github.com/iqoqo/nomad@v0.11.3-0.20200911112621-d7021c74d101/nomad/structs/config/vault_test.go (about) 1 package config 2 3 import ( 4 "reflect" 5 "testing" 6 7 "github.com/stretchr/testify/require" 8 ) 9 10 func TestVaultConfig_Merge(t *testing.T) { 11 trueValue, falseValue := true, false 12 c1 := &VaultConfig{ 13 Enabled: &falseValue, 14 Token: "1", 15 Role: "1", 16 AllowUnauthenticated: &trueValue, 17 TaskTokenTTL: "1", 18 Addr: "1", 19 TLSCaFile: "1", 20 TLSCaPath: "1", 21 TLSCertFile: "1", 22 TLSKeyFile: "1", 23 TLSSkipVerify: &trueValue, 24 TLSServerName: "1", 25 } 26 27 c2 := &VaultConfig{ 28 Enabled: &trueValue, 29 Token: "2", 30 Role: "2", 31 AllowUnauthenticated: &falseValue, 32 TaskTokenTTL: "2", 33 Addr: "2", 34 TLSCaFile: "2", 35 TLSCaPath: "2", 36 TLSCertFile: "2", 37 TLSKeyFile: "2", 38 TLSSkipVerify: nil, 39 TLSServerName: "2", 40 } 41 42 e := &VaultConfig{ 43 Enabled: &trueValue, 44 Token: "2", 45 Role: "2", 46 AllowUnauthenticated: &falseValue, 47 TaskTokenTTL: "2", 48 Addr: "2", 49 TLSCaFile: "2", 50 TLSCaPath: "2", 51 TLSCertFile: "2", 52 TLSKeyFile: "2", 53 TLSSkipVerify: &trueValue, 54 TLSServerName: "2", 55 } 56 57 result := c1.Merge(c2) 58 if !reflect.DeepEqual(result, e) { 59 t.Fatalf("bad:\n%#v\n%#v", result, e) 60 } 61 } 62 63 func TestVaultConfig_IsEqual(t *testing.T) { 64 require := require.New(t) 65 66 trueValue, falseValue := true, false 67 c1 := &VaultConfig{ 68 Enabled: &falseValue, 69 Token: "1", 70 Role: "1", 71 AllowUnauthenticated: &trueValue, 72 TaskTokenTTL: "1", 73 Addr: "1", 74 TLSCaFile: "1", 75 TLSCaPath: "1", 76 TLSCertFile: "1", 77 TLSKeyFile: "1", 78 TLSSkipVerify: &trueValue, 79 TLSServerName: "1", 80 } 81 82 c2 := &VaultConfig{ 83 Enabled: &falseValue, 84 Token: "1", 85 Role: "1", 86 AllowUnauthenticated: &trueValue, 87 TaskTokenTTL: "1", 88 Addr: "1", 89 TLSCaFile: "1", 90 TLSCaPath: "1", 91 TLSCertFile: "1", 92 TLSKeyFile: "1", 93 TLSSkipVerify: &trueValue, 94 TLSServerName: "1", 95 } 96 97 require.True(c1.IsEqual(c2)) 98 99 c3 := &VaultConfig{ 100 Enabled: &trueValue, 101 Token: "1", 102 Role: "1", 103 AllowUnauthenticated: &trueValue, 104 TaskTokenTTL: "1", 105 Addr: "1", 106 TLSCaFile: "1", 107 TLSCaPath: "1", 108 TLSCertFile: "1", 109 TLSKeyFile: "1", 110 TLSSkipVerify: &trueValue, 111 TLSServerName: "1", 112 } 113 114 c4 := &VaultConfig{ 115 Enabled: &falseValue, 116 Token: "1", 117 Role: "1", 118 AllowUnauthenticated: &trueValue, 119 TaskTokenTTL: "1", 120 Addr: "1", 121 TLSCaFile: "1", 122 TLSCaPath: "1", 123 TLSCertFile: "1", 124 TLSKeyFile: "1", 125 TLSSkipVerify: &trueValue, 126 TLSServerName: "1", 127 } 128 require.False(c3.IsEqual(c4)) 129 }