2023-02-13 19:18:05 +00:00
|
|
|
#!/usr/bin/env bats
|
|
|
|
|
|
|
|
load helpers
|
|
|
|
|
|
|
|
@test "api gateway proxy admin is up on :20000" {
|
|
|
|
retry_default curl -f -s localhost:20000/stats -o /dev/null
|
|
|
|
}
|
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
@test "api gateway should have been accepted and not conflicted" {
|
2023-02-13 19:18:05 +00:00
|
|
|
assert_config_entry_status Accepted True Accepted primary api-gateway api-gateway
|
|
|
|
assert_config_entry_status Conflicted False NoConflict primary api-gateway api-gateway
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "api gateway should have healthy endpoints for s1" {
|
|
|
|
assert_config_entry_status Bound True Bound primary http-route api-gateway-route-one
|
|
|
|
assert_upstream_has_endpoints_in_status 127.0.0.1:20000 s1 HEALTHY 1
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "api gateway should have healthy endpoints for s2" {
|
|
|
|
assert_config_entry_status Bound True Bound primary http-route api-gateway-route-two
|
|
|
|
assert_upstream_has_endpoints_in_status 127.0.0.1:20000 s2 HEALTHY 1
|
|
|
|
}
|
|
|
|
|
|
|
|
@test "api gateway should be able to connect to s1 via configured port" {
|
2023-03-06 13:41:57 +00:00
|
|
|
run retry_long curl -s -d hello localhost:9999
|
2023-02-13 19:18:05 +00:00
|
|
|
[ "$status" -eq 0 ]
|
2023-03-06 13:41:57 +00:00
|
|
|
[[ ! -z "$output" ]]
|
2023-02-13 19:18:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
@test "api gateway should get an intentions error connecting to s2 via configured port" {
|
|
|
|
run retry_default sh -c "curl -s localhost:9998 | grep RBAC"
|
|
|
|
[ "$status" -eq 0 ]
|
|
|
|
[[ "$output" == "RBAC: access denied" ]]
|
2023-05-19 18:50:59 +00:00
|
|
|
}
|