|
|
|
@ -19,25 +19,17 @@ load helpers
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@test "ingress-gateway should have healthy endpoints for s1" {
|
|
|
|
|
assert_upstream_has_endpoints_in_status 127.0.0.1:20000 s1 HEALTHY 1
|
|
|
|
|
assert_upstream_has_endpoints_in_status 127.0.0.1:20000 s1 HEALTHY 1
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@test "should be able to connect to s1 through the TLS-enabled ingress port" {
|
|
|
|
|
assert_dnssan_in_cert localhost:9998 '\*.ingress.consul'
|
|
|
|
|
# Use the --resolve argument to fake dns resolution for now so we can use the
|
|
|
|
|
# s1.ingress.consul domain to validate the cert
|
|
|
|
|
run retry_default curl --cacert <(get_ca_root) -s -f -d hello \
|
|
|
|
|
--resolve s1.ingress.consul:9998:127.0.0.1 \
|
|
|
|
|
https://s1.ingress.consul:9998
|
|
|
|
|
[ "$status" -eq 0 ]
|
|
|
|
|
[[ "$output" == *"hello"* ]]
|
|
|
|
|
cacert_curl s1.ingress.consul:9998:127.0.0.1 https://s1.ingress.consul:9998
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@test "should be able to connect to s1 through the TLS-enabled ingress port using the custom host" {
|
|
|
|
|
assert_dnssan_in_cert localhost:9999 'test.example.com'
|
|
|
|
|
run retry_default curl --cacert <(get_ca_root) -s -f -d hello \
|
|
|
|
|
--resolve test.example.com:9999:127.0.0.1 \
|
|
|
|
|
https://test.example.com:9999
|
|
|
|
|
[ "$status" -eq 0 ]
|
|
|
|
|
[[ "$output" == *"hello"* ]]
|
|
|
|
|
cacert_curl test.example.com:9999:127.0.0.1 https://test.example.com:9999
|
|
|
|
|
}
|
|
|
|
|