Fix/add unit tests; Styling changes

This commit is contained in:
Zenara Daley 2018-09-14 15:07:57 -04:00
parent 0e6f0bb88d
commit 0de19c8062
3 changed files with 66 additions and 24 deletions

View file

@ -334,7 +334,7 @@ func buildLocation(input interface{}, rewrite bool) string {
return fmt.Sprintf(`~* ^%s%s`, path, baseuri) return fmt.Sprintf(`~* ^%s%s`, path, baseuri)
} }
if rewrite == true { if rewrite {
if path == slash { if path == slash {
return path return path
} }

View file

@ -50,6 +50,7 @@ var (
XForwardedPrefix bool XForwardedPrefix bool
DynamicConfigurationEnabled bool DynamicConfigurationEnabled bool
SecureBackend bool SecureBackend bool
atLeastOneNeedsRewrite bool
}{ }{
"when secure backend enabled": { "when secure backend enabled": {
"/", "/",
@ -61,7 +62,8 @@ var (
false, false,
false, false,
false, false,
true}, true,
false},
"when secure backend and stickeness enabled": { "when secure backend and stickeness enabled": {
"/", "/",
"/", "/",
@ -72,7 +74,8 @@ var (
true, true,
false, false,
false, false,
true}, true,
false},
"when secure backend and dynamic config enabled": { "when secure backend and dynamic config enabled": {
"/", "/",
"/", "/",
@ -83,7 +86,8 @@ var (
false, false,
false, false,
true, true,
true}, true,
false},
"when secure backend, stickeness and dynamic config enabled": { "when secure backend, stickeness and dynamic config enabled": {
"/", "/",
"/", "/",
@ -94,7 +98,8 @@ var (
true, true,
false, false,
true, true,
true}, true,
false},
"invalid redirect / to / with dynamic config enabled": { "invalid redirect / to / with dynamic config enabled": {
"/", "/",
"/", "/",
@ -105,6 +110,7 @@ var (
false, false,
false, false,
true, true,
false,
false}, false},
"invalid redirect / to /": { "invalid redirect / to /": {
"/", "/",
@ -116,6 +122,7 @@ var (
false, false,
false, false,
false, false,
false,
false}, false},
"redirect / to /jenkins": { "redirect / to /jenkins": {
"/", "/",
@ -131,7 +138,8 @@ proxy_pass http://upstream-name;
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /something to /": { "redirect /something to /": {
"/something", "/something",
"/", "/",
@ -146,7 +154,8 @@ proxy_pass http://upstream-name;
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /end-with-slash/ to /not-root": { "redirect /end-with-slash/ to /not-root": {
"/end-with-slash/", "/end-with-slash/",
"/not-root", "/not-root",
@ -161,7 +170,8 @@ proxy_pass http://upstream-name;
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /something-complex to /not-root": { "redirect /something-complex to /not-root": {
"/something-complex", "/something-complex",
"/not-root", "/not-root",
@ -176,7 +186,8 @@ proxy_pass http://upstream-name;
false, false,
false, false,
false, false,
false}, false,
true},
"redirect / to /jenkins and rewrite": { "redirect / to /jenkins and rewrite": {
"/", "/",
"/jenkins", "/jenkins",
@ -194,7 +205,8 @@ subs_filter '(<(?:H|h)(?:E|e)(?:A|a)(?:D|d)(?:[^">]|"[^"]*")*>)' '$1<base href="
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /something to / and rewrite": { "redirect /something to / and rewrite": {
"/something", "/something",
"/", "/",
@ -212,7 +224,8 @@ subs_filter '(<(?:H|h)(?:E|e)(?:A|a)(?:D|d)(?:[^">]|"[^"]*")*>)' '$1<base href="
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /end-with-slash/ to /not-root and rewrite": { "redirect /end-with-slash/ to /not-root and rewrite": {
"/end-with-slash/", "/end-with-slash/",
"/not-root", "/not-root",
@ -230,7 +243,8 @@ subs_filter '(<(?:H|h)(?:E|e)(?:A|a)(?:D|d)(?:[^">]|"[^"]*")*>)' '$1<base href="
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /something-complex to /not-root and rewrite": { "redirect /something-complex to /not-root and rewrite": {
"/something-complex", "/something-complex",
"/not-root", "/not-root",
@ -248,7 +262,8 @@ subs_filter '(<(?:H|h)(?:E|e)(?:A|a)(?:D|d)(?:[^">]|"[^"]*")*>)' '$1<base href="
false, false,
false, false,
false, false,
false}, false,
true},
"redirect /something to / and rewrite with specific scheme": { "redirect /something to / and rewrite with specific scheme": {
"/something", "/something",
"/", "/",
@ -266,7 +281,8 @@ subs_filter '(<(?:H|h)(?:E|e)(?:A|a)(?:D|d)(?:[^">]|"[^"]*")*>)' '$1<base href="
false, false,
false, false,
false, false,
false}, false,
true},
"redirect / to /something with sticky enabled": { "redirect / to /something with sticky enabled": {
"/", "/",
"/something", "/something",
@ -281,7 +297,8 @@ proxy_pass http://sticky-upstream-name;
true, true,
false, false,
false, false,
false}, false,
true},
"redirect / to /something with sticky and dynamic config enabled": { "redirect / to /something with sticky and dynamic config enabled": {
"/", "/",
"/something", "/something",
@ -296,7 +313,8 @@ proxy_pass http://upstream_balancer;
true, true,
false, false,
true, true,
false}, false,
true},
"add the X-Forwarded-Prefix header": { "add the X-Forwarded-Prefix header": {
"/there", "/there",
"/something", "/something",
@ -312,7 +330,32 @@ proxy_pass http://sticky-upstream-name;
true, true,
true, true,
false, false,
false}, false,
true},
"do not use ^~ location modifier on index when ingress does not use rewrite target but at least one other ingress does": {
"/",
"/",
"/",
"proxy_pass http://upstream-name;",
false,
"",
false,
false,
false,
false,
true},
"use ^~ location modifier when ingress does not use rewrite target but at least one other ingress does": {
"/something",
"/something",
"^~ /something",
"proxy_pass http://upstream-name;",
false,
"",
false,
false,
false,
false,
true},
} }
) )
@ -382,7 +425,7 @@ func TestBuildLocation(t *testing.T) {
Rewrite: rewrite.Config{Target: tc.Target, AddBaseURL: tc.AddBaseURL}, Rewrite: rewrite.Config{Target: tc.Target, AddBaseURL: tc.AddBaseURL},
} }
newLoc := buildLocation(loc, tc.Path != tc.Target) newLoc := buildLocation(loc, tc.atLeastOneNeedsRewrite)
if tc.Location != newLoc { if tc.Location != newLoc {
t.Errorf("%s: expected '%v' but returned %v", k, tc.Location, newLoc) t.Errorf("%s: expected '%v' but returned %v", k, tc.Location, newLoc)
} }

View file

@ -121,13 +121,9 @@ var _ = framework.IngressNginxDescribe("Annotations - Rewrite", func() {
It("should use correct longest path match", func() { It("should use correct longest path match", func() {
host := "rewrite.bar.com" host := "rewrite.bar.com"
expectBodyRequestURI := fmt.Sprintf("request_uri=http://%v:8080/.well-known/acme/challenge", host) expectBodyRequestURI := fmt.Sprintf("request_uri=http://%v:8080/.well-known/acme/challenge", host)
annotations := map[string]string{}
rewriteAnnotations := map[string]string{
"nginx.ingress.kubernetes.io/rewrite-target": "/new/backend",
}
By("creating a regular ingress definition") By("creating a regular ingress definition")
ing := framework.NewSingleIngress("kube-lego", "/.well-known/acme/challenge", host, f.IngressController.Namespace, "http-svc", 80, &annotations) ing := framework.NewSingleIngress("kube-lego", "/.well-known/acme/challenge", host, f.IngressController.Namespace, "http-svc", 80, &map[string]string{})
_, err := f.EnsureIngress(ing) _, err := f.EnsureIngress(ing)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
Expect(ing).NotTo(BeNil()) Expect(ing).NotTo(BeNil())
@ -149,7 +145,10 @@ var _ = framework.IngressNginxDescribe("Annotations - Rewrite", func() {
Expect(body).Should(ContainSubstring(expectBodyRequestURI)) Expect(body).Should(ContainSubstring(expectBodyRequestURI))
By(`creating an ingress definition with the rewrite-target annotation set on the "/" location`) By(`creating an ingress definition with the rewrite-target annotation set on the "/" location`)
rewriteIng := framework.NewSingleIngress("rewrite-index", "/", host, f.IngressController.Namespace, "http-svc", 80, &rewriteAnnotations) annotations := map[string]string{
"nginx.ingress.kubernetes.io/rewrite-target": "/new/backend",
}
rewriteIng := framework.NewSingleIngress("rewrite-index", "/", host, f.IngressController.Namespace, "http-svc", 80, &annotations)
_, err = f.EnsureIngress(rewriteIng) _, err = f.EnsureIngress(rewriteIng)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
Expect(rewriteIng).NotTo(BeNil()) Expect(rewriteIng).NotTo(BeNil())