Segments Labels: Mesos
This commit is contained in:
parent
a5beeb4f04
commit
599b699ac9
6 changed files with 883 additions and 70 deletions
|
@ -355,6 +355,341 @@ func TestBuildConfiguration(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestBuildConfigurationSegments(t *testing.T) {
|
||||
p := &Provider{
|
||||
Domain: "mesos.localhost",
|
||||
ExposedByDefault: true,
|
||||
IPSources: "host",
|
||||
}
|
||||
|
||||
testCases := []struct {
|
||||
desc string
|
||||
tasks []state.Task
|
||||
expectedFrontends map[string]*types.Frontend
|
||||
expectedBackends map[string]*types.Backend
|
||||
}{
|
||||
{
|
||||
desc: "multiple ports with segments",
|
||||
tasks: []state.Task{
|
||||
aTask("app-taskID",
|
||||
withIP("127.0.0.1"),
|
||||
withInfo("/app",
|
||||
withPorts(
|
||||
withPort("TCP", 80, "web"),
|
||||
withPort("TCP", 81, "admin"),
|
||||
),
|
||||
),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
withLabel(label.TraefikBackendMaxConnAmount, "1000"),
|
||||
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
||||
withSegmentLabel(label.TraefikPort, "80", "web"),
|
||||
withSegmentLabel(label.TraefikPort, "81", "admin"),
|
||||
withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the segmentPropertiesRegexp regex.
|
||||
withSegmentLabel(label.TraefikFrontendRule, "Host:web.app.mesos.localhost", "web"),
|
||||
withSegmentLabel(label.TraefikFrontendRule, "Host:admin.app.mesos.localhost", "admin"),
|
||||
),
|
||||
},
|
||||
expectedFrontends: map[string]*types.Frontend{
|
||||
"frontend-app-taskID-service-web": {
|
||||
Backend: "backend-app-service-web",
|
||||
Routes: map[string]types.Route{
|
||||
`route-host-app-taskID-service-web`: {
|
||||
Rule: "Host:web.app.mesos.localhost",
|
||||
},
|
||||
},
|
||||
PassHostHeader: true,
|
||||
BasicAuth: []string{},
|
||||
EntryPoints: []string{},
|
||||
},
|
||||
"frontend-app-taskID-service-admin": {
|
||||
Backend: "backend-app-service-admin",
|
||||
Routes: map[string]types.Route{
|
||||
`route-host-app-taskID-service-admin`: {
|
||||
Rule: "Host:admin.app.mesos.localhost",
|
||||
},
|
||||
},
|
||||
PassHostHeader: true,
|
||||
BasicAuth: []string{},
|
||||
EntryPoints: []string{},
|
||||
},
|
||||
},
|
||||
expectedBackends: map[string]*types.Backend{
|
||||
"backend-app-service-web": {
|
||||
Servers: map[string]types.Server{
|
||||
"server-app-taskID-service-web": {
|
||||
URL: "http://127.0.0.1:80",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
},
|
||||
MaxConn: &types.MaxConn{
|
||||
Amount: 1000,
|
||||
ExtractorFunc: "client.ip",
|
||||
},
|
||||
},
|
||||
"backend-app-service-admin": {
|
||||
Servers: map[string]types.Server{
|
||||
"server-app-taskID-service-admin": {
|
||||
URL: "http://127.0.0.1:81",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
},
|
||||
MaxConn: &types.MaxConn{
|
||||
Amount: 1000,
|
||||
ExtractorFunc: "client.ip",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "when all labels are set",
|
||||
tasks: []state.Task{
|
||||
aTask("app-taskID",
|
||||
withIP("127.0.0.1"),
|
||||
withInfo("/app",
|
||||
withPorts(
|
||||
withPort("TCP", 80, "web"),
|
||||
withPort("TCP", 81, "admin"),
|
||||
),
|
||||
),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
|
||||
withLabel(label.TraefikBackendCircuitBreakerExpression, "NetworkErrorRatio() > 0.5"),
|
||||
withLabel(label.TraefikBackendHealthCheckScheme, "http"),
|
||||
withLabel(label.TraefikBackendHealthCheckPath, "/health"),
|
||||
withLabel(label.TraefikBackendHealthCheckPort, "880"),
|
||||
withLabel(label.TraefikBackendHealthCheckInterval, "6"),
|
||||
withLabel(label.TraefikBackendHealthCheckHostname, "foo.com"),
|
||||
withLabel(label.TraefikBackendHealthCheckHeaders, "Foo:bar || Bar:foo"),
|
||||
withLabel(label.TraefikBackendLoadBalancerMethod, "drr"),
|
||||
withLabel(label.TraefikBackendLoadBalancerSticky, "true"),
|
||||
withLabel(label.TraefikBackendLoadBalancerStickiness, "true"),
|
||||
withLabel(label.TraefikBackendLoadBalancerStickinessCookieName, "chocolate"),
|
||||
withLabel(label.TraefikBackendMaxConnAmount, "666"),
|
||||
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
|
||||
withLabel(label.TraefikBackendBufferingMaxResponseBodyBytes, "10485760"),
|
||||
withLabel(label.TraefikBackendBufferingMemResponseBodyBytes, "2097152"),
|
||||
withLabel(label.TraefikBackendBufferingMaxRequestBodyBytes, "10485760"),
|
||||
withLabel(label.TraefikBackendBufferingMemRequestBodyBytes, "2097152"),
|
||||
withLabel(label.TraefikBackendBufferingRetryExpression, "IsNetworkError() && Attempts() <= 2"),
|
||||
|
||||
withSegmentLabel(label.TraefikPort, "80", "containous"),
|
||||
withSegmentLabel(label.TraefikPortName, "web", "containous"),
|
||||
withSegmentLabel(label.TraefikProtocol, "https", "containous"),
|
||||
withSegmentLabel(label.TraefikWeight, "12", "containous"),
|
||||
|
||||
withSegmentLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendEntryPoints, "http,https", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendPassHostHeader, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendPassTLSCert, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendPriority, "666", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendRedirectEntryPoint, "https", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendRedirectRegex, "nope", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendRedirectReplacement, "nope", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendRedirectPermanent, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendRule, "Host:traefik.io", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendWhiteListSourceRange, "10.10.10.10", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendWhiteListUseXForwardedFor, "true", "containous"),
|
||||
|
||||
withSegmentLabel(label.TraefikFrontendRequestHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendResponseHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSSLProxyHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendAllowedHosts, "foo,bar,bor", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendHostsProxyHeaders, "foo,bar,bor", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSSLForceHost, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSSLHost, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendCustomFrameOptionsValue, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendContentSecurityPolicy, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendPublicKey, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendReferrerPolicy, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendCustomBrowserXSSValue, "foo", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSTSSeconds, "666", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSSLRedirect, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSSLTemporaryRedirect, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSTSIncludeSubdomains, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendSTSPreload, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendForceSTSHeader, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendFrameDeny, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendContentTypeNosniff, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendBrowserXSSFilter, "true", "containous"),
|
||||
withSegmentLabel(label.TraefikFrontendIsDevelopment, "true", "containous"),
|
||||
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageStatus, "404"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageBackend, "foobar"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageQuery, "foo_query"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageStatus, "500,600"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageBackend, "foobar"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageQuery, "bar_query"),
|
||||
|
||||
withSegmentLabel(label.TraefikFrontendRateLimitExtractorFunc, "client.ip", "containous"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitPeriod, "6"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitAverage, "12"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitBurst, "18"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"),
|
||||
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"),
|
||||
),
|
||||
},
|
||||
expectedFrontends: map[string]*types.Frontend{
|
||||
"frontend-app-taskID-service-containous": {
|
||||
EntryPoints: []string{
|
||||
"http",
|
||||
"https",
|
||||
},
|
||||
Backend: "backend-app-service-containous",
|
||||
Routes: map[string]types.Route{
|
||||
"route-host-app-taskID-service-containous": {
|
||||
Rule: "Host:traefik.io",
|
||||
},
|
||||
},
|
||||
PassHostHeader: true,
|
||||
PassTLSCert: true,
|
||||
Priority: 666,
|
||||
BasicAuth: []string{
|
||||
"test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/",
|
||||
"test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0",
|
||||
},
|
||||
WhiteList: &types.WhiteList{
|
||||
SourceRange: []string{"10.10.10.10"},
|
||||
UseXForwardedFor: true,
|
||||
},
|
||||
Headers: &types.Headers{
|
||||
CustomRequestHeaders: map[string]string{
|
||||
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||
"Content-Type": "application/json; charset=utf-8",
|
||||
},
|
||||
CustomResponseHeaders: map[string]string{
|
||||
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||
"Content-Type": "application/json; charset=utf-8",
|
||||
},
|
||||
AllowedHosts: []string{
|
||||
"foo",
|
||||
"bar",
|
||||
"bor",
|
||||
},
|
||||
HostsProxyHeaders: []string{
|
||||
"foo",
|
||||
"bar",
|
||||
"bor",
|
||||
},
|
||||
SSLRedirect: true,
|
||||
SSLTemporaryRedirect: true,
|
||||
SSLForceHost: true,
|
||||
SSLHost: "foo",
|
||||
SSLProxyHeaders: map[string]string{
|
||||
"Access-Control-Allow-Methods": "POST,GET,OPTIONS",
|
||||
"Content-Type": "application/json; charset=utf-8",
|
||||
},
|
||||
STSSeconds: 666,
|
||||
STSIncludeSubdomains: true,
|
||||
STSPreload: true,
|
||||
ForceSTSHeader: true,
|
||||
FrameDeny: true,
|
||||
CustomFrameOptionsValue: "foo",
|
||||
ContentTypeNosniff: true,
|
||||
BrowserXSSFilter: true,
|
||||
CustomBrowserXSSValue: "foo",
|
||||
ContentSecurityPolicy: "foo",
|
||||
PublicKey: "foo",
|
||||
ReferrerPolicy: "foo",
|
||||
IsDevelopment: true,
|
||||
},
|
||||
Errors: map[string]*types.ErrorPage{
|
||||
"bar": {
|
||||
Status: []string{
|
||||
"500",
|
||||
"600",
|
||||
},
|
||||
Backend: "backend-foobar",
|
||||
Query: "bar_query",
|
||||
},
|
||||
"foo": {
|
||||
Status: []string{
|
||||
"404",
|
||||
},
|
||||
Backend: "backend-foobar",
|
||||
Query: "foo_query",
|
||||
},
|
||||
},
|
||||
RateLimit: &types.RateLimit{
|
||||
RateSet: map[string]*types.Rate{
|
||||
"bar": {
|
||||
Period: flaeg.Duration(3 * time.Second),
|
||||
Average: 6,
|
||||
Burst: 9,
|
||||
},
|
||||
"foo": {
|
||||
Period: flaeg.Duration(6 * time.Second),
|
||||
Average: 12,
|
||||
Burst: 18,
|
||||
},
|
||||
},
|
||||
ExtractorFunc: "client.ip",
|
||||
},
|
||||
Redirect: &types.Redirect{
|
||||
EntryPoint: "https",
|
||||
Permanent: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
expectedBackends: map[string]*types.Backend{
|
||||
"backend-app-service-containous": {
|
||||
Servers: map[string]types.Server{
|
||||
"server-app-taskID-service-containous": {
|
||||
URL: "https://127.0.0.1:80",
|
||||
Weight: 12,
|
||||
},
|
||||
},
|
||||
CircuitBreaker: &types.CircuitBreaker{
|
||||
Expression: "NetworkErrorRatio() > 0.5",
|
||||
},
|
||||
LoadBalancer: &types.LoadBalancer{
|
||||
Method: "drr",
|
||||
Sticky: true,
|
||||
Stickiness: &types.Stickiness{
|
||||
CookieName: "chocolate",
|
||||
},
|
||||
},
|
||||
MaxConn: &types.MaxConn{
|
||||
Amount: 666,
|
||||
ExtractorFunc: "client.ip",
|
||||
},
|
||||
HealthCheck: &types.HealthCheck{
|
||||
Scheme: "http",
|
||||
Path: "/health",
|
||||
Port: 880,
|
||||
Interval: "6",
|
||||
Hostname: "foo.com",
|
||||
Headers: map[string]string{
|
||||
"Bar": "foo",
|
||||
"Foo": "bar",
|
||||
},
|
||||
},
|
||||
Buffering: &types.Buffering{
|
||||
MaxResponseBodyBytes: 10485760,
|
||||
MemResponseBodyBytes: 2097152,
|
||||
MaxRequestBodyBytes: 10485760,
|
||||
MemRequestBodyBytes: 2097152,
|
||||
RetryExpression: "IsNetworkError() && Attempts() <= 2",
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, test := range testCases {
|
||||
test := test
|
||||
t.Run(test.desc, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
actualConfig := p.buildConfigurationV2(test.tasks)
|
||||
|
||||
require.NotNil(t, actualConfig)
|
||||
assert.Equal(t, test.expectedBackends, actualConfig.Backends)
|
||||
assert.Equal(t, test.expectedFrontends, actualConfig.Frontends)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestTaskFilter(t *testing.T) {
|
||||
testCases := []struct {
|
||||
desc string
|
||||
|
@ -370,13 +705,13 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "task not healthy",
|
||||
mesosTask: aTaskData("test", withStatus(withState("TASK_RUNNING"))),
|
||||
mesosTask: aTaskData("test", "", withStatus(withState("TASK_RUNNING"))),
|
||||
exposedByDefault: true,
|
||||
expected: false,
|
||||
},
|
||||
{
|
||||
desc: "exposedByDefault false and traefik.enable false",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "false"),
|
||||
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
||||
|
@ -386,7 +721,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.enable = true",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
||||
|
@ -396,7 +731,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "exposedByDefault true and traefik.enable true",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
||||
|
@ -406,7 +741,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "exposedByDefault true and traefik.enable false",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "false"),
|
||||
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
||||
|
@ -416,11 +751,11 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.portIndex and traefik.port both set",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortIndex, "1"),
|
||||
withLabel(label.TraefikEnable, "80"),
|
||||
withLabel(label.TraefikPort, "80"),
|
||||
withInfo("test", withPorts(withPortTCP(80, "WEB"))),
|
||||
),
|
||||
exposedByDefault: true,
|
||||
|
@ -428,7 +763,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "valid traefik.portIndex",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortIndex, "1"),
|
||||
|
@ -440,9 +775,37 @@ func TestTaskFilter(t *testing.T) {
|
|||
exposedByDefault: true,
|
||||
expected: true,
|
||||
},
|
||||
{
|
||||
desc: "valid traefik.portName",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortName, "https"),
|
||||
withInfo("test", withPorts(
|
||||
withPortTCP(80, "http"),
|
||||
withPortTCP(443, "https"),
|
||||
)),
|
||||
),
|
||||
exposedByDefault: true,
|
||||
expected: true,
|
||||
},
|
||||
{
|
||||
desc: "missing traefik.portName",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortName, "foo"),
|
||||
withInfo("test", withPorts(
|
||||
withPortTCP(80, "http"),
|
||||
withPortTCP(443, "https"),
|
||||
)),
|
||||
),
|
||||
exposedByDefault: true,
|
||||
expected: false,
|
||||
},
|
||||
{
|
||||
desc: "default to first port index",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withInfo("test", withPorts(
|
||||
|
@ -455,7 +818,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.portIndex and discoveryPorts don't correspond",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortIndex, "1"),
|
||||
|
@ -466,7 +829,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.portIndex and discoveryPorts correspond",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPortIndex, "0"),
|
||||
|
@ -477,7 +840,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.port is not an integer",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPort, "TRAEFIK"),
|
||||
|
@ -488,7 +851,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.port is not the same as discovery.port",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPort, "443"),
|
||||
|
@ -499,7 +862,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "traefik.port is the same as discovery.port",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withDefaultStatus(),
|
||||
withLabel(label.TraefikEnable, "true"),
|
||||
withLabel(label.TraefikPort, "80"),
|
||||
|
@ -510,7 +873,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "healthy nil",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withStatus(
|
||||
withState("TASK_RUNNING"),
|
||||
),
|
||||
|
@ -523,7 +886,7 @@ func TestTaskFilter(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "healthy false",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withStatus(
|
||||
withState("TASK_RUNNING"),
|
||||
withHealthy(false),
|
||||
|
@ -554,6 +917,172 @@ func TestTaskFilter(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestGetServerPort(t *testing.T) {
|
||||
testCases := []struct {
|
||||
desc string
|
||||
task taskData
|
||||
expected string
|
||||
}{
|
||||
{
|
||||
desc: "port missing",
|
||||
task: aTaskData("", ""),
|
||||
expected: "",
|
||||
},
|
||||
{
|
||||
desc: "numeric port",
|
||||
task: aTaskData("", "", withLabel(label.TraefikPort, "80")),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "string port",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPort, "foobar"),
|
||||
withInfo("", withPorts(withPort("TCP", 80, ""))),
|
||||
),
|
||||
expected: "",
|
||||
},
|
||||
{
|
||||
desc: "negative port",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPort, "-1"),
|
||||
withInfo("", withPorts(withPort("TCP", 80, ""))),
|
||||
),
|
||||
expected: "",
|
||||
},
|
||||
{
|
||||
desc: "task port available",
|
||||
task: aTaskData("", "",
|
||||
withInfo("", withPorts(withPort("TCP", 80, ""))),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports available",
|
||||
task: aTaskData("", "",
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "numeric port index specified",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPortIndex, "1"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "443",
|
||||
},
|
||||
{
|
||||
desc: "string port name specified",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPortName, "https"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, "http"),
|
||||
withPort("TCP", 443, "https"),
|
||||
)),
|
||||
),
|
||||
expected: "443",
|
||||
},
|
||||
{
|
||||
desc: "string port index specified",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPortIndex, "foobar"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
)),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "port and port index specified",
|
||||
task: aTaskData("", "",
|
||||
withLabel(label.TraefikPort, "80"),
|
||||
withLabel(label.TraefikPortIndex, "1"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports with service index available",
|
||||
task: aTaskData("", "http",
|
||||
withSegmentLabel(label.TraefikPortIndex, "0", "http"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports with service port available",
|
||||
task: aTaskData("", "https",
|
||||
withSegmentLabel(label.TraefikPort, "443", "https"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "443",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports with service port name available",
|
||||
task: aTaskData("", "https",
|
||||
withSegmentLabel(label.TraefikPortName, "b", "https"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, "a"),
|
||||
withPort("TCP", 443, "b"),
|
||||
)),
|
||||
),
|
||||
expected: "443",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports with segment matching port name",
|
||||
task: aTaskData("", "b",
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, "a"),
|
||||
withPort("TCP", 443, "b"),
|
||||
)),
|
||||
),
|
||||
expected: "443",
|
||||
},
|
||||
{
|
||||
desc: "multiple task ports with services but default port available",
|
||||
task: aTaskData("", "http",
|
||||
withSegmentLabel(label.TraefikWeight, "100", "http"),
|
||||
withInfo("", withPorts(
|
||||
withPort("TCP", 80, ""),
|
||||
withPort("TCP", 443, ""),
|
||||
)),
|
||||
),
|
||||
expected: "80",
|
||||
},
|
||||
}
|
||||
|
||||
p := &Provider{
|
||||
ExposedByDefault: true,
|
||||
IPSources: "host",
|
||||
}
|
||||
|
||||
for _, test := range testCases {
|
||||
test := test
|
||||
t.Run(test.desc, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
actual := p.getServerPort(test.task)
|
||||
|
||||
assert.Equal(t, test.expected, actual)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestGetSubDomain(t *testing.T) {
|
||||
providerGroups := &Provider{GroupsAsSubDomains: true}
|
||||
providerNoGroups := &Provider{GroupsAsSubDomains: false}
|
||||
|
@ -597,13 +1126,13 @@ func TestGetServers(t *testing.T) {
|
|||
desc: "",
|
||||
tasks: []taskData{
|
||||
// App 1
|
||||
aTaskData("ID1",
|
||||
aTaskData("ID1", "",
|
||||
withIP("10.10.10.10"),
|
||||
withInfo("name1",
|
||||
withPorts(withPort("TCP", 80, "WEB"))),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
),
|
||||
aTaskData("ID2",
|
||||
aTaskData("ID2", "",
|
||||
withIP("10.10.10.11"),
|
||||
withLabel(label.TraefikWeight, "18"),
|
||||
withInfo("name1",
|
||||
|
@ -611,14 +1140,14 @@ func TestGetServers(t *testing.T) {
|
|||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
),
|
||||
// App 2
|
||||
aTaskData("ID3",
|
||||
aTaskData("ID3", "",
|
||||
withLabel(label.TraefikWeight, "12"),
|
||||
withIP("20.10.10.10"),
|
||||
withInfo("name2",
|
||||
withPorts(withPort("TCP", 80, "WEB"))),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
),
|
||||
aTaskData("ID4",
|
||||
aTaskData("ID4", "",
|
||||
withLabel(label.TraefikWeight, "6"),
|
||||
withIP("20.10.10.11"),
|
||||
withInfo("name2",
|
||||
|
@ -645,6 +1174,68 @@ func TestGetServers(t *testing.T) {
|
|||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "with segments matching port names",
|
||||
tasks: segmentedTaskData([]string{"WEB1", "WEB2", "WEB3"},
|
||||
aTask("ID1",
|
||||
withIP("10.10.10.10"),
|
||||
withInfo("name1",
|
||||
withPorts(
|
||||
withPort("TCP", 81, "WEB1"),
|
||||
withPort("TCP", 82, "WEB2"),
|
||||
withPort("TCP", 83, "WEB3"),
|
||||
)),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
),
|
||||
),
|
||||
expected: map[string]types.Server{
|
||||
"server-ID1-service-WEB1": {
|
||||
URL: "http://10.10.10.10:81",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
"server-ID1-service-WEB2": {
|
||||
URL: "http://10.10.10.10:82",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
"server-ID1-service-WEB3": {
|
||||
URL: "http://10.10.10.10:83",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "with segments and portname labels",
|
||||
tasks: segmentedTaskData([]string{"a", "b", "c"},
|
||||
aTask("ID1",
|
||||
withIP("10.10.10.10"),
|
||||
withInfo("name1",
|
||||
withPorts(
|
||||
withPort("TCP", 81, "WEB1"),
|
||||
withPort("TCP", 82, "WEB2"),
|
||||
withPort("TCP", 83, "WEB3"),
|
||||
)),
|
||||
withSegmentLabel(label.TraefikPortName, "WEB2", "a"),
|
||||
withSegmentLabel(label.TraefikPortName, "WEB3", "b"),
|
||||
withSegmentLabel(label.TraefikPortName, "WEB1", "c"),
|
||||
withStatus(withHealthy(true), withState("TASK_RUNNING")),
|
||||
),
|
||||
),
|
||||
|
||||
expected: map[string]types.Server{
|
||||
"server-ID1-service-a": {
|
||||
URL: "http://10.10.10.10:82",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
"server-ID1-service-b": {
|
||||
URL: "http://10.10.10.10:83",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
"server-ID1-service-c": {
|
||||
URL: "http://10.10.10.10:81",
|
||||
Weight: label.DefaultWeight,
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
p := &Provider{
|
||||
|
@ -665,6 +1256,49 @@ func TestGetServers(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestGetBackendName(t *testing.T) {
|
||||
testCases := []struct {
|
||||
desc string
|
||||
mesosTask taskData
|
||||
expected string
|
||||
}{
|
||||
{
|
||||
desc: "label missing",
|
||||
mesosTask: aTaskData("group-app-taskID", "",
|
||||
withInfo("/group/app"),
|
||||
),
|
||||
expected: "group-app",
|
||||
},
|
||||
{
|
||||
desc: "label existing",
|
||||
mesosTask: aTaskData("", "",
|
||||
withInfo(""),
|
||||
withLabel(label.TraefikBackend, "bar"),
|
||||
),
|
||||
expected: "bar",
|
||||
},
|
||||
{
|
||||
desc: "segment label existing",
|
||||
mesosTask: aTaskData("", "app",
|
||||
withInfo(""),
|
||||
withSegmentLabel(label.TraefikBackend, "bar", "app"),
|
||||
),
|
||||
expected: "bar",
|
||||
},
|
||||
}
|
||||
|
||||
for _, test := range testCases {
|
||||
test := test
|
||||
t.Run(test.desc, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
actual := getBackendName(test.mesosTask)
|
||||
|
||||
assert.Equal(t, test.expected, actual)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestGetFrontendRule(t *testing.T) {
|
||||
p := Provider{
|
||||
Domain: "mesos.localhost",
|
||||
|
@ -677,22 +1311,30 @@ func TestGetFrontendRule(t *testing.T) {
|
|||
}{
|
||||
{
|
||||
desc: "label missing",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withInfo("foo"),
|
||||
),
|
||||
expected: "Host:foo.mesos.localhost",
|
||||
},
|
||||
{
|
||||
desc: "label domain",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withInfo("foo"),
|
||||
withLabel(label.TraefikDomain, "traefik.localhost"),
|
||||
),
|
||||
expected: "Host:foo.traefik.localhost",
|
||||
},
|
||||
{
|
||||
desc: "with segment",
|
||||
mesosTask: aTaskData("test", "bar",
|
||||
withInfo("foo"),
|
||||
withLabel(label.TraefikDomain, "traefik.localhost"),
|
||||
),
|
||||
expected: "Host:bar.foo.traefik.localhost",
|
||||
},
|
||||
{
|
||||
desc: "frontend rule available",
|
||||
mesosTask: aTaskData("test",
|
||||
mesosTask: aTaskData("test", "",
|
||||
withInfo("foo"),
|
||||
withLabel(label.TraefikFrontendRule, "Host:foo.bar"),
|
||||
),
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue