a25028c412
Operators may have a setup whereby the TLS config comes from a source other than setting Nomad specific env vars. In this case, we should attempt to identify the scheme using the config setting as a fallback.
173 lines
4.4 KiB
Go
173 lines
4.4 KiB
Go
package command
|
|
|
|
import (
|
|
"bytes"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/hashicorp/nomad/api"
|
|
"github.com/hashicorp/nomad/ci"
|
|
"github.com/mitchellh/cli"
|
|
"github.com/shoenig/test/must"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
// TestOperatorAPICommand_Paths asserts that the op api command normalizes
|
|
// various path formats to the proper full address.
|
|
func TestOperatorAPICommand_Paths(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
hits := make(chan *url.URL, 1)
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
hits <- r.URL
|
|
}))
|
|
defer ts.Close()
|
|
|
|
// Always expect the same URL to be hit
|
|
expected := "/v1/jobs"
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
ui := &cli.BasicUi{
|
|
ErrorWriter: buf,
|
|
Writer: buf,
|
|
}
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
// Assert that absolute paths are appended to the configured address
|
|
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
|
|
require.Zero(t, exitCode, buf.String())
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
require.Equal(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
|
|
buf.Reset()
|
|
|
|
// Assert that full URLs are used as-is even if an invalid address is
|
|
// set.
|
|
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.URL + "/v1/jobs"})
|
|
require.Zero(t, exitCode, buf.String())
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
require.Equal(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
|
|
buf.Reset()
|
|
|
|
// Assert that URLs lacking a scheme are used even if an invalid
|
|
// address is set.
|
|
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.Listener.Addr().String() + "/v1/jobs"})
|
|
require.Zero(t, exitCode, buf.String())
|
|
|
|
select {
|
|
case hit := <-hits:
|
|
require.Equal(t, expected, hit.String())
|
|
case <-time.After(10 * time.Second):
|
|
t.Fatalf("timed out waiting for hit")
|
|
}
|
|
}
|
|
|
|
// TestOperatorAPICommand_Curl asserts that -dryrun outputs a valid curl
|
|
// command.
|
|
func TestOperatorAPICommand_Curl(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
buf := bytes.NewBuffer(nil)
|
|
ui := &cli.BasicUi{
|
|
ErrorWriter: buf,
|
|
Writer: buf,
|
|
}
|
|
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
|
|
|
|
exitCode := cmd.Run([]string{
|
|
"-dryrun",
|
|
"-address=http://127.0.0.1:1",
|
|
"-region=not even a valid region",
|
|
`-filter=this == "that" or this != "foo"`,
|
|
"-X", "POST",
|
|
"-token=acl-token",
|
|
"-H", "Some-Other-Header: ok",
|
|
"/url",
|
|
})
|
|
require.Zero(t, exitCode, buf.String())
|
|
|
|
expected := `curl \
|
|
-X POST \
|
|
-H 'Some-Other-Header: ok' \
|
|
-H 'X-Nomad-Token: acl-token' \
|
|
http://127.0.0.1:1/url?filter=this+%3D%3D+%22that%22+or+this+%21%3D+%22foo%22®ion=not+even+a+valid+region
|
|
`
|
|
require.Equal(t, expected, buf.String())
|
|
}
|
|
|
|
func Test_pathToURL(t *testing.T) {
|
|
ci.Parallel(t)
|
|
|
|
testCases := []struct {
|
|
name string
|
|
inputConfig *api.Config
|
|
inputPath string
|
|
expectedOutputURL string
|
|
}{
|
|
{
|
|
name: "https address via config",
|
|
inputConfig: &api.Config{
|
|
Address: "https://nomad.systems:4646",
|
|
TLSConfig: &api.TLSConfig{},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "http address via config",
|
|
inputConfig: &api.Config{
|
|
Address: "http://nomad.systems:4646",
|
|
TLSConfig: &api.TLSConfig{},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "https address via path",
|
|
inputConfig: api.DefaultConfig(),
|
|
inputPath: "https://nomad.systems:4646/v1/jobs",
|
|
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "http address via path",
|
|
inputConfig: api.DefaultConfig(),
|
|
inputPath: "http://nomad.systems:4646/v1/jobs",
|
|
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
|
|
},
|
|
{
|
|
name: "https inferred by tls config",
|
|
inputConfig: &api.Config{
|
|
Address: "http://127.0.0.1:4646",
|
|
TLSConfig: &api.TLSConfig{
|
|
CAPath: "/path/to/nowhere",
|
|
},
|
|
},
|
|
inputPath: "/v1/jobs",
|
|
expectedOutputURL: "https://127.0.0.1:4646/v1/jobs",
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
actualOutput, err := pathToURL(tc.inputConfig, tc.inputPath)
|
|
must.NoError(t, err)
|
|
must.NotNil(t, actualOutput)
|
|
must.Eq(t, actualOutput.String(), tc.expectedOutputURL)
|
|
})
|
|
}
|
|
}
|