mirror of
https://github.com/kemko/nomad.git
synced 2026-01-02 00:15:43 +03:00
296 lines
7.4 KiB
Go
296 lines
7.4 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package command
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/hashicorp/cli"
|
|
"github.com/hashicorp/nomad/api"
|
|
"github.com/hashicorp/nomad/ci"
|
|
"github.com/shoenig/test/must"
|
|
)
|
|
|
|
// TestOperatorAPICommand_Paths asserts that the op api command normalizes
|
|
// various path formats to the proper full address.
|
|
func TestOperatorAPICommand_Paths(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
hits := make(chan *url.URL, 1)
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
hits <- r.URL
|
|
}))
|
|
defer ts.Close()
|
|
|
|
// Always expect the same URL to be hit
|
|
expected := "/v1/jobs"
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
ui := &cli.BasicUi{
|
|
ErrorWriter: buf,
|
|
Writer: buf,
|
|
}
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
// Assert that absolute paths are appended to the configured address
|
|
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
|
|
must.Zero(t, exitCode)
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
must.Eq(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
|
|
buf.Reset()
|
|
|
|
// Assert that full URLs are used as-is even if an invalid address is
|
|
// set.
|
|
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.URL + "/v1/jobs"})
|
|
must.Zero(t, exitCode)
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
must.Eq(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
|
|
buf.Reset()
|
|
|
|
// Assert that URLs lacking a scheme are used even if an invalid
|
|
// address is set.
|
|
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.Listener.Addr().String() + "/v1/jobs"})
|
|
must.Zero(t, exitCode)
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
must.Eq(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
}
|
|
|
|
// TestOperatorAPICommand_Curl asserts that -dryrun outputs a valid curl
|
|
// command.
|
|
func TestOperatorAPICommand_Curl(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
ui := &cli.BasicUi{
|
|
ErrorWriter: buf,
|
|
Writer: buf,
|
|
}
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
exitCode := cmd.Run([]string{
|
|
"-dryrun",
|
|
"-address=http://127.0.0.1:1",
|
|
"-region=not even a valid region",
|
|
`-filter=this == "that" or this != "foo"`,
|
|
"-X", "POST",
|
|
"-token=acl-token",
|
|
"-H", "Some-Other-Header: ok",
|
|
"/url",
|
|
})
|
|
must.Zero(t, exitCode)
|
|
|
|
expected := `curl \
|
|
-X POST \
|
|
-H 'Some-Other-Header: ok' \
|
|
-H 'X-Nomad-Token: acl-token' \
|
|
http://127.0.0.1:1/url?filter=this+%3D%3D+%22that%22+or+this+%21%3D+%22foo%22®ion=not+even+a+valid+region
|
|
`
|
|
must.Eq(t, expected, buf.String())
|
|
}
|
|
|
|
func Test_pathToURL(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
testCases := []struct {
|
|
name string
|
|
inputConfig *api.Config
|
|
inputPath string
|
|
expectedOutputURL string
|
|
}{
|
|
{
|
|
name: "https address via config",
|
|
inputConfig: &api.Config{
|
|
Address: "https://nomad.systems:4646",
|
|
TLSConfig: &api.TLSConfig{},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "http address via config",
|
|
inputConfig: &api.Config{
|
|
Address: "http://nomad.systems:4646",
|
|
TLSConfig: &api.TLSConfig{},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "https address via path",
|
|
inputConfig: api.DefaultConfig(),
|
|
inputPath: "https://nomad.systems:4646/v1/jobs",
|
|
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "http address via path",
|
|
inputConfig: api.DefaultConfig(),
|
|
inputPath: "http://nomad.systems:4646/v1/jobs",
|
|
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "https inferred by tls config",
|
|
inputConfig: &api.Config{
|
|
Address: "http://127.0.0.1:4646",
|
|
TLSConfig: &api.TLSConfig{
|
|
CAPath: "/path/to/nowhere",
|
|
},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "https://127.0.0.1:4646/v1/jobs",
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
actualOutput, err := pathToURL(tc.inputConfig, tc.inputPath)
|
|
must.NoError(t, err)
|
|
must.NotNil(t, actualOutput)
|
|
must.Eq(t, actualOutput.String(), tc.expectedOutputURL)
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestOperatorAPICommand_ContentLength tests that requests have the proper
|
|
// ContentLength set.
|
|
//
|
|
// Don't run it in parallel as it modifies the package's Stdin variable.
|
|
func TestOperatorAPICommand_ContentLength(t *testing.T) {
|
|
contentLength := make(chan int, 1)
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
contentLength <- int(r.ContentLength)
|
|
}))
|
|
defer ts.Close()
|
|
|
|
// Setup a temp file to act as stdin.
|
|
input := []byte("test-input")
|
|
fakeStdin, err := os.CreateTemp("", "fake-stdin")
|
|
must.NoError(t, err)
|
|
defer os.Remove(fakeStdin.Name())
|
|
|
|
_, err = fakeStdin.Write(input)
|
|
must.NoError(t, err)
|
|
_, err = fakeStdin.Seek(0, 0)
|
|
must.NoError(t, err)
|
|
|
|
// Override the package's Stdin variable for testing.
|
|
Stdin = fakeStdin
|
|
defer func() { Stdin = os.Stdin }()
|
|
|
|
// Setup command.
|
|
buf := bytes.NewBuffer(nil)
|
|
ui := &cli.BasicUi{
|
|
ErrorWriter: buf,
|
|
Writer: buf,
|
|
}
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
// Assert that a request has the expected content length.
|
|
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
|
|
must.Zero(t, exitCode)
|
|
|
|
select {
|
|
case l := <-contentLength:
|
|
must.Eq(t, len(input), l)
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for request")
|
|
}
|
|
}
|
|
|
|
func makeSocketListener(t *testing.T) (net.Listener, string) {
|
|
td := os.TempDir() // testing.TempDir() on macOS makes paths that are too long
|
|
sPath := path.Join(td, t.Name()+".sock")
|
|
os.Remove(sPath) // git rid of stale ones now.
|
|
|
|
t.Cleanup(func() { os.Remove(sPath) })
|
|
|
|
// Create a Unix domain socket and listen for incoming connections.
|
|
socket, err := net.Listen("unix", sPath)
|
|
must.NoError(t, err)
|
|
return socket, sPath
|
|
}
|
|
|
|
// TestOperatorAPICommand_Socket tests that requests can be routed over a unix
|
|
// domain socket
|
|
//
|
|
// Can not be run in parallel as it modifies the environment.
|
|
func TestOperatorAPICommand_Socket(t *testing.T) {
|
|
|
|
ping := make(chan struct{}, 1)
|
|
ts := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
ping <- struct{}{}
|
|
}))
|
|
sock, sockPath := makeSocketListener(t)
|
|
ts.Listener = sock
|
|
ts.Start()
|
|
defer ts.Close()
|
|
|
|
// Setup command.
|
|
ui := cli.NewMockUi()
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
tcs := []struct {
|
|
name string
|
|
env map[string]string
|
|
args []string
|
|
exitCode int
|
|
}{
|
|
{
|
|
name: "nomad_addr",
|
|
env: map[string]string{"NOMAD_ADDR": "unix://" + sockPath},
|
|
args: []string{"/v1/jobs"},
|
|
exitCode: 0,
|
|
},
|
|
{
|
|
name: "nomad_addr opaques host",
|
|
env: map[string]string{"NOMAD_ADDR": "unix://" + sockPath},
|
|
args: []string{"http://example.com/v1/jobs"},
|
|
exitCode: 0,
|
|
},
|
|
}
|
|
for i, tc := range tcs {
|
|
t.Run(fmt.Sprintf("%v_%s", i+1, t.Name()), func(t *testing.T) {
|
|
tc := tc
|
|
for k, v := range tc.env {
|
|
t.Setenv(k, v)
|
|
}
|
|
|
|
exitCode := cmd.Run(tc.args)
|
|
must.Eq(t, tc.exitCode, exitCode, must.Sprint(ui.ErrorWriter.String()))
|
|
|
|
select {
|
|
case l := <-ping:
|
|
must.Eq(t, struct{}{}, l)
|
|
case <-time.After(5 * time.Second):
|
|
t.Fatalf("timed out waiting for request")
|
|
}
|
|
})
|
|
}
|
|
}
|