Rainbond/db/gateway_db_test.go
2019-03-20 15:51:55 +08:00

397 lines
9.9 KiB
Go

// RAINBOND, Application Management Platform
// Copyright (C) 2014-2017 Goodrain Co., Ltd.
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version. For any non-GPL usage of Rainbond,
// one or multiple Commercial Licenses authorized by Goodrain Co., Ltd.
// must be obtained first.
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package db
import (
"context"
"fmt"
"github.com/testcontainers/testcontainers-go"
"testing"
"time"
dbconfig "github.com/goodrain/rainbond/db/config"
"github.com/goodrain/rainbond/db/model"
"github.com/goodrain/rainbond/util"
)
func TestIPPortImpl_UpdateModel(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPort{})
tx.Commit()
ipport := &model.IPPort{
UUID: util.NewUUID(),
IP: "127.0.0.1",
Port: 8888,
}
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
t.Fatal(err)
}
ipport.Port = 9999
err := GetManager().IPPortDao().UpdateModel(ipport)
if err != nil {
t.Fatal(err)
}
}
func TestIPPortImpl_DeleteIPPortByIPAndPort(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPort{})
tx.Commit()
ipport := &model.IPPort{
UUID: util.NewUUID(),
IP: "127.0.0.1",
Port: 8888,
}
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
t.Fatal(err)
}
if err := GetManager().IPPortDao().DeleteByIPAndPort(ipport.IP, ipport.Port); err != nil {
t.Fatal(err)
}
ipPort, err := GetManager().IPPortDao().GetIPPortByIPAndPort(ipport.IP, ipport.Port)
if err != nil {
t.Fatal(err)
}
if ipPort != nil {
t.Errorf("Expected nil for ipPort, but return %v", ipPort)
}
}
func TestIPPortImpl_GetIPByPort(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPort{})
tx.Commit()
ipport := &model.IPPort{
UUID: util.NewUUID(),
IP: "127.0.0.1",
Port: 8888,
}
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
t.Fatal(err)
}
ports, err := GetManager().IPPortDao().GetIPByPort(8888)
if err != nil {
t.Fatal(err)
}
if len(ports) != 1 {
t.Fatalf("Expected 1 for length of ports, but returned %d)", len(ports))
}
}
func TestIPPortImpl_GetIPPortByIPAndPort(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPort{})
tx.Commit()
ipport := &model.IPPort{
UUID: util.NewUUID(),
IP: "127.0.0.1",
Port: 8888,
}
if err := GetManager().IPPortDao().AddModel(ipport); err != nil {
t.Fatal(err)
}
ipPort, err := GetManager().IPPortDao().GetIPPortByIPAndPort(ipport.IP, ipport.Port)
if err != nil {
t.Fatal(err)
}
if ipPort.IP != ipport.IP {
t.Errorf("Expected %s for ip, but retruned %s", ipport.IP, ipPort.IP)
}
if ipPort.Port != ipport.Port {
t.Errorf("Expected %d for port, but retruned %d", ipport.Port, ipPort.Port)
}
}
func TestIPPoolImpl_AddModel(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPool{})
tx.Commit()
ippool := &model.IPPool{
EID: util.NewUUID(),
CIDR: "192.168.11.11/24",
}
if err := GetManager().IPPoolDao().AddModel(ippool); err != nil {
t.Fatal(err)
}
pool, err := GetManager().IPPoolDao().GetIPPoolByEID(ippool.EID)
if err != nil {
t.Fatal(err)
}
if pool == nil {
t.Errorf("Expected %v for pool, but returned nil", pool)
}
if pool.CIDR != ippool.CIDR {
t.Errorf("Expected %v for CIDR, but returned %s", ippool.CIDR, pool.CIDR)
}
}
func TestIPPoolImpl_UpdateModel(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.IPPool{})
tx.Commit()
ippool := &model.IPPool{
EID: util.NewUUID(),
CIDR: "192.168.11.11/24",
}
if err := GetManager().IPPoolDao().AddModel(ippool); err != nil {
t.Fatal(err)
}
ippool.CIDR = "192.168.22.22/24"
if err := GetManager().IPPoolDao().UpdateModel(ippool); err != nil {
t.Fatal(err)
}
if ippool.CIDR != "192.168.22.22/24" {
t.Errorf("Expected %s for CIDR, but returned %s", "192.168.22.22/24", ippool.CIDR)
}
}
func TestHTTPRuleImpl_ListByServiceID(t *testing.T) {
if err := CreateManager(dbconfig.Config{
DBType: "sqlite3",
}); err != nil {
t.Fatal(err)
}
tx := GetManager().Begin()
tx.Delete(model.HTTPRule{})
tx.Commit()
rules, err := GetManager().HTTPRuleDao().ListByServiceID("")
if err != nil {
t.Fatal(err)
}
if len(rules) != 0 {
t.Errorf("Expected 0 for len(rules), but returned %v", len(rules))
}
serviceID := util.NewUUID()
rules = []*model.HTTPRule{
{
UUID: util.NewUUID(),
ServiceID: serviceID,
},
{
UUID: util.NewUUID(),
ServiceID: serviceID,
},
{
UUID: util.NewUUID(),
ServiceID: serviceID,
},
}
for _, rule := range rules {
err := GetManager().HTTPRuleDao().AddModel(rule)
if err != nil {
t.Fatal(err)
}
}
rules, err = GetManager().HTTPRuleDao().ListByServiceID(serviceID)
if err != nil {
t.Fatal(err)
}
if len(rules) != 3 {
t.Errorf("Expected 3 for len(rules), but returned %v", len(rules))
}
}
func TestGwRuleConfig(t *testing.T) {
dbm, err := CreateTestManager()
if err != nil {
t.Fatalf("error creating test db manager: %v", err)
}
rid := util.NewUUID()
cfg := &model.GwRuleConfig{
RuleID: rid,
Key: "set-header-Host",
Value: "$http_host",
}
if err := dbm.GwRuleConfigDao().AddModel(cfg); err != nil {
t.Fatalf("error create rule config: %v", err)
}
cfg2 := &model.GwRuleConfig{
RuleID: rid,
Key: "set-header-foo",
Value: "bar",
}
if err := dbm.GwRuleConfigDao().AddModel(cfg2); err != nil {
t.Fatalf("error create rule config: %v", err)
}
list, err := dbm.GwRuleConfigDao().ListByRuleID(rid)
if err != nil {
t.Fatalf("error listing configs: %v", err)
}
if list == nil && len(list) != 2 {
t.Errorf("Expected 2 for the length fo list, but returned %d", len(list))
}
if err := dbm.GwRuleConfigDao().DeleteByRuleID(rid); err != nil {
t.Fatalf("error deleting rule config: %v", err)
}
list, err = dbm.GwRuleConfigDao().ListByRuleID(rid)
if err != nil {
t.Fatalf("error listing configs: %v", err)
}
if list != nil && len(list) > 0 {
t.Errorf("Expected empty for list, but returned %+v", list)
}
}
func TestCertificateDaoImpl_AddOrUpdate(t *testing.T) {
dbname := "region"
rootpw := "rainbond"
ctx := context.Background()
req := testcontainers.ContainerRequest{
Image: "mariadb",
ExposedPorts: []string{"3306/tcp"},
Env: map[string]string{
"MYSQL_ROOT_PASSWORD": rootpw,
"MYSQL_DATABASE": dbname,
},
Cmd: "--character-set-server=utf8mb4 --collation-server=utf8mb4_unicode_ci",
}
mariadb, err := testcontainers.GenericContainer(ctx, testcontainers.GenericContainerRequest{
ContainerRequest: req,
Started: true,
})
if err != nil {
t.Fatal(err)
}
defer mariadb.Terminate(ctx)
host, err := mariadb.Host(ctx)
if err != nil {
t.Error(err)
}
port, err := mariadb.MappedPort(ctx, "3306")
if err != nil {
t.Error(err)
}
connInfo := fmt.Sprintf("%s:%s@tcp(%s:%d)/%s", "root",
rootpw, host, port.Int(), dbname)
tryTimes := 3
for {
if err := CreateManager(dbconfig.Config{
DBType: "mysql",
MysqlConnectionInfo: connInfo,
}); err != nil {
if tryTimes == 0 {
t.Fatalf("Connect info: %s; error creating db manager: %v", connInfo, err)
} else {
tryTimes = tryTimes - 1
time.Sleep(10 * time.Second)
continue
}
}
break
}
cert := &model.Certificate{
UUID: util.NewUUID(),
CertificateName: "dummy-name",
Certificate: "dummy-certificate",
PrivateKey: "dummy-privateKey",
}
err = GetManager().CertificateDao().AddOrUpdate(cert)
if err != nil {
t.Fatal(err)
}
resp, err := GetManager().CertificateDao().GetCertificateByID(cert.UUID)
if err != nil {
t.Fatal(err)
}
if resp.UUID != cert.UUID {
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.UUID, resp.UUID)
}
if resp.CertificateName != cert.CertificateName {
t.Errorf("Expected %s for resp.CertificateName, but returned %s", cert.CertificateName, resp.CertificateName)
}
if resp.Certificate != cert.Certificate {
t.Errorf("Expected %s for resp.Certificate, but returned %s", cert.Certificate, resp.Certificate)
}
if resp.PrivateKey != cert.PrivateKey {
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.PrivateKey, resp.PrivateKey)
}
cert.Certificate = "update-certificate"
cert.PrivateKey = "update-privateKey"
err = GetManager().CertificateDao().AddOrUpdate(cert)
if err != nil {
t.Fatal(err)
}
resp, err = GetManager().CertificateDao().GetCertificateByID(cert.UUID)
if err != nil {
t.Fatal(err)
}
if resp.UUID != cert.UUID {
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.UUID, resp.UUID)
}
if resp.CertificateName != cert.CertificateName {
t.Errorf("Expected %s for resp.CertificateName, but returned %s", cert.CertificateName, resp.CertificateName)
}
if resp.Certificate != cert.Certificate {
t.Errorf("Expected %s for resp.Certificate, but returned %s", cert.Certificate, resp.Certificate)
}
if resp.PrivateKey != cert.PrivateKey {
t.Errorf("Expected %s for resp.UUID, but returned %s", cert.PrivateKey, resp.PrivateKey)
}
}