Merge pull request #468 from containous/fix-marathon-tls-auth

Fix marathon TLS/basic auth
This commit is contained in:
Vincent Demeester 2016-06-22 14:23:16 +02:00 committed by GitHub
commit df75700015
8 changed files with 147 additions and 90 deletions

View file

@ -29,7 +29,7 @@ func (c *wrapperChallengeProvider) getCertificate(domain string) (cert *tls.Cert
} }
func (c *wrapperChallengeProvider) Present(domain, token, keyAuth string) error { func (c *wrapperChallengeProvider) Present(domain, token, keyAuth string) error {
cert, err := acme.TLSSNI01ChallengeCert(keyAuth) cert, _, err := acme.TLSSNI01ChallengeCert(keyAuth)
if err != nil { if err != nil {
return err return err
} }

View file

@ -666,6 +666,12 @@ domain = "marathon.localhost"
# #
# [marathon.TLS] # [marathon.TLS]
# InsecureSkipVerify = true # InsecureSkipVerify = true
# DCOSToken for DCOS environment, This will override the Authorization header
#
# Optional
#
# dcosToken = "xxxxxx"
``` ```
Labels can be used on containers to override default behaviour: Labels can be used on containers to override default behaviour:

8
glide.lock generated
View file

@ -1,5 +1,5 @@
hash: 7330fcb934bc52f47319f969bbf918e325bac2436518e3fad74de596f13bbda2 hash: cba5a5482db5b6b3857187d401d8e47f9b36f00e7acdf6aba0174707cc8c8b8a
updated: 2016-06-18T12:59:25.604052029+02:00 updated: 2016-06-20T23:18:44.178752884+02:00
imports: imports:
- name: github.com/boltdb/bolt - name: github.com/boltdb/bolt
version: 3f7947a25d970e1e5f512276c14d5dcf731ccd5e version: 3f7947a25d970e1e5f512276c14d5dcf731ccd5e
@ -84,7 +84,7 @@ imports:
- name: github.com/elazarl/go-bindata-assetfs - name: github.com/elazarl/go-bindata-assetfs
version: 57eb5e1fc594ad4b0b1dbea7b286d299e0cb43c2 version: 57eb5e1fc594ad4b0b1dbea7b286d299e0cb43c2
- name: github.com/gambol99/go-marathon - name: github.com/gambol99/go-marathon
version: ade11d1dc2884ee1f387078fc28509559b6235d1 version: a558128c87724cd7430060ef5aedf39f83937f55
- name: github.com/go-check/check - name: github.com/go-check/check
version: 4f90aeace3a26ad7021961c297b22c42160c7b25 version: 4f90aeace3a26ad7021961c297b22c42160c7b25
- name: github.com/google/go-querystring - name: github.com/google/go-querystring
@ -183,7 +183,7 @@ imports:
- conntracker - conntracker
- router - router
- name: github.com/xenolf/lego - name: github.com/xenolf/lego
version: 30a7a8e8821de3532192d1240a45e53c6204f603 version: b2fad6198110326662e9e356a97199078a4a775c
subpackages: subpackages:
- acme - acme
- name: golang.org/x/crypto - name: golang.org/x/crypto

View file

@ -42,7 +42,7 @@ import:
- store/zookeeper - store/zookeeper
- package: github.com/elazarl/go-bindata-assetfs - package: github.com/elazarl/go-bindata-assetfs
- package: github.com/gambol99/go-marathon - package: github.com/gambol99/go-marathon
version: ade11d1dc2884ee1f387078fc28509559b6235d1 version: a558128c87724cd7430060ef5aedf39f83937f55
- package: github.com/containous/mux - package: github.com/containous/mux
- package: github.com/hashicorp/consul - package: github.com/hashicorp/consul
subpackages: subpackages:
@ -60,7 +60,7 @@ import:
subpackages: subpackages:
- plugin/rewrite - plugin/rewrite
- package: github.com/xenolf/lego - package: github.com/xenolf/lego
version: 30a7a8e8821de3532192d1240a45e53c6204f603 version: b2fad6198110326662e9e356a97199078a4a775c
subpackages: subpackages:
- acme - acme
- package: golang.org/x/net - package: golang.org/x/net

View file

@ -169,13 +169,13 @@ func (_m *Marathon) DeleteApplication(name string) (*marathon.DeploymentID, erro
return r0, r1 return r0, r1
} }
// UpdateApplication provides a mock function with given fields: application // UpdateApplication provides a mock function with given fields: application, force
func (_m *Marathon) UpdateApplication(application *marathon.Application) (*marathon.DeploymentID, error) { func (_m *Marathon) UpdateApplication(application *marathon.Application, force bool) (*marathon.DeploymentID, error) {
ret := _m.Called(application) ret := _m.Called(application, force)
var r0 *marathon.DeploymentID var r0 *marathon.DeploymentID
if rf, ok := ret.Get(0).(func(*marathon.Application) *marathon.DeploymentID); ok { if rf, ok := ret.Get(0).(func(*marathon.Application, bool) *marathon.DeploymentID); ok {
r0 = rf(application) r0 = rf(application, force)
} else { } else {
if ret.Get(0) != nil { if ret.Get(0) != nil {
r0 = ret.Get(0).(*marathon.DeploymentID) r0 = ret.Get(0).(*marathon.DeploymentID)
@ -183,8 +183,8 @@ func (_m *Marathon) UpdateApplication(application *marathon.Application) (*marat
} }
var r1 error var r1 error
if rf, ok := ret.Get(1).(func(*marathon.Application) error); ok { if rf, ok := ret.Get(1).(func(*marathon.Application, bool) error); ok {
r1 = rf(application) r1 = rf(application, force)
} else { } else {
r1 = ret.Error(1) r1 = ret.Error(1)
} }
@ -307,6 +307,29 @@ func (_m *Marathon) Application(name string) (*marathon.Application, error) {
return r0, r1 return r0, r1
} }
// ApplicationByVersion provides a mock function with given fields: name, version
func (_m *Marathon) ApplicationByVersion(name string, version string) (*marathon.Application, error) {
ret := _m.Called(name, version)
var r0 *marathon.Application
if rf, ok := ret.Get(0).(func(string, string) *marathon.Application); ok {
r0 = rf(name, version)
} else {
if ret.Get(0) != nil {
r0 = ret.Get(0).(*marathon.Application)
}
}
var r1 error
if rf, ok := ret.Get(1).(func(string, string) error); ok {
r1 = rf(name, version)
} else {
r1 = ret.Error(1)
}
return r0, r1
}
// WaitOnApplication provides a mock function with given fields: name, timeout // WaitOnApplication provides a mock function with given fields: name, timeout
func (_m *Marathon) WaitOnApplication(name string, timeout time.Duration) error { func (_m *Marathon) WaitOnApplication(name string, timeout time.Duration) error {
ret := _m.Called(name, timeout) ret := _m.Called(name, timeout)

View file

@ -26,6 +26,7 @@ type Marathon struct {
Domain string `description:"Default domain used"` Domain string `description:"Default domain used"`
ExposedByDefault bool `description:"Expose Marathon apps by default"` ExposedByDefault bool `description:"Expose Marathon apps by default"`
GroupsAsSubDomains bool `description:"Convert Marathon groups to subdomains"` GroupsAsSubDomains bool `description:"Convert Marathon groups to subdomains"`
DCOSToken string `description:"DCOSToken for DCOS environment, This will override the Authorization header"`
Basic *MarathonBasic Basic *MarathonBasic
TLS *tls.Config TLS *tls.Config
marathonClient marathon.Marathon marathonClient marathon.Marathon
@ -54,6 +55,9 @@ func (provider *Marathon) Provide(configurationChan chan<- types.ConfigMessage,
config.HTTPBasicAuthUser = provider.Basic.HTTPBasicAuthUser config.HTTPBasicAuthUser = provider.Basic.HTTPBasicAuthUser
config.HTTPBasicPassword = provider.Basic.HTTPBasicPassword config.HTTPBasicPassword = provider.Basic.HTTPBasicPassword
} }
if len(provider.DCOSToken) > 0 {
config.DCOSToken = provider.DCOSToken
}
config.HTTPClient = &http.Client{ config.HTTPClient = &http.Client{
Transport: &http.Transport{ Transport: &http.Transport{
TLSClientConfig: provider.TLS, TLSClientConfig: provider.TLS,
@ -67,7 +71,7 @@ func (provider *Marathon) Provide(configurationChan chan<- types.ConfigMessage,
provider.marathonClient = client provider.marathonClient = client
update := make(marathon.EventsChannel, 5) update := make(marathon.EventsChannel, 5)
if provider.Watch { if provider.Watch {
if err := client.AddEventsListener(update, marathon.EVENTS_APPLICATIONS); err != nil { if err := client.AddEventsListener(update, marathon.EventIDApplications); err != nil {
log.Errorf("Failed to register for events, %s", err) log.Errorf("Failed to register for events, %s", err)
return err return err
} }
@ -179,8 +183,8 @@ func taskFilter(task marathon.Task, applications *marathon.Applications, exposed
} }
//filter indeterminable task port //filter indeterminable task port
portIndexLabel := application.Labels["traefik.portIndex"] portIndexLabel := (*application.Labels)["traefik.portIndex"]
portValueLabel := application.Labels["traefik.port"] portValueLabel := (*application.Labels)["traefik.port"]
if portIndexLabel != "" && portValueLabel != "" { if portIndexLabel != "" && portValueLabel != "" {
log.Debugf("Filtering marathon task %s specifying both traefik.portIndex and traefik.port labels", task.AppID) log.Debugf("Filtering marathon task %s specifying both traefik.portIndex and traefik.port labels", task.AppID)
return false return false
@ -190,14 +194,14 @@ func taskFilter(task marathon.Task, applications *marathon.Applications, exposed
return false return false
} }
if portIndexLabel != "" { if portIndexLabel != "" {
index, err := strconv.Atoi(application.Labels["traefik.portIndex"]) index, err := strconv.Atoi((*application.Labels)["traefik.portIndex"])
if err != nil || index < 0 || index > len(application.Ports)-1 { if err != nil || index < 0 || index > len(application.Ports)-1 {
log.Debugf("Filtering marathon task %s with unexpected value for traefik.portIndex label", task.AppID) log.Debugf("Filtering marathon task %s with unexpected value for traefik.portIndex label", task.AppID)
return false return false
} }
} }
if portValueLabel != "" { if portValueLabel != "" {
port, err := strconv.Atoi(application.Labels["traefik.port"]) port, err := strconv.Atoi((*application.Labels)["traefik.port"])
if err != nil { if err != nil {
log.Debugf("Filtering marathon task %s with unexpected value for traefik.port label", task.AppID) log.Debugf("Filtering marathon task %s with unexpected value for traefik.port label", task.AppID)
return false return false
@ -251,11 +255,11 @@ func getApplication(task marathon.Task, apps []marathon.Application) (marathon.A
} }
func isApplicationEnabled(application marathon.Application, exposedByDefault bool) bool { func isApplicationEnabled(application marathon.Application, exposedByDefault bool) bool {
return exposedByDefault && application.Labels["traefik.enable"] != "false" || application.Labels["traefik.enable"] == "true" return exposedByDefault && (*application.Labels)["traefik.enable"] != "false" || (*application.Labels)["traefik.enable"] == "true"
} }
func (provider *Marathon) getLabel(application marathon.Application, label string) (string, error) { func (provider *Marathon) getLabel(application marathon.Application, label string) (string, error) {
for key, value := range application.Labels { for key, value := range *application.Labels {
if key == label { if key == label {
return value, nil return value, nil
} }

View file

@ -19,13 +19,17 @@ func newFakeClient(applicationsError bool, applications *marathon.Applications,
// create an instance of our test object // create an instance of our test object
fakeClient := new(fakeClient) fakeClient := new(fakeClient)
if applicationsError { if applicationsError {
fakeClient.On("Applications", mock.AnythingOfType("url.Values")).Return(nil, errors.New("error")) fakeClient.On("Applications", mock.Anything).Return(nil, errors.New("error"))
} else {
fakeClient.On("Applications", mock.Anything).Return(applications, nil)
} }
fakeClient.On("Applications", mock.AnythingOfType("url.Values")).Return(applications, nil) if !applicationsError {
if tasksError { if tasksError {
fakeClient.On("AllTasks", mock.AnythingOfType("*marathon.AllTasksOpts")).Return(nil, errors.New("error")) fakeClient.On("AllTasks", mock.Anything).Return(nil, errors.New("error"))
} else {
fakeClient.On("AllTasks", mock.Anything).Return(tasks, nil)
}
} }
fakeClient.On("AllTasks", mock.AnythingOfType("*marathon.AllTasksOpts")).Return(tasks, nil)
return fakeClient return fakeClient
} }
@ -65,8 +69,9 @@ func TestMarathonLoadConfig(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "/test", ID: "/test",
Ports: []int{80}, Ports: []int{80},
Labels: &map[string]string{},
}, },
}, },
}, },
@ -115,6 +120,7 @@ func TestMarathonLoadConfig(t *testing.T) {
marathonClient: fakeClient, marathonClient: fakeClient,
} }
actualConfig := provider.loadMarathonConfig() actualConfig := provider.loadMarathonConfig()
fakeClient.AssertExpectations(t)
if c.expectedNil { if c.expectedNil {
if actualConfig != nil { if actualConfig != nil {
t.Fatalf("Should have been nil, got %v", actualConfig) t.Fatalf("Should have been nil, got %v", actualConfig)
@ -161,7 +167,8 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Labels: &map[string]string{},
}, },
}, },
}, },
@ -176,8 +183,9 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: &map[string]string{},
}, },
}, },
}, },
@ -194,7 +202,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.enable": "false", "traefik.enable": "false",
}, },
}, },
@ -213,7 +221,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "specify-port-number", ID: "specify-port-number",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.port": "80", "traefik.port": "80",
}, },
}, },
@ -232,7 +240,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "specify-unknown-port-number", ID: "specify-unknown-port-number",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.port": "8080", "traefik.port": "8080",
}, },
}, },
@ -251,7 +259,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "specify-port-index", ID: "specify-port-index",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.portIndex": "0", "traefik.portIndex": "0",
}, },
}, },
@ -270,7 +278,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "specify-out-of-range-port-index", ID: "specify-out-of-range-port-index",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.portIndex": "2", "traefik.portIndex": "2",
}, },
}, },
@ -289,7 +297,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "specify-both-port-index-and-number", ID: "specify-both-port-index-and-number",
Ports: []int{80, 443}, Ports: []int{80, 443},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.port": "443", "traefik.port": "443",
"traefik.portIndex": "1", "traefik.portIndex": "1",
}, },
@ -307,10 +315,11 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
HealthChecks: []*marathon.HealthCheck{ Labels: &map[string]string{},
marathon.NewDefaultHealthCheck(), HealthChecks: &[]marathon.HealthCheck{
*marathon.NewDefaultHealthCheck(),
}, },
}, },
}, },
@ -331,10 +340,11 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
HealthChecks: []*marathon.HealthCheck{ Labels: &map[string]string{},
marathon.NewDefaultHealthCheck(), HealthChecks: &[]marathon.HealthCheck{
*marathon.NewDefaultHealthCheck(),
}, },
}, },
}, },
@ -358,10 +368,11 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
HealthChecks: []*marathon.HealthCheck{ Labels: &map[string]string{},
marathon.NewDefaultHealthCheck(), HealthChecks: &[]marathon.HealthCheck{
*marathon.NewDefaultHealthCheck(),
}, },
}, },
}, },
@ -377,8 +388,9 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
Labels: &map[string]string{},
}, },
}, },
}, },
@ -398,10 +410,11 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "foo", ID: "foo",
Ports: []int{80}, Ports: []int{80},
HealthChecks: []*marathon.HealthCheck{ Labels: &map[string]string{},
marathon.NewDefaultHealthCheck(), HealthChecks: &[]marathon.HealthCheck{
*marathon.NewDefaultHealthCheck(),
}, },
}, },
}, },
@ -417,8 +430,9 @@ func TestMarathonTaskFilter(t *testing.T) {
applications: &marathon.Applications{ applications: &marathon.Applications{
Apps: []marathon.Application{ Apps: []marathon.Application{
{ {
ID: "disable-default-expose", ID: "disable-default-expose",
Ports: []int{80}, Ports: []int{80},
Labels: &map[string]string{},
}, },
}, },
}, },
@ -435,7 +449,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "disable-default-expose-disable-in-label", ID: "disable-default-expose-disable-in-label",
Ports: []int{80}, Ports: []int{80},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.enable": "false", "traefik.enable": "false",
}, },
}, },
@ -454,7 +468,7 @@ func TestMarathonTaskFilter(t *testing.T) {
{ {
ID: "disable-default-expose-enable-in-label", ID: "disable-default-expose-enable-in-label",
Ports: []int{80}, Ports: []int{80},
Labels: map[string]string{ Labels: &map[string]string{
"traefik.enable": "true", "traefik.enable": "true",
}, },
}, },
@ -486,14 +500,16 @@ func TestMarathonApplicationFilter(t *testing.T) {
}, },
{ {
application: marathon.Application{ application: marathon.Application{
ID: "test", ID: "test",
Labels: &map[string]string{},
}, },
filteredTasks: []marathon.Task{}, filteredTasks: []marathon.Task{},
expected: false, expected: false,
}, },
{ {
application: marathon.Application{ application: marathon.Application{
ID: "foo", ID: "foo",
Labels: &map[string]string{},
}, },
filteredTasks: []marathon.Task{ filteredTasks: []marathon.Task{
{ {
@ -504,7 +520,8 @@ func TestMarathonApplicationFilter(t *testing.T) {
}, },
{ {
application: marathon.Application{ application: marathon.Application{
ID: "foo", ID: "foo",
Labels: &map[string]string{},
}, },
filteredTasks: []marathon.Task{ filteredTasks: []marathon.Task{
{ {
@ -539,7 +556,8 @@ func TestMarathonGetPort(t *testing.T) {
{ {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test1", ID: "test1",
Labels: &map[string]string{},
}, },
}, },
task: marathon.Task{ task: marathon.Task{
@ -550,7 +568,8 @@ func TestMarathonGetPort(t *testing.T) {
{ {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test1", ID: "test1",
Labels: &map[string]string{},
}, },
}, },
task: marathon.Task{ task: marathon.Task{
@ -562,7 +581,8 @@ func TestMarathonGetPort(t *testing.T) {
{ {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test1", ID: "test1",
Labels: &map[string]string{},
}, },
}, },
task: marathon.Task{ task: marathon.Task{
@ -575,7 +595,7 @@ func TestMarathonGetPort(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "specify-port-number", ID: "specify-port-number",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.port": "443", "traefik.port": "443",
}, },
}, },
@ -590,7 +610,7 @@ func TestMarathonGetPort(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "specify-port-index", ID: "specify-port-index",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.portIndex": "1", "traefik.portIndex": "1",
}, },
}, },
@ -628,7 +648,7 @@ func TestMarathonGetWeigh(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test1", ID: "test1",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.weight": "10", "traefik.weight": "10",
}, },
}, },
@ -642,7 +662,7 @@ func TestMarathonGetWeigh(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test", ID: "test",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.test": "10", "traefik.test": "10",
}, },
}, },
@ -656,7 +676,7 @@ func TestMarathonGetWeigh(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test", ID: "test",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.weight": "10", "traefik.weight": "10",
}, },
}, },
@ -686,12 +706,13 @@ func TestMarathonGetDomain(t *testing.T) {
expected string expected string
}{ }{
{ {
application: marathon.Application{}, application: marathon.Application{
expected: "docker.localhost", Labels: &map[string]string{}},
expected: "docker.localhost",
}, },
{ {
application: marathon.Application{ application: marathon.Application{
Labels: map[string]string{ Labels: &map[string]string{
"traefik.domain": "foo.bar", "traefik.domain": "foo.bar",
}, },
}, },
@ -724,7 +745,7 @@ func TestMarathonGetProtocol(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test1", ID: "test1",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.protocol": "https", "traefik.protocol": "https",
}, },
}, },
@ -738,7 +759,7 @@ func TestMarathonGetProtocol(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test", ID: "test",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.foo": "bar", "traefik.foo": "bar",
}, },
}, },
@ -752,7 +773,7 @@ func TestMarathonGetProtocol(t *testing.T) {
applications: []marathon.Application{ applications: []marathon.Application{
{ {
ID: "test", ID: "test",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.protocol": "https", "traefik.protocol": "https",
}, },
}, },
@ -780,12 +801,13 @@ func TestMarathonGetPassHostHeader(t *testing.T) {
expected string expected string
}{ }{
{ {
application: marathon.Application{}, application: marathon.Application{
expected: "true", Labels: &map[string]string{}},
expected: "true",
}, },
{ {
application: marathon.Application{ application: marathon.Application{
Labels: map[string]string{ Labels: &map[string]string{
"traefik.frontend.passHostHeader": "false", "traefik.frontend.passHostHeader": "false",
}, },
}, },
@ -809,12 +831,13 @@ func TestMarathonGetEntryPoints(t *testing.T) {
expected []string expected []string
}{ }{
{ {
application: marathon.Application{}, application: marathon.Application{
expected: []string{}, Labels: &map[string]string{}},
expected: []string{},
}, },
{ {
application: marathon.Application{ application: marathon.Application{
Labels: map[string]string{ Labels: &map[string]string{
"traefik.frontend.entryPoints": "http,https", "traefik.frontend.entryPoints": "http,https",
}, },
}, },
@ -841,18 +864,20 @@ func TestMarathonGetFrontendRule(t *testing.T) {
expected string expected string
}{ }{
{ {
application: marathon.Application{}, application: marathon.Application{
expected: "Host:.docker.localhost", Labels: &map[string]string{}},
expected: "Host:.docker.localhost",
}, },
{ {
application: marathon.Application{ application: marathon.Application{
ID: "test", ID: "test",
Labels: &map[string]string{},
}, },
expected: "Host:test.docker.localhost", expected: "Host:test.docker.localhost",
}, },
{ {
application: marathon.Application{ application: marathon.Application{
Labels: map[string]string{ Labels: &map[string]string{
"traefik.frontend.rule": "Host:foo.bar", "traefik.frontend.rule": "Host:foo.bar",
}, },
}, },
@ -878,7 +903,7 @@ func TestMarathonGetBackend(t *testing.T) {
{ {
application: marathon.Application{ application: marathon.Application{
ID: "foo", ID: "foo",
Labels: map[string]string{ Labels: &map[string]string{
"traefik.backend": "bar", "traefik.backend": "bar",
}, },
}, },

View file

@ -318,12 +318,11 @@
# httpBasicAuthUser = "foo" # httpBasicAuthUser = "foo"
# httpBasicPassword = "bar" # httpBasicPassword = "bar"
# TLS client configuration. https://golang.org/pkg/crypto/tls/#Config # DCOSToken for DCOS environment, This will override the Authorization header
# #
# Optional # Optional
# #
# [marathon.TLS] # dcosToken = "xxxxxx"
# InsecureSkipVerify = true
################################################################ ################################################################
# Kubernetes Ingress configuration backend # Kubernetes Ingress configuration backend