reproxy/app/main_test.go
Umputun 7139c57766
RPC plugins support (#85)
* wip

* resolve merge artifacts

* full coverage for conductor

* wire plugin conductor to main and proxy

* wip, with separate match handler

* split matching logic with another handler, add initial docs

* move parts of proxy to handlers, add tests

* add headers in to be sent to proxied url

* merged from master

* add example with docker compose

* supress excesive debug reporting 0-9 disabled in docker

* add plugin tests

* randomize test port

* lint: minor warns

* lint: err shadow
2021-06-01 02:56:39 -05:00

355 lines
9.5 KiB
Go

package main
import (
"context"
"crypto/tls"
"fmt"
"io/ioutil"
"math/rand"
"net/http"
"os"
"strconv"
"syscall"
"testing"
"time"
log "github.com/go-pkgz/lgr"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/umputun/reproxy/lib"
)
func Test_Main(t *testing.T) {
port := 40000 + int(rand.Int31n(10000))
os.Args = []string{"test", "--static.enabled",
"--static.rule=*,/svc1, https://httpbin.org/get,https://feedmaster.umputun.com/ping",
"--static.rule=*,/svc2/(.*), https://echo.umputun.com/$1,https://feedmaster.umputun.com/ping",
"--file.enabled", "--file.name=discovery/provider/testdata/config.yml",
"--dbg", "--logger.enabled", "--logger.stdout", "--logger.file=/tmp/reproxy.log",
"--listen=127.0.0.1:" + strconv.Itoa(port), "--signature", "--mgmt.enabled",
"--error.enabled", "--error.template=proxy/testdata/errtmpl.html",
}
defer os.Remove("/tmp/reproxy.log")
done := make(chan struct{})
go func() {
<-done
e := syscall.Kill(syscall.Getpid(), syscall.SIGTERM)
require.NoError(t, e)
}()
finished := make(chan struct{})
go func() {
main()
close(finished)
}()
// defer cleanup because require check below can fail
defer func() {
close(done)
<-finished
}()
waitForHTTPServerStart(port)
time.Sleep(time.Second)
{
resp, err := http.Get(fmt.Sprintf("http://localhost:%d/ping", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Equal(t, "pong", string(body))
}
{
client := http.Client{Timeout: 10 * time.Second}
resp, err := client.Get(fmt.Sprintf("http://127.0.0.1:%d/svc1", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Contains(t, string(body), `"Host": "httpbin.org"`)
}
{
client := http.Client{Timeout: 10 * time.Second}
resp, err := client.Get(fmt.Sprintf("http://127.0.0.1:%d/svc2/test", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Contains(t, string(body), `echo echo 123`)
}
{
client := http.Client{Timeout: 10 * time.Second}
resp, err := client.Get(fmt.Sprintf("http://127.0.0.1:%d/bad", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, http.StatusBadGateway, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Equal(t, "oh my! 502 - Bad Gateway", string(body))
}
}
func Test_MainWithSSL(t *testing.T) {
port := 40000 + int(rand.Int31n(10000))
os.Args = []string{"test", "--static.enabled",
"--static.rule=*,/svc1, https://httpbin.org/get,https://feedmaster.umputun.com/ping",
"--static.rule=*,/svc2/(.*), https://echo.umputun.com/$1,https://feedmaster.umputun.com/ping",
"--file.enabled", "--file.name=discovery/provider/testdata/config.yml",
"--dbg", "--logger.enabled", "--logger.stdout", "--logger.file=/tmp/reproxy.log",
"--listen=127.0.0.1:" + strconv.Itoa(port), "--signature", "--ssl.type=static",
"--ssl.cert=proxy/testdata/localhost.crt", "--ssl.key=proxy/testdata/localhost.key"}
defer os.Remove("/tmp/reproxy.log")
done := make(chan struct{})
go func() {
<-done
e := syscall.Kill(syscall.Getpid(), syscall.SIGTERM)
require.NoError(t, e)
}()
finished := make(chan struct{})
go func() {
main()
close(finished)
}()
// defer cleanup because require check below can fail
defer func() {
close(done)
<-finished
}()
waitForHTTPServerStart(port)
time.Sleep(time.Second)
client := http.Client{
// allow self-signed certificate
Transport: &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
},
Timeout: 10 * time.Second,
}
{
resp, err := client.Get(fmt.Sprintf("https://127.0.0.1:%d/ping", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Equal(t, "pong", string(body))
}
{
resp, err := client.Get(fmt.Sprintf("https://127.0.0.1:%d/svc1", port))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
assert.Contains(t, string(body), `"Host": "httpbin.org"`)
}
}
func Test_MainWithPlugin(t *testing.T) {
rand.Seed(time.Now().UnixNano())
proxyPort := rand.Intn(10000) + 40000
conductorPort := rand.Intn(10000) + 40000
os.Args = []string{"test", "--static.enabled",
"--static.rule=*,/svc1, https://httpbin.org/get,https://feedmaster.umputun.com/ping",
"--static.rule=*,/svc2/(.*), https://echo.umputun.com/$1,https://feedmaster.umputun.com/ping",
"--file.enabled", "--file.name=discovery/provider/testdata/config.yml",
"--dbg", "--logger.enabled", "--logger.stdout", "--logger.file=/tmp/reproxy.log",
"--listen=127.0.0.1:" + strconv.Itoa(proxyPort), "--signature", "--error.enabled",
"--header=hh1:vv1",
"--plugin.enabled", "--plugin.listen=127.0.0.1:" + strconv.Itoa(conductorPort),
}
defer os.Remove("/tmp/reproxy.log")
done := make(chan struct{})
go func() {
<-done
e := syscall.Kill(syscall.Getpid(), syscall.SIGTERM)
require.NoError(t, e)
}()
finished := make(chan struct{})
go func() {
main()
close(finished)
}()
// defer cleanup because require check below can fail
defer func() {
close(done)
<-finished
}()
waitForHTTPServerStart(proxyPort)
pluginPort := rand.Intn(10000) + 40000
plugin := lib.Plugin{Name: "TestPlugin", Address: "127.0.0.1:" + strconv.Itoa(pluginPort), Methods: []string{"HeaderThing", "ErrorThing"}}
go func() {
if err := plugin.Do(context.Background(), fmt.Sprintf("http://127.0.0.1:%d", conductorPort), &TestPlugin{}); err != nil {
require.NotEqual(t, "proxy server closed, http: Server closed", err.Error())
}
}()
time.Sleep(time.Second)
client := http.Client{Timeout: 10 * time.Second}
{
resp, err := client.Get(fmt.Sprintf("http://127.0.0.1:%d/svc1", proxyPort))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 200, resp.StatusCode)
body, err := ioutil.ReadAll(resp.Body)
assert.NoError(t, err)
t.Logf("body: %s", string(body))
assert.Contains(t, string(body), `"Host": "httpbin.org"`)
assert.Contains(t, string(body), `"Inh": "val"`)
assert.Equal(t, "val1", resp.Header.Get("key1"))
assert.Equal(t, "val2", resp.Header.Get("key2"))
}
{
resp, err := client.Get(fmt.Sprintf("http://127.0.0.1:%d/fail", proxyPort))
require.NoError(t, err)
defer resp.Body.Close()
assert.Equal(t, 500, resp.StatusCode)
}
}
func Test_listenAddress(t *testing.T) {
tbl := []struct {
addr string
sslType string
env string
res string
}{
{"", "none", "1", "0.0.0.0:8080"},
{"", "none", "0", "127.0.0.1:80"},
{"", "auto", "false", "127.0.0.1:443"},
{"", "auto", "true", "0.0.0.0:8443"},
{"127.0.0.1:8081", "none", "true", "127.0.0.1:8081"},
{"192.168.1.1:8081", "none", "false", "192.168.1.1:8081"},
{"127.0.0.1:8080", "none", "0", "127.0.0.1:8080"},
{"127.0.0.1:8443", "auto", "true", "127.0.0.1:8443"},
}
defer os.Unsetenv("REPROXY_IN_DOCKER")
for i, tt := range tbl {
t.Run(strconv.Itoa(i), func(t *testing.T) {
assert.NoError(t, os.Unsetenv("REPROXY_IN_DOCKER"))
if tt.env != "" {
assert.NoError(t, os.Setenv("REPROXY_IN_DOCKER", tt.env))
}
assert.Equal(t, tt.res, listenAddress(tt.addr, tt.sslType))
})
}
}
func Test_redirHTTPPort(t *testing.T) {
tbl := []struct {
port int
env string
res int
}{
{0, "1", 8080},
{0, "0", 80},
{0, "true", 8080},
{0, "false", 80},
{1234, "true", 1234},
{1234, "false", 1234},
}
defer os.Unsetenv("REPROXY_IN_DOCKER")
for i, tt := range tbl {
t.Run(strconv.Itoa(i), func(t *testing.T) {
assert.NoError(t, os.Unsetenv("REPROXY_IN_DOCKER"))
if tt.env != "" {
assert.NoError(t, os.Setenv("REPROXY_IN_DOCKER", tt.env))
}
assert.Equal(t, tt.res, redirHTTPPort(tt.port))
})
}
}
func Test_sizeParse(t *testing.T) {
tbl := []struct {
inp string
res uint64
err bool
}{
{"1000", 1000, false},
{"0", 0, false},
{"", 0, true},
{"10K", 10240, false},
{"1k", 1024, false},
{"14m", 14 * 1024 * 1024, false},
{"7G", 7 * 1024 * 1024 * 1024, false},
{"170g", 170 * 1024 * 1024 * 1024, false},
{"17T", 17 * 1024 * 1024 * 1024 * 1024, false},
{"123aT", 0, true},
{"123a", 0, true},
{"123.45", 0, true},
}
for i, tt := range tbl {
t.Run(strconv.Itoa(i), func(t *testing.T) {
res, err := sizeParse(tt.inp)
if tt.err {
require.Error(t, err)
return
}
require.NoError(t, err)
assert.Equal(t, tt.res, res)
})
}
}
func waitForHTTPServerStart(port int) {
// wait for up to 10 seconds for server to start before returning it
client := http.Client{Timeout: time.Second}
for i := 0; i < 100; i++ {
time.Sleep(time.Millisecond * 100)
if resp, err := client.Get(fmt.Sprintf("http://localhost:%d/ping", port)); err == nil {
_ = resp.Body.Close()
return
}
}
}
type TestPlugin struct{}
//nolint
func (h *TestPlugin) HeaderThing(req *lib.Request, res *lib.Response) (err error) {
log.Printf("req: %+v", req)
res.HeadersIn = http.Header{}
res.HeadersIn.Add("inh", "val")
res.HeadersOut = req.Header
res.HeadersOut.Add("key1", "val1")
res.StatusCode = 200
return nil
}
//nolint
func (h *TestPlugin) ErrorThing(req lib.Request, res *lib.Response) (err error) {
log.Printf("req: %+v", req)
if req.URL == "/fail" {
res.StatusCode = 500
return nil
}
res.HeadersOut = req.Header
res.HeadersOut.Add("key2", "val2")
res.StatusCode = 200
return nil
}