|
|
@@ -9,20 +9,19 @@ import (
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
)
|
|
|
|
|
|
-
|
|
|
// Ensures that a configuration can be deserialized from TOML.
|
|
|
func TestConfigTOML(t *testing.T) {
|
|
|
content := `
|
|
|
- advertised_url = "127.0.0.1:4002"
|
|
|
+ addr = "127.0.0.1:4002"
|
|
|
ca_file = "/tmp/file.ca"
|
|
|
cert_file = "/tmp/file.cert"
|
|
|
- cors = ["*"]
|
|
|
+ cors_origins = ["*"]
|
|
|
cpu_profile_file = "XXX"
|
|
|
- datadir = "/tmp/data"
|
|
|
+ data_dir = "/tmp/data"
|
|
|
key_file = "/tmp/file.key"
|
|
|
- listen_host = "127.0.0.1:4003"
|
|
|
- machines = ["coreos.com:4001", "coreos.com:4002"]
|
|
|
- machines_file = "/tmp/machines"
|
|
|
+ bind_addr = "127.0.0.1:4003"
|
|
|
+ peers = ["coreos.com:4001", "coreos.com:4002"]
|
|
|
+ peers_file = "/tmp/peers"
|
|
|
max_cluster_size = 10
|
|
|
max_result_buffer = 512
|
|
|
max_retry_attempts = 5
|
|
|
@@ -33,24 +32,24 @@ func TestConfigTOML(t *testing.T) {
|
|
|
web_url = "/web"
|
|
|
|
|
|
[peer]
|
|
|
- advertised_url = "127.0.0.1:7002"
|
|
|
+ addr = "127.0.0.1:7002"
|
|
|
ca_file = "/tmp/peer/file.ca"
|
|
|
cert_file = "/tmp/peer/file.cert"
|
|
|
key_file = "/tmp/peer/file.key"
|
|
|
- listen_host = "127.0.0.1:7003"
|
|
|
+ bind_addr = "127.0.0.1:7003"
|
|
|
`
|
|
|
c := NewConfig()
|
|
|
_, err := toml.Decode(content, &c)
|
|
|
assert.Nil(t, err, "")
|
|
|
- assert.Equal(t, c.AdvertisedUrl, "127.0.0.1:4002", "")
|
|
|
+ assert.Equal(t, c.Addr, "127.0.0.1:4002", "")
|
|
|
assert.Equal(t, c.CAFile, "/tmp/file.ca", "")
|
|
|
assert.Equal(t, c.CertFile, "/tmp/file.cert", "")
|
|
|
- assert.Equal(t, c.Cors, []string{"*"}, "")
|
|
|
+ assert.Equal(t, c.CorsOrigins, []string{"*"}, "")
|
|
|
assert.Equal(t, c.DataDir, "/tmp/data", "")
|
|
|
assert.Equal(t, c.KeyFile, "/tmp/file.key", "")
|
|
|
- assert.Equal(t, c.ListenHost, "127.0.0.1:4003", "")
|
|
|
- assert.Equal(t, c.Machines, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
- assert.Equal(t, c.MachinesFile, "/tmp/machines", "")
|
|
|
+ assert.Equal(t, c.BindAddr, "127.0.0.1:4003", "")
|
|
|
+ assert.Equal(t, c.Peers, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
+ assert.Equal(t, c.PeersFile, "/tmp/peers", "")
|
|
|
assert.Equal(t, c.MaxClusterSize, 10, "")
|
|
|
assert.Equal(t, c.MaxResultBuffer, 512, "")
|
|
|
assert.Equal(t, c.MaxRetryAttempts, 5, "")
|
|
|
@@ -59,11 +58,11 @@ func TestConfigTOML(t *testing.T) {
|
|
|
assert.Equal(t, c.Verbose, true, "")
|
|
|
assert.Equal(t, c.VeryVerbose, true, "")
|
|
|
assert.Equal(t, c.WebURL, "/web", "")
|
|
|
- assert.Equal(t, c.Peer.AdvertisedUrl, "127.0.0.1:7002", "")
|
|
|
+ assert.Equal(t, c.Peer.Addr, "127.0.0.1:7002", "")
|
|
|
assert.Equal(t, c.Peer.CAFile, "/tmp/peer/file.ca", "")
|
|
|
assert.Equal(t, c.Peer.CertFile, "/tmp/peer/file.cert", "")
|
|
|
assert.Equal(t, c.Peer.KeyFile, "/tmp/peer/file.key", "")
|
|
|
- assert.Equal(t, c.Peer.ListenHost, "127.0.0.1:7003", "")
|
|
|
+ assert.Equal(t, c.Peer.BindAddr, "127.0.0.1:7003", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that a configuration can be retrieved from environment variables.
|
|
|
@@ -71,12 +70,12 @@ func TestConfigEnv(t *testing.T) {
|
|
|
os.Setenv("ETCD_CA_FILE", "/tmp/file.ca")
|
|
|
os.Setenv("ETCD_CERT_FILE", "/tmp/file.cert")
|
|
|
os.Setenv("ETCD_CPU_PROFILE_FILE", "XXX")
|
|
|
- os.Setenv("ETCD_CORS", "localhost:4001,localhost:4002")
|
|
|
- os.Setenv("ETCD_DATADIR", "/tmp/data")
|
|
|
+ os.Setenv("ETCD_CORS_ORIGINS", "localhost:4001,localhost:4002")
|
|
|
+ os.Setenv("ETCD_DATA_DIR", "/tmp/data")
|
|
|
os.Setenv("ETCD_KEY_FILE", "/tmp/file.key")
|
|
|
- os.Setenv("ETCD_LISTEN_HOST", "127.0.0.1:4003")
|
|
|
- os.Setenv("ETCD_MACHINES", "coreos.com:4001,coreos.com:4002")
|
|
|
- os.Setenv("ETCD_MACHINES_FILE", "/tmp/machines")
|
|
|
+ os.Setenv("ETCD_BIND_ADDR", "127.0.0.1:4003")
|
|
|
+ os.Setenv("ETCD_PEERS", "coreos.com:4001,coreos.com:4002")
|
|
|
+ os.Setenv("ETCD_PEERS_FILE", "/tmp/peers")
|
|
|
os.Setenv("ETCD_MAX_CLUSTER_SIZE", "10")
|
|
|
os.Setenv("ETCD_MAX_RESULT_BUFFER", "512")
|
|
|
os.Setenv("ETCD_MAX_RETRY_ATTEMPTS", "5")
|
|
|
@@ -85,22 +84,22 @@ func TestConfigEnv(t *testing.T) {
|
|
|
os.Setenv("ETCD_VERBOSE", "1")
|
|
|
os.Setenv("ETCD_VERY_VERBOSE", "yes")
|
|
|
os.Setenv("ETCD_WEB_URL", "/web")
|
|
|
- os.Setenv("ETCD_PEER_ADVERTISED_URL", "127.0.0.1:7002")
|
|
|
+ os.Setenv("ETCD_PEER_ADDR", "127.0.0.1:7002")
|
|
|
os.Setenv("ETCD_PEER_CA_FILE", "/tmp/peer/file.ca")
|
|
|
os.Setenv("ETCD_PEER_CERT_FILE", "/tmp/peer/file.cert")
|
|
|
os.Setenv("ETCD_PEER_KEY_FILE", "/tmp/peer/file.key")
|
|
|
- os.Setenv("ETCD_PEER_LISTEN_HOST", "127.0.0.1:7003")
|
|
|
-
|
|
|
+ os.Setenv("ETCD_PEER_BIND_ADDR", "127.0.0.1:7003")
|
|
|
+
|
|
|
c := NewConfig()
|
|
|
c.LoadEnv()
|
|
|
assert.Equal(t, c.CAFile, "/tmp/file.ca", "")
|
|
|
assert.Equal(t, c.CertFile, "/tmp/file.cert", "")
|
|
|
- assert.Equal(t, c.Cors, []string{"localhost:4001", "localhost:4002"}, "")
|
|
|
+ assert.Equal(t, c.CorsOrigins, []string{"localhost:4001", "localhost:4002"}, "")
|
|
|
assert.Equal(t, c.DataDir, "/tmp/data", "")
|
|
|
assert.Equal(t, c.KeyFile, "/tmp/file.key", "")
|
|
|
- assert.Equal(t, c.ListenHost, "127.0.0.1:4003", "")
|
|
|
- assert.Equal(t, c.Machines, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
- assert.Equal(t, c.MachinesFile, "/tmp/machines", "")
|
|
|
+ assert.Equal(t, c.BindAddr, "127.0.0.1:4003", "")
|
|
|
+ assert.Equal(t, c.Peers, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
+ assert.Equal(t, c.PeersFile, "/tmp/peers", "")
|
|
|
assert.Equal(t, c.MaxClusterSize, 10, "")
|
|
|
assert.Equal(t, c.MaxResultBuffer, 512, "")
|
|
|
assert.Equal(t, c.MaxRetryAttempts, 5, "")
|
|
|
@@ -109,26 +108,26 @@ func TestConfigEnv(t *testing.T) {
|
|
|
assert.Equal(t, c.Verbose, true, "")
|
|
|
assert.Equal(t, c.VeryVerbose, true, "")
|
|
|
assert.Equal(t, c.WebURL, "/web", "")
|
|
|
- assert.Equal(t, c.Peer.AdvertisedUrl, "127.0.0.1:7002", "")
|
|
|
+ assert.Equal(t, c.Peer.Addr, "127.0.0.1:7002", "")
|
|
|
assert.Equal(t, c.Peer.CAFile, "/tmp/peer/file.ca", "")
|
|
|
assert.Equal(t, c.Peer.CertFile, "/tmp/peer/file.cert", "")
|
|
|
assert.Equal(t, c.Peer.KeyFile, "/tmp/peer/file.key", "")
|
|
|
- assert.Equal(t, c.Peer.ListenHost, "127.0.0.1:7003", "")
|
|
|
+ assert.Equal(t, c.Peer.BindAddr, "127.0.0.1:7003", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that a the advertised url can be parsed from the environment.
|
|
|
-func TestConfigAdvertisedUrlEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_ADVERTISED_URL", "127.0.0.1:4002", func(c *Config) {
|
|
|
+func TestConfigAddrEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_ADDR", "127.0.0.1:4002", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.AdvertisedUrl, "127.0.0.1:4002", "")
|
|
|
+ assert.Equal(t, c.Addr, "127.0.0.1:4002", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that a the advertised flag can be parsed.
|
|
|
-func TestConfigAdvertisedUrlFlag(t *testing.T) {
|
|
|
+func TestConfigAddrFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-c", "127.0.0.1:4002"}), "")
|
|
|
- assert.Equal(t, c.AdvertisedUrl, "127.0.0.1:4002", "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-addr", "127.0.0.1:4002"}), "")
|
|
|
+ assert.Equal(t, c.Addr, "127.0.0.1:4002", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that a the CA file can be parsed from the environment.
|
|
|
@@ -142,7 +141,7 @@ func TestConfigCAFileEnv(t *testing.T) {
|
|
|
// Ensures that a the CA file flag can be parsed.
|
|
|
func TestConfigCAFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-clientCAFile", "/tmp/file.ca"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-ca-file", "/tmp/file.ca"}), "")
|
|
|
assert.Equal(t, c.CAFile, "/tmp/file.ca", "")
|
|
|
}
|
|
|
|
|
|
@@ -157,7 +156,7 @@ func TestConfigCertFileEnv(t *testing.T) {
|
|
|
// Ensures that a the Cert file flag can be parsed.
|
|
|
func TestConfigCertFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-clientCert", "/tmp/file.cert"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-cert-file", "/tmp/file.cert"}), "")
|
|
|
assert.Equal(t, c.CertFile, "/tmp/file.cert", "")
|
|
|
}
|
|
|
|
|
|
@@ -172,53 +171,53 @@ func TestConfigKeyFileEnv(t *testing.T) {
|
|
|
// Ensures that a the Key file flag can be parsed.
|
|
|
func TestConfigKeyFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-clientKey", "/tmp/file.key"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-key-file", "/tmp/file.key"}), "")
|
|
|
assert.Equal(t, c.KeyFile, "/tmp/file.key", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that a the Listen Host can be parsed from the environment.
|
|
|
-func TestConfigListenHostEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_LISTEN_HOST", "127.0.0.1:4003", func(c *Config) {
|
|
|
+func TestConfigBindAddrEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_BIND_ADDR", "127.0.0.1:4003", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.ListenHost, "127.0.0.1:4003", "")
|
|
|
+ assert.Equal(t, c.BindAddr, "127.0.0.1:4003", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that a the Listen Host file flag can be parsed.
|
|
|
-func TestConfigListenHostFlag(t *testing.T) {
|
|
|
+func TestConfigBindAddrFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-cl", "127.0.0.1:4003"}), "")
|
|
|
- assert.Equal(t, c.ListenHost, "127.0.0.1:4003", "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-bind-addr", "127.0.0.1:4003"}), "")
|
|
|
+ assert.Equal(t, c.BindAddr, "127.0.0.1:4003", "")
|
|
|
}
|
|
|
|
|
|
-// Ensures that the Machines can be parsed from the environment.
|
|
|
-func TestConfigMachinesEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_MACHINES", "coreos.com:4001,coreos.com:4002", func(c *Config) {
|
|
|
+// Ensures that the peers can be parsed from the environment.
|
|
|
+func TestConfigPeersEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_PEERS", "coreos.com:4001,coreos.com:4002", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.Machines, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
+ assert.Equal(t, c.Peers, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
-// Ensures that a the Machines flag can be parsed.
|
|
|
-func TestConfigMachinesFlag(t *testing.T) {
|
|
|
+// Ensures that a the Peers flag can be parsed.
|
|
|
+func TestConfigPeersFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-C", "coreos.com:4001,coreos.com:4002"}), "")
|
|
|
- assert.Equal(t, c.Machines, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peers", "coreos.com:4001,coreos.com:4002"}), "")
|
|
|
+ assert.Equal(t, c.Peers, []string{"coreos.com:4001", "coreos.com:4002"}, "")
|
|
|
}
|
|
|
|
|
|
-// Ensures that the Machines File can be parsed from the environment.
|
|
|
-func TestConfigMachinesFileEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_MACHINES_FILE", "/tmp/machines", func(c *Config) {
|
|
|
+// Ensures that the Peers File can be parsed from the environment.
|
|
|
+func TestConfigPeersFileEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_PEERS_FILE", "/tmp/peers", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.MachinesFile, "/tmp/machines", "")
|
|
|
+ assert.Equal(t, c.PeersFile, "/tmp/peers", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
-// Ensures that a the Machines File flag can be parsed.
|
|
|
-func TestConfigMachinesFileFlag(t *testing.T) {
|
|
|
+// Ensures that a the Peers File flag can be parsed.
|
|
|
+func TestConfigPeersFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-CF", "/tmp/machines"}), "")
|
|
|
- assert.Equal(t, c.MachinesFile, "/tmp/machines", "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peers-file", "/tmp/peers"}), "")
|
|
|
+ assert.Equal(t, c.PeersFile, "/tmp/peers", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that the Max Cluster Size can be parsed from the environment.
|
|
|
@@ -232,7 +231,7 @@ func TestConfigMaxClusterSizeEnv(t *testing.T) {
|
|
|
// Ensures that a the Max Cluster Size flag can be parsed.
|
|
|
func TestConfigMaxClusterSizeFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-maxsize", "5"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-max-cluster-size", "5"}), "")
|
|
|
assert.Equal(t, c.MaxClusterSize, 5, "")
|
|
|
}
|
|
|
|
|
|
@@ -247,7 +246,7 @@ func TestConfigMaxResultBufferEnv(t *testing.T) {
|
|
|
// Ensures that a the Max Result Buffer flag can be parsed.
|
|
|
func TestConfigMaxResultBufferFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-m", "512"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-max-result-buffer", "512"}), "")
|
|
|
assert.Equal(t, c.MaxResultBuffer, 512, "")
|
|
|
}
|
|
|
|
|
|
@@ -262,7 +261,7 @@ func TestConfigMaxRetryAttemptsEnv(t *testing.T) {
|
|
|
// Ensures that a the Max Retry Attempts flag can be parsed.
|
|
|
func TestConfigMaxRetryAttemptsFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-r", "10"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-max-retry-attempts", "10"}), "")
|
|
|
assert.Equal(t, c.MaxRetryAttempts, 10, "")
|
|
|
}
|
|
|
|
|
|
@@ -277,7 +276,7 @@ func TestConfigNameEnv(t *testing.T) {
|
|
|
// Ensures that a the Name flag can be parsed.
|
|
|
func TestConfigNameFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-n", "test-name"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-name", "test-name"}), "")
|
|
|
assert.Equal(t, c.Name, "test-name", "")
|
|
|
}
|
|
|
|
|
|
@@ -337,23 +336,23 @@ func TestConfigWebURLEnv(t *testing.T) {
|
|
|
// Ensures that a the Web URL flag can be parsed.
|
|
|
func TestConfigWebURLFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-w", "/web"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-web-url", "/web"}), "")
|
|
|
assert.Equal(t, c.WebURL, "/web", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that the Peer Advertised URL can be parsed from the environment.
|
|
|
-func TestConfigPeerAdvertisedUrlEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_PEER_ADVERTISED_URL", "localhost:7002", func(c *Config) {
|
|
|
+func TestConfigPeerAddrEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_PEER_ADDR", "localhost:7002", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.Peer.AdvertisedUrl, "localhost:7002", "")
|
|
|
+ assert.Equal(t, c.Peer.Addr, "localhost:7002", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that a the Peer Advertised URL flag can be parsed.
|
|
|
-func TestConfigPeerAdvertisedUrlFlag(t *testing.T) {
|
|
|
+func TestConfigPeerAddrFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-s", "localhost:7002"}), "")
|
|
|
- assert.Equal(t, c.Peer.AdvertisedUrl, "localhost:7002", "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peer-addr", "localhost:7002"}), "")
|
|
|
+ assert.Equal(t, c.Peer.Addr, "localhost:7002", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that the Peer CA File can be parsed from the environment.
|
|
|
@@ -367,7 +366,7 @@ func TestConfigPeerCAFileEnv(t *testing.T) {
|
|
|
// Ensures that a the Peer CA file flag can be parsed.
|
|
|
func TestConfigPeerCAFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-serverCAFile", "/tmp/peer/file.ca"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peer-ca-file", "/tmp/peer/file.ca"}), "")
|
|
|
assert.Equal(t, c.Peer.CAFile, "/tmp/peer/file.ca", "")
|
|
|
}
|
|
|
|
|
|
@@ -382,7 +381,7 @@ func TestConfigPeerCertFileEnv(t *testing.T) {
|
|
|
// Ensures that a the Cert file flag can be parsed.
|
|
|
func TestConfigPeerCertFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-serverCert", "/tmp/peer/file.cert"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peer-cert-file", "/tmp/peer/file.cert"}), "")
|
|
|
assert.Equal(t, c.Peer.CertFile, "/tmp/peer/file.cert", "")
|
|
|
}
|
|
|
|
|
|
@@ -397,66 +396,64 @@ func TestConfigPeerKeyFileEnv(t *testing.T) {
|
|
|
// Ensures that a the Peer Key file flag can be parsed.
|
|
|
func TestConfigPeerKeyFileFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-serverKey", "/tmp/peer/file.key"}), "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peer-key-file", "/tmp/peer/file.key"}), "")
|
|
|
assert.Equal(t, c.Peer.KeyFile, "/tmp/peer/file.key", "")
|
|
|
}
|
|
|
|
|
|
// Ensures that the Peer Listen Host can be parsed from the environment.
|
|
|
-func TestConfigPeerListenHostEnv(t *testing.T) {
|
|
|
- withEnv("ETCD_PEER_LISTEN_HOST", "localhost:7004", func(c *Config) {
|
|
|
+func TestConfigPeerBindAddrEnv(t *testing.T) {
|
|
|
+ withEnv("ETCD_PEER_BIND_ADDR", "localhost:7004", func(c *Config) {
|
|
|
assert.Nil(t, c.LoadEnv(), "")
|
|
|
- assert.Equal(t, c.Peer.ListenHost, "localhost:7004", "")
|
|
|
+ assert.Equal(t, c.Peer.BindAddr, "localhost:7004", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that a the Peer Listen Host file flag can be parsed.
|
|
|
-func TestConfigPeerListenHostFlag(t *testing.T) {
|
|
|
+func TestConfigPeerBindAddrFlag(t *testing.T) {
|
|
|
c := NewConfig()
|
|
|
- assert.Nil(t, c.LoadFlags([]string{"-sl", "127.0.0.1:4003"}), "")
|
|
|
- assert.Equal(t, c.Peer.ListenHost, "127.0.0.1:4003", "")
|
|
|
+ assert.Nil(t, c.LoadFlags([]string{"-peer-bind-addr", "127.0.0.1:4003"}), "")
|
|
|
+ assert.Equal(t, c.Peer.BindAddr, "127.0.0.1:4003", "")
|
|
|
}
|
|
|
|
|
|
-
|
|
|
// Ensures that a system config field is overridden by a custom config field.
|
|
|
func TestConfigCustomConfigOverrideSystemConfig(t *testing.T) {
|
|
|
- system := `advertised_url = "127.0.0.1:5000"`
|
|
|
- custom := `advertised_url = "127.0.0.1:6000"`
|
|
|
+ system := `addr = "127.0.0.1:5000"`
|
|
|
+ custom := `addr = "127.0.0.1:6000"`
|
|
|
withTempFile(system, func(p1 string) {
|
|
|
withTempFile(custom, func(p2 string) {
|
|
|
c := NewConfig()
|
|
|
c.SystemPath = p1
|
|
|
assert.Nil(t, c.Load([]string{"-config", p2}), "")
|
|
|
- assert.Equal(t, c.AdvertisedUrl, "http://127.0.0.1:6000", "")
|
|
|
+ assert.Equal(t, c.Addr, "http://127.0.0.1:6000", "")
|
|
|
})
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that a custom config field is overridden by an environment variable.
|
|
|
func TestConfigEnvVarOverrideCustomConfig(t *testing.T) {
|
|
|
- os.Setenv("ETCD_PEER_ADVERTISED_URL", "127.0.0.1:8000")
|
|
|
- defer os.Setenv("ETCD_PEER_ADVERTISED_URL", "")
|
|
|
+ os.Setenv("ETCD_PEER_ADDR", "127.0.0.1:8000")
|
|
|
+ defer os.Setenv("ETCD_PEER_ADDR", "")
|
|
|
|
|
|
- custom := `[peer]`+"\n"+`advertised_url = "127.0.0.1:9000"`
|
|
|
+ custom := `[peer]` + "\n" + `advertised_url = "127.0.0.1:9000"`
|
|
|
withTempFile(custom, func(path string) {
|
|
|
c := NewConfig()
|
|
|
c.SystemPath = ""
|
|
|
assert.Nil(t, c.Load([]string{"-config", path}), "")
|
|
|
- assert.Equal(t, c.Peer.AdvertisedUrl, "http://127.0.0.1:8000", "")
|
|
|
+ assert.Equal(t, c.Peer.Addr, "http://127.0.0.1:8000", "")
|
|
|
})
|
|
|
}
|
|
|
|
|
|
// Ensures that an environment variable field is overridden by a command line argument.
|
|
|
func TestConfigCLIArgsOverrideEnvVar(t *testing.T) {
|
|
|
- os.Setenv("ETCD_ADVERTISED_URL", "127.0.0.1:1000")
|
|
|
- defer os.Setenv("ETCD_ADVERTISED_URL", "")
|
|
|
+ os.Setenv("ETCD_ADDR", "127.0.0.1:1000")
|
|
|
+ defer os.Setenv("ETCD_ADDR", "")
|
|
|
|
|
|
c := NewConfig()
|
|
|
c.SystemPath = ""
|
|
|
- assert.Nil(t, c.Load([]string{"-c", "127.0.0.1:2000"}), "")
|
|
|
- assert.Equal(t, c.AdvertisedUrl, "http://127.0.0.1:2000", "")
|
|
|
+ assert.Nil(t, c.Load([]string{"-addr", "127.0.0.1:2000"}), "")
|
|
|
+ assert.Equal(t, c.Addr, "http://127.0.0.1:2000", "")
|
|
|
}
|
|
|
|
|
|
-
|
|
|
//--------------------------------------
|
|
|
// Helpers
|
|
|
//--------------------------------------
|