestHeaders $container}}
|
{{range $k, $v := $headers.CustomRequestHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasResponseHeaders $container}}
|
{{if $headers.CustomResponseHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.customResponseHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.customResponseHeaders]
|
||||||
{{range $k, $v := getResponseHeaders $container}}
|
{{range $k, $v := $headers.CustomResponseHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
{{if hasSSLProxyHeaders $container}}
|
{{if $headers.SSLProxyHeaders }}
|
||||||
[frontends."frontend-{{$frontend}}".headers.SSLProxyHeaders]
|
[frontends."frontend-{{ $frontendName }}".headers.SSLProxyHeaders]
|
||||||
{{range $k, $v := getSSLProxyHeaders $container}}
|
{{range $k, $v := $headers.SSLProxyHeaders }}
|
||||||
{{$k}} = "{{$v}}"
|
{{$k}} = "{{$v}}"
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
||||||
[frontends."frontend-{{$frontend}}".routes."route-frontend-{{$frontend}}"]
|
[frontends."frontend-{{ $frontendName }}".routes."route-frontend-{{ $frontendName }}"]
|
||||||
rule = "{{ getFrontendRule $container }}"
|
rule = "{{ getFrontendRule $container }}"
|
||||||
|
|
||||||
{{end}}
|
{{end}}
|
||||||
|
|
Loading…
Reference in a new issue