cloudflared-mirror/component-tests/test_config.py

53 lines
2.3 KiB
Python
Raw Normal View History

2021-03-05 22:50:11 +00:00
#!/usr/bin/env python
from util import start_cloudflared
class TestConfig:
# tmp_path is a fixture provides a temporary directory unique to the test invocation
def test_validate_ingress_rules(self, tmp_path):
config = {
'metrics': 'localhost:50000',
'ingress': [
{
"hostname": "example.com",
"service": "https://localhost:8000",
"originRequest": {
"originServerName": "test.example.com",
"caPool": "/etc/certs/ca.pem"
},
},
{
"hostname": "api.example.com",
"path": "login",
"service": "https://localhost:9000",
},
{
"hostname": "wss.example.com",
"service": "wss://localhost:8000",
},
{
"hostname": "ssh.example.com",
"service": "ssh://localhost:8000",
},
{"service": "http_status:404"}
],
}
validate_args = ["ingress", "validate"]
pre_args = ["tunnel"]
validate = start_cloudflared(tmp_path, config, validate_args, pre_args)
assert validate.returncode == 0, "failed to validate ingress" + validate.stderr.decode("utf-8")
self.match_rule(tmp_path, config, "http://example.com/index.html", 1)
self.match_rule(tmp_path, config, "https://example.com/index.html", 1)
self.match_rule(tmp_path, config, "https://api.example.com/login", 2)
self.match_rule(tmp_path, config, "https://wss.example.com", 3)
self.match_rule(tmp_path, config, "https://ssh.example.com", 4)
self.match_rule(tmp_path, config, "https://api.example.com", 5)
# This is used to check that the command tunnel ingress url <url> matches rule number <rule_num>. Note that rule number uses 1-based indexing
def match_rule(self, tmp_path, config, url, rule_num):
args = ["ingress", "rule", url]
pre_args = ["tunnel"]
match_rule = start_cloudflared(tmp_path, config, args, pre_args)
assert match_rule.returncode == 0, "failed to check rule" + match_rule.stderr.decode("utf-8")
assert f"Matched rule #{rule_num}" .encode() in match_rule.stdout