package mesos import ( "testing" "time" "github.com/containous/flaeg" "github.com/containous/traefik/provider/label" "github.com/containous/traefik/types" "github.com/mesosphere/mesos-dns/records/state" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) func TestBuildConfiguration(t *testing.T) { p := &Provider{ Domain: "mesos.localhost", ExposedByDefault: true, IPSources: "host", } testCases := []struct { desc string tasks []state.Task expectedFrontends map[string]*types.Frontend expectedBackends map[string]*types.Backend }{ { desc: "when no tasks", tasks: []state.Task{}, expectedFrontends: map[string]*types.Frontend{}, expectedBackends: map[string]*types.Backend{}, }, { desc: "2 applications with 2 tasks", tasks: []state.Task{ // App 1 aTask("ID1", withIP("10.10.10.10"), withInfo("name1", withPorts(withPort("TCP", 80, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), aTask("ID2", withIP("10.10.10.11"), withInfo("name1", withPorts(withPort("TCP", 81, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), // App 2 aTask("ID3", withIP("20.10.10.10"), withInfo("name2", withPorts(withPort("TCP", 80, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), aTask("ID4", withIP("20.10.10.11"), withInfo("name2", withPorts(withPort("TCP", 81, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), }, expectedFrontends: map[string]*types.Frontend{ "frontend-ID1": { Backend: "backend-name1", EntryPoints: []string{}, BasicAuth: []string{}, PassHostHeader: true, Routes: map[string]types.Route{ "route-host-ID1": { Rule: "Host:name1.mesos.localhost", }, }, }, "frontend-ID3": { Backend: "backend-name2", EntryPoints: []string{}, BasicAuth: []string{}, PassHostHeader: true, Routes: map[string]types.Route{ "route-host-ID3": { Rule: "Host:name2.mesos.localhost", }, }, }, }, expectedBackends: map[string]*types.Backend{ "backend-name1": { Servers: map[string]types.Server{ "server-ID1": { URL: "http://10.10.10.10:80", Weight: label.DefaultWeight, }, "server-ID2": { URL: "http://10.10.10.11:81", Weight: label.DefaultWeight, }, }, }, "backend-name2": { Servers: map[string]types.Server{ "server-ID3": { URL: "http://20.10.10.10:80", Weight: label.DefaultWeight, }, "server-ID4": { URL: "http://20.10.10.11:81", Weight: label.DefaultWeight, }, }, }, }, }, { desc: "with all labels", tasks: []state.Task{ aTask("ID1", withLabel(label.TraefikPort, "666"), withLabel(label.TraefikProtocol, "https"), withLabel(label.TraefikWeight, "12"), withLabel(label.TraefikBackend, "foobar"), withLabel(label.TraefikBackendCircuitBreakerExpression, "NetworkErrorRatio() > 0.5"), withLabel(label.TraefikBackendHealthCheckScheme, "http"), withLabel(label.TraefikBackendHealthCheckPath, "/health"), withLabel(label.TraefikBackendHealthCheckPort, "880"), withLabel(label.TraefikBackendHealthCheckInterval, "6"), withLabel(label.TraefikBackendHealthCheckHostname, "foo.com"), withLabel(label.TraefikBackendHealthCheckHeaders, "Foo:bar || Bar:foo"), withLabel(label.TraefikBackendLoadBalancerMethod, "drr"), withLabel(label.TraefikBackendLoadBalancerStickiness, "true"), withLabel(label.TraefikBackendLoadBalancerStickinessCookieName, "chocolate"), withLabel(label.TraefikBackendMaxConnAmount, "666"), withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"), withLabel(label.TraefikBackendBufferingMaxResponseBodyBytes, "10485760"), withLabel(label.TraefikBackendBufferingMemResponseBodyBytes, "2097152"), withLabel(label.TraefikBackendBufferingMaxRequestBodyBytes, "10485760"), withLabel(label.TraefikBackendBufferingMemRequestBodyBytes, "2097152"), withLabel(label.TraefikBackendBufferingRetryExpression, "IsNetworkError() && Attempts() <= 2"), withLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"), withLabel(label.TraefikFrontendEntryPoints, "http,https"), withLabel(label.TraefikFrontendPassHostHeader, "true"), withLabel(label.TraefikFrontendPassTLSCert, "true"), withLabel(label.TraefikFrontendPriority, "666"), withLabel(label.TraefikFrontendRedirectEntryPoint, "https"), withLabel(label.TraefikFrontendRedirectRegex, "nope"), withLabel(label.TraefikFrontendRedirectReplacement, "nope"), withLabel(label.TraefikFrontendRedirectPermanent, "true"), withLabel(label.TraefikFrontendRule, "Host:traefik.io"), withLabel(label.TraefikFrontendWhiteListSourceRange, "10.10.10.10"), withLabel(label.TraefikFrontendWhiteListUseXForwardedFor, "true"), withLabel(label.TraefikFrontendRequestHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"), withLabel(label.TraefikFrontendResponseHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"), withLabel(label.TraefikFrontendSSLProxyHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"), withLabel(label.TraefikFrontendAllowedHosts, "foo,bar,bor"), withLabel(label.TraefikFrontendHostsProxyHeaders, "foo,bar,bor"), withLabel(label.TraefikFrontendSSLForceHost, "true"), withLabel(label.TraefikFrontendSSLHost, "foo"), withLabel(label.TraefikFrontendCustomFrameOptionsValue, "foo"), withLabel(label.TraefikFrontendContentSecurityPolicy, "foo"), withLabel(label.TraefikFrontendPublicKey, "foo"), withLabel(label.TraefikFrontendReferrerPolicy, "foo"), withLabel(label.TraefikFrontendCustomBrowserXSSValue, "foo"), withLabel(label.TraefikFrontendSTSSeconds, "666"), withLabel(label.TraefikFrontendSSLRedirect, "true"), withLabel(label.TraefikFrontendSSLTemporaryRedirect, "true"), withLabel(label.TraefikFrontendSTSIncludeSubdomains, "true"), withLabel(label.TraefikFrontendSTSPreload, "true"), withLabel(label.TraefikFrontendForceSTSHeader, "true"), withLabel(label.TraefikFrontendFrameDeny, "true"), withLabel(label.TraefikFrontendContentTypeNosniff, "true"), withLabel(label.TraefikFrontendBrowserXSSFilter, "true"), withLabel(label.TraefikFrontendIsDevelopment, "true"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageStatus, "404"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageBackend, "foobar"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageQuery, "foo_query"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageStatus, "500,600"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageBackend, "foobar"), withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageQuery, "bar_query"), withLabel(label.TraefikFrontendRateLimitExtractorFunc, "client.ip"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitPeriod, "6"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitAverage, "12"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitBurst, "18"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"), withIP("10.10.10.10"), withInfo("name1", withPorts( withPortTCP(80, "n"), withPortTCP(666, "n"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), }, expectedFrontends: map[string]*types.Frontend{ "frontend-ID1": { EntryPoints: []string{ "http", "https", }, Backend: "backend-foobar", Routes: map[string]types.Route{ "route-host-ID1": { Rule: "Host:traefik.io", }, }, PassHostHeader: true, PassTLSCert: true, Priority: 666, BasicAuth: []string{ "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/", "test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", }, WhiteList: &types.WhiteList{ SourceRange: []string{"10.10.10.10"}, UseXForwardedFor: true, }, Headers: &types.Headers{ CustomRequestHeaders: map[string]string{ "Access-Control-Allow-Methods": "POST,GET,OPTIONS", "Content-Type": "application/json; charset=utf-8", }, CustomResponseHeaders: map[string]string{ "Access-Control-Allow-Methods": "POST,GET,OPTIONS", "Content-Type": "application/json; charset=utf-8", }, AllowedHosts: []string{ "foo", "bar", "bor", }, HostsProxyHeaders: []string{ "foo", "bar", "bor", }, SSLRedirect: true, SSLTemporaryRedirect: true, SSLForceHost: true, SSLHost: "foo", SSLProxyHeaders: map[string]string{ "Access-Control-Allow-Methods": "POST,GET,OPTIONS", "Content-Type": "application/json; charset=utf-8", }, STSSeconds: 666, STSIncludeSubdomains: true, STSPreload: true, ForceSTSHeader: true, FrameDeny: true, CustomFrameOptionsValue: "foo", ContentTypeNosniff: true, BrowserXSSFilter: true, CustomBrowserXSSValue: "foo", ContentSecurityPolicy: "foo", PublicKey: "foo", ReferrerPolicy: "foo", IsDevelopment: true, }, Errors: map[string]*types.ErrorPage{ "foo": { Status: []string{"404"}, Query: "foo_query", Backend: "backend-foobar", }, "bar": { Status: []string{"500", "600"}, Query: "bar_query", Backend: "backend-foobar", }, }, RateLimit: &types.RateLimit{ ExtractorFunc: "client.ip", RateSet: map[string]*types.Rate{ "foo": { Period: flaeg.Duration(6 * time.Second), Average: 12, Burst: 18, }, "bar": { Period: flaeg.Duration(3 * time.Second), Average: 6, Burst: 9, }, }, }, Redirect: &types.Redirect{ EntryPoint: "https", Regex: "", Replacement: "", Permanent: true, }, }, }, expectedBackends: map[string]*types.Backend{ "backend-foobar": { Servers: map[string]types.Server{ "server-ID1": { URL: "https://10.10.10.10:666", Weight: 12, }, }, CircuitBreaker: &types.CircuitBreaker{ Expression: "NetworkErrorRatio() > 0.5", }, LoadBalancer: &types.LoadBalancer{ Method: "drr", Stickiness: &types.Stickiness{ CookieName: "chocolate", }, }, MaxConn: &types.MaxConn{ Amount: 666, ExtractorFunc: "client.ip", }, HealthCheck: &types.HealthCheck{ Scheme: "http", Path: "/health", Port: 880, Interval: "6", Hostname: "foo.com", Headers: map[string]string{ "Foo": "bar", "Bar": "foo", }, }, Buffering: &types.Buffering{ MaxResponseBodyBytes: 10485760, MemResponseBodyBytes: 2097152, MaxRequestBodyBytes: 10485760, MemRequestBodyBytes: 2097152, RetryExpression: "IsNetworkError() && Attempts() <= 2", }, }, }, }, } for _, test := range testCases { test := test t.Run(test.desc, func(t *testing.T) { t.Parallel() actualConfig := p.buildConfigurationV2(test.tasks) require.NotNil(t, actualConfig) assert.Equal(t, test.expectedBackends, actualConfig.Backends) assert.Equal(t, test.expectedFrontends, actualConfig.Frontends) }) } } func TestTaskFilter(t *testing.T) { testCases := []struct { desc string mesosTask taskData exposedByDefault bool expected bool }{ { desc: "no task", mesosTask: taskData{}, exposedByDefault: true, expected: false, }, { desc: "task not healthy", mesosTask: aTaskData("test", withStatus(withState("TASK_RUNNING"))), exposedByDefault: true, expected: false, }, { desc: "exposedByDefault false and traefik.enable false", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "false"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: false, expected: false, }, { desc: "traefik.enable = true", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: false, expected: true, }, { desc: "exposedByDefault true and traefik.enable true", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: true, }, { desc: "exposedByDefault true and traefik.enable false", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "false"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, { desc: "traefik.portIndex and traefik.port both set", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPortIndex, "1"), withLabel(label.TraefikEnable, "80"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, { desc: "valid traefik.portIndex", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPortIndex, "1"), withInfo("test", withPorts( withPortTCP(80, "WEB"), withPortTCP(443, "WEB HTTPS"), )), ), exposedByDefault: true, expected: true, }, { desc: "default to first port index", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withInfo("test", withPorts( withPortTCP(80, "WEB"), withPortTCP(443, "WEB HTTPS"), )), ), exposedByDefault: true, expected: true, }, { desc: "traefik.portIndex and discoveryPorts don't correspond", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPortIndex, "1"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, { desc: "traefik.portIndex and discoveryPorts correspond", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPortIndex, "0"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: true, }, { desc: "traefik.port is not an integer", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPort, "TRAEFIK"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, { desc: "traefik.port is not the same as discovery.port", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPort, "443"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, { desc: "traefik.port is the same as discovery.port", mesosTask: aTaskData("test", withDefaultStatus(), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPort, "80"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: true, }, { desc: "healthy nil", mesosTask: aTaskData("test", withStatus( withState("TASK_RUNNING"), ), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPort, "80"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: true, }, { desc: "healthy false", mesosTask: aTaskData("test", withStatus( withState("TASK_RUNNING"), withHealthy(false), ), withLabel(label.TraefikEnable, "true"), withLabel(label.TraefikPort, "80"), withInfo("test", withPorts(withPortTCP(80, "WEB"))), ), exposedByDefault: true, expected: false, }, } for _, test := range testCases { test := test t.Run(test.desc, func(t *testing.T) { t.Parallel() actual := taskFilter(test.mesosTask, test.exposedByDefault) ok := assert.Equal(t, test.expected, actual) if !ok { t.Logf("Statuses : %v", test.mesosTask.Statuses) t.Logf("Label : %v", test.mesosTask.Labels) t.Logf("DiscoveryInfo : %v", test.mesosTask.DiscoveryInfo) t.Fatalf("Expected %v, got %v", test.expected, actual) } }) } } func TestGetSubDomain(t *testing.T) { providerGroups := &Provider{GroupsAsSubDomains: true} providerNoGroups := &Provider{GroupsAsSubDomains: false} testCases := []struct { path string expected string provider *Provider }{ {"/test", "test", providerNoGroups}, {"/test", "test", providerGroups}, {"/a/b/c/d", "d.c.b.a", providerGroups}, {"/b/a/d/c", "c.d.a.b", providerGroups}, {"/d/c/b/a", "a.b.c.d", providerGroups}, {"/c/d/a/b", "b.a.d.c", providerGroups}, {"/a/b/c/d", "a-b-c-d", providerNoGroups}, {"/b/a/d/c", "b-a-d-c", providerNoGroups}, {"/d/c/b/a", "d-c-b-a", providerNoGroups}, {"/c/d/a/b", "c-d-a-b", providerNoGroups}, } for _, test := range testCases { test := test t.Run(test.path, func(t *testing.T) { t.Parallel() actual := test.provider.getSubDomain(test.path) assert.Equal(t, test.expected, actual) }) } } func TestGetServers(t *testing.T) { testCases := []struct { desc string tasks []taskData expected map[string]types.Server }{ { desc: "", tasks: []taskData{ // App 1 aTaskData("ID1", withIP("10.10.10.10"), withInfo("name1", withPorts(withPort("TCP", 80, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), aTaskData("ID2", withIP("10.10.10.11"), withLabel(label.TraefikWeight, "18"), withInfo("name1", withPorts(withPort("TCP", 81, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), // App 2 aTaskData("ID3", withLabel(label.TraefikWeight, "12"), withIP("20.10.10.10"), withInfo("name2", withPorts(withPort("TCP", 80, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), aTaskData("ID4", withLabel(label.TraefikWeight, "6"), withIP("20.10.10.11"), withInfo("name2", withPorts(withPort("TCP", 81, "WEB"))), withStatus(withHealthy(true), withState("TASK_RUNNING")), ), }, expected: map[string]types.Server{ "server-ID1": { URL: "http://10.10.10.10:80", Weight: label.DefaultWeight, }, "server-ID2": { URL: "http://10.10.10.11:81", Weight: 18, }, "server-ID3": { URL: "http://20.10.10.10:80", Weight: 12, }, "server-ID4": { URL: "http://20.10.10.11:81", Weight: 6, }, }, }, } p := &Provider{ Domain: "docker.localhost", ExposedByDefault: true, IPSources: "host", } for _, test := range testCases { test := test t.Run(test.desc, func(t *testing.T) { t.Parallel() actual := p.getServers(test.tasks) assert.Equal(t, test.expected, actual) }) } } func TestGetFrontendRule(t *testing.T) { p := Provider{ Domain: "mesos.localhost", } testCases := []struct { desc string mesosTask taskData expected string }{ { desc: "label missing", mesosTask: aTaskData("test", withInfo("foo"), ), expected: "Host:foo.mesos.localhost", }, { desc: "label domain", mesosTask: aTaskData("test", withInfo("foo"), withLabel(label.TraefikDomain, "traefik.localhost"), ), expected: "Host:foo.traefik.localhost", }, { desc: "frontend rule available", mesosTask: aTaskData("test", withInfo("foo"), withLabel(label.TraefikFrontendRule, "Host:foo.bar"), ), expected: "Host:foo.bar", }, } for _, test := range testCases { test := test t.Run(test.desc, func(t *testing.T) { t.Parallel() rule := p.getFrontendRule(test.mesosTask) assert.Equal(t, test.expected, rule) }) } }