2020-05-05 07:53:42 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2021-03-05 16:21:11 +00:00
|
|
|
"bytes"
|
|
|
|
"fmt"
|
2021-04-21 07:55:29 +00:00
|
|
|
"net/url"
|
2021-03-05 16:21:11 +00:00
|
|
|
"regexp"
|
2020-05-05 07:53:42 +00:00
|
|
|
"testing"
|
2021-03-05 16:21:11 +00:00
|
|
|
|
|
|
|
"gopkg.in/yaml.v2"
|
2020-05-05 07:53:42 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestParseAuthConfigFailure(t *testing.T) {
|
|
|
|
f := func(s string) {
|
|
|
|
t.Helper()
|
|
|
|
_, err := parseAuthConfig([]byte(s))
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expecting non-nil error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Empty config
|
|
|
|
f(``)
|
|
|
|
|
|
|
|
// Invalid entry
|
|
|
|
f(`foobar`)
|
|
|
|
f(`foobar: baz`)
|
|
|
|
|
|
|
|
// Empty users
|
|
|
|
f(`users: []`)
|
|
|
|
|
|
|
|
// Missing url_prefix
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
`)
|
|
|
|
|
|
|
|
// Invalid url_prefix
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: bar
|
|
|
|
`)
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: ftp://bar
|
|
|
|
`)
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: //bar
|
|
|
|
`)
|
2021-02-11 10:40:59 +00:00
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: http:///bar
|
|
|
|
`)
|
2021-04-21 07:55:29 +00:00
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
2021-05-28 22:00:23 +00:00
|
|
|
url_prefix:
|
|
|
|
bar: baz
|
|
|
|
`)
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix:
|
|
|
|
- [foo]
|
|
|
|
`)
|
|
|
|
|
2021-10-22 16:08:06 +00:00
|
|
|
// Invalid headers
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: http://foo.bar
|
|
|
|
headers: foobar
|
|
|
|
`)
|
|
|
|
|
2021-05-28 22:00:23 +00:00
|
|
|
// empty url_prefix
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: []
|
2021-04-21 07:55:29 +00:00
|
|
|
`)
|
2020-05-05 07:53:42 +00:00
|
|
|
|
2021-04-02 19:14:53 +00:00
|
|
|
// Username and bearer_token in a single config
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
bearer_token: bbb
|
|
|
|
url_prefix: http://foo.bar
|
|
|
|
`)
|
|
|
|
|
|
|
|
// Bearer_token and password in a single config
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- password: foo
|
|
|
|
bearer_token: bbb
|
|
|
|
url_prefix: http://foo.bar
|
|
|
|
`)
|
|
|
|
|
2020-05-05 07:53:42 +00:00
|
|
|
// Duplicate users
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: http://foo.bar
|
|
|
|
- username: bar
|
|
|
|
url_prefix: http://xxx.yyy
|
|
|
|
- username: foo
|
|
|
|
url_prefix: https://sss.sss
|
|
|
|
`)
|
2021-02-11 10:40:59 +00:00
|
|
|
|
2021-04-02 19:14:53 +00:00
|
|
|
// Duplicate bearer_tokens
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- bearer_token: foo
|
|
|
|
url_prefix: http://foo.bar
|
|
|
|
- username: bar
|
|
|
|
url_prefix: http://xxx.yyy
|
|
|
|
- bearer_token: foo
|
|
|
|
url_prefix: https://sss.sss
|
|
|
|
`)
|
|
|
|
|
2021-02-11 10:40:59 +00:00
|
|
|
// Missing url_prefix in url_map
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- src_paths: ["/foo/bar"]
|
|
|
|
`)
|
|
|
|
|
2021-04-21 07:55:29 +00:00
|
|
|
// Invalid url_prefix in url_map
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- src_paths: ["/foo/bar"]
|
|
|
|
url_prefix: foo.bar
|
|
|
|
`)
|
|
|
|
|
2021-05-28 22:00:23 +00:00
|
|
|
// empty url_prefix in url_map
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- src_paths: ['/foo/bar']
|
|
|
|
url_prefix: []
|
|
|
|
`)
|
|
|
|
|
2021-02-11 10:40:59 +00:00
|
|
|
// Missing src_paths in url_map
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- url_prefix: http://foobar
|
|
|
|
`)
|
|
|
|
|
2021-03-05 16:21:11 +00:00
|
|
|
// Invalid regexp in src_path.
|
2021-02-11 10:40:59 +00:00
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
2021-03-05 16:21:11 +00:00
|
|
|
- src_paths: ['fo[obar']
|
2021-02-11 10:40:59 +00:00
|
|
|
url_prefix: http://foobar
|
|
|
|
`)
|
2021-10-22 16:08:06 +00:00
|
|
|
|
|
|
|
// Invalid headers in url_map (missing ':')
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- src_paths: ['/foobar']
|
|
|
|
url_prefix: http://foobar
|
|
|
|
headers:
|
|
|
|
- foobar
|
|
|
|
`)
|
|
|
|
// Invalid headers in url_map (dictionary instead of array)
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: a
|
|
|
|
url_map:
|
|
|
|
- src_paths: ['/foobar']
|
|
|
|
url_prefix: http://foobar
|
|
|
|
headers:
|
|
|
|
aaa: bbb
|
|
|
|
`)
|
2020-05-05 07:53:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestParseAuthConfigSuccess(t *testing.T) {
|
|
|
|
f := func(s string, expectedAuthConfig map[string]*UserInfo) {
|
|
|
|
t.Helper()
|
|
|
|
m, err := parseAuthConfig([]byte(s))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error: %s", err)
|
|
|
|
}
|
|
|
|
removeMetrics(m)
|
2021-03-05 16:21:11 +00:00
|
|
|
if err := areEqualConfigs(m, expectedAuthConfig); err != nil {
|
|
|
|
t.Fatal(err)
|
2020-05-05 07:53:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Single user
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
password: bar
|
|
|
|
url_prefix: http://aaa:343/bbb
|
|
|
|
`, map[string]*UserInfo{
|
2021-04-02 19:14:53 +00:00
|
|
|
getAuthToken("", "foo", "bar"): {
|
2020-05-05 07:53:42 +00:00
|
|
|
Username: "foo",
|
|
|
|
Password: "bar",
|
2021-04-21 07:55:29 +00:00
|
|
|
URLPrefix: mustParseURL("http://aaa:343/bbb"),
|
2020-05-05 07:53:42 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2021-05-28 22:00:23 +00:00
|
|
|
// Multiple url_prefix entries
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
password: bar
|
|
|
|
url_prefix:
|
|
|
|
- http://node1:343/bbb
|
|
|
|
- http://node2:343/bbb
|
|
|
|
`, map[string]*UserInfo{
|
|
|
|
getAuthToken("", "foo", "bar"): {
|
|
|
|
Username: "foo",
|
|
|
|
Password: "bar",
|
|
|
|
URLPrefix: mustParseURLs([]string{
|
|
|
|
"http://node1:343/bbb",
|
|
|
|
"http://node2:343/bbb",
|
|
|
|
}),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2020-05-05 07:53:42 +00:00
|
|
|
// Multiple users
|
|
|
|
f(`
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: http://foo
|
|
|
|
- username: bar
|
|
|
|
url_prefix: https://bar/x///
|
|
|
|
`, map[string]*UserInfo{
|
2021-04-02 19:14:53 +00:00
|
|
|
getAuthToken("", "foo", ""): {
|
2020-05-05 07:53:42 +00:00
|
|
|
Username: "foo",
|
2021-04-21 07:55:29 +00:00
|
|
|
URLPrefix: mustParseURL("http://foo"),
|
2020-05-05 07:53:42 +00:00
|
|
|
},
|
2021-04-02 19:14:53 +00:00
|
|
|
getAuthToken("", "bar", ""): {
|
2020-05-05 07:53:42 +00:00
|
|
|
Username: "bar",
|
2021-04-21 07:55:29 +00:00
|
|
|
URLPrefix: mustParseURL("https://bar/x"),
|
2020-05-05 07:53:42 +00:00
|
|
|
},
|
|
|
|
})
|
2021-02-11 10:40:59 +00:00
|
|
|
|
|
|
|
// non-empty URLMap
|
|
|
|
f(`
|
|
|
|
users:
|
2021-04-02 19:14:53 +00:00
|
|
|
- bearer_token: foo
|
2021-02-11 10:40:59 +00:00
|
|
|
url_map:
|
2021-03-05 16:21:11 +00:00
|
|
|
- src_paths: ["/api/v1/query","/api/v1/query_range","/api/v1/label/[^./]+/.+"]
|
2021-02-11 10:40:59 +00:00
|
|
|
url_prefix: http://vmselect/select/0/prometheus
|
|
|
|
- src_paths: ["/api/v1/write"]
|
2021-05-28 22:00:23 +00:00
|
|
|
url_prefix: ["http://vminsert1/insert/0/prometheus","http://vminsert2/insert/0/prometheus"]
|
2021-10-22 16:08:06 +00:00
|
|
|
headers:
|
|
|
|
- "foo: bar"
|
|
|
|
- "xxx: y"
|
2021-02-11 10:40:59 +00:00
|
|
|
`, map[string]*UserInfo{
|
2021-04-02 19:14:53 +00:00
|
|
|
getAuthToken("foo", "", ""): {
|
|
|
|
BearerToken: "foo",
|
2021-02-11 10:40:59 +00:00
|
|
|
URLMap: []URLMap{
|
|
|
|
{
|
2021-03-05 16:21:11 +00:00
|
|
|
SrcPaths: getSrcPaths([]string{"/api/v1/query", "/api/v1/query_range", "/api/v1/label/[^./]+/.+"}),
|
2021-04-21 07:55:29 +00:00
|
|
|
URLPrefix: mustParseURL("http://vmselect/select/0/prometheus"),
|
2021-02-11 10:40:59 +00:00
|
|
|
},
|
|
|
|
{
|
2021-05-28 22:00:23 +00:00
|
|
|
SrcPaths: getSrcPaths([]string{"/api/v1/write"}),
|
|
|
|
URLPrefix: mustParseURLs([]string{
|
|
|
|
"http://vminsert1/insert/0/prometheus",
|
|
|
|
"http://vminsert2/insert/0/prometheus",
|
|
|
|
}),
|
2021-10-22 16:08:06 +00:00
|
|
|
Headers: []Header{
|
|
|
|
{
|
|
|
|
Name: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "xxx",
|
|
|
|
Value: "y",
|
|
|
|
},
|
|
|
|
},
|
2021-02-11 10:40:59 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2021-11-17 11:31:16 +00:00
|
|
|
getAuthToken("", "foo", ""): {
|
|
|
|
BearerToken: "foo",
|
|
|
|
URLMap: []URLMap{
|
|
|
|
{
|
|
|
|
SrcPaths: getSrcPaths([]string{"/api/v1/query", "/api/v1/query_range", "/api/v1/label/[^./]+/.+"}),
|
|
|
|
URLPrefix: mustParseURL("http://vmselect/select/0/prometheus"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
SrcPaths: getSrcPaths([]string{"/api/v1/write"}),
|
|
|
|
URLPrefix: mustParseURLs([]string{
|
|
|
|
"http://vminsert1/insert/0/prometheus",
|
|
|
|
"http://vminsert2/insert/0/prometheus",
|
|
|
|
}),
|
|
|
|
Headers: []Header{
|
|
|
|
{
|
|
|
|
Name: "foo",
|
|
|
|
Value: "bar",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "xxx",
|
|
|
|
Value: "y",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2021-02-11 10:40:59 +00:00
|
|
|
})
|
2020-05-05 07:53:42 +00:00
|
|
|
}
|
|
|
|
|
2021-03-05 16:21:11 +00:00
|
|
|
func getSrcPaths(paths []string) []*SrcPath {
|
|
|
|
var sps []*SrcPath
|
|
|
|
for _, path := range paths {
|
|
|
|
sps = append(sps, &SrcPath{
|
|
|
|
sOriginal: path,
|
|
|
|
re: regexp.MustCompile("^(?:" + path + ")$"),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return sps
|
|
|
|
}
|
|
|
|
|
2020-05-05 07:53:42 +00:00
|
|
|
func removeMetrics(m map[string]*UserInfo) {
|
|
|
|
for _, info := range m {
|
|
|
|
info.requests = nil
|
|
|
|
}
|
|
|
|
}
|
2021-03-05 16:21:11 +00:00
|
|
|
|
|
|
|
func areEqualConfigs(a, b map[string]*UserInfo) error {
|
|
|
|
aData, err := yaml.Marshal(a)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot marshal a: %w", err)
|
|
|
|
}
|
|
|
|
bData, err := yaml.Marshal(b)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("cannot marshal b: %w", err)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(aData, bData) {
|
|
|
|
return fmt.Errorf("unexpected configs;\ngot\n%s\nwant\n%s", aData, bData)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2021-04-21 07:55:29 +00:00
|
|
|
|
2021-05-28 22:00:23 +00:00
|
|
|
func mustParseURL(u string) *URLPrefix {
|
|
|
|
return mustParseURLs([]string{u})
|
|
|
|
}
|
|
|
|
|
|
|
|
func mustParseURLs(us []string) *URLPrefix {
|
|
|
|
pus := make([]*url.URL, len(us))
|
|
|
|
for i, u := range us {
|
|
|
|
pu, err := url.Parse(u)
|
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Errorf("BUG: cannot parse %q: %w", u, err))
|
|
|
|
}
|
|
|
|
pus[i] = pu
|
2021-04-21 07:55:29 +00:00
|
|
|
}
|
2021-05-28 22:00:23 +00:00
|
|
|
return &URLPrefix{
|
|
|
|
urls: pus,
|
2021-04-21 07:55:29 +00:00
|
|
|
}
|
|
|
|
}
|
2021-12-02 21:19:05 +00:00
|
|
|
|
|
|
|
func TestIsHTTPURLSuccess(t *testing.T) {
|
|
|
|
assert := func(s string, expected bool) {
|
|
|
|
t.Helper()
|
|
|
|
res := isHTTPURL(s)
|
|
|
|
if res != expected {
|
|
|
|
t.Fatalf("expecting %t, got %t", expected, res)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
assert("http://isvalid:8000/filepath", true) // test http
|
|
|
|
assert("https://isvalid:8000/filepath", true) // test https
|
|
|
|
assert("tcp://notvalid:8000/filepath", false) // test tcp
|
|
|
|
assert("0/filepath", false) // something invalid
|
|
|
|
assert("filepath.extension", false) // something invalid
|
|
|
|
}
|