2013-12-23 21:52:10 +00:00
|
|
|
package agent
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
import (
|
|
|
|
"bytes"
|
2017-04-27 08:29:39 +00:00
|
|
|
"crypto/tls"
|
2014-02-07 19:49:51 +00:00
|
|
|
"encoding/base64"
|
|
|
|
"io/ioutil"
|
2015-06-05 11:44:42 +00:00
|
|
|
"net"
|
2014-02-07 19:49:51 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"reflect"
|
2015-01-05 20:30:03 +00:00
|
|
|
"strings"
|
2014-02-07 19:49:51 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
2016-01-29 19:42:34 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/lib"
|
2014-02-07 19:49:51 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestConfigEncryptBytes(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
// Test with some input
|
|
|
|
src := []byte("abc")
|
|
|
|
c := &Config{
|
|
|
|
EncryptKey: base64.StdEncoding.EncodeToString(src),
|
|
|
|
}
|
|
|
|
|
|
|
|
result, err := c.EncryptBytes()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(src, result) {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test with no input
|
|
|
|
c = &Config{}
|
|
|
|
result, err = c.EncryptBytes()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(result) > 0 {
|
|
|
|
t.Fatalf("bad: %#v", result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDecodeConfig(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
// Basics
|
|
|
|
input := `{"data_dir": "/tmp/", "log_level": "debug"}`
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.DataDir != "/tmp/" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LogLevel != "debug" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-04-13 05:05:38 +00:00
|
|
|
// Node info
|
|
|
|
input = `{"node_id": "bar", "disable_host_node_id": true, "node_name": "foo", "datacenter": "dc2"}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.NodeName != "foo" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-01-18 06:20:11 +00:00
|
|
|
if config.NodeID != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-04-13 05:05:38 +00:00
|
|
|
if config.DisableHostNodeID != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
if config.Datacenter != "dc2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2016-04-01 00:45:14 +00:00
|
|
|
if config.SkipLeaveOnInt != nil {
|
|
|
|
t.Fatalf("bad: expected nil SkipLeaveOnInt")
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
2016-09-01 06:39:11 +00:00
|
|
|
if config.LeaveOnTerm != nil {
|
|
|
|
t.Fatalf("bad: expected nil LeaveOnTerm")
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Server bootstrap
|
|
|
|
input = `{"server": true, "bootstrap": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.Server {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.Bootstrap {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-06-16 21:36:12 +00:00
|
|
|
// Expect bootstrap
|
2014-06-20 00:08:48 +00:00
|
|
|
input = `{"server": true, "bootstrap_expect": 3}`
|
2014-06-16 21:36:12 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.Server {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-06-20 00:08:48 +00:00
|
|
|
if config.BootstrapExpect != 3 {
|
2014-06-16 21:36:12 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
// DNS setup
|
2014-11-03 19:28:21 +00:00
|
|
|
input = `{"ports": {"dns": 8500}, "recursors": ["8.8.8.8","8.8.4.4"], "recursor":"127.0.0.1", "domain": "foobar"}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.Ports.DNS != 8500 {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-11-03 19:28:21 +00:00
|
|
|
if len(config.DNSRecursors) != 3 {
|
2014-10-31 19:19:41 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSRecursors[0] != "8.8.8.8" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSRecursors[1] != "8.8.4.4" {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-03 19:28:21 +00:00
|
|
|
if config.DNSRecursors[2] != "127.0.0.1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-02-07 19:49:51 +00:00
|
|
|
|
|
|
|
if config.Domain != "foobar" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// RPC configs
|
2017-02-28 21:41:09 +00:00
|
|
|
input = `{"ports": {"http": 1234, "https": 1243}, "client_addr": "0.0.0.0"}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.ClientAddr != "0.0.0.0" {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.Ports.HTTP != 1234 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-11-14 19:39:19 +00:00
|
|
|
if config.Ports.HTTPS != 1243 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-03-23 21:10:14 +00:00
|
|
|
// Deprecated RPC configs - TODO: remove this in a future release
|
|
|
|
input = `{"ports": {"rpc": 1234}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.Ports.RPC != 1234 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
// Serf configs
|
2014-04-11 22:46:55 +00:00
|
|
|
input = `{"ports": {"serf_lan": 1000, "serf_wan": 2000}}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.Ports.SerfLan != 1000 {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.Ports.SerfWan != 2000 {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Server addrs
|
2016-11-03 19:58:58 +00:00
|
|
|
input = `{"ports": {"server": 8000}, "bind_addr": "127.0.0.2", "advertise_addr": "127.0.0.3", "serf_lan_bind": "127.0.0.4", "serf_wan_bind": "52.54.55.56"}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
2016-11-03 19:58:58 +00:00
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.BindAddr != "127.0.0.2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2016-11-03 19:58:58 +00:00
|
|
|
if config.SerfWanBindAddr != "52.54.55.56" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.SerfLanBindAddr != "127.0.0.4" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.AdvertiseAddr != "127.0.0.3" {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-03-21 09:14:03 +00:00
|
|
|
if config.AdvertiseAddrWan != "" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:46:55 +00:00
|
|
|
if config.Ports.Server != 8000 {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-03-21 09:14:03 +00:00
|
|
|
// Advertise address for wan
|
|
|
|
input = `{"advertise_addr_wan": "127.0.0.5"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddr != "" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrWan != "127.0.0.5" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-06-05 11:44:42 +00:00
|
|
|
// Advertise addresses for serflan
|
|
|
|
input = `{"advertise_addrs": {"serf_lan": "127.0.0.5:1234"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.SerfLanRaw != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.SerfLan.String() != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Advertise addresses for serfwan
|
|
|
|
input = `{"advertise_addrs": {"serf_wan": "127.0.0.5:1234"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.SerfWanRaw != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.SerfWan.String() != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Advertise addresses for rpc
|
|
|
|
input = `{"advertise_addrs": {"rpc": "127.0.0.5:1234"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.RPCRaw != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AdvertiseAddrs.RPC.String() != "127.0.0.5:1234" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-12-24 00:07:27 +00:00
|
|
|
// WAN address translation disabled by default
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(`{}`)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.TranslateWanAddrs != false {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WAN address translation
|
|
|
|
input = `{"translate_wan_addrs": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.TranslateWanAddrs != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-02-23 21:08:40 +00:00
|
|
|
// raft protocol
|
|
|
|
input = `{"raft_protocol": 3}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.RaftProtocol != 3 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-01-05 22:10:26 +00:00
|
|
|
// Node metadata fields
|
|
|
|
input = `{"node_meta": {"thing1": "1", "thing2": "2"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if v, ok := config.Meta["thing1"]; !ok || v != "1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if v, ok := config.Meta["thing2"]; !ok || v != "2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
// leave_on_terminate
|
|
|
|
input = `{"leave_on_terminate": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-09-01 06:39:11 +00:00
|
|
|
if *config.LeaveOnTerm != true {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// skip_leave_on_interrupt
|
|
|
|
input = `{"skip_leave_on_interrupt": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-04-01 00:45:14 +00:00
|
|
|
if *config.SkipLeaveOnInt != true {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-03-20 00:49:57 +00:00
|
|
|
|
|
|
|
// enable_debug
|
|
|
|
input = `{"enable_debug": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.EnableDebug != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-04-07 19:50:42 +00:00
|
|
|
|
|
|
|
// TLS
|
2017-04-27 08:29:39 +00:00
|
|
|
input = `{"verify_incoming": true, "verify_outgoing": true, "verify_server_hostname": true, "tls_min_version": "tls12",
|
|
|
|
"tls_cipher_suites": "TLS_RSA_WITH_AES_256_CBC_SHA", "tls_prefer_server_cipher_suites": true}`
|
2014-04-07 19:50:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.VerifyIncoming != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.VerifyOutgoing != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-05-11 22:13:58 +00:00
|
|
|
if config.VerifyServerHostname != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-02-01 20:52:04 +00:00
|
|
|
if config.TLSMinVersion != "tls12" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2017-04-27 08:29:39 +00:00
|
|
|
if len(config.TLSCipherSuites) != 1 || config.TLSCipherSuites[0] != tls.TLS_RSA_WITH_AES_256_CBC_SHA {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.TLSPreferServerCipherSuites {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-07 19:50:42 +00:00
|
|
|
// TLS keys
|
2017-04-27 08:29:39 +00:00
|
|
|
input = `{"ca_file": "my/ca/file", "ca_path":"my/ca/path", "cert_file": "my.cert", "key_file": "key.pem", "server_name": "example.com"}`
|
2014-04-07 19:50:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.CAFile != "my/ca/file" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2017-04-27 08:29:39 +00:00
|
|
|
if config.CAPath != "my/ca/path" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-04-07 19:50:42 +00:00
|
|
|
if config.CertFile != "my.cert" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.KeyFile != "key.pem" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-06-13 18:10:27 +00:00
|
|
|
if config.ServerName != "example.com" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-04-12 00:03:19 +00:00
|
|
|
|
|
|
|
// Start join
|
|
|
|
input = `{"start_join": ["1.1.1.1", "2.2.2.2"]}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(config.StartJoin) != 2 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.StartJoin[0] != "1.1.1.1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.StartJoin[1] != "2.2.2.2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-04-23 19:36:49 +00:00
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// Start Join wan
|
|
|
|
input = `{"start_join_wan": ["1.1.1.1", "2.2.2.2"]}`
|
2014-11-14 15:02:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
if len(config.StartJoinWan) != 2 {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.StartJoinWan[0] != "1.1.1.1" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.StartJoinWan[1] != "2.2.2.2" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-10-12 18:20:33 +00:00
|
|
|
// Retry join
|
|
|
|
input = `{"retry_join": ["1.1.1.1", "2.2.2.2"]}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(config.RetryJoin) != 2 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryJoin[0] != "1.1.1.1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryJoin[1] != "2.2.2.2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retry interval
|
|
|
|
input = `{"retry_interval": "10s"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.RetryIntervalRaw != "10s" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryInterval.String() != "10s" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-10-12 19:40:52 +00:00
|
|
|
// Retry Max
|
|
|
|
input = `{"retry_max": 3}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.RetryMaxAttempts != 3 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// Retry Join wan
|
|
|
|
input = `{"retry_join_wan": ["1.1.1.1", "2.2.2.2"]}`
|
2014-11-14 15:02:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
if len(config.RetryJoinWan) != 2 {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.RetryJoinWan[0] != "1.1.1.1" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.RetryJoinWan[1] != "2.2.2.2" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// Retry Interval wan
|
|
|
|
input = `{"retry_interval_wan": "10s"}`
|
2014-11-14 15:02:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.RetryIntervalWanRaw != "10s" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.RetryIntervalWan.String() != "10s" {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// Retry Max wan
|
|
|
|
input = `{"retry_max_wan": 3}`
|
2014-11-14 15:02:42 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
if config.RetryMaxAttemptsWan != 3 {
|
2014-11-14 15:02:42 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2016-04-11 05:46:07 +00:00
|
|
|
// Reconnect timeout LAN and WAN
|
2016-04-11 06:31:16 +00:00
|
|
|
input = `{"reconnect_timeout": "8h", "reconnect_timeout_wan": "10h"}`
|
2016-04-11 05:46:07 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2016-04-11 06:31:16 +00:00
|
|
|
if config.ReconnectTimeoutLanRaw != "8h" ||
|
|
|
|
config.ReconnectTimeoutLan.String() != "8h0m0s" ||
|
|
|
|
config.ReconnectTimeoutWanRaw != "10h" ||
|
|
|
|
config.ReconnectTimeoutWan.String() != "10h0m0s" {
|
2016-04-11 05:46:07 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-04-11 06:31:16 +00:00
|
|
|
input = `{"reconnect_timeout": "7h"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("decode should have failed")
|
|
|
|
}
|
|
|
|
input = `{"reconnect_timeout_wan": "7h"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("decode should have failed")
|
|
|
|
}
|
2016-04-11 05:46:07 +00:00
|
|
|
|
2015-12-22 17:30:19 +00:00
|
|
|
// Static UI server
|
|
|
|
input = `{"ui": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2017-04-21 00:02:42 +00:00
|
|
|
if !config.EnableUI {
|
2015-12-22 17:30:19 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-04-23 19:36:49 +00:00
|
|
|
// UI Dir
|
|
|
|
input = `{"ui_dir": "/opt/consul-ui"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2017-04-21 00:02:42 +00:00
|
|
|
if config.UIDir != "/opt/consul-ui" {
|
2014-04-23 19:36:49 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-05-06 03:29:50 +00:00
|
|
|
|
|
|
|
// Pid File
|
|
|
|
input = `{"pid_file": "/tmp/consul/pid"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.PidFile != "/tmp/consul/pid" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-05-21 19:06:03 +00:00
|
|
|
|
|
|
|
// Syslog
|
2014-06-11 17:18:19 +00:00
|
|
|
input = `{"enable_syslog": true, "syslog_facility": "LOCAL4"}`
|
2014-05-21 19:06:03 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.EnableSyslog {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-06-11 17:18:19 +00:00
|
|
|
if config.SyslogFacility != "LOCAL4" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-05-21 19:32:24 +00:00
|
|
|
|
|
|
|
// Rejoin
|
|
|
|
input = `{"rejoin_after_leave": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.RejoinAfterLeave {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-06-08 22:26:33 +00:00
|
|
|
|
|
|
|
// DNS node ttl, max stale
|
2016-09-01 14:15:32 +00:00
|
|
|
input = `{"dns_config": {"allow_stale": false, "enable_truncate": false, "max_stale": "15s", "node_ttl": "5s", "only_passing": true, "udp_answer_limit": 6, "recursor_timeout": "7s"}}`
|
2014-06-08 22:26:33 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-08-30 20:40:43 +00:00
|
|
|
if *config.DNSConfig.AllowStale {
|
2016-03-30 06:06:17 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSConfig.EnableTruncate {
|
2014-06-08 22:26:33 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSConfig.MaxStale != 15*time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-03-30 06:06:17 +00:00
|
|
|
if config.DNSConfig.NodeTTL != 5*time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if !config.DNSConfig.OnlyPassing {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSConfig.UDPAnswerLimit != 6 {
|
2014-06-08 22:26:33 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-08-26 19:22:04 +00:00
|
|
|
if config.DNSConfig.RecursorTimeout != 7*time.Second {
|
2016-08-23 20:59:38 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
2014-06-08 22:26:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// DNS service ttl
|
|
|
|
input = `{"dns_config": {"service_ttl": {"*": "1s", "api": "10s", "web": "30s"}}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.DNSConfig.ServiceTTL["*"] != time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSConfig.ServiceTTL["api"] != 10*time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.DNSConfig.ServiceTTL["web"] != 30*time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-06-09 19:13:14 +00:00
|
|
|
|
2014-09-30 20:04:31 +00:00
|
|
|
// DNS enable truncate
|
|
|
|
input = `{"dns_config": {"enable_truncate": true}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.DNSConfig.EnableTruncate {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-01-10 12:11:32 +00:00
|
|
|
// DNS only passing
|
|
|
|
input = `{"dns_config": {"only_passing": true}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.DNSConfig.OnlyPassing {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2016-08-11 23:24:44 +00:00
|
|
|
// DNS disable compression
|
|
|
|
input = `{"dns_config": {"disable_compression": true}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.DNSConfig.DisableCompression {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-06-09 19:13:14 +00:00
|
|
|
// CheckUpdateInterval
|
|
|
|
input = `{"check_update_interval": "10m"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.CheckUpdateInterval != 10*time.Minute {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-05 18:05:55 +00:00
|
|
|
|
|
|
|
// ACLs
|
2016-12-14 07:21:14 +00:00
|
|
|
input = `{"acl_token": "1111", "acl_agent_master_token": "2222",
|
|
|
|
"acl_agent_token": "3333", "acl_datacenter": "dc2",
|
2014-08-05 22:20:35 +00:00
|
|
|
"acl_ttl": "60s", "acl_down_policy": "deny",
|
2016-08-03 05:04:11 +00:00
|
|
|
"acl_default_policy": "deny", "acl_master_token": "2345",
|
|
|
|
"acl_replication_token": "8675309"}`
|
2014-08-05 18:05:55 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-12-14 07:21:14 +00:00
|
|
|
if config.ACLToken != "1111" {
|
2014-08-05 18:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-12-14 07:21:14 +00:00
|
|
|
if config.ACLAgentMasterToken != "2222" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.ACLAgentToken != "3333" {
|
2014-08-05 18:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-05 22:36:08 +00:00
|
|
|
if config.ACLMasterToken != "2345" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-05 18:05:55 +00:00
|
|
|
if config.ACLDatacenter != "dc2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-05 22:20:35 +00:00
|
|
|
if config.ACLTTL != 60*time.Second {
|
2014-08-05 18:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.ACLDownPolicy != "deny" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-05 22:03:47 +00:00
|
|
|
if config.ACLDefaultPolicy != "deny" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-08-03 05:04:11 +00:00
|
|
|
if config.ACLReplicationToken != "8675309" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-19 21:19:31 +00:00
|
|
|
|
2016-12-11 19:24:44 +00:00
|
|
|
// ACL token precedence.
|
|
|
|
input = `{}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if token := config.GetTokenForAgent(); token != "" {
|
|
|
|
t.Fatalf("bad: %s", token)
|
|
|
|
}
|
|
|
|
input = `{"acl_token": "hello"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if token := config.GetTokenForAgent(); token != "hello" {
|
|
|
|
t.Fatalf("bad: %s", token)
|
|
|
|
}
|
|
|
|
input = `{"acl_agent_token": "world", "acl_token": "hello"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if token := config.GetTokenForAgent(); token != "world" {
|
|
|
|
t.Fatalf("bad: %s", token)
|
|
|
|
}
|
|
|
|
|
2016-12-02 03:14:08 +00:00
|
|
|
// ACL flag for Consul version 0.8 features (broken out since we will
|
2017-03-24 16:23:25 +00:00
|
|
|
// eventually remove this).
|
2016-12-02 03:14:08 +00:00
|
|
|
config = DefaultConfig()
|
2017-03-24 16:23:25 +00:00
|
|
|
if *config.ACLEnforceVersion8 != true {
|
2016-12-02 03:14:08 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
input = `{"acl_enforce_version_8": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if *config.ACLEnforceVersion8 != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-08-19 21:19:31 +00:00
|
|
|
// Watches
|
2014-08-21 18:52:36 +00:00
|
|
|
input = `{"watches": [{"type":"keyprefix", "prefix":"foo/", "handler":"foobar"}]}`
|
2014-08-19 21:19:31 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(config.Watches) != 1 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-21 18:52:36 +00:00
|
|
|
|
|
|
|
out := config.Watches[0]
|
|
|
|
exp := map[string]interface{}{
|
|
|
|
"type": "keyprefix",
|
|
|
|
"prefix": "foo/",
|
|
|
|
"handler": "foobar",
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(out, exp) {
|
2014-08-19 21:19:31 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-08-29 18:24:01 +00:00
|
|
|
|
2017-03-30 16:25:12 +00:00
|
|
|
// Remote exec is disabled by default.
|
|
|
|
config = DefaultConfig()
|
|
|
|
if *config.DisableRemoteExec != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test re-enabling remote exec.
|
|
|
|
input = `{"disable_remote_exec": false}`
|
2014-08-29 18:24:01 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2017-03-30 16:25:12 +00:00
|
|
|
if *config.DisableRemoteExec != false {
|
2014-08-29 18:24:01 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-09-02 18:26:08 +00:00
|
|
|
|
|
|
|
// stats(d|ite) exec
|
|
|
|
input = `{"statsite_addr": "127.0.0.1:7250", "statsd_addr": "127.0.0.1:7251"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.StatsiteAddr != "127.0.0.1:7250" {
|
2014-09-02 18:26:08 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.StatsdAddr != "127.0.0.1:7251" {
|
2014-09-02 18:26:08 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-09-02 19:42:14 +00:00
|
|
|
|
2015-06-16 22:05:55 +00:00
|
|
|
// dogstatsd
|
|
|
|
input = `{"dogstatsd_addr": "127.0.0.1:7254", "dogstatsd_tags":["tag_1:val_1", "tag_2:val_2"]}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.DogStatsdAddr != "127.0.0.1:7254" {
|
2015-06-16 22:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-10-08 19:45:45 +00:00
|
|
|
if len(config.Telemetry.DogStatsdTags) != 2 {
|
2015-06-16 22:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.DogStatsdTags[0] != "tag_1:val_1" {
|
2015-06-16 22:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.DogStatsdTags[1] != "tag_2:val_2" {
|
2015-06-16 22:05:55 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-05-03 23:46:20 +00:00
|
|
|
// Statsite prefix
|
|
|
|
input = `{"statsite_prefix": "my_prefix"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2015-10-08 19:45:45 +00:00
|
|
|
if config.Telemetry.StatsitePrefix != "my_prefix" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2016-07-18 13:34:43 +00:00
|
|
|
// Circonus settings
|
2016-07-19 22:46:57 +00:00
|
|
|
input = `{"telemetry": {"circonus_api_token": "12345678-1234-1234-12345678", "circonus_api_app": "testApp",
|
2016-07-18 19:46:11 +00:00
|
|
|
"circonus_api_url": "https://api.host.foo/v2", "circonus_submission_interval": "15s",
|
2016-07-18 13:34:43 +00:00
|
|
|
"circonus_submission_url": "https://submit.host.bar:123/one/two/three",
|
|
|
|
"circonus_check_id": "12345", "circonus_check_force_metric_activation": "true",
|
|
|
|
"circonus_check_instance_id": "a:b", "circonus_check_search_tag": "c:d",
|
2016-11-09 20:33:37 +00:00
|
|
|
"circonus_check_display_name": "node1:consul", "circonus_check_tags": "cat1:tag1,cat2:tag2",
|
2016-07-19 22:46:57 +00:00
|
|
|
"circonus_broker_id": "6789", "circonus_broker_select_tag": "e:f"} }`
|
2016-07-18 13:34:43 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusAPIToken != "12345678-1234-1234-12345678" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusAPIApp != "testApp" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusAPIURL != "https://api.host.foo/v2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-07-18 19:46:11 +00:00
|
|
|
if config.Telemetry.CirconusSubmissionInterval != "15s" {
|
2016-07-18 13:34:43 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckSubmissionURL != "https://submit.host.bar:123/one/two/three" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckID != "12345" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckForceMetricActivation != "true" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckInstanceID != "a:b" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckSearchTag != "c:d" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
2016-11-09 20:33:37 +00:00
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckDisplayName != "node1:consul" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusCheckTags != "cat1:tag1,cat2:tag2" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
2016-07-18 13:34:43 +00:00
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusBrokerID != "6789" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.CirconusBrokerSelectTag != "e:f" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-10-08 19:45:45 +00:00
|
|
|
// New telemetry
|
|
|
|
input = `{"telemetry": { "statsite_prefix": "my_prefix", "statsite_address": "127.0.0.1:7250", "statsd_address":"127.0.0.1:7251", "disable_hostname": true, "dogstatsd_addr": "1.1.1.1:111", "dogstatsd_tags": [ "tag_1:val_1" ] } }`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Telemetry.StatsitePrefix != "my_prefix" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.StatsiteAddr != "127.0.0.1:7250" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.StatsdAddr != "127.0.0.1:7251" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.DisableHostname != true {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.DogStatsdAddr != "1.1.1.1:111" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Telemetry.DogStatsdTags[0] != "tag_1:val_1" {
|
2015-05-03 23:46:20 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2014-09-02 19:42:14 +00:00
|
|
|
// Address overrides
|
2017-02-28 21:41:09 +00:00
|
|
|
input = `{"addresses": {"dns": "0.0.0.0", "http": "127.0.0.1", "https": "127.0.0.1"}}`
|
2014-09-02 19:42:14 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.Addresses.DNS != "0.0.0.0" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Addresses.HTTP != "127.0.0.1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-11-14 19:39:19 +00:00
|
|
|
if config.Addresses.HTTPS != "127.0.0.1" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-09-02 21:23:43 +00:00
|
|
|
|
2017-03-23 21:10:14 +00:00
|
|
|
// RPC Addresses - TODO: remove in a future release
|
|
|
|
input = `{"addresses": {"rpc": "1.2.3.4"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.Addresses.RPC != "1.2.3.4" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-01-20 22:32:15 +00:00
|
|
|
// Domain socket permissions
|
2015-01-21 00:50:21 +00:00
|
|
|
input = `{"unix_sockets": {"user": "500", "group": "500", "mode": "0700"}}`
|
2015-01-20 22:32:15 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-01-21 02:53:18 +00:00
|
|
|
if config.UnixSockets.Usr != "500" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.UnixSockets.Grp != "500" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.UnixSockets.Perms != "0700" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
2015-01-20 22:32:15 +00:00
|
|
|
}
|
|
|
|
|
2014-09-02 21:23:43 +00:00
|
|
|
// Disable updates
|
|
|
|
input = `{"disable_update_check": true, "disable_anonymous_signature": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !config.DisableUpdateCheck {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if !config.DisableAnonymousSignature {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2014-12-28 04:53:19 +00:00
|
|
|
|
|
|
|
// HTTP API response header fields
|
|
|
|
input = `{"http_api_response_headers": {"Access-Control-Allow-Origin": "*", "X-XSS-Protection": "1; mode=block"}}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.HTTPAPIResponseHeaders["Access-Control-Allow-Origin"] != "*" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.HTTPAPIResponseHeaders["X-XSS-Protection"] != "1; mode=block" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-02-05 01:19:01 +00:00
|
|
|
|
|
|
|
// Atlas configs
|
2015-08-27 18:08:01 +00:00
|
|
|
input = `{
|
|
|
|
"atlas_infrastructure": "hashicorp/prod",
|
|
|
|
"atlas_token": "abcdefg",
|
|
|
|
"atlas_acl_token": "123456789",
|
|
|
|
"atlas_join": true,
|
|
|
|
"atlas_endpoint": "foo.bar:1111"
|
|
|
|
}`
|
2015-02-05 01:19:01 +00:00
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2015-02-06 20:44:55 +00:00
|
|
|
if config.AtlasInfrastructure != "hashicorp/prod" {
|
2015-02-05 01:19:01 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AtlasToken != "abcdefg" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.AtlasACLToken != "123456789" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-02-05 02:45:08 +00:00
|
|
|
if !config.AtlasJoin {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-08-27 18:08:01 +00:00
|
|
|
if config.AtlasEndpoint != "foo.bar:1111" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2015-03-27 05:30:04 +00:00
|
|
|
|
2015-07-31 16:20:14 +00:00
|
|
|
// Coordinate disable
|
|
|
|
input = `{"disable_coordinates": true}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.DisableCoordinates != true {
|
|
|
|
t.Fatalf("bad: coordinates not disabled: %#v", config)
|
|
|
|
}
|
|
|
|
|
2015-03-27 05:30:04 +00:00
|
|
|
// SessionTTLMin
|
|
|
|
input = `{"session_ttl_min": "5s"}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.SessionTTLMin != 5*time.Second {
|
|
|
|
t.Fatalf("bad: %s %#v", config.SessionTTLMin.String(), config)
|
|
|
|
}
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
2015-01-05 20:30:03 +00:00
|
|
|
func TestDecodeConfig_invalidKeys(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2015-01-05 20:30:03 +00:00
|
|
|
input := `{"bad": "no way jose"}`
|
|
|
|
_, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "invalid keys") {
|
|
|
|
t.Fatalf("should have rejected invalid config keys")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-02 18:35:37 +00:00
|
|
|
func TestRetryJoinEC2(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2016-11-02 18:35:37 +00:00
|
|
|
input := `{"retry_join_ec2": {
|
2016-11-01 22:20:23 +00:00
|
|
|
"region": "us-east-1",
|
|
|
|
"tag_key": "ConsulRole",
|
|
|
|
"tag_value": "Server",
|
|
|
|
"access_key_id": "asdf",
|
|
|
|
"secret_access_key": "qwerty"
|
|
|
|
}}`
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-11-02 18:35:37 +00:00
|
|
|
if config.RetryJoinEC2.Region != "us-east-1" {
|
2016-11-01 22:20:23 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-11-02 18:35:37 +00:00
|
|
|
if config.RetryJoinEC2.TagKey != "ConsulRole" {
|
2016-11-01 22:20:23 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-11-02 18:35:37 +00:00
|
|
|
if config.RetryJoinEC2.TagValue != "Server" {
|
2016-11-01 22:20:23 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-11-02 18:35:37 +00:00
|
|
|
if config.RetryJoinEC2.AccessKeyID != "asdf" {
|
2016-11-01 22:20:23 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2016-11-02 18:35:37 +00:00
|
|
|
if config.RetryJoinEC2.SecretAccessKey != "qwerty" {
|
2016-11-01 22:20:23 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-05 08:07:53 +00:00
|
|
|
func TestRetryJoinGCE(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2016-12-05 08:07:53 +00:00
|
|
|
input := `{"retry_join_gce": {
|
|
|
|
"project_name": "test-project",
|
|
|
|
"zone_pattern": "us-west1-a",
|
|
|
|
"tag_value": "consul-server",
|
|
|
|
"credentials_file": "/path/to/foo.json"
|
|
|
|
}}`
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.RetryJoinGCE.ProjectName != "test-project" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryJoinGCE.ZonePattern != "us-west1-a" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryJoinGCE.TagValue != "consul-server" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.RetryJoinGCE.CredentialsFile != "/path/to/foo.json" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-25 00:33:53 +00:00
|
|
|
func TestDecodeConfig_Performance(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2016-08-25 00:33:53 +00:00
|
|
|
input := `{"performance": { "raft_multiplier": 3 }}`
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if config.Performance.RaftMultiplier != 3 {
|
|
|
|
t.Fatalf("bad: multiplier isn't set: %#v", config)
|
|
|
|
}
|
2016-08-25 22:36:05 +00:00
|
|
|
|
|
|
|
input = `{"performance": { "raft_multiplier": 11 }}`
|
|
|
|
config, err = DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "Performance.RaftMultiplier must be <=") {
|
|
|
|
t.Fatalf("bad: %v", err)
|
|
|
|
}
|
2016-08-25 00:33:53 +00:00
|
|
|
}
|
|
|
|
|
2017-02-22 20:53:32 +00:00
|
|
|
func TestDecodeConfig_Autopilot(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2017-03-01 22:04:40 +00:00
|
|
|
input := `{"autopilot": {
|
|
|
|
"cleanup_dead_servers": true,
|
|
|
|
"last_contact_threshold": "100ms",
|
|
|
|
"max_trailing_logs": 10,
|
2017-03-21 23:36:44 +00:00
|
|
|
"server_stabilization_time": "10s",
|
|
|
|
"redundancy_zone_tag": "az",
|
|
|
|
"disable_upgrade_migration": true
|
2017-03-01 22:04:40 +00:00
|
|
|
}}`
|
2017-02-22 20:53:32 +00:00
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
2017-02-28 22:23:14 +00:00
|
|
|
if config.Autopilot.CleanupDeadServers == nil || !*config.Autopilot.CleanupDeadServers {
|
2017-03-01 22:04:40 +00:00
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Autopilot.LastContactThreshold == nil || *config.Autopilot.LastContactThreshold != 100*time.Millisecond {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Autopilot.MaxTrailingLogs == nil || *config.Autopilot.MaxTrailingLogs != 10 {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Autopilot.ServerStabilizationTime == nil || *config.Autopilot.ServerStabilizationTime != 10*time.Second {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
2017-02-22 20:53:32 +00:00
|
|
|
}
|
2017-03-21 23:36:44 +00:00
|
|
|
if config.Autopilot.RedundancyZoneTag != "az" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
if config.Autopilot.DisableUpgradeMigration == nil || !*config.Autopilot.DisableUpgradeMigration {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
2017-02-22 20:53:32 +00:00
|
|
|
}
|
|
|
|
|
2014-10-24 02:22:25 +00:00
|
|
|
func TestDecodeConfig_Services(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-10-24 02:22:25 +00:00
|
|
|
input := `{
|
|
|
|
"services": [
|
|
|
|
{
|
|
|
|
"id": "red0",
|
|
|
|
"name": "redis",
|
|
|
|
"tags": [
|
|
|
|
"master"
|
|
|
|
],
|
|
|
|
"port": 6000,
|
|
|
|
"check": {
|
|
|
|
"script": "/bin/check_redis -p 6000",
|
|
|
|
"interval": "5s",
|
|
|
|
"ttl": "20s"
|
2015-01-14 01:52:17 +00:00
|
|
|
},
|
|
|
|
"checks": [
|
|
|
|
{
|
|
|
|
"script": "/bin/check_redis_read",
|
|
|
|
"interval": "1m"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"script": "/bin/check_redis_write",
|
|
|
|
"interval": "1m"
|
|
|
|
}
|
|
|
|
]
|
2014-10-24 02:22:25 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "red1",
|
|
|
|
"name": "redis",
|
|
|
|
"tags": [
|
|
|
|
"delayed",
|
|
|
|
"slave"
|
|
|
|
],
|
|
|
|
"port": 7000,
|
|
|
|
"check": {
|
|
|
|
"script": "/bin/check_redis -p 7000",
|
|
|
|
"interval": "30s",
|
|
|
|
"ttl": "60s"
|
|
|
|
}
|
2015-02-02 08:30:44 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "es0",
|
|
|
|
"name": "elasticsearch",
|
2015-02-06 07:29:04 +00:00
|
|
|
"port": 9200,
|
2015-02-02 08:30:44 +00:00
|
|
|
"check": {
|
2015-02-06 07:29:04 +00:00
|
|
|
"HTTP": "http://localhost:9200/_cluster_health",
|
2015-02-02 08:30:44 +00:00
|
|
|
"interval": "10s",
|
|
|
|
"timeout": "100ms"
|
|
|
|
}
|
2014-10-24 02:22:25 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}`
|
|
|
|
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-10-26 19:00:11 +00:00
|
|
|
expected := &Config{
|
|
|
|
Services: []*ServiceDefinition{
|
|
|
|
&ServiceDefinition{
|
|
|
|
Check: CheckType{
|
|
|
|
Interval: 5 * time.Second,
|
|
|
|
Script: "/bin/check_redis -p 6000",
|
|
|
|
TTL: 20 * time.Second,
|
|
|
|
},
|
2015-01-14 01:52:17 +00:00
|
|
|
Checks: CheckTypes{
|
|
|
|
&CheckType{
|
|
|
|
Interval: time.Minute,
|
|
|
|
Script: "/bin/check_redis_read",
|
|
|
|
},
|
|
|
|
&CheckType{
|
|
|
|
Interval: time.Minute,
|
|
|
|
Script: "/bin/check_redis_write",
|
|
|
|
},
|
|
|
|
},
|
2014-10-26 19:00:11 +00:00
|
|
|
ID: "red0",
|
|
|
|
Name: "redis",
|
|
|
|
Tags: []string{
|
|
|
|
"master",
|
|
|
|
},
|
|
|
|
Port: 6000,
|
|
|
|
},
|
|
|
|
&ServiceDefinition{
|
|
|
|
Check: CheckType{
|
|
|
|
Interval: 30 * time.Second,
|
|
|
|
Script: "/bin/check_redis -p 7000",
|
|
|
|
TTL: 60 * time.Second,
|
|
|
|
},
|
|
|
|
ID: "red1",
|
|
|
|
Name: "redis",
|
|
|
|
Tags: []string{
|
|
|
|
"delayed",
|
|
|
|
"slave",
|
|
|
|
},
|
|
|
|
Port: 7000,
|
|
|
|
},
|
2015-02-02 08:30:44 +00:00
|
|
|
&ServiceDefinition{
|
|
|
|
Check: CheckType{
|
|
|
|
HTTP: "http://localhost:9200/_cluster_health",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
Timeout: 100 * time.Millisecond,
|
|
|
|
},
|
|
|
|
ID: "es0",
|
|
|
|
Name: "elasticsearch",
|
|
|
|
Port: 9200,
|
|
|
|
},
|
2014-10-24 02:22:25 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2014-10-26 19:00:11 +00:00
|
|
|
if !reflect.DeepEqual(config, expected) {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
2014-10-24 02:22:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-01 17:20:45 +00:00
|
|
|
func TestDecodeConfig_verifyUniqueListeners(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2016-04-01 17:20:45 +00:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
cfg string
|
|
|
|
pass bool
|
|
|
|
}{
|
|
|
|
{
|
2017-02-28 21:41:09 +00:00
|
|
|
"http_dns1",
|
|
|
|
`{"addresses": {"http": "0.0.0.0", "dns": "127.0.0.1"}, "ports": {"dns": 8000}}`,
|
2016-04-01 17:20:45 +00:00
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
2017-02-28 21:41:09 +00:00
|
|
|
"http_dns IP identical",
|
|
|
|
`{"addresses": {"http": "0.0.0.0", "dns": "0.0.0.0"}, "ports": {"http": 8000, "dns": 8000}}`,
|
2016-04-01 17:20:45 +00:00
|
|
|
false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range tests {
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(test.cfg)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s %s", test.name, err)
|
|
|
|
}
|
|
|
|
|
2016-04-01 17:34:45 +00:00
|
|
|
err = config.verifyUniqueListeners()
|
|
|
|
if (err != nil && test.pass) || (err == nil && !test.pass) {
|
2016-04-01 17:20:45 +00:00
|
|
|
t.Errorf("err: %s should have %v: %v: %v", test.name, test.pass, test.cfg, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-26 20:11:25 +00:00
|
|
|
func TestDecodeConfig_Checks(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-10-26 20:11:25 +00:00
|
|
|
input := `{
|
|
|
|
"checks": [
|
|
|
|
{
|
|
|
|
"id": "chk1",
|
|
|
|
"name": "mem",
|
|
|
|
"script": "/bin/check_mem",
|
|
|
|
"interval": "5s"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "chk2",
|
|
|
|
"name": "cpu",
|
|
|
|
"script": "/bin/check_cpu",
|
|
|
|
"interval": "10s"
|
2015-01-14 01:52:17 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "chk3",
|
|
|
|
"name": "service:redis:tx",
|
|
|
|
"script": "/bin/check_redis_tx",
|
|
|
|
"interval": "1m",
|
|
|
|
"service_id": "redis"
|
2015-02-02 08:30:44 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "chk4",
|
|
|
|
"name": "service:elasticsearch:health",
|
2015-02-06 07:29:04 +00:00
|
|
|
"HTTP": "http://localhost:9200/_cluster_health",
|
2015-02-02 08:30:44 +00:00
|
|
|
"interval": "10s",
|
2015-02-06 07:29:04 +00:00
|
|
|
"timeout": "100ms",
|
2015-02-02 08:30:44 +00:00
|
|
|
"service_id": "elasticsearch"
|
2016-11-03 20:17:30 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "chk5",
|
|
|
|
"name": "service:sslservice",
|
|
|
|
"HTTP": "https://sslservice/status",
|
|
|
|
"interval": "10s",
|
|
|
|
"timeout": "100ms",
|
|
|
|
"service_id": "sslservice"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": "chk6",
|
|
|
|
"name": "service:insecure-sslservice",
|
|
|
|
"HTTP": "https://insecure-sslservice/status",
|
|
|
|
"interval": "10s",
|
|
|
|
"timeout": "100ms",
|
|
|
|
"service_id": "insecure-sslservice",
|
|
|
|
"tls_skip_verify": true
|
2014-10-26 20:11:25 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}`
|
|
|
|
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expected := &Config{
|
|
|
|
Checks: []*CheckDefinition{
|
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk1",
|
|
|
|
Name: "mem",
|
|
|
|
CheckType: CheckType{
|
|
|
|
Script: "/bin/check_mem",
|
|
|
|
Interval: 5 * time.Second,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk2",
|
|
|
|
Name: "cpu",
|
|
|
|
CheckType: CheckType{
|
|
|
|
Script: "/bin/check_cpu",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
},
|
|
|
|
},
|
2015-01-14 01:52:17 +00:00
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk3",
|
|
|
|
Name: "service:redis:tx",
|
|
|
|
ServiceID: "redis",
|
|
|
|
CheckType: CheckType{
|
|
|
|
Script: "/bin/check_redis_tx",
|
|
|
|
Interval: time.Minute,
|
|
|
|
},
|
|
|
|
},
|
2015-02-02 08:30:44 +00:00
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk4",
|
|
|
|
Name: "service:elasticsearch:health",
|
|
|
|
ServiceID: "elasticsearch",
|
|
|
|
CheckType: CheckType{
|
|
|
|
HTTP: "http://localhost:9200/_cluster_health",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
Timeout: 100 * time.Millisecond,
|
|
|
|
},
|
|
|
|
},
|
2016-11-03 20:17:30 +00:00
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk5",
|
|
|
|
Name: "service:sslservice",
|
|
|
|
ServiceID: "sslservice",
|
|
|
|
CheckType: CheckType{
|
|
|
|
HTTP: "https://sslservice/status",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
Timeout: 100 * time.Millisecond,
|
|
|
|
TLSSkipVerify: false,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk6",
|
|
|
|
Name: "service:insecure-sslservice",
|
|
|
|
ServiceID: "insecure-sslservice",
|
|
|
|
CheckType: CheckType{
|
|
|
|
HTTP: "https://insecure-sslservice/status",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
Timeout: 100 * time.Millisecond,
|
|
|
|
TLSSkipVerify: true,
|
|
|
|
},
|
|
|
|
},
|
2014-10-26 20:11:25 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(config, expected) {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDecodeConfig_Multiples(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-10-26 20:11:25 +00:00
|
|
|
input := `{
|
|
|
|
"services": [
|
|
|
|
{
|
|
|
|
"id": "red0",
|
|
|
|
"name": "redis",
|
|
|
|
"tags": [
|
|
|
|
"master"
|
|
|
|
],
|
|
|
|
"port": 6000,
|
|
|
|
"check": {
|
|
|
|
"script": "/bin/check_redis -p 6000",
|
|
|
|
"interval": "5s",
|
|
|
|
"ttl": "20s"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"checks": [
|
|
|
|
{
|
|
|
|
"id": "chk1",
|
|
|
|
"name": "mem",
|
|
|
|
"script": "/bin/check_mem",
|
|
|
|
"interval": "10s"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}`
|
|
|
|
|
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
expected := &Config{
|
|
|
|
Services: []*ServiceDefinition{
|
|
|
|
&ServiceDefinition{
|
|
|
|
Check: CheckType{
|
|
|
|
Interval: 5 * time.Second,
|
|
|
|
Script: "/bin/check_redis -p 6000",
|
|
|
|
TTL: 20 * time.Second,
|
|
|
|
},
|
|
|
|
ID: "red0",
|
|
|
|
Name: "redis",
|
|
|
|
Tags: []string{
|
|
|
|
"master",
|
|
|
|
},
|
|
|
|
Port: 6000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Checks: []*CheckDefinition{
|
|
|
|
&CheckDefinition{
|
|
|
|
ID: "chk1",
|
|
|
|
Name: "mem",
|
|
|
|
CheckType: CheckType{
|
|
|
|
Script: "/bin/check_mem",
|
|
|
|
Interval: 10 * time.Second,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(config, expected) {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
func TestDecodeConfig_Service(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
// Basics
|
2016-08-16 07:05:55 +00:00
|
|
|
input := `{"service": {"id": "red1", "name": "redis", "tags": ["master"], "port":8000, "check": {"script": "/bin/check_redis", "interval": "10s", "ttl": "15s", "DeregisterCriticalServiceAfter": "90m" }}}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(config.Services) != 1 {
|
|
|
|
t.Fatalf("missing service")
|
|
|
|
}
|
|
|
|
|
|
|
|
serv := config.Services[0]
|
|
|
|
if serv.ID != "red1" {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
|
|
|
if serv.Name != "redis" {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
2016-01-29 19:42:34 +00:00
|
|
|
if !lib.StrContains(serv.Tags, "master") {
|
2014-02-07 19:49:51 +00:00
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
|
|
|
if serv.Port != 8000 {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
|
|
|
if serv.Check.Script != "/bin/check_redis" {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
|
|
|
if serv.Check.Interval != 10*time.Second {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
|
|
|
|
|
|
|
if serv.Check.TTL != 15*time.Second {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
2016-08-16 07:05:55 +00:00
|
|
|
|
|
|
|
if serv.Check.DeregisterCriticalServiceAfter != 90*time.Minute {
|
|
|
|
t.Fatalf("bad: %v", serv)
|
|
|
|
}
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestDecodeConfig_Check(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
// Basics
|
2016-08-16 07:05:55 +00:00
|
|
|
input := `{"check": {"id": "chk1", "name": "mem", "notes": "foobar", "script": "/bin/check_redis", "interval": "10s", "ttl": "15s", "shell": "/bin/bash", "docker_container_id": "redis", "deregister_critical_service_after": "90s" }}`
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err := DecodeConfig(bytes.NewReader([]byte(input)))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(config.Checks) != 1 {
|
|
|
|
t.Fatalf("missing check")
|
|
|
|
}
|
|
|
|
|
|
|
|
chk := config.Checks[0]
|
|
|
|
if chk.ID != "chk1" {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
|
|
|
if chk.Name != "mem" {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
|
|
|
if chk.Notes != "foobar" {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
|
|
|
if chk.Script != "/bin/check_redis" {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
|
|
|
if chk.Interval != 10*time.Second {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
|
|
|
if chk.TTL != 15*time.Second {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
2015-10-22 22:29:13 +00:00
|
|
|
|
|
|
|
if chk.Shell != "/bin/bash" {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
|
|
|
|
2015-11-18 15:40:02 +00:00
|
|
|
if chk.DockerContainerID != "redis" {
|
2015-10-22 22:29:13 +00:00
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
2016-08-16 07:05:55 +00:00
|
|
|
|
|
|
|
if chk.DeregisterCriticalServiceAfter != 90*time.Second {
|
|
|
|
t.Fatalf("bad: %v", chk)
|
|
|
|
}
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestMergeConfig(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
a := &Config{
|
2014-06-09 20:00:32 +00:00
|
|
|
Bootstrap: false,
|
2014-06-20 00:08:48 +00:00
|
|
|
BootstrapExpect: 0,
|
2014-06-09 20:00:32 +00:00
|
|
|
Datacenter: "dc1",
|
|
|
|
DataDir: "/tmp/foo",
|
|
|
|
Domain: "basic",
|
|
|
|
LogLevel: "debug",
|
2017-01-18 06:20:11 +00:00
|
|
|
NodeID: "bar",
|
2014-06-09 20:00:32 +00:00
|
|
|
NodeName: "foo",
|
|
|
|
ClientAddr: "127.0.0.1",
|
|
|
|
BindAddr: "127.0.0.1",
|
|
|
|
AdvertiseAddr: "127.0.0.1",
|
|
|
|
Server: false,
|
2016-09-01 06:39:11 +00:00
|
|
|
LeaveOnTerm: new(bool),
|
2016-04-01 00:45:14 +00:00
|
|
|
SkipLeaveOnInt: new(bool),
|
2014-06-09 20:00:32 +00:00
|
|
|
EnableDebug: false,
|
|
|
|
CheckUpdateIntervalRaw: "8m",
|
2014-10-12 18:20:33 +00:00
|
|
|
RetryIntervalRaw: "10s",
|
2014-11-19 21:38:58 +00:00
|
|
|
RetryIntervalWanRaw: "10s",
|
2016-11-02 18:35:37 +00:00
|
|
|
RetryJoinEC2: RetryJoinEC2{
|
2016-11-01 22:20:23 +00:00
|
|
|
Region: "us-east-1",
|
|
|
|
TagKey: "Key1",
|
|
|
|
TagValue: "Value1",
|
|
|
|
AccessKeyID: "nope",
|
|
|
|
SecretAccessKey: "nope",
|
|
|
|
},
|
2015-10-08 19:45:45 +00:00
|
|
|
Telemetry: Telemetry{
|
|
|
|
DisableHostname: false,
|
|
|
|
StatsdAddr: "nope",
|
|
|
|
StatsiteAddr: "nope",
|
|
|
|
StatsitePrefix: "nope",
|
|
|
|
DogStatsdAddr: "nope",
|
|
|
|
DogStatsdTags: []string{"nope"},
|
|
|
|
},
|
2017-01-05 22:10:26 +00:00
|
|
|
Meta: map[string]string{
|
|
|
|
"key": "value1",
|
|
|
|
},
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
b := &Config{
|
2016-08-25 00:33:53 +00:00
|
|
|
Performance: Performance{
|
|
|
|
RaftMultiplier: 99,
|
|
|
|
},
|
2014-06-20 00:08:48 +00:00
|
|
|
Bootstrap: true,
|
|
|
|
BootstrapExpect: 3,
|
|
|
|
Datacenter: "dc2",
|
|
|
|
DataDir: "/tmp/bar",
|
2014-10-31 19:19:41 +00:00
|
|
|
DNSRecursors: []string{"127.0.0.2:1001"},
|
2014-06-08 22:35:15 +00:00
|
|
|
DNSConfig: DNSConfig{
|
2016-08-30 20:40:43 +00:00
|
|
|
AllowStale: Bool(false),
|
2016-08-11 23:24:44 +00:00
|
|
|
EnableTruncate: true,
|
|
|
|
DisableCompression: true,
|
|
|
|
MaxStale: 30 * time.Second,
|
|
|
|
NodeTTL: 10 * time.Second,
|
2014-06-08 22:35:15 +00:00
|
|
|
ServiceTTL: map[string]time.Duration{
|
|
|
|
"api": 10 * time.Second,
|
|
|
|
},
|
2016-09-02 04:53:33 +00:00
|
|
|
UDPAnswerLimit: 4,
|
|
|
|
RecursorTimeout: 30 * time.Second,
|
2014-06-08 22:35:15 +00:00
|
|
|
},
|
2017-04-13 05:05:38 +00:00
|
|
|
Domain: "other",
|
|
|
|
LogLevel: "info",
|
|
|
|
NodeID: "bar",
|
|
|
|
DisableHostNodeID: true,
|
|
|
|
NodeName: "baz",
|
|
|
|
ClientAddr: "127.0.0.2",
|
|
|
|
BindAddr: "127.0.0.2",
|
|
|
|
AdvertiseAddr: "127.0.0.2",
|
|
|
|
AdvertiseAddrWan: "127.0.0.2",
|
2014-04-11 22:46:55 +00:00
|
|
|
Ports: PortConfig{
|
|
|
|
DNS: 1,
|
|
|
|
HTTP: 2,
|
|
|
|
SerfLan: 4,
|
|
|
|
SerfWan: 5,
|
|
|
|
Server: 6,
|
2014-11-14 19:39:19 +00:00
|
|
|
HTTPS: 7,
|
2014-04-11 22:46:55 +00:00
|
|
|
},
|
2014-09-02 19:42:14 +00:00
|
|
|
Addresses: AddressConfig{
|
2014-11-14 19:39:19 +00:00
|
|
|
DNS: "127.0.0.1",
|
|
|
|
HTTP: "127.0.0.2",
|
|
|
|
HTTPS: "127.0.0.4",
|
2014-09-02 19:42:14 +00:00
|
|
|
},
|
2017-02-24 04:32:13 +00:00
|
|
|
Server: true,
|
|
|
|
LeaveOnTerm: Bool(true),
|
|
|
|
SkipLeaveOnInt: Bool(true),
|
|
|
|
RaftProtocol: 3,
|
|
|
|
Autopilot: Autopilot{
|
2017-03-01 22:04:40 +00:00
|
|
|
CleanupDeadServers: Bool(true),
|
|
|
|
LastContactThreshold: Duration(time.Duration(10)),
|
|
|
|
MaxTrailingLogs: Uint64(10),
|
|
|
|
ServerStabilizationTime: Duration(time.Duration(100)),
|
2017-02-22 20:53:32 +00:00
|
|
|
},
|
2014-06-09 20:00:32 +00:00
|
|
|
EnableDebug: true,
|
|
|
|
VerifyIncoming: true,
|
|
|
|
VerifyOutgoing: true,
|
|
|
|
CAFile: "test/ca.pem",
|
|
|
|
CertFile: "test/cert.pem",
|
|
|
|
KeyFile: "test/key.pem",
|
2017-02-01 20:52:04 +00:00
|
|
|
TLSMinVersion: "tls12",
|
2014-06-09 20:00:32 +00:00
|
|
|
Checks: []*CheckDefinition{nil},
|
|
|
|
Services: []*ServiceDefinition{nil},
|
|
|
|
StartJoin: []string{"1.1.1.1"},
|
2014-11-17 22:14:59 +00:00
|
|
|
StartJoinWan: []string{"1.1.1.1"},
|
2017-04-21 00:02:42 +00:00
|
|
|
EnableUI: true,
|
|
|
|
UIDir: "/opt/consul-ui",
|
2014-06-09 20:00:32 +00:00
|
|
|
EnableSyslog: true,
|
|
|
|
RejoinAfterLeave: true,
|
2014-10-12 18:20:33 +00:00
|
|
|
RetryJoin: []string{"1.1.1.1"},
|
|
|
|
RetryIntervalRaw: "10s",
|
|
|
|
RetryInterval: 10 * time.Second,
|
2014-11-17 22:14:59 +00:00
|
|
|
RetryJoinWan: []string{"1.1.1.1"},
|
|
|
|
RetryIntervalWanRaw: "10s",
|
|
|
|
RetryIntervalWan: 10 * time.Second,
|
2016-04-11 06:31:16 +00:00
|
|
|
ReconnectTimeoutLanRaw: "24h",
|
|
|
|
ReconnectTimeoutLan: 24 * time.Hour,
|
|
|
|
ReconnectTimeoutWanRaw: "36h",
|
|
|
|
ReconnectTimeoutWan: 36 * time.Hour,
|
2014-06-09 20:00:32 +00:00
|
|
|
CheckUpdateInterval: 8 * time.Minute,
|
|
|
|
CheckUpdateIntervalRaw: "8m",
|
2016-12-14 07:21:14 +00:00
|
|
|
ACLToken: "1111",
|
|
|
|
ACLAgentMasterToken: "2222",
|
|
|
|
ACLAgentToken: "3333",
|
|
|
|
ACLMasterToken: "4444",
|
2014-08-05 18:05:55 +00:00
|
|
|
ACLDatacenter: "dc2",
|
2014-08-05 22:03:47 +00:00
|
|
|
ACLTTL: 15 * time.Second,
|
|
|
|
ACLTTLRaw: "15s",
|
2014-08-05 18:05:55 +00:00
|
|
|
ACLDownPolicy: "deny",
|
2014-08-05 22:03:47 +00:00
|
|
|
ACLDefaultPolicy: "deny",
|
2016-08-03 05:04:11 +00:00
|
|
|
ACLReplicationToken: "8765309",
|
2016-12-02 03:14:08 +00:00
|
|
|
ACLEnforceVersion8: Bool(true),
|
2014-08-21 18:52:36 +00:00
|
|
|
Watches: []map[string]interface{}{
|
|
|
|
map[string]interface{}{
|
|
|
|
"type": "keyprefix",
|
|
|
|
"prefix": "foo/",
|
|
|
|
"handler": "foobar",
|
|
|
|
},
|
|
|
|
},
|
2017-03-30 16:25:12 +00:00
|
|
|
DisableRemoteExec: Bool(true),
|
2015-10-08 19:45:45 +00:00
|
|
|
Telemetry: Telemetry{
|
|
|
|
StatsiteAddr: "127.0.0.1:7250",
|
|
|
|
StatsitePrefix: "stats_prefix",
|
|
|
|
StatsdAddr: "127.0.0.1:7251",
|
|
|
|
DisableHostname: true,
|
|
|
|
DogStatsdAddr: "127.0.0.1:7254",
|
|
|
|
DogStatsdTags: []string{"tag_1:val_1", "tag_2:val_2"},
|
|
|
|
},
|
2017-01-05 22:10:26 +00:00
|
|
|
Meta: map[string]string{
|
|
|
|
"key": "value2",
|
|
|
|
},
|
2014-09-02 21:23:43 +00:00
|
|
|
DisableUpdateCheck: true,
|
|
|
|
DisableAnonymousSignature: true,
|
2014-12-28 04:53:19 +00:00
|
|
|
HTTPAPIResponseHeaders: map[string]string{
|
|
|
|
"Access-Control-Allow-Origin": "*",
|
|
|
|
},
|
2015-01-21 02:53:18 +00:00
|
|
|
UnixSockets: UnixSocketConfig{
|
2015-01-21 04:30:59 +00:00
|
|
|
UnixSocketPermissions{
|
|
|
|
Usr: "500",
|
|
|
|
Grp: "500",
|
|
|
|
Perms: "0700",
|
|
|
|
},
|
2015-01-20 22:32:15 +00:00
|
|
|
},
|
2015-02-06 20:44:55 +00:00
|
|
|
AtlasInfrastructure: "hashicorp/prod",
|
|
|
|
AtlasToken: "123456789",
|
|
|
|
AtlasACLToken: "abcdefgh",
|
|
|
|
AtlasJoin: true,
|
2016-11-02 18:35:37 +00:00
|
|
|
RetryJoinEC2: RetryJoinEC2{
|
2016-11-01 22:20:23 +00:00
|
|
|
Region: "us-east-2",
|
|
|
|
TagKey: "Key2",
|
|
|
|
TagValue: "Value2",
|
|
|
|
AccessKeyID: "foo",
|
|
|
|
SecretAccessKey: "bar",
|
|
|
|
},
|
|
|
|
SessionTTLMinRaw: "1000s",
|
|
|
|
SessionTTLMin: 1000 * time.Second,
|
2015-06-05 11:44:42 +00:00
|
|
|
AdvertiseAddrs: AdvertiseAddrsConfig{
|
|
|
|
SerfLan: &net.TCPAddr{},
|
|
|
|
SerfLanRaw: "127.0.0.5:1231",
|
|
|
|
SerfWan: &net.TCPAddr{},
|
|
|
|
SerfWanRaw: "127.0.0.5:1232",
|
|
|
|
RPC: &net.TCPAddr{},
|
|
|
|
RPCRaw: "127.0.0.5:1233",
|
|
|
|
},
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c := MergeConfig(a, b)
|
|
|
|
|
|
|
|
if !reflect.DeepEqual(c, b) {
|
2014-11-19 21:38:58 +00:00
|
|
|
t.Fatalf("should be equal %#v %#v", c, b)
|
2014-02-07 19:49:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadConfigPaths_badPath(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
_, err := ReadConfigPaths([]string{"/i/shouldnt/exist/ever/rainbows"})
|
|
|
|
if err == nil {
|
|
|
|
t.Fatal("should have err")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadConfigPaths_file(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
tf, err := ioutil.TempFile("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
tf.Write([]byte(`{"node_name":"bar"}`))
|
|
|
|
tf.Close()
|
|
|
|
defer os.Remove(tf.Name())
|
|
|
|
|
|
|
|
config, err := ReadConfigPaths([]string{tf.Name()})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.NodeName != "bar" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadConfigPaths_dir(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2014-02-07 19:49:51 +00:00
|
|
|
td, err := ioutil.TempDir("", "consul")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(td)
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(filepath.Join(td, "a.json"),
|
|
|
|
[]byte(`{"node_name": "bar"}`), 0644)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(filepath.Join(td, "b.json"),
|
|
|
|
[]byte(`{"node_name": "baz"}`), 0644)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A non-json file, shouldn't be read
|
|
|
|
err = ioutil.WriteFile(filepath.Join(td, "c"),
|
|
|
|
[]byte(`{"node_name": "bad"}`), 0644)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-02-09 15:49:41 +00:00
|
|
|
// An empty file shouldn't be read
|
|
|
|
err = ioutil.WriteFile(filepath.Join(td, "d.json"),
|
|
|
|
[]byte{}, 0664)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-02-07 19:49:51 +00:00
|
|
|
config, err := ReadConfigPaths([]string{td})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.NodeName != "baz" {
|
|
|
|
t.Fatalf("bad: %#v", config)
|
|
|
|
}
|
|
|
|
}
|
2015-01-13 17:24:52 +00:00
|
|
|
|
|
|
|
func TestUnixSockets(t *testing.T) {
|
2017-04-27 00:40:40 +00:00
|
|
|
t.Parallel()
|
2015-01-16 01:24:15 +00:00
|
|
|
path1, ok := unixSocketAddr("unix:///path/to/socket")
|
|
|
|
if !ok || path1 != "/path/to/socket" {
|
|
|
|
t.Fatalf("bad: %v %v", ok, path1)
|
2015-01-13 17:24:52 +00:00
|
|
|
}
|
|
|
|
|
2015-01-16 01:24:15 +00:00
|
|
|
path2, ok := unixSocketAddr("notunix://blah")
|
|
|
|
if ok || path2 != "" {
|
|
|
|
t.Fatalf("bad: %v %v", ok, path2)
|
2015-01-13 17:50:17 +00:00
|
|
|
}
|
2015-01-13 17:24:52 +00:00
|
|
|
}
|