mirror of
https://github.com/grafana/grafana.git
synced 2024-12-01 13:09:22 -06:00
128 lines
3.3 KiB
Go
128 lines
3.3 KiB
Go
package azuremonitor
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"net/http"
|
|
"testing"
|
|
|
|
"github.com/grafana/grafana-azure-sdk-go/azcredentials"
|
|
sdkhttpclient "github.com/grafana/grafana-plugin-sdk-go/backend/httpclient"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/httpclient"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/tsdb/azuremonitor/deprecated"
|
|
"github.com/grafana/grafana/pkg/tsdb/azuremonitor/types"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestHttpClient_Middlewares(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
route types.AzRoute
|
|
model types.DatasourceInfo
|
|
expectedMiddlewares int
|
|
Err require.ErrorAssertionFunc
|
|
}{
|
|
{
|
|
name: "creates an HTTP client with a middleware due to an app key",
|
|
route: types.AzRoute{
|
|
URL: deprecated.AzAppInsights.URL,
|
|
Scopes: []string{},
|
|
},
|
|
model: types.DatasourceInfo{
|
|
Credentials: &azcredentials.AzureClientSecretCredentials{},
|
|
DecryptedSecureJSONData: map[string]string{
|
|
"appInsightsApiKey": "foo",
|
|
},
|
|
},
|
|
expectedMiddlewares: 1,
|
|
Err: require.NoError,
|
|
},
|
|
{
|
|
name: "creates an HTTP client without a middleware",
|
|
route: types.AzRoute{
|
|
URL: "http://route",
|
|
Scopes: []string{},
|
|
},
|
|
model: types.DatasourceInfo{
|
|
Credentials: &azcredentials.AzureClientSecretCredentials{},
|
|
},
|
|
expectedMiddlewares: 0,
|
|
Err: require.NoError,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
m, err := getMiddlewares(tt.route, tt.model)
|
|
require.NoError(t, err)
|
|
|
|
// Cannot test that the cli middleware works properly since the azcore sdk
|
|
// rejects the TLS certs (if provided)
|
|
if len(m) != tt.expectedMiddlewares {
|
|
t.Errorf("Unexpected middlewares: %v", m)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestHttpClient_AzureCredentials(t *testing.T) {
|
|
model := types.DatasourceInfo{
|
|
Credentials: &azcredentials.AzureManagedIdentityCredentials{},
|
|
}
|
|
|
|
cfg := &setting.Cfg{}
|
|
provider := &fakeHttpClientProvider{}
|
|
|
|
t.Run("should have Azure middleware when scopes provided", func(t *testing.T) {
|
|
route := types.AzRoute{
|
|
URL: deprecated.AzAppInsights.URL,
|
|
Scopes: []string{"https://management.azure.com/.default"},
|
|
}
|
|
|
|
_, err := newHTTPClient(route, model, cfg, provider)
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, provider.opts)
|
|
require.NotNil(t, provider.opts.Middlewares)
|
|
assert.Len(t, provider.opts.Middlewares, 1)
|
|
})
|
|
|
|
t.Run("should not have Azure middleware when scopes are not provided", func(t *testing.T) {
|
|
route := types.AzRoute{
|
|
URL: deprecated.AzAppInsights.URL,
|
|
Scopes: []string{},
|
|
}
|
|
|
|
_, err := newHTTPClient(route, model, cfg, provider)
|
|
require.NoError(t, err)
|
|
|
|
assert.NotNil(t, provider.opts)
|
|
|
|
if provider.opts.Middlewares != nil {
|
|
assert.Len(t, provider.opts.Middlewares, 0)
|
|
}
|
|
})
|
|
}
|
|
|
|
type fakeHttpClientProvider struct {
|
|
httpclient.Provider
|
|
|
|
opts sdkhttpclient.Options
|
|
}
|
|
|
|
func (p *fakeHttpClientProvider) New(opts ...sdkhttpclient.Options) (*http.Client, error) {
|
|
p.opts = opts[0]
|
|
return nil, nil
|
|
}
|
|
|
|
func (p *fakeHttpClientProvider) GetTransport(opts ...sdkhttpclient.Options) (http.RoundTripper, error) {
|
|
p.opts = opts[0]
|
|
return nil, nil
|
|
}
|
|
|
|
func (p *fakeHttpClientProvider) GetTLSConfig(opts ...sdkhttpclient.Options) (*tls.Config, error) {
|
|
p.opts = opts[0]
|
|
return nil, nil
|
|
}
|