open-nomad/command/operator_api_test.go

223 lines
5.7 KiB
Go

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package command
import (
"bytes"
"net/http"
"net/http/httptest"
"net/url"
"os"
"testing"
"time"
"github.com/hashicorp/nomad/api"
"github.com/hashicorp/nomad/ci"
"github.com/mitchellh/cli"
"github.com/shoenig/test/must"
"github.com/stretchr/testify/require"
)
// TestOperatorAPICommand_Paths asserts that the op api command normalizes
// various path formats to the proper full address.
func TestOperatorAPICommand_Paths(t *testing.T) {
ci.Parallel(t)
hits := make(chan *url.URL, 1)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
hits <- r.URL
}))
defer ts.Close()
// Always expect the same URL to be hit
expected := "/v1/jobs"
buf := bytes.NewBuffer(nil)
ui := &cli.BasicUi{
ErrorWriter: buf,
Writer: buf,
}
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
// Assert that absolute paths are appended to the configured address
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
buf.Reset()
// Assert that full URLs are used as-is even if an invalid address is
// set.
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.URL + "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
buf.Reset()
// Assert that URLs lacking a scheme are used even if an invalid
// address is set.
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.Listener.Addr().String() + "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
}
// TestOperatorAPICommand_Curl asserts that -dryrun outputs a valid curl
// command.
func TestOperatorAPICommand_Curl(t *testing.T) {
ci.Parallel(t)
buf := bytes.NewBuffer(nil)
ui := &cli.BasicUi{
ErrorWriter: buf,
Writer: buf,
}
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
exitCode := cmd.Run([]string{
"-dryrun",
"-address=http://127.0.0.1:1",
"-region=not even a valid region",
`-filter=this == "that" or this != "foo"`,
"-X", "POST",
"-token=acl-token",
"-H", "Some-Other-Header: ok",
"/url",
})
require.Zero(t, exitCode, buf.String())
expected := `curl \
-X POST \
-H 'Some-Other-Header: ok' \
-H 'X-Nomad-Token: acl-token' \
http://127.0.0.1:1/url?filter=this+%3D%3D+%22that%22+or+this+%21%3D+%22foo%22&region=not+even+a+valid+region
`
require.Equal(t, expected, buf.String())
}
func Test_pathToURL(t *testing.T) {
ci.Parallel(t)
testCases := []struct {
name string
inputConfig *api.Config
inputPath string
expectedOutputURL string
}{
{
name: "https address via config",
inputConfig: &api.Config{
Address: "https://nomad.systems:4646",
TLSConfig: &api.TLSConfig{},
},
inputPath: "/v1/jobs",
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
},
{
name: "http address via config",
inputConfig: &api.Config{
Address: "http://nomad.systems:4646",
TLSConfig: &api.TLSConfig{},
},
inputPath: "/v1/jobs",
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
},
{
name: "https address via path",
inputConfig: api.DefaultConfig(),
inputPath: "https://nomad.systems:4646/v1/jobs",
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
},
{
name: "http address via path",
inputConfig: api.DefaultConfig(),
inputPath: "http://nomad.systems:4646/v1/jobs",
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
},
{
name: "https inferred by tls config",
inputConfig: &api.Config{
Address: "http://127.0.0.1:4646",
TLSConfig: &api.TLSConfig{
CAPath: "/path/to/nowhere",
},
},
inputPath: "/v1/jobs",
expectedOutputURL: "https://127.0.0.1:4646/v1/jobs",
},
}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
actualOutput, err := pathToURL(tc.inputConfig, tc.inputPath)
must.NoError(t, err)
must.NotNil(t, actualOutput)
must.Eq(t, actualOutput.String(), tc.expectedOutputURL)
})
}
}
// TestOperatorAPICommand_ContentLength tests that requests have the proper
// ContentLength set.
//
// Don't run it in parallel as it modifies the package's Stdin variable.
func TestOperatorAPICommand_ContentLength(t *testing.T) {
contentLength := make(chan int, 1)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
contentLength <- int(r.ContentLength)
}))
defer ts.Close()
// Setup a temp file to act as stdin.
input := []byte("test-input")
fakeStdin, err := os.CreateTemp("", "fake-stdin")
require.NoError(t, err)
defer os.Remove(fakeStdin.Name())
_, err = fakeStdin.Write(input)
require.NoError(t, err)
_, err = fakeStdin.Seek(0, 0)
require.NoError(t, err)
// Override the package's Stdin variable for testing.
Stdin = fakeStdin
defer func() { Stdin = os.Stdin }()
// Setup command.
buf := bytes.NewBuffer(nil)
ui := &cli.BasicUi{
ErrorWriter: buf,
Writer: buf,
}
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
// Assert that a request has the expected content length.
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case l := <-contentLength:
require.Equal(t, len(input), l)
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for request")
}
}