package redactor import ( "flag" "os" "strings" "testing" "time" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ptypes "github.com/traefik/paerser/types" "github.com/traefik/traefik/v3/pkg/config/dynamic" "github.com/traefik/traefik/v3/pkg/config/static" "github.com/traefik/traefik/v3/pkg/ping" "github.com/traefik/traefik/v3/pkg/plugins" "github.com/traefik/traefik/v3/pkg/provider/acme" "github.com/traefik/traefik/v3/pkg/provider/consulcatalog" "github.com/traefik/traefik/v3/pkg/provider/docker" "github.com/traefik/traefik/v3/pkg/provider/ecs" "github.com/traefik/traefik/v3/pkg/provider/file" "github.com/traefik/traefik/v3/pkg/provider/http" "github.com/traefik/traefik/v3/pkg/provider/kubernetes/crd" "github.com/traefik/traefik/v3/pkg/provider/kubernetes/gateway" "github.com/traefik/traefik/v3/pkg/provider/kubernetes/ingress" "github.com/traefik/traefik/v3/pkg/provider/kv" "github.com/traefik/traefik/v3/pkg/provider/kv/consul" "github.com/traefik/traefik/v3/pkg/provider/kv/etcd" "github.com/traefik/traefik/v3/pkg/provider/kv/redis" "github.com/traefik/traefik/v3/pkg/provider/kv/zk" "github.com/traefik/traefik/v3/pkg/provider/rest" traefiktls "github.com/traefik/traefik/v3/pkg/tls" "github.com/traefik/traefik/v3/pkg/tracing/opentelemetry" "github.com/traefik/traefik/v3/pkg/types" ) var updateExpected = flag.Bool("update_expected", false, "Update expected files in fixtures") var fullDynConf *dynamic.Configuration func init() { config := &dynamic.Configuration{} config.HTTP = &dynamic.HTTPConfiguration{ Routers: map[string]*dynamic.Router{ "foo": { EntryPoints: []string{"foo"}, Middlewares: []string{"foo"}, Service: "foo", Rule: "foo", Priority: 42, TLS: &dynamic.RouterTLSConfig{ Options: "foo", CertResolver: "foo", Domains: []types.Domain{ { Main: "foo", SANs: []string{"foo"}, }, }, }, }, }, Services: map[string]*dynamic.Service{ "foo": { LoadBalancer: &dynamic.ServersLoadBalancer{ Sticky: &dynamic.Sticky{ Cookie: &dynamic.Cookie{ Name: "foo", Secure: true, HTTPOnly: true, SameSite: "foo", }, }, HealthCheck: &dynamic.ServerHealthCheck{ Scheme: "foo", Path: "foo", Port: 42, Interval: ptypes.Duration(111 * time.Second), Timeout: ptypes.Duration(111 * time.Second), Hostname: "foo", FollowRedirects: boolPtr(true), Headers: map[string]string{ "foo": "bar", }, }, PassHostHeader: boolPtr(true), ResponseForwarding: &dynamic.ResponseForwarding{ FlushInterval: ptypes.Duration(111 * time.Second), }, ServersTransport: "foo", Servers: []dynamic.Server{ { URL: "http://127.0.0.1:8080", }, }, }, }, "bar": { Weighted: &dynamic.WeightedRoundRobin{ Services: []dynamic.WRRService{ { Name: "foo", Weight: intPtr(42), }, }, Sticky: &dynamic.Sticky{ Cookie: &dynamic.Cookie{ Name: "foo", Secure: true, HTTPOnly: true, SameSite: "foo", }, }, }, }, "baz": { Mirroring: &dynamic.Mirroring{ Service: "foo", MaxBodySize: int64Ptr(42), Mirrors: []dynamic.MirrorService{ { Name: "foo", Percent: 42, }, }, }, }, }, ServersTransports: map[string]*dynamic.ServersTransport{ "foo": { ServerName: "foo", InsecureSkipVerify: true, RootCAs: []types.FileOrContent{"rootca.pem"}, Certificates: []traefiktls.Certificate{ { CertFile: "cert.pem", KeyFile: "key.pem", }, }, MaxIdleConnsPerHost: 42, ForwardingTimeouts: &dynamic.ForwardingTimeouts{ DialTimeout: 42, ResponseHeaderTimeout: 42, IdleConnTimeout: 42, ReadIdleTimeout: 42, PingTimeout: 42, }, }, }, Models: map[string]*dynamic.Model{ "foo": { Middlewares: []string{"foo"}, TLS: &dynamic.RouterTLSConfig{ Options: "foo", CertResolver: "foo", Domains: []types.Domain{ { Main: "foo", SANs: []string{"foo"}, }, }, }, }, }, Middlewares: map[string]*dynamic.Middleware{ "foo": { AddPrefix: &dynamic.AddPrefix{ Prefix: "foo", }, StripPrefix: &dynamic.StripPrefix{ Prefixes: []string{"foo"}, }, StripPrefixRegex: &dynamic.StripPrefixRegex{ Regex: []string{"foo"}, }, ReplacePath: &dynamic.ReplacePath{ Path: "foo", }, ReplacePathRegex: &dynamic.ReplacePathRegex{ Regex: "foo", Replacement: "foo", }, Chain: &dynamic.Chain{ Middlewares: []string{"foo"}, }, IPAllowList: &dynamic.IPAllowList{ SourceRange: []string{"foo"}, IPStrategy: &dynamic.IPStrategy{ Depth: 42, ExcludedIPs: []string{"127.0.0.1"}, }, }, Headers: &dynamic.Headers{ CustomRequestHeaders: map[string]string{"foo": "bar"}, CustomResponseHeaders: map[string]string{"foo": "bar"}, AccessControlAllowCredentials: true, AccessControlAllowHeaders: []string{"foo"}, AccessControlAllowMethods: []string{"foo"}, AccessControlAllowOriginList: []string{"foo"}, AccessControlAllowOriginListRegex: []string{"foo"}, AccessControlExposeHeaders: []string{"foo"}, AccessControlMaxAge: 42, AddVaryHeader: true, AllowedHosts: []string{"foo"}, HostsProxyHeaders: []string{"foo"}, SSLProxyHeaders: map[string]string{"foo": "bar"}, STSSeconds: 42, STSIncludeSubdomains: true, STSPreload: true, ForceSTSHeader: true, FrameDeny: true, CustomFrameOptionsValue: "foo", ContentTypeNosniff: true, BrowserXSSFilter: true, CustomBrowserXSSValue: "foo", ContentSecurityPolicy: "foo", PublicKey: "foo", ReferrerPolicy: "foo", PermissionsPolicy: "foo", IsDevelopment: true, }, Errors: &dynamic.ErrorPage{ Status: []string{"foo"}, Service: "foo", Query: "foo", }, RateLimit: &dynamic.RateLimit{ Average: 42, Period: 42, Burst: 42, SourceCriterion: &dynamic.SourceCriterion{ IPStrategy: &dynamic.IPStrategy{ Depth: 42, ExcludedIPs: []string{"127.0.0.1"}, }, RequestHeaderName: "foo", RequestHost: true, }, }, RedirectRegex: &dynamic.RedirectRegex{ Regex: "foo", Replacement: "foo", Permanent: true, }, RedirectScheme: &dynamic.RedirectScheme{ Scheme: "foo", Port: "foo", Permanent: true, }, BasicAuth: &dynamic.BasicAuth{ Users: []string{"foo"}, UsersFile: "foo", Realm: "foo", RemoveHeader: true, HeaderField: "foo", }, DigestAuth: &dynamic.DigestAuth{ Users: []string{"foo"}, UsersFile: "foo", RemoveHeader: true, Realm: "foo", HeaderField: "foo", }, ForwardAuth: &dynamic.ForwardAuth{ Address: "127.0.0.1", TLS: &types.ClientTLS{ CA: "ca.pem", Cert: "cert.pem", Key: "cert.pem", InsecureSkipVerify: true, }, TrustForwardHeader: true, AuthResponseHeaders: []string{"foo"}, AuthResponseHeadersRegex: "foo", AuthRequestHeaders: []string{"foo"}, }, InFlightReq: &dynamic.InFlightReq{ Amount: 42, SourceCriterion: &dynamic.SourceCriterion{ IPStrategy: &dynamic.IPStrategy{ Depth: 42, ExcludedIPs: []string{"127.0.0.1"}, }, RequestHeaderName: "foo", RequestHost: true, }, }, Buffering: &dynamic.Buffering{ MaxRequestBodyBytes: 42, MemRequestBodyBytes: 42, MaxResponseBodyBytes: 42, MemResponseBodyBytes: 42, RetryExpression: "foo", }, CircuitBreaker: &dynamic.CircuitBreaker{ Expression: "foo", }, Compress: &dynamic.Compress{ ExcludedContentTypes: []string{"foo"}, }, PassTLSClientCert: &dynamic.PassTLSClientCert{ PEM: true, Info: &dynamic.TLSClientCertificateInfo{ NotAfter: true, NotBefore: true, Sans: true, Subject: &dynamic.TLSClientCertificateSubjectDNInfo{ Country: true, Province: true, Locality: true, Organization: true, OrganizationalUnit: true, CommonName: true, SerialNumber: true, DomainComponent: true, }, Issuer: &dynamic.TLSClientCertificateIssuerDNInfo{ Country: true, Province: true, Locality: true, Organization: true, CommonName: true, SerialNumber: true, DomainComponent: true, }, SerialNumber: true, }, }, Retry: &dynamic.Retry{ Attempts: 42, InitialInterval: 42, }, ContentType: &dynamic.ContentType{}, Plugin: map[string]dynamic.PluginConf{ "foo": { "answer": struct{ Answer int }{ Answer: 42, }, }, }, }, }, } config.TCP = &dynamic.TCPConfiguration{ Routers: map[string]*dynamic.TCPRouter{ "foo": { EntryPoints: []string{"foo"}, Service: "foo", Rule: "foo", TLS: &dynamic.RouterTCPTLSConfig{ Passthrough: true, Options: "foo", CertResolver: "foo", Domains: []types.Domain{ { Main: "foo", SANs: []string{"foo"}, }, }, }, }, }, Services: map[string]*dynamic.TCPService{ "foo": { LoadBalancer: &dynamic.TCPServersLoadBalancer{ ProxyProtocol: &dynamic.ProxyProtocol{ Version: 42, }, Servers: []dynamic.TCPServer{ { Address: "127.0.0.1:8080", }, }, ServersTransport: "foo", }, }, "bar": { Weighted: &dynamic.TCPWeightedRoundRobin{ Services: []dynamic.TCPWRRService{ { Name: "foo", Weight: intPtr(42), }, }, }, }, }, ServersTransports: map[string]*dynamic.TCPServersTransport{ "foo": { TLS: &dynamic.TLSClientConfig{ ServerName: "foo", InsecureSkipVerify: true, RootCAs: []types.FileOrContent{"rootca.pem"}, Certificates: []traefiktls.Certificate{ { CertFile: "cert.pem", KeyFile: "key.pem", }, }, }, DialTimeout: 42, DialKeepAlive: 42, TerminationDelay: 42, }, }, } config.UDP = &dynamic.UDPConfiguration{ Routers: map[string]*dynamic.UDPRouter{ "foo": { EntryPoints: []string{"foo"}, Service: "foo", }, }, Services: map[string]*dynamic.UDPService{ "foo": { LoadBalancer: &dynamic.UDPServersLoadBalancer{ Servers: []dynamic.UDPServer{ { Address: "127.0.0.1:8080", }, }, }, }, "bar": { Weighted: &dynamic.UDPWeightedRoundRobin{ Services: []dynamic.UDPWRRService{ { Name: "foo", Weight: intPtr(42), }, }, }, }, }, } config.TLS = &dynamic.TLSConfiguration{ Options: map[string]traefiktls.Options{ "foo": { MinVersion: "foo", MaxVersion: "foo", CipherSuites: []string{"foo"}, CurvePreferences: []string{"foo"}, ClientAuth: traefiktls.ClientAuth{ CAFiles: []types.FileOrContent{"ca.pem"}, ClientAuthType: "RequireAndVerifyClientCert", }, SniStrict: true, }, }, Certificates: []*traefiktls.CertAndStores{ { Certificate: traefiktls.Certificate{ CertFile: "cert.pem", KeyFile: "key.pem", }, Stores: []string{"foo"}, }, }, Stores: map[string]traefiktls.Store{ "foo": { DefaultCertificate: &traefiktls.Certificate{ CertFile: "cert.pem", KeyFile: "key.pem", }, }, }, } fullDynConf = config } func TestAnonymize_dynamicConfiguration(t *testing.T) { config := fullDynConf expectedConfiguration, err := os.ReadFile("./testdata/anonymized-dynamic-config.json") require.NoError(t, err) cleanJSON, err := anonymize(config, true) require.NoError(t, err) if *updateExpected { require.NoError(t, os.WriteFile("testdata/anonymized-dynamic-config.json", []byte(cleanJSON), 0o666)) } expected := strings.TrimSuffix(string(expectedConfiguration), "\n") assert.Equal(t, expected, cleanJSON) } func TestSecure_dynamicConfiguration(t *testing.T) { config := fullDynConf expectedConfiguration, err := os.ReadFile("./testdata/secured-dynamic-config.json") require.NoError(t, err) cleanJSON, err := removeCredentials(config, true) require.NoError(t, err) if *updateExpected { require.NoError(t, os.WriteFile("testdata/secured-dynamic-config.json", []byte(cleanJSON), 0o666)) } expected := strings.TrimSuffix(string(expectedConfiguration), "\n") assert.Equal(t, expected, cleanJSON) } func TestDo_staticConfiguration(t *testing.T) { config := &static.Configuration{} config.Global = &static.Global{ CheckNewVersion: true, SendAnonymousUsage: true, } config.EntryPoints = static.EntryPoints{ "foobar": &static.EntryPoint{ Address: "foo Address", Transport: &static.EntryPointsTransport{ LifeCycle: &static.LifeCycle{ RequestAcceptGraceTimeout: ptypes.Duration(111 * time.Second), GraceTimeOut: ptypes.Duration(111 * time.Second), }, RespondingTimeouts: &static.RespondingTimeouts{ ReadTimeout: ptypes.Duration(111 * time.Second), WriteTimeout: ptypes.Duration(111 * time.Second), IdleTimeout: ptypes.Duration(111 * time.Second), }, }, ProxyProtocol: &static.ProxyProtocol{ Insecure: true, TrustedIPs: []string{"127.0.0.1/32", "192.168.0.1"}, }, ForwardedHeaders: &static.ForwardedHeaders{ Insecure: true, TrustedIPs: []string{"127.0.0.1/32", "192.168.0.1"}, }, HTTP: static.HTTPConfig{ Redirections: &static.Redirections{ EntryPoint: &static.RedirectEntryPoint{ To: "foobar", Scheme: "foobar", Permanent: true, Priority: 42, }, }, Middlewares: []string{"foobar", "foobar"}, TLS: &static.TLSConfig{ Options: "foobar", CertResolver: "foobar", Domains: []types.Domain{ {Main: "foobar", SANs: []string{"foobar", "foobar"}}, }, }, }, }, } config.Providers = &static.Providers{ ProvidersThrottleDuration: ptypes.Duration(111 * time.Second), } config.ServersTransport = &static.ServersTransport{ InsecureSkipVerify: true, RootCAs: []types.FileOrContent{"RootCAs 1", "RootCAs 2", "RootCAs 3"}, MaxIdleConnsPerHost: 111, ForwardingTimeouts: &static.ForwardingTimeouts{ DialTimeout: ptypes.Duration(111 * time.Second), ResponseHeaderTimeout: ptypes.Duration(111 * time.Second), IdleConnTimeout: ptypes.Duration(111 * time.Second), }, } config.TCPServersTransport = &static.TCPServersTransport{ DialTimeout: ptypes.Duration(111 * time.Second), DialKeepAlive: ptypes.Duration(111 * time.Second), TLS: &static.TLSClientConfig{ InsecureSkipVerify: true, RootCAs: []types.FileOrContent{"RootCAs 1", "RootCAs 2", "RootCAs 3"}, }, } config.Providers.File = &file.Provider{ Directory: "file Directory", Watch: true, Filename: "file Filename", DebugLogGeneratedTemplate: true, } config.Providers.Docker = &docker.Provider{ Shared: docker.Shared{ ExposedByDefault: true, Constraints: `Label("foo", "bar")`, AllowEmptyServices: true, Network: "MyNetwork", UseBindPortIP: true, Watch: true, DefaultRule: "PathPrefix(`/`)", }, ClientConfig: docker.ClientConfig{ Endpoint: "MyEndPoint", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, HTTPClientTimeout: 42, }, } config.Providers.Swarm = &docker.SwarmProvider{ Shared: docker.Shared{ ExposedByDefault: true, Constraints: `Label("foo", "bar")`, AllowEmptyServices: true, Network: "MyNetwork", UseBindPortIP: true, Watch: true, DefaultRule: "PathPrefix(`/`)", }, ClientConfig: docker.ClientConfig{ Endpoint: "MyEndPoint", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, HTTPClientTimeout: 42, }, RefreshSeconds: 42, } config.Providers.KubernetesIngress = &ingress.Provider{ Endpoint: "MyEndpoint", Token: "MyToken", CertAuthFilePath: "MyCertAuthPath", Namespaces: []string{"a", "b"}, LabelSelector: "myLabelSelector", IngressClass: "MyIngressClass", IngressEndpoint: &ingress.EndpointIngress{ IP: "IP", Hostname: "Hostname", PublishedService: "PublishedService", }, ThrottleDuration: ptypes.Duration(111 * time.Second), } config.Providers.KubernetesCRD = &crd.Provider{ Endpoint: "MyEndpoint", Token: "MyToken", CertAuthFilePath: "MyCertAuthPath", Namespaces: []string{"a", "b"}, LabelSelector: "myLabelSelector", IngressClass: "MyIngressClass", ThrottleDuration: ptypes.Duration(111 * time.Second), } config.Providers.KubernetesGateway = &gateway.Provider{ Endpoint: "MyEndpoint", Token: "MyToken", CertAuthFilePath: "MyCertAuthPath", Namespaces: []string{"a", "b"}, LabelSelector: "myLabelSelector", ThrottleDuration: ptypes.Duration(111 * time.Second), } config.Providers.Rest = &rest.Provider{ Insecure: true, } config.Providers.ConsulCatalog = &consulcatalog.ProviderBuilder{ Configuration: consulcatalog.Configuration{ Constraints: `Label("foo", "bar")`, Endpoint: &consulcatalog.EndpointConfig{ Address: "MyAddress", Scheme: "MyScheme", DataCenter: "MyDatacenter", Token: "MyToken", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, HTTPAuth: &consulcatalog.EndpointHTTPAuthConfig{ Username: "MyUsername", Password: "MyPassword", }, EndpointWaitTime: 42, }, Prefix: "MyPrefix", RefreshInterval: 42, RequireConsistent: true, Stale: true, Cache: true, ExposedByDefault: true, DefaultRule: "PathPrefix(`/`)", }, Namespaces: []string{"ns1", "ns2"}, } config.Providers.Ecs = &ecs.Provider{ Constraints: `Label("foo", "bar")`, ExposedByDefault: true, RefreshSeconds: 42, DefaultRule: "PathPrefix(`/`)", Clusters: []string{"Cluster1", "Cluster2"}, AutoDiscoverClusters: true, ECSAnywhere: true, Region: "Awsregion", AccessKeyID: "AwsAccessKeyID", SecretAccessKey: "AwsSecretAccessKey", } config.Providers.Consul = &consul.ProviderBuilder{ Provider: kv.Provider{ RootKey: "RootKey", Endpoints: nil, }, Token: "secret", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, Namespaces: []string{"ns1", "ns2"}, } config.Providers.Etcd = &etcd.Provider{ Provider: kv.Provider{ RootKey: "RootKey", Endpoints: nil, }, Username: "username", Password: "password", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, } config.Providers.ZooKeeper = &zk.Provider{ Provider: kv.Provider{ RootKey: "RootKey", Endpoints: nil, }, Username: "username", Password: "password", } config.Providers.Redis = &redis.Provider{ Provider: kv.Provider{ RootKey: "RootKey", Endpoints: nil, }, Username: "username", Password: "password", TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, } config.Providers.HTTP = &http.Provider{ Endpoint: "Myenpoint", PollInterval: 42, PollTimeout: 42, TLS: &types.ClientTLS{ CA: "myCa", Cert: "mycert.pem", Key: "mycert.key", InsecureSkipVerify: true, }, } config.API = &static.API{ Insecure: true, Dashboard: true, Debug: true, } config.Metrics = &types.Metrics{ Prometheus: &types.Prometheus{ Buckets: []float64{0.1, 0.3, 1.2, 5}, AddEntryPointsLabels: true, AddServicesLabels: true, EntryPoint: "MyEntryPoint", ManualRouting: true, }, Datadog: &types.Datadog{ Address: "localhost:8181", PushInterval: 42, AddEntryPointsLabels: true, AddServicesLabels: true, }, StatsD: &types.Statsd{ Address: "localhost:8182", PushInterval: 42, AddEntryPointsLabels: true, AddServicesLabels: true, Prefix: "MyPrefix", }, } config.Ping = &ping.Handler{ EntryPoint: "MyEntryPoint", ManualRouting: true, TerminatingStatusCode: 42, } config.Log = &types.TraefikLog{ Level: "Level", Format: "json", FilePath: "/foo/path", MaxSize: 5, MaxAge: 3, MaxBackups: 4, Compress: true, } config.AccessLog = &types.AccessLog{ FilePath: "AccessLog FilePath", Format: "AccessLog Format", Filters: &types.AccessLogFilters{ StatusCodes: []string{"200", "500"}, RetryAttempts: true, MinDuration: 42, }, Fields: &types.AccessLogFields{ DefaultMode: "drop", Names: map[string]string{ "RequestHost": "keep", }, Headers: &types.FieldHeaders{ DefaultMode: "drop", Names: map[string]string{ "Referer": "keep", }, }, }, BufferingSize: 42, } config.Tracing = &static.Tracing{ ServiceName: "myServiceName", Headers: map[string]string{ "foobar": "foobar", }, GlobalAttributes: map[string]string{ "foobar": "foobar", }, SampleRate: 42, OTLP: &opentelemetry.Config{ HTTP: &opentelemetry.HTTP{ Endpoint: "foobar", TLS: nil, }, }, } config.HostResolver = &types.HostResolverConfig{ CnameFlattening: true, ResolvConfig: "foobar", ResolvDepth: 42, } config.CertificatesResolvers = map[string]static.CertificateResolver{ "CertificateResolver0": { ACME: &acme.Configuration{ Email: "acme Email", CAServer: "CAServer", CertificatesDuration: 42, PreferredChain: "foobar", Storage: "Storage", KeyType: "MyKeyType", DNSChallenge: &acme.DNSChallenge{ Provider: "DNSProvider", DelayBeforeCheck: 42, Resolvers: []string{"resolver1", "resolver2"}, DisablePropagationCheck: true, }, HTTPChallenge: &acme.HTTPChallenge{ EntryPoint: "MyEntryPoint", }, TLSChallenge: &acme.TLSChallenge{}, }, }, } config.Experimental = &static.Experimental{ Plugins: map[string]plugins.Descriptor{ "Descriptor0": { ModuleName: "foobar", Version: "foobar", }, "Descriptor1": { ModuleName: "foobar", Version: "foobar", }, }, LocalPlugins: map[string]plugins.LocalDescriptor{ "Descriptor0": { ModuleName: "foobar", }, "Descriptor1": { ModuleName: "foobar", }, }, } expectedConfiguration, err := os.ReadFile("./testdata/anonymized-static-config.json") require.NoError(t, err) cleanJSON, err := anonymize(config, true) require.NoError(t, err) if *updateExpected { require.NoError(t, os.WriteFile("testdata/anonymized-static-config.json", []byte(cleanJSON), 0o666)) } expected := strings.TrimSuffix(string(expectedConfiguration), "\n") assert.Equal(t, expected, cleanJSON) } func boolPtr(value bool) *bool { return &value } func intPtr(value int) *int { return &value } func int64Ptr(value int64) *int64 { return &value }