260 lines
6.9 KiB
Go
260 lines
6.9 KiB
Go
package aurora
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"testing"
|
|
|
|
"github.com/influxdata/telegraf/testutil"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
type (
|
|
TestHandlerFunc func(t *testing.T, w http.ResponseWriter, r *http.Request)
|
|
CheckFunc func(t *testing.T, err error, acc *testutil.Accumulator)
|
|
)
|
|
|
|
func TestAurora(t *testing.T) {
|
|
ts := httptest.NewServer(http.NotFoundHandler())
|
|
defer ts.Close()
|
|
|
|
u, err := url.Parse(fmt.Sprintf("http://%s", ts.Listener.Addr().String()))
|
|
require.NoError(t, err)
|
|
|
|
tests := []struct {
|
|
name string
|
|
plugin *Aurora
|
|
schedulers []string
|
|
roles []string
|
|
leaderhealth TestHandlerFunc
|
|
varsjson TestHandlerFunc
|
|
check CheckFunc
|
|
}{
|
|
{
|
|
name: "minimal",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
body := `{
|
|
"variable_scrape_events": 2958,
|
|
"variable_scrape_events_per_sec": 1.0,
|
|
"variable_scrape_micros_per_event": 1484.0,
|
|
"variable_scrape_micros_total": 4401084,
|
|
"variable_scrape_micros_total_per_sec": 1485.0
|
|
}`
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.Equal(t, 1, len(acc.Metrics))
|
|
acc.AssertContainsTaggedFields(t,
|
|
"aurora",
|
|
map[string]interface{}{
|
|
"variable_scrape_events": int64(2958),
|
|
"variable_scrape_events_per_sec": 1.0,
|
|
"variable_scrape_micros_per_event": 1484.0,
|
|
"variable_scrape_micros_total": int64(4401084),
|
|
"variable_scrape_micros_total_per_sec": 1485.0,
|
|
},
|
|
map[string]string{
|
|
"scheduler": u.String(),
|
|
"role": "leader",
|
|
},
|
|
)
|
|
},
|
|
},
|
|
{
|
|
name: "disabled role",
|
|
roles: []string{"leader"},
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.NoError(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "no metrics available",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte("{}"))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.NoError(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "string metrics skipped",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
body := `{
|
|
"foo": "bar"
|
|
}`
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.NoError(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "float64 unparseable",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
// too large
|
|
body := `{
|
|
"foo": 1e309
|
|
}`
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.Error(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "int64 unparseable",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
// too large
|
|
body := `{
|
|
"foo": 9223372036854775808
|
|
}`
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.Error(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "bad json",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
body := `{]`
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.Error(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
{
|
|
name: "wrong status code",
|
|
leaderhealth: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
w.WriteHeader(http.StatusOK)
|
|
},
|
|
varsjson: func(t *testing.T, w http.ResponseWriter, r *http.Request) {
|
|
body := `{
|
|
"value": 42
|
|
}`
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
w.Write([]byte(body))
|
|
},
|
|
check: func(t *testing.T, err error, acc *testutil.Accumulator) {
|
|
require.NoError(t, err)
|
|
require.Error(t, acc.FirstError())
|
|
require.Equal(t, 0, len(acc.Metrics))
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
ts.Config.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
switch r.URL.Path {
|
|
case "/leaderhealth":
|
|
tt.leaderhealth(t, w, r)
|
|
case "/vars.json":
|
|
tt.varsjson(t, w, r)
|
|
default:
|
|
w.WriteHeader(http.StatusNotFound)
|
|
}
|
|
})
|
|
|
|
var acc testutil.Accumulator
|
|
plugin := &Aurora{}
|
|
plugin.Schedulers = []string{u.String()}
|
|
plugin.Roles = tt.roles
|
|
err := plugin.Gather(&acc)
|
|
tt.check(t, err, &acc)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestBasicAuth(t *testing.T) {
|
|
ts := httptest.NewServer(http.NotFoundHandler())
|
|
defer ts.Close()
|
|
|
|
u, err := url.Parse(fmt.Sprintf("http://%s", ts.Listener.Addr().String()))
|
|
require.NoError(t, err)
|
|
|
|
tests := []struct {
|
|
name string
|
|
username string
|
|
password string
|
|
}{
|
|
{
|
|
name: "no auth",
|
|
},
|
|
{
|
|
name: "basic auth",
|
|
username: "username",
|
|
password: "pa$$word",
|
|
},
|
|
{
|
|
name: "username only",
|
|
username: "username",
|
|
},
|
|
{
|
|
name: "password only",
|
|
password: "pa$$word",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
ts.Config.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
username, password, _ := r.BasicAuth()
|
|
require.Equal(t, tt.username, username)
|
|
require.Equal(t, tt.password, password)
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write([]byte("{}"))
|
|
})
|
|
|
|
var acc testutil.Accumulator
|
|
plugin := &Aurora{}
|
|
plugin.Schedulers = []string{u.String()}
|
|
plugin.Username = tt.username
|
|
plugin.Password = tt.password
|
|
err := plugin.Gather(&acc)
|
|
require.NoError(t, err)
|
|
})
|
|
}
|
|
}
|