654 lines
20 KiB
Go
654 lines
20 KiB
Go
package mesos
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/containous/flaeg"
|
|
"github.com/containous/traefik/provider/label"
|
|
"github.com/containous/traefik/types"
|
|
"github.com/mesosphere/mesos-dns/records/state"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestBuildConfiguration(t *testing.T) {
|
|
p := &Provider{
|
|
Domain: "mesos.localhost",
|
|
ExposedByDefault: true,
|
|
IPSources: "host",
|
|
}
|
|
|
|
testCases := []struct {
|
|
desc string
|
|
tasks []state.Task
|
|
expectedFrontends map[string]*types.Frontend
|
|
expectedBackends map[string]*types.Backend
|
|
}{
|
|
{
|
|
desc: "when no tasks",
|
|
tasks: []state.Task{},
|
|
expectedFrontends: map[string]*types.Frontend{},
|
|
expectedBackends: map[string]*types.Backend{},
|
|
},
|
|
{
|
|
desc: "2 applications with 2 tasks",
|
|
tasks: []state.Task{
|
|
// App 1
|
|
aTask("ID1",
|
|
withIP("10.10.10.10"),
|
|
withInfo("name1",
|
|
withPorts(withPort("TCP", 80, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
aTask("ID2",
|
|
withIP("10.10.10.11"),
|
|
withInfo("name1",
|
|
withPorts(withPort("TCP", 81, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
// App 2
|
|
aTask("ID3",
|
|
withIP("20.10.10.10"),
|
|
withInfo("name2",
|
|
withPorts(withPort("TCP", 80, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
aTask("ID4",
|
|
withIP("20.10.10.11"),
|
|
withInfo("name2",
|
|
withPorts(withPort("TCP", 81, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
},
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-ID1": {
|
|
Backend: "backend-name1",
|
|
EntryPoints: []string{},
|
|
BasicAuth: []string{},
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"route-host-ID1": {
|
|
Rule: "Host:name1.mesos.localhost",
|
|
},
|
|
},
|
|
},
|
|
"frontend-ID3": {
|
|
Backend: "backend-name2",
|
|
EntryPoints: []string{},
|
|
BasicAuth: []string{},
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"route-host-ID3": {
|
|
Rule: "Host:name2.mesos.localhost",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-name1": {
|
|
Servers: map[string]types.Server{
|
|
"server-ID1": {
|
|
URL: "http://10.10.10.10:80",
|
|
Weight: label.DefaultWeight,
|
|
},
|
|
"server-ID2": {
|
|
URL: "http://10.10.10.11:81",
|
|
Weight: label.DefaultWeight,
|
|
},
|
|
},
|
|
},
|
|
"backend-name2": {
|
|
Servers: map[string]types.Server{
|
|
"server-ID3": {
|
|
URL: "http://20.10.10.10:80",
|
|
Weight: label.DefaultWeight,
|
|
},
|
|
"server-ID4": {
|
|
URL: "http://20.10.10.11:81",
|
|
Weight: label.DefaultWeight,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
desc: "with all labels",
|
|
tasks: []state.Task{
|
|
aTask("ID1",
|
|
withLabel(label.TraefikPort, "666"),
|
|
withLabel(label.TraefikProtocol, "https"),
|
|
withLabel(label.TraefikWeight, "12"),
|
|
|
|
withLabel(label.TraefikBackend, "foobar"),
|
|
|
|
withLabel(label.TraefikBackendCircuitBreakerExpression, "NetworkErrorRatio() > 0.5"),
|
|
withLabel(label.TraefikBackendHealthCheckPath, "/health"),
|
|
withLabel(label.TraefikBackendHealthCheckPort, "880"),
|
|
withLabel(label.TraefikBackendHealthCheckInterval, "6"),
|
|
withLabel(label.TraefikBackendLoadBalancerMethod, "drr"),
|
|
withLabel(label.TraefikBackendLoadBalancerStickiness, "true"),
|
|
withLabel(label.TraefikBackendLoadBalancerStickinessCookieName, "chocolate"),
|
|
withLabel(label.TraefikBackendMaxConnAmount, "666"),
|
|
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
|
withLabel(label.TraefikBackendBufferingMaxResponseBodyBytes, "10485760"),
|
|
withLabel(label.TraefikBackendBufferingMemResponseBodyBytes, "2097152"),
|
|
withLabel(label.TraefikBackendBufferingMaxRequestBodyBytes, "10485760"),
|
|
withLabel(label.TraefikBackendBufferingMemRequestBodyBytes, "2097152"),
|
|
withLabel(label.TraefikBackendBufferingRetryExpression, "IsNetworkError() && Attempts() <= 2"),
|
|
|
|
withLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0"),
|
|
withLabel(label.TraefikFrontendEntryPoints, "http,https"),
|
|
withLabel(label.TraefikFrontendPassHostHeader, "true"),
|
|
withLabel(label.TraefikFrontendPassTLSCert, "true"),
|
|
withLabel(label.TraefikFrontendPriority, "666"),
|
|
withLabel(label.TraefikFrontendRedirectEntryPoint, "https"),
|
|
withLabel(label.TraefikFrontendRedirectRegex, "nope"),
|
|
withLabel(label.TraefikFrontendRedirectReplacement, "nope"),
|
|
withLabel(label.TraefikFrontendRedirectPermanent, "true"),
|
|
withLabel(label.TraefikFrontendRule, "Host:traefik.io"),
|
|
withLabel(label.TraefikFrontendWhiteListSourceRange, "10.10.10.10"),
|
|
withLabel(label.TraefikFrontendWhiteListUseXForwardedFor, "true"),
|
|
|
|
withLabel(label.TraefikFrontendRequestHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"),
|
|
withLabel(label.TraefikFrontendResponseHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"),
|
|
withLabel(label.TraefikFrontendSSLProxyHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type:application/json; charset=utf-8"),
|
|
withLabel(label.TraefikFrontendAllowedHosts, "foo,bar,bor"),
|
|
withLabel(label.TraefikFrontendHostsProxyHeaders, "foo,bar,bor"),
|
|
withLabel(label.TraefikFrontendSSLHost, "foo"),
|
|
withLabel(label.TraefikFrontendCustomFrameOptionsValue, "foo"),
|
|
withLabel(label.TraefikFrontendContentSecurityPolicy, "foo"),
|
|
withLabel(label.TraefikFrontendPublicKey, "foo"),
|
|
withLabel(label.TraefikFrontendReferrerPolicy, "foo"),
|
|
withLabel(label.TraefikFrontendCustomBrowserXSSValue, "foo"),
|
|
withLabel(label.TraefikFrontendSTSSeconds, "666"),
|
|
withLabel(label.TraefikFrontendSSLRedirect, "true"),
|
|
withLabel(label.TraefikFrontendSSLTemporaryRedirect, "true"),
|
|
withLabel(label.TraefikFrontendSTSIncludeSubdomains, "true"),
|
|
withLabel(label.TraefikFrontendSTSPreload, "true"),
|
|
withLabel(label.TraefikFrontendForceSTSHeader, "true"),
|
|
withLabel(label.TraefikFrontendFrameDeny, "true"),
|
|
withLabel(label.TraefikFrontendContentTypeNosniff, "true"),
|
|
withLabel(label.TraefikFrontendBrowserXSSFilter, "true"),
|
|
withLabel(label.TraefikFrontendIsDevelopment, "true"),
|
|
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageStatus, "404"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageBackend, "foobar"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageQuery, "foo_query"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageStatus, "500,600"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageBackend, "foobar"),
|
|
withLabel(label.Prefix+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageQuery, "bar_query"),
|
|
|
|
withLabel(label.TraefikFrontendRateLimitExtractorFunc, "client.ip"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitPeriod, "6"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitAverage, "12"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitBurst, "18"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"),
|
|
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"),
|
|
withIP("10.10.10.10"),
|
|
withInfo("name1", withPorts(
|
|
withPortTCP(80, "n"),
|
|
withPortTCP(666, "n"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
},
|
|
expectedFrontends: map[string]*types.Frontend{
|
|
"frontend-ID1": {
|
|
EntryPoints: []string{
|
|
"http",
|
|
"https",
|
|
},
|
|
Backend: "backend-foobar",
|
|
Routes: map[string]types.Route{
|
|
"route-host-ID1": {
|
|
Rule: "Host:traefik.io",
|
|
},
|
|
},
|
|
PassHostHeader: true,
|
|
PassTLSCert: true,
|
|
Priority: 666,
|
|
BasicAuth: []string{
|
|
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
|
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
|
},
|
|
WhiteList: &types.WhiteList{
|
|
SourceRange: []string{"10.10.10.10"},
|
|
UseXForwardedFor: true,
|
|
},
|
|
Headers: &types.Headers{
|
|
CustomRequestHeaders: map[string]string{
|
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
|
"Content-Type": "application/json; charset=utf-8",
|
|
},
|
|
CustomResponseHeaders: map[string]string{
|
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
|
"Content-Type": "application/json; charset=utf-8",
|
|
},
|
|
AllowedHosts: []string{
|
|
"foo",
|
|
"bar",
|
|
"bor",
|
|
},
|
|
HostsProxyHeaders: []string{
|
|
"foo",
|
|
"bar",
|
|
"bor",
|
|
},
|
|
SSLRedirect: true,
|
|
SSLTemporaryRedirect: true,
|
|
SSLHost: "foo",
|
|
SSLProxyHeaders: map[string]string{
|
|
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
|
"Content-Type": "application/json; charset=utf-8",
|
|
},
|
|
STSSeconds: 666,
|
|
STSIncludeSubdomains: true,
|
|
STSPreload: true,
|
|
ForceSTSHeader: true,
|
|
FrameDeny: true,
|
|
CustomFrameOptionsValue: "foo",
|
|
ContentTypeNosniff: true,
|
|
BrowserXSSFilter: true,
|
|
CustomBrowserXSSValue: "foo",
|
|
ContentSecurityPolicy: "foo",
|
|
PublicKey: "foo",
|
|
ReferrerPolicy: "foo",
|
|
IsDevelopment: true,
|
|
},
|
|
Errors: map[string]*types.ErrorPage{
|
|
"foo": {
|
|
Status: []string{"404"},
|
|
Query: "foo_query",
|
|
Backend: "backend-foobar",
|
|
},
|
|
"bar": {
|
|
Status: []string{"500", "600"},
|
|
Query: "bar_query",
|
|
Backend: "backend-foobar",
|
|
},
|
|
},
|
|
RateLimit: &types.RateLimit{
|
|
ExtractorFunc: "client.ip",
|
|
RateSet: map[string]*types.Rate{
|
|
"foo": {
|
|
Period: flaeg.Duration(6 * time.Second),
|
|
Average: 12,
|
|
Burst: 18,
|
|
},
|
|
"bar": {
|
|
Period: flaeg.Duration(3 * time.Second),
|
|
Average: 6,
|
|
Burst: 9,
|
|
},
|
|
},
|
|
},
|
|
Redirect: &types.Redirect{
|
|
EntryPoint: "https",
|
|
Regex: "",
|
|
Replacement: "",
|
|
Permanent: true,
|
|
},
|
|
},
|
|
},
|
|
expectedBackends: map[string]*types.Backend{
|
|
"backend-foobar": {
|
|
Servers: map[string]types.Server{
|
|
"server-ID1": {
|
|
URL: "https://10.10.10.10:666",
|
|
Weight: 12,
|
|
},
|
|
},
|
|
CircuitBreaker: &types.CircuitBreaker{
|
|
Expression: "NetworkErrorRatio() > 0.5",
|
|
},
|
|
LoadBalancer: &types.LoadBalancer{
|
|
Method: "drr",
|
|
Stickiness: &types.Stickiness{
|
|
CookieName: "chocolate",
|
|
},
|
|
},
|
|
MaxConn: &types.MaxConn{
|
|
Amount: 666,
|
|
ExtractorFunc: "client.ip",
|
|
},
|
|
HealthCheck: &types.HealthCheck{
|
|
Path: "/health",
|
|
Port: 880,
|
|
Interval: "6",
|
|
},
|
|
Buffering: &types.Buffering{
|
|
MaxResponseBodyBytes: 10485760,
|
|
MemResponseBodyBytes: 2097152,
|
|
MaxRequestBodyBytes: 10485760,
|
|
MemRequestBodyBytes: 2097152,
|
|
RetryExpression: "IsNetworkError() && Attempts() <= 2",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actualConfig := p.buildConfigurationV2(test.tasks)
|
|
|
|
require.NotNil(t, actualConfig)
|
|
assert.Equal(t, test.expectedBackends, actualConfig.Backends)
|
|
assert.Equal(t, test.expectedFrontends, actualConfig.Frontends)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTaskFilter(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
mesosTask taskData
|
|
exposedByDefault bool
|
|
expected bool
|
|
}{
|
|
{
|
|
desc: "no task",
|
|
mesosTask: taskData{},
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "task not healthy",
|
|
mesosTask: aTaskData("test", withStatus(withState("TASK_RUNNING"))),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "exposedByDefault false and traefik.enable false",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "false"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: false,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "traefik.enable = true",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: false,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "exposedByDefault true and traefik.enable true",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "exposedByDefault true and traefik.enable false",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "false"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "traefik.portIndex and traefik.port both set",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPortIndex, "1"),
|
|
withLabel(label.TraefikEnable, "80"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "valid traefik.portIndex",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPortIndex, "1"),
|
|
withInfo("test", withPorts(
|
|
withPortTCP(80, "WEB"),
|
|
withPortTCP(443, "WEB HTTPS"),
|
|
)),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "default to first port index",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withInfo("test", withPorts(
|
|
withPortTCP(80, "WEB"),
|
|
withPortTCP(443, "WEB HTTPS"),
|
|
)),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "traefik.portIndex and discoveryPorts don't correspond",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPortIndex, "1"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "traefik.portIndex and discoveryPorts correspond",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPortIndex, "0"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "traefik.port is not an integer",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPort, "TRAEFIK"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "traefik.port is not the same as discovery.port",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPort, "443"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
{
|
|
desc: "traefik.port is the same as discovery.port",
|
|
mesosTask: aTaskData("test",
|
|
withDefaultStatus(),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPort, "80"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "healthy nil",
|
|
mesosTask: aTaskData("test",
|
|
withStatus(
|
|
withState("TASK_RUNNING"),
|
|
),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPort, "80"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: true,
|
|
},
|
|
{
|
|
desc: "healthy false",
|
|
mesosTask: aTaskData("test",
|
|
withStatus(
|
|
withState("TASK_RUNNING"),
|
|
withHealthy(false),
|
|
),
|
|
withLabel(label.TraefikEnable, "true"),
|
|
withLabel(label.TraefikPort, "80"),
|
|
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
|
),
|
|
exposedByDefault: true,
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actual := taskFilter(test.mesosTask, test.exposedByDefault)
|
|
ok := assert.Equal(t, test.expected, actual)
|
|
if !ok {
|
|
t.Logf("Statuses : %v", test.mesosTask.Statuses)
|
|
t.Logf("Label : %v", test.mesosTask.Labels)
|
|
t.Logf("DiscoveryInfo : %v", test.mesosTask.DiscoveryInfo)
|
|
t.Fatalf("Expected %v, got %v", test.expected, actual)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetSubDomain(t *testing.T) {
|
|
providerGroups := &Provider{GroupsAsSubDomains: true}
|
|
providerNoGroups := &Provider{GroupsAsSubDomains: false}
|
|
|
|
testCases := []struct {
|
|
path string
|
|
expected string
|
|
provider *Provider
|
|
}{
|
|
{"/test", "test", providerNoGroups},
|
|
{"/test", "test", providerGroups},
|
|
{"/a/b/c/d", "d.c.b.a", providerGroups},
|
|
{"/b/a/d/c", "c.d.a.b", providerGroups},
|
|
{"/d/c/b/a", "a.b.c.d", providerGroups},
|
|
{"/c/d/a/b", "b.a.d.c", providerGroups},
|
|
{"/a/b/c/d", "a-b-c-d", providerNoGroups},
|
|
{"/b/a/d/c", "b-a-d-c", providerNoGroups},
|
|
{"/d/c/b/a", "d-c-b-a", providerNoGroups},
|
|
{"/c/d/a/b", "c-d-a-b", providerNoGroups},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.path, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actual := test.provider.getSubDomain(test.path)
|
|
|
|
assert.Equal(t, test.expected, actual)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetServers(t *testing.T) {
|
|
testCases := []struct {
|
|
desc string
|
|
tasks []taskData
|
|
expected map[string]types.Server
|
|
}{
|
|
{
|
|
desc: "",
|
|
tasks: []taskData{
|
|
// App 1
|
|
aTaskData("ID1",
|
|
withIP("10.10.10.10"),
|
|
withInfo("name1",
|
|
withPorts(withPort("TCP", 80, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
aTaskData("ID2",
|
|
withIP("10.10.10.11"),
|
|
withLabel(label.TraefikWeight, "18"),
|
|
withInfo("name1",
|
|
withPorts(withPort("TCP", 81, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
// App 2
|
|
aTaskData("ID3",
|
|
withLabel(label.TraefikWeight, "12"),
|
|
withIP("20.10.10.10"),
|
|
withInfo("name2",
|
|
withPorts(withPort("TCP", 80, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
aTaskData("ID4",
|
|
withLabel(label.TraefikWeight, "6"),
|
|
withIP("20.10.10.11"),
|
|
withInfo("name2",
|
|
withPorts(withPort("TCP", 81, "WEB"))),
|
|
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
|
),
|
|
},
|
|
expected: map[string]types.Server{
|
|
"server-ID1": {
|
|
URL: "http://10.10.10.10:80",
|
|
Weight: label.DefaultWeight,
|
|
},
|
|
"server-ID2": {
|
|
URL: "http://10.10.10.11:81",
|
|
Weight: 18,
|
|
},
|
|
"server-ID3": {
|
|
URL: "http://20.10.10.10:80",
|
|
Weight: 12,
|
|
},
|
|
"server-ID4": {
|
|
URL: "http://20.10.10.11:81",
|
|
Weight: 6,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
p := &Provider{
|
|
Domain: "docker.localhost",
|
|
ExposedByDefault: true,
|
|
IPSources: "host",
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
actual := p.getServers(test.tasks)
|
|
|
|
assert.Equal(t, test.expected, actual)
|
|
})
|
|
}
|
|
}
|