open-nomad/command/operator_api_test.go
James Rasell a25028c412
cli: fix a bug in operator API when setting HTTPS via address. (#14635)
Operators may have a setup whereby the TLS config comes from a
source other than setting Nomad specific env vars. In this case,
we should attempt to identify the scheme using the config setting
as a fallback.
2022-09-22 15:43:58 +02:00

173 lines
4.4 KiB
Go

package command
import (
"bytes"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"time"
"github.com/hashicorp/nomad/api"
"github.com/hashicorp/nomad/ci"
"github.com/mitchellh/cli"
"github.com/shoenig/test/must"
"github.com/stretchr/testify/require"
)
// TestOperatorAPICommand_Paths asserts that the op api command normalizes
// various path formats to the proper full address.
func TestOperatorAPICommand_Paths(t *testing.T) {
ci.Parallel(t)
hits := make(chan *url.URL, 1)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
hits <- r.URL
}))
defer ts.Close()
// Always expect the same URL to be hit
expected := "/v1/jobs"
buf := bytes.NewBuffer(nil)
ui := &cli.BasicUi{
ErrorWriter: buf,
Writer: buf,
}
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
// Assert that absolute paths are appended to the configured address
exitCode := cmd.Run([]string{"-address=" + ts.URL, "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
buf.Reset()
// Assert that full URLs are used as-is even if an invalid address is
// set.
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.URL + "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
buf.Reset()
// Assert that URLs lacking a scheme are used even if an invalid
// address is set.
exitCode = cmd.Run([]string{"-address=ftp://127.0.0.2:1", ts.Listener.Addr().String() + "/v1/jobs"})
require.Zero(t, exitCode, buf.String())
select {
case hit := <-hits:
require.Equal(t, expected, hit.String())
case <-time.After(10 * time.Second):
t.Fatalf("timed out waiting for hit")
}
}
// TestOperatorAPICommand_Curl asserts that -dryrun outputs a valid curl
// command.
func TestOperatorAPICommand_Curl(t *testing.T) {
ci.Parallel(t)
buf := bytes.NewBuffer(nil)
ui := &cli.BasicUi{
ErrorWriter: buf,
Writer: buf,
}
cmd := &OperatorAPICommand{Meta: Meta{Ui: ui}}
exitCode := cmd.Run([]string{
"-dryrun",
"-address=http://127.0.0.1:1",
"-region=not even a valid region",
`-filter=this == "that" or this != "foo"`,
"-X", "POST",
"-token=acl-token",
"-H", "Some-Other-Header: ok",
"/url",
})
require.Zero(t, exitCode, buf.String())
expected := `curl \
-X POST \
-H 'Some-Other-Header: ok' \
-H 'X-Nomad-Token: acl-token' \
http://127.0.0.1:1/url?filter=this+%3D%3D+%22that%22+or+this+%21%3D+%22foo%22&region=not+even+a+valid+region
`
require.Equal(t, expected, buf.String())
}
func Test_pathToURL(t *testing.T) {
ci.Parallel(t)
testCases := []struct {
name string
inputConfig *api.Config
inputPath string
expectedOutputURL string
}{
{
name: "https address via config",
inputConfig: &api.Config{
Address: "https://nomad.systems:4646",
TLSConfig: &api.TLSConfig{},
},
inputPath: "/v1/jobs",
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
},
{
name: "http address via config",
inputConfig: &api.Config{
Address: "http://nomad.systems:4646",
TLSConfig: &api.TLSConfig{},
},
inputPath: "/v1/jobs",
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
},
{
name: "https address via path",
inputConfig: api.DefaultConfig(),
inputPath: "https://nomad.systems:4646/v1/jobs",
expectedOutputURL: "https://nomad.systems:4646/v1/jobs",
},
{
name: "http address via path",
inputConfig: api.DefaultConfig(),
inputPath: "http://nomad.systems:4646/v1/jobs",
expectedOutputURL: "http://nomad.systems:4646/v1/jobs",
},
{
name: "https inferred by tls config",
inputConfig: &api.Config{
Address: "http://127.0.0.1:4646",
TLSConfig: &api.TLSConfig{
CAPath: "/path/to/nowhere",
},
},
inputPath: "/v1/jobs",
expectedOutputURL: "https://127.0.0.1:4646/v1/jobs",
},
}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
actualOutput, err := pathToURL(tc.inputConfig, tc.inputPath)
must.NoError(t, err)
must.NotNil(t, actualOutput)
must.Eq(t, actualOutput.String(), tc.expectedOutputURL)
})
}
}