ingress-nginx-helm/internal/ingress/annotations/rewrite/main_test.go

222 lines
5.4 KiB
Go
Raw Normal View History

2016-05-25 21:04:34 +00:00
/*
Copyright 2015 The Kubernetes Authors.
2016-05-25 21:04:34 +00:00
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package rewrite
import (
"testing"
2017-07-16 19:19:59 +00:00
api "k8s.io/api/core/v1"
networking "k8s.io/api/networking/v1beta1"
2017-04-01 14:39:42 +00:00
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr"
2016-06-05 13:36:00 +00:00
2017-11-23 16:46:23 +00:00
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
2017-11-07 22:02:12 +00:00
"k8s.io/ingress-nginx/internal/ingress/defaults"
2017-11-08 20:58:57 +00:00
"k8s.io/ingress-nginx/internal/ingress/resolver"
2016-05-25 21:04:34 +00:00
)
const (
defRoute = "/demo"
)
func buildIngress() *networking.Ingress {
defaultBackend := networking.IngressBackend{
2016-05-25 21:04:34 +00:00
ServiceName: "default-backend",
ServicePort: intstr.FromInt(80),
}
return &networking.Ingress{
2017-04-01 14:39:42 +00:00
ObjectMeta: meta_v1.ObjectMeta{
Name: "foo",
Namespace: api.NamespaceDefault,
Annotations: map[string]string{},
2016-05-25 21:04:34 +00:00
},
Spec: networking.IngressSpec{
Backend: &networking.IngressBackend{
2016-05-25 21:04:34 +00:00
ServiceName: "default-backend",
ServicePort: intstr.FromInt(80),
},
Rules: []networking.IngressRule{
2016-05-25 21:04:34 +00:00
{
Host: "foo.bar.com",
IngressRuleValue: networking.IngressRuleValue{
HTTP: &networking.HTTPIngressRuleValue{
Paths: []networking.HTTPIngressPath{
2016-05-25 21:04:34 +00:00
{
Path: "/foo",
Backend: defaultBackend,
},
},
},
},
},
},
},
}
}
type mockBackend struct {
2017-11-08 20:58:57 +00:00
resolver.Mock
redirect bool
}
func (m mockBackend) GetDefaultBackend() defaults.Backend {
return defaults.Backend{SSLRedirect: m.redirect}
}
2016-05-25 21:04:34 +00:00
func TestWithoutAnnotations(t *testing.T) {
ing := buildIngress()
_, err := NewParser(mockBackend{}).Parse(ing)
2017-02-11 21:34:50 +00:00
if err != nil {
t.Errorf("unexpected error with ingress without annotations: %v", err)
2016-05-25 21:04:34 +00:00
}
}
func TestRedirect(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
2017-11-23 16:46:23 +00:00
data[parser.GetAnnotationWithPrefix("rewrite-target")] = defRoute
2016-05-25 21:04:34 +00:00
ing.SetAnnotations(data)
i, err := NewParser(mockBackend{}).Parse(ing)
2016-05-25 21:04:34 +00:00
if err != nil {
t.Errorf("Unexpected error with ingress: %v", err)
}
2017-11-07 16:36:51 +00:00
redirect, ok := i.(*Config)
if !ok {
t.Errorf("expected a Redirect type")
2016-05-25 21:04:34 +00:00
}
if redirect.Target != defRoute {
t.Errorf("Expected %v as redirect but returned %s", defRoute, redirect.Target)
2016-05-25 21:04:34 +00:00
}
}
func TestSSLRedirect(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
2017-11-23 16:46:23 +00:00
data[parser.GetAnnotationWithPrefix("rewrite-target")] = defRoute
ing.SetAnnotations(data)
2017-11-08 20:58:57 +00:00
i, _ := NewParser(mockBackend{redirect: true}).Parse(ing)
2017-11-07 16:36:51 +00:00
redirect, ok := i.(*Config)
if !ok {
t.Errorf("expected a Redirect type")
}
if !redirect.SSLRedirect {
t.Errorf("Expected true but returned false")
}
2017-11-23 16:46:23 +00:00
data[parser.GetAnnotationWithPrefix("ssl-redirect")] = "false"
ing.SetAnnotations(data)
2017-11-08 20:58:57 +00:00
i, _ = NewParser(mockBackend{redirect: false}).Parse(ing)
2017-11-07 16:36:51 +00:00
redirect, ok = i.(*Config)
if !ok {
t.Errorf("expected a Redirect type")
}
if redirect.SSLRedirect {
t.Errorf("Expected false but returned true")
}
}
func TestForceSSLRedirect(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
2017-11-23 16:46:23 +00:00
data[parser.GetAnnotationWithPrefix("rewrite-target")] = defRoute
ing.SetAnnotations(data)
2017-11-08 20:58:57 +00:00
i, _ := NewParser(mockBackend{redirect: true}).Parse(ing)
2017-11-07 16:36:51 +00:00
redirect, ok := i.(*Config)
if !ok {
t.Errorf("expected a Redirect type")
}
if redirect.ForceSSLRedirect {
t.Errorf("Expected false but returned true")
}
2017-11-23 16:46:23 +00:00
data[parser.GetAnnotationWithPrefix("force-ssl-redirect")] = "true"
ing.SetAnnotations(data)
2017-11-08 20:58:57 +00:00
i, _ = NewParser(mockBackend{redirect: false}).Parse(ing)
2017-11-07 16:36:51 +00:00
redirect, ok = i.(*Config)
if !ok {
t.Errorf("expected a Redirect type")
}
if !redirect.ForceSSLRedirect {
t.Errorf("Expected true but returned false")
}
}
func TestAppRoot(t *testing.T) {
ap := NewParser(mockBackend{redirect: true})
testCases := []struct {
title string
path string
expected string
errExpected bool
}{
{"Empty path should return an error", "", "", true},
{"Relative paths are not allowed", "demo", "", true},
{"Path / should pass", "/", "/", false},
{"Path /demo should pass", "/demo", "/demo", false},
}
for _, testCase := range testCases {
t.Run(testCase.title, func(t *testing.T) {
ing := buildIngress()
ing.Annotations[parser.GetAnnotationWithPrefix("app-root")] = testCase.path
i, err := ap.Parse(ing)
if err != nil {
if testCase.errExpected {
return
}
t.Fatalf("%v: unexpected error obtaining running address/es: %v", testCase.title, err)
}
rewrite, ok := i.(*Config)
if !ok {
t.Fatalf("expected a rewrite Config")
}
if testCase.expected != rewrite.AppRoot {
t.Fatalf("%v: expected AppRoot with value %v but was returned: %v", testCase.title, testCase.expected, rewrite.AppRoot)
}
})
}
}
func TestUseRegex(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
data[parser.GetAnnotationWithPrefix("use-regex")] = "true"
ing.SetAnnotations(data)
i, _ := NewParser(mockBackend{redirect: true}).Parse(ing)
redirect, ok := i.(*Config)
if !ok {
t.Errorf("expected a App Context")
}
2018-10-30 23:46:48 +00:00
if !redirect.UseRegex {
t.Errorf("Unexpected value got in UseRegex")
}
}