|
|
|
@ -8311,6 +8311,85 @@ func TestCatalog_cleanupGatewayWildcards_panic(t *testing.T) {
|
|
|
|
|
require.NoError(t, s.DeleteNode(6, "foo", nil, ""))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestCatalog_cleanupGatewayWildcards_proxy(t *testing.T) {
|
|
|
|
|
s := testStateStore(t)
|
|
|
|
|
|
|
|
|
|
require.NoError(t, s.EnsureNode(0, &structs.Node{
|
|
|
|
|
ID: "c73b8fdf-4ef8-4e43-9aa2-59e85cc6a70c",
|
|
|
|
|
Node: "foo",
|
|
|
|
|
}))
|
|
|
|
|
require.NoError(t, s.EnsureConfigEntry(1, &structs.ProxyConfigEntry{
|
|
|
|
|
Kind: structs.ProxyDefaults,
|
|
|
|
|
Name: structs.ProxyConfigGlobal,
|
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
|
"protocol": "http",
|
|
|
|
|
},
|
|
|
|
|
}))
|
|
|
|
|
|
|
|
|
|
defaultMeta := structs.DefaultEnterpriseMetaInDefaultPartition()
|
|
|
|
|
|
|
|
|
|
require.NoError(t, s.EnsureConfigEntry(3, &structs.IngressGatewayConfigEntry{
|
|
|
|
|
Kind: "ingress-gateway",
|
|
|
|
|
Name: "my-gateway-2-ingress",
|
|
|
|
|
Listeners: []structs.IngressListener{
|
|
|
|
|
{
|
|
|
|
|
Port: 1111,
|
|
|
|
|
Protocol: "http",
|
|
|
|
|
Services: []structs.IngressService{
|
|
|
|
|
{
|
|
|
|
|
Name: "*",
|
|
|
|
|
EnterpriseMeta: *defaultMeta,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}))
|
|
|
|
|
|
|
|
|
|
// Register two services, a regular service, and a sidecar proxy for it
|
|
|
|
|
api := structs.NodeService{
|
|
|
|
|
ID: "api",
|
|
|
|
|
Service: "api",
|
|
|
|
|
Address: "127.0.0.2",
|
|
|
|
|
Port: 443,
|
|
|
|
|
EnterpriseMeta: *defaultMeta,
|
|
|
|
|
}
|
|
|
|
|
require.NoError(t, s.EnsureService(4, "foo", &api))
|
|
|
|
|
proxy := structs.NodeService{
|
|
|
|
|
Kind: structs.ServiceKindConnectProxy,
|
|
|
|
|
ID: "api-proxy",
|
|
|
|
|
Service: "api-proxy",
|
|
|
|
|
Address: "127.0.0.3",
|
|
|
|
|
Port: 443,
|
|
|
|
|
Proxy: structs.ConnectProxyConfig{
|
|
|
|
|
DestinationServiceName: "api",
|
|
|
|
|
DestinationServiceID: "api",
|
|
|
|
|
},
|
|
|
|
|
EnterpriseMeta: *defaultMeta,
|
|
|
|
|
}
|
|
|
|
|
require.NoError(t, s.EnsureService(5, "foo", &proxy))
|
|
|
|
|
|
|
|
|
|
// make sure we have only one gateway service
|
|
|
|
|
_, services, err := s.GatewayServices(nil, "my-gateway-2-ingress", defaultMeta)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.Len(t, services, 1)
|
|
|
|
|
|
|
|
|
|
// now delete the target service
|
|
|
|
|
require.NoError(t, s.DeleteService(6, "foo", "api", nil, ""))
|
|
|
|
|
|
|
|
|
|
// at this point we still have the gateway services because we have a connect proxy still
|
|
|
|
|
_, services, err = s.GatewayServices(nil, "my-gateway-2-ingress", defaultMeta)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.Len(t, services, 1)
|
|
|
|
|
|
|
|
|
|
// now delete the connect proxy
|
|
|
|
|
require.NoError(t, s.DeleteService(7, "foo", "api-proxy", nil, ""))
|
|
|
|
|
|
|
|
|
|
// make sure we no longer have any services
|
|
|
|
|
_, services, err = s.GatewayServices(nil, "my-gateway-2-ingress", defaultMeta)
|
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
require.Len(t, services, 0)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestCatalog_DownstreamsForService(t *testing.T) {
|
|
|
|
|
defaultMeta := structs.DefaultEnterpriseMetaInDefaultPartition()
|
|
|
|
|
|
|
|
|
|