539 lines
15 KiB
Go
539 lines
15 KiB
Go
package anonymize
|
|
|
|
import (
|
|
"flag"
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
assetfs "github.com/elazarl/go-bindata-assetfs"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
ptypes "github.com/traefik/paerser/types"
|
|
"github.com/traefik/traefik/v2/pkg/config/static"
|
|
"github.com/traefik/traefik/v2/pkg/ping"
|
|
"github.com/traefik/traefik/v2/pkg/plugins"
|
|
"github.com/traefik/traefik/v2/pkg/provider/acme"
|
|
"github.com/traefik/traefik/v2/pkg/provider/consulcatalog"
|
|
"github.com/traefik/traefik/v2/pkg/provider/docker"
|
|
"github.com/traefik/traefik/v2/pkg/provider/ecs"
|
|
"github.com/traefik/traefik/v2/pkg/provider/file"
|
|
"github.com/traefik/traefik/v2/pkg/provider/http"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kubernetes/crd"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kubernetes/ingress"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kv"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kv/consul"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kv/etcd"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kv/redis"
|
|
"github.com/traefik/traefik/v2/pkg/provider/kv/zk"
|
|
"github.com/traefik/traefik/v2/pkg/provider/marathon"
|
|
"github.com/traefik/traefik/v2/pkg/provider/rancher"
|
|
"github.com/traefik/traefik/v2/pkg/provider/rest"
|
|
traefiktls "github.com/traefik/traefik/v2/pkg/tls"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/datadog"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/elastic"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/haystack"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/instana"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/jaeger"
|
|
"github.com/traefik/traefik/v2/pkg/tracing/zipkin"
|
|
"github.com/traefik/traefik/v2/pkg/types"
|
|
)
|
|
|
|
var updateExpected = flag.Bool("update_expected", false, "Update expected files in fixtures")
|
|
|
|
func TestDo_globalConfiguration(t *testing.T) {
|
|
config := &static.Configuration{}
|
|
|
|
config.Global = &static.Global{
|
|
CheckNewVersion: true,
|
|
SendAnonymousUsage: true,
|
|
}
|
|
|
|
config.ServersTransport = &static.ServersTransport{
|
|
InsecureSkipVerify: true,
|
|
RootCAs: []traefiktls.FileOrContent{"root.ca"},
|
|
MaxIdleConnsPerHost: 42,
|
|
ForwardingTimeouts: &static.ForwardingTimeouts{
|
|
DialTimeout: 42,
|
|
ResponseHeaderTimeout: 42,
|
|
IdleConnTimeout: 42,
|
|
},
|
|
}
|
|
|
|
config.EntryPoints = static.EntryPoints{
|
|
"foobar": {
|
|
Address: "foo Address",
|
|
Transport: &static.EntryPointsTransport{
|
|
LifeCycle: &static.LifeCycle{
|
|
RequestAcceptGraceTimeout: ptypes.Duration(111 * time.Second),
|
|
GraceTimeOut: ptypes.Duration(111 * time.Second),
|
|
},
|
|
RespondingTimeouts: &static.RespondingTimeouts{
|
|
ReadTimeout: ptypes.Duration(111 * time.Second),
|
|
WriteTimeout: ptypes.Duration(111 * time.Second),
|
|
IdleTimeout: ptypes.Duration(111 * time.Second),
|
|
},
|
|
},
|
|
ProxyProtocol: &static.ProxyProtocol{
|
|
Insecure: true,
|
|
TrustedIPs: []string{"127.0.0.1/32", "192.168.0.1"},
|
|
},
|
|
ForwardedHeaders: &static.ForwardedHeaders{
|
|
Insecure: true,
|
|
TrustedIPs: []string{"127.0.0.1/32", "192.168.0.1"},
|
|
},
|
|
HTTP: static.HTTPConfig{
|
|
Redirections: &static.Redirections{
|
|
EntryPoint: &static.RedirectEntryPoint{
|
|
To: "foobar",
|
|
Scheme: "foobar",
|
|
Permanent: true,
|
|
Priority: 42,
|
|
},
|
|
},
|
|
Middlewares: []string{"foobar", "foobar"},
|
|
TLS: &static.TLSConfig{
|
|
Options: "foobar",
|
|
CertResolver: "foobar",
|
|
Domains: []types.Domain{
|
|
{Main: "foobar", SANs: []string{"foobar", "foobar"}},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Providers = &static.Providers{
|
|
ProvidersThrottleDuration: ptypes.Duration(111 * time.Second),
|
|
}
|
|
|
|
config.ServersTransport = &static.ServersTransport{
|
|
InsecureSkipVerify: true,
|
|
RootCAs: []traefiktls.FileOrContent{"RootCAs 1", "RootCAs 2", "RootCAs 3"},
|
|
MaxIdleConnsPerHost: 111,
|
|
ForwardingTimeouts: &static.ForwardingTimeouts{
|
|
DialTimeout: ptypes.Duration(111 * time.Second),
|
|
ResponseHeaderTimeout: ptypes.Duration(111 * time.Second),
|
|
IdleConnTimeout: ptypes.Duration(111 * time.Second),
|
|
},
|
|
}
|
|
|
|
config.Providers.File = &file.Provider{
|
|
Directory: "file Directory",
|
|
Watch: true,
|
|
Filename: "file Filename",
|
|
DebugLogGeneratedTemplate: true,
|
|
}
|
|
|
|
config.Providers.Docker = &docker.Provider{
|
|
Constraints: `Label("foo", "bar")`,
|
|
Watch: true,
|
|
Endpoint: "MyEndPoint",
|
|
DefaultRule: "PathPrefix(`/`)",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
ExposedByDefault: true,
|
|
UseBindPortIP: true,
|
|
SwarmMode: true,
|
|
Network: "MyNetwork",
|
|
SwarmModeRefreshSeconds: 42,
|
|
}
|
|
|
|
config.Providers.Marathon = &marathon.Provider{
|
|
Constraints: `Label("foo", "bar")`,
|
|
Trace: true,
|
|
Watch: true,
|
|
Endpoint: "foobar",
|
|
DefaultRule: "PathPrefix(`/`)",
|
|
ExposedByDefault: true,
|
|
DCOSToken: "foobar",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
DialerTimeout: 42,
|
|
ResponseHeaderTimeout: 42,
|
|
TLSHandshakeTimeout: 42,
|
|
KeepAlive: 42,
|
|
ForceTaskHostname: true,
|
|
Basic: &marathon.Basic{
|
|
HTTPBasicAuthUser: "user",
|
|
HTTPBasicPassword: "password",
|
|
},
|
|
RespectReadinessChecks: true,
|
|
}
|
|
|
|
config.Providers.KubernetesIngress = &ingress.Provider{
|
|
Endpoint: "MyEndpoint",
|
|
Token: "MyToken",
|
|
CertAuthFilePath: "MyCertAuthPath",
|
|
DisablePassHostHeaders: true,
|
|
Namespaces: []string{"a", "b"},
|
|
LabelSelector: "myLabelSelector",
|
|
IngressClass: "MyIngressClass",
|
|
IngressEndpoint: &ingress.EndpointIngress{
|
|
IP: "IP",
|
|
Hostname: "Hostname",
|
|
PublishedService: "PublishedService",
|
|
},
|
|
ThrottleDuration: ptypes.Duration(111 * time.Second),
|
|
}
|
|
|
|
config.Providers.KubernetesCRD = &crd.Provider{
|
|
Endpoint: "MyEndpoint",
|
|
Token: "MyToken",
|
|
CertAuthFilePath: "MyCertAuthPath",
|
|
DisablePassHostHeaders: true,
|
|
Namespaces: []string{"a", "b"},
|
|
LabelSelector: "myLabelSelector",
|
|
IngressClass: "MyIngressClass",
|
|
ThrottleDuration: ptypes.Duration(111 * time.Second),
|
|
}
|
|
|
|
config.Providers.Rest = &rest.Provider{
|
|
Insecure: true,
|
|
}
|
|
|
|
config.Providers.Rancher = &rancher.Provider{
|
|
Constraints: `Label("foo", "bar")`,
|
|
Watch: true,
|
|
DefaultRule: "PathPrefix(`/`)",
|
|
ExposedByDefault: true,
|
|
EnableServiceHealthFilter: true,
|
|
RefreshSeconds: 42,
|
|
IntervalPoll: true,
|
|
Prefix: "MyPrefix",
|
|
}
|
|
|
|
config.Providers.ConsulCatalog = &consulcatalog.Provider{
|
|
Constraints: `Label("foo", "bar")`,
|
|
Endpoint: &consulcatalog.EndpointConfig{
|
|
Address: "MyAddress",
|
|
Scheme: "MyScheme",
|
|
DataCenter: "MyDatacenter",
|
|
Token: "MyToken",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
HTTPAuth: &consulcatalog.EndpointHTTPAuthConfig{
|
|
Username: "MyUsername",
|
|
Password: "MyPassword",
|
|
},
|
|
EndpointWaitTime: 42,
|
|
},
|
|
Prefix: "MyPrefix",
|
|
RefreshInterval: 42,
|
|
RequireConsistent: true,
|
|
Stale: true,
|
|
Cache: true,
|
|
ExposedByDefault: true,
|
|
DefaultRule: "PathPrefix(`/`)",
|
|
}
|
|
|
|
config.Providers.Ecs = &ecs.Provider{
|
|
Constraints: `Label("foo", "bar")`,
|
|
ExposedByDefault: true,
|
|
RefreshSeconds: 42,
|
|
DefaultRule: "PathPrefix(`/`)",
|
|
Clusters: []string{"Cluster1", "Cluster2"},
|
|
AutoDiscoverClusters: true,
|
|
Region: "Awsregion",
|
|
AccessKeyID: "AwsAccessKeyID",
|
|
SecretAccessKey: "AwsSecretAccessKey",
|
|
}
|
|
|
|
config.Providers.Consul = &consul.Provider{
|
|
Provider: kv.Provider{
|
|
RootKey: "RootKey",
|
|
Endpoints: nil,
|
|
Username: "username",
|
|
Password: "password",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Providers.Etcd = &etcd.Provider{
|
|
Provider: kv.Provider{
|
|
RootKey: "RootKey",
|
|
Endpoints: nil,
|
|
Username: "username",
|
|
Password: "password",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Providers.ZooKeeper = &zk.Provider{
|
|
Provider: kv.Provider{
|
|
RootKey: "RootKey",
|
|
Endpoints: nil,
|
|
Username: "username",
|
|
Password: "password",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Providers.Redis = &redis.Provider{
|
|
Provider: kv.Provider{
|
|
RootKey: "RootKey",
|
|
Endpoints: nil,
|
|
Username: "username",
|
|
Password: "password",
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Providers.HTTP = &http.Provider{
|
|
Endpoint: "Myenpoint",
|
|
PollInterval: 42,
|
|
PollTimeout: 42,
|
|
TLS: &types.ClientTLS{
|
|
CA: "myCa",
|
|
CAOptional: true,
|
|
Cert: "mycert.pem",
|
|
Key: "mycert.key",
|
|
InsecureSkipVerify: true,
|
|
},
|
|
}
|
|
|
|
config.API = &static.API{
|
|
Insecure: true,
|
|
Dashboard: true,
|
|
Debug: true,
|
|
DashboardAssets: &assetfs.AssetFS{
|
|
Asset: func(path string) ([]byte, error) {
|
|
return nil, nil
|
|
},
|
|
AssetDir: func(path string) ([]string, error) {
|
|
return nil, nil
|
|
},
|
|
AssetInfo: func(path string) (os.FileInfo, error) {
|
|
return nil, nil
|
|
},
|
|
Prefix: "fii",
|
|
},
|
|
}
|
|
|
|
config.Metrics = &types.Metrics{
|
|
Prometheus: &types.Prometheus{
|
|
Buckets: []float64{0.1, 0.3, 1.2, 5},
|
|
AddEntryPointsLabels: true,
|
|
AddServicesLabels: true,
|
|
EntryPoint: "MyEntryPoint",
|
|
ManualRouting: true,
|
|
},
|
|
Datadog: &types.Datadog{
|
|
Address: "localhost:8181",
|
|
PushInterval: 42,
|
|
AddEntryPointsLabels: true,
|
|
AddServicesLabels: true,
|
|
},
|
|
StatsD: &types.Statsd{
|
|
Address: "localhost:8182",
|
|
PushInterval: 42,
|
|
AddEntryPointsLabels: true,
|
|
AddServicesLabels: true,
|
|
Prefix: "MyPrefix",
|
|
},
|
|
InfluxDB: &types.InfluxDB{
|
|
Address: "localhost:8183",
|
|
Protocol: "http",
|
|
PushInterval: 42,
|
|
Database: "myDB",
|
|
RetentionPolicy: "12",
|
|
Username: "a",
|
|
Password: "aaaa",
|
|
AddEntryPointsLabels: true,
|
|
AddServicesLabels: true,
|
|
},
|
|
}
|
|
|
|
config.Ping = &ping.Handler{
|
|
EntryPoint: "MyEntryPoint",
|
|
ManualRouting: true,
|
|
TerminatingStatusCode: 42,
|
|
}
|
|
|
|
config.Log = &types.TraefikLog{
|
|
Level: "Level",
|
|
FilePath: "/foo/path",
|
|
Format: "json",
|
|
}
|
|
|
|
config.AccessLog = &types.AccessLog{
|
|
FilePath: "AccessLog FilePath",
|
|
Format: "AccessLog Format",
|
|
Filters: &types.AccessLogFilters{
|
|
StatusCodes: []string{"200", "500"},
|
|
RetryAttempts: true,
|
|
MinDuration: 42,
|
|
},
|
|
Fields: &types.AccessLogFields{
|
|
DefaultMode: "drop",
|
|
Names: map[string]string{
|
|
"RequestHost": "keep",
|
|
},
|
|
Headers: &types.FieldHeaders{
|
|
DefaultMode: "drop",
|
|
Names: map[string]string{
|
|
"Referer": "keep",
|
|
},
|
|
},
|
|
},
|
|
BufferingSize: 42,
|
|
}
|
|
|
|
config.Tracing = &static.Tracing{
|
|
ServiceName: "myServiceName",
|
|
SpanNameLimit: 42,
|
|
Jaeger: &jaeger.Config{
|
|
SamplingServerURL: "foobar",
|
|
SamplingType: "foobar",
|
|
SamplingParam: 42,
|
|
LocalAgentHostPort: "foobar",
|
|
Gen128Bit: true,
|
|
Propagation: "foobar",
|
|
TraceContextHeaderName: "foobar",
|
|
Collector: &jaeger.Collector{
|
|
Endpoint: "foobar",
|
|
User: "foobar",
|
|
Password: "foobar",
|
|
},
|
|
DisableAttemptReconnecting: true,
|
|
},
|
|
Zipkin: &zipkin.Config{
|
|
HTTPEndpoint: "foobar",
|
|
SameSpan: true,
|
|
ID128Bit: true,
|
|
SampleRate: 42,
|
|
},
|
|
Datadog: &datadog.Config{
|
|
LocalAgentHostPort: "foobar",
|
|
GlobalTag: "foobar",
|
|
Debug: true,
|
|
PrioritySampling: true,
|
|
TraceIDHeaderName: "foobar",
|
|
ParentIDHeaderName: "foobar",
|
|
SamplingPriorityHeaderName: "foobar",
|
|
BagagePrefixHeaderName: "foobar",
|
|
},
|
|
Instana: &instana.Config{
|
|
LocalAgentHost: "foobar",
|
|
LocalAgentPort: 4242,
|
|
LogLevel: "foobar",
|
|
},
|
|
Haystack: &haystack.Config{
|
|
LocalAgentHost: "foobar",
|
|
LocalAgentPort: 42,
|
|
GlobalTag: "foobar",
|
|
TraceIDHeaderName: "foobar",
|
|
ParentIDHeaderName: "foobar",
|
|
SpanIDHeaderName: "foobar",
|
|
BaggagePrefixHeaderName: "foobar",
|
|
},
|
|
Elastic: &elastic.Config{
|
|
ServerURL: "foobar",
|
|
SecretToken: "foobar",
|
|
ServiceEnvironment: "foobar",
|
|
},
|
|
}
|
|
|
|
config.HostResolver = &types.HostResolverConfig{
|
|
CnameFlattening: true,
|
|
ResolvConfig: "foobar",
|
|
ResolvDepth: 42,
|
|
}
|
|
|
|
config.CertificatesResolvers = map[string]static.CertificateResolver{
|
|
"CertificateResolver0": {
|
|
ACME: &acme.Configuration{
|
|
Email: "acme Email",
|
|
CAServer: "CAServer",
|
|
PreferredChain: "foobar",
|
|
Storage: "Storage",
|
|
KeyType: "MyKeyType",
|
|
DNSChallenge: &acme.DNSChallenge{
|
|
Provider: "DNSProvider",
|
|
DelayBeforeCheck: 42,
|
|
Resolvers: []string{"resolver1", "resolver2"},
|
|
DisablePropagationCheck: true,
|
|
},
|
|
HTTPChallenge: &acme.HTTPChallenge{
|
|
EntryPoint: "MyEntryPoint",
|
|
},
|
|
TLSChallenge: &acme.TLSChallenge{},
|
|
},
|
|
},
|
|
}
|
|
|
|
config.Pilot = &static.Pilot{
|
|
Token: "token",
|
|
}
|
|
|
|
config.Experimental = &static.Experimental{
|
|
Plugins: map[string]plugins.Descriptor{
|
|
"Descriptor0": {
|
|
ModuleName: "foobar",
|
|
Version: "foobar",
|
|
},
|
|
"Descriptor1": {
|
|
ModuleName: "foobar",
|
|
Version: "foobar",
|
|
},
|
|
},
|
|
DevPlugin: &plugins.DevPlugin{
|
|
GoPath: "foobar",
|
|
ModuleName: "foobar",
|
|
},
|
|
}
|
|
|
|
expectedConfiguration, err := ioutil.ReadFile("./testdata/anonymized-static-config.json")
|
|
require.NoError(t, err)
|
|
|
|
cleanJSON, err := Do(config, true)
|
|
require.NoError(t, err)
|
|
|
|
if *updateExpected {
|
|
require.NoError(t, ioutil.WriteFile("testdata/anonymized-static-config.json", []byte(cleanJSON), 0666))
|
|
}
|
|
|
|
expected := strings.TrimSuffix(string(expectedConfiguration), "\n")
|
|
assert.Equal(t, expected, cleanJSON)
|
|
}
|