package write import ( "bytes" "io" "strings" "testing" "time" "github.com/hashicorp/consul/agent/structs" "github.com/mitchellh/cli" "github.com/stretchr/testify/require" "github.com/hashicorp/consul/agent" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/sdk/testutil" ) func TestConfigWrite_noTabs(t *testing.T) { t.Parallel() require.NotContains(t, New(cli.NewMockUi()).Help(), "\t") } func TestConfigWrite(t *testing.T) { if testing.Short() { t.Skip("too slow for testing.Short") } t.Parallel() a := agent.NewTestAgent(t, ``) defer a.Shutdown() client := a.Client() t.Run("File", func(t *testing.T) { ui := cli.NewMockUi() c := New(ui) f := testutil.TempFile(t, "config-write-svc-web.hcl") _, err := f.WriteString(` Kind = "service-defaults" Name = "web" Protocol = "udp" `) require.NoError(t, err) args := []string{ "-http-addr=" + a.HTTPAddr(), f.Name(), } code := c.Run(args) require.Empty(t, ui.ErrorWriter.String()) require.Contains(t, ui.OutputWriter.String(), `Config entry written: service-defaults/web`) require.Equal(t, 0, code) entry, _, err := client.ConfigEntries().Get("service-defaults", "web", nil) require.NoError(t, err) svc, ok := entry.(*api.ServiceConfigEntry) require.True(t, ok) require.Equal(t, api.ServiceDefaults, svc.Kind) require.Equal(t, "web", svc.Name) require.Equal(t, "udp", svc.Protocol) }) t.Run("Stdin", func(t *testing.T) { stdinR, stdinW := io.Pipe() ui := cli.NewMockUi() c := New(ui) c.testStdin = stdinR go func() { stdinW.Write([]byte(`{ "Kind": "proxy-defaults", "Name": "global", "Config": { "foo": "bar", "bar": 1.0 } }`)) stdinW.Close() }() args := []string{ "-http-addr=" + a.HTTPAddr(), "-", } code := c.Run(args) require.Empty(t, ui.ErrorWriter.String()) require.Contains(t, ui.OutputWriter.String(), `Config entry written: proxy-defaults/global`) require.Equal(t, 0, code) entry, _, err := client.ConfigEntries().Get(api.ProxyDefaults, api.ProxyConfigGlobal, nil) require.NoError(t, err) proxy, ok := entry.(*api.ProxyConfigEntry) require.True(t, ok) require.Equal(t, api.ProxyDefaults, proxy.Kind) require.Equal(t, api.ProxyConfigGlobal, proxy.Name) require.Equal(t, map[string]interface{}{"foo": "bar", "bar": 1.0}, proxy.Config) }) t.Run("No config", func(t *testing.T) { ui := cli.NewMockUi() c := New(ui) code := c.Run([]string{}) require.NotEqual(t, 0, code) require.NotEmpty(t, ui.ErrorWriter.String()) }) t.Run("mesh config entry", func(t *testing.T) { stdin := new(bytes.Buffer) stdin.WriteString(` kind = "mesh" meta { "foo" = "bar" "gir" = "zim" } transparent_proxy { mesh_destinations_only = true } http { sanitize_x_forwarded_client_cert = true } `) ui := cli.NewMockUi() c := New(ui) c.testStdin = stdin code := c.Run([]string{"-http-addr=" + a.HTTPAddr(), "-"}) require.Empty(t, ui.ErrorWriter.String()) require.Contains(t, ui.OutputWriter.String(), `Config entry written: mesh/mesh`) require.Equal(t, 0, code) entry, _, err := client.ConfigEntries().Get(api.MeshConfig, api.MeshConfigMesh, nil) require.NoError(t, err) proxy, ok := entry.(*api.MeshConfigEntry) require.True(t, ok) require.Equal(t, map[string]string{"foo": "bar", "gir": "zim"}, proxy.Meta) require.True(t, proxy.TransparentProxy.MeshDestinationsOnly) require.True(t, proxy.HTTP.SanitizeXForwardedClientCert) }) } // TestParseConfigEntry is the 'api' mirror image of // agent/structs/config_entry_test.go:TestDecodeConfigEntry func TestParseConfigEntry(t *testing.T) { t.Parallel() for _, tc := range []struct { name string camel, camelJSON string snake, snakeJSON string expect api.ConfigEntry expectJSON api.ConfigEntry expectErr string }{ { name: "proxy-defaults: extra fields or typo", snake: ` kind = "proxy-defaults" name = "main" cornfig { "foo" = 19 } `, camel: ` Kind = "proxy-defaults" Name = "main" Cornfig { "foo" = 19 } `, snakeJSON: ` { "kind": "proxy-defaults", "name": "main", "cornfig": { "foo": 19 } } `, camelJSON: ` { "Kind": "proxy-defaults", "Name": "main", "Cornfig": { "foo": 19 } } `, expectErr: `invalid config key "cornfig"`, }, { name: "proxy-defaults", snake: ` kind = "proxy-defaults" name = "main" meta { "foo" = "bar" "gir" = "zim" } config { "foo" = 19 "bar" = "abc" "moreconfig" { "moar" = "config" } } mesh_gateway { mode = "remote" } mode = "direct" transparent_proxy = { outbound_listener_port = 10101 dialed_directly = true } `, camel: ` Kind = "proxy-defaults" Name = "main" Meta { "foo" = "bar" "gir" = "zim" } Config { "foo" = 19 "bar" = "abc" "moreconfig" { "moar" = "config" } } MeshGateway { Mode = "remote" } Mode = "direct" TransparentProxy = { outbound_listener_port = 10101 dialed_directly = true } `, snakeJSON: ` { "kind": "proxy-defaults", "name": "main", "meta" : { "foo": "bar", "gir": "zim" }, "config": { "foo": 19, "bar": "abc", "moreconfig": { "moar": "config" } }, "mesh_gateway": { "mode": "remote" }, "mode": "direct", "transparent_proxy": { "outbound_listener_port": 10101, "dialed_directly": true } } `, camelJSON: ` { "Kind": "proxy-defaults", "Name": "main", "Meta" : { "foo": "bar", "gir": "zim" }, "Config": { "foo": 19, "bar": "abc", "moreconfig": { "moar": "config" } }, "MeshGateway": { "Mode": "remote" }, "Mode": "direct", "TransparentProxy": { "OutboundListenerPort": 10101, "DialedDirectly": true } } `, expect: &api.ProxyConfigEntry{ Kind: "proxy-defaults", Name: "main", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Config: map[string]interface{}{ "foo": 19, "bar": "abc", "moreconfig": map[string]interface{}{ "moar": "config", }, }, MeshGateway: api.MeshGatewayConfig{ Mode: api.MeshGatewayModeRemote, }, Mode: api.ProxyModeDirect, TransparentProxy: &api.TransparentProxyConfig{ OutboundListenerPort: 10101, DialedDirectly: true, }, }, expectJSON: &api.ProxyConfigEntry{ Kind: "proxy-defaults", Name: "main", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Config: map[string]interface{}{ "foo": float64(19), // json decoding gives float64 instead of int here "bar": "abc", "moreconfig": map[string]interface{}{ "moar": "config", }, }, MeshGateway: api.MeshGatewayConfig{ Mode: api.MeshGatewayModeRemote, }, Mode: api.ProxyModeDirect, TransparentProxy: &api.TransparentProxyConfig{ OutboundListenerPort: 10101, DialedDirectly: true, }, }, }, { name: "terminating-gateway", snake: ` kind = "terminating-gateway" name = "terminating-gw-west" namespace = "default" meta { "foo" = "bar" "gir" = "zim" } services = [ { name = "billing" namespace = "biz" ca_file = "/etc/ca.crt" cert_file = "/etc/client.crt" key_file = "/etc/tls.key" sni = "mydomain" }, { name = "*" namespace = "ops" } ] `, camel: ` Kind = "terminating-gateway" Name = "terminating-gw-west" Namespace = "default" Meta { "foo" = "bar" "gir" = "zim" } Services = [ { Name = "billing" Namespace = "biz" CAFile = "/etc/ca.crt" CertFile = "/etc/client.crt" KeyFile = "/etc/tls.key" SNI = "mydomain" }, { Name = "*" Namespace = "ops" } ] `, snakeJSON: ` { "kind": "terminating-gateway", "name": "terminating-gw-west", "namespace": "default", "meta" : { "foo": "bar", "gir": "zim" }, "services": [ { "name": "billing", "namespace": "biz", "ca_file": "/etc/ca.crt", "cert_file": "/etc/client.crt", "key_file": "/etc/tls.key", "sni": "mydomain" }, { "name": "*", "namespace": "ops" } ] } `, camelJSON: ` { "Kind": "terminating-gateway", "Name": "terminating-gw-west", "Namespace": "default", "Meta" : { "foo": "bar", "gir": "zim" }, "Services": [ { "Name": "billing", "Namespace": "biz", "CAFile": "/etc/ca.crt", "CertFile": "/etc/client.crt", "KeyFile": "/etc/tls.key", "SNI": "mydomain" }, { "Name": "*", "Namespace": "ops" } ] } `, expect: &api.TerminatingGatewayConfigEntry{ Kind: "terminating-gateway", Name: "terminating-gw-west", Namespace: "default", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Services: []api.LinkedService{ { Name: "billing", Namespace: "biz", CAFile: "/etc/ca.crt", CertFile: "/etc/client.crt", KeyFile: "/etc/tls.key", SNI: "mydomain", }, { Name: "*", Namespace: "ops", }, }, }, expectJSON: &api.TerminatingGatewayConfigEntry{ Kind: "terminating-gateway", Name: "terminating-gw-west", Namespace: "default", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Services: []api.LinkedService{ { Name: "billing", Namespace: "biz", CAFile: "/etc/ca.crt", CertFile: "/etc/client.crt", KeyFile: "/etc/tls.key", SNI: "mydomain", }, { Name: "*", Namespace: "ops", }, }, }, }, { name: "service-defaults: kitchen sink", snake: ` kind = "service-defaults" name = "main" meta { "foo" = "bar" "gir" = "zim" } protocol = "http" external_sni = "abc-123" mesh_gateway { mode = "remote" } mode = "direct" transparent_proxy = { outbound_listener_port = 10101 dialed_directly = true } upstream_config { overrides = [ { name = "redis" passive_health_check { max_failures = 3 interval = "2s" } envoy_listener_json = "{ \"listener-foo\": 5 }" envoy_cluster_json = "{ \"cluster-bar\": 5 }" protocol = "grpc" connect_timeout_ms = 6543 }, { name = "finance--billing" mesh_gateway { mode = "remote" } limits { max_connections = 1111 max_pending_requests = 2222 max_concurrent_requests = 3333 } } ] defaults { envoy_cluster_json = "zip" envoy_listener_json = "zop" connect_timeout_ms = 5000 protocol = "http" limits { max_connections = 3 max_pending_requests = 4 max_concurrent_requests = 5 } passive_health_check { max_failures = 5 interval = "4s" } } } `, camel: ` Kind = "service-defaults" Name = "main" Meta { "foo" = "bar" "gir" = "zim" } Protocol = "http" ExternalSNI = "abc-123" MeshGateway { Mode = "remote" } Mode = "direct" TransparentProxy = { outbound_listener_port = 10101 dialed_directly = true } UpstreamConfig { Overrides = [ { Name = "redis" PassiveHealthCheck { MaxFailures = 3 Interval = "2s" } EnvoyListenerJson = "{ \"listener-foo\": 5 }" EnvoyClusterJson = "{ \"cluster-bar\": 5 }" Protocol = "grpc" ConnectTimeoutMs = 6543 }, { Name = "finance--billing" MeshGateway { Mode = "remote" } Limits { MaxConnections = 1111 MaxPendingRequests = 2222 MaxConcurrentRequests = 3333 } } ] Defaults { EnvoyClusterJson = "zip" EnvoyListenerJson = "zop" ConnectTimeoutMs = 5000 Protocol = "http" Limits { MaxConnections = 3 MaxPendingRequests = 4 MaxConcurrentRequests = 5 } PassiveHealthCheck { MaxFailures = 5 Interval = "4s" } } } `, snakeJSON: ` { "kind": "service-defaults", "name": "main", "meta" : { "foo": "bar", "gir": "zim" }, "protocol": "http", "external_sni": "abc-123", "mesh_gateway": { "mode": "remote" }, "mode": "direct", "transparent_proxy": { "outbound_listener_port": 10101, "dialed_directly": true }, "upstream_config": { "overrides": [ { "name": "redis", "passive_health_check": { "max_failures": 3, "interval": "2s" }, "envoy_listener_json": "{ \"listener-foo\": 5 }", "envoy_cluster_json": "{ \"cluster-bar\": 5 }", "protocol": "grpc", "connect_timeout_ms": 6543 }, { "name": "finance--billing", "mesh_gateway": { "mode": "remote" }, "limits": { "max_connections": 1111, "max_pending_requests": 2222, "max_concurrent_requests": 3333 } } ], "defaults": { "envoy_cluster_json": "zip", "envoy_listener_json": "zop", "connect_timeout_ms": 5000, "protocol": "http", "limits": { "max_connections": 3, "max_pending_requests": 4, "max_concurrent_requests": 5 }, "passive_health_check": { "max_failures": 5, "interval": "4s" } } } } `, camelJSON: ` { "Kind": "service-defaults", "Name": "main", "Meta" : { "foo": "bar", "gir": "zim" }, "Protocol": "http", "ExternalSNI": "abc-123", "MeshGateway": { "Mode": "remote" }, "Mode": "direct", "TransparentProxy": { "OutboundListenerPort": 10101, "DialedDirectly": true }, "UpstreamConfig": { "Overrides": [ { "Name": "redis", "PassiveHealthCheck": { "MaxFailures": 3, "Interval": "2s" }, "EnvoyListenerJson": "{ \"listener-foo\": 5 }", "EnvoyClusterJson": "{ \"cluster-bar\": 5 }", "Protocol": "grpc", "ConnectTimeoutMs": 6543 }, { "Name": "finance--billing", "MeshGateway": { "Mode": "remote" }, "Limits": { "MaxConnections": 1111, "MaxPendingRequests": 2222, "MaxConcurrentRequests": 3333 } } ], "Defaults": { "EnvoyClusterJson": "zip", "EnvoyListenerJson": "zop", "ConnectTimeoutMs": 5000, "Protocol": "http", "Limits": { "MaxConnections": 3, "MaxPendingRequests": 4, "MaxConcurrentRequests": 5 }, "PassiveHealthCheck": { "MaxFailures": 5, "Interval": "4s" } } } } `, expect: &api.ServiceConfigEntry{ Kind: "service-defaults", Name: "main", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Protocol: "http", ExternalSNI: "abc-123", MeshGateway: api.MeshGatewayConfig{ Mode: api.MeshGatewayModeRemote, }, Mode: api.ProxyModeDirect, TransparentProxy: &api.TransparentProxyConfig{ OutboundListenerPort: 10101, DialedDirectly: true, }, UpstreamConfig: &api.UpstreamConfiguration{ Overrides: []*api.UpstreamConfig{ { Name: "redis", PassiveHealthCheck: &api.PassiveHealthCheck{ MaxFailures: 3, Interval: 2 * time.Second, }, EnvoyListenerJSON: `{ "listener-foo": 5 }`, EnvoyClusterJSON: `{ "cluster-bar": 5 }`, Protocol: "grpc", ConnectTimeoutMs: 6543, }, { Name: "finance--billing", MeshGateway: api.MeshGatewayConfig{ Mode: "remote", }, Limits: &api.UpstreamLimits{ MaxConnections: intPointer(1111), MaxPendingRequests: intPointer(2222), MaxConcurrentRequests: intPointer(3333), }, }, }, Defaults: &api.UpstreamConfig{ EnvoyClusterJSON: "zip", EnvoyListenerJSON: "zop", Protocol: "http", ConnectTimeoutMs: 5000, Limits: &api.UpstreamLimits{ MaxConnections: intPointer(3), MaxPendingRequests: intPointer(4), MaxConcurrentRequests: intPointer(5), }, PassiveHealthCheck: &api.PassiveHealthCheck{ MaxFailures: 5, Interval: 4 * time.Second, }, }, }, }, }, { name: "service-router: kitchen sink", snake: ` kind = "service-router" name = "main" partition = "pepper" meta { "foo" = "bar" "gir" = "zim" } routes = [ { match { http { path_exact = "/foo" header = [ { name = "debug1" present = true }, { name = "debug2" present = false invert = true }, { name = "debug3" exact = "1" }, { name = "debug4" prefix = "aaa" }, { name = "debug5" suffix = "bbb" }, { name = "debug6" regex = "a.*z" }, ] } } destination { service = "carrot" service_subset = "kale" namespace = "leek" partition = "chard" prefix_rewrite = "/alternate" request_timeout = "99s" num_retries = 12345 retry_on_connect_failure = true retry_on_status_codes = [401, 209] } }, { match { http { path_prefix = "/foo" methods = [ "GET", "DELETE" ] query_param = [ { name = "hack1" present = true }, { name = "hack2" exact = "1" }, { name = "hack3" regex = "a.*z" }, ] } } }, { match { http { path_regex = "/foo" } } }, ] `, camel: ` Kind = "service-router" Name = "main" Partition = "pepper" Meta { "foo" = "bar" "gir" = "zim" } Routes = [ { Match { HTTP { PathExact = "/foo" Header = [ { Name = "debug1" Present = true }, { Name = "debug2" Present = false Invert = true }, { Name = "debug3" Exact = "1" }, { Name = "debug4" Prefix = "aaa" }, { Name = "debug5" Suffix = "bbb" }, { Name = "debug6" Regex = "a.*z" }, ] } } Destination { Service = "carrot" ServiceSubset = "kale" Namespace = "leek" Partition = "chard" PrefixRewrite = "/alternate" RequestTimeout = "99s" NumRetries = 12345 RetryOnConnectFailure = true RetryOnStatusCodes = [401, 209] } }, { Match { HTTP { PathPrefix = "/foo" Methods = [ "GET", "DELETE" ] QueryParam = [ { Name = "hack1" Present = true }, { Name = "hack2" Exact = "1" }, { Name = "hack3" Regex = "a.*z" }, ] } } }, { Match { HTTP { PathRegex = "/foo" } } }, ] `, snakeJSON: ` { "kind": "service-router", "name": "main", "partition": "pepper", "meta" : { "foo": "bar", "gir": "zim" }, "routes": [ { "match": { "http": { "path_exact": "/foo", "header": [ { "name": "debug1", "present": true }, { "name": "debug2", "present": false, "invert": true }, { "name": "debug3", "exact": "1" }, { "name": "debug4", "prefix": "aaa" }, { "name": "debug5", "suffix": "bbb" }, { "name": "debug6", "regex": "a.*z" } ] } }, "destination": { "service": "carrot", "service_subset": "kale", "namespace": "leek", "partition": "chard", "prefix_rewrite": "/alternate", "request_timeout": "99s", "num_retries": 12345, "retry_on_connect_failure": true, "retry_on_status_codes": [ 401, 209 ] } }, { "match": { "http": { "path_prefix": "/foo", "methods": [ "GET", "DELETE" ], "query_param": [ { "name": "hack1", "present": true }, { "name": "hack2", "exact": "1" }, { "name": "hack3", "regex": "a.*z" } ] } } }, { "match": { "http": { "path_regex": "/foo" } } } ] } `, camelJSON: ` { "Kind": "service-router", "Name": "main", "Partition": "pepper", "Meta" : { "foo": "bar", "gir": "zim" }, "Routes": [ { "Match": { "HTTP": { "PathExact": "/foo", "Header": [ { "Name": "debug1", "Present": true }, { "Name": "debug2", "Present": false, "Invert": true }, { "Name": "debug3", "Exact": "1" }, { "Name": "debug4", "Prefix": "aaa" }, { "Name": "debug5", "Suffix": "bbb" }, { "Name": "debug6", "Regex": "a.*z" } ] } }, "Destination": { "Service": "carrot", "ServiceSubset": "kale", "Namespace": "leek", "Partition": "chard", "PrefixRewrite": "/alternate", "RequestTimeout": "99s", "NumRetries": 12345, "RetryOnConnectFailure": true, "RetryOnStatusCodes": [ 401, 209 ] } }, { "Match": { "HTTP": { "PathPrefix": "/foo", "Methods": [ "GET", "DELETE" ], "QueryParam": [ { "Name": "hack1", "Present": true }, { "Name": "hack2", "Exact": "1" }, { "Name": "hack3", "Regex": "a.*z" } ] } } }, { "Match": { "HTTP": { "PathRegex": "/foo" } } } ] } `, expect: &api.ServiceRouterConfigEntry{ Kind: "service-router", Name: "main", Partition: "pepper", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Routes: []api.ServiceRoute{ { Match: &api.ServiceRouteMatch{ HTTP: &api.ServiceRouteHTTPMatch{ PathExact: "/foo", Header: []api.ServiceRouteHTTPMatchHeader{ { Name: "debug1", Present: true, }, { Name: "debug2", Present: false, Invert: true, }, { Name: "debug3", Exact: "1", }, { Name: "debug4", Prefix: "aaa", }, { Name: "debug5", Suffix: "bbb", }, { Name: "debug6", Regex: "a.*z", }, }, }, }, Destination: &api.ServiceRouteDestination{ Service: "carrot", ServiceSubset: "kale", Namespace: "leek", Partition: "chard", PrefixRewrite: "/alternate", RequestTimeout: 99 * time.Second, NumRetries: 12345, RetryOnConnectFailure: true, RetryOnStatusCodes: []uint32{401, 209}, }, }, { Match: &api.ServiceRouteMatch{ HTTP: &api.ServiceRouteHTTPMatch{ PathPrefix: "/foo", Methods: []string{"GET", "DELETE"}, QueryParam: []api.ServiceRouteHTTPMatchQueryParam{ { Name: "hack1", Present: true, }, { Name: "hack2", Exact: "1", }, { Name: "hack3", Regex: "a.*z", }, }, }, }, }, { Match: &api.ServiceRouteMatch{ HTTP: &api.ServiceRouteHTTPMatch{ PathRegex: "/foo", }, }, }, }, }, }, { name: "service-splitter: kitchen sink", snake: ` kind = "service-splitter" name = "main" partition = "east" meta { "foo" = "bar" "gir" = "zim" } splits = [ { weight = 97.1 service_subset = "v1" }, { weight = 2 service_subset = "v2" }, { weight = 0.9 service = "other" namespace = "alt" partition = "west" }, ] `, camel: ` Kind = "service-splitter" Name = "main" Partition = "east" Meta { "foo" = "bar" "gir" = "zim" } Splits = [ { Weight = 97.1 ServiceSubset = "v1" }, { Weight = 2, ServiceSubset = "v2" }, { Weight = 0.9 Service = "other" Namespace = "alt" Partition = "west" }, ] `, snakeJSON: ` { "kind": "service-splitter", "name": "main", "partition": "east", "meta" : { "foo": "bar", "gir": "zim" }, "splits": [ { "weight": 97.1, "service_subset": "v1" }, { "weight": 2, "service_subset": "v2" }, { "weight": 0.9, "service": "other", "namespace": "alt", "partition": "west" } ] } `, camelJSON: ` { "Kind": "service-splitter", "Name": "main", "Partition": "east", "Meta" : { "foo": "bar", "gir": "zim" }, "Splits": [ { "Weight": 97.1, "ServiceSubset": "v1" }, { "Weight": 2, "ServiceSubset": "v2" }, { "Weight": 0.9, "Service": "other", "Namespace": "alt", "Partition": "west" } ] } `, expect: &api.ServiceSplitterConfigEntry{ Kind: api.ServiceSplitter, Name: "main", Partition: "east", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Splits: []api.ServiceSplit{ { Weight: 97.1, ServiceSubset: "v1", }, { Weight: 2, ServiceSubset: "v2", }, { Weight: 0.9, Service: "other", Namespace: "alt", Partition: "west", }, }, }, }, { name: "service-resolver: subsets with failover", snake: ` kind = "service-resolver" name = "main" meta { "foo" = "bar" "gir" = "zim" } default_subset = "v1" connect_timeout = "15s" subsets = { "v1" = { filter = "Service.Meta.version == v1" }, "v2" = { filter = "Service.Meta.version == v2" only_passing = true }, } failover = { "v2" = { service = "failcopy" service_subset = "sure" namespace = "neighbor" datacenters = ["dc5", "dc14"] }, "*" = { datacenters = ["dc7"] } }`, camel: ` Kind = "service-resolver" Name = "main" Meta { "foo" = "bar" "gir" = "zim" } DefaultSubset = "v1" ConnectTimeout = "15s" Subsets = { "v1" = { Filter = "Service.Meta.version == v1" }, "v2" = { Filter = "Service.Meta.version == v2" OnlyPassing = true }, } Failover = { "v2" = { Service = "failcopy" ServiceSubset = "sure" Namespace = "neighbor" Datacenters = ["dc5", "dc14"] }, "*" = { Datacenters = ["dc7"] } }`, snakeJSON: ` { "kind": "service-resolver", "name": "main", "meta" : { "foo": "bar", "gir": "zim" }, "default_subset": "v1", "connect_timeout": "15s", "subsets": { "v1": { "filter": "Service.Meta.version == v1" }, "v2": { "filter": "Service.Meta.version == v2", "only_passing": true } }, "failover": { "v2": { "service": "failcopy", "service_subset": "sure", "namespace": "neighbor", "datacenters": [ "dc5", "dc14" ] }, "*": { "datacenters": [ "dc7" ] } } } `, camelJSON: ` { "Kind": "service-resolver", "Name": "main", "Meta" : { "foo": "bar", "gir": "zim" }, "DefaultSubset": "v1", "ConnectTimeout": "15s", "Subsets": { "v1": { "Filter": "Service.Meta.version == v1" }, "v2": { "Filter": "Service.Meta.version == v2", "OnlyPassing": true } }, "Failover": { "v2": { "Service": "failcopy", "ServiceSubset": "sure", "Namespace": "neighbor", "Datacenters": [ "dc5", "dc14" ] }, "*": { "Datacenters": [ "dc7" ] } } } `, expect: &api.ServiceResolverConfigEntry{ Kind: "service-resolver", Name: "main", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, DefaultSubset: "v1", ConnectTimeout: 15 * time.Second, Subsets: map[string]api.ServiceResolverSubset{ "v1": { Filter: "Service.Meta.version == v1", }, "v2": { Filter: "Service.Meta.version == v2", OnlyPassing: true, }, }, Failover: map[string]api.ServiceResolverFailover{ "v2": { Service: "failcopy", ServiceSubset: "sure", Namespace: "neighbor", Datacenters: []string{"dc5", "dc14"}, }, "*": { Datacenters: []string{"dc7"}, }, }, }, }, { name: "service-resolver: redirect", snake: ` kind = "service-resolver" name = "main" partition = "east" redirect { service = "other" service_subset = "backup" namespace = "alt" partition = "west" datacenter = "dc9" } `, camel: ` Kind = "service-resolver" Name = "main" Partition = "east" Redirect { Service = "other" ServiceSubset = "backup" Namespace = "alt" Partition = "west" Datacenter = "dc9" } `, snakeJSON: ` { "kind": "service-resolver", "name": "main", "partition": "east", "redirect": { "service": "other", "service_subset": "backup", "namespace": "alt", "partition": "west", "datacenter": "dc9" } } `, camelJSON: ` { "Kind": "service-resolver", "Name": "main", "Partition": "east", "Redirect": { "Service": "other", "ServiceSubset": "backup", "Namespace": "alt", "Partition": "west", "Datacenter": "dc9" } } `, expect: &api.ServiceResolverConfigEntry{ Kind: "service-resolver", Name: "main", Partition: "east", Redirect: &api.ServiceResolverRedirect{ Service: "other", ServiceSubset: "backup", Namespace: "alt", Partition: "west", Datacenter: "dc9", }, }, }, { name: "service-resolver: default", snake: ` kind = "service-resolver" name = "main" `, camel: ` Kind = "service-resolver" Name = "main" `, snakeJSON: ` { "kind": "service-resolver", "name": "main" } `, camelJSON: ` { "Kind": "service-resolver", "Name": "main" } `, expect: &api.ServiceResolverConfigEntry{ Kind: "service-resolver", Name: "main", }, }, { name: "service-resolver: envoy hash lb kitchen sink", snake: ` kind = "service-resolver" name = "main" load_balancer = { policy = "ring_hash" ring_hash_config = { minimum_ring_size = 1 maximum_ring_size = 2 } hash_policies = [ { field = "cookie" field_value = "good-cookie" cookie_config = { ttl = "1s" path = "/oven" } terminal = true }, { field = "cookie" field_value = "less-good-cookie" cookie_config = { session = true path = "/toaster" } terminal = true }, { field = "header" field_value = "x-user-id" }, { source_ip = true } ] } `, camel: ` Kind = "service-resolver" Name = "main" LoadBalancer = { Policy = "ring_hash" RingHashConfig = { MinimumRingSize = 1 MaximumRingSize = 2 } HashPolicies = [ { Field = "cookie" FieldValue = "good-cookie" CookieConfig = { TTL = "1s" Path = "/oven" } Terminal = true }, { Field = "cookie" FieldValue = "less-good-cookie" CookieConfig = { Session = true Path = "/toaster" } Terminal = true }, { Field = "header" FieldValue = "x-user-id" }, { SourceIP = true } ] } `, snakeJSON: ` { "kind": "service-resolver", "name": "main", "load_balancer": { "policy": "ring_hash", "ring_hash_config": { "minimum_ring_size": 1, "maximum_ring_size": 2 }, "hash_policies": [ { "field": "cookie", "field_value": "good-cookie", "cookie_config": { "ttl": "1s", "path": "/oven" }, "terminal": true }, { "field": "cookie", "field_value": "less-good-cookie", "cookie_config": { "session": true, "path": "/toaster" }, "terminal": true }, { "field": "header", "field_value": "x-user-id" }, { "source_ip": true } ] } } `, camelJSON: ` { "Kind": "service-resolver", "Name": "main", "LoadBalancer": { "Policy": "ring_hash", "RingHashConfig": { "MinimumRingSize": 1, "MaximumRingSize": 2 }, "HashPolicies": [ { "Field": "cookie", "FieldValue": "good-cookie", "CookieConfig": { "TTL": "1s", "Path": "/oven" }, "Terminal": true }, { "Field": "cookie", "FieldValue": "less-good-cookie", "CookieConfig": { "Session": true, "Path": "/toaster" }, "Terminal": true }, { "Field": "header", "FieldValue": "x-user-id" }, { "SourceIP": true } ] } } `, expect: &api.ServiceResolverConfigEntry{ Kind: "service-resolver", Name: "main", LoadBalancer: &api.LoadBalancer{ Policy: structs.LBPolicyRingHash, RingHashConfig: &api.RingHashConfig{ MinimumRingSize: 1, MaximumRingSize: 2, }, HashPolicies: []api.HashPolicy{ { Field: structs.HashPolicyCookie, FieldValue: "good-cookie", CookieConfig: &api.CookieConfig{ TTL: 1 * time.Second, Path: "/oven", }, Terminal: true, }, { Field: structs.HashPolicyCookie, FieldValue: "less-good-cookie", CookieConfig: &api.CookieConfig{ Session: true, Path: "/toaster", }, Terminal: true, }, { Field: structs.HashPolicyHeader, FieldValue: "x-user-id", }, { SourceIP: true, }, }, }, }, }, { name: "service-resolver: envoy least request kitchen sink", snake: ` kind = "service-resolver" name = "main" load_balancer = { policy = "least_request" least_request_config = { choice_count = 2 } } `, camel: ` Kind = "service-resolver" Name = "main" LoadBalancer = { Policy = "least_request" LeastRequestConfig = { ChoiceCount = 2 } } `, snakeJSON: ` { "kind": "service-resolver", "name": "main", "load_balancer": { "policy": "least_request", "least_request_config": { "choice_count": 2 } } } `, camelJSON: ` { "Kind": "service-resolver", "Name": "main", "LoadBalancer": { "Policy": "least_request", "LeastRequestConfig": { "ChoiceCount": 2 } } } `, expect: &api.ServiceResolverConfigEntry{ Kind: "service-resolver", Name: "main", LoadBalancer: &api.LoadBalancer{ Policy: structs.LBPolicyLeastRequest, LeastRequestConfig: &api.LeastRequestConfig{ ChoiceCount: 2, }, }, }, }, { name: "expose paths: kitchen sink proxy defaults", snake: ` kind = "proxy-defaults" name = "global" expose = { checks = true paths = [ { local_path_port = 8080 listener_port = 21500 path = "/healthz" protocol = "http2" }, { local_path_port = 8000 listener_port = 21501 path = "/metrics" protocol = "http" } ] }`, camel: ` Kind = "proxy-defaults" Name = "global" Expose = { Checks = true Paths = [ { LocalPathPort = 8080 ListenerPort = 21500 Path = "/healthz" Protocol = "http2" }, { LocalPathPort = 8000 ListenerPort = 21501 Path = "/metrics" Protocol = "http" } ] }`, snakeJSON: ` { "kind": "proxy-defaults", "name": "global", "expose": { "checks": true, "paths": [ { "local_path_port": 8080, "listener_port": 21500, "path": "/healthz", "protocol": "http2" }, { "local_path_port": 8000, "listener_port": 21501, "path": "/metrics", "protocol": "http" } ] } } `, camelJSON: ` { "Kind": "proxy-defaults", "Name": "global", "Expose": { "Checks": true, "Paths": [ { "LocalPathPort": 8080, "ListenerPort": 21500, "Path": "/healthz", "Protocol": "http2" }, { "LocalPathPort": 8000, "ListenerPort": 21501, "Path": "/metrics", "Protocol": "http" } ] } } `, expect: &api.ProxyConfigEntry{ Kind: "proxy-defaults", Name: "global", Expose: api.ExposeConfig{ Checks: true, Paths: []api.ExposePath{ { ListenerPort: 21500, Path: "/healthz", LocalPathPort: 8080, Protocol: "http2", }, { ListenerPort: 21501, Path: "/metrics", LocalPathPort: 8000, Protocol: "http", }, }, }, }, }, { name: "expose paths: kitchen sink service defaults", snake: ` kind = "service-defaults" name = "web" expose = { checks = true paths = [ { local_path_port = 8080 listener_port = 21500 path = "/healthz" protocol = "http2" }, { local_path_port = 8000 listener_port = 21501 path = "/metrics" protocol = "http" } ] }`, camel: ` Kind = "service-defaults" Name = "web" Expose = { Checks = true Paths = [ { LocalPathPort = 8080 ListenerPort = 21500 Path = "/healthz" Protocol = "http2" }, { LocalPathPort = 8000 ListenerPort = 21501 Path = "/metrics" Protocol = "http" } ] }`, snakeJSON: ` { "kind": "service-defaults", "name": "web", "expose": { "checks": true, "paths": [ { "local_path_port": 8080, "listener_port": 21500, "path": "/healthz", "protocol": "http2" }, { "local_path_port": 8000, "listener_port": 21501, "path": "/metrics", "protocol": "http" } ] } } `, camelJSON: ` { "Kind": "service-defaults", "Name": "web", "Expose": { "Checks": true, "Paths": [ { "LocalPathPort": 8080, "ListenerPort": 21500, "Path": "/healthz", "Protocol": "http2" }, { "LocalPathPort": 8000, "ListenerPort": 21501, "Path": "/metrics", "Protocol": "http" } ] } } `, expect: &api.ServiceConfigEntry{ Kind: "service-defaults", Name: "web", Expose: api.ExposeConfig{ Checks: true, Paths: []api.ExposePath{ { ListenerPort: 21500, Path: "/healthz", LocalPathPort: 8080, Protocol: "http2", }, { ListenerPort: 21501, Path: "/metrics", LocalPathPort: 8000, Protocol: "http", }, }, }, }, }, { // TODO(rb): test SDS stuff here in both places (global/service) name: "ingress-gateway: kitchen sink", snake: ` kind = "ingress-gateway" name = "ingress-web" meta { "foo" = "bar" "gir" = "zim" } tls { enabled = true tls_min_version = "TLSv1_1" tls_max_version = "TLSv1_2" cipher_suites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } listeners = [ { port = 8080 protocol = "http" services = [ { name = "web" hosts = ["test.example.com"] }, { name = "db" namespace = "foo" } ] } ] `, camel: ` Kind = "ingress-gateway" Name = "ingress-web" Meta { "foo" = "bar" "gir" = "zim" } Tls { Enabled = true TLSMinVersion = "TLSv1_1" TLSMaxVersion = "TLSv1_2" CipherSuites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } Listeners = [ { Port = 8080 Protocol = "http" Services = [ { Name = "web" Hosts = ["test.example.com"] }, { Name = "db" Namespace = "foo" } ] } ] `, snakeJSON: ` { "kind": "ingress-gateway", "name": "ingress-web", "meta" : { "foo": "bar", "gir": "zim" }, "tls": { "enabled": true, "tls_min_version": "TLSv1_1", "tls_max_version": "TLSv1_2", "cipher_suites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] }, "listeners": [ { "port": 8080, "protocol": "http", "services": [ { "name": "web", "hosts": ["test.example.com"] }, { "name": "db", "namespace": "foo" } ] } ] } `, camelJSON: ` { "Kind": "ingress-gateway", "Name": "ingress-web", "Meta" : { "foo": "bar", "gir": "zim" }, "TLS": { "Enabled": true, "TLSMinVersion": "TLSv1_1", "TLSMaxVersion": "TLSv1_2", "CipherSuites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] }, "Listeners": [ { "Port": 8080, "Protocol": "http", "Services": [ { "Name": "web", "Hosts": ["test.example.com"] }, { "Name": "db", "Namespace": "foo" } ] } ] } `, expect: &api.IngressGatewayConfigEntry{ Kind: "ingress-gateway", Name: "ingress-web", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, TLS: api.GatewayTLSConfig{ Enabled: true, TLSMinVersion: "TLSv1_1", TLSMaxVersion: "TLSv1_2", CipherSuites: []string{ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", }, }, Listeners: []api.IngressListener{ { Port: 8080, Protocol: "http", Services: []api.IngressService{ { Name: "web", Hosts: []string{"test.example.com"}, }, { Name: "db", Namespace: "foo", }, }, }, }, }, }, { name: "service-intentions: kitchen sink", snake: ` kind = "service-intentions" name = "web" meta { "foo" = "bar" "gir" = "zim" } sources = [ { name = "foo" action = "deny" type = "consul" description = "foo desc" }, { name = "bar" action = "allow" description = "bar desc" }, { name = "l7" permissions = [ { action = "deny" http { path_exact = "/admin" header = [ { name = "hdr-present" present = true }, { name = "hdr-exact" exact = "exact" }, { name = "hdr-prefix" prefix = "prefix" }, { name = "hdr-suffix" suffix = "suffix" }, { name = "hdr-regex" regex = "regex" }, { name = "hdr-absent" present = true invert = true } ] } }, { action = "allow" http { path_prefix = "/v3/" } }, { action = "allow" http { path_regex = "/v[12]/.*" methods = ["GET", "POST"] } } ] } ] sources { name = "*" action = "deny" description = "wild desc" } `, camel: ` Kind = "service-intentions" Name = "web" Meta { "foo" = "bar" "gir" = "zim" } Sources = [ { Name = "foo" Action = "deny" Type = "consul" Description = "foo desc" }, { Name = "bar" Action = "allow" Description = "bar desc" }, { Name = "l7" Permissions = [ { Action = "deny" HTTP { PathExact = "/admin" Header = [ { Name = "hdr-present" Present = true }, { Name = "hdr-exact" Exact = "exact" }, { Name = "hdr-prefix" Prefix = "prefix" }, { Name = "hdr-suffix" Suffix = "suffix" }, { Name = "hdr-regex" Regex = "regex" }, { Name = "hdr-absent" Present = true Invert = true } ] } }, { Action = "allow" HTTP { PathPrefix = "/v3/" } }, { Action = "allow" HTTP { PathRegex = "/v[12]/.*" Methods = ["GET", "POST"] } } ] } ] Sources { Name = "*" Action = "deny" Description = "wild desc" } `, snakeJSON: ` { "kind": "service-intentions", "name": "web", "meta": { "foo": "bar", "gir": "zim" }, "sources": [ { "name": "foo", "action": "deny", "type": "consul", "description": "foo desc" }, { "name": "bar", "action": "allow", "description": "bar desc" }, { "name": "l7", "permissions": [ { "action": "deny", "http": { "path_exact": "/admin", "header": [ { "name": "hdr-present", "present": true }, { "name": "hdr-exact", "exact": "exact" }, { "name": "hdr-prefix", "prefix": "prefix" }, { "name": "hdr-suffix", "suffix": "suffix" }, { "name": "hdr-regex", "regex": "regex" }, { "name": "hdr-absent", "present": true, "invert": true } ] } }, { "action": "allow", "http": { "path_prefix": "/v3/" } }, { "action": "allow", "http": { "path_regex": "/v[12]/.*", "methods": [ "GET", "POST" ] } } ] }, { "name": "*", "action": "deny", "description": "wild desc" } ] } `, camelJSON: ` { "Kind": "service-intentions", "Name": "web", "Meta" : { "foo": "bar", "gir": "zim" }, "Sources": [ { "Name": "foo", "Action": "deny", "Type": "consul", "Description": "foo desc" }, { "Name": "bar", "Action": "allow", "Description": "bar desc" }, { "Name": "l7", "Permissions": [ { "Action": "deny", "HTTP": { "PathExact": "/admin", "Header": [ { "Name": "hdr-present", "Present": true }, { "Name": "hdr-exact", "Exact": "exact" }, { "Name": "hdr-prefix", "Prefix": "prefix" }, { "Name": "hdr-suffix", "Suffix": "suffix" }, { "Name": "hdr-regex", "Regex": "regex" }, { "Name": "hdr-absent", "Present": true, "Invert": true } ] } }, { "Action": "allow", "HTTP": { "PathPrefix": "/v3/" } }, { "Action": "allow", "HTTP": { "PathRegex": "/v[12]/.*", "Methods": [ "GET", "POST" ] } } ] }, { "Name": "*", "Action": "deny", "Description": "wild desc" } ] } `, expect: &api.ServiceIntentionsConfigEntry{ Kind: "service-intentions", Name: "web", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Sources: []*api.SourceIntention{ { Name: "foo", Action: "deny", Type: "consul", Description: "foo desc", }, { Name: "bar", Action: "allow", Description: "bar desc", }, { Name: "l7", Permissions: []*api.IntentionPermission{ { Action: "deny", HTTP: &api.IntentionHTTPPermission{ PathExact: "/admin", Header: []api.IntentionHTTPHeaderPermission{ { Name: "hdr-present", Present: true, }, { Name: "hdr-exact", Exact: "exact", }, { Name: "hdr-prefix", Prefix: "prefix", }, { Name: "hdr-suffix", Suffix: "suffix", }, { Name: "hdr-regex", Regex: "regex", }, { Name: "hdr-absent", Present: true, Invert: true, }, }, }, }, { Action: "allow", HTTP: &api.IntentionHTTPPermission{ PathPrefix: "/v3/", }, }, { Action: "allow", HTTP: &api.IntentionHTTPPermission{ PathRegex: "/v[12]/.*", Methods: []string{"GET", "POST"}, }, }, }, }, { Name: "*", Action: "deny", Description: "wild desc", }, }, }, }, { name: "service-intentions: wildcard destination", snake: ` kind = "service-intentions" name = "*" sources { name = "foo" action = "deny" # should be parsed, but we'll ignore it later precedence = 6 } `, camel: ` Kind = "service-intentions" Name = "*" Sources { Name = "foo" Action = "deny" # should be parsed, but we'll ignore it later Precedence = 6 } `, snakeJSON: ` { "kind": "service-intentions", "name": "*", "sources": [ { "name": "foo", "action": "deny", "precedence": 6 } ] } `, camelJSON: ` { "Kind": "service-intentions", "Name": "*", "Sources": [ { "Name": "foo", "Action": "deny", "Precedence": 6 } ] } `, expect: &api.ServiceIntentionsConfigEntry{ Kind: "service-intentions", Name: "*", Sources: []*api.SourceIntention{ { Name: "foo", Action: "deny", Precedence: 6, }, }, }, }, { name: "mesh", snake: ` kind = "mesh" meta { "foo" = "bar" "gir" = "zim" } transparent_proxy { mesh_destinations_only = true } tls { incoming { tls_min_version = "TLSv1_1" tls_max_version = "TLSv1_2" cipher_suites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } outgoing { tls_min_version = "TLSv1_1" tls_max_version = "TLSv1_2" cipher_suites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } } `, camel: ` Kind = "mesh" Meta { "foo" = "bar" "gir" = "zim" } TransparentProxy { MeshDestinationsOnly = true } TLS { Incoming { TLSMinVersion = "TLSv1_1" TLSMaxVersion = "TLSv1_2" CipherSuites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } Outgoing { TLSMinVersion = "TLSv1_1" TLSMaxVersion = "TLSv1_2" CipherSuites = [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } } `, snakeJSON: ` { "kind": "mesh", "meta" : { "foo": "bar", "gir": "zim" }, "transparent_proxy": { "mesh_destinations_only": true }, "tls": { "incoming": { "tls_min_version": "TLSv1_1", "tls_max_version": "TLSv1_2", "cipher_suites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] }, "outgoing": { "tls_min_version": "TLSv1_1", "tls_max_version": "TLSv1_2", "cipher_suites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } } } `, camelJSON: ` { "Kind": "mesh", "Meta" : { "foo": "bar", "gir": "zim" }, "TransparentProxy": { "MeshDestinationsOnly": true }, "TLS": { "Incoming": { "TLSMinVersion": "TLSv1_1", "TLSMaxVersion": "TLSv1_2", "CipherSuites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] }, "Outgoing": { "TLSMinVersion": "TLSv1_1", "TLSMaxVersion": "TLSv1_2", "CipherSuites": [ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" ] } } } `, expect: &api.MeshConfigEntry{ Meta: map[string]string{ "foo": "bar", "gir": "zim", }, TransparentProxy: api.TransparentProxyMeshConfig{ MeshDestinationsOnly: true, }, TLS: &api.MeshTLSConfig{ Incoming: &api.MeshDirectionalTLSConfig{ TLSMinVersion: "TLSv1_1", TLSMaxVersion: "TLSv1_2", CipherSuites: []string{ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", }, }, Outgoing: &api.MeshDirectionalTLSConfig{ TLSMinVersion: "TLSv1_1", TLSMaxVersion: "TLSv1_2", CipherSuites: []string{ "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", }, }, }, }, }, { name: "exported-services", snake: ` kind = "exported-services" name = "foo" meta { "foo" = "bar" "gir" = "zim" } services = [ { name = "web" namespace = "foo" consumers = [ { partition = "bar" }, { partition = "baz" }, { peer_name = "flarm" } ] }, { name = "db" namespace = "bar" consumers = [ { partition = "zoo" } ] } ] `, camel: ` Kind = "exported-services" Name = "foo" Meta { "foo" = "bar" "gir" = "zim" } Services = [ { Name = "web" Namespace = "foo" Consumers = [ { Partition = "bar" }, { Partition = "baz" }, { PeerName = "flarm" } ] }, { Name = "db" Namespace = "bar" Consumers = [ { Partition = "zoo" } ] } ] `, snakeJSON: ` { "kind": "exported-services", "name": "foo", "meta": { "foo": "bar", "gir": "zim" }, "services": [ { "name": "web", "namespace": "foo", "consumers": [ { "partition": "bar" }, { "partition": "baz" }, { "peer_name": "flarm" } ] }, { "name": "db", "namespace": "bar", "consumers": [ { "partition": "zoo" } ] } ] } `, camelJSON: ` { "Kind": "exported-services", "Name": "foo", "Meta": { "foo": "bar", "gir": "zim" }, "Services": [ { "Name": "web", "Namespace": "foo", "Consumers": [ { "Partition": "bar" }, { "Partition": "baz" }, { "PeerName": "flarm" } ] }, { "Name": "db", "Namespace": "bar", "Consumers": [ { "Partition": "zoo" } ] } ] } `, expect: &api.ExportedServicesConfigEntry{ Name: "foo", Meta: map[string]string{ "foo": "bar", "gir": "zim", }, Services: []api.ExportedService{ { Name: "web", Namespace: "foo", Consumers: []api.ServiceConsumer{ { Partition: "bar", }, { Partition: "baz", }, { PeerName: "flarm", }, }, }, { Name: "db", Namespace: "bar", Consumers: []api.ServiceConsumer{ { Partition: "zoo", }, }, }, }, }, }, } { tc := tc testbody := func(t *testing.T, body string, expect api.ConfigEntry) { t.Helper() got, err := parseConfigEntry(body) if tc.expectErr != "" { require.Nil(t, got) require.Error(t, err) requireContainsLower(t, err.Error(), tc.expectErr) } else { require.NoError(t, err) require.Equal(t, expect, got) } } t.Run(tc.name+" (hcl snake case)", func(t *testing.T) { testbody(t, tc.snake, tc.expect) }) t.Run(tc.name+" (hcl camel case)", func(t *testing.T) { testbody(t, tc.camel, tc.expect) }) if tc.snakeJSON != "" { t.Run(tc.name+" (json snake case)", func(t *testing.T) { if tc.expectJSON != nil { testbody(t, tc.snakeJSON, tc.expectJSON) } else { testbody(t, tc.snakeJSON, tc.expect) } }) } if tc.camelJSON != "" { t.Run(tc.name+" (json camel case)", func(t *testing.T) { if tc.expectJSON != nil { testbody(t, tc.camelJSON, tc.expectJSON) } else { testbody(t, tc.camelJSON, tc.expect) } }) } } } func requireContainsLower(t *testing.T, haystack, needle string) { t.Helper() require.Contains(t, strings.ToLower(haystack), strings.ToLower(needle)) } func intPointer(v int) *int { return &v }