@@ -93,7 +93,7 @@ var _ = Describe("Config", Serial, func() {
9393 ClientCertAndKeyPath : certAndKeyFile ,
9494 },
9595 }
96- cfg , err := config .New ("fixtures/valid_config.yml" )
96+ cfg , err := config .New ("fixtures/valid_config.yml" , false )
9797 Expect (err ).NotTo (HaveOccurred ())
9898 Expect (* cfg ).To (Equal (expectedCfg ))
9999 })
@@ -102,13 +102,13 @@ var _ = Describe("Config", Serial, func() {
102102 Context ("when given an invalid config" , func () {
103103 Context ("non existing config" , func () {
104104 It ("return error" , func () {
105- _ , err := config .New ("fixtures/non_existing_config.yml" )
105+ _ , err := config .New ("fixtures/non_existing_config.yml" , false )
106106 Expect (err ).To (HaveOccurred ())
107107 })
108108 })
109109 Context ("malformed YAML config" , func () {
110110 It ("return error" , func () {
111- _ , err := config .New ("fixtures/malformed_config.yml" )
111+ _ , err := config .New ("fixtures/malformed_config.yml" , false )
112112 Expect (err ).To (HaveOccurred ())
113113 })
114114 })
@@ -118,23 +118,23 @@ var _ = Describe("Config", Serial, func() {
118118 Context ("is enabled" , func () {
119119 Context ("when the CA path is not a valid CA" , func () {
120120 It ("returns an error" , func () {
121- _ , err := config .New ("fixtures/bad_ca_config.yml" )
121+ _ , err := config .New ("fixtures/bad_ca_config.yml" , false )
122122 Expect (err ).To (HaveOccurred ())
123123 Expect (err .Error ()).To (ContainSubstring ("Invalid PEM block found in file" ))
124124 })
125125 })
126126
127127 Context ("when the Client Cert/key pair are not valid" , func () {
128128 It ("returns an error" , func () {
129- _ , err := config .New ("fixtures/bad_client_cert_config.yml" )
129+ _ , err := config .New ("fixtures/bad_client_cert_config.yml" , false )
130130 Expect (err ).To (HaveOccurred ())
131131 Expect (err .Error ()).To (ContainSubstring ("Invalid PEM CERTIFICATE found in file" ))
132132 })
133133 })
134134
135135 Context ("when the Client Cert/key pair are mismatched" , func () {
136136 It ("returns an error" , func () {
137- _ , err := config .New ("fixtures/mismatched_client_cert_config.yml" )
137+ _ , err := config .New ("fixtures/mismatched_client_cert_config.yml" , false )
138138 Expect (err ).To (HaveOccurred ())
139139 Expect (err .Error ()).To (ContainSubstring ("Unable to validate backend TLS client cert + key in file" ))
140140 Expect (err .Error ()).To (ContainSubstring ("tls: private key does not match public key" ))
@@ -143,7 +143,7 @@ var _ = Describe("Config", Serial, func() {
143143
144144 Context ("when CA path is not specified" , func () {
145145 It ("returns an error" , func () {
146- _ , err := config .New ("fixtures/no_ca.yml" )
146+ _ , err := config .New ("fixtures/no_ca.yml" , false )
147147 Expect (err ).To (HaveOccurred ())
148148 Expect (err .Error ()).To (ContainSubstring ("Backend TLS was enabled but no CA certificates were specified" ))
149149 })
@@ -152,7 +152,7 @@ var _ = Describe("Config", Serial, func() {
152152
153153 Context ("is disabled" , func () {
154154 It ("does not set any of the backend_tls cert/ca values" , func () {
155- cfg , err := config .New ("fixtures/disabled_tls.yml" )
155+ cfg , err := config .New ("fixtures/disabled_tls.yml" , false )
156156 Expect (err ).NotTo (HaveOccurred ())
157157 Expect (cfg .BackendTLS ).To (Equal (config.BackendTLSConfig {
158158 Enabled : false ,
@@ -163,7 +163,7 @@ var _ = Describe("Config", Serial, func() {
163163
164164 Context ("when haproxy pid file is missing" , func () {
165165 It ("return error" , func () {
166- _ , err := config .New ("fixtures/no_haproxy.yml" )
166+ _ , err := config .New ("fixtures/no_haproxy.yml" , false )
167167 Expect (err ).To (HaveOccurred ())
168168 })
169169 })
@@ -177,7 +177,7 @@ var _ = Describe("Config", Serial, func() {
177177 },
178178 HaProxyPidFile : "/path/to/pid/file" ,
179179 }
180- cfg , err := config .New ("fixtures/no_oauth.yml" )
180+ cfg , err := config .New ("fixtures/no_oauth.yml" , false )
181181 Expect (err ).NotTo (HaveOccurred ())
182182 Expect (* cfg ).To (Equal (expectedCfg ))
183183 })
@@ -199,15 +199,15 @@ var _ = Describe("Config", Serial, func() {
199199 },
200200 HaProxyPidFile : "/path/to/pid/file" ,
201201 }
202- cfg , err := config .New ("fixtures/missing_oauth_fields.yml" )
202+ cfg , err := config .New ("fixtures/missing_oauth_fields.yml" , false )
203203 Expect (err ).NotTo (HaveOccurred ())
204204 Expect (* cfg ).To (Equal (expectedCfg ))
205205 })
206206 })
207207
208208 Context ("when drain_wait is a negative number" , func () {
209209 It ("defaults to 20s" , func () {
210- cfg , err := config .New ("fixtures/negative_drain_wait.yml" )
210+ cfg , err := config .New ("fixtures/negative_drain_wait.yml" , false )
211211 Expect (err ).NotTo (HaveOccurred ())
212212 Expect (cfg .DrainWaitDuration ).To (Equal (20 * time .Second ))
213213 })
@@ -231,7 +231,7 @@ var _ = Describe("Config", Serial, func() {
231231
232232 Context ("with valid cert and key" , func () {
233233 BeforeEach (func () {
234- cfg , err = config .New ("fixtures/valid_frontend_cert.yml" )
234+ cfg , err = config .New ("fixtures/valid_frontend_cert.yml" , true )
235235 })
236236
237237 It ("loads config without error" , func () {
@@ -274,7 +274,7 @@ var _ = Describe("Config", Serial, func() {
274274
275275 Context ("with invalid cert and key" , func () {
276276 BeforeEach (func () {
277- cfg , err = config .New ("fixtures/valid_frontend_cert.yml" )
277+ cfg , err = config .New ("fixtures/valid_frontend_cert.yml" , true )
278278 })
279279
280280 It ("loads config without error" , func () {
@@ -325,17 +325,17 @@ var _ = Describe("Config", Serial, func() {
325325
326326 Context ("with invalid frontend_tls config" , func () {
327327 It ("should fail if cert_chain is missing SAN information" , func () {
328- _ , err := config .New ("fixtures/frontend_cert_without_san.yml" )
328+ _ , err := config .New ("fixtures/frontend_cert_without_san.yml" , true )
329329 Expect (err ).To (HaveOccurred ())
330330 Expect (err .Error ()).To (Equal ("frontend_tls[0].cert_chain must include a subjectAltName extension" ))
331331 })
332332 It ("should fail if certs or keys are empty" , func () {
333- _ , err := config .New ("fixtures/no_frontend_certs.yml" )
333+ _ , err := config .New ("fixtures/no_frontend_certs.yml" , true )
334334 Expect (err ).To (HaveOccurred ())
335335 Expect (err .Error ()).To (Equal ("frontend_tls[0] must include name, cert_chain, and private_key" ))
336336 })
337337 It ("should fail if cert is invalid" , func () {
338- _ , err := config .New ("fixtures/invalid_frontend_certs.yml" )
338+ _ , err := config .New ("fixtures/invalid_frontend_certs.yml" , true )
339339 Expect (err ).To (HaveOccurred ())
340340 Expect (err .Error ()).To (Equal ("failed to parse PEM block" ))
341341 })
0 commit comments