- Add Caddy client package (client.go) with Load/GetConfig/Ping methods - Implement config generator (config.go) transforming ProxyHost → Caddy JSON - Add pre-flight validator (validator.go) catching config errors before reload - Create manager (manager.go) with rollback capability using config snapshots - Add CaddyConfig model for audit trail of configuration changes - Update Config to include Caddy admin API and config dir settings - Create comprehensive unit tests with 100% coverage for caddy package Docker Infrastructure: - Add docker-compose.yml with Caddy sidecar container - Add docker-compose.dev.yml for development overrides - Create .github/workflows/docker-publish.yml for GHCR publishing - Update CI to build Docker images and run integration tests - Add DOCKER.md with comprehensive deployment guide - Update Makefile with docker-compose commands - Update README with Docker-first deployment instructions Configuration: - Add CPM_CADDY_ADMIN_API and CPM_CADDY_CONFIG_DIR env vars - Update .env.example with new Caddy settings - Update AutoMigrate to include CaddyConfig model All acceptance criteria met: ✅ Can programmatically generate valid Caddy JSON configs ✅ Can reload Caddy configuration via admin API ✅ Invalid configs caught by validator before reload ✅ Automatic rollback on failure via snapshot system
125 lines
2.3 KiB
Go
125 lines
2.3 KiB
Go
package caddy
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/Wikid82/CaddyProxyManagerPlus/backend/internal/models"
|
|
)
|
|
|
|
func TestValidate_EmptyConfig(t *testing.T) {
|
|
config := &Config{}
|
|
err := Validate(config)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestValidate_ValidConfig(t *testing.T) {
|
|
hosts := []models.ProxyHost{
|
|
{
|
|
UUID: "test",
|
|
Domain: "test.example.com",
|
|
TargetHost: "app",
|
|
TargetPort: 8080,
|
|
},
|
|
}
|
|
|
|
config, _ := GenerateConfig(hosts)
|
|
err := Validate(config)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestValidate_DuplicateHosts(t *testing.T) {
|
|
config := &Config{
|
|
Apps: Apps{
|
|
HTTP: &HTTPApp{
|
|
Servers: map[string]*Server{
|
|
"srv": {
|
|
Listen: []string{":80"},
|
|
Routes: []*Route{
|
|
{
|
|
Match: []Match{{Host: []string{"test.com"}}},
|
|
Handle: []Handler{
|
|
ReverseProxyHandler("app:8080", false),
|
|
},
|
|
},
|
|
{
|
|
Match: []Match{{Host: []string{"test.com"}}},
|
|
Handle: []Handler{
|
|
ReverseProxyHandler("app2:8080", false),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
err := Validate(config)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "duplicate host")
|
|
}
|
|
|
|
func TestValidate_NoListenAddresses(t *testing.T) {
|
|
config := &Config{
|
|
Apps: Apps{
|
|
HTTP: &HTTPApp{
|
|
Servers: map[string]*Server{
|
|
"srv": {
|
|
Listen: []string{},
|
|
Routes: []*Route{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
err := Validate(config)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "no listen addresses")
|
|
}
|
|
|
|
func TestValidate_InvalidPort(t *testing.T) {
|
|
config := &Config{
|
|
Apps: Apps{
|
|
HTTP: &HTTPApp{
|
|
Servers: map[string]*Server{
|
|
"srv": {
|
|
Listen: []string{":99999"},
|
|
Routes: []*Route{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
err := Validate(config)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "out of range")
|
|
}
|
|
|
|
func TestValidate_NoHandlers(t *testing.T) {
|
|
config := &Config{
|
|
Apps: Apps{
|
|
HTTP: &HTTPApp{
|
|
Servers: map[string]*Server{
|
|
"srv": {
|
|
Listen: []string{":80"},
|
|
Routes: []*Route{
|
|
{
|
|
Match: []Match{{Host: []string{"test.com"}}},
|
|
Handle: []Handler{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
err := Validate(config)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "no handlers")
|
|
}
|