1280 lines
34 KiB
Go
1280 lines
34 KiB
Go
package marathon
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/containous/flaeg"
|
|
"github.com/containous/traefik/provider/label"
|
|
"github.com/containous/traefik/provider/marathon/mocks"
|
|
"github.com/containous/traefik/types"
|
|
"github.com/gambol99/go-marathon"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
)
|
|
|
|
type fakeClient struct {
|
|
mocks.Marathon
|
|
}
|
|
|
|
func newFakeClient(applicationsError bool, applications marathon.Applications) *fakeClient {
|
|
// create an instance of our test object
|
|
fakeClient := new(fakeClient)
|
|
if applicationsError {
|
|
fakeClient.On("Applications", mock.Anything).Return(nil, errors.New("fake Marathon server error"))
|
|
} else {
|
|
fakeClient.On("Applications", mock.Anything).Return(&applications, nil)
|
|
}
|
|
return fakeClient
|
|
}
|
|
|
|
func TestLoadConfigAPIErrors(t *testing.T) {
|
|
fakeClient := newFakeClient(true, marathon.Applications{})
|
|
provider := &Provider{
|
|
marathonClient: fakeClient,
|
|
}
|
|
actualConfig := provider.buildConfiguration()
|
|
fakeClient.AssertExpectations(t)
|
|
if actualConfig != nil {
|
|
t.Errorf("configuration should have been nil, got %v", actualConfig)
|
|
}
|
|
}
|
|
|
|
func TestLoadConfigNonAPIErrors(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
task marathon.Task
|
|
expectedFrontends map[string]*types.Frontend
|
|
expectedBackends map[string]*types.Backend
|
|
}{
|
|
{
|
|
desc: "simple application",
|
|
application: application(appPorts(80)),
|
|
task: localhostTask(taskPorts(80)),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "filtered task",
|
|
application: application(appPorts(80)),
|
|
task: localhostTask(
|
|
taskPorts(80),
|
|
state(taskStateStaging),
|
|
),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {},
|
|
},
|
|
},
|
|
{
|
|
desc: "load balancer / circuit breaker labels",
|
|
application: application(
|
|
appPorts(80),
|
|
withLabel(label.TraefikBackendLoadBalancerMethod, "drr"),
|
|
withLabel(label.TraefikBackendCircuitBreakerExpression, "NetworkErrorRatio() > 0.5"),
|
|
),
|
|
task: localhostTask(taskPorts(80)),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
CircuitBreaker: &types.CircuitBreaker{
|
|
Expression: "NetworkErrorRatio() > 0.5",
|
|
},
|
|
LoadBalancer: &types.LoadBalancer{
|
|
Method: "drr",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "general max connection labels",
|
|
application: application(
|
|
appPorts(80),
|
|
withLabel(label.TraefikBackendMaxConnAmount, "1000"),
|
|
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
|
),
|
|
task: localhostTask(taskPorts(80)),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
MaxConn: &types.MaxConn{
|
|
Amount: 1000,
|
|
ExtractorFunc: "client.ip",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "max connection amount label only",
|
|
application: application(
|
|
appPorts(80),
|
|
withLabel(label.TraefikBackendMaxConnAmount, "1000"),
|
|
),
|
|
task: localhostTask(taskPorts(80)),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
MaxConn: nil,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "max connection extractor function label only",
|
|
application: application(
|
|
appPorts(80),
|
|
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
|
),
|
|
task: localhostTask(taskPorts(80)),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
MaxConn: nil,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "health check labels",
|
|
application: application(
|
|
appPorts(80),
|
|
withLabel(label.TraefikBackendHealthCheckPath, "/path"),
|
|
withLabel(label.TraefikBackendHealthCheckInterval, "5m"),
|
|
),
|
|
task: task(
|
|
host("127.0.0.1"),
|
|
taskPorts(80),
|
|
),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://127.0.0.1:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
HealthCheck: &types.HealthCheck{
|
|
Path: "/path",
|
|
Interval: "5m",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "multiple ports",
|
|
application: application(
|
|
appPorts(80, 81),
|
|
),
|
|
task: localhostTask(
|
|
taskPorts(80, 81),
|
|
),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app": {
|
|
Backend: "backend-app",
|
|
Routes: map[string]types.Route{
|
|
"route-host-app": {
|
|
Rule: "Host:app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app": {
|
|
Servers: map[string]types.Server{
|
|
"server-task": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "multiple ports with services",
|
|
application: application(
|
|
appPorts(80, 81),
|
|
withLabel(label.TraefikBackendMaxConnAmount, "1000"),
|
|
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
|
withLabel("traefik.web.port", "80"),
|
|
withLabel("traefik.admin.port", "81"),
|
|
withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the servicesPropertiesRegexp regex.
|
|
withLabel("traefik.web.frontend.rule", "Host:web.app.docker.localhost"),
|
|
withLabel("traefik.admin.frontend.rule", "Host:admin.app.docker.localhost"),
|
|
),
|
|
task: localhostTask(
|
|
taskPorts(80, 81),
|
|
),
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-app-service-web": {
|
|
Backend: "backend-app-service-web",
|
|
Routes: map[string]types.Route{
|
|
`route-host-app-service-web`: {
|
|
Rule: "Host:web.app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
"frontend-app-service-admin": {
|
|
Backend: "backend-app-service-admin",
|
|
Routes: map[string]types.Route{
|
|
`route-host-app-service-admin`: {
|
|
Rule: "Host:admin.app.docker.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-app-service-web": {
|
|
Servers: map[string]types.Server{
|
|
"server-task-service-web": {
|
|
URL: "http://localhost:80",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
MaxConn: &types.MaxConn{
|
|
Amount: 1000,
|
|
ExtractorFunc: "client.ip",
|
|
},
|
|
},
|
|
"backend-app-service-admin": {
|
|
Servers: map[string]types.Server{
|
|
"server-task-service-admin": {
|
|
URL: "http://localhost:81",
|
|
Weight: 0,
|
|
},
|
|
},
|
|
MaxConn: &types.MaxConn{
|
|
Amount: 1000,
|
|
ExtractorFunc: "client.ip",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
c.application.ID = "/app"
|
|
c.task.ID = "task"
|
|
if c.task.State == "" {
|
|
c.task.State = "TASK_RUNNING"
|
|
}
|
|
c.application.Tasks = []*marathon.Task{&c.task}
|
|
|
|
for _, frontend := range c.expectedFrontends {
|
|
frontend.PassHostHeader = true
|
|
frontend.BasicAuth = []string{}
|
|
frontend.EntryPoints = []string{}
|
|
}
|
|
|
|
fakeClient := newFakeClient(false,
|
|
marathon.Applications{Apps: []marathon.Application{c.application}})
|
|
provider := &Provider{
|
|
Domain: "docker.localhost",
|
|
ExposedByDefault: true,
|
|
marathonClient: fakeClient,
|
|
}
|
|
actualConfig := provider.buildConfiguration()
|
|
fakeClient.AssertExpectations(t)
|
|
|
|
expectedConfig := &types.Configuration{
|
|
Backends: c.expectedBackends,
|
|
Frontends: c.expectedFrontends,
|
|
}
|
|
assert.Equal(t, expectedConfig, actualConfig)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestApplicationFilterConstraints(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
marathonLBCompatibility bool
|
|
filterMarathonConstraints bool
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "tags missing",
|
|
application: application(),
|
|
marathonLBCompatibility: false,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "tag matching",
|
|
application: application(withLabel(label.TraefikTags, "valid")),
|
|
marathonLBCompatibility: false,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "constraint missing",
|
|
application: application(),
|
|
marathonLBCompatibility: false,
|
|
filterMarathonConstraints: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "constraint invalid",
|
|
application: application(constraint("service_cluster:CLUSTER:test")),
|
|
marathonLBCompatibility: false,
|
|
filterMarathonConstraints: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "constraint valid",
|
|
application: application(constraint("valid")),
|
|
marathonLBCompatibility: false,
|
|
filterMarathonConstraints: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "LB compatibility tag matching",
|
|
application: application(
|
|
withLabel("HAPROXY_GROUP", "valid"),
|
|
withLabel(label.TraefikTags, "notvalid"),
|
|
),
|
|
marathonLBCompatibility: true,
|
|
expected: true,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
provider := &Provider{
|
|
ExposedByDefault: true,
|
|
MarathonLBCompatibility: c.marathonLBCompatibility,
|
|
FilterMarathonConstraints: c.filterMarathonConstraints,
|
|
}
|
|
constraint, err := types.NewConstraint("tag==valid")
|
|
if err != nil {
|
|
panic(fmt.Sprintf("failed to create constraint 'tag==valid': %s", err))
|
|
}
|
|
provider.Constraints = types.Constraints{constraint}
|
|
actual := provider.applicationFilter(c.application)
|
|
if actual != c.expected {
|
|
t.Errorf("got %v, expected %v", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestApplicationFilterEnabled(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
exposedByDefault bool
|
|
enabledLabel string
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "exposed",
|
|
exposedByDefault: true,
|
|
enabledLabel: "",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "exposed and tolerated by valid label value",
|
|
exposedByDefault: true,
|
|
enabledLabel: "true",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "exposed and tolerated by invalid label value",
|
|
exposedByDefault: true,
|
|
enabledLabel: "invalid",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "exposed but overridden by label",
|
|
exposedByDefault: true,
|
|
enabledLabel: "false",
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "non-exposed",
|
|
exposedByDefault: false,
|
|
enabledLabel: "",
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "non-exposed but overridden by label",
|
|
exposedByDefault: false,
|
|
enabledLabel: "true",
|
|
expected: true,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
provider := &Provider{ExposedByDefault: c.exposedByDefault}
|
|
app := application(withLabel(label.TraefikEnable, c.enabledLabel))
|
|
if provider.applicationFilter(app) != c.expected {
|
|
t.Errorf("got unexpected filtering = %t", !c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTaskFilter(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
task marathon.Task
|
|
application marathon.Application
|
|
readyChecker *readinessChecker
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "missing port",
|
|
task: task(),
|
|
application: application(),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "task not running",
|
|
task: task(
|
|
taskPorts(80),
|
|
state(taskStateStaging),
|
|
),
|
|
application: application(appPorts(80)),
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "existing port",
|
|
task: task(taskPorts(80)),
|
|
application: application(appPorts(80)),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "ambiguous port specification",
|
|
task: task(taskPorts(80, 443)),
|
|
application: application(
|
|
appPorts(80, 443),
|
|
withLabel(label.TraefikPort, "443"),
|
|
withLabel(label.TraefikPortIndex, "1"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "single service without port",
|
|
task: task(taskPorts(80, 81)),
|
|
application: application(
|
|
appPorts(80, 81),
|
|
labelWithService(label.TraefikPort, "80", "web"),
|
|
labelWithService(label.TraefikPort, "illegal", "admin"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "single service missing port",
|
|
task: task(taskPorts(80, 81)),
|
|
application: application(
|
|
appPorts(80, 81),
|
|
labelWithService(label.TraefikPort, "81", "admin"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "healthcheck available",
|
|
task: task(taskPorts(80)),
|
|
application: application(
|
|
appPorts(80),
|
|
healthChecks(marathon.NewDefaultHealthCheck()),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "healthcheck result false",
|
|
task: task(
|
|
taskPorts(80),
|
|
healthCheckResultLiveness(false),
|
|
),
|
|
application: application(
|
|
appPorts(80),
|
|
healthChecks(marathon.NewDefaultHealthCheck()),
|
|
),
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "healthcheck results mixed",
|
|
task: task(
|
|
taskPorts(80),
|
|
healthCheckResultLiveness(true, false),
|
|
),
|
|
application: application(
|
|
appPorts(80),
|
|
healthChecks(marathon.NewDefaultHealthCheck()),
|
|
),
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "healthcheck result true",
|
|
task: task(
|
|
taskPorts(80),
|
|
healthCheckResultLiveness(true),
|
|
),
|
|
application: application(
|
|
appPorts(80),
|
|
healthChecks(marathon.NewDefaultHealthCheck()),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "readiness check false",
|
|
task: task(taskPorts(80)),
|
|
application: application(
|
|
appPorts(80),
|
|
deployments("deploymentId"),
|
|
readinessCheck(0),
|
|
readinessCheckResult(testTaskName, false),
|
|
),
|
|
readyChecker: testReadinessChecker(),
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
provider := &Provider{readyChecker: c.readyChecker}
|
|
actual := provider.taskFilter(c.task, c.application)
|
|
if actual != c.expected {
|
|
t.Errorf("actual %v, expected %v", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetPort(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
task marathon.Task
|
|
serviceName string
|
|
expected string
|
|
}{
|
|
{
|
|
desc: "port missing",
|
|
application: application(),
|
|
task: task(),
|
|
expected: "",
|
|
},
|
|
{
|
|
desc: "numeric port",
|
|
application: application(withLabel(label.TraefikPort, "80")),
|
|
task: task(),
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "string port",
|
|
application: application(withLabel(label.TraefikPort, "foobar")),
|
|
task: task(taskPorts(80)),
|
|
expected: "",
|
|
},
|
|
{
|
|
desc: "negative port",
|
|
application: application(withLabel(label.TraefikPort, "-1")),
|
|
task: task(taskPorts(80)),
|
|
expected: "",
|
|
},
|
|
{
|
|
desc: "task port available",
|
|
application: application(),
|
|
task: task(taskPorts(80)),
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "port definition available",
|
|
application: application(
|
|
portDefinition(443),
|
|
),
|
|
task: task(),
|
|
expected: "443",
|
|
},
|
|
{
|
|
desc: "IP-per-task port available",
|
|
application: application(ipAddrPerTask(8000)),
|
|
task: task(),
|
|
expected: "8000",
|
|
},
|
|
{
|
|
desc: "multiple task ports available",
|
|
application: application(),
|
|
task: task(taskPorts(80, 443)),
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "numeric port index specified",
|
|
application: application(withLabel(label.TraefikPortIndex, "1")),
|
|
task: task(taskPorts(80, 443)),
|
|
expected: "443",
|
|
},
|
|
{
|
|
desc: "string port index specified",
|
|
application: application(withLabel(label.TraefikPortIndex, "foobar")),
|
|
task: task(taskPorts(80)),
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "port and port index specified",
|
|
application: application(
|
|
withLabel(label.TraefikPort, "80"),
|
|
withLabel(label.TraefikPortIndex, "1"),
|
|
),
|
|
task: task(taskPorts(80, 443)),
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "task and application ports specified",
|
|
application: application(appPorts(9999)),
|
|
task: task(taskPorts(7777)),
|
|
expected: "7777",
|
|
},
|
|
{
|
|
desc: "multiple task ports with service index available",
|
|
application: application(withLabel(label.Prefix+"http.portIndex", "0")),
|
|
task: task(taskPorts(80, 443)),
|
|
serviceName: "http",
|
|
expected: "80",
|
|
},
|
|
{
|
|
desc: "multiple task ports with service port available",
|
|
application: application(withLabel(label.Prefix+"https.port", "443")),
|
|
task: task(taskPorts(80, 443)),
|
|
serviceName: "https",
|
|
expected: "443",
|
|
},
|
|
{
|
|
desc: "multiple task ports with services but default port available",
|
|
application: application(withLabel(label.Prefix+"http.weight", "100")),
|
|
task: task(taskPorts(80, 443)),
|
|
serviceName: "http",
|
|
expected: "80",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
actual := getPort(c.task, c.application, c.serviceName)
|
|
if actual != c.expected {
|
|
t.Errorf("actual %q, expected %q", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetSticky(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
expected string
|
|
}{
|
|
{
|
|
desc: "label missing",
|
|
application: application(),
|
|
expected: "false",
|
|
},
|
|
{
|
|
desc: "label existing",
|
|
application: application(withLabel(label.TraefikBackendLoadBalancerSticky, "true")),
|
|
expected: "true",
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
actual := getSticky(test.application)
|
|
if actual != test.expected {
|
|
t.Errorf("actual %q, expected %q", actual, test.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetFrontendRule(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected string
|
|
marathonLBCompatibility bool
|
|
}{
|
|
{
|
|
desc: "label missing",
|
|
application: application(appID("test")),
|
|
marathonLBCompatibility: true,
|
|
expected: "Host:test.docker.localhost",
|
|
},
|
|
{
|
|
desc: "HAProxy vhost available and LB compat disabled",
|
|
application: application(
|
|
appID("test"),
|
|
withLabel("HAPROXY_0_VHOST", "foo.bar"),
|
|
),
|
|
marathonLBCompatibility: false,
|
|
expected: "Host:test.docker.localhost",
|
|
},
|
|
{
|
|
desc: "HAProxy vhost available and LB compat enabled",
|
|
application: application(withLabel("HAPROXY_0_VHOST", "foo.bar")),
|
|
marathonLBCompatibility: true,
|
|
expected: "Host:foo.bar",
|
|
},
|
|
{
|
|
desc: "frontend rule available",
|
|
|
|
application: application(
|
|
withLabel(label.TraefikFrontendRule, "Host:foo.bar"),
|
|
withLabel("HAPROXY_0_VHOST", "unused"),
|
|
),
|
|
marathonLBCompatibility: true,
|
|
expected: "Host:foo.bar",
|
|
},
|
|
{
|
|
desc: "service label existing",
|
|
application: application(labelWithService(label.TraefikFrontendRule, "Host:foo.bar", "app")),
|
|
serviceName: "app",
|
|
marathonLBCompatibility: true,
|
|
expected: "Host:foo.bar",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
prov := &Provider{
|
|
Domain: "docker.localhost",
|
|
MarathonLBCompatibility: c.marathonLBCompatibility,
|
|
}
|
|
actual := prov.getFrontendRule(c.application, c.serviceName)
|
|
if actual != c.expected {
|
|
t.Errorf("actual %q, expected %q", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetBackend(t *testing.T) {
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected string
|
|
}{
|
|
{
|
|
desc: "label missing",
|
|
application: application(appID("/group/app")),
|
|
expected: "backend-group-app",
|
|
},
|
|
{
|
|
desc: "label existing",
|
|
application: application(withLabel(label.TraefikBackend, "bar")),
|
|
expected: "backendbar",
|
|
},
|
|
{
|
|
desc: "service label existing",
|
|
application: application(labelWithService(label.TraefikBackend, "bar", "app")),
|
|
serviceName: "app",
|
|
expected: "backendbar",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
prov := &Provider{}
|
|
actual := prov.getBackend(c.application, c.serviceName)
|
|
if actual != c.expected {
|
|
t.Errorf("actual %q, expected %q", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetSubDomain(t *testing.T) {
|
|
cases := []struct {
|
|
path string
|
|
expected string
|
|
groupAsSubDomain bool
|
|
}{
|
|
{"/test", "test", false},
|
|
{"/test", "test", true},
|
|
{"/a/b/c/d", "d.c.b.a", true},
|
|
{"/b/a/d/c", "c.d.a.b", true},
|
|
{"/d/c/b/a", "a.b.c.d", true},
|
|
{"/c/d/a/b", "b.a.d.c", true},
|
|
{"/a/b/c/d", "a-b-c-d", false},
|
|
{"/b/a/d/c", "b-a-d-c", false},
|
|
{"/d/c/b/a", "d-c-b-a", false},
|
|
{"/c/d/a/b", "c-d-a-b", false},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(fmt.Sprintf("path=%s,group=%t", c.path, c.groupAsSubDomain), func(t *testing.T) {
|
|
t.Parallel()
|
|
prov := &Provider{GroupsAsSubDomains: c.groupAsSubDomain}
|
|
actual := prov.getSubDomain(c.path)
|
|
if actual != c.expected {
|
|
t.Errorf("actual %q, expected %q", actual, c.expected)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetBackendServer(t *testing.T) {
|
|
host := "host"
|
|
cases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
task marathon.Task
|
|
forceTaskHostname bool
|
|
expectedServer string
|
|
}{
|
|
{
|
|
desc: "application without IP-per-task",
|
|
application: application(),
|
|
expectedServer: host,
|
|
},
|
|
{
|
|
desc: "task hostname override",
|
|
application: application(ipAddrPerTask(8000)),
|
|
forceTaskHostname: true,
|
|
expectedServer: host,
|
|
},
|
|
{
|
|
desc: "task IP address missing",
|
|
application: application(ipAddrPerTask(8000)),
|
|
task: task(),
|
|
expectedServer: "",
|
|
},
|
|
{
|
|
desc: "single task IP address",
|
|
application: application(ipAddrPerTask(8000)),
|
|
task: task(ipAddresses("1.1.1.1")),
|
|
expectedServer: "1.1.1.1",
|
|
},
|
|
{
|
|
desc: "multiple task IP addresses without index label",
|
|
application: application(ipAddrPerTask(8000)),
|
|
task: task(ipAddresses("1.1.1.1", "2.2.2.2")),
|
|
expectedServer: "",
|
|
},
|
|
{
|
|
desc: "multiple task IP addresses with invalid index label",
|
|
application: application(
|
|
withLabel("traefik.ipAddressIdx", "invalid"),
|
|
ipAddrPerTask(8000),
|
|
),
|
|
task: task(ipAddresses("1.1.1.1", "2.2.2.2")),
|
|
expectedServer: "",
|
|
},
|
|
{
|
|
desc: "multiple task IP addresses with valid index label",
|
|
application: application(
|
|
withLabel("traefik.ipAddressIdx", "1"),
|
|
ipAddrPerTask(8000),
|
|
),
|
|
task: task(ipAddresses("1.1.1.1", "2.2.2.2")),
|
|
expectedServer: "2.2.2.2",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
c := c
|
|
t.Run(c.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
prov := &Provider{ForceTaskHostname: c.forceTaskHostname}
|
|
c.task.Host = host
|
|
actualServer := prov.getBackendServer(c.task, c.application)
|
|
if actualServer != c.expectedServer {
|
|
t.Errorf("actual %q, expected %q", actualServer, c.expectedServer)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestHasRedirect(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "without redirect labels",
|
|
application: application(),
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "with entry point redirect label",
|
|
application: application(
|
|
withLabel(label.TraefikFrontendRedirectEntryPoint, "bar"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with regex redirect labels",
|
|
application: application(
|
|
withLabel(label.TraefikFrontendRedirectRegex, "bar"),
|
|
withLabel(label.TraefikFrontendRedirectReplacement, "bar"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with entry point redirect label on service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectEntryPoint, "bar"),
|
|
),
|
|
serviceName: "foo",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with entry point redirect label on service but not the same service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectEntryPoint, "bar"),
|
|
),
|
|
serviceName: "foofoo",
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "with regex redirect label on service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectRegex, "bar"),
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectReplacement, "bar"),
|
|
),
|
|
serviceName: "foo",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with regex redirect label on service but not the same service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectRegex, "bar"),
|
|
withLabel(label.Prefix+"foo."+label.SuffixFrontendRedirectReplacement, "bar"),
|
|
),
|
|
serviceName: "foofoo",
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actual := hasRedirect(test.application, test.serviceName)
|
|
|
|
assert.Equal(t, test.expected, actual)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestHasPrefixFuncService(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "with one label",
|
|
application: application(
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"goo"+label.SuffixErrorPageBackend, "bar"),
|
|
),
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with one label on service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo"+label.SuffixErrorPageBackend, "bar"),
|
|
),
|
|
serviceName: "foo",
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "with one label on service but not the same service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo"+label.SuffixErrorPageBackend, "bar"),
|
|
),
|
|
serviceName: "foofoo",
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actual := hasPrefixFuncService(label.BaseFrontendErrorPage)(test.application, test.serviceName)
|
|
|
|
assert.Equal(t, test.expected, actual)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetErrorPages(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected map[string]*types.ErrorPage
|
|
}{
|
|
{
|
|
desc: "with 2 error pages",
|
|
application: application(
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageBackend, "bar1"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageStatus, "bar2"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageQuery, "bar3"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageBackend, "bar4"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageStatus, "bar5"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageQuery, "bar6"),
|
|
),
|
|
expected: map[string]*types.ErrorPage{
|
|
"goo": {
|
|
Backend: "bar1",
|
|
Query: "bar3",
|
|
Status: []string{"bar2"},
|
|
},
|
|
"hoo": {
|
|
Backend: "bar4",
|
|
Query: "bar6",
|
|
Status: []string{"bar5"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "with 2 error pages on service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageBackend, "bar1"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageStatus, "bar2"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageQuery, "bar3"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageBackend, "bar4"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageStatus, "bar5"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"hoo."+label.SuffixErrorPageQuery, "bar6"),
|
|
),
|
|
serviceName: "foo",
|
|
expected: map[string]*types.ErrorPage{
|
|
"goo": {
|
|
Backend: "bar1",
|
|
Query: "bar3",
|
|
Status: []string{"bar2"},
|
|
},
|
|
"hoo": {
|
|
Backend: "bar4",
|
|
Query: "bar6",
|
|
Status: []string{"bar5"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "with 1 error page on service but not the same service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageBackend, "bar1"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageStatus, "bar2"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendErrorPage+"goo."+label.SuffixErrorPageQuery, "bar3"),
|
|
),
|
|
serviceName: "foofoo",
|
|
expected: nil,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
pages := getErrorPages(test.application, test.serviceName)
|
|
|
|
assert.EqualValues(t, test.expected, pages)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetRateLimits(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
application marathon.Application
|
|
serviceName string
|
|
expected map[string]*types.Rate
|
|
}{
|
|
{
|
|
desc: "with 2 rate limits",
|
|
application: application(
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitAverage, "1"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitPeriod, "2"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitBurst, "3"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitAverage, "4"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitPeriod, "5"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitBurst, "6"),
|
|
),
|
|
expected: map[string]*types.Rate{
|
|
"goo": {
|
|
Average: 1,
|
|
Period: flaeg.Duration(2 * time.Second),
|
|
Burst: 3,
|
|
},
|
|
"hoo": {
|
|
Average: 4,
|
|
Period: flaeg.Duration(5 * time.Second),
|
|
Burst: 6,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "with 2 rate limits on service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitAverage, "1"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitPeriod, "2"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitBurst, "3"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitAverage, "4"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitPeriod, "5"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"hoo."+label.SuffixRateLimitBurst, "6"),
|
|
),
|
|
serviceName: "foo",
|
|
expected: map[string]*types.Rate{
|
|
"goo": {
|
|
Average: 1,
|
|
Period: flaeg.Duration(2 * time.Second),
|
|
Burst: 3,
|
|
},
|
|
"hoo": {
|
|
Average: 4,
|
|
Period: flaeg.Duration(5 * time.Second),
|
|
Burst: 6,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "with 1 rate limit on service but not the same service",
|
|
application: application(
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitAverage, "1"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitPeriod, "2"),
|
|
withLabel(label.Prefix+"foo."+label.BaseFrontendRateLimit+"goo."+label.SuffixRateLimitBurst, "3"),
|
|
),
|
|
serviceName: "foofoo",
|
|
expected: nil,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
limits := getRateLimits(test.application, test.serviceName)
|
|
|
|
assert.EqualValues(t, test.expected, limits)
|
|
})
|
|
}
|
|
}
|