mirror of
https://github.com/grafana/grafana.git
synced 2025-01-09 23:53:25 -06:00
63383ef545
* Build out barebones Traces editor - Add Traces query type and operation ID prop to query type - Add necessary header types - Update resource picker to appropriately work with traces query type - Build out TracesQueryEditor component - Include logic to retrieve operationId's for AI Workspaces - Add backend route mapping - Update macro to use timestamp as default time field for traces * AzureMonitor: Traces - Response parsing (#65442) * Update FormatAsField component - Add trace ResultFormat type - Generalise FormatAsField component - Add component to TracesQueryEditor - Remove duplicate code in setQueryValue * Add custom filter function to improve performance * Add basic conversion for logs to trace - Add serviceTags converter - Pass through required parameters (queryType and resultFormat) - Appropriately set visualisation * Update parsing to also fill trace tags - Add constant values for each table schema (include legacy mapping for now if needed) - Add constant for list of table tags - Set the foundation for dynamic query building - Update query to build tags value - Appropriately set operationName - Update tagsConverter to filter empty values * Fix lint and test issues * AzureMonitor: Traces - Data links (#65566) * Add portal link for traces - Pull out necessary values (itemId and itemType) - Appropriately construct - Fix ordering * Set default format as value - Also set default visualisation * Fix event schema * Set default formatAsField value * Include logs link on traces results - Adapt config links to allow custom title to be set * Correctly set operationId for query * Update backend types - Include OperationID in query - Pass forward datasource name and UID * Ensure setTime doesn't consistently get called if operationID is defined * Add explore link - Update util functions to allow setting custom datalinks * Fix tests * AzureMonitor: Traces - Query and Editor updates (#66076) * Add initial query - Will query the resource as soon as a resource has been selected - Updates the data links for the query without operationId - Remove initial operationId query and timeRange dependency - Update query building * Add entirely separate traces query property - Update shared types (also including future types for Azure traces) - Update backend log analytics datasource to accept both azureLogAnalytics and azureTraces queries - Update backend specific types - Update frontend datasource for new properties - Update mock query * Update FormatAsField to be entirely generic * Update query building to be done in backend - Add required mappings in backend - Update frontend querying * Fix query and explore data link * Add trace type selection * Better method for setting explore link * Fix operationId updating * Run go mod tidy * Unnecessary changes * Fix tests * AzureMonitor: Traces - Add correlation API support (#65855) Add correlation API support - Add necessary types - Add correlation API request when conditions are met - Update query * Fix property from merge * AzureMonitor: Traces - Filtering (#66303) * Add initial query - Will query the resource as soon as a resource has been selected - Updates the data links for the query without operationId - Remove initial operationId query and timeRange dependency - Update query building * Add entirely separate traces query property - Update shared types (also including future types for Azure traces) - Update backend log analytics datasource to accept both azureLogAnalytics and azureTraces queries - Update backend specific types - Update frontend datasource for new properties - Update mock query * Update FormatAsField to be entirely generic * Update query building to be done in backend - Add required mappings in backend - Update frontend querying * Fix query and explore data link * Add trace type selection * Better method for setting explore link * Fix operationId updating * Run go mod tidy * Unnecessary changes * Fix tests * Start building out Filters component - Configure component to query for Filter property values when a filter property is set - Add setFilters function - Add typing to tablesSchema - Use component in TracesQueryEditor * Update Filters - Asynchronously pull property options - Setup list of Filter components * Update filters component - Remove unused imports - Have local filters state and query filters - Correctly set filters values - Don't update query every time a filter property changes (not performant) * Update properties query - Use current timeRange - Get count to provide informative labels * Reset map when time changes * Add operation selection * Reset filters when property changes * Appropriate label name for empty values * Add filtering to query * Update filter components - Fix rendering issue - Correctly compare and update timeRange - Split out files for simplicity * Add checkbox option to multiselect - Add custom option component - Correctly call onChange - Add variableOptionGroup for template variable selection * Fix adding template vars * Improve labels and refresh labels on query prop changes * AzureMonitor: Traces - Testing (#66474) * Select ds for template variable interpolation * Update az logs ds tests - Add templateVariables test - Add filter test - Update mock - Remove anys * Update QueryEditor test - Update mocks with timeSrv for log analytics datasource - Fix query mock - Use appropriate and consistent selectors * Add TracesQueryEditor test - Update resourcePickerRows mock to include app insights resources - Remove comments and extra new line * Add FormatAsField test - Remove unneeded condition * Update resourcePicker utils test * Don't hide selected options in filters * Fix multi-selection on filters * Add TraceTypeField test - Add test file - Update selectors (remove copy/paste mistake) - Update placeholder text for select and add label * Add basic filters test * Begin filters test * Update filters test * Add final tests and simplify/generalise addFilter helper * Minor update to datasource test * Update macros test * Update selectors in tests * Add response-table-frame tests * Add datasource tests - Use sorting where JSON models are inconsistent - Update filters clause - Dedupe tags - Correct operationId conditions * Don't set a default value for blurInputOnSelect * Simplify datasource test * Update to use CheckGoldenJSON utils - Update with generated frame files - Remove redundant expected frame code - Update all usages * Fix lint * AzureMonitor: Traces feedback (#67292) * Filter traces if the visualisation is set to trace - Update build query logic - Added additional test cases - Return an error if the traces type is set by itself with the trace visualisation - Add descriptions to event types - Update tests * Fix bug for error displaying traces * Update mappings and add error field - Update tests - Remove unnecessary comments * Switch location of Operation ID field * Re-order fields * Update link title * Update label for event type selection * Update correct link title * Update logs datalink to link to Azure Logs in explore * Fix lint
485 lines
16 KiB
Go
485 lines
16 KiB
Go
package azuremonitor
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
"github.com/grafana/grafana-azure-sdk-go/azcredentials"
|
|
"github.com/grafana/grafana-azure-sdk-go/azsettings"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend/httpclient"
|
|
"github.com/grafana/grafana-plugin-sdk-go/backend/instancemgmt"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
"github.com/grafana/grafana/pkg/infra/tracing"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/tsdb/azuremonitor/types"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestNewInstanceSettings(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
settings backend.DataSourceInstanceSettings
|
|
expectedModel types.DatasourceInfo
|
|
Err require.ErrorAssertionFunc
|
|
}{
|
|
{
|
|
name: "creates an instance",
|
|
settings: backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{"azureAuthType":"msi"}`),
|
|
DecryptedSecureJSONData: map[string]string{"key": "value"},
|
|
ID: 40,
|
|
},
|
|
expectedModel: types.DatasourceInfo{
|
|
Cloud: azsettings.AzurePublic,
|
|
Credentials: &azcredentials.AzureManagedIdentityCredentials{},
|
|
Settings: types.AzureMonitorSettings{},
|
|
Routes: routes[azsettings.AzurePublic],
|
|
JSONData: map[string]interface{}{"azureAuthType": "msi"},
|
|
DatasourceID: 40,
|
|
DecryptedSecureJSONData: map[string]string{"key": "value"},
|
|
Services: map[string]types.DatasourceService{},
|
|
},
|
|
Err: require.NoError,
|
|
},
|
|
{
|
|
name: "creates an instance for customized cloud",
|
|
settings: backend.DataSourceInstanceSettings{
|
|
JSONData: []byte(`{"cloudName":"customizedazuremonitor","customizedRoutes":{"Route":{"URL":"url"}},"azureAuthType":"clientsecret"}`),
|
|
DecryptedSecureJSONData: map[string]string{"clientSecret": "secret"},
|
|
ID: 50,
|
|
},
|
|
expectedModel: types.DatasourceInfo{
|
|
Cloud: "AzureCustomizedCloud",
|
|
Credentials: &azcredentials.AzureClientSecretCredentials{
|
|
AzureCloud: "AzureCustomizedCloud",
|
|
ClientSecret: "secret",
|
|
},
|
|
Settings: types.AzureMonitorSettings{},
|
|
Routes: map[string]types.AzRoute{
|
|
"Route": {
|
|
URL: "url",
|
|
},
|
|
},
|
|
JSONData: map[string]interface{}{
|
|
"azureAuthType": "clientsecret",
|
|
"cloudName": "customizedazuremonitor",
|
|
"customizedRoutes": map[string]interface{}{
|
|
"Route": map[string]interface{}{
|
|
"URL": "url",
|
|
},
|
|
},
|
|
},
|
|
DatasourceID: 50,
|
|
DecryptedSecureJSONData: map[string]string{"clientSecret": "secret"},
|
|
Services: map[string]types.DatasourceService{},
|
|
},
|
|
Err: require.NoError,
|
|
},
|
|
}
|
|
|
|
cfg := &setting.Cfg{
|
|
Azure: &azsettings.AzureSettings{
|
|
Cloud: azsettings.AzurePublic,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
factory := NewInstanceSettings(cfg, &httpclient.Provider{}, map[string]azDatasourceExecutor{})
|
|
instance, err := factory(tt.settings)
|
|
tt.Err(t, err)
|
|
if !cmp.Equal(instance, tt.expectedModel) {
|
|
t.Errorf("Unexpected instance: %v", cmp.Diff(instance, tt.expectedModel))
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type fakeInstance struct {
|
|
cloud string
|
|
routes map[string]types.AzRoute
|
|
services map[string]types.DatasourceService
|
|
settings types.AzureMonitorSettings
|
|
}
|
|
|
|
func (f *fakeInstance) Get(pluginContext backend.PluginContext) (instancemgmt.Instance, error) {
|
|
return types.DatasourceInfo{
|
|
Cloud: f.cloud,
|
|
Routes: f.routes,
|
|
Services: f.services,
|
|
Settings: f.settings,
|
|
}, nil
|
|
}
|
|
|
|
func (f *fakeInstance) Do(pluginContext backend.PluginContext, fn instancemgmt.InstanceCallbackFunc) error {
|
|
return nil
|
|
}
|
|
|
|
type fakeExecutor struct {
|
|
t *testing.T
|
|
queryType string
|
|
expectedURL string
|
|
}
|
|
|
|
func (f *fakeExecutor) ResourceRequest(rw http.ResponseWriter, req *http.Request, cli *http.Client) {
|
|
}
|
|
|
|
func (f *fakeExecutor) ExecuteTimeSeriesQuery(ctx context.Context, logger log.Logger, originalQueries []backend.DataQuery, dsInfo types.DatasourceInfo, client *http.Client, url string, tracer tracing.Tracer) (*backend.QueryDataResponse, error) {
|
|
if client == nil {
|
|
f.t.Errorf("The HTTP client for %s is missing", f.queryType)
|
|
} else {
|
|
if url != f.expectedURL {
|
|
f.t.Errorf("Unexpected URL %s wanted %s", url, f.expectedURL)
|
|
}
|
|
}
|
|
return &backend.QueryDataResponse{}, nil
|
|
}
|
|
|
|
func Test_newMux(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
queryType string
|
|
expectedURL string
|
|
Err require.ErrorAssertionFunc
|
|
}{
|
|
{
|
|
name: "creates an Azure Monitor executor",
|
|
queryType: azureMonitor,
|
|
expectedURL: routes[azureMonitorPublic][azureMonitor].URL,
|
|
Err: require.NoError,
|
|
},
|
|
{
|
|
name: "creates an Azure Log Analytics executor",
|
|
queryType: azureLogAnalytics,
|
|
expectedURL: routes[azureMonitorPublic][azureLogAnalytics].URL,
|
|
Err: require.NoError,
|
|
},
|
|
{
|
|
name: "creates an Azure Traces executor",
|
|
queryType: azureTraces,
|
|
expectedURL: routes[azureMonitorPublic][azureLogAnalytics].URL,
|
|
Err: require.NoError,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
s := &Service{
|
|
im: &fakeInstance{
|
|
routes: routes[azureMonitorPublic],
|
|
services: map[string]types.DatasourceService{
|
|
tt.queryType: {
|
|
URL: routes[azureMonitorPublic][tt.queryType].URL,
|
|
HTTPClient: &http.Client{},
|
|
},
|
|
},
|
|
},
|
|
executors: map[string]azDatasourceExecutor{
|
|
tt.queryType: &fakeExecutor{
|
|
t: t,
|
|
queryType: tt.queryType,
|
|
expectedURL: tt.expectedURL,
|
|
},
|
|
},
|
|
}
|
|
mux := s.newQueryMux()
|
|
res, err := mux.QueryData(context.Background(), &backend.QueryDataRequest{
|
|
PluginContext: backend.PluginContext{
|
|
DataSourceInstanceSettings: &backend.DataSourceInstanceSettings{
|
|
Name: "datasource_name",
|
|
UID: "datasource_UID",
|
|
},
|
|
},
|
|
Queries: []backend.DataQuery{
|
|
{QueryType: tt.queryType},
|
|
},
|
|
})
|
|
tt.Err(t, err)
|
|
// Dummy response from the fake implementation
|
|
if res == nil {
|
|
t.Errorf("Expecting a response")
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type RoundTripFunc func(req *http.Request) (*http.Response, error)
|
|
|
|
func (f RoundTripFunc) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
return f(req)
|
|
}
|
|
func NewTestClient(fn RoundTripFunc) *http.Client {
|
|
return &http.Client{
|
|
Transport: fn,
|
|
}
|
|
}
|
|
|
|
func TestCheckHealth(t *testing.T) {
|
|
logAnalyticsResponse := func(empty bool) (*http.Response, error) {
|
|
if !empty {
|
|
body := struct {
|
|
Value []types.LogAnalyticsWorkspaceResponse
|
|
}{Value: []types.LogAnalyticsWorkspaceResponse{{
|
|
Id: "abcd-1234",
|
|
Location: "location",
|
|
Name: "test-workspace",
|
|
Properties: types.LogAnalyticsWorkspaceProperties{
|
|
CreatedDate: "",
|
|
CustomerId: "abcd-1234",
|
|
Features: types.LogAnalyticsWorkspaceFeatures{},
|
|
},
|
|
ProvisioningState: "provisioned",
|
|
PublicNetworkAccessForIngestion: "enabled",
|
|
PublicNetworkAccessForQuery: "disabled",
|
|
RetentionInDays: 0},
|
|
}}
|
|
bodyMarshal, err := json.Marshal(body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &http.Response{
|
|
StatusCode: 200,
|
|
Body: io.NopCloser(bytes.NewBuffer(bodyMarshal)),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
} else {
|
|
body := struct {
|
|
Value []types.LogAnalyticsWorkspaceResponse
|
|
}{Value: []types.LogAnalyticsWorkspaceResponse{}}
|
|
bodyMarshal, err := json.Marshal(body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &http.Response{
|
|
StatusCode: 200,
|
|
Body: io.NopCloser(bytes.NewBuffer(bodyMarshal)),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
}
|
|
}
|
|
azureMonitorClient := func(logAnalyticsEmpty bool, fail bool) *http.Client {
|
|
return NewTestClient(func(req *http.Request) (*http.Response, error) {
|
|
if strings.Contains(req.URL.String(), "workspaces") {
|
|
return logAnalyticsResponse(logAnalyticsEmpty)
|
|
} else {
|
|
if !fail {
|
|
return &http.Response{
|
|
StatusCode: 200,
|
|
Body: io.NopCloser(bytes.NewBufferString("{\"value\": [{\"subscriptionId\": \"abcd-1234\"}]}")),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
} else {
|
|
return &http.Response{
|
|
StatusCode: 404,
|
|
Body: io.NopCloser(bytes.NewBufferString("not found")),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
}
|
|
}
|
|
})
|
|
}
|
|
okClient := NewTestClient(func(req *http.Request) (*http.Response, error) {
|
|
return &http.Response{
|
|
StatusCode: 200,
|
|
Body: io.NopCloser(bytes.NewBufferString("OK")),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
})
|
|
failClient := func(azureHealthCheckError bool) *http.Client {
|
|
return NewTestClient(func(req *http.Request) (*http.Response, error) {
|
|
if azureHealthCheckError {
|
|
return nil, errors.New("not found")
|
|
}
|
|
return &http.Response{
|
|
StatusCode: 404,
|
|
Body: io.NopCloser(bytes.NewBufferString("not found")),
|
|
Header: make(http.Header),
|
|
}, nil
|
|
})
|
|
}
|
|
|
|
cloud := "AzureCloud"
|
|
tests := []struct {
|
|
name string
|
|
errorExpected bool
|
|
expectedResult *backend.CheckHealthResult
|
|
customServices map[string]types.DatasourceService
|
|
}{
|
|
{
|
|
name: "Successfully queries all endpoints",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusOk,
|
|
Message: "Successfully connected to all Azure Monitor endpoints.",
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: azureMonitorClient(false, false),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: okClient,
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: okClient,
|
|
}},
|
|
},
|
|
{
|
|
name: "Successfully queries all endpoints except metrics",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusError,
|
|
Message: "One or more health checks failed. See details below.",
|
|
JSONDetails: []byte(
|
|
`{"verboseMessage": "1. Error connecting to Azure Monitor endpoint: not found\n2. Successfully connected to Azure Log Analytics endpoint.\n3. Successfully connected to Azure Resource Graph endpoint." }`),
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: azureMonitorClient(false, true),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: okClient,
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: okClient,
|
|
}},
|
|
},
|
|
{
|
|
name: "Successfully queries all endpoints except log analytics",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusError,
|
|
Message: "One or more health checks failed. See details below.",
|
|
JSONDetails: []byte(
|
|
`{"verboseMessage": "1. Successfully connected to Azure Monitor endpoint.\n2. Error connecting to Azure Log Analytics endpoint: not found\n3. Successfully connected to Azure Resource Graph endpoint." }`),
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: azureMonitorClient(false, false),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: failClient(false),
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: okClient,
|
|
}},
|
|
},
|
|
{
|
|
name: "Successfully queries all endpoints except resource graph",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusError,
|
|
Message: "One or more health checks failed. See details below.",
|
|
JSONDetails: []byte(
|
|
`{"verboseMessage": "1. Successfully connected to Azure Monitor endpoint.\n2. Successfully connected to Azure Log Analytics endpoint.\n3. Error connecting to Azure Resource Graph endpoint: not found" }`),
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: azureMonitorClient(false, false),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: okClient,
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: failClient(false),
|
|
}},
|
|
},
|
|
{
|
|
name: "Successfully returns UNKNOWN status if no log analytics workspace is found",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusUnknown,
|
|
Message: "One or more health checks failed. See details below.",
|
|
JSONDetails: []byte(
|
|
`{"verboseMessage": "1. Successfully connected to Azure Monitor endpoint.\n2. No Log Analytics workspaces found.\n3. Successfully connected to Azure Resource Graph endpoint." }`),
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: azureMonitorClient(true, false),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: okClient,
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: okClient,
|
|
}},
|
|
},
|
|
{
|
|
name: "Successfully returns Azure health check errors",
|
|
errorExpected: false,
|
|
expectedResult: &backend.CheckHealthResult{
|
|
Status: backend.HealthStatusError,
|
|
Message: "One or more health checks failed. See details below.",
|
|
JSONDetails: []byte(
|
|
`{"verboseMessage": "1. Error connecting to Azure Monitor endpoint: health check failed: Get \"https://management.azure.com/subscriptions?api-version=2020-01-01\": not found\n2. Error connecting to Azure Log Analytics endpoint: health check failed: Get \"https://management.azure.com/subscriptions//providers/Microsoft.OperationalInsights/workspaces?api-version=2017-04-26-preview\": not found\n3. Error connecting to Azure Resource Graph endpoint: health check failed: Post \"https://management.azure.com/providers/Microsoft.ResourceGraph/resources?api-version=2021-06-01-preview\": not found" }`),
|
|
},
|
|
customServices: map[string]types.DatasourceService{
|
|
azureMonitor: {
|
|
URL: routes[cloud]["Azure Monitor"].URL,
|
|
HTTPClient: failClient(true),
|
|
},
|
|
azureLogAnalytics: {
|
|
URL: routes[cloud]["Azure Log Analytics"].URL,
|
|
HTTPClient: failClient(true),
|
|
},
|
|
azureResourceGraph: {
|
|
URL: routes[cloud]["Azure Resource Graph"].URL,
|
|
HTTPClient: failClient(true),
|
|
}},
|
|
},
|
|
}
|
|
|
|
instance := &fakeInstance{
|
|
cloud: cloud,
|
|
routes: routes[cloud],
|
|
services: map[string]types.DatasourceService{},
|
|
settings: types.AzureMonitorSettings{
|
|
LogAnalyticsDefaultWorkspace: "workspace-id",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
instance.services = tt.customServices
|
|
s := &Service{
|
|
im: instance,
|
|
}
|
|
res, err := s.CheckHealth(context.Background(), &backend.CheckHealthRequest{
|
|
PluginContext: backend.PluginContext{
|
|
DataSourceInstanceSettings: &backend.DataSourceInstanceSettings{},
|
|
}})
|
|
if tt.errorExpected {
|
|
assert.Error(t, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
assert.Equal(t, tt.expectedResult, res)
|
|
})
|
|
}
|
|
}
|