mirror of
				https://github.com/prometheus/prometheus.git
				synced 2025-10-31 00:11:23 +01:00 
			
		
		
		
	* refactor: move from io/ioutil to io and os packages * use fs.DirEntry instead of os.FileInfo after os.ReadDir Signed-off-by: MOREL Matthieu <matthieu.morel@cnp.fr>
		
			
				
	
	
		
			166 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			166 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2021 The Prometheus Authors
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| // http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| package scaleway
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/http/httptest"
 | |
| 	"os"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/prometheus/common/model"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| 	"gopkg.in/yaml.v2"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	testProjectID     = "8feda53f-15f0-447f-badf-ebe32dad2fc0"
 | |
| 	testSecretKeyFile = "testdata/secret_key"
 | |
| 	testSecretKey     = "6d6579e5-a5b9-49fc-a35f-b4feb9b87301"
 | |
| 	testAccessKey     = "SCW0W8NG6024YHRJ7723"
 | |
| )
 | |
| 
 | |
| func TestScalewayInstanceRefresh(t *testing.T) {
 | |
| 	mock := httptest.NewServer(http.HandlerFunc(mockScalewayInstance))
 | |
| 	defer mock.Close()
 | |
| 
 | |
| 	cfgString := fmt.Sprintf(`
 | |
| ---
 | |
| role: instance
 | |
| project_id: %s
 | |
| secret_key: %s
 | |
| access_key: %s
 | |
| api_url: %s
 | |
| `, testProjectID, testSecretKey, testAccessKey, mock.URL)
 | |
| 	var cfg SDConfig
 | |
| 	require.NoError(t, yaml.UnmarshalStrict([]byte(cfgString), &cfg))
 | |
| 
 | |
| 	d, err := newRefresher(&cfg)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	tgs, err := d.refresh(ctx)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	require.Equal(t, 1, len(tgs))
 | |
| 
 | |
| 	tg := tgs[0]
 | |
| 	require.NotNil(t, tg)
 | |
| 	require.NotNil(t, tg.Targets)
 | |
| 	require.Equal(t, 2, len(tg.Targets))
 | |
| 
 | |
| 	for i, lbls := range []model.LabelSet{
 | |
| 		{
 | |
| 			"__address__":                                     "10.70.60.57:80",
 | |
| 			"__meta_scaleway_instance_boot_type":              "local",
 | |
| 			"__meta_scaleway_instance_hostname":               "scw-nervous-shirley",
 | |
| 			"__meta_scaleway_instance_id":                     "93c18a61-b681-49d0-a1cc-62b43883ae89",
 | |
| 			"__meta_scaleway_instance_image_arch":             "x86_64",
 | |
| 			"__meta_scaleway_instance_image_id":               "45a86b35-eca6-4055-9b34-ca69845da146",
 | |
| 			"__meta_scaleway_instance_image_name":             "Ubuntu 18.04 Bionic Beaver",
 | |
| 			"__meta_scaleway_instance_location_cluster_id":    "40",
 | |
| 			"__meta_scaleway_instance_location_hypervisor_id": "1601",
 | |
| 			"__meta_scaleway_instance_location_node_id":       "29",
 | |
| 			"__meta_scaleway_instance_name":                   "scw-nervous-shirley",
 | |
| 			"__meta_scaleway_instance_organization_id":        "cb334986-b054-4725-9d3a-40850fdc6015",
 | |
| 			"__meta_scaleway_instance_private_ipv4":           "10.70.60.57",
 | |
| 			"__meta_scaleway_instance_project_id":             "cb334986-b054-4725-9d5a-30850fdc6015",
 | |
| 			"__meta_scaleway_instance_public_ipv6":            "2001:bc8:630:1e1c::1",
 | |
| 			"__meta_scaleway_instance_region":                 "fr-par",
 | |
| 			"__meta_scaleway_instance_security_group_id":      "a6a794b7-c05b-4b20-b9fe-e17a9bb85cf0",
 | |
| 			"__meta_scaleway_instance_security_group_name":    "Default security group",
 | |
| 			"__meta_scaleway_instance_status":                 "running",
 | |
| 			"__meta_scaleway_instance_type":                   "DEV1-S",
 | |
| 			"__meta_scaleway_instance_zone":                   "fr-par-1",
 | |
| 		},
 | |
| 		{
 | |
| 			"__address__":                                     "10.193.162.9:80",
 | |
| 			"__meta_scaleway_instance_boot_type":              "local",
 | |
| 			"__meta_scaleway_instance_hostname":               "scw-quizzical-feistel",
 | |
| 			"__meta_scaleway_instance_id":                     "5b6198b4-c677-41b5-9c05-04557264ae1f",
 | |
| 			"__meta_scaleway_instance_image_arch":             "x86_64",
 | |
| 			"__meta_scaleway_instance_image_id":               "71733b74-260f-4d0d-8f18-f37dcfa56d6f",
 | |
| 			"__meta_scaleway_instance_image_name":             "Debian Buster",
 | |
| 			"__meta_scaleway_instance_location_cluster_id":    "4",
 | |
| 			"__meta_scaleway_instance_location_hypervisor_id": "201",
 | |
| 			"__meta_scaleway_instance_location_node_id":       "5",
 | |
| 			"__meta_scaleway_instance_name":                   "scw-quizzical-feistel",
 | |
| 			"__meta_scaleway_instance_organization_id":        "cb334986-b054-4725-9d3a-40850fdc6015",
 | |
| 			"__meta_scaleway_instance_private_ipv4":           "10.193.162.9",
 | |
| 			"__meta_scaleway_instance_project_id":             "cb334986-b054-4725-9d5a-30850fdc6015",
 | |
| 			"__meta_scaleway_instance_public_ipv4":            "151.115.45.127",
 | |
| 			"__meta_scaleway_instance_public_ipv6":            "2001:bc8:1e00:6204::1",
 | |
| 			"__meta_scaleway_instance_region":                 "fr-par",
 | |
| 			"__meta_scaleway_instance_security_group_id":      "d35dd210-8392-44dc-8854-121e419a0f56",
 | |
| 			"__meta_scaleway_instance_security_group_name":    "Default security group",
 | |
| 			"__meta_scaleway_instance_status":                 "running",
 | |
| 			"__meta_scaleway_instance_type":                   "DEV1-S",
 | |
| 			"__meta_scaleway_instance_zone":                   "fr-par-1",
 | |
| 		},
 | |
| 	} {
 | |
| 		t.Run(fmt.Sprintf("item %d", i), func(t *testing.T) {
 | |
| 			require.Equal(t, lbls, tg.Targets[i])
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func mockScalewayInstance(w http.ResponseWriter, r *http.Request) {
 | |
| 	if r.Header.Get("X-Auth-Token") != testSecretKey {
 | |
| 		http.Error(w, "bad token id", http.StatusUnauthorized)
 | |
| 		return
 | |
| 	}
 | |
| 	if r.URL.Path != "/instance/v1/zones/fr-par-1/servers" {
 | |
| 		http.Error(w, "bad url", http.StatusNotFound)
 | |
| 		return
 | |
| 	}
 | |
| 	w.Header().Set("Content-Type", "application/json")
 | |
| 	instance, err := os.ReadFile("testdata/instance.json")
 | |
| 	if err != nil {
 | |
| 		http.Error(w, err.Error(), http.StatusInternalServerError)
 | |
| 		return
 | |
| 	}
 | |
| 	_, err = w.Write(instance)
 | |
| 	if err != nil {
 | |
| 		http.Error(w, err.Error(), http.StatusInternalServerError)
 | |
| 		return
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestScalewayInstanceAuthToken(t *testing.T) {
 | |
| 	mock := httptest.NewServer(http.HandlerFunc(mockScalewayInstance))
 | |
| 	defer mock.Close()
 | |
| 
 | |
| 	cfgString := fmt.Sprintf(`
 | |
| ---
 | |
| role: instance
 | |
| project_id: %s
 | |
| secret_key_file: %s
 | |
| access_key: %s
 | |
| api_url: %s
 | |
| `, testProjectID, testSecretKeyFile, testAccessKey, mock.URL)
 | |
| 	var cfg SDConfig
 | |
| 	require.NoError(t, yaml.UnmarshalStrict([]byte(cfgString), &cfg))
 | |
| 
 | |
| 	d, err := newRefresher(&cfg)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	ctx := context.Background()
 | |
| 	tgs, err := d.refresh(ctx)
 | |
| 	require.NoError(t, err)
 | |
| 
 | |
| 	require.Equal(t, 1, len(tgs))
 | |
| }
 |