mirror of
https://github.com/kubeshark/kubeshark.git
synced 2025-10-23 16:35:42 +00:00
* Fix the OOMKilled error by calling `debug.FreeOSMemory` periodically * Remove `MAX_NUMBER_OF_GOROUTINES` environment variable * Change the line * Increase the default value of `TCP_STREAM_CHANNEL_TIMEOUT_MS` to `10000` * Write the client and integrate to the new real-time database * Refactor the WebSocket implementaiton for `/ws` * Adapt the UI to the new filtering system * Fix the rest of the issues in the UI * Increase the buffer of the scanner * Implement accessing single records * Increase the buffer of another scanner * Populate `Request` and `Response` fields of `MizuEntry` * Add syntax highlighting for the query * Add database to `Dockerfile` * Fix some issues * Update the `realtime_dbms` Git module commit hash * Upgrade Gin version and print the query string * Revert "Upgrade Gin version and print the query string" This reverts commitaa09f904ee
. * Use WebSocket's itself to query instead of the query string * Fix some errors related to conversion to HAR * Fix the issues caused by the latest merge * Fix the build error * Fix PR validation GitHub workflow * Replace the git submodule with latest Basenine version `0.1.0` Remove `realtime_client.go` and use the official client library `github.com/up9inc/basenine/client/go` instead. * Move Basenine host and port constants to `shared` module * Reliably execute and wait for Basenine to become available * Upgrade Basenine version * Properly close WebSocket and data channel * Fix the issues caused by the recent merge commit * Clean up the TypeScript code * Update `.gitignore` * Limit the database size * Add `Macros` method signature to `Dissector` interface and set the macros provided by the protocol extensions * Run `go mod tidy` on `agent` * Upgrade `github.com/up9inc/basenine/client/go` version * Implement a mechanism to update the query using click events in the UI and use it for protocol macros * Update the query on click to timestamps * Fix some issues in the WebSocket and channel handling * Update the query on clicks to status code * Update the query on clicks to method, path and service * Update the query on clicks to is outgoing, source and destination ports * Add an API endpoint to validate the query against syntax errors * Move the query background color state into `TrafficPage` * Fix the logic in `setQuery` * Display a toast message in case of a syntax error in the query * Remove a call to `fmt.Printf` * Upgrade Basenine version to `0.1.3` * Fix an issue related to getting `MAX_ENTRIES_DB_BYTES` environment variable * Have the `path` key in request details, in HTTP * Rearrange the HTTP headers for the querying * Do the same thing for `cookies` and `queryString` * Update the query on click to table elements Add the selectors for `TABLE` type representations in HTTP extension. * Update the query on click to `bodySize` and `elapsedTime` in `EntryTitle` * Add the selectors for `TABLE` type representations in AMQP extension * Add the selectors for `TABLE` type representations in Kafka extension * Add the selectors for `TABLE` type representations in Redis extension * Define a struct in `tap/api.go` for the section representation data * Add the selectors for `BODY` type representations * Add `request.path` to the HTTP request details * Change the summary string's field name from `path` to `summary` * Introduce `queryable` CSS class for queryable UI elements and underline them on hover * Instead of `N requests` at the bottom, make it `Displaying N results (queried X/Y)` and live update the values Upgrade Basenine version to `0.2.0`. * Verify the sha256sum of Basenine executable inside `Dockerfile` * Pass the start time to web UI through WebSocket and always show the `EntriesList` footer * Pipe the `stderr` of Basenine as well * Fix the layout issues related to `CodeEditor` in the UI * Use the correct `shasum` command in `Dockerfile` * Upgrade Basenine version to `0.2.1` * Limit the height of `CodeEditor` container * Remove `Paused` enum `ConnectionStatus` in UI * Fix the issue caused by the recent merge * Add the filtering guide (cheatsheet) * Update open cheatsheet button's title * Update cheatsheet content * Remove the old SQLite code, adapt the `--analyze` related code to Basenine * Change the method signature of `NewEntry` * Change the method signature of `Represent` * Introduce `HTTPPair` field in `MizuEntry` specific to HTTP * Remove `Entry`, `EntryId` and `EstimatedSizeBytes` fields from `MizuEntry` Also remove the `getEstimatedEntrySizeBytes` method. * Remove `gorm.io/gorm` dependency * Remove unused `sensitiveDataFiltering` folder * Increase the left margin of open cheatsheet button * Add `overflow: auto` to the cheatsheet `Modal` * Fix `GetEntry` method * Fix the macro for gRPC * Fix an interface conversion in case of AMQP * Fix two more interface conversion errors in AMQP * Make the `syncEntriesImpl` method blocking * Fix a grammar mistake in the cheatsheet * Adapt to the changes in the recent merge commit * Improve the cheatsheet text * Always display the timestamp in `en-US` * Upgrade Basenine version to `0.2.2` * Fix the order of closing Basenine connections and channels * Don't close the Basenine channels at all * Upgrade Basenine version to `0.2.3` * Set the initial filter to `rlimit(100)` * Make Basenine persistent * Upgrade Basenine version to `0.2.4` * Update `debug.Dockerfile` * Fix a failing test * Upgrade Basenine version to `0.2.5` * Revert "Do not show play icon when disconnected (#428)" This reverts commit8af2e562f8
. * Upgrade Basenine version to `0.2.6` * Make all non-informative things informative * Make `100` a constant * Use `===` in JavaScript no matter what * Remove a forgotten `console.log` * Add a comment and update the `query` in `syncEntriesImpl` * Don't call `panic` in `GetEntry` * Replace `panic` calls in `startBasenineServer` with `logger.Log.Panicf` * Remove unnecessary `\n` characters in the logs
1182 lines
32 KiB
Go
1182 lines
32 KiB
Go
package acceptanceTests
|
|
|
|
import (
|
|
"archive/zip"
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os/exec"
|
|
"path"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
func TestTap(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
tests := []int{50}
|
|
|
|
for _, entriesCount := range tests {
|
|
t.Run(fmt.Sprintf("%d", entriesCount), func(t *testing.T) {
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
for i := 0; i < entriesCount; i++ {
|
|
if _, requestErr := executeHttpGetRequest(fmt.Sprintf("%v/get", proxyUrl)); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
entriesCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, entriesCount, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
entry := entries[0].(map[string]interface{})
|
|
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, entry["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
if requestResult == nil {
|
|
return fmt.Errorf("unexpected nil entry result")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, entriesCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTapGuiPort(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
tests := []uint16{8898}
|
|
|
|
for _, guiPort := range tests {
|
|
t.Run(fmt.Sprintf("%d", guiPort), func(t *testing.T) {
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmdArgs = append(tapCmdArgs, "-p", fmt.Sprintf("%d", guiPort))
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(guiPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTapAllNamespaces(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
expectedPods := []PodDescriptor{
|
|
{Name: "httpbin", Namespace: "mizu-tests"},
|
|
{Name: "httpbin", Namespace: "mizu-tests2"},
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
tapCmdArgs = append(tapCmdArgs, "-A")
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
podsUrl := fmt.Sprintf("%v/status/tap", apiServerUrl)
|
|
requestResult, requestErr := executeHttpGetRequest(podsUrl)
|
|
if requestErr != nil {
|
|
t.Errorf("failed to get tap status, err: %v", requestErr)
|
|
return
|
|
}
|
|
|
|
pods, err := getPods(requestResult)
|
|
if err != nil {
|
|
t.Errorf("failed to get pods, err: %v", err)
|
|
return
|
|
}
|
|
|
|
for _, expectedPod := range expectedPods {
|
|
if !isPodDescriptorInPodArray(pods, expectedPod) {
|
|
t.Errorf("unexpected result - expected pod not found, pod namespace: %v, pod name: %v", expectedPod.Namespace, expectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTapMultipleNamespaces(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
expectedPods := []PodDescriptor{
|
|
{Name: "httpbin", Namespace: "mizu-tests"},
|
|
{Name: "httpbin2", Namespace: "mizu-tests"},
|
|
{Name: "httpbin", Namespace: "mizu-tests2"},
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
var namespacesCmd []string
|
|
for _, expectedPod := range expectedPods {
|
|
namespacesCmd = append(namespacesCmd, "-n", expectedPod.Namespace)
|
|
}
|
|
tapCmdArgs = append(tapCmdArgs, namespacesCmd...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
podsUrl := fmt.Sprintf("%v/status/tap", apiServerUrl)
|
|
requestResult, requestErr := executeHttpGetRequest(podsUrl)
|
|
if requestErr != nil {
|
|
t.Errorf("failed to get tap status, err: %v", requestErr)
|
|
return
|
|
}
|
|
|
|
pods, err := getPods(requestResult)
|
|
if err != nil {
|
|
t.Errorf("failed to get pods, err: %v", err)
|
|
return
|
|
}
|
|
|
|
if len(expectedPods) != len(pods) {
|
|
t.Errorf("unexpected result - expected pods length: %v, actual pods length: %v", len(expectedPods), len(pods))
|
|
return
|
|
}
|
|
|
|
for _, expectedPod := range expectedPods {
|
|
if !isPodDescriptorInPodArray(pods, expectedPod) {
|
|
t.Errorf("unexpected result - expected pod not found, pod namespace: %v, pod name: %v", expectedPod.Namespace, expectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTapRegex(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
regexPodName := "httpbin2"
|
|
expectedPods := []PodDescriptor{
|
|
{Name: regexPodName, Namespace: "mizu-tests"},
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgsWithRegex(regexPodName)
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
podsUrl := fmt.Sprintf("%v/status/tap", apiServerUrl)
|
|
requestResult, requestErr := executeHttpGetRequest(podsUrl)
|
|
if requestErr != nil {
|
|
t.Errorf("failed to get tap status, err: %v", requestErr)
|
|
return
|
|
}
|
|
|
|
pods, err := getPods(requestResult)
|
|
if err != nil {
|
|
t.Errorf("failed to get pods, err: %v", err)
|
|
return
|
|
}
|
|
|
|
if len(expectedPods) != len(pods) {
|
|
t.Errorf("unexpected result - expected pods length: %v, actual pods length: %v", len(expectedPods), len(pods))
|
|
return
|
|
}
|
|
|
|
for _, expectedPod := range expectedPods {
|
|
if !isPodDescriptorInPodArray(pods, expectedPod) {
|
|
t.Errorf("unexpected result - expected pod not found, pod namespace: %v, pod name: %v", expectedPod.Namespace, expectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTapDryRun(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmdArgs = append(tapCmdArgs, "--dry-run")
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
resultChannel := make(chan string, 1)
|
|
|
|
go func() {
|
|
if err := tapCmd.Wait(); err != nil {
|
|
resultChannel <- "fail"
|
|
return
|
|
}
|
|
resultChannel <- "success"
|
|
}()
|
|
|
|
go func() {
|
|
time.Sleep(shortRetriesCount * time.Second)
|
|
resultChannel <- "fail"
|
|
}()
|
|
|
|
testResult := <-resultChannel
|
|
if testResult != "success" {
|
|
t.Errorf("unexpected result - dry run cmd not done")
|
|
}
|
|
}
|
|
|
|
func TestTapRedact(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
requestBody := map[string]string{"User": "Mizu"}
|
|
for i := 0; i < defaultEntriesCount; i++ {
|
|
if _, requestErr := executeHttpPostRequest(fmt.Sprintf("%v/post", proxyUrl), requestBody); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
redactCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, defaultEntriesCount, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
firstEntry := entries[0].(map[string]interface{})
|
|
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, firstEntry["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
data := requestResult.(map[string]interface{})["data"].(map[string]interface{})
|
|
entryJson := data["entry"].(string)
|
|
|
|
var entry map[string]interface{}
|
|
if parseErr := json.Unmarshal([]byte(entryJson), &entry); parseErr != nil {
|
|
return fmt.Errorf("failed to parse entry, err: %v", parseErr)
|
|
}
|
|
|
|
entryRequest := entry["request"].(map[string]interface{})
|
|
entryPayload := entryRequest["payload"].(map[string]interface{})
|
|
entryDetails := entryPayload["details"].(map[string]interface{})
|
|
|
|
headers := entryDetails["_headers"].([]interface{})
|
|
for _, headerInterface := range headers {
|
|
header := headerInterface.(map[string]interface{})
|
|
if header["name"].(string) != "User-Agent" {
|
|
continue
|
|
}
|
|
|
|
userAgent := header["value"].(string)
|
|
if userAgent != "[REDACTED]" {
|
|
return fmt.Errorf("unexpected result - user agent is not redacted")
|
|
}
|
|
}
|
|
|
|
postData := entryDetails["postData"].(map[string]interface{})
|
|
textDataStr := postData["text"].(string)
|
|
|
|
var textData map[string]string
|
|
if parseErr := json.Unmarshal([]byte(textDataStr), &textData); parseErr != nil {
|
|
return fmt.Errorf("failed to parse text data, err: %v", parseErr)
|
|
}
|
|
|
|
if textData["User"] != "[REDACTED]" {
|
|
return fmt.Errorf("unexpected result - user in body is not redacted")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, redactCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestTapNoRedact(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmdArgs = append(tapCmdArgs, "--no-redact")
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
requestBody := map[string]string{"User": "Mizu"}
|
|
for i := 0; i < defaultEntriesCount; i++ {
|
|
if _, requestErr := executeHttpPostRequest(fmt.Sprintf("%v/post", proxyUrl), requestBody); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
redactCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, defaultEntriesCount, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
firstEntry := entries[0].(map[string]interface{})
|
|
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, firstEntry["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
data := requestResult.(map[string]interface{})["data"].(map[string]interface{})
|
|
entryJson := data["entry"].(string)
|
|
|
|
var entry map[string]interface{}
|
|
if parseErr := json.Unmarshal([]byte(entryJson), &entry); parseErr != nil {
|
|
return fmt.Errorf("failed to parse entry, err: %v", parseErr)
|
|
}
|
|
|
|
entryRequest := entry["request"].(map[string]interface{})
|
|
entryPayload := entryRequest["payload"].(map[string]interface{})
|
|
entryDetails := entryPayload["details"].(map[string]interface{})
|
|
|
|
headers := entryDetails["_headers"].([]interface{})
|
|
for _, headerInterface := range headers {
|
|
header := headerInterface.(map[string]interface{})
|
|
if header["name"].(string) != "User-Agent" {
|
|
continue
|
|
}
|
|
|
|
userAgent := header["value"].(string)
|
|
if userAgent == "[REDACTED]" {
|
|
return fmt.Errorf("unexpected result - user agent is redacted")
|
|
}
|
|
}
|
|
|
|
postData := entryDetails["postData"].(map[string]interface{})
|
|
textDataStr := postData["text"].(string)
|
|
|
|
var textData map[string]string
|
|
if parseErr := json.Unmarshal([]byte(textDataStr), &textData); parseErr != nil {
|
|
return fmt.Errorf("failed to parse text data, err: %v", parseErr)
|
|
}
|
|
|
|
if textData["User"] == "[REDACTED]" {
|
|
return fmt.Errorf("unexpected result - user in body is redacted")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, redactCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestTapRegexMasking(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmdArgs = append(tapCmdArgs, "-r", "Mizu")
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
for i := 0; i < defaultEntriesCount; i++ {
|
|
response, requestErr := http.Post(fmt.Sprintf("%v/post", proxyUrl), "text/plain", bytes.NewBufferString("Mizu"))
|
|
if _, requestErr = executeHttpRequest(response, requestErr); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
redactCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, defaultEntriesCount, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
firstEntry := entries[0].(map[string]interface{})
|
|
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, firstEntry["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
data := requestResult.(map[string]interface{})["data"].(map[string]interface{})
|
|
entryJson := data["entry"].(string)
|
|
|
|
var entry map[string]interface{}
|
|
if parseErr := json.Unmarshal([]byte(entryJson), &entry); parseErr != nil {
|
|
return fmt.Errorf("failed to parse entry, err: %v", parseErr)
|
|
}
|
|
|
|
entryRequest := entry["request"].(map[string]interface{})
|
|
entryPayload := entryRequest["payload"].(map[string]interface{})
|
|
entryDetails := entryPayload["details"].(map[string]interface{})
|
|
|
|
postData := entryDetails["postData"].(map[string]interface{})
|
|
textData := postData["text"].(string)
|
|
|
|
if textData != "[REDACTED]" {
|
|
return fmt.Errorf("unexpected result - body is not redacted")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, redactCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestTapIgnoredUserAgents(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
ignoredUserAgentValue := "ignore"
|
|
tapCmdArgs = append(tapCmdArgs, "--set", fmt.Sprintf("tap.ignored-user-agents=%v", ignoredUserAgentValue))
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
t.Cleanup(func() {
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Logf("failed to cleanup tap command, err: %v", err)
|
|
}
|
|
})
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
|
|
ignoredUserAgentCustomHeader := "Ignored-User-Agent"
|
|
headers := map[string]string{"User-Agent": ignoredUserAgentValue, ignoredUserAgentCustomHeader: ""}
|
|
for i := 0; i < defaultEntriesCount; i++ {
|
|
if _, requestErr := executeHttpGetRequestWithHeaders(fmt.Sprintf("%v/get", proxyUrl), headers); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
for i := 0; i < defaultEntriesCount; i++ {
|
|
if _, requestErr := executeHttpGetRequest(fmt.Sprintf("%v/get", proxyUrl)); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
ignoredUserAgentsCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, defaultEntriesCount*2, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
for _, entryInterface := range entries {
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, entryInterface.(map[string]interface{})["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
data := requestResult.(map[string]interface{})["data"].(map[string]interface{})
|
|
entryJson := data["entry"].(string)
|
|
|
|
var entry map[string]interface{}
|
|
if parseErr := json.Unmarshal([]byte(entryJson), &entry); parseErr != nil {
|
|
return fmt.Errorf("failed to parse entry, err: %v", parseErr)
|
|
}
|
|
|
|
entryRequest := entry["request"].(map[string]interface{})
|
|
entryPayload := entryRequest["payload"].(map[string]interface{})
|
|
entryDetails := entryPayload["details"].(map[string]interface{})
|
|
|
|
entryHeaders := entryDetails["_headers"].([]interface{})
|
|
for _, headerInterface := range entryHeaders {
|
|
header := headerInterface.(map[string]interface{})
|
|
if header["name"].(string) != ignoredUserAgentCustomHeader {
|
|
continue
|
|
}
|
|
|
|
return fmt.Errorf("unexpected result - user agent is not ignored")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, ignoredUserAgentsCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestTapDumpLogs(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgs()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapCmdArgs = append(tapCmdArgs, tapNamespace...)
|
|
|
|
tapCmdArgs = append(tapCmdArgs, "--set", "dump-logs=true")
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
|
|
if err := tapCmd.Start(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := cleanupCommand(tapCmd); err != nil {
|
|
t.Errorf("failed to cleanup tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
mizuFolderPath, mizuPathErr := getMizuFolderPath()
|
|
if mizuPathErr != nil {
|
|
t.Errorf("failed to get mizu folder path, err: %v", mizuPathErr)
|
|
return
|
|
}
|
|
|
|
files, readErr := ioutil.ReadDir(mizuFolderPath)
|
|
if readErr != nil {
|
|
t.Errorf("failed to read mizu folder files, err: %v", readErr)
|
|
return
|
|
}
|
|
|
|
var dumpsLogsPath string
|
|
for _, file := range files {
|
|
fileName := file.Name()
|
|
if strings.Contains(fileName, "mizu_logs") {
|
|
dumpsLogsPath = path.Join(mizuFolderPath, fileName)
|
|
break
|
|
}
|
|
}
|
|
|
|
if dumpsLogsPath == "" {
|
|
t.Errorf("dump logs file not found")
|
|
return
|
|
}
|
|
|
|
zipReader, zipError := zip.OpenReader(dumpsLogsPath)
|
|
if zipError != nil {
|
|
t.Errorf("failed to get zip reader, err: %v", zipError)
|
|
return
|
|
}
|
|
|
|
t.Cleanup(func() {
|
|
if err := zipReader.Close(); err != nil {
|
|
t.Logf("failed to close zip reader, err: %v", err)
|
|
}
|
|
})
|
|
|
|
var logsFileNames []string
|
|
for _, file := range zipReader.File {
|
|
logsFileNames = append(logsFileNames, file.Name)
|
|
}
|
|
|
|
if !Contains(logsFileNames, "mizu.mizu-api-server.log") {
|
|
t.Errorf("api server logs not found")
|
|
return
|
|
}
|
|
|
|
if !Contains(logsFileNames, "mizu_cli.log") {
|
|
t.Errorf("cli logs not found")
|
|
return
|
|
}
|
|
|
|
if !Contains(logsFileNames, "mizu_events.log") {
|
|
t.Errorf("events logs not found")
|
|
return
|
|
}
|
|
|
|
if !ContainsPartOfValue(logsFileNames, "mizu.mizu-tapper-daemon-set") {
|
|
t.Errorf("tapper logs not found")
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestDaemonSeeTraffic(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
tests := []int{50}
|
|
|
|
for _, entriesCount := range tests {
|
|
t.Run(fmt.Sprintf("%d", entriesCount), func(t *testing.T) {
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapDaemonCmdArgs := getDefaultTapCommandArgsWithDaemonMode()
|
|
|
|
tapNamespace := getDefaultTapNamespace()
|
|
tapDaemonCmdArgs = append(tapDaemonCmdArgs, tapNamespace...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapDaemonCmdArgs...)
|
|
|
|
viewCmd := exec.Command(cliPath, getDefaultViewCommandArgs()...)
|
|
|
|
t.Cleanup(func() {
|
|
daemonCleanup(t, viewCmd)
|
|
})
|
|
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
if err := tapCmd.Run(); err != nil {
|
|
t.Errorf("error occured while running the tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
t.Logf("running command: %v", viewCmd.String())
|
|
if err := viewCmd.Start(); err != nil {
|
|
t.Errorf("error occured while running the view command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
proxyUrl := getProxyUrl(defaultNamespaceName, defaultServiceName)
|
|
for i := 0; i < entriesCount; i++ {
|
|
if _, requestErr := executeHttpGetRequest(fmt.Sprintf("%v/get", proxyUrl)); requestErr != nil {
|
|
t.Errorf("failed to send proxy request, err: %v", requestErr)
|
|
return
|
|
}
|
|
}
|
|
|
|
entriesCheckFunc := func() error {
|
|
timestamp := time.Now().UnixNano() / int64(time.Millisecond)
|
|
|
|
entriesUrl := fmt.Sprintf("%v/entries?limit=%v&operator=lt×tamp=%v", apiServerUrl, entriesCount, timestamp)
|
|
requestResult, requestErr := executeHttpGetRequest(entriesUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entries, err: %v", requestErr)
|
|
}
|
|
|
|
entries := requestResult.([]interface{})
|
|
if len(entries) == 0 {
|
|
return fmt.Errorf("unexpected entries result - Expected more than 0 entries")
|
|
}
|
|
|
|
entry := entries[0].(map[string]interface{})
|
|
|
|
entryUrl := fmt.Sprintf("%v/entries/%v", apiServerUrl, entry["id"])
|
|
requestResult, requestErr = executeHttpGetRequest(entryUrl)
|
|
if requestErr != nil {
|
|
return fmt.Errorf("failed to get entry, err: %v", requestErr)
|
|
}
|
|
|
|
if requestResult == nil {
|
|
return fmt.Errorf("unexpected nil entry result")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
if err := retriesExecute(shortRetriesCount, entriesCheckFunc); err != nil {
|
|
t.Errorf("%v", err)
|
|
return
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDaemonMultipleNamespacesSeePods(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
expectedPods := []PodDescriptor{
|
|
{Name: "httpbin", Namespace: "mizu-tests"},
|
|
{Name: "httpbin2", Namespace: "mizu-tests"},
|
|
{Name: "httpbin", Namespace: "mizu-tests2"},
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgsWithDaemonMode()
|
|
var namespacesCmd []string
|
|
for _, expectedPod := range expectedPods {
|
|
namespacesCmd = append(namespacesCmd, "-n", expectedPod.Namespace)
|
|
}
|
|
tapCmdArgs = append(tapCmdArgs, namespacesCmd...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
|
|
viewCmd := exec.Command(cliPath, getDefaultViewCommandArgs()...)
|
|
|
|
t.Cleanup(func() {
|
|
daemonCleanup(t, viewCmd)
|
|
})
|
|
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
if err := tapCmd.Run(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
t.Logf("running command: %v", viewCmd.String())
|
|
if err := viewCmd.Start(); err != nil {
|
|
t.Errorf("error occured while running the view command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
podsUrl := fmt.Sprintf("%v/status/tap", apiServerUrl)
|
|
requestResult, requestErr := executeHttpGetRequest(podsUrl)
|
|
if requestErr != nil {
|
|
t.Errorf("failed to get tap status, err: %v", requestErr)
|
|
return
|
|
}
|
|
|
|
pods, err := getPods(requestResult)
|
|
if err != nil {
|
|
t.Errorf("failed to get pods, err: %v", err)
|
|
return
|
|
}
|
|
|
|
if len(expectedPods) != len(pods) {
|
|
t.Errorf("unexpected result - expected pods length: %v, actual pods length: %v", len(expectedPods), len(pods))
|
|
return
|
|
}
|
|
|
|
for _, expectedPod := range expectedPods {
|
|
if !isPodDescriptorInPodArray(pods, expectedPod) {
|
|
t.Errorf("unexpected result - expected pod not found, pod namespace: %v, pod name: %v", expectedPod.Namespace, expectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestDaemonSingleNamespaceSeePods(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("ignored acceptance test")
|
|
}
|
|
|
|
expectedPods := []PodDescriptor{
|
|
{Name: "httpbin", Namespace: "mizu-tests"},
|
|
{Name: "httpbin2", Namespace: "mizu-tests"},
|
|
}
|
|
unexpectedPods := []PodDescriptor{
|
|
{Name: "httpbin", Namespace: "mizu-tests2"},
|
|
}
|
|
|
|
cliPath, cliPathErr := getCliPath()
|
|
if cliPathErr != nil {
|
|
t.Errorf("failed to get cli path, err: %v", cliPathErr)
|
|
return
|
|
}
|
|
|
|
tapCmdArgs := getDefaultTapCommandArgsWithDaemonMode()
|
|
var namespacesCmd []string
|
|
for _, expectedPod := range expectedPods {
|
|
namespacesCmd = append(namespacesCmd, "-n", expectedPod.Namespace)
|
|
}
|
|
tapCmdArgs = append(tapCmdArgs, namespacesCmd...)
|
|
|
|
tapCmd := exec.Command(cliPath, tapCmdArgs...)
|
|
|
|
viewCmd := exec.Command(cliPath, getDefaultViewCommandArgs()...)
|
|
|
|
t.Cleanup(func() {
|
|
daemonCleanup(t, viewCmd)
|
|
})
|
|
|
|
t.Logf("running command: %v", tapCmd.String())
|
|
if err := tapCmd.Run(); err != nil {
|
|
t.Errorf("failed to start tap command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
t.Logf("running command: %v", viewCmd.String())
|
|
if err := viewCmd.Start(); err != nil {
|
|
t.Errorf("error occured while running the view command, err: %v", err)
|
|
return
|
|
}
|
|
|
|
apiServerUrl := getApiServerUrl(defaultApiServerPort)
|
|
if err := waitTapPodsReady(apiServerUrl); err != nil {
|
|
t.Errorf("failed to start tap pods on time, err: %v", err)
|
|
return
|
|
}
|
|
|
|
podsUrl := fmt.Sprintf("%v/status/tap", apiServerUrl)
|
|
requestResult, requestErr := executeHttpGetRequest(podsUrl)
|
|
if requestErr != nil {
|
|
t.Errorf("failed to get tap status, err: %v", requestErr)
|
|
return
|
|
}
|
|
|
|
pods, err := getPods(requestResult)
|
|
if err != nil {
|
|
t.Errorf("failed to get pods, err: %v", err)
|
|
return
|
|
}
|
|
|
|
for _, unexpectedPod := range unexpectedPods {
|
|
if isPodDescriptorInPodArray(pods, unexpectedPod) {
|
|
t.Errorf("unexpected result - unexpected pod found, pod namespace: %v, pod name: %v", unexpectedPod.Namespace, unexpectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
|
|
if len(expectedPods) != len(pods) {
|
|
t.Errorf("unexpected result - expected pods length: %v, actual pods length: %v", len(expectedPods), len(pods))
|
|
return
|
|
}
|
|
|
|
for _, expectedPod := range expectedPods {
|
|
if !isPodDescriptorInPodArray(pods, expectedPod) {
|
|
t.Errorf("unexpected result - expected pod not found, pod namespace: %v, pod name: %v", expectedPod.Namespace, expectedPod.Name)
|
|
return
|
|
}
|
|
}
|
|
}
|