Files
akvorado/common/remotedatasource/root_test.go
Vincent Bernat e68b2de72c
Some checks failed
CI / 🤖 Check dependabot status (push) Has been cancelled
CI / 🐧 Test on Linux (${{ github.ref_type == 'tag' }}, misc) (push) Has been cancelled
CI / 🐧 Test on Linux (coverage) (push) Has been cancelled
CI / 🐧 Test on Linux (regular) (push) Has been cancelled
CI / ❄️ Build on Nix (push) Has been cancelled
CI / 🍏 Build and test on macOS (push) Has been cancelled
CI / 🧪 End-to-end testing (push) Has been cancelled
CI / 🔍 Upload code coverage (push) Has been cancelled
CI / 🔬 Test only Go (push) Has been cancelled
CI / 🔬 Test only JS (${{ needs.dependabot.outputs.package-ecosystem }}, 20) (push) Has been cancelled
CI / 🔬 Test only JS (${{ needs.dependabot.outputs.package-ecosystem }}, 22) (push) Has been cancelled
CI / 🔬 Test only JS (${{ needs.dependabot.outputs.package-ecosystem }}, 24) (push) Has been cancelled
CI / ⚖️ Check licenses (push) Has been cancelled
CI / 🐋 Build Docker images (push) Has been cancelled
CI / 🐋 Tag Docker images (push) Has been cancelled
CI / 🚀 Publish release (push) Has been cancelled
common/helpers: migrate from verify to skip-verify in TLS config
Otherwise, the default is "false" for verify. This is a breaking change.

Fix #2055.
2025-10-30 08:31:27 +01:00

346 lines
9.1 KiB
Go

// SPDX-FileCopyrightText: 2024 Free Mobile
// SPDX-License-Identifier: AGPL-3.0-only
package remotedatasource
import (
"context"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"fmt"
"math/big"
"net"
"net/http"
"strconv"
"sync"
"sync/atomic"
"testing"
"time"
"akvorado/common/helpers"
"akvorado/common/reporter"
)
type remoteData struct {
Name string `validate:"required"`
Description string
Count int
}
type remoteDataHandler struct {
data []remoteData
fetcher *Component[remoteData]
dataLock sync.RWMutex
}
func (h *remoteDataHandler) UpdateData(ctx context.Context, name string, source Source) (int, error) {
results, err := h.fetcher.Fetch(ctx, name, source)
if err != nil {
return 0, err
}
h.dataLock.Lock()
h.data = results
h.dataLock.Unlock()
return len(results), nil
}
func TestSource(t *testing.T) {
// Mux to answer requests
ready := make(chan bool)
triggerErrors := atomic.Int32{}
mux := http.NewServeMux()
mux.Handle("/data.json", http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
select {
case <-ready:
default:
w.WriteHeader(404)
return
}
w.Header().Add("Content-Type", "application/json")
switch triggerErrors.Load() {
case 0:
w.WriteHeader(200)
w.Write([]byte(`
{
"results": [
{"name": "foo", "description": "bar"}
]
}
`))
case 1:
// Validation error
w.WriteHeader(200)
w.Write([]byte(`
{
"results": [
{"description": "bar"}
]
}
`))
case 2:
// Map error
w.WriteHeader(200)
w.Write([]byte(`
{
"results": [
{"name": "foo", "description": "bar", "count": "stuff"}
]
}
`))
case 3:
// JSON error
w.WriteHeader(200)
w.Write([]byte(`
{
results": [
{"name": "foo", "description": "bar"}
]
}
`))
case 4:
// Status error
w.WriteHeader(500)
w.Write([]byte(`
{
results": [
{"name": "foo", "description": "bar"}
]
}
`))
}
}))
// Setup an HTTP server to serve the JSON
listener, err := net.Listen("tcp", "127.0.0.1:0")
if err != nil {
t.Fatalf("Listen() error:\n%+v", err)
}
server := &http.Server{
Addr: listener.Addr().String(),
Handler: mux,
}
address := listener.Addr()
go server.Serve(listener)
defer server.Shutdown(context.Background())
r := reporter.NewMock(t)
config := map[string]Source{
"local": {
URL: fmt.Sprintf("http://%s/data.json", address),
Method: "GET",
Headers: map[string]string{
"X-Foo": "hello",
},
Timeout: 20 * time.Millisecond,
Interval: 20 * time.Millisecond,
Transform: MustParseTransformQuery(".results[]"),
},
}
handler := remoteDataHandler{
data: []remoteData{},
}
expected := []remoteData{}
handler.fetcher, _ = New[remoteData](r, handler.UpdateData, "test", config)
handler.fetcher.Start()
defer handler.fetcher.Stop()
// When not ready
handler.dataLock.RLock()
if diff := helpers.Diff(handler.data, expected); diff != "" {
t.Fatalf("static provider (-got, +want):\n%s", diff)
}
handler.dataLock.RUnlock()
close(ready)
time.Sleep(50 * time.Millisecond)
// When ready
expected = []remoteData{
{
Name: "foo",
Description: "bar",
},
}
handler.dataLock.RLock()
if diff := helpers.Diff(handler.data, expected); diff != "" {
t.Fatalf("static provider (-got, +want):\n%s", diff)
}
handler.dataLock.RUnlock()
gotMetrics := r.GetMetrics("akvorado_common_remotedatasource_")
updates, _ := strconv.Atoi(gotMetrics[`updates_total{source="local",type="test"}`])
errorsHTTP, _ := strconv.Atoi(
gotMetrics[`errors_total{error="unexpected HTTP status code",source="local",type="test"}`])
expectedMetrics := map[string]string{
`data_total{source="local",type="test"}`: "1",
`updates_total{source="local",type="test"}`: strconv.Itoa(max(updates, 1)),
}
delete(gotMetrics, `errors_total{error="unexpected HTTP status code",source="local",type="test"}`)
if diff := helpers.Diff(gotMetrics, expectedMetrics); diff != "" {
t.Fatalf("Metrics (-got, +want):\n%s", diff)
}
// Let's add errors
triggerErrors.Add(1)
time.Sleep(50 * time.Millisecond)
triggerErrors.Add(1)
time.Sleep(50 * time.Millisecond)
triggerErrors.Add(1)
time.Sleep(50 * time.Millisecond)
triggerErrors.Add(1)
time.Sleep(50 * time.Millisecond)
gotMetrics = r.GetMetrics("akvorado_common_remotedatasource_")
updates2, _ := strconv.Atoi(gotMetrics[`updates_total{source="local",type="test"}`])
errorsHTTP2, _ := strconv.Atoi(
gotMetrics[`errors_total{error="unexpected HTTP status code",source="local",type="test"}`])
errorsJSON, _ := strconv.Atoi(
gotMetrics[`errors_total{error="cannot decode JSON",source="local",type="test"}`])
errorsMap, _ := strconv.Atoi(
gotMetrics[`errors_total{error="cannot map JSON",source="local",type="test"}`])
errorsValidate, _ := strconv.Atoi(
gotMetrics[`errors_total{error="cannot validate checks",source="local",type="test"}`])
expectedMetrics = map[string]string{
`data_total{source="local",type="test"}`: "1",
`updates_total{source="local",type="test"}`: strconv.Itoa(max(updates2, updates)),
`errors_total{error="unexpected HTTP status code",source="local",type="test"}`: strconv.Itoa(max(errorsHTTP2, errorsHTTP+1)),
`errors_total{error="cannot decode JSON",source="local",type="test"}`: strconv.Itoa(max(errorsJSON, 1)),
`errors_total{error="cannot map JSON",source="local",type="test"}`: strconv.Itoa(max(errorsMap, 1)),
`errors_total{error="cannot validate checks",source="local",type="test"}`: strconv.Itoa(max(errorsValidate, 1)),
}
if diff := helpers.Diff(gotMetrics, expectedMetrics); diff != "" {
t.Fatalf("Metrics (-got, +want):\n%s", diff)
}
}
// generateSelfSignedCert generates a self-signed certificate for testing
func generateSelfSignedCert(t *testing.T) tls.Certificate {
t.Helper()
// Generate a private key
privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
t.Fatalf("ecdsa.GenerateKey() error:\n%+v", err)
}
// Create a certificate template
template := x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{
Organization: []string{"Test Organization"},
},
NotBefore: time.Now(),
NotAfter: time.Now().Add(time.Hour),
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
BasicConstraintsValid: true,
IPAddresses: []net.IP{net.ParseIP("127.0.0.1")},
}
// Create the certificate
certDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &privateKey.PublicKey, privateKey)
if err != nil {
t.Fatalf("x509.CreateCertificate() error:\n%+v", err)
}
return tls.Certificate{
Certificate: [][]byte{certDER},
PrivateKey: privateKey,
}
}
func TestSourceWithTLS(t *testing.T) {
cert := generateSelfSignedCert(t)
// Setup TLS server
mux := http.NewServeMux()
mux.Handle("/data.json", http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
w.Header().Add("Content-Type", "application/json")
w.WriteHeader(200)
w.Write([]byte(`{"results": [{"name": "secure", "description": "tls test"}]}`))
}))
listener, err := net.Listen("tcp", "127.0.0.1:0")
if err != nil {
t.Fatalf("Listen() error:\n%+v", err)
}
server := &http.Server{
Handler: mux,
TLSConfig: &tls.Config{
Certificates: []tls.Certificate{cert},
},
}
address := listener.Addr().String()
go server.ServeTLS(listener, "", "")
defer server.Shutdown(context.Background())
t.Run("WithoutTLSConfig", func(t *testing.T) {
r := reporter.NewMock(t)
config := map[string]Source{
"secure": {
URL: fmt.Sprintf("https://%s/data.json", address),
Method: "GET",
Timeout: 1 * time.Second,
Interval: 1 * time.Minute,
Transform: MustParseTransformQuery(".results[]"),
},
}
handler := remoteDataHandler{
data: []remoteData{},
}
handler.fetcher, _ = New[remoteData](r, handler.UpdateData, "test", config)
ctx, cancel := context.WithTimeout(t.Context(), time.Second)
defer cancel()
_, err := handler.fetcher.Fetch(ctx, "secure", config["secure"])
if err == nil {
t.Fatal("Fetch() should have errored with certificate error")
}
})
t.Run("WithTLSSkipVerify", func(t *testing.T) {
r := reporter.NewMock(t)
config := map[string]Source{
"secure": {
URL: fmt.Sprintf("https://%s/data.json", address),
Method: "GET",
Timeout: 1 * time.Second,
Interval: 1 * time.Minute,
TLS: helpers.TLSConfiguration{
Enable: true,
SkipVerify: true,
},
Transform: MustParseTransformQuery(".results[]"),
},
}
handler := remoteDataHandler{
data: []remoteData{},
}
handler.fetcher, _ = New[remoteData](r, handler.UpdateData, "test", config)
ctx, cancel := context.WithTimeout(t.Context(), time.Second)
defer cancel()
results, err := handler.fetcher.Fetch(ctx, "secure", config["secure"])
if err != nil {
t.Fatalf("Fetch() error:\n%+v", err)
}
expected := []remoteData{
{
Name: "secure",
Description: "tls test",
},
}
if diff := helpers.Diff(results, expected); diff != "" {
t.Fatalf("Fetch() (-got, +want):\n%s", diff)
}
})
}