mirror of
https://github.com/status-im/consul.git
synced 2025-01-17 17:22:17 +00:00
[NET-10733] fix generation of xds resources (#21603)
fix generation of xds resources
This commit is contained in:
parent
a570858a35
commit
8555404662
@ -445,25 +445,25 @@ func getConnectProxyTransparentProxyGoldenTestCases() []goldenTestCase {
|
||||
}
|
||||
|
||||
func getConnectProxyDiscoChainTests(enterprise bool) []goldenTestCase {
|
||||
return []goldenTestCase{
|
||||
cases := []goldenTestCase{
|
||||
{
|
||||
name: "connect-proxy-with-chain",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "simple", false, nil, nil)
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "simple", enterprise, nil, nil)
|
||||
},
|
||||
alsoRunTestForV2: true,
|
||||
},
|
||||
{
|
||||
name: "connect-proxy-with-chain-external-sni",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "external-sni", false, nil, nil)
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "external-sni", enterprise, nil, nil)
|
||||
},
|
||||
alsoRunTestForV2: true,
|
||||
},
|
||||
{
|
||||
name: "connect-proxy-with-chain-and-failover",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "failover", false, nil, nil)
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "failover", enterprise, nil, nil)
|
||||
},
|
||||
alsoRunTestForV2: true,
|
||||
},
|
||||
@ -487,8 +487,7 @@ func getConnectProxyDiscoChainTests(enterprise bool) []goldenTestCase {
|
||||
name: "custom-upstream-default-chain",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "default", enterprise, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
})
|
||||
}, nil)
|
||||
@ -602,8 +601,7 @@ func getConnectProxyDiscoChainTests(enterprise bool) []goldenTestCase {
|
||||
name: "connect-proxy-with-default-chain-and-custom-cluster",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "default", enterprise, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
})
|
||||
}, nil)
|
||||
@ -667,8 +665,7 @@ func getConnectProxyDiscoChainTests(enterprise bool) []goldenTestCase {
|
||||
|
||||
uid := proxycfg.NewUpstreamID(&ns.Proxy.Upstreams[i])
|
||||
|
||||
ns.Proxy.Upstreams[i].Config["envoy_listener_json"] =
|
||||
customListenerJSON(t, customListenerJSONOptions{
|
||||
ns.Proxy.Upstreams[i].Config["envoy_listener_json"] = customListenerJSON(t, customListenerJSONOptions{
|
||||
Name: uid.EnvoyID() + ":custom-upstream",
|
||||
})
|
||||
}
|
||||
@ -731,6 +728,14 @@ func getConnectProxyDiscoChainTests(enterprise bool) []goldenTestCase {
|
||||
alsoRunTestForV2: true,
|
||||
},
|
||||
}
|
||||
|
||||
if enterprise {
|
||||
for i := range cases {
|
||||
cases[i].name = "enterprise-" + cases[i].name
|
||||
}
|
||||
}
|
||||
|
||||
return cases
|
||||
}
|
||||
|
||||
func getMeshGatewayGoldenTestCases() []goldenTestCase {
|
||||
@ -896,6 +901,7 @@ func getMeshGatewayGoldenTestCases() []goldenTestCase {
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func getMeshGatewayPeeringGoldenTestCases() []goldenTestCase {
|
||||
return []goldenTestCase{
|
||||
{
|
||||
@ -1426,7 +1432,6 @@ func getAPIGatewayGoldenTestCases(t *testing.T) []goldenTestCase {
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
}, []structs.BoundRoute{
|
||||
&structs.TCPRouteConfigEntry{
|
||||
Name: "tcp-route",
|
||||
@ -1596,7 +1601,8 @@ func getAPIGatewayGoldenTestCases(t *testing.T) []goldenTestCase {
|
||||
{Kind: structs.HTTPRoute, Name: "backend-route"},
|
||||
{Kind: structs.HTTPRoute, Name: "frontend-route"},
|
||||
{Kind: structs.HTTPRoute, Name: "generic-route"},
|
||||
}},
|
||||
},
|
||||
},
|
||||
}
|
||||
},
|
||||
[]structs.BoundRoute{
|
||||
@ -1735,8 +1741,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
name: "custom-upstream-default-chain",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "default", enterprise, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
})
|
||||
}, nil)
|
||||
@ -1748,8 +1753,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
name: "custom-local-app",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["envoy_local_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Config["envoy_local_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "mylocal",
|
||||
})
|
||||
}, nil)
|
||||
@ -1761,8 +1765,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
name: "custom-upstream",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
})
|
||||
}, nil)
|
||||
@ -1775,8 +1778,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
overrideGoldenName: "custom-upstream", // should be the same
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
// Attempt to override the TLS context should be ignored
|
||||
TLSContext: `"allowRenegotiation": false`,
|
||||
@ -1791,7 +1793,6 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
for i := range ns.Proxy.Upstreams {
|
||||
|
||||
switch ns.Proxy.Upstreams[i].DestinationName {
|
||||
case "db":
|
||||
if ns.Proxy.Upstreams[i].Config == nil {
|
||||
@ -1803,8 +1804,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
// Triggers an override with the presence of the escape hatch listener
|
||||
ns.Proxy.Upstreams[i].DestinationType = structs.UpstreamDestTypePreparedQuery
|
||||
|
||||
ns.Proxy.Upstreams[i].Config["envoy_cluster_json"] =
|
||||
customClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[i].Config["envoy_cluster_json"] = customClusterJSON(t, customClusterJSONOptions{
|
||||
Name: uid.EnvoyID() + ":custom-upstream",
|
||||
})
|
||||
|
||||
@ -1936,8 +1936,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
name: "connect-proxy-with-default-chain-and-custom-cluster",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshotDiscoveryChain(t, "default", enterprise, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] =
|
||||
customAppClusterJSON(t, customClusterJSONOptions{
|
||||
ns.Proxy.Upstreams[0].Config["envoy_cluster_json"] = customAppClusterJSON(t, customClusterJSONOptions{
|
||||
Name: "myservice",
|
||||
})
|
||||
}, nil)
|
||||
@ -1949,8 +1948,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
name: "custom-public-listener",
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["envoy_public_listener_json"] =
|
||||
customListenerJSON(t, customListenerJSONOptions{
|
||||
ns.Proxy.Config["envoy_public_listener_json"] = customListenerJSON(t, customListenerJSONOptions{
|
||||
Name: "custom-public-listen",
|
||||
})
|
||||
}, nil)
|
||||
@ -1961,8 +1959,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["protocol"] = "http"
|
||||
ns.Proxy.Config["envoy_public_listener_json"] =
|
||||
customHTTPListenerJSON(t, customHTTPListenerJSONOptions{
|
||||
ns.Proxy.Config["envoy_public_listener_json"] = customHTTPListenerJSON(t, customHTTPListenerJSONOptions{
|
||||
Name: "custom-public-listen",
|
||||
})
|
||||
}, nil)
|
||||
@ -1973,8 +1970,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["protocol"] = "http"
|
||||
ns.Proxy.Config["envoy_public_listener_json"] =
|
||||
customHTTPListenerJSON(t, customHTTPListenerJSONOptions{
|
||||
ns.Proxy.Config["envoy_public_listener_json"] = customHTTPListenerJSON(t, customHTTPListenerJSONOptions{
|
||||
Name: "custom-public-listen",
|
||||
HTTPConnectionManagerName: httpConnectionManagerNewName,
|
||||
})
|
||||
@ -1986,8 +1982,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["protocol"] = "http"
|
||||
ns.Proxy.Config["envoy_public_listener_json"] =
|
||||
customListenerJSON(t, customListenerJSONOptions{
|
||||
ns.Proxy.Config["envoy_public_listener_json"] = customListenerJSON(t, customListenerJSONOptions{
|
||||
Name: "custom-public-listen",
|
||||
})
|
||||
}, nil)
|
||||
@ -1998,8 +1993,7 @@ func getCustomConfigurationGoldenTestCases(enterprise bool) []goldenTestCase {
|
||||
overrideGoldenName: "custom-public-listener", // should be the same
|
||||
create: func(t testinf.T) *proxycfg.ConfigSnapshot {
|
||||
return proxycfg.TestConfigSnapshot(t, func(ns *structs.NodeService) {
|
||||
ns.Proxy.Config["envoy_public_listener_json"] =
|
||||
customListenerJSON(t, customListenerJSONOptions{
|
||||
ns.Proxy.Config["envoy_public_listener_json"] = customListenerJSON(t, customListenerJSONOptions{
|
||||
Name: "custom-public-listen",
|
||||
// Attempt to override the TLS context should be ignored
|
||||
TLSContext: `"allowRenegotiation": false`,
|
||||
|
Loading…
x
Reference in New Issue
Block a user