2017-09-25 18:40:42 +00:00
package config
import (
"bytes"
"crypto/tls"
"encoding/base64"
2017-09-27 18:47:40 +00:00
"encoding/json"
2017-09-25 18:40:42 +00:00
"errors"
"flag"
"fmt"
"io/ioutil"
"net"
"os"
"path/filepath"
"reflect"
"strconv"
"strings"
"testing"
"time"
"github.com/hashicorp/consul/agent/structs"
"github.com/hashicorp/consul/testutil"
"github.com/hashicorp/consul/types"
"github.com/pascaldekloe/goe/verify"
2017-09-27 18:47:40 +00:00
"github.com/sergi/go-diff/diffmatchpatch"
2017-09-25 18:40:42 +00:00
)
type configTest struct {
desc string
2017-10-20 09:46:16 +00:00
args [ ] string
2017-09-25 18:40:42 +00:00
pre , post func ( )
json , jsontail [ ] string
hcl , hcltail [ ] string
privatev4 func ( ) ( [ ] * net . IPAddr , error )
publicv6 func ( ) ( [ ] * net . IPAddr , error )
patch func ( rt * RuntimeConfig )
err string
warns [ ] string
hostname func ( ) ( string , error )
}
// TestConfigFlagsAndEdgecases tests the command line flags and
// edgecases for the config parsing. It provides a test structure which
// checks for warnings on deprecated fields and flags. These tests
// should check one option at a time if possible and should use generic
// values, e.g. 'a' or 1 instead of 'servicex' or 3306.
func TestConfigFlagsAndEdgecases ( t * testing . T ) {
dataDir := testutil . TempDir ( t , "consul" )
defer os . RemoveAll ( dataDir )
tests := [ ] configTest {
// ------------------------------------------------------------
// cmd line flags
//
{
desc : "-advertise" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -advertise=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
} ,
{
desc : "-advertise-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -advertise-wan=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "10.0.0.1" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
} ,
{
desc : "-advertise and -advertise-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -advertise=1.2.3.4 ` ,
` -advertise-wan=5.6.7.8 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "5.6.7.8" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "5.6.7.8:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "5.6.7.8" ,
}
rt . DataDir = dataDir
} ,
} ,
{
desc : "-bind" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -bind=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . BindAddr = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:8300" )
rt . RPCBindAddr = tcpAddr ( "1.2.3.4:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . SerfBindAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
} ,
{
desc : "-bootstrap" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -bootstrap ` ,
` -server ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Bootstrap = true
rt . ServerMode = true
rt . LeaveOnTerm = false
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
warns : [ ] string { "bootstrap = true: do not enable unless necessary" } ,
} ,
{
desc : "-bootstrap-expect" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -bootstrap-expect=3 ` ,
` -server ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . BootstrapExpect = 3
rt . ServerMode = true
rt . LeaveOnTerm = false
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
warns : [ ] string { "bootstrap_expect > 0: expecting 3 servers" } ,
} ,
{
desc : "-client" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -client=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "1.2.3.4" ) }
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "1.2.3.4:8600" ) , udpAddr ( "1.2.3.4:8600" ) }
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "1.2.3.4:8500" ) }
rt . DataDir = dataDir
} ,
} ,
2017-10-31 22:30:01 +00:00
{
desc : "-config-dir" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-dir ` , filepath . Join ( dataDir , "conf.d" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf.d/conf.json" ) , [ ] byte ( ` { "datacenter":"a"} ` ) )
} ,
} ,
{
desc : "-config-file json" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-file ` , filepath . Join ( dataDir , "conf.json" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf.json" ) , [ ] byte ( ` { "datacenter":"a"} ` ) )
} ,
} ,
{
desc : "-config-file hcl and json" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-file ` , filepath . Join ( dataDir , "conf.hcl" ) ,
` -config-file ` , filepath . Join ( dataDir , "conf.json" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "b"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf.hcl" ) , [ ] byte ( ` datacenter = "a" ` ) )
writeFile ( filepath . Join ( dataDir , "conf.json" ) , [ ] byte ( ` { "datacenter":"b"} ` ) )
} ,
} ,
2017-09-25 18:40:42 +00:00
{
desc : "-data-dir empty" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` ,
} ,
err : "data_dir cannot be empty" ,
} ,
{
desc : "-data-dir non-directory" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir=runtime_test.go ` ,
} ,
err : ` data_dir "runtime_test.go" is not a directory ` ,
} ,
{
desc : "-datacenter" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-datacenter empty" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter= ` ,
` -data-dir= ` + dataDir ,
} ,
err : "datacenter cannot be empty" ,
} ,
{
desc : "-dev" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -dev ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "127.0.0.1" )
rt . AdvertiseAddrWAN = ipAddr ( "127.0.0.1" )
rt . BindAddr = ipAddr ( "127.0.0.1" )
rt . DevMode = true
rt . DisableAnonymousSignature = true
rt . DisableKeyringFile = true
rt . EnableDebug = true
rt . EnableUI = true
rt . LeaveOnTerm = false
rt . LogLevel = "DEBUG"
rt . RPCAdvertiseAddr = tcpAddr ( "127.0.0.1:8300" )
rt . RPCBindAddr = tcpAddr ( "127.0.0.1:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "127.0.0.1:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "127.0.0.1:8302" )
rt . SerfBindAddrLAN = tcpAddr ( "127.0.0.1:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "127.0.0.1:8302" )
rt . ServerMode = true
rt . SkipLeaveOnInt = true
rt . TaggedAddresses = map [ string ] string { "lan" : "127.0.0.1" , "wan" : "127.0.0.1" }
rt . ConsulCoordinateUpdatePeriod = 100 * time . Millisecond
rt . ConsulRaftElectionTimeout = 52 * time . Millisecond
rt . ConsulRaftHeartbeatTimeout = 35 * time . Millisecond
rt . ConsulRaftLeaderLeaseTimeout = 20 * time . Millisecond
rt . ConsulSerfLANGossipInterval = 100 * time . Millisecond
rt . ConsulSerfLANProbeInterval = 100 * time . Millisecond
rt . ConsulSerfLANProbeTimeout = 100 * time . Millisecond
rt . ConsulSerfLANSuspicionMult = 3
rt . ConsulSerfWANGossipInterval = 100 * time . Millisecond
rt . ConsulSerfWANProbeInterval = 100 * time . Millisecond
rt . ConsulSerfWANProbeTimeout = 100 * time . Millisecond
rt . ConsulSerfWANSuspicionMult = 3
rt . ConsulServerHealthInterval = 10 * time . Millisecond
} ,
} ,
{
desc : "-disable-host-node-id" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -disable-host-node-id ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . DisableHostNodeID = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-disable-keyring-file" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -disable-keyring-file ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . DisableKeyringFile = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-dns-port" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -dns-port=123 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . DNSPort = 123
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "127.0.0.1:123" ) , udpAddr ( "127.0.0.1:123" ) }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-domain" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -domain=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . DNSDomain = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-enable-script-checks" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -enable-script-checks ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . EnableScriptChecks = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-encrypt" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -encrypt=i0P+gFTkLPg0h53eNYjydg== ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . EncryptKey = "i0P+gFTkLPg0h53eNYjydg=="
rt . DataDir = dataDir
} ,
} ,
2017-11-11 02:06:07 +00:00
{
desc : "-config-format disabled, skip unknown files" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-dir ` , filepath . Join ( dataDir , "conf" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf" , "valid.json" ) , [ ] byte ( ` { "datacenter":"a"} ` ) )
writeFile ( filepath . Join ( dataDir , "conf" , "invalid.skip" ) , [ ] byte ( ` NOPE ` ) )
} ,
} ,
2017-10-31 22:30:01 +00:00
{
desc : "-config-format=json" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-format=json ` ,
` -config-file ` , filepath . Join ( dataDir , "conf" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf" ) , [ ] byte ( ` { "datacenter":"a"} ` ) )
} ,
} ,
{
desc : "-config-format=hcl" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
` -config-format=hcl ` ,
` -config-file ` , filepath . Join ( dataDir , "conf" ) ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , "conf" ) , [ ] byte ( ` datacenter = "a" ` ) )
} ,
} ,
{
desc : "-config-format invalid" ,
args : [ ] string {
` -config-format=foobar ` ,
} ,
err : "-config-format must be either 'hcl' or 'json'" ,
} ,
2017-09-25 18:40:42 +00:00
{
desc : "-http-port" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -http-port=123 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . HTTPPort = 123
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "127.0.0.1:123" ) }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-join" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -join=a ` ,
` -join=b ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . StartJoinAddrsLAN = [ ] string { "a" , "b" }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-join-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -join-wan=a ` ,
` -join-wan=b ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . StartJoinAddrsWAN = [ ] string { "a" , "b" }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-log-level" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -log-level=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . LogLevel = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-node" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -node=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . NodeName = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-node-id" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -node-id=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . NodeID = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-node-meta" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -node-meta=a:b ` ,
` -node-meta=c:d ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . NodeMeta = map [ string ] string { "a" : "b" , "c" : "d" }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-non-voting-server" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -non-voting-server ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . NonVotingServer = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-pid-file" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -pid-file=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . PidFile = "a"
rt . DataDir = dataDir
} ,
} ,
{
desc : "-protocol" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -protocol=1 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RPCProtocol = 1
rt . DataDir = dataDir
} ,
} ,
{
desc : "-raft-protocol" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -raft-protocol=1 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RaftProtocol = 1
rt . DataDir = dataDir
} ,
} ,
{
desc : "-recursor" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-10-20 13:36:52 +00:00
` -recursor=1.2.3.4 ` ,
` -recursor=5.6.7.8 ` ,
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
2017-10-20 13:36:52 +00:00
rt . DNSRecursors = [ ] string { "1.2.3.4" , "5.6.7.8" }
2017-09-25 18:40:42 +00:00
rt . DataDir = dataDir
} ,
} ,
{
desc : "-rejoin" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -rejoin ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RejoinAfterLeave = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-interval" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-interval=5s ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinIntervalLAN = 5 * time . Second
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-interval-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-interval-wan=5s ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinIntervalWAN = 5 * time . Second
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-join" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-join=a ` ,
` -retry-join=b ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinLAN = [ ] string { "a" , "b" }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-join-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-join-wan=a ` ,
` -retry-join-wan=b ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinWAN = [ ] string { "a" , "b" }
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-max" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-max=1 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinMaxAttemptsLAN = 1
rt . DataDir = dataDir
} ,
} ,
{
desc : "-retry-max-wan" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -retry-max-wan=1 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . RetryJoinMaxAttemptsWAN = 1
rt . DataDir = dataDir
} ,
} ,
{
desc : "-serf-lan-bind" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -serf-lan-bind=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . SerfBindAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . DataDir = dataDir
} ,
} ,
{
desc : "-serf-wan-bind" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -serf-wan-bind=1.2.3.4 ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . SerfBindAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . DataDir = dataDir
} ,
} ,
{
desc : "-server" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -server ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . ServerMode = true
rt . LeaveOnTerm = false
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-syslog" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -syslog ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . EnableSyslog = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-ui" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -ui ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . EnableUI = true
rt . DataDir = dataDir
} ,
} ,
{
desc : "-ui-dir" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -ui-dir=a ` ,
` -data-dir= ` + dataDir ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . UIDir = "a"
rt . DataDir = dataDir
} ,
} ,
// ------------------------------------------------------------
// ports and addresses
//
{
2017-10-20 09:46:16 +00:00
desc : "bind addr any v4" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr":"0.0.0.0" } ` } ,
hcl : [ ] string { ` bind_addr = "0.0.0.0" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "10.0.0.1" )
rt . AdvertiseAddrWAN = ipAddr ( "10.0.0.1" )
rt . BindAddr = ipAddr ( "0.0.0.0" )
rt . RPCAdvertiseAddr = tcpAddr ( "10.0.0.1:8300" )
rt . RPCBindAddr = tcpAddr ( "0.0.0.0:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "10.0.0.1:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "10.0.0.1:8302" )
rt . SerfBindAddrLAN = tcpAddr ( "0.0.0.0:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "0.0.0.0:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "10.0.0.1" ,
"wan" : "10.0.0.1" ,
}
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "bind addr any v6" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr":"::" } ` } ,
hcl : [ ] string { ` bind_addr = "::" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "dead:beef::1" )
rt . AdvertiseAddrWAN = ipAddr ( "dead:beef::1" )
rt . BindAddr = ipAddr ( "::" )
rt . RPCAdvertiseAddr = tcpAddr ( "[dead:beef::1]:8300" )
rt . RPCBindAddr = tcpAddr ( "[::]:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "[dead:beef::1]:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "[dead:beef::1]:8302" )
rt . SerfBindAddrLAN = tcpAddr ( "[::]:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "[::]:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "dead:beef::1" ,
"wan" : "dead:beef::1" ,
}
rt . DataDir = dataDir
} ,
publicv6 : func ( ) ( [ ] * net . IPAddr , error ) {
return [ ] * net . IPAddr { ipAddr ( "dead:beef::1" ) } , nil
} ,
} ,
2017-09-27 19:59:47 +00:00
{
2017-10-20 09:46:16 +00:00
desc : "bind addr any and advertise set should not detect" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr":"0.0.0.0", "advertise_addr": "1.2.3.4" } ` } ,
hcl : [ ] string { ` bind_addr = "0.0.0.0" advertise_addr = "1.2.3.4" ` } ,
2017-09-27 19:59:47 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . BindAddr = ipAddr ( "0.0.0.0" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:8300" )
rt . RPCBindAddr = tcpAddr ( "0.0.0.0:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . SerfBindAddrLAN = tcpAddr ( "0.0.0.0:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "0.0.0.0:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
privatev4 : func ( ) ( [ ] * net . IPAddr , error ) {
return nil , fmt . Errorf ( "should not detect advertise_addr" )
} ,
} ,
2017-09-25 18:40:42 +00:00
{
2017-10-20 09:46:16 +00:00
desc : "client addr and ports == 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"ports" : { }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
ports { }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "0.0.0.0:8600" ) , udpAddr ( "0.0.0.0:8600" ) }
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "0.0.0.0:8500" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client addr and ports < 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"ports" : { "dns" : - 1 , "http" : - 2 , "https" : - 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
ports { dns = - 1 http = - 2 https = - 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSPort = - 1
rt . DNSAddrs = nil
rt . HTTPPort = - 1
rt . HTTPAddrs = nil
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client addr and ports > 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"ports" : { "dns" : 1 , "http" : 2 , "https" : 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
ports { dns = 1 http = 2 https = 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSPort = 1
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "0.0.0.0:1" ) , udpAddr ( "0.0.0.0:1" ) }
rt . HTTPPort = 2
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "0.0.0.0:2" ) }
rt . HTTPSPort = 3
rt . HTTPSAddrs = [ ] net . Addr { tcpAddr ( "0.0.0.0:3" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client addr, addresses and ports == 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"addresses" : { "dns" : "1.1.1.1" , "http" : "2.2.2.2" , "https" : "3.3.3.3" } ,
"ports" : { }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
addresses = { dns = "1.1.1.1" http = "2.2.2.2" https = "3.3.3.3" }
ports { }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "1.1.1.1:8600" ) , udpAddr ( "1.1.1.1:8600" ) }
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "2.2.2.2:8500" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client addr, addresses and ports < 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"addresses" : { "dns" : "1.1.1.1" , "http" : "2.2.2.2" , "https" : "3.3.3.3" } ,
"ports" : { "dns" : - 1 , "http" : - 2 , "https" : - 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
addresses = { dns = "1.1.1.1" http = "2.2.2.2" https = "3.3.3.3" }
ports { dns = - 1 http = - 2 https = - 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSPort = - 1
rt . DNSAddrs = nil
rt . HTTPPort = - 1
rt . HTTPAddrs = nil
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client addr, addresses and ports" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "0.0.0.0" ,
"addresses" : { "dns" : "1.1.1.1" , "http" : "2.2.2.2" , "https" : "3.3.3.3" } ,
"ports" : { "dns" : 1 , "http" : 2 , "https" : 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "0.0.0.0"
addresses = { dns = "1.1.1.1" http = "2.2.2.2" https = "3.3.3.3" }
ports { dns = 1 http = 2 https = 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "0.0.0.0" ) }
rt . DNSPort = 1
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "1.1.1.1:1" ) , udpAddr ( "1.1.1.1:1" ) }
rt . HTTPPort = 2
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "2.2.2.2:2" ) }
rt . HTTPSPort = 3
rt . HTTPSAddrs = [ ] net . Addr { tcpAddr ( "3.3.3.3:3" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client template and ports" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "{{ printf \"1.2.3.4 2001:db8::1\" }}" ,
"ports" : { "dns" : 1 , "http" : 2 , "https" : 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "{{ printf \"1.2.3.4 2001:db8::1\" }}"
ports { dns = 1 http = 2 https = 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "1.2.3.4" ) , ipAddr ( "2001:db8::1" ) }
rt . DNSPort = 1
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "1.2.3.4:1" ) , tcpAddr ( "[2001:db8::1]:1" ) , udpAddr ( "1.2.3.4:1" ) , udpAddr ( "[2001:db8::1]:1" ) }
rt . HTTPPort = 2
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "1.2.3.4:2" ) , tcpAddr ( "[2001:db8::1]:2" ) }
rt . HTTPSPort = 3
rt . HTTPSAddrs = [ ] net . Addr { tcpAddr ( "1.2.3.4:3" ) , tcpAddr ( "[2001:db8::1]:3" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "client, address template and ports" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string { ` {
"client_addr" : "{{ printf \"1.2.3.4 2001:db8::1\" }}" ,
"addresses" : {
"dns" : "{{ printf \"1.1.1.1 2001:db8::10 \" }}" ,
"http" : "{{ printf \"2.2.2.2 unix://http 2001:db8::20 \" }}" ,
"https" : "{{ printf \"3.3.3.3 unix://https 2001:db8::30 \" }}"
} ,
"ports" : { "dns" : 1 , "http" : 2 , "https" : 3 }
} ` } ,
hcl : [ ] string { `
client_addr = "{{ printf \"1.2.3.4 2001:db8::1\" }}"
addresses = {
dns = "{{ printf \"1.1.1.1 2001:db8::10 \" }}"
http = "{{ printf \"2.2.2.2 unix://http 2001:db8::20 \" }}"
https = "{{ printf \"3.3.3.3 unix://https 2001:db8::30 \" }}"
}
ports { dns = 1 http = 2 https = 3 }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . ClientAddrs = [ ] * net . IPAddr { ipAddr ( "1.2.3.4" ) , ipAddr ( "2001:db8::1" ) }
rt . DNSPort = 1
rt . DNSAddrs = [ ] net . Addr { tcpAddr ( "1.1.1.1:1" ) , tcpAddr ( "[2001:db8::10]:1" ) , udpAddr ( "1.1.1.1:1" ) , udpAddr ( "[2001:db8::10]:1" ) }
rt . HTTPPort = 2
rt . HTTPAddrs = [ ] net . Addr { tcpAddr ( "2.2.2.2:2" ) , unixAddr ( "unix://http" ) , tcpAddr ( "[2001:db8::20]:2" ) }
rt . HTTPSPort = 3
rt . HTTPSAddrs = [ ] net . Addr { tcpAddr ( "3.3.3.3:3" ) , unixAddr ( "unix://https" ) , tcpAddr ( "[2001:db8::30]:3" ) }
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address lan template" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "advertise_addr": " {{ printf \ "1.2.3.4\" }}" } ` } ,
hcl : [ ] string { ` advertise_addr = " {{ printf \ "1.2.3.4\" }}" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address wan template" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "advertise_addr_wan": " {{ printf \ "1.2.3.4\" }}" } ` } ,
hcl : [ ] string { ` advertise_addr_wan = " {{ printf \ "1.2.3.4\" }}" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . TaggedAddresses = map [ string ] string {
"lan" : "10.0.0.1" ,
"wan" : "1.2.3.4" ,
}
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address lan with ports" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-29 09:35:51 +00:00
json : [ ] string { ` {
"ports" : {
"server" : 1000 ,
"serf_lan" : 2000 ,
"serf_wan" : 3000
} ,
"advertise_addr" : "1.2.3.4"
} ` } ,
hcl : [ ] string { `
ports {
server = 1000
serf_lan = 2000
serf_wan = 3000
}
advertise_addr = "1.2.3.4"
` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
2017-09-29 09:35:51 +00:00
rt . AdvertiseAddrLAN = ipAddr ( "1.2.3.4" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.2.3.4:1000" )
rt . RPCBindAddr = tcpAddr ( "0.0.0.0:1000" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.2.3.4:2000" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:3000" )
rt . SerfBindAddrLAN = tcpAddr ( "0.0.0.0:2000" )
rt . SerfBindAddrWAN = tcpAddr ( "0.0.0.0:3000" )
rt . SerfPortLAN = 2000
rt . SerfPortWAN = 3000
rt . ServerPort = 1000
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.2.3.4" ,
"wan" : "1.2.3.4" ,
}
2017-09-25 18:40:42 +00:00
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address wan with ports" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-29 09:35:51 +00:00
json : [ ] string { ` {
"ports" : {
"server" : 1000 ,
"serf_lan" : 2000 ,
"serf_wan" : 3000
} ,
"advertise_addr_wan" : "1.2.3.4"
} ` } ,
hcl : [ ] string { `
ports {
server = 1000
serf_lan = 2000
serf_wan = 3000
}
advertise_addr_wan = "1.2.3.4"
` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
2017-09-29 09:35:51 +00:00
rt . AdvertiseAddrLAN = ipAddr ( "10.0.0.1" )
rt . AdvertiseAddrWAN = ipAddr ( "1.2.3.4" )
rt . RPCAdvertiseAddr = tcpAddr ( "10.0.0.1:1000" )
rt . RPCBindAddr = tcpAddr ( "0.0.0.0:1000" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "10.0.0.1:2000" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "1.2.3.4:3000" )
rt . SerfBindAddrLAN = tcpAddr ( "0.0.0.0:2000" )
rt . SerfBindAddrWAN = tcpAddr ( "0.0.0.0:3000" )
rt . SerfPortLAN = 2000
rt . SerfPortWAN = 3000
rt . ServerPort = 1000
rt . TaggedAddresses = map [ string ] string {
"lan" : "10.0.0.1" ,
"wan" : "1.2.3.4" ,
}
2017-09-25 18:40:42 +00:00
rt . DataDir = dataDir
} ,
} ,
2018-01-19 21:48:31 +00:00
{
desc : "serf wan port > 0" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` {
"ports" : {
"serf_wan" : - 1
} ,
"advertise_addr_wan" : "1.2.3.4"
} ` } ,
hcl : [ ] string { `
ports {
serf_wan = - 1
}
advertise_addr_wan = "1.2.3.4"
` } ,
err : "ports.serf_wan must be a valid port from 1 to 65535" ,
} ,
2017-09-25 18:40:42 +00:00
{
2017-10-20 09:46:16 +00:00
desc : "serf bind address lan template" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "serf_lan": " {{ printf \ "1.2.3.4\" }}" } ` } ,
hcl : [ ] string { ` serf_lan = " {{ printf \ "1.2.3.4\" }}" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . SerfBindAddrLAN = tcpAddr ( "1.2.3.4:8301" )
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "serf bind address wan template" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "serf_wan": " {{ printf \ "1.2.3.4\" }}" } ` } ,
hcl : [ ] string { ` serf_wan = " {{ printf \ "1.2.3.4\" }}" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . SerfBindAddrWAN = tcpAddr ( "1.2.3.4:8302" )
rt . DataDir = dataDir
} ,
} ,
2017-10-20 13:36:52 +00:00
{
2017-10-20 09:46:16 +00:00
desc : "dns recursor templates with deduplication" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "recursors": [ " {{ printf \ "5.6.7.8:9999\" }}" , "{{ printf \"1.2.3.4\" }}" , "{{ printf \"5.6.7.8:9999\" }}" ] } ` } ,
hcl : [ ] string { ` recursors = [ " {{ printf \ "5.6.7.8:9999\" }}" , "{{ printf \"1.2.3.4\" }}" , "{{ printf \"5.6.7.8:9999\" }}" ] ` } ,
2017-10-20 13:36:52 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . DNSRecursors = [ ] string { "5.6.7.8:9999" , "1.2.3.4" }
rt . DataDir = dataDir
} ,
} ,
2017-09-25 18:40:42 +00:00
// ------------------------------------------------------------
// precedence rules
//
{
2017-10-20 09:46:16 +00:00
desc : "precedence: merge order" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
json : [ ] string {
` {
"bootstrap" : true ,
"bootstrap_expect" : 1 ,
"datacenter" : "a" ,
"start_join" : [ "a" , "b" ] ,
"node_meta" : { "a" : "b" }
} ` ,
` {
"bootstrap" : false ,
"bootstrap_expect" : 0 ,
"datacenter" : "b" ,
"start_join" : [ "c" , "d" ] ,
2017-12-14 00:06:01 +00:00
"node_meta" : { "a" : "c" }
2017-09-25 18:40:42 +00:00
} ` ,
} ,
hcl : [ ] string {
`
bootstrap = true
bootstrap_expect = 1
datacenter = "a"
start_join = [ "a" , "b" ]
node_meta = { "a" = "b" }
` ,
`
bootstrap = false
bootstrap_expect = 0
datacenter = "b"
start_join = [ "c" , "d" ]
2017-12-14 00:06:01 +00:00
node_meta = { "a" = "c" }
2017-09-25 18:40:42 +00:00
` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Bootstrap = false
rt . BootstrapExpect = 0
rt . Datacenter = "b"
rt . StartJoinAddrsLAN = [ ] string { "a" , "b" , "c" , "d" }
2017-12-14 00:06:01 +00:00
rt . NodeMeta = map [ string ] string { "a" : "c" }
2017-09-25 18:40:42 +00:00
rt . DataDir = dataDir
} ,
} ,
{
desc : "precedence: flag before file" ,
json : [ ] string {
` {
"advertise_addr" : "1.2.3.4" ,
"advertise_addr_wan" : "5.6.7.8" ,
"bootstrap" : true ,
"bootstrap_expect" : 3 ,
"datacenter" : "a" ,
"node_meta" : { "a" : "b" } ,
2017-10-20 13:36:52 +00:00
"recursors" : [ "1.2.3.5" , "5.6.7.9" ] ,
2017-09-25 18:40:42 +00:00
"serf_lan" : "a" ,
"serf_wan" : "a" ,
"start_join" : [ "a" , "b" ]
} ` ,
} ,
hcl : [ ] string {
`
advertise_addr = "1.2.3.4"
advertise_addr_wan = "5.6.7.8"
bootstrap = true
bootstrap_expect = 3
datacenter = "a"
node_meta = { "a" = "b" }
2017-10-20 13:36:52 +00:00
recursors = [ "1.2.3.5" , "5.6.7.9" ]
2017-09-25 18:40:42 +00:00
serf_lan = "a"
serf_wan = "a"
start_join = [ "a" , "b" ]
` ,
} ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -advertise=1.1.1.1 ` ,
` -advertise-wan=2.2.2.2 ` ,
` -bootstrap=false ` ,
` -bootstrap-expect=0 ` ,
` -datacenter=b ` ,
` -data-dir= ` + dataDir ,
` -join ` , ` c ` , ` -join=d ` ,
2017-12-14 00:06:01 +00:00
` -node-meta=a:c ` ,
2017-10-20 13:36:52 +00:00
` -recursor ` , ` 1.2.3.6 ` , ` -recursor=5.6.7.10 ` ,
2017-09-25 18:40:42 +00:00
` -serf-lan-bind=3.3.3.3 ` ,
` -serf-wan-bind=4.4.4.4 ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . AdvertiseAddrLAN = ipAddr ( "1.1.1.1" )
rt . AdvertiseAddrWAN = ipAddr ( "2.2.2.2" )
rt . RPCAdvertiseAddr = tcpAddr ( "1.1.1.1:8300" )
rt . SerfAdvertiseAddrLAN = tcpAddr ( "1.1.1.1:8301" )
rt . SerfAdvertiseAddrWAN = tcpAddr ( "2.2.2.2:8302" )
rt . Datacenter = "b"
2017-10-20 13:36:52 +00:00
rt . DNSRecursors = [ ] string { "1.2.3.6" , "5.6.7.10" , "1.2.3.5" , "5.6.7.9" }
2017-12-14 00:06:01 +00:00
rt . NodeMeta = map [ string ] string { "a" : "c" }
2017-09-25 18:40:42 +00:00
rt . SerfBindAddrLAN = tcpAddr ( "3.3.3.3:8301" )
rt . SerfBindAddrWAN = tcpAddr ( "4.4.4.4:8302" )
rt . StartJoinAddrsLAN = [ ] string { "c" , "d" , "a" , "b" }
rt . TaggedAddresses = map [ string ] string {
"lan" : "1.1.1.1" ,
"wan" : "2.2.2.2" ,
}
rt . DataDir = dataDir
} ,
} ,
// ------------------------------------------------------------
// transformations
//
2017-11-10 21:50:45 +00:00
2017-09-25 18:40:42 +00:00
{
2017-10-20 09:46:16 +00:00
desc : "raft performance scaling" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "performance": { "raft_multiplier": 9} } ` } ,
hcl : [ ] string { ` performance = { raft_multiplier=9 } ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . ConsulRaftElectionTimeout = 9 * 1000 * time . Millisecond
rt . ConsulRaftHeartbeatTimeout = 9 * 1000 * time . Millisecond
rt . ConsulRaftLeaderLeaseTimeout = 9 * 500 * time . Millisecond
rt . DataDir = dataDir
} ,
} ,
// ------------------------------------------------------------
// validations
//
{
2017-10-20 09:46:16 +00:00
desc : "invalid input" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` this is not JSON ` } ,
hcl : [ ] string { ` *** 0123 this is not HCL ` } ,
err : "Error parsing" ,
2017-09-25 18:40:42 +00:00
} ,
{
2017-10-20 09:46:16 +00:00
desc : "datacenter is lower-cased" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "datacenter": "A" } ` } ,
hcl : [ ] string { ` datacenter = "A" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . Datacenter = "a"
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "acl_datacenter is lower-cased" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "acl_datacenter": "A" } ` } ,
hcl : [ ] string { ` acl_datacenter = "A" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . ACLDatacenter = "a"
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "acl_replication_token enables acl replication" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "acl_replication_token": "a" } ` } ,
hcl : [ ] string { ` acl_replication_token = "a" ` } ,
2017-09-25 18:40:42 +00:00
patch : func ( rt * RuntimeConfig ) {
rt . ACLReplicationToken = "a"
rt . EnableACLReplication = true
rt . DataDir = dataDir
} ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect fails v4" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "0.0.0.0"} ` } ,
hcl : [ ] string { ` bind_addr = "0.0.0.0" ` } ,
2017-09-25 18:40:42 +00:00
privatev4 : func ( ) ( [ ] * net . IPAddr , error ) {
return nil , errors . New ( "some error" )
} ,
err : "Error detecting private IPv4 address: some error" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect none v4" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "0.0.0.0"} ` } ,
hcl : [ ] string { ` bind_addr = "0.0.0.0" ` } ,
2017-09-25 18:40:42 +00:00
privatev4 : func ( ) ( [ ] * net . IPAddr , error ) {
return nil , nil
} ,
err : "No private IPv4 address found" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect multiple v4" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "0.0.0.0"} ` } ,
hcl : [ ] string { ` bind_addr = "0.0.0.0" ` } ,
2017-09-25 18:40:42 +00:00
privatev4 : func ( ) ( [ ] * net . IPAddr , error ) {
return [ ] * net . IPAddr { ipAddr ( "1.1.1.1" ) , ipAddr ( "2.2.2.2" ) } , nil
} ,
err : "Multiple private IPv4 addresses found. Please configure one" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect fails v6" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "::"} ` } ,
hcl : [ ] string { ` bind_addr = "::" ` } ,
2017-09-25 18:40:42 +00:00
publicv6 : func ( ) ( [ ] * net . IPAddr , error ) {
return nil , errors . New ( "some error" )
} ,
err : "Error detecting public IPv6 address: some error" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect none v6" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "::"} ` } ,
hcl : [ ] string { ` bind_addr = "::" ` } ,
2017-09-25 18:40:42 +00:00
publicv6 : func ( ) ( [ ] * net . IPAddr , error ) {
return nil , nil
} ,
err : "No public IPv6 address found" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "advertise address detect multiple v6" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "::"} ` } ,
hcl : [ ] string { ` bind_addr = "::" ` } ,
2017-09-25 18:40:42 +00:00
publicv6 : func ( ) ( [ ] * net . IPAddr , error ) {
return [ ] * net . IPAddr { ipAddr ( "dead:beef::1" ) , ipAddr ( "dead:beef::2" ) } , nil
} ,
err : "Multiple public IPv6 addresses found. Please configure one" ,
} ,
{
desc : "ae_interval invalid == 0" ,
2017-10-20 09:46:16 +00:00
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
jsontail : [ ] string { ` { "ae_interval": "0s" } ` } ,
hcltail : [ ] string { ` ae_interval = "0s" ` } ,
err : ` ae_interval cannot be 0s. Must be positive ` ,
} ,
{
desc : "ae_interval invalid < 0" ,
2017-10-20 09:46:16 +00:00
args : [ ] string { ` -data-dir= ` + dataDir } ,
2017-09-25 18:40:42 +00:00
jsontail : [ ] string { ` { "ae_interval": "-1s" } ` } ,
hcltail : [ ] string { ` ae_interval = "-1s" ` } ,
err : ` ae_interval cannot be -1s. Must be positive ` ,
} ,
{
desc : "acl_datacenter invalid" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "acl_datacenter": "%" } ` } ,
hcl : [ ] string { ` acl_datacenter = "%" ` } ,
err : ` acl_datacenter cannot be "%". Please use only [a-z0-9-_] ` ,
} ,
{
desc : "autopilot.max_trailing_logs invalid" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "autopilot": { "max_trailing_logs": -1 } } ` } ,
hcl : [ ] string { ` autopilot = { max_trailing_logs = -1 } ` } ,
err : "autopilot.max_trailing_logs cannot be -1. Must be greater than or equal to zero" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "bind_addr cannot be empty" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "" } ` } ,
hcl : [ ] string { ` bind_addr = "" ` } ,
err : "bind_addr cannot be empty" ,
2017-09-25 18:40:42 +00:00
} ,
{
2017-10-20 09:46:16 +00:00
desc : "bind_addr does not allow multiple addresses" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "1.1.1.1 2.2.2.2" } ` } ,
hcl : [ ] string { ` bind_addr = "1.1.1.1 2.2.2.2" ` } ,
err : "bind_addr cannot contain multiple addresses" ,
2017-09-25 18:40:42 +00:00
} ,
{
2017-10-20 09:46:16 +00:00
desc : "bind_addr cannot be a unix socket" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "bind_addr": "unix:///foo" } ` } ,
hcl : [ ] string { ` bind_addr = "unix:///foo" ` } ,
err : "bind_addr cannot be a unix socket" ,
2017-09-25 18:40:42 +00:00
} ,
{
desc : "bootstrap without server" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap": true } ` } ,
hcl : [ ] string { ` bootstrap = true ` } ,
err : "'bootstrap = true' requires 'server = true'" ,
} ,
{
desc : "bootstrap-expect without server" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": 3 } ` } ,
hcl : [ ] string { ` bootstrap_expect = 3 ` } ,
err : "'bootstrap_expect > 0' requires 'server = true'" ,
} ,
{
desc : "bootstrap-expect invalid" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": -1 } ` } ,
hcl : [ ] string { ` bootstrap_expect = -1 ` } ,
err : "bootstrap_expect cannot be -1. Must be greater than or equal to zero" ,
} ,
{
desc : "bootstrap-expect and dev mode" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -dev ` ,
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": 3, "server": true } ` } ,
hcl : [ ] string { ` bootstrap_expect = 3 server = true ` } ,
err : "'bootstrap_expect > 0' not allowed in dev mode" ,
} ,
{
2017-10-05 14:27:39 +00:00
desc : "bootstrap-expect and bootstrap" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap": true, "bootstrap_expect": 3, "server": true } ` } ,
hcl : [ ] string { ` bootstrap = true bootstrap_expect = 3 server = true ` } ,
err : "'bootstrap_expect > 0' and 'bootstrap = true' are mutually exclusive" ,
} ,
{
2017-10-05 14:27:39 +00:00
desc : "bootstrap-expect=1 equals bootstrap" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": 1, "server": true } ` } ,
hcl : [ ] string { ` bootstrap_expect = 1 server = true ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . Bootstrap = true
rt . BootstrapExpect = 0
rt . LeaveOnTerm = false
rt . ServerMode = true
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
warns : [ ] string { "BootstrapExpect is set to 1; this is the same as Bootstrap mode." , "bootstrap = true: do not enable unless necessary" } ,
} ,
{
desc : "bootstrap-expect=2 warning" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": 2, "server": true } ` } ,
hcl : [ ] string { ` bootstrap_expect = 2 server = true ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . BootstrapExpect = 2
rt . LeaveOnTerm = false
rt . ServerMode = true
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
warns : [ ] string {
` bootstrap_expect = 2: A cluster with 2 servers will provide no failure tolerance. See https://www.consul.io/docs/internals/consensus.html#deployment-table ` ,
` bootstrap_expect > 0: expecting 2 servers ` ,
} ,
} ,
{
desc : "bootstrap-expect > 2 but even warning" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "bootstrap_expect": 4, "server": true } ` } ,
hcl : [ ] string { ` bootstrap_expect = 4 server = true ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . BootstrapExpect = 4
rt . LeaveOnTerm = false
rt . ServerMode = true
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
warns : [ ] string {
` bootstrap_expect is even number: A cluster with an even number of servers does not achieve optimum fault tolerance. See https://www.consul.io/docs/internals/consensus.html#deployment-table ` ,
` bootstrap_expect > 0: expecting 4 servers ` ,
} ,
} ,
{
desc : "client mode sets LeaveOnTerm and SkipLeaveOnInt correctly" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "server": false } ` } ,
hcl : [ ] string { ` server = false ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . LeaveOnTerm = true
rt . ServerMode = false
rt . SkipLeaveOnInt = false
rt . DataDir = dataDir
} ,
} ,
{
desc : "client does not allow socket" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "client_addr": "unix:///foo" } ` } ,
hcl : [ ] string { ` client_addr = "unix:///foo" ` } ,
err : "client_addr cannot be a unix socket" ,
} ,
{
2017-10-20 09:46:16 +00:00
desc : "datacenter invalid" ,
args : [ ] string { ` -data-dir= ` + dataDir } ,
json : [ ] string { ` { "datacenter": "%" } ` } ,
hcl : [ ] string { ` datacenter = "%" ` } ,
err : ` datacenter cannot be "%". Please use only [a-z0-9-_] ` ,
2017-09-25 18:40:42 +00:00
} ,
{
desc : "dns does not allow socket" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "addresses": { "dns": "unix:///foo" } } ` } ,
hcl : [ ] string { ` addresses = { dns = "unix:///foo" } ` } ,
err : "DNS address cannot be a unix socket" ,
} ,
{
2017-09-26 06:58:54 +00:00
desc : "ui and ui_dir" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -datacenter=a ` ,
` -data-dir= ` + dataDir ,
} ,
2017-09-26 06:58:54 +00:00
json : [ ] string { ` { "ui": true, "ui_dir": "a" } ` } ,
hcl : [ ] string { ` ui = true ui_dir = "a" ` } ,
2017-09-25 18:40:42 +00:00
err : "Both the ui and ui-dir flags were specified, please provide only one.\n" +
"If trying to use your own web UI resources, use the ui-dir flag.\n" +
"If using Consul version 0.7.0 or later, the web UI is included in the binary so use ui to enable it" ,
} ,
// test ANY address failures
// to avoid combinatory explosion for tests use 0.0.0.0, :: or [::] but not all of them
{
desc : "advertise_addr any" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "advertise_addr": "0.0.0.0" } ` } ,
hcl : [ ] string { ` advertise_addr = "0.0.0.0" ` } ,
err : "Advertise address cannot be 0.0.0.0, :: or [::]" ,
} ,
{
desc : "advertise_addr_wan any" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "advertise_addr_wan": "::" } ` } ,
hcl : [ ] string { ` advertise_addr_wan = "::" ` } ,
err : "Advertise WAN address cannot be 0.0.0.0, :: or [::]" ,
} ,
2017-10-20 18:00:45 +00:00
{
desc : "recursors any" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-10-20 18:00:45 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "recursors": ["::"] } ` } ,
hcl : [ ] string { ` recursors = ["::"] ` } ,
err : "DNS recursor address cannot be 0.0.0.0, :: or [::]" ,
} ,
2017-09-25 18:40:42 +00:00
{
desc : "dns_config.udp_answer_limit invalid" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "dns_config": { "udp_answer_limit": -1 } } ` } ,
hcl : [ ] string { ` dns_config = { udp_answer_limit = -1 } ` } ,
err : "dns_config.udp_answer_limit cannot be -1. Must be greater than or equal to zero" ,
} ,
2018-03-06 01:07:42 +00:00
{
desc : "dns_config.a_record_limit invalid" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "dns_config": { "a_record_limit": -1 } } ` } ,
hcl : [ ] string { ` dns_config = { a_record_limit = -1 } ` } ,
err : "dns_config.a_record_limit cannot be -1. Must be greater than or equal to zero" ,
} ,
2017-09-25 18:40:42 +00:00
{
desc : "performance.raft_multiplier < 0" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "performance": { "raft_multiplier": -1 } } ` } ,
hcl : [ ] string { ` performance = { raft_multiplier = -1 } ` } ,
err : ` performance.raft_multiplier cannot be -1. Must be between 1 and 10 ` ,
} ,
{
desc : "performance.raft_multiplier == 0" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "performance": { "raft_multiplier": 0 } } ` } ,
hcl : [ ] string { ` performance = { raft_multiplier = 0 } ` } ,
err : ` performance.raft_multiplier cannot be 0. Must be between 1 and 10 ` ,
} ,
{
desc : "performance.raft_multiplier > 10" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "performance": { "raft_multiplier": 20 } } ` } ,
hcl : [ ] string { ` performance = { raft_multiplier = 20 } ` } ,
err : ` performance.raft_multiplier cannot be 20. Must be between 1 and 10 ` ,
} ,
{
desc : "node_name invalid" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
` -node= ` ,
} ,
hostname : func ( ) ( string , error ) { return "" , nil } ,
err : "node_name cannot be empty" ,
} ,
{
desc : "node_meta key too long" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "dns_config": { "udp_answer_limit": 1 } } ` ,
` { "node_meta": { " ` + randomString ( 130 ) + ` ": "a" } } ` ,
} ,
hcl : [ ] string {
` dns_config = { udp_answer_limit = 1 } ` ,
` node_meta = { " ` + randomString ( 130 ) + ` " = "a" } ` ,
} ,
err : "Key is too long (limit: 128 characters)" ,
} ,
{
desc : "node_meta value too long" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "dns_config": { "udp_answer_limit": 1 } } ` ,
` { "node_meta": { "a": " ` + randomString ( 520 ) + ` " } } ` ,
} ,
hcl : [ ] string {
` dns_config = { udp_answer_limit = 1 } ` ,
` node_meta = { "a" = " ` + randomString ( 520 ) + ` " } ` ,
} ,
err : "Value is too long (limit: 512 characters)" ,
} ,
{
desc : "node_meta too many keys" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "dns_config": { "udp_answer_limit": 1 } } ` ,
` { "node_meta": { ` + metaPairs ( 70 , "json" ) + ` } } ` ,
} ,
hcl : [ ] string {
` dns_config = { udp_answer_limit = 1 } ` ,
` node_meta = { ` + metaPairs ( 70 , "hcl" ) + ` } ` ,
} ,
err : "Node metadata cannot contain more than 64 key/value pairs" ,
} ,
{
desc : "unique listeners dns vs http" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"client_addr" : "1.2.3.4" ,
"ports" : { "dns" : 1000 , "http" : 1000 }
} ` } ,
hcl : [ ] string { `
client_addr = "1.2.3.4"
ports = { dns = 1000 http = 1000 }
` } ,
err : "HTTP address 1.2.3.4:1000 already configured for DNS" ,
} ,
{
desc : "unique listeners dns vs https" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"client_addr" : "1.2.3.4" ,
"ports" : { "dns" : 1000 , "https" : 1000 }
} ` } ,
hcl : [ ] string { `
client_addr = "1.2.3.4"
ports = { dns = 1000 https = 1000 }
` } ,
err : "HTTPS address 1.2.3.4:1000 already configured for DNS" ,
} ,
{
desc : "unique listeners http vs https" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"client_addr" : "1.2.3.4" ,
"ports" : { "http" : 1000 , "https" : 1000 }
} ` } ,
hcl : [ ] string { `
client_addr = "1.2.3.4"
ports = { http = 1000 https = 1000 }
` } ,
err : "HTTPS address 1.2.3.4:1000 already configured for HTTP" ,
} ,
{
desc : "unique advertise addresses HTTP vs RPC" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"addresses" : { "http" : "10.0.0.1" } ,
"ports" : { "http" : 1000 , "server" : 1000 }
} ` } ,
hcl : [ ] string { `
addresses = { http = "10.0.0.1" }
ports = { http = 1000 server = 1000 }
` } ,
err : "RPC Advertise address 10.0.0.1:1000 already configured for HTTP" ,
} ,
{
desc : "unique advertise addresses RPC vs Serf LAN" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"ports" : { "server" : 1000 , "serf_lan" : 1000 }
} ` } ,
hcl : [ ] string { `
ports = { server = 1000 serf_lan = 1000 }
` } ,
err : "Serf Advertise LAN address 10.0.0.1:1000 already configured for RPC Advertise" ,
} ,
{
desc : "unique advertise addresses RPC vs Serf WAN" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"ports" : { "server" : 1000 , "serf_wan" : 1000 }
} ` } ,
hcl : [ ] string { `
ports = { server = 1000 serf_wan = 1000 }
` } ,
err : "Serf Advertise WAN address 10.0.0.1:1000 already configured for RPC Advertise" ,
} ,
{
desc : "telemetry.prefix_filter cannot be empty" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"telemetry" : { "prefix_filter" : [ "" ] }
} ` } ,
hcl : [ ] string { `
telemetry = { prefix_filter = [ "" ] }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . DataDir = dataDir
} ,
warns : [ ] string { "Cannot have empty filter rule in prefix_filter" } ,
} ,
{
desc : "telemetry.prefix_filter must start with + or -" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"telemetry" : { "prefix_filter" : [ "+foo" , "-bar" , "nix" ] }
} ` } ,
hcl : [ ] string { `
telemetry = { prefix_filter = [ "+foo" , "-bar" , "nix" ] }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . DataDir = dataDir
rt . TelemetryAllowedPrefixes = [ ] string { "foo" }
2017-10-05 00:27:57 +00:00
rt . TelemetryBlockedPrefixes = [ ] string { "bar" , "consul.consul" }
2017-09-25 18:40:42 +00:00
} ,
warns : [ ] string { ` Filter rule must begin with either '+' or '-': "nix" ` } ,
} ,
2017-10-05 00:27:57 +00:00
{
desc : "telemetry.enable_deprecated_names adds allow rule for whitelist" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-10-05 00:27:57 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` {
"telemetry" : { "enable_deprecated_names" : true , "filter_default" : false }
} ` } ,
hcl : [ ] string { `
telemetry = { enable_deprecated_names = true filter_default = false }
` } ,
patch : func ( rt * RuntimeConfig ) {
rt . DataDir = dataDir
rt . TelemetryFilterDefault = false
rt . TelemetryAllowedPrefixes = [ ] string { "consul.consul" }
rt . TelemetryBlockedPrefixes = [ ] string { }
} ,
} ,
2017-09-25 18:40:42 +00:00
{
desc : "encrypt has invalid key" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "encrypt": "this is not a valid key" } ` } ,
hcl : [ ] string { ` encrypt = "this is not a valid key" ` } ,
err : "encrypt has invalid key: illegal base64 data at input byte 4" ,
} ,
{
desc : "encrypt given but LAN keyring exists" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "encrypt": "i0P+gFTkLPg0h53eNYjydg==" } ` } ,
hcl : [ ] string { ` encrypt = "i0P+gFTkLPg0h53eNYjydg==" ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . EncryptKey = "i0P+gFTkLPg0h53eNYjydg=="
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , SerfLANKeyring ) , [ ] byte ( "i0P+gFTkLPg0h53eNYjydg==" ) )
} ,
warns : [ ] string { ` WARNING: LAN keyring exists but -encrypt given, using keyring ` } ,
} ,
{
desc : "encrypt given but WAN keyring exists" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-25 18:40:42 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string { ` { "encrypt": "i0P+gFTkLPg0h53eNYjydg==", "server": true } ` } ,
hcl : [ ] string { ` encrypt = "i0P+gFTkLPg0h53eNYjydg==" server = true ` } ,
patch : func ( rt * RuntimeConfig ) {
rt . EncryptKey = "i0P+gFTkLPg0h53eNYjydg=="
rt . ServerMode = true
rt . LeaveOnTerm = false
rt . SkipLeaveOnInt = true
rt . DataDir = dataDir
} ,
pre : func ( ) {
writeFile ( filepath . Join ( dataDir , SerfWANKeyring ) , [ ] byte ( "i0P+gFTkLPg0h53eNYjydg==" ) )
} ,
warns : [ ] string { ` WARNING: WAN keyring exists but -encrypt given, using keyring ` } ,
} ,
2017-09-26 08:14:14 +00:00
{
desc : "multiple check files" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-26 08:14:14 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "check": { "name": "a", "script": "/bin/true" } } ` ,
` { "check": { "name": "b", "script": "/bin/false" } } ` ,
} ,
hcl : [ ] string {
` check = { name = "a" script = "/bin/true" } ` ,
` check = { name = "b" script = "/bin/false" } ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Checks = [ ] * structs . CheckDefinition {
& structs . CheckDefinition { Name : "a" , Script : "/bin/true" } ,
& structs . CheckDefinition { Name : "b" , Script : "/bin/false" } ,
}
rt . DataDir = dataDir
} ,
} ,
2017-12-27 04:35:22 +00:00
{
desc : "grpc check" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
2018-02-03 01:29:34 +00:00
` { "check": { "name": "a", "grpc": "localhost:12345/foo", "grpc_use_tls": true } } ` ,
2017-12-27 04:35:22 +00:00
} ,
hcl : [ ] string {
2018-02-03 01:29:34 +00:00
` check = { name = "a" grpc = "localhost:12345/foo", grpc_use_tls = true } ` ,
2017-12-27 04:35:22 +00:00
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Checks = [ ] * structs . CheckDefinition {
2018-02-03 01:29:34 +00:00
& structs . CheckDefinition { Name : "a" , GRPC : "localhost:12345/foo" , GRPCUseTLS : true } ,
2017-12-27 04:35:22 +00:00
}
rt . DataDir = dataDir
} ,
} ,
2017-09-26 08:14:14 +00:00
{
desc : "multiple service files" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-09-26 08:14:14 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "service": { "name": "a", "port": 80 } } ` ,
` { "service": { "name": "b", "port": 90 } } ` ,
} ,
hcl : [ ] string {
` service = { name = "a" port = 80 } ` ,
` service = { name = "b" port = 90 } ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Services = [ ] * structs . ServiceDefinition {
& structs . ServiceDefinition { Name : "a" , Port : 80 } ,
& structs . ServiceDefinition { Name : "b" , Port : 90 } ,
}
rt . DataDir = dataDir
} ,
} ,
2017-10-10 23:40:59 +00:00
{
desc : "translated keys" ,
2017-10-20 09:46:16 +00:00
args : [ ] string {
2017-10-10 23:40:59 +00:00
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` {
"service" : {
"name" : "a" ,
"port" : 80 ,
"EnableTagOverride" : true ,
"check" : {
"CheckID" : "x" ,
"name" : "y" ,
"DockerContainerID" : "z" ,
"DeregisterCriticalServiceAfter" : "10s" ,
"ScriptArgs" : [ "a" , "b" ]
}
}
} ` ,
} ,
hcl : [ ] string {
` service = {
name = "a"
port = 80
EnableTagOverride = true
check = {
CheckID = "x"
name = "y"
DockerContainerID = "z"
DeregisterCriticalServiceAfter = "10s"
ScriptArgs = [ "a" , "b" ]
}
} ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . Services = [ ] * structs . ServiceDefinition {
& structs . ServiceDefinition {
Name : "a" ,
Port : 80 ,
EnableTagOverride : true ,
Checks : [ ] * structs . CheckType {
& structs . CheckType {
CheckID : types . CheckID ( "x" ) ,
Name : "y" ,
DockerContainerID : "z" ,
DeregisterCriticalServiceAfter : 10 * time . Second ,
ScriptArgs : [ ] string { "a" , "b" } ,
} ,
} ,
} ,
}
rt . DataDir = dataDir
} ,
} ,
2017-11-10 21:50:45 +00:00
{
desc : "ignore snapshot_agent sub-object" ,
args : [ ] string {
` -data-dir= ` + dataDir ,
} ,
json : [ ] string {
` { "snapshot_agent": { "dont": "care" } } ` ,
} ,
hcl : [ ] string {
` snapshot_agent = { dont = "care" } ` ,
} ,
patch : func ( rt * RuntimeConfig ) {
rt . DataDir = dataDir
} ,
} ,
2017-09-25 18:40:42 +00:00
}
testConfig ( t , tests , dataDir )
}
func testConfig ( t * testing . T , tests [ ] configTest , dataDir string ) {
for _ , tt := range tests {
for pass , format := range [ ] string { "json" , "hcl" } {
2017-10-31 22:30:01 +00:00
// clean data dir before every test
cleanDir ( dataDir )
2017-09-25 18:40:42 +00:00
// when we test only flags then there are no JSON or HCL
// sources and we need to make only one pass over the
// tests.
flagsOnly := len ( tt . json ) == 0 && len ( tt . hcl ) == 0
if flagsOnly && pass > 0 {
continue
}
// json and hcl sources need to be in sync
// to make sure we're generating the same config
if len ( tt . json ) != len ( tt . hcl ) {
t . Fatal ( tt . desc , ": JSON and HCL test case out of sync" )
}
// select the source
srcs , tails := tt . json , tt . jsontail
if format == "hcl" {
srcs , tails = tt . hcl , tt . hcltail
}
// build the description
var desc [ ] string
if ! flagsOnly {
desc = append ( desc , format )
}
if tt . desc != "" {
desc = append ( desc , tt . desc )
}
t . Run ( strings . Join ( desc , ":" ) , func ( t * testing . T ) {
// first parse the flags
2017-10-20 10:02:05 +00:00
flags := Flags { }
fs := flag . NewFlagSet ( "" , flag . ContinueOnError )
AddFlags ( fs , & flags )
err := fs . Parse ( tt . args )
2017-09-25 18:40:42 +00:00
if err != nil {
t . Fatalf ( "ParseFlags failed: %s" , err )
}
2017-10-20 10:02:05 +00:00
flags . Args = fs . Args ( )
2017-09-25 18:40:42 +00:00
2017-10-31 22:30:01 +00:00
if tt . pre != nil {
tt . pre ( )
}
defer func ( ) {
if tt . post != nil {
tt . post ( )
}
} ( )
2017-09-25 18:40:42 +00:00
// Then create a builder with the flags.
b , err := NewBuilder ( flags )
if err != nil {
t . Fatal ( "NewBuilder" , err )
}
// mock the hostname function unless a mock is provided
b . Hostname = tt . hostname
if b . Hostname == nil {
b . Hostname = func ( ) ( string , error ) { return "nodex" , nil }
}
// mock the ip address detection
privatev4 := tt . privatev4
if privatev4 == nil {
privatev4 = func ( ) ( [ ] * net . IPAddr , error ) {
return [ ] * net . IPAddr { ipAddr ( "10.0.0.1" ) } , nil
}
}
2017-09-27 19:59:47 +00:00
publicv6 := tt . publicv6
if publicv6 == nil {
publicv6 = func ( ) ( [ ] * net . IPAddr , error ) {
return [ ] * net . IPAddr { ipAddr ( "dead:beef::1" ) } , nil
}
}
2017-09-25 18:40:42 +00:00
b . GetPrivateIPv4 = privatev4
2017-09-27 19:59:47 +00:00
b . GetPublicIPv6 = publicv6
2017-09-25 18:40:42 +00:00
// read the source fragements
for i , data := range srcs {
b . Sources = append ( b . Sources , Source {
2017-10-31 22:30:01 +00:00
Name : fmt . Sprintf ( "src-%d.%s" , i , format ) ,
2017-09-25 18:40:42 +00:00
Format : format ,
Data : data ,
} )
}
for i , data := range tails {
b . Tail = append ( b . Tail , Source {
2017-10-31 22:30:01 +00:00
Name : fmt . Sprintf ( "tail-%d.%s" , i , format ) ,
2017-09-25 18:40:42 +00:00
Format : format ,
Data : data ,
} )
}
// build/merge the config fragments
rt , err := b . BuildAndValidate ( )
if err == nil && tt . err != "" {
t . Fatalf ( "got no error want %q" , tt . err )
}
if err != nil && tt . err == "" {
t . Fatalf ( "got error %s want nil" , err )
}
if err == nil && tt . err != "" {
t . Fatalf ( "got nil want error to contain %q" , tt . err )
}
if err != nil && tt . err != "" && ! strings . Contains ( err . Error ( ) , tt . err ) {
t . Fatalf ( "error %q does not contain %q" , err . Error ( ) , tt . err )
}
// check the warnings
if ! verify . Values ( t , "warnings" , b . Warnings , tt . warns ) {
t . FailNow ( )
}
// stop if we expected an error
if tt . err != "" {
return
}
// build a default configuration, then patch the fields we expect to change
// and compare it with the generated configuration. Since the expected
// runtime config has been validated we do not need to validate it again.
x , err := NewBuilder ( Flags { } )
if err != nil {
t . Fatal ( err )
}
x . Hostname = b . Hostname
2017-09-27 19:59:47 +00:00
x . GetPrivateIPv4 = func ( ) ( [ ] * net . IPAddr , error ) { return [ ] * net . IPAddr { ipAddr ( "10.0.0.1" ) } , nil }
x . GetPublicIPv6 = func ( ) ( [ ] * net . IPAddr , error ) { return [ ] * net . IPAddr { ipAddr ( "dead:beef::1" ) } , nil }
2017-09-25 18:40:42 +00:00
patchedRT , err := x . Build ( )
if err != nil {
t . Fatalf ( "build default failed: %s" , err )
}
if tt . patch != nil {
tt . patch ( & patchedRT )
}
// if err := x.Validate(wantRT); err != nil {
// t.Fatalf("validate default failed: %s", err)
// }
if got , want := rt , patchedRT ; ! verify . Values ( t , "" , got , want ) {
t . FailNow ( )
}
} )
}
}
}
// TestFullConfig tests the conversion from a fully populated JSON or
// HCL config file to a RuntimeConfig structure. All fields must be set
// to a unique non-zero value.
//
// To aid populating the fields the following bash functions can be used
// to generate random strings and ints:
//
// random-int() { echo $RANDOM }
// random-string() { base64 /dev/urandom | tr -d '/+' | fold -w ${1:-32} | head -n 1 }
//
// To generate a random string of length 8 run the following command in
// a terminal:
//
// random-string 8
//
func TestFullConfig ( t * testing . T ) {
dataDir := testutil . TempDir ( t , "consul" )
defer os . RemoveAll ( dataDir )
flagSrc := [ ] string { ` -dev ` }
src := map [ string ] string {
"json" : ` {
"acl_agent_master_token" : "furuQD0b" ,
"acl_agent_token" : "cOshLOQ2" ,
"acl_datacenter" : "m3urck3z" ,
"acl_default_policy" : "ArK3WIfE" ,
"acl_down_policy" : "vZXMfMP0" ,
"acl_enforce_version_8" : true ,
2017-10-03 20:15:56 +00:00
"acl_enable_key_list_policy" : true ,
2017-09-25 18:40:42 +00:00
"acl_master_token" : "C1Q1oIwh" ,
"acl_replication_token" : "LMmgy5dO" ,
"acl_token" : "O1El0wan" ,
"acl_ttl" : "18060s" ,
"addresses" : {
"dns" : "93.95.95.81" ,
"http" : "83.39.91.39" ,
"https" : "95.17.17.19"
} ,
"advertise_addr" : "17.99.29.16" ,
"advertise_addr_wan" : "78.63.37.19" ,
"autopilot" : {
"cleanup_dead_servers" : true ,
"disable_upgrade_migration" : true ,
"last_contact_threshold" : "12705s" ,
"max_trailing_logs" : 17849 ,
"redundancy_zone_tag" : "3IsufDJf" ,
"server_stabilization_time" : "23057s" ,
"upgrade_version_tag" : "W9pDwFAL"
} ,
"bind_addr" : "16.99.34.17" ,
"bootstrap" : true ,
"bootstrap_expect" : 53 ,
"ca_file" : "erA7T0PM" ,
"ca_path" : "mQEN1Mfp" ,
"cert_file" : "7s4QAzDk" ,
"check" : {
"id" : "fZaCAXww" ,
"name" : "OOM2eo0f" ,
"notes" : "zXzXI9Gt" ,
"service_id" : "L8G0QNmR" ,
"token" : "oo4BCTgJ" ,
"status" : "qLykAl5u" ,
"script" : "dhGfIF8n" ,
2017-10-04 23:48:00 +00:00
"args" : [ "f3BemRjy" , "e5zgpef7" ] ,
2017-09-25 18:40:42 +00:00
"http" : "29B93haH" ,
"header" : {
"hBq0zn1q" : [ "2a9o9ZKP" , "vKwA5lR6" ] ,
"f3r6xFtM" : [ "RyuIdDWv" , "QbxEcIUM" ]
} ,
"method" : "Dou0nGT5" ,
"tcp" : "JY6fTTcw" ,
"interval" : "18714s" ,
"docker_container_id" : "qF66POS9" ,
"shell" : "sOnDy228" ,
"tls_skip_verify" : true ,
"timeout" : "5954s" ,
"ttl" : "30044s" ,
"deregister_critical_service_after" : "13209s"
} ,
"checks" : [
{
"id" : "uAjE6m9Z" ,
"name" : "QsZRGpYr" ,
"notes" : "VJ7Sk4BY" ,
"service_id" : "lSulPcyz" ,
"token" : "toO59sh8" ,
"status" : "9RlWsXMV" ,
"script" : "8qbd8tWw" ,
2017-10-04 23:48:00 +00:00
"args" : [ "4BAJttck" , "4D2NPtTQ" ] ,
2017-09-25 18:40:42 +00:00
"http" : "dohLcyQ2" ,
"header" : {
"ZBfTin3L" : [ "1sDbEqYG" , "lJGASsWK" ] ,
"Ui0nU99X" : [ "LMccm3Qe" , "k5H5RggQ" ]
} ,
"method" : "aldrIQ4l" ,
"tcp" : "RJQND605" ,
"interval" : "22164s" ,
"docker_container_id" : "ipgdFtjd" ,
"shell" : "qAeOYy0M" ,
"tls_skip_verify" : true ,
"timeout" : "1813s" ,
"ttl" : "21743s" ,
"deregister_critical_service_after" : "14232s"
} ,
{
"id" : "Cqq95BhP" ,
"name" : "3qXpkS0i" ,
"notes" : "sb5qLTex" ,
"service_id" : "CmUUcRna" ,
"token" : "a3nQzHuy" ,
"status" : "irj26nf3" ,
"script" : "FJsI1oXt" ,
2017-10-04 23:48:00 +00:00
"args" : [ "9s526ogY" , "gSlOHj1w" ] ,
2017-09-25 18:40:42 +00:00
"http" : "yzhgsQ7Y" ,
"header" : {
"zcqwA8dO" : [ "qb1zx0DL" , "sXCxPFsD" ] ,
"qxvdnSE9" : [ "6wBPUYdF" , "YYh8wtSZ" ]
} ,
"method" : "gLrztrNw" ,
"tcp" : "4jG5casb" ,
"interval" : "28767s" ,
"docker_container_id" : "THW6u7rL" ,
"shell" : "C1Zt3Zwh" ,
"tls_skip_verify" : true ,
"timeout" : "18506s" ,
"ttl" : "31006s" ,
"deregister_critical_service_after" : "2366s"
}
] ,
"check_update_interval" : "16507s" ,
"client_addr" : "93.83.18.19" ,
"data_dir" : "` + dataDir + `" ,
"datacenter" : "rzo029wg" ,
"disable_anonymous_signature" : true ,
"disable_coordinates" : true ,
"disable_host_node_id" : true ,
"disable_keyring_file" : true ,
"disable_remote_exec" : true ,
"disable_update_check" : true ,
2017-10-11 00:04:52 +00:00
"discard_check_output" : true ,
2017-09-25 18:40:42 +00:00
"domain" : "7W1xXSqd" ,
"dns_config" : {
"allow_stale" : true ,
2018-03-06 01:07:42 +00:00
"a_record_limit" : 29907 ,
2017-09-25 18:40:42 +00:00
"disable_compression" : true ,
"enable_truncate" : true ,
"max_stale" : "29685s" ,
"node_ttl" : "7084s" ,
"only_passing" : true ,
"recursor_timeout" : "4427s" ,
"service_ttl" : {
"*" : "32030s"
} ,
"udp_answer_limit" : 29909
} ,
"enable_acl_replication" : true ,
2017-11-08 02:22:09 +00:00
"enable_agent_tls_for_checks" : true ,
2017-09-25 18:40:42 +00:00
"enable_debug" : true ,
"enable_script_checks" : true ,
"enable_syslog" : true ,
"encrypt" : "A4wELWqH" ,
"encrypt_verify_incoming" : true ,
"encrypt_verify_outgoing" : true ,
"http_config" : {
"block_endpoints" : [ "RBvAFcGD" , "fWOWFznh" ] ,
"response_headers" : {
"M6TKa9NP" : "xjuxjOzQ" ,
"JRCrHZed" : "rl0mTx81"
}
} ,
"key_file" : "IEkkwgIA" ,
"leave_on_terminate" : true ,
"limits" : {
"rpc_rate" : 12029.43 ,
"rpc_max_burst" : 44848
} ,
"log_level" : "k1zo9Spt" ,
"node_id" : "AsUIlw99" ,
"node_meta" : {
"5mgGQMBk" : "mJLtVMSG" ,
"A7ynFMJB" : "0Nx6RGab"
} ,
"node_name" : "otlLxGaI" ,
"non_voting_server" : true ,
"performance" : {
2017-10-10 22:19:50 +00:00
"leave_drain_time" : "8265s" ,
"raft_multiplier" : 5 ,
"rpc_hold_timeout" : "15707s"
2017-09-25 18:40:42 +00:00
} ,
"pid_file" : "43xN80Km" ,
"ports" : {
"dns" : 7001 ,
"http" : 7999 ,
"https" : 15127 ,
"server" : 3757
} ,
"protocol" : 30793 ,
"raft_protocol" : 19016 ,
"reconnect_timeout" : "23739s" ,
"reconnect_timeout_wan" : "26694s" ,
2017-10-20 13:36:52 +00:00
"recursors" : [ "63.38.39.58" , "92.49.18.18" ] ,
2017-09-25 18:40:42 +00:00
"rejoin_after_leave" : true ,
"retry_interval" : "8067s" ,
"retry_interval_wan" : "28866s" ,
"retry_join" : [ "pbsSFY7U" , "l0qLtWij" ] ,
"retry_join_wan" : [ "PFsR02Ye" , "rJdQIhER" ] ,
"retry_max" : 913 ,
"retry_max_wan" : 23160 ,
"segment" : "BC2NhTDi" ,
"segments" : [
{
"name" : "PExYMe2E" ,
"bind" : "36.73.36.19" ,
"port" : 38295 ,
"rpc_listener" : true ,
"advertise" : "63.39.19.18"
} ,
{
"name" : "UzCvJgup" ,
"bind" : "37.58.38.19" ,
"port" : 39292 ,
"rpc_listener" : true ,
"advertise" : "83.58.26.27"
}
] ,
"serf_lan" : "99.43.63.15" ,
"serf_wan" : "67.88.33.19" ,
"server" : true ,
"server_name" : "Oerr9n1G" ,
"service" : {
"id" : "dLOXpSCI" ,
"name" : "o1ynPkp0" ,
"tags" : [ "nkwshvM5" , "NTDWn3ek" ] ,
"address" : "cOlSOhbp" ,
"token" : "msy7iWER" ,
"port" : 24237 ,
"enable_tag_override" : true ,
"check" : {
"check_id" : "RMi85Dv8" ,
"name" : "iehanzuq" ,
"status" : "rCvn53TH" ,
"notes" : "fti5lfF3" ,
"script" : "rtj34nfd" ,
2017-10-04 23:48:00 +00:00
"args" : [ "16WRUmwS" , "QWk7j7ae" ] ,
2017-09-25 18:40:42 +00:00
"http" : "dl3Fgme3" ,
"header" : {
"rjm4DEd3" : [ "2m3m2Fls" ] ,
"l4HwQ112" : [ "fk56MNlo" , "dhLK56aZ" ]
} ,
"method" : "9afLm3Mj" ,
"tcp" : "fjiLFqVd" ,
"interval" : "23926s" ,
"docker_container_id" : "dO5TtRHk" ,
"shell" : "e6q2ttES" ,
"tls_skip_verify" : true ,
"timeout" : "38483s" ,
"ttl" : "10943s" ,
"deregister_critical_service_after" : "68787s"
} ,
"checks" : [
{
"id" : "Zv99e9Ka" ,
"name" : "sgV4F7Pk" ,
"notes" : "yP5nKbW0" ,
"status" : "7oLMEyfu" ,
"script" : "NlUQ3nTE" ,
2017-10-04 23:48:00 +00:00
"args" : [ "5wEZtZpv" , "0Ihyk8cS" ] ,
2017-09-25 18:40:42 +00:00
"http" : "KyDjGY9H" ,
"header" : {
"gv5qefTz" : [ "5Olo2pMG" , "PvvKWQU5" ] ,
"SHOVq1Vv" : [ "jntFhyym" , "GYJh32pp" ]
} ,
"method" : "T66MFBfR" ,
"tcp" : "bNnNfx2A" ,
"interval" : "22224s" ,
"docker_container_id" : "ipgdFtjd" ,
"shell" : "omVZq7Sz" ,
"tls_skip_verify" : true ,
"timeout" : "18913s" ,
"ttl" : "44743s" ,
"deregister_critical_service_after" : "8482s"
} ,
{
"id" : "G79O6Mpr" ,
"name" : "IEqrzrsd" ,
"notes" : "SVqApqeM" ,
"status" : "XXkVoZXt" ,
"script" : "IXLZTM6E" ,
2017-10-04 23:48:00 +00:00
"args" : [ "wD05Bvao" , "rLYB7kQC" ] ,
2017-09-25 18:40:42 +00:00
"http" : "kyICZsn8" ,
"header" : {
"4ebP5vL4" : [ "G20SrL5Q" , "DwPKlMbo" ] ,
"p2UI34Qz" : [ "UsG1D0Qh" , "NHhRiB6s" ]
} ,
"method" : "ciYHWors" ,
"tcp" : "FfvCwlqH" ,
"interval" : "12356s" ,
"docker_container_id" : "HBndBU6R" ,
"shell" : "hVI33JjA" ,
"tls_skip_verify" : true ,
"timeout" : "38282s" ,
"ttl" : "1181s" ,
"deregister_critical_service_after" : "4992s"
}
]
} ,
"services" : [
{
"id" : "wI1dzxS4" ,
"name" : "7IszXMQ1" ,
"tags" : [ "0Zwg8l6v" , "zebELdN5" ] ,
"address" : "9RhqPSPB" ,
"token" : "myjKJkWH" ,
"port" : 72219 ,
"enable_tag_override" : true ,
"check" : {
"check_id" : "qmfeO5if" ,
"name" : "atDGP7n5" ,
"status" : "pDQKEhWL" ,
"notes" : "Yt8EDLev" ,
"script" : "MDu7wjlD" ,
2017-10-04 23:48:00 +00:00
"args" : [ "81EDZLPa" , "bPY5X8xd" ] ,
2017-09-25 18:40:42 +00:00
"http" : "qzHYvmJO" ,
"header" : {
"UkpmZ3a3" : [ "2dfzXuxZ" ] ,
"cVFpko4u" : [ "gGqdEB6k" , "9LsRo22u" ]
} ,
"method" : "X5DrovFc" ,
"tcp" : "ICbxkpSF" ,
"interval" : "24392s" ,
"docker_container_id" : "ZKXr68Yb" ,
"shell" : "CEfzx0Fo" ,
"tls_skip_verify" : true ,
"timeout" : "38333s" ,
"ttl" : "57201s" ,
"deregister_critical_service_after" : "44214s"
}
} ,
{
"id" : "MRHVMZuD" ,
"name" : "6L6BVfgH" ,
"tags" : [ "7Ale4y6o" , "PMBW08hy" ] ,
"address" : "R6H6g8h0" ,
"token" : "ZgY8gjMI" ,
"port" : 38292 ,
"enable_tag_override" : true ,
"checks" : [
{
"id" : "GTti9hCo" ,
"name" : "9OOS93ne" ,
"notes" : "CQy86DH0" ,
"status" : "P0SWDvrk" ,
"script" : "6BhLJ7R9" ,
2017-10-04 23:48:00 +00:00
"args" : [ "EXvkYIuG" , "BATOyt6h" ] ,
2017-09-25 18:40:42 +00:00
"http" : "u97ByEiW" ,
"header" : {
"MUlReo8L" : [ "AUZG7wHG" , "gsN0Dc2N" ] ,
"1UJXjVrT" : [ "OJgxzTfk" , "xZZrFsq7" ]
} ,
"method" : "5wkAxCUE" ,
"tcp" : "MN3oA9D2" ,
"interval" : "32718s" ,
"docker_container_id" : "cU15LMet" ,
"shell" : "nEz9qz2l" ,
"tls_skip_verify" : true ,
"timeout" : "34738s" ,
"ttl" : "22773s" ,
"deregister_critical_service_after" : "84282s"
} ,
{
"id" : "UHsDeLxG" ,
"name" : "PQSaPWlT" ,
"notes" : "jKChDOdl" ,
"status" : "5qFz6OZn" ,
"script" : "PbdxFZ3K" ,
2017-10-04 23:48:00 +00:00
"args" : [ "NMtYWlT9" , "vj74JXsm" ] ,
2017-09-25 18:40:42 +00:00
"http" : "1LBDJhw4" ,
"header" : {
"cXPmnv1M" : [ "imDqfaBx" , "NFxZ1bQe" ] ,
"vr7wY7CS" : [ "EtCoNPPL" , "9vAarJ5s" ]
} ,
"method" : "wzByP903" ,
"tcp" : "2exjZIGE" ,
"interval" : "5656s" ,
"docker_container_id" : "5tDBWpfA" ,
"shell" : "rlTpLM8s" ,
"tls_skip_verify" : true ,
"timeout" : "4868s" ,
"ttl" : "11222s" ,
"deregister_critical_service_after" : "68482s"
}
]
}
] ,
"session_ttl_min" : "26627s" ,
"skip_leave_on_interrupt" : true ,
"start_join" : [ "LR3hGDoG" , "MwVpZ4Up" ] ,
"start_join_wan" : [ "EbFSc3nA" , "kwXTh623" ] ,
"syslog_facility" : "hHv79Uia" ,
"tagged_addresses" : {
"7MYgHrYH" : "dALJAhLD" ,
"h6DdBy6K" : "ebrr9zZ8"
} ,
"telemetry" : {
"circonus_api_app" : "p4QOTe9j" ,
"circonus_api_token" : "E3j35V23" ,
"circonus_api_url" : "mEMjHpGg" ,
"circonus_broker_id" : "BHlxUhed" ,
"circonus_broker_select_tag" : "13xy1gHm" ,
"circonus_check_display_name" : "DRSlQR6n" ,
"circonus_check_force_metric_activation" : "Ua5FGVYf" ,
"circonus_check_id" : "kGorutad" ,
"circonus_check_instance_id" : "rwoOL6R4" ,
"circonus_check_search_tag" : "ovT4hT4f" ,
"circonus_check_tags" : "prvO4uBl" ,
"circonus_submission_interval" : "DolzaflP" ,
"circonus_submission_url" : "gTcbS93G" ,
"disable_hostname" : true ,
"dogstatsd_addr" : "0wSndumK" ,
"dogstatsd_tags" : [ "3N81zSUB" , "Xtj8AnXZ" ] ,
"filter_default" : true ,
"prefix_filter" : [ "+oJotS8XJ" , "-cazlEhGn" ] ,
2017-10-04 23:43:27 +00:00
"enable_deprecated_names" : true ,
2017-09-27 00:49:55 +00:00
"metrics_prefix" : "ftO6DySn" ,
2017-09-25 18:40:42 +00:00
"statsd_address" : "drce87cy" ,
2017-09-27 00:49:55 +00:00
"statsite_address" : "HpFwKB8R"
2017-09-25 18:40:42 +00:00
} ,
"tls_cipher_suites" : "TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA" ,
"tls_min_version" : "pAOWafkR" ,
"tls_prefer_server_cipher_suites" : true ,
"translate_wan_addrs" : true ,
2017-09-26 06:58:54 +00:00
"ui" : true ,
2017-09-25 18:40:42 +00:00
"ui_dir" : "11IFzAUn" ,
"unix_sockets" : {
"group" : "8pFodrV8" ,
"mode" : "E8sAwOv4" ,
"user" : "E0nB1DwA"
} ,
"verify_incoming" : true ,
"verify_incoming_https" : true ,
"verify_incoming_rpc" : true ,
"verify_outgoing" : true ,
"verify_server_hostname" : true ,
"watches" : [
{
"type" : "key" ,
"datacenter" : "GyE6jpeW" ,
"key" : "j9lF1Tve" ,
"handler" : "90N7S4LN"
2017-10-04 23:48:00 +00:00
} , {
"type" : "keyprefix" ,
"datacenter" : "fYrl3F5d" ,
"key" : "sl3Dffu7" ,
"args" : [ "dltjDJ2a" , "flEa7C2d" ]
2017-09-25 18:40:42 +00:00
}
]
} ` ,
"hcl" : `
acl_agent_master_token = "furuQD0b"
acl_agent_token = "cOshLOQ2"
acl_datacenter = "m3urck3z"
acl_default_policy = "ArK3WIfE"
acl_down_policy = "vZXMfMP0"
acl_enforce_version_8 = true
2017-10-03 20:15:56 +00:00
acl_enable_key_list_policy = true
2017-09-25 18:40:42 +00:00
acl_master_token = "C1Q1oIwh"
acl_replication_token = "LMmgy5dO"
acl_token = "O1El0wan"
acl_ttl = "18060s"
addresses = {
dns = "93.95.95.81"
http = "83.39.91.39"
https = "95.17.17.19"
}
advertise_addr = "17.99.29.16"
advertise_addr_wan = "78.63.37.19"
autopilot = {
cleanup_dead_servers = true
disable_upgrade_migration = true
last_contact_threshold = "12705s"
max_trailing_logs = 17849
redundancy_zone_tag = "3IsufDJf"
server_stabilization_time = "23057s"
upgrade_version_tag = "W9pDwFAL"
}
bind_addr = "16.99.34.17"
bootstrap = true
bootstrap_expect = 53
ca_file = "erA7T0PM"
ca_path = "mQEN1Mfp"
cert_file = "7s4QAzDk"
check = {
id = "fZaCAXww"
name = "OOM2eo0f"
notes = "zXzXI9Gt"
service_id = "L8G0QNmR"
token = "oo4BCTgJ"
status = "qLykAl5u"
script = "dhGfIF8n"
2017-10-04 23:48:00 +00:00
args = [ "f3BemRjy" , "e5zgpef7" ]
2017-09-25 18:40:42 +00:00
http = "29B93haH"
header = {
hBq0zn1q = [ "2a9o9ZKP" , "vKwA5lR6" ]
f3r6xFtM = [ "RyuIdDWv" , "QbxEcIUM" ]
}
method = "Dou0nGT5"
tcp = "JY6fTTcw"
interval = "18714s"
docker_container_id = "qF66POS9"
shell = "sOnDy228"
tls_skip_verify = true
timeout = "5954s"
ttl = "30044s"
deregister_critical_service_after = "13209s"
} ,
checks = [
{
id = "uAjE6m9Z"
name = "QsZRGpYr"
notes = "VJ7Sk4BY"
service_id = "lSulPcyz"
token = "toO59sh8"
status = "9RlWsXMV"
script = "8qbd8tWw"
2017-10-04 23:48:00 +00:00
args = [ "4BAJttck" , "4D2NPtTQ" ]
2017-09-25 18:40:42 +00:00
http = "dohLcyQ2"
header = {
"ZBfTin3L" = [ "1sDbEqYG" , "lJGASsWK" ]
"Ui0nU99X" = [ "LMccm3Qe" , "k5H5RggQ" ]
}
method = "aldrIQ4l"
tcp = "RJQND605"
interval = "22164s"
docker_container_id = "ipgdFtjd"
shell = "qAeOYy0M"
tls_skip_verify = true
timeout = "1813s"
ttl = "21743s"
deregister_critical_service_after = "14232s"
} ,
{
id = "Cqq95BhP"
name = "3qXpkS0i"
notes = "sb5qLTex"
service_id = "CmUUcRna"
token = "a3nQzHuy"
status = "irj26nf3"
script = "FJsI1oXt"
2017-10-04 23:48:00 +00:00
args = [ "9s526ogY" , "gSlOHj1w" ]
2017-09-25 18:40:42 +00:00
http = "yzhgsQ7Y"
header = {
"zcqwA8dO" = [ "qb1zx0DL" , "sXCxPFsD" ]
"qxvdnSE9" = [ "6wBPUYdF" , "YYh8wtSZ" ]
}
method = "gLrztrNw"
tcp = "4jG5casb"
interval = "28767s"
docker_container_id = "THW6u7rL"
shell = "C1Zt3Zwh"
tls_skip_verify = true
timeout = "18506s"
ttl = "31006s"
deregister_critical_service_after = "2366s"
}
]
check_update_interval = "16507s"
client_addr = "93.83.18.19"
data_dir = "` + dataDir + `"
datacenter = "rzo029wg"
disable_anonymous_signature = true
disable_coordinates = true
disable_host_node_id = true
disable_keyring_file = true
disable_remote_exec = true
disable_update_check = true
2017-10-11 00:04:52 +00:00
discard_check_output = true
2017-09-25 18:40:42 +00:00
domain = "7W1xXSqd"
dns_config {
allow_stale = true
2018-03-06 01:07:42 +00:00
a_record_limit = 29907
2017-09-25 18:40:42 +00:00
disable_compression = true
enable_truncate = true
max_stale = "29685s"
node_ttl = "7084s"
only_passing = true
recursor_timeout = "4427s"
service_ttl = {
"*" = "32030s"
}
udp_answer_limit = 29909
}
enable_acl_replication = true
2017-11-08 02:22:09 +00:00
enable_agent_tls_for_checks = true
2017-09-25 18:40:42 +00:00
enable_debug = true
enable_script_checks = true
enable_syslog = true
encrypt = "A4wELWqH"
encrypt_verify_incoming = true
encrypt_verify_outgoing = true
http_config {
block_endpoints = [ "RBvAFcGD" , "fWOWFznh" ]
response_headers = {
"M6TKa9NP" = "xjuxjOzQ"
"JRCrHZed" = "rl0mTx81"
}
}
key_file = "IEkkwgIA"
leave_on_terminate = true
limits {
rpc_rate = 12029.43
rpc_max_burst = 44848
}
log_level = "k1zo9Spt"
node_id = "AsUIlw99"
node_meta {
"5mgGQMBk" = "mJLtVMSG"
"A7ynFMJB" = "0Nx6RGab"
}
node_name = "otlLxGaI"
non_voting_server = true
performance {
2017-10-10 22:19:50 +00:00
leave_drain_time = "8265s"
2017-09-25 18:40:42 +00:00
raft_multiplier = 5
2017-10-10 22:19:50 +00:00
rpc_hold_timeout = "15707s"
2017-09-25 18:40:42 +00:00
}
pid_file = "43xN80Km"
ports {
dns = 7001 ,
http = 7999 ,
https = 15127
server = 3757
}
protocol = 30793
raft_protocol = 19016
reconnect_timeout = "23739s"
reconnect_timeout_wan = "26694s"
2017-10-20 13:36:52 +00:00
recursors = [ "63.38.39.58" , "92.49.18.18" ]
2017-09-25 18:40:42 +00:00
rejoin_after_leave = true
retry_interval = "8067s"
retry_interval_wan = "28866s"
retry_join = [ "pbsSFY7U" , "l0qLtWij" ]
retry_join_wan = [ "PFsR02Ye" , "rJdQIhER" ]
retry_max = 913
retry_max_wan = 23160
segment = "BC2NhTDi"
segments = [
{
name = "PExYMe2E"
bind = "36.73.36.19"
port = 38295
rpc_listener = true
advertise = "63.39.19.18"
} ,
{
name = "UzCvJgup"
bind = "37.58.38.19"
port = 39292
rpc_listener = true
advertise = "83.58.26.27"
}
]
serf_lan = "99.43.63.15"
serf_wan = "67.88.33.19"
server = true
server_name = "Oerr9n1G"
service = {
id = "dLOXpSCI"
name = "o1ynPkp0"
tags = [ "nkwshvM5" , "NTDWn3ek" ]
address = "cOlSOhbp"
token = "msy7iWER"
port = 24237
enable_tag_override = true
check = {
check_id = "RMi85Dv8"
name = "iehanzuq"
status = "rCvn53TH"
notes = "fti5lfF3"
script = "rtj34nfd"
2017-10-04 23:48:00 +00:00
args = [ "16WRUmwS" , "QWk7j7ae" ]
2017-09-25 18:40:42 +00:00
http = "dl3Fgme3"
header = {
rjm4DEd3 = [ "2m3m2Fls" ]
l4HwQ112 = [ "fk56MNlo" , "dhLK56aZ" ]
}
method = "9afLm3Mj"
tcp = "fjiLFqVd"
interval = "23926s"
docker_container_id = "dO5TtRHk"
shell = "e6q2ttES"
tls_skip_verify = true
timeout = "38483s"
ttl = "10943s"
deregister_critical_service_after = "68787s"
}
checks = [
{
id = "Zv99e9Ka"
name = "sgV4F7Pk"
notes = "yP5nKbW0"
status = "7oLMEyfu"
script = "NlUQ3nTE"
2017-10-04 23:48:00 +00:00
args = [ "5wEZtZpv" , "0Ihyk8cS" ]
2017-09-25 18:40:42 +00:00
http = "KyDjGY9H"
header = {
"gv5qefTz" = [ "5Olo2pMG" , "PvvKWQU5" ]
"SHOVq1Vv" = [ "jntFhyym" , "GYJh32pp" ]
}
method = "T66MFBfR"
tcp = "bNnNfx2A"
interval = "22224s"
docker_container_id = "ipgdFtjd"
shell = "omVZq7Sz"
tls_skip_verify = true
timeout = "18913s"
ttl = "44743s"
deregister_critical_service_after = "8482s"
} ,
{
id = "G79O6Mpr"
name = "IEqrzrsd"
notes = "SVqApqeM"
status = "XXkVoZXt"
script = "IXLZTM6E"
2017-10-04 23:48:00 +00:00
args = [ "wD05Bvao" , "rLYB7kQC" ]
2017-09-25 18:40:42 +00:00
http = "kyICZsn8"
header = {
"4ebP5vL4" = [ "G20SrL5Q" , "DwPKlMbo" ]
"p2UI34Qz" = [ "UsG1D0Qh" , "NHhRiB6s" ]
}
method = "ciYHWors"
tcp = "FfvCwlqH"
interval = "12356s"
docker_container_id = "HBndBU6R"
shell = "hVI33JjA"
tls_skip_verify = true
timeout = "38282s"
ttl = "1181s"
deregister_critical_service_after = "4992s"
}
]
}
services = [
{
id = "wI1dzxS4"
name = "7IszXMQ1"
tags = [ "0Zwg8l6v" , "zebELdN5" ]
address = "9RhqPSPB"
token = "myjKJkWH"
port = 72219
enable_tag_override = true
check = {
check_id = "qmfeO5if"
name = "atDGP7n5"
status = "pDQKEhWL"
notes = "Yt8EDLev"
script = "MDu7wjlD"
2017-10-04 23:48:00 +00:00
args = [ "81EDZLPa" , "bPY5X8xd" ]
2017-09-25 18:40:42 +00:00
http = "qzHYvmJO"
header = {
UkpmZ3a3 = [ "2dfzXuxZ" ]
cVFpko4u = [ "gGqdEB6k" , "9LsRo22u" ]
}
method = "X5DrovFc"
tcp = "ICbxkpSF"
interval = "24392s"
docker_container_id = "ZKXr68Yb"
shell = "CEfzx0Fo"
tls_skip_verify = true
timeout = "38333s"
ttl = "57201s"
deregister_critical_service_after = "44214s"
}
} ,
{
id = "MRHVMZuD"
name = "6L6BVfgH"
tags = [ "7Ale4y6o" , "PMBW08hy" ]
address = "R6H6g8h0"
token = "ZgY8gjMI"
port = 38292
enable_tag_override = true
checks = [
{
id = "GTti9hCo"
name = "9OOS93ne"
notes = "CQy86DH0"
status = "P0SWDvrk"
script = "6BhLJ7R9"
2017-10-04 23:48:00 +00:00
args = [ "EXvkYIuG" , "BATOyt6h" ]
2017-09-25 18:40:42 +00:00
http = "u97ByEiW"
header = {
"MUlReo8L" = [ "AUZG7wHG" , "gsN0Dc2N" ]
"1UJXjVrT" = [ "OJgxzTfk" , "xZZrFsq7" ]
}
method = "5wkAxCUE"
tcp = "MN3oA9D2"
interval = "32718s"
docker_container_id = "cU15LMet"
shell = "nEz9qz2l"
tls_skip_verify = true
timeout = "34738s"
ttl = "22773s"
deregister_critical_service_after = "84282s"
} ,
{
id = "UHsDeLxG"
name = "PQSaPWlT"
notes = "jKChDOdl"
status = "5qFz6OZn"
script = "PbdxFZ3K"
2017-10-04 23:48:00 +00:00
args = [ "NMtYWlT9" , "vj74JXsm" ]
2017-09-25 18:40:42 +00:00
http = "1LBDJhw4"
header = {
"cXPmnv1M" = [ "imDqfaBx" , "NFxZ1bQe" ] ,
"vr7wY7CS" = [ "EtCoNPPL" , "9vAarJ5s" ]
}
method = "wzByP903"
tcp = "2exjZIGE"
interval = "5656s"
docker_container_id = "5tDBWpfA"
shell = "rlTpLM8s"
tls_skip_verify = true
timeout = "4868s"
ttl = "11222s"
deregister_critical_service_after = "68482s"
}
]
}
]
session_ttl_min = "26627s"
skip_leave_on_interrupt = true
start_join = [ "LR3hGDoG" , "MwVpZ4Up" ]
start_join_wan = [ "EbFSc3nA" , "kwXTh623" ]
syslog_facility = "hHv79Uia"
tagged_addresses = {
"7MYgHrYH" = "dALJAhLD"
"h6DdBy6K" = "ebrr9zZ8"
}
telemetry {
circonus_api_app = "p4QOTe9j"
circonus_api_token = "E3j35V23"
circonus_api_url = "mEMjHpGg"
circonus_broker_id = "BHlxUhed"
circonus_broker_select_tag = "13xy1gHm"
circonus_check_display_name = "DRSlQR6n"
circonus_check_force_metric_activation = "Ua5FGVYf"
circonus_check_id = "kGorutad"
circonus_check_instance_id = "rwoOL6R4"
circonus_check_search_tag = "ovT4hT4f"
circonus_check_tags = "prvO4uBl"
circonus_submission_interval = "DolzaflP"
circonus_submission_url = "gTcbS93G"
disable_hostname = true
dogstatsd_addr = "0wSndumK"
dogstatsd_tags = [ "3N81zSUB" , "Xtj8AnXZ" ]
filter_default = true
prefix_filter = [ "+oJotS8XJ" , "-cazlEhGn" ]
2017-10-04 23:43:27 +00:00
enable_deprecated_names = true
2017-09-27 00:49:55 +00:00
metrics_prefix = "ftO6DySn"
2017-09-25 18:40:42 +00:00
statsd_address = "drce87cy"
statsite_address = "HpFwKB8R"
}
tls_cipher_suites = "TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA"
tls_min_version = "pAOWafkR"
tls_prefer_server_cipher_suites = true
translate_wan_addrs = true
2017-09-26 06:58:54 +00:00
ui = true
2017-09-25 18:40:42 +00:00
ui_dir = "11IFzAUn"
unix_sockets = {
group = "8pFodrV8"
mode = "E8sAwOv4"
user = "E0nB1DwA"
}
verify_incoming = true
verify_incoming_https = true
verify_incoming_rpc = true
verify_outgoing = true
verify_server_hostname = true
watches = [ {
type = "key"
datacenter = "GyE6jpeW"
key = "j9lF1Tve"
handler = "90N7S4LN"
2017-10-04 23:48:00 +00:00
} , {
type = "keyprefix"
datacenter = "fYrl3F5d"
key = "sl3Dffu7"
args = [ "dltjDJ2a" , "flEa7C2d" ]
2017-09-25 18:40:42 +00:00
} ]
` }
tail := map [ string ] [ ] Source {
"json" : [ ] Source {
{
Name : "tail.non-user.json" ,
Format : "json" ,
Data : `
{
"acl_disabled_ttl" : "957s" ,
"ae_interval" : "10003s" ,
"check_deregister_interval_min" : "27870s" ,
"check_reap_interval" : "10662s" ,
"segment_limit" : 24705 ,
"segment_name_limit" : 27046 ,
"sync_coordinate_interval_min" : "27983s" ,
"sync_coordinate_rate_target" : 137.81
} ` ,
} ,
{
Name : "tail.consul.json" ,
Format : "json" ,
Data : `
{
"consul" : {
"coordinate" : {
"update_batch_size" : 9244 ,
"update_max_batches" : 15164 ,
"update_period" : "25093s"
} ,
"raft" : {
"election_timeout" : "31947s" ,
"heartbeat_timeout" : "25699s" ,
"leader_lease_timeout" : "15351s"
} ,
"serf_lan" : {
"memberlist" : {
"gossip_interval" : "25252s" ,
"probe_interval" : "5105s" ,
"probe_timeout" : "29179s" ,
"suspicion_mult" : 8263
}
} ,
"serf_wan" : {
"memberlist" : {
"gossip_interval" : "6966s" ,
"probe_interval" : "20148s" ,
"probe_timeout" : "3007s" ,
"suspicion_mult" : 32096
}
} ,
"server" : {
"health_interval" : "17455s"
}
}
} ` ,
} ,
} ,
"hcl" : [ ] Source {
{
Name : "tail.non-user.hcl" ,
Format : "hcl" ,
Data : `
acl_disabled_ttl = "957s"
ae_interval = "10003s"
check_deregister_interval_min = "27870s"
check_reap_interval = "10662s"
segment_limit = 24705
segment_name_limit = 27046
sync_coordinate_interval_min = "27983s"
sync_coordinate_rate_target = 137.81
` ,
} ,
{
Name : "tail.consul.hcl" ,
Format : "hcl" ,
Data : `
consul = {
coordinate = {
update_batch_size = 9244
update_max_batches = 15164
update_period = "25093s"
}
raft = {
election_timeout = "31947s"
heartbeat_timeout = "25699s"
leader_lease_timeout = "15351s"
}
serf_lan = {
memberlist = {
gossip_interval = "25252s"
probe_interval = "5105s"
probe_timeout = "29179s"
suspicion_mult = 8263
}
}
serf_wan = {
memberlist = {
gossip_interval = "6966s"
probe_interval = "20148s"
probe_timeout = "3007s"
suspicion_mult = 32096
}
}
server = {
health_interval = "17455s"
}
}
` ,
} ,
} ,
}
want := RuntimeConfig {
// non-user configurable values
ACLDisabledTTL : 957 * time . Second ,
AEInterval : 10003 * time . Second ,
CheckDeregisterIntervalMin : 27870 * time . Second ,
CheckReapInterval : 10662 * time . Second ,
SegmentLimit : 24705 ,
SegmentNameLimit : 27046 ,
SyncCoordinateIntervalMin : 27983 * time . Second ,
SyncCoordinateRateTarget : 137.81 ,
Revision : "JNtPSav3" ,
Version : "R909Hblt" ,
VersionPrerelease : "ZT1JOQLn" ,
// consul configuration
ConsulCoordinateUpdateBatchSize : 9244 ,
ConsulCoordinateUpdateMaxBatches : 15164 ,
ConsulCoordinateUpdatePeriod : 25093 * time . Second ,
ConsulRaftElectionTimeout : 5 * 31947 * time . Second ,
ConsulRaftHeartbeatTimeout : 5 * 25699 * time . Second ,
ConsulRaftLeaderLeaseTimeout : 5 * 15351 * time . Second ,
ConsulSerfLANGossipInterval : 25252 * time . Second ,
ConsulSerfLANProbeInterval : 5105 * time . Second ,
ConsulSerfLANProbeTimeout : 29179 * time . Second ,
ConsulSerfLANSuspicionMult : 8263 ,
ConsulSerfWANGossipInterval : 6966 * time . Second ,
ConsulSerfWANProbeInterval : 20148 * time . Second ,
ConsulSerfWANProbeTimeout : 3007 * time . Second ,
ConsulSerfWANSuspicionMult : 32096 ,
ConsulServerHealthInterval : 17455 * time . Second ,
// user configurable values
ACLAgentMasterToken : "furuQD0b" ,
ACLAgentToken : "cOshLOQ2" ,
ACLDatacenter : "m3urck3z" ,
ACLDefaultPolicy : "ArK3WIfE" ,
ACLDownPolicy : "vZXMfMP0" ,
ACLEnforceVersion8 : true ,
2017-10-02 22:10:21 +00:00
ACLEnableKeyListPolicy : true ,
2017-09-25 18:40:42 +00:00
ACLMasterToken : "C1Q1oIwh" ,
ACLReplicationToken : "LMmgy5dO" ,
ACLTTL : 18060 * time . Second ,
ACLToken : "O1El0wan" ,
AdvertiseAddrLAN : ipAddr ( "17.99.29.16" ) ,
AdvertiseAddrWAN : ipAddr ( "78.63.37.19" ) ,
AutopilotCleanupDeadServers : true ,
AutopilotDisableUpgradeMigration : true ,
AutopilotLastContactThreshold : 12705 * time . Second ,
AutopilotMaxTrailingLogs : 17849 ,
AutopilotRedundancyZoneTag : "3IsufDJf" ,
AutopilotServerStabilizationTime : 23057 * time . Second ,
AutopilotUpgradeVersionTag : "W9pDwFAL" ,
BindAddr : ipAddr ( "16.99.34.17" ) ,
Bootstrap : true ,
BootstrapExpect : 53 ,
CAFile : "erA7T0PM" ,
CAPath : "mQEN1Mfp" ,
CertFile : "7s4QAzDk" ,
Checks : [ ] * structs . CheckDefinition {
& structs . CheckDefinition {
2017-10-04 23:48:00 +00:00
ID : "uAjE6m9Z" ,
Name : "QsZRGpYr" ,
Notes : "VJ7Sk4BY" ,
ServiceID : "lSulPcyz" ,
Token : "toO59sh8" ,
Status : "9RlWsXMV" ,
Script : "8qbd8tWw" ,
ScriptArgs : [ ] string { "4BAJttck" , "4D2NPtTQ" } ,
HTTP : "dohLcyQ2" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"ZBfTin3L" : [ ] string { "1sDbEqYG" , "lJGASsWK" } ,
"Ui0nU99X" : [ ] string { "LMccm3Qe" , "k5H5RggQ" } ,
} ,
Method : "aldrIQ4l" ,
TCP : "RJQND605" ,
Interval : 22164 * time . Second ,
DockerContainerID : "ipgdFtjd" ,
Shell : "qAeOYy0M" ,
TLSSkipVerify : true ,
Timeout : 1813 * time . Second ,
TTL : 21743 * time . Second ,
DeregisterCriticalServiceAfter : 14232 * time . Second ,
} ,
& structs . CheckDefinition {
2017-10-04 23:48:00 +00:00
ID : "Cqq95BhP" ,
Name : "3qXpkS0i" ,
Notes : "sb5qLTex" ,
ServiceID : "CmUUcRna" ,
Token : "a3nQzHuy" ,
Status : "irj26nf3" ,
Script : "FJsI1oXt" ,
ScriptArgs : [ ] string { "9s526ogY" , "gSlOHj1w" } ,
HTTP : "yzhgsQ7Y" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"zcqwA8dO" : [ ] string { "qb1zx0DL" , "sXCxPFsD" } ,
"qxvdnSE9" : [ ] string { "6wBPUYdF" , "YYh8wtSZ" } ,
} ,
Method : "gLrztrNw" ,
TCP : "4jG5casb" ,
Interval : 28767 * time . Second ,
DockerContainerID : "THW6u7rL" ,
Shell : "C1Zt3Zwh" ,
TLSSkipVerify : true ,
Timeout : 18506 * time . Second ,
TTL : 31006 * time . Second ,
DeregisterCriticalServiceAfter : 2366 * time . Second ,
} ,
2017-09-26 08:14:14 +00:00
& structs . CheckDefinition {
2017-10-04 23:48:00 +00:00
ID : "fZaCAXww" ,
Name : "OOM2eo0f" ,
Notes : "zXzXI9Gt" ,
ServiceID : "L8G0QNmR" ,
Token : "oo4BCTgJ" ,
Status : "qLykAl5u" ,
Script : "dhGfIF8n" ,
ScriptArgs : [ ] string { "f3BemRjy" , "e5zgpef7" } ,
HTTP : "29B93haH" ,
2017-09-26 08:14:14 +00:00
Header : map [ string ] [ ] string {
"hBq0zn1q" : { "2a9o9ZKP" , "vKwA5lR6" } ,
"f3r6xFtM" : { "RyuIdDWv" , "QbxEcIUM" } ,
} ,
Method : "Dou0nGT5" ,
TCP : "JY6fTTcw" ,
Interval : 18714 * time . Second ,
DockerContainerID : "qF66POS9" ,
Shell : "sOnDy228" ,
TLSSkipVerify : true ,
Timeout : 5954 * time . Second ,
TTL : 30044 * time . Second ,
DeregisterCriticalServiceAfter : 13209 * time . Second ,
} ,
2017-09-25 18:40:42 +00:00
} ,
CheckUpdateInterval : 16507 * time . Second ,
ClientAddrs : [ ] * net . IPAddr { ipAddr ( "93.83.18.19" ) } ,
DNSAddrs : [ ] net . Addr { tcpAddr ( "93.95.95.81:7001" ) , udpAddr ( "93.95.95.81:7001" ) } ,
2018-03-06 01:07:42 +00:00
DNSARecordLimit : 29907 ,
2017-09-25 18:40:42 +00:00
DNSAllowStale : true ,
DNSDisableCompression : true ,
DNSDomain : "7W1xXSqd" ,
DNSEnableTruncate : true ,
DNSMaxStale : 29685 * time . Second ,
DNSNodeTTL : 7084 * time . Second ,
DNSOnlyPassing : true ,
DNSPort : 7001 ,
DNSRecursorTimeout : 4427 * time . Second ,
2017-10-20 13:36:52 +00:00
DNSRecursors : [ ] string { "63.38.39.58" , "92.49.18.18" } ,
2017-09-25 18:40:42 +00:00
DNSServiceTTL : map [ string ] time . Duration { "*" : 32030 * time . Second } ,
DNSUDPAnswerLimit : 29909 ,
DataDir : dataDir ,
Datacenter : "rzo029wg" ,
DevMode : true ,
DisableAnonymousSignature : true ,
DisableCoordinates : true ,
DisableHostNodeID : true ,
DisableKeyringFile : true ,
DisableRemoteExec : true ,
DisableUpdateCheck : true ,
2017-10-11 00:04:52 +00:00
DiscardCheckOutput : true ,
2017-09-25 18:40:42 +00:00
EnableACLReplication : true ,
2017-11-08 02:22:09 +00:00
EnableAgentTLSForChecks : true ,
2017-09-25 18:40:42 +00:00
EnableDebug : true ,
EnableScriptChecks : true ,
EnableSyslog : true ,
EnableUI : true ,
EncryptKey : "A4wELWqH" ,
EncryptVerifyIncoming : true ,
EncryptVerifyOutgoing : true ,
HTTPAddrs : [ ] net . Addr { tcpAddr ( "83.39.91.39:7999" ) } ,
HTTPBlockEndpoints : [ ] string { "RBvAFcGD" , "fWOWFznh" } ,
HTTPPort : 7999 ,
HTTPResponseHeaders : map [ string ] string { "M6TKa9NP" : "xjuxjOzQ" , "JRCrHZed" : "rl0mTx81" } ,
HTTPSAddrs : [ ] net . Addr { tcpAddr ( "95.17.17.19:15127" ) } ,
HTTPSPort : 15127 ,
KeyFile : "IEkkwgIA" ,
2017-10-10 22:19:50 +00:00
LeaveDrainTime : 8265 * time . Second ,
2017-09-25 18:40:42 +00:00
LeaveOnTerm : true ,
LogLevel : "k1zo9Spt" ,
NodeID : types . NodeID ( "AsUIlw99" ) ,
NodeMeta : map [ string ] string { "5mgGQMBk" : "mJLtVMSG" , "A7ynFMJB" : "0Nx6RGab" } ,
NodeName : "otlLxGaI" ,
NonVotingServer : true ,
PidFile : "43xN80Km" ,
2017-09-29 09:35:51 +00:00
RPCAdvertiseAddr : tcpAddr ( "17.99.29.16:3757" ) ,
2017-09-25 18:40:42 +00:00
RPCBindAddr : tcpAddr ( "16.99.34.17:3757" ) ,
2017-10-10 22:19:50 +00:00
RPCHoldTimeout : 15707 * time . Second ,
2017-09-25 18:40:42 +00:00
RPCProtocol : 30793 ,
RPCRateLimit : 12029.43 ,
RPCMaxBurst : 44848 ,
RaftProtocol : 19016 ,
ReconnectTimeoutLAN : 23739 * time . Second ,
ReconnectTimeoutWAN : 26694 * time . Second ,
RejoinAfterLeave : true ,
RetryJoinIntervalLAN : 8067 * time . Second ,
RetryJoinIntervalWAN : 28866 * time . Second ,
RetryJoinLAN : [ ] string { "pbsSFY7U" , "l0qLtWij" } ,
RetryJoinMaxAttemptsLAN : 913 ,
RetryJoinMaxAttemptsWAN : 23160 ,
RetryJoinWAN : [ ] string { "PFsR02Ye" , "rJdQIhER" } ,
SegmentName : "BC2NhTDi" ,
Segments : [ ] structs . NetworkSegment {
{
Name : "PExYMe2E" ,
Bind : tcpAddr ( "36.73.36.19:38295" ) ,
Advertise : tcpAddr ( "63.39.19.18:38295" ) ,
RPCListener : true ,
} ,
{
Name : "UzCvJgup" ,
Bind : tcpAddr ( "37.58.38.19:39292" ) ,
Advertise : tcpAddr ( "83.58.26.27:39292" ) ,
RPCListener : true ,
} ,
} ,
SerfPortLAN : 8301 ,
SerfPortWAN : 8302 ,
ServerMode : true ,
ServerName : "Oerr9n1G" ,
ServerPort : 3757 ,
Services : [ ] * structs . ServiceDefinition {
{
ID : "wI1dzxS4" ,
Name : "7IszXMQ1" ,
Tags : [ ] string { "0Zwg8l6v" , "zebELdN5" } ,
Address : "9RhqPSPB" ,
Token : "myjKJkWH" ,
Port : 72219 ,
EnableTagOverride : true ,
Checks : [ ] * structs . CheckType {
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "qmfeO5if" ,
Name : "atDGP7n5" ,
Status : "pDQKEhWL" ,
Notes : "Yt8EDLev" ,
Script : "MDu7wjlD" ,
ScriptArgs : [ ] string { "81EDZLPa" , "bPY5X8xd" } ,
HTTP : "qzHYvmJO" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"UkpmZ3a3" : { "2dfzXuxZ" } ,
"cVFpko4u" : { "gGqdEB6k" , "9LsRo22u" } ,
} ,
Method : "X5DrovFc" ,
TCP : "ICbxkpSF" ,
Interval : 24392 * time . Second ,
DockerContainerID : "ZKXr68Yb" ,
Shell : "CEfzx0Fo" ,
TLSSkipVerify : true ,
Timeout : 38333 * time . Second ,
TTL : 57201 * time . Second ,
DeregisterCriticalServiceAfter : 44214 * time . Second ,
} ,
} ,
} ,
{
ID : "MRHVMZuD" ,
Name : "6L6BVfgH" ,
Tags : [ ] string { "7Ale4y6o" , "PMBW08hy" } ,
Address : "R6H6g8h0" ,
Token : "ZgY8gjMI" ,
Port : 38292 ,
EnableTagOverride : true ,
Checks : structs . CheckTypes {
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "GTti9hCo" ,
Name : "9OOS93ne" ,
Notes : "CQy86DH0" ,
Status : "P0SWDvrk" ,
Script : "6BhLJ7R9" ,
ScriptArgs : [ ] string { "EXvkYIuG" , "BATOyt6h" } ,
HTTP : "u97ByEiW" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"MUlReo8L" : { "AUZG7wHG" , "gsN0Dc2N" } ,
"1UJXjVrT" : { "OJgxzTfk" , "xZZrFsq7" } ,
} ,
Method : "5wkAxCUE" ,
TCP : "MN3oA9D2" ,
Interval : 32718 * time . Second ,
DockerContainerID : "cU15LMet" ,
Shell : "nEz9qz2l" ,
TLSSkipVerify : true ,
Timeout : 34738 * time . Second ,
TTL : 22773 * time . Second ,
DeregisterCriticalServiceAfter : 84282 * time . Second ,
} ,
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "UHsDeLxG" ,
Name : "PQSaPWlT" ,
Notes : "jKChDOdl" ,
Status : "5qFz6OZn" ,
Script : "PbdxFZ3K" ,
ScriptArgs : [ ] string { "NMtYWlT9" , "vj74JXsm" } ,
HTTP : "1LBDJhw4" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"cXPmnv1M" : { "imDqfaBx" , "NFxZ1bQe" } ,
"vr7wY7CS" : { "EtCoNPPL" , "9vAarJ5s" } ,
} ,
Method : "wzByP903" ,
TCP : "2exjZIGE" ,
Interval : 5656 * time . Second ,
DockerContainerID : "5tDBWpfA" ,
Shell : "rlTpLM8s" ,
TLSSkipVerify : true ,
Timeout : 4868 * time . Second ,
TTL : 11222 * time . Second ,
DeregisterCriticalServiceAfter : 68482 * time . Second ,
} ,
} ,
} ,
{
ID : "dLOXpSCI" ,
Name : "o1ynPkp0" ,
Tags : [ ] string { "nkwshvM5" , "NTDWn3ek" } ,
Address : "cOlSOhbp" ,
Token : "msy7iWER" ,
Port : 24237 ,
EnableTagOverride : true ,
Checks : structs . CheckTypes {
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "Zv99e9Ka" ,
Name : "sgV4F7Pk" ,
Notes : "yP5nKbW0" ,
Status : "7oLMEyfu" ,
Script : "NlUQ3nTE" ,
ScriptArgs : [ ] string { "5wEZtZpv" , "0Ihyk8cS" } ,
HTTP : "KyDjGY9H" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"gv5qefTz" : { "5Olo2pMG" , "PvvKWQU5" } ,
"SHOVq1Vv" : { "jntFhyym" , "GYJh32pp" } ,
} ,
Method : "T66MFBfR" ,
TCP : "bNnNfx2A" ,
Interval : 22224 * time . Second ,
DockerContainerID : "ipgdFtjd" ,
Shell : "omVZq7Sz" ,
TLSSkipVerify : true ,
Timeout : 18913 * time . Second ,
TTL : 44743 * time . Second ,
DeregisterCriticalServiceAfter : 8482 * time . Second ,
} ,
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "G79O6Mpr" ,
Name : "IEqrzrsd" ,
Notes : "SVqApqeM" ,
Status : "XXkVoZXt" ,
Script : "IXLZTM6E" ,
ScriptArgs : [ ] string { "wD05Bvao" , "rLYB7kQC" } ,
HTTP : "kyICZsn8" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"4ebP5vL4" : { "G20SrL5Q" , "DwPKlMbo" } ,
"p2UI34Qz" : { "UsG1D0Qh" , "NHhRiB6s" } ,
} ,
Method : "ciYHWors" ,
TCP : "FfvCwlqH" ,
Interval : 12356 * time . Second ,
DockerContainerID : "HBndBU6R" ,
Shell : "hVI33JjA" ,
TLSSkipVerify : true ,
Timeout : 38282 * time . Second ,
TTL : 1181 * time . Second ,
DeregisterCriticalServiceAfter : 4992 * time . Second ,
} ,
& structs . CheckType {
2017-10-04 23:48:00 +00:00
CheckID : "RMi85Dv8" ,
Name : "iehanzuq" ,
Status : "rCvn53TH" ,
Notes : "fti5lfF3" ,
Script : "rtj34nfd" ,
ScriptArgs : [ ] string { "16WRUmwS" , "QWk7j7ae" } ,
HTTP : "dl3Fgme3" ,
2017-09-25 18:40:42 +00:00
Header : map [ string ] [ ] string {
"rjm4DEd3" : { "2m3m2Fls" } ,
"l4HwQ112" : { "fk56MNlo" , "dhLK56aZ" } ,
} ,
Method : "9afLm3Mj" ,
TCP : "fjiLFqVd" ,
Interval : 23926 * time . Second ,
DockerContainerID : "dO5TtRHk" ,
Shell : "e6q2ttES" ,
TLSSkipVerify : true ,
Timeout : 38483 * time . Second ,
TTL : 10943 * time . Second ,
DeregisterCriticalServiceAfter : 68787 * time . Second ,
} ,
} ,
} ,
} ,
2017-09-29 09:35:51 +00:00
SerfAdvertiseAddrLAN : tcpAddr ( "17.99.29.16:8301" ) ,
SerfAdvertiseAddrWAN : tcpAddr ( "78.63.37.19:8302" ) ,
2017-09-25 18:40:42 +00:00
SerfBindAddrLAN : tcpAddr ( "99.43.63.15:8301" ) ,
SerfBindAddrWAN : tcpAddr ( "67.88.33.19:8302" ) ,
SessionTTLMin : 26627 * time . Second ,
SkipLeaveOnInt : true ,
StartJoinAddrsLAN : [ ] string { "LR3hGDoG" , "MwVpZ4Up" } ,
StartJoinAddrsWAN : [ ] string { "EbFSc3nA" , "kwXTh623" } ,
SyslogFacility : "hHv79Uia" ,
TelemetryCirconusAPIApp : "p4QOTe9j" ,
TelemetryCirconusAPIToken : "E3j35V23" ,
TelemetryCirconusAPIURL : "mEMjHpGg" ,
TelemetryCirconusBrokerID : "BHlxUhed" ,
TelemetryCirconusBrokerSelectTag : "13xy1gHm" ,
TelemetryCirconusCheckDisplayName : "DRSlQR6n" ,
TelemetryCirconusCheckForceMetricActivation : "Ua5FGVYf" ,
TelemetryCirconusCheckID : "kGorutad" ,
TelemetryCirconusCheckInstanceID : "rwoOL6R4" ,
TelemetryCirconusCheckSearchTag : "ovT4hT4f" ,
TelemetryCirconusCheckTags : "prvO4uBl" ,
TelemetryCirconusSubmissionInterval : "DolzaflP" ,
TelemetryCirconusSubmissionURL : "gTcbS93G" ,
TelemetryDisableHostname : true ,
TelemetryDogstatsdAddr : "0wSndumK" ,
TelemetryDogstatsdTags : [ ] string { "3N81zSUB" , "Xtj8AnXZ" } ,
TelemetryFilterDefault : true ,
2017-10-04 23:43:27 +00:00
TelemetryAllowedPrefixes : [ ] string { "oJotS8XJ" , "consul.consul" } ,
2017-09-25 18:40:42 +00:00
TelemetryBlockedPrefixes : [ ] string { "cazlEhGn" } ,
2017-09-27 00:49:55 +00:00
TelemetryMetricsPrefix : "ftO6DySn" ,
2017-09-25 18:40:42 +00:00
TelemetryStatsdAddr : "drce87cy" ,
TelemetryStatsiteAddr : "HpFwKB8R" ,
TLSCipherSuites : [ ] uint16 { tls . TLS_RSA_WITH_RC4_128_SHA , tls . TLS_RSA_WITH_3DES_EDE_CBC_SHA } ,
TLSMinVersion : "pAOWafkR" ,
TLSPreferServerCipherSuites : true ,
TaggedAddresses : map [ string ] string {
"7MYgHrYH" : "dALJAhLD" ,
"h6DdBy6K" : "ebrr9zZ8" ,
"lan" : "17.99.29.16" ,
"wan" : "78.63.37.19" ,
} ,
TranslateWANAddrs : true ,
UIDir : "11IFzAUn" ,
UnixSocketUser : "E0nB1DwA" ,
UnixSocketGroup : "8pFodrV8" ,
UnixSocketMode : "E8sAwOv4" ,
VerifyIncoming : true ,
VerifyIncomingHTTPS : true ,
VerifyIncomingRPC : true ,
VerifyOutgoing : true ,
VerifyServerHostname : true ,
Watches : [ ] map [ string ] interface { } {
map [ string ] interface { } {
"type" : "key" ,
"datacenter" : "GyE6jpeW" ,
"key" : "j9lF1Tve" ,
"handler" : "90N7S4LN" ,
} ,
2017-10-04 23:48:00 +00:00
map [ string ] interface { } {
"type" : "keyprefix" ,
"datacenter" : "fYrl3F5d" ,
"key" : "sl3Dffu7" ,
"args" : [ ] interface { } { "dltjDJ2a" , "flEa7C2d" } ,
} ,
2017-09-25 18:40:42 +00:00
} ,
}
warns := [ ] string {
` bootstrap_expect > 0: expecting 53 servers ` ,
}
// ensure that all fields are set to unique non-zero values
// todo(fs): This currently fails since ServiceDefinition.Check is not used
// todo(fs): not sure on how to work around this. Possible options are:
// todo(fs): * move first check into the Check field
// todo(fs): * ignore the Check field
// todo(fs): both feel like a hack
if err := nonZero ( "RuntimeConfig" , nil , want ) ; err != nil {
t . Log ( err )
}
for format , data := range src {
t . Run ( format , func ( t * testing . T ) {
// parse the flags since this is the only way we can set the
// DevMode flag
var flags Flags
fs := flag . NewFlagSet ( "" , flag . ContinueOnError )
AddFlags ( fs , & flags )
if err := fs . Parse ( flagSrc ) ; err != nil {
t . Fatalf ( "ParseFlags: %s" , err )
}
// ensure that all fields are set to unique non-zero values
// if err := nonZero("Config", nil, c); err != nil {
// t.Fatal(err)
// }
b , err := NewBuilder ( flags )
if err != nil {
t . Fatalf ( "NewBuilder: %s" , err )
}
2017-10-31 22:30:01 +00:00
b . Sources = append ( b . Sources , Source { Name : "full." + format , Data : data } )
2017-09-25 18:40:42 +00:00
b . Tail = append ( b . Tail , tail [ format ] ... )
b . Tail = append ( b . Tail , VersionSource ( "JNtPSav3" , "R909Hblt" , "ZT1JOQLn" ) )
// construct the runtime config
rt , err := b . Build ( )
if err != nil {
t . Fatalf ( "Build: %s" , err )
}
// verify that all fields are set
if ! verify . Values ( t , "runtime_config" , rt , want ) {
t . FailNow ( )
}
// at this point we have confirmed that the parsing worked
// for all fields but the validation will fail since certain
// combinations are not allowed. Since it is not possible to have
// all fields with non-zero values and to have a valid configuration
// we are patching a handful of safe fields to make validation pass.
rt . Bootstrap = false
rt . DevMode = false
rt . EnableUI = false
rt . SegmentName = ""
rt . Segments = nil
// validate the runtime config
if err := b . Validate ( rt ) ; err != nil {
t . Fatalf ( "Validate: %s" , err )
}
// check the warnings
if got , want := b . Warnings , warns ; ! verify . Values ( t , "warnings" , got , want ) {
t . FailNow ( )
}
} )
}
}
// nonZero verifies recursively that all fields are set to unique,
// non-zero and non-nil values.
//
// struct: check all fields recursively
// slice: check len > 0 and all values recursively
// ptr: check not nil
// bool: check not zero (cannot check uniqueness)
// string, int, uint: check not zero and unique
// other: error
func nonZero ( name string , uniq map [ interface { } ] string , v interface { } ) error {
if v == nil {
return fmt . Errorf ( "%q is nil" , name )
}
if uniq == nil {
uniq = map [ interface { } ] string { }
}
isUnique := func ( v interface { } ) error {
if other := uniq [ v ] ; other != "" {
return fmt . Errorf ( "%q and %q both use vaule %q" , name , other , v )
}
uniq [ v ] = name
return nil
}
val , typ := reflect . ValueOf ( v ) , reflect . TypeOf ( v )
// fmt.Printf("%s: %T\n", name, v)
switch typ . Kind ( ) {
case reflect . Struct :
for i := 0 ; i < typ . NumField ( ) ; i ++ {
f := typ . Field ( i )
fieldname := fmt . Sprintf ( "%s.%s" , name , f . Name )
err := nonZero ( fieldname , uniq , val . Field ( i ) . Interface ( ) )
if err != nil {
return err
}
}
case reflect . Slice :
if val . Len ( ) == 0 {
return fmt . Errorf ( "%q is empty slice" , name )
}
for i := 0 ; i < val . Len ( ) ; i ++ {
elemname := fmt . Sprintf ( "%s[%d]" , name , i )
err := nonZero ( elemname , uniq , val . Index ( i ) . Interface ( ) )
if err != nil {
return err
}
}
case reflect . Map :
if val . Len ( ) == 0 {
return fmt . Errorf ( "%q is empty map" , name )
}
for _ , key := range val . MapKeys ( ) {
keyname := fmt . Sprintf ( "%s[%s]" , name , key . String ( ) )
if err := nonZero ( keyname , uniq , key . Interface ( ) ) ; err != nil {
if strings . Contains ( err . Error ( ) , "is zero value" ) {
return fmt . Errorf ( "%q has zero value map key" , name )
}
return err
}
if err := nonZero ( keyname , uniq , val . MapIndex ( key ) . Interface ( ) ) ; err != nil {
return err
}
}
case reflect . Bool :
if val . Bool ( ) != true {
return fmt . Errorf ( "%q is zero value" , name )
}
// do not test bool for uniqueness since there are only two values
case reflect . String :
if val . Len ( ) == 0 {
return fmt . Errorf ( "%q is zero value" , name )
}
return isUnique ( v )
case reflect . Int , reflect . Int8 , reflect . Int16 , reflect . Int32 , reflect . Int64 :
if val . Int ( ) == 0 {
return fmt . Errorf ( "%q is zero value" , name )
}
return isUnique ( v )
case reflect . Uint , reflect . Uint8 , reflect . Uint16 , reflect . Uint32 , reflect . Uint64 :
if val . Uint ( ) == 0 {
return fmt . Errorf ( "%q is zero value" , name )
}
return isUnique ( v )
case reflect . Float32 , reflect . Float64 :
if val . Float ( ) == 0 {
return fmt . Errorf ( "%q is zero value" , name )
}
return isUnique ( v )
case reflect . Ptr :
if val . IsNil ( ) {
return fmt . Errorf ( "%q is nil" , name )
}
return nonZero ( "*" + name , uniq , val . Elem ( ) . Interface ( ) )
default :
return fmt . Errorf ( "%T is not supported" , v )
}
return nil
}
func TestNonZero ( t * testing . T ) {
var empty string
tests := [ ] struct {
desc string
v interface { }
err error
} {
{ "nil" , nil , errors . New ( ` "x" is nil ` ) } ,
{ "zero bool" , false , errors . New ( ` "x" is zero value ` ) } ,
{ "zero string" , "" , errors . New ( ` "x" is zero value ` ) } ,
{ "zero int" , int ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero int8" , int8 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero int16" , int16 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero int32" , int32 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero int64" , int64 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero uint" , uint ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero uint8" , uint8 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero uint16" , uint16 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero uint32" , uint32 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero uint64" , uint64 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero float32" , float32 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "zero float64" , float64 ( 0 ) , errors . New ( ` "x" is zero value ` ) } ,
{ "ptr to zero value" , & empty , errors . New ( ` "*x" is zero value ` ) } ,
{ "empty slice" , [ ] string { } , errors . New ( ` "x" is empty slice ` ) } ,
{ "slice with zero value" , [ ] string { "" } , errors . New ( ` "x[0]" is zero value ` ) } ,
{ "empty map" , map [ string ] string { } , errors . New ( ` "x" is empty map ` ) } ,
{ "map with zero value key" , map [ string ] string { "" : "y" } , errors . New ( ` "x" has zero value map key ` ) } ,
{ "map with zero value elem" , map [ string ] string { "y" : "" } , errors . New ( ` "x[y]" is zero value ` ) } ,
{ "struct with nil field" , struct { Y * int } { } , errors . New ( ` "x.Y" is nil ` ) } ,
{ "struct with zero value field" , struct { Y string } { } , errors . New ( ` "x.Y" is zero value ` ) } ,
{ "struct with empty array" , struct { Y [ ] string } { } , errors . New ( ` "x.Y" is empty slice ` ) } ,
}
for _ , tt := range tests {
t . Run ( tt . desc , func ( t * testing . T ) {
if got , want := nonZero ( "x" , nil , tt . v ) , tt . err ; ! reflect . DeepEqual ( got , want ) {
t . Fatalf ( "got error %v want %v" , got , want )
}
} )
}
}
func TestConfigDecodeBytes ( t * testing . T ) {
t . Parallel ( )
// Test with some input
src := [ ] byte ( "abc" )
key := base64 . StdEncoding . EncodeToString ( src )
result , err := decodeBytes ( key )
if err != nil {
t . Fatalf ( "err: %s" , err )
}
if ! bytes . Equal ( src , result ) {
t . Fatalf ( "bad: %#v" , result )
}
// Test with no input
result , err = decodeBytes ( "" )
if err != nil {
t . Fatalf ( "err: %s" , err )
}
if len ( result ) > 0 {
t . Fatalf ( "bad: %#v" , result )
}
}
func TestSanitize ( t * testing . T ) {
rt := RuntimeConfig {
2017-09-27 18:47:40 +00:00
BindAddr : & net . IPAddr { IP : net . ParseIP ( "127.0.0.1" ) } ,
SerfAdvertiseAddrLAN : & net . TCPAddr { IP : net . ParseIP ( "1.2.3.4" ) , Port : 5678 } ,
DNSAddrs : [ ] net . Addr {
& net . TCPAddr { IP : net . ParseIP ( "1.2.3.4" ) , Port : 5678 } ,
& net . UDPAddr { IP : net . ParseIP ( "1.2.3.4" ) , Port : 5678 } ,
} ,
HTTPAddrs : [ ] net . Addr {
& net . TCPAddr { IP : net . ParseIP ( "1.2.3.4" ) , Port : 5678 } ,
& net . UnixAddr { Name : "/var/run/foo" } ,
} ,
ConsulCoordinateUpdatePeriod : 15 * time . Second ,
2017-09-25 18:40:42 +00:00
RetryJoinLAN : [ ] string {
"foo=bar key=baz secret=boom bang=bar" ,
} ,
RetryJoinWAN : [ ] string {
"wan_foo=bar wan_key=baz wan_secret=boom wan_bang=bar" ,
} ,
2017-09-27 18:47:40 +00:00
Services : [ ] * structs . ServiceDefinition {
& structs . ServiceDefinition {
Name : "foo" ,
Token : "bar" ,
Check : structs . CheckType {
Name : "blurb" ,
} ,
} ,
2017-09-25 18:40:42 +00:00
} ,
2017-09-27 18:47:40 +00:00
Checks : [ ] * structs . CheckDefinition {
& structs . CheckDefinition {
Name : "zoo" ,
Token : "zope" ,
} ,
2017-09-25 18:40:42 +00:00
} ,
}
2017-09-27 18:47:40 +00:00
rtJSON := ` {
"ACLAgentMasterToken" : "hidden" ,
"ACLAgentToken" : "hidden" ,
"ACLDatacenter" : "" ,
"ACLDefaultPolicy" : "" ,
"ACLDisabledTTL" : "0s" ,
"ACLDownPolicy" : "" ,
2017-10-02 22:10:21 +00:00
"ACLEnableKeyListPolicy" : false ,
2017-09-27 18:47:40 +00:00
"ACLEnforceVersion8" : false ,
"ACLMasterToken" : "hidden" ,
"ACLReplicationToken" : "hidden" ,
"ACLTTL" : "0s" ,
"ACLToken" : "hidden" ,
"AEInterval" : "0s" ,
"AdvertiseAddrLAN" : "" ,
"AdvertiseAddrWAN" : "" ,
"AutopilotCleanupDeadServers" : false ,
"AutopilotDisableUpgradeMigration" : false ,
"AutopilotLastContactThreshold" : "0s" ,
"AutopilotMaxTrailingLogs" : 0 ,
"AutopilotRedundancyZoneTag" : "" ,
"AutopilotServerStabilizationTime" : "0s" ,
"AutopilotUpgradeVersionTag" : "" ,
"BindAddr" : "127.0.0.1" ,
"Bootstrap" : false ,
"BootstrapExpect" : 0 ,
"CAFile" : "" ,
"CAPath" : "" ,
"CertFile" : "" ,
"CheckDeregisterIntervalMin" : "0s" ,
"CheckReapInterval" : "0s" ,
"CheckUpdateInterval" : "0s" ,
"Checks" : [
{
"DeregisterCriticalServiceAfter" : "0s" ,
"DockerContainerID" : "" ,
2017-12-27 04:35:22 +00:00
"GRPC" : "" ,
2018-02-03 01:29:34 +00:00
"GRPCUseTLS" : false ,
2017-09-27 18:47:40 +00:00
"HTTP" : "" ,
"Header" : { } ,
"ID" : "" ,
"Interval" : "0s" ,
"Method" : "" ,
"Name" : "zoo" ,
"Notes" : "" ,
"Script" : "" ,
2017-10-04 23:48:00 +00:00
"ScriptArgs" : [ ] ,
2017-09-27 18:47:40 +00:00
"ServiceID" : "" ,
"Shell" : "" ,
"Status" : "" ,
"TCP" : "" ,
"TLSSkipVerify" : false ,
"TTL" : "0s" ,
"Timeout" : "0s" ,
"Token" : "hidden"
}
] ,
"ClientAddrs" : [ ] ,
"ConsulCoordinateUpdateBatchSize" : 0 ,
"ConsulCoordinateUpdateMaxBatches" : 0 ,
"ConsulCoordinateUpdatePeriod" : "15s" ,
"ConsulRaftElectionTimeout" : "0s" ,
"ConsulRaftHeartbeatTimeout" : "0s" ,
"ConsulRaftLeaderLeaseTimeout" : "0s" ,
"ConsulSerfLANGossipInterval" : "0s" ,
"ConsulSerfLANProbeInterval" : "0s" ,
"ConsulSerfLANProbeTimeout" : "0s" ,
"ConsulSerfLANSuspicionMult" : 0 ,
"ConsulSerfWANGossipInterval" : "0s" ,
"ConsulSerfWANProbeInterval" : "0s" ,
"ConsulSerfWANProbeTimeout" : "0s" ,
"ConsulSerfWANSuspicionMult" : 0 ,
"ConsulServerHealthInterval" : "0s" ,
2018-03-06 01:07:42 +00:00
"DNSARecordLimit" : 0 ,
2017-09-27 18:47:40 +00:00
"DNSAddrs" : [
"tcp://1.2.3.4:5678" ,
"udp://1.2.3.4:5678"
] ,
"DNSAllowStale" : false ,
"DNSDisableCompression" : false ,
"DNSDomain" : "" ,
"DNSEnableTruncate" : false ,
"DNSMaxStale" : "0s" ,
"DNSNodeTTL" : "0s" ,
"DNSOnlyPassing" : false ,
"DNSPort" : 0 ,
"DNSRecursorTimeout" : "0s" ,
"DNSRecursors" : [ ] ,
"DNSServiceTTL" : { } ,
"DNSUDPAnswerLimit" : 0 ,
"DataDir" : "" ,
"Datacenter" : "" ,
"DevMode" : false ,
"DisableAnonymousSignature" : false ,
"DisableCoordinates" : false ,
"DisableHostNodeID" : false ,
"DisableKeyringFile" : false ,
"DisableRemoteExec" : false ,
"DisableUpdateCheck" : false ,
2017-10-11 00:04:52 +00:00
"DiscardCheckOutput" : false ,
2017-09-27 18:47:40 +00:00
"EnableACLReplication" : false ,
2017-11-08 02:22:09 +00:00
"EnableAgentTLSForChecks" : false ,
2017-09-27 18:47:40 +00:00
"EnableDebug" : false ,
"EnableScriptChecks" : false ,
"EnableSyslog" : false ,
"EnableUI" : false ,
"EncryptKey" : "hidden" ,
"EncryptVerifyIncoming" : false ,
"EncryptVerifyOutgoing" : false ,
"HTTPAddrs" : [
"tcp://1.2.3.4:5678" ,
"unix:///var/run/foo"
] ,
"HTTPBlockEndpoints" : [ ] ,
"HTTPPort" : 0 ,
"HTTPResponseHeaders" : { } ,
"HTTPSAddrs" : [ ] ,
"HTTPSPort" : 0 ,
"KeyFile" : "hidden" ,
2017-10-10 22:19:50 +00:00
"LeaveDrainTime" : "0s" ,
2017-09-27 18:47:40 +00:00
"LeaveOnTerm" : false ,
"LogLevel" : "" ,
"NodeID" : "" ,
"NodeMeta" : { } ,
"NodeName" : "" ,
"NonVotingServer" : false ,
"PidFile" : "" ,
"RPCAdvertiseAddr" : "" ,
"RPCBindAddr" : "" ,
2017-10-10 22:19:50 +00:00
"RPCHoldTimeout" : "0s" ,
2017-09-27 18:47:40 +00:00
"RPCMaxBurst" : 0 ,
"RPCProtocol" : 0 ,
"RPCRateLimit" : 0 ,
"RaftProtocol" : 0 ,
"ReconnectTimeoutLAN" : "0s" ,
"ReconnectTimeoutWAN" : "0s" ,
"RejoinAfterLeave" : false ,
"RetryJoinIntervalLAN" : "0s" ,
"RetryJoinIntervalWAN" : "0s" ,
"RetryJoinLAN" : [
"foo=bar key=hidden secret=hidden bang=bar"
] ,
"RetryJoinMaxAttemptsLAN" : 0 ,
"RetryJoinMaxAttemptsWAN" : 0 ,
"RetryJoinWAN" : [
"wan_foo=bar wan_key=hidden wan_secret=hidden wan_bang=bar"
] ,
"Revision" : "" ,
"SegmentLimit" : 0 ,
"SegmentName" : "" ,
"SegmentNameLimit" : 0 ,
"Segments" : [ ] ,
"SerfAdvertiseAddrLAN" : "tcp://1.2.3.4:5678" ,
"SerfAdvertiseAddrWAN" : "" ,
"SerfBindAddrLAN" : "" ,
"SerfBindAddrWAN" : "" ,
"SerfPortLAN" : 0 ,
"SerfPortWAN" : 0 ,
"ServerMode" : false ,
"ServerName" : "" ,
"ServerPort" : 0 ,
"Services" : [
{
"Address" : "" ,
"Check" : {
"CheckID" : "" ,
"DeregisterCriticalServiceAfter" : "0s" ,
"DockerContainerID" : "" ,
2017-12-27 04:35:22 +00:00
"GRPC" : "" ,
2018-02-03 01:29:34 +00:00
"GRPCUseTLS" : false ,
2017-09-27 18:47:40 +00:00
"HTTP" : "" ,
"Header" : { } ,
"Interval" : "0s" ,
"Method" : "" ,
"Name" : "blurb" ,
"Notes" : "" ,
"Script" : "" ,
2017-10-04 23:48:00 +00:00
"ScriptArgs" : [ ] ,
2017-09-27 18:47:40 +00:00
"Shell" : "" ,
"Status" : "" ,
"TCP" : "" ,
"TLSSkipVerify" : false ,
"TTL" : "0s" ,
"Timeout" : "0s"
} ,
"Checks" : [ ] ,
"EnableTagOverride" : false ,
"ID" : "" ,
"Name" : "foo" ,
"Port" : 0 ,
"Tags" : [ ] ,
"Token" : "hidden"
}
] ,
"SessionTTLMin" : "0s" ,
"SkipLeaveOnInt" : false ,
"StartJoinAddrsLAN" : [ ] ,
"StartJoinAddrsWAN" : [ ] ,
"SyncCoordinateIntervalMin" : "0s" ,
"SyncCoordinateRateTarget" : 0 ,
"SyslogFacility" : "" ,
"TLSCipherSuites" : [ ] ,
"TLSMinVersion" : "" ,
"TLSPreferServerCipherSuites" : false ,
"TaggedAddresses" : { } ,
"TelemetryAllowedPrefixes" : [ ] ,
"TelemetryBlockedPrefixes" : [ ] ,
"TelemetryCirconusAPIApp" : "" ,
"TelemetryCirconusAPIToken" : "hidden" ,
"TelemetryCirconusAPIURL" : "" ,
"TelemetryCirconusBrokerID" : "" ,
"TelemetryCirconusBrokerSelectTag" : "" ,
"TelemetryCirconusCheckDisplayName" : "" ,
"TelemetryCirconusCheckForceMetricActivation" : "" ,
"TelemetryCirconusCheckID" : "" ,
"TelemetryCirconusCheckInstanceID" : "" ,
"TelemetryCirconusCheckSearchTag" : "" ,
"TelemetryCirconusCheckTags" : "" ,
"TelemetryCirconusSubmissionInterval" : "" ,
"TelemetryCirconusSubmissionURL" : "" ,
"TelemetryDisableHostname" : false ,
"TelemetryDogstatsdAddr" : "" ,
"TelemetryDogstatsdTags" : [ ] ,
"TelemetryFilterDefault" : false ,
"TelemetryMetricsPrefix" : "" ,
"TelemetryStatsdAddr" : "" ,
"TelemetryStatsiteAddr" : "" ,
"TranslateWANAddrs" : false ,
"UIDir" : "" ,
"UnixSocketGroup" : "" ,
"UnixSocketMode" : "" ,
"UnixSocketUser" : "" ,
"VerifyIncoming" : false ,
"VerifyIncomingHTTPS" : false ,
"VerifyIncomingRPC" : false ,
"VerifyOutgoing" : false ,
"VerifyServerHostname" : false ,
"Version" : "" ,
"VersionPrerelease" : "" ,
"Watches" : [ ]
} `
b , err := json . MarshalIndent ( rt . Sanitized ( ) , "" , " " )
if err != nil {
t . Fatal ( err )
}
if got , want := string ( b ) , rtJSON ; got != want {
dmp := diffmatchpatch . New ( )
diffs := dmp . DiffMain ( want , got , false )
t . Fatal ( dmp . DiffPrettyText ( diffs ) )
2017-09-25 18:40:42 +00:00
}
}
func splitIPPort ( hostport string ) ( net . IP , int ) {
h , p , err := net . SplitHostPort ( hostport )
if err != nil {
panic ( err )
}
port , err := strconv . Atoi ( p )
if err != nil {
panic ( err )
}
return net . ParseIP ( h ) , port
}
func ipAddr ( addr string ) * net . IPAddr {
return & net . IPAddr { IP : net . ParseIP ( addr ) }
}
func tcpAddr ( addr string ) * net . TCPAddr {
ip , port := splitIPPort ( addr )
return & net . TCPAddr { IP : ip , Port : port }
}
func udpAddr ( addr string ) * net . UDPAddr {
ip , port := splitIPPort ( addr )
return & net . UDPAddr { IP : ip , Port : port }
}
func unixAddr ( addr string ) * net . UnixAddr {
if ! strings . HasPrefix ( addr , "unix://" ) {
panic ( "not a unix socket addr: " + addr )
}
return & net . UnixAddr { Net : "unix" , Name : addr [ len ( "unix://" ) : ] }
}
func writeFile ( path string , data [ ] byte ) {
if err := os . MkdirAll ( filepath . Dir ( path ) , 0750 ) ; err != nil {
panic ( err )
}
if err := ioutil . WriteFile ( path , data , 0640 ) ; err != nil {
panic ( err )
}
}
2017-10-31 22:30:01 +00:00
func cleanDir ( path string ) {
root := path
err := filepath . Walk ( root , func ( path string , info os . FileInfo , err error ) error {
if path == root {
return nil
}
return os . RemoveAll ( path )
} )
if err != nil {
panic ( err )
}
}
2017-09-25 18:40:42 +00:00
func randomString ( n int ) string {
s := ""
for ; n > 0 ; n -- {
s += "x"
}
return s
}
func metaPairs ( n int , format string ) string {
var s [ ] string
for i := 0 ; i < n ; i ++ {
switch format {
case "json" :
s = append ( s , fmt . Sprintf ( ` "%d":"%d" ` , i , i ) )
case "hcl" :
s = append ( s , fmt . Sprintf ( ` "%d"="%d" ` , i , i ) )
default :
panic ( "invalid format: " + format )
}
}
switch format {
case "json" :
return strings . Join ( s , "," )
case "hcl" :
return strings . Join ( s , " " )
default :
panic ( "invalid format: " + format )
}
}