mirror of
https://gitee.com/rainbond/Rainbond.git
synced 2024-11-30 10:48:15 +08:00
397 lines
9.9 KiB
Go
397 lines
9.9 KiB
Go
// RAINBOND, Application Management Platform
|
|
// Copyright (C) 2014-2017 Goodrain Co., Ltd.
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version. For any non-GPL usage of Rainbond,
|
|
// one or multiple Commercial Licenses authorized by Goodrain Co., Ltd.
|
|
// must be obtained first.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package db
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"github.com/testcontainers/testcontainers-go"
|
|
"testing"
|
|
"time"
|
|
|
|
dbconfig "github.com/goodrain/rainbond/db/config"
|
|
"github.com/goodrain/rainbond/db/model"
|
|
"github.com/goodrain/rainbond/util"
|
|
)
|
|
|
|
func TestIPPortImpl_UpdateModel(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPort{})
|
|
tx.Commit()
|
|
|
|
ipport := &model.IPPort{
|
|
UUID: util.NewUUID(),
|
|
IP: "127.0.0.1",
|
|
Port: 8888,
|
|
}
|
|
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
ipport.Port = 9999
|
|
err := GetManager().IPPortDao().UpdateModel(ipport)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestIPPortImpl_DeleteIPPortByIPAndPort(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPort{})
|
|
tx.Commit()
|
|
|
|
ipport := &model.IPPort{
|
|
UUID: util.NewUUID(),
|
|
IP: "127.0.0.1",
|
|
Port: 8888,
|
|
}
|
|
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if err := GetManager().IPPortDao().DeleteByIPAndPort(ipport.IP, ipport.Port); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ipPort, err := GetManager().IPPortDao().GetIPPortByIPAndPort(ipport.IP, ipport.Port)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if ipPort != nil {
|
|
t.Errorf("Expected nil for ipPort, but return %v", ipPort)
|
|
}
|
|
}
|
|
|
|
func TestIPPortImpl_GetIPByPort(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPort{})
|
|
tx.Commit()
|
|
|
|
ipport := &model.IPPort{
|
|
UUID: util.NewUUID(),
|
|
IP: "127.0.0.1",
|
|
Port: 8888,
|
|
}
|
|
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ports, err := GetManager().IPPortDao().GetIPByPort(8888)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(ports) != 1 {
|
|
t.Fatalf("Expected 1 for length of ports, but returned %d)", len(ports))
|
|
}
|
|
}
|
|
|
|
func TestIPPortImpl_GetIPPortByIPAndPort(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPort{})
|
|
tx.Commit()
|
|
|
|
ipport := &model.IPPort{
|
|
UUID: util.NewUUID(),
|
|
IP: "127.0.0.1",
|
|
Port: 8888,
|
|
}
|
|
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ipPort, err := GetManager().IPPortDao().GetIPPortByIPAndPort(ipport.IP, ipport.Port)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if ipPort.IP != ipport.IP {
|
|
t.Errorf("Expected %s for ip, but retruned %s", ipport.IP, ipPort.IP)
|
|
}
|
|
if ipPort.Port != ipport.Port {
|
|
t.Errorf("Expected %d for port, but retruned %d", ipport.Port, ipPort.Port)
|
|
}
|
|
}
|
|
|
|
func TestIPPoolImpl_AddModel(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPool{})
|
|
tx.Commit()
|
|
|
|
ippool := &model.IPPool{
|
|
EID: util.NewUUID(),
|
|
CIDR: "192.168.11.11/24",
|
|
}
|
|
|
|
if err := GetManager().IPPoolDao().AddModel(ippool); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
pool, err := GetManager().IPPoolDao().GetIPPoolByEID(ippool.EID)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if pool == nil {
|
|
t.Errorf("Expected %v for pool, but returned nil", pool)
|
|
}
|
|
if pool.CIDR != ippool.CIDR {
|
|
t.Errorf("Expected %v for CIDR, but returned %s", ippool.CIDR, pool.CIDR)
|
|
}
|
|
}
|
|
|
|
func TestIPPoolImpl_UpdateModel(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.IPPool{})
|
|
tx.Commit()
|
|
|
|
ippool := &model.IPPool{
|
|
EID: util.NewUUID(),
|
|
CIDR: "192.168.11.11/24",
|
|
}
|
|
|
|
if err := GetManager().IPPoolDao().AddModel(ippool); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
ippool.CIDR = "192.168.22.22/24"
|
|
if err := GetManager().IPPoolDao().UpdateModel(ippool); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if ippool.CIDR != "192.168.22.22/24" {
|
|
t.Errorf("Expected %s for CIDR, but returned %s", "192.168.22.22/24", ippool.CIDR)
|
|
}
|
|
}
|
|
|
|
func TestHTTPRuleImpl_ListByServiceID(t *testing.T) {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "sqlite3",
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
tx := GetManager().Begin()
|
|
tx.Delete(model.HTTPRule{})
|
|
tx.Commit()
|
|
|
|
rules, err := GetManager().HTTPRuleDao().ListByServiceID("")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(rules) != 0 {
|
|
t.Errorf("Expected 0 for len(rules), but returned %v", len(rules))
|
|
}
|
|
|
|
serviceID := util.NewUUID()
|
|
rules = []*model.HTTPRule{
|
|
{
|
|
UUID: util.NewUUID(),
|
|
ServiceID: serviceID,
|
|
},
|
|
{
|
|
UUID: util.NewUUID(),
|
|
ServiceID: serviceID,
|
|
},
|
|
{
|
|
UUID: util.NewUUID(),
|
|
ServiceID: serviceID,
|
|
},
|
|
}
|
|
for _, rule := range rules {
|
|
err := GetManager().HTTPRuleDao().AddModel(rule)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
rules, err = GetManager().HTTPRuleDao().ListByServiceID(serviceID)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(rules) != 3 {
|
|
t.Errorf("Expected 3 for len(rules), but returned %v", len(rules))
|
|
}
|
|
}
|
|
|
|
func TestGwRuleConfig(t *testing.T) {
|
|
dbm, err := CreateTestManager()
|
|
if err != nil {
|
|
t.Fatalf("error creating test db manager: %v", err)
|
|
}
|
|
rid := util.NewUUID()
|
|
cfg := &model.GwRuleConfig{
|
|
RuleID: rid,
|
|
Key: "set-header-Host",
|
|
Value: "$http_host",
|
|
}
|
|
if err := dbm.GwRuleConfigDao().AddModel(cfg); err != nil {
|
|
t.Fatalf("error create rule config: %v", err)
|
|
}
|
|
cfg2 := &model.GwRuleConfig{
|
|
RuleID: rid,
|
|
Key: "set-header-foo",
|
|
Value: "bar",
|
|
}
|
|
if err := dbm.GwRuleConfigDao().AddModel(cfg2); err != nil {
|
|
t.Fatalf("error create rule config: %v", err)
|
|
}
|
|
list, err := dbm.GwRuleConfigDao().ListByRuleID(rid)
|
|
if err != nil {
|
|
t.Fatalf("error listing configs: %v", err)
|
|
}
|
|
if list == nil && len(list) != 2 {
|
|
t.Errorf("Expected 2 for the length fo list, but returned %d", len(list))
|
|
}
|
|
|
|
if err := dbm.GwRuleConfigDao().DeleteByRuleID(rid); err != nil {
|
|
t.Fatalf("error deleting rule config: %v", err)
|
|
}
|
|
list, err = dbm.GwRuleConfigDao().ListByRuleID(rid)
|
|
if err != nil {
|
|
t.Fatalf("error listing configs: %v", err)
|
|
}
|
|
if list != nil && len(list) > 0 {
|
|
t.Errorf("Expected empty for list, but returned %+v", list)
|
|
}
|
|
}
|
|
|
|
func TestCertificateDaoImpl_AddOrUpdate(t *testing.T) {
|
|
dbname := "region"
|
|
rootpw := "rainbond"
|
|
|
|
ctx := context.Background()
|
|
req := testcontainers.ContainerRequest{
|
|
Image: "mariadb",
|
|
ExposedPorts: []string{"3306/tcp"},
|
|
Env: map[string]string{
|
|
"MYSQL_ROOT_PASSWORD": rootpw,
|
|
"MYSQL_DATABASE": dbname,
|
|
},
|
|
Cmd: "--character-set-server=utf8mb4 --collation-server=utf8mb4_unicode_ci",
|
|
}
|
|
mariadb, err := testcontainers.GenericContainer(ctx, testcontainers.GenericContainerRequest{
|
|
ContainerRequest: req,
|
|
Started: true,
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer mariadb.Terminate(ctx)
|
|
|
|
host, err := mariadb.Host(ctx)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
port, err := mariadb.MappedPort(ctx, "3306")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
connInfo := fmt.Sprintf("%s:%s@tcp(%s:%d)/%s", "root",
|
|
rootpw, host, port.Int(), dbname)
|
|
tryTimes := 3
|
|
for {
|
|
if err := CreateManager(dbconfig.Config{
|
|
DBType: "mysql",
|
|
MysqlConnectionInfo: connInfo,
|
|
}); err != nil {
|
|
if tryTimes == 0 {
|
|
t.Fatalf("Connect info: %s; error creating db manager: %v", connInfo, err)
|
|
} else {
|
|
tryTimes = tryTimes - 1
|
|
time.Sleep(10 * time.Second)
|
|
continue
|
|
}
|
|
}
|
|
break
|
|
}
|
|
|
|
cert := &model.Certificate{
|
|
UUID: util.NewUUID(),
|
|
CertificateName: "dummy-name",
|
|
Certificate: "dummy-certificate",
|
|
PrivateKey: "dummy-privateKey",
|
|
}
|
|
err = GetManager().CertificateDao().AddOrUpdate(cert)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
resp, err := GetManager().CertificateDao().GetCertificateByID(cert.UUID)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.UUID != cert.UUID {
|
|
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.UUID, resp.UUID)
|
|
}
|
|
if resp.CertificateName != cert.CertificateName {
|
|
t.Errorf("Expected %s for resp.CertificateName, but returned %s", cert.CertificateName, resp.CertificateName)
|
|
}
|
|
if resp.Certificate != cert.Certificate {
|
|
t.Errorf("Expected %s for resp.Certificate, but returned %s", cert.Certificate, resp.Certificate)
|
|
}
|
|
if resp.PrivateKey != cert.PrivateKey {
|
|
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.PrivateKey, resp.PrivateKey)
|
|
}
|
|
|
|
cert.Certificate = "update-certificate"
|
|
cert.PrivateKey = "update-privateKey"
|
|
err = GetManager().CertificateDao().AddOrUpdate(cert)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
resp, err = GetManager().CertificateDao().GetCertificateByID(cert.UUID)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if resp.UUID != cert.UUID {
|
|
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.UUID, resp.UUID)
|
|
}
|
|
if resp.CertificateName != cert.CertificateName {
|
|
t.Errorf("Expected %s for resp.CertificateName, but returned %s", cert.CertificateName, resp.CertificateName)
|
|
}
|
|
if resp.Certificate != cert.Certificate {
|
|
t.Errorf("Expected %s for resp.Certificate, but returned %s", cert.Certificate, resp.Certificate)
|
|
}
|
|
if resp.PrivateKey != cert.PrivateKey {
|
|
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.PrivateKey, resp.PrivateKey)
|
|
}
|
|
}
|