216 lines
5.1 KiB
Go
216 lines
5.1 KiB
Go
package config
|
|
|
|
import (
|
|
"encoding/json"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
yaml "gopkg.in/yaml.v2"
|
|
)
|
|
|
|
func TestConfigFileSettings(t *testing.T) {
|
|
var (
|
|
firstIngress = UnvalidatedIngressRule{
|
|
Hostname: "tunnel1.example.com",
|
|
Path: "/id",
|
|
Service: "https://localhost:8000",
|
|
}
|
|
secondIngress = UnvalidatedIngressRule{
|
|
Hostname: "*",
|
|
Path: "",
|
|
Service: "https://localhost:8001",
|
|
}
|
|
warpRouting = WarpRoutingConfig{
|
|
Enabled: true,
|
|
}
|
|
)
|
|
rawYAML := `
|
|
tunnel: config-file-test
|
|
originRequest:
|
|
ipRules:
|
|
- prefix: "10.0.0.0/8"
|
|
ports:
|
|
- 80
|
|
- 8080
|
|
allow: false
|
|
- prefix: "fc00::/7"
|
|
ports:
|
|
- 443
|
|
- 4443
|
|
allow: true
|
|
ingress:
|
|
- hostname: tunnel1.example.com
|
|
path: /id
|
|
service: https://localhost:8000
|
|
- hostname: "*"
|
|
service: https://localhost:8001
|
|
warp-routing:
|
|
enabled: true
|
|
retries: 5
|
|
grace-period: 30s
|
|
percentage: 3.14
|
|
hostname: example.com
|
|
tag:
|
|
- test
|
|
- central-1
|
|
counters:
|
|
- 123
|
|
- 456
|
|
`
|
|
var config configFileSettings
|
|
err := yaml.Unmarshal([]byte(rawYAML), &config)
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, "config-file-test", config.TunnelID)
|
|
assert.Equal(t, firstIngress, config.Ingress[0])
|
|
assert.Equal(t, secondIngress, config.Ingress[1])
|
|
assert.Equal(t, warpRouting, config.WarpRouting)
|
|
privateV4 := "10.0.0.0/8"
|
|
privateV6 := "fc00::/7"
|
|
ipRules := []IngressIPRule{
|
|
{
|
|
Prefix: &privateV4,
|
|
Ports: []int{80, 8080},
|
|
Allow: false,
|
|
},
|
|
{
|
|
Prefix: &privateV6,
|
|
Ports: []int{443, 4443},
|
|
Allow: true,
|
|
},
|
|
}
|
|
assert.Equal(t, ipRules, config.OriginRequest.IPRules)
|
|
|
|
retries, err := config.Int("retries")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 5, retries)
|
|
|
|
gracePeriod, err := config.Duration("grace-period")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, time.Second*30, gracePeriod)
|
|
|
|
percentage, err := config.Float64("percentage")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 3.14, percentage)
|
|
|
|
hostname, err := config.String("hostname")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "example.com", hostname)
|
|
|
|
tags, err := config.StringSlice("tag")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "test", tags[0])
|
|
assert.Equal(t, "central-1", tags[1])
|
|
|
|
counters, err := config.IntSlice("counters")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 123, counters[0])
|
|
assert.Equal(t, 456, counters[1])
|
|
|
|
}
|
|
|
|
var rawConfig = []byte(`
|
|
{
|
|
"connectTimeout": 10,
|
|
"tlsTimeout": 30,
|
|
"tcpKeepAlive": 30,
|
|
"noHappyEyeballs": true,
|
|
"keepAliveTimeout": 60,
|
|
"keepAliveConnections": 10,
|
|
"httpHostHeader": "app.tunnel.com",
|
|
"originServerName": "app.tunnel.com",
|
|
"caPool": "/etc/capool",
|
|
"noTLSVerify": true,
|
|
"disableChunkedEncoding": true,
|
|
"bastionMode": true,
|
|
"proxyAddress": "127.0.0.3",
|
|
"proxyPort": 9000,
|
|
"proxyType": "socks",
|
|
"ipRules": [
|
|
{
|
|
"prefix": "10.0.0.0/8",
|
|
"ports": [80, 8080],
|
|
"allow": false
|
|
},
|
|
{
|
|
"prefix": "fc00::/7",
|
|
"ports": [443, 4443],
|
|
"allow": true
|
|
}
|
|
]
|
|
}
|
|
`)
|
|
|
|
func TestMarshalUnmarshalOriginRequest(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
marshalFunc func(in interface{}) (out []byte, err error)
|
|
unMarshalFunc func(in []byte, out interface{}) (err error)
|
|
baseUnit time.Duration
|
|
}{
|
|
{"json", json.Marshal, json.Unmarshal, time.Second},
|
|
{"yaml", yaml.Marshal, yaml.Unmarshal, time.Nanosecond},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
assertConfig(t, tc.marshalFunc, tc.unMarshalFunc, tc.baseUnit)
|
|
})
|
|
}
|
|
}
|
|
|
|
func assertConfig(
|
|
t *testing.T,
|
|
marshalFunc func(in interface{}) (out []byte, err error),
|
|
unMarshalFunc func(in []byte, out interface{}) (err error),
|
|
baseUnit time.Duration,
|
|
) {
|
|
var config OriginRequestConfig
|
|
var config2 OriginRequestConfig
|
|
|
|
assert.NoError(t, unMarshalFunc(rawConfig, &config))
|
|
|
|
assert.Equal(t, baseUnit*10, config.ConnectTimeout.Duration)
|
|
assert.Equal(t, baseUnit*30, config.TLSTimeout.Duration)
|
|
assert.Equal(t, baseUnit*30, config.TCPKeepAlive.Duration)
|
|
assert.Equal(t, true, *config.NoHappyEyeballs)
|
|
assert.Equal(t, baseUnit*60, config.KeepAliveTimeout.Duration)
|
|
assert.Equal(t, 10, *config.KeepAliveConnections)
|
|
assert.Equal(t, "app.tunnel.com", *config.HTTPHostHeader)
|
|
assert.Equal(t, "app.tunnel.com", *config.OriginServerName)
|
|
assert.Equal(t, "/etc/capool", *config.CAPool)
|
|
assert.Equal(t, true, *config.NoTLSVerify)
|
|
assert.Equal(t, true, *config.DisableChunkedEncoding)
|
|
assert.Equal(t, true, *config.BastionMode)
|
|
assert.Equal(t, "127.0.0.3", *config.ProxyAddress)
|
|
assert.Equal(t, true, *config.NoTLSVerify)
|
|
assert.Equal(t, uint(9000), *config.ProxyPort)
|
|
assert.Equal(t, "socks", *config.ProxyType)
|
|
|
|
privateV4 := "10.0.0.0/8"
|
|
privateV6 := "fc00::/7"
|
|
ipRules := []IngressIPRule{
|
|
{
|
|
Prefix: &privateV4,
|
|
Ports: []int{80, 8080},
|
|
Allow: false,
|
|
},
|
|
{
|
|
Prefix: &privateV6,
|
|
Ports: []int{443, 4443},
|
|
Allow: true,
|
|
},
|
|
}
|
|
assert.Equal(t, ipRules, config.IPRules)
|
|
|
|
// validate that serializing and deserializing again matches the deserialization from raw string
|
|
result, err := marshalFunc(config)
|
|
require.NoError(t, err)
|
|
err = unMarshalFunc(result, &config2)
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, config2, config)
|
|
}
|