2018-01-25 11:00:05 +00:00
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-check/check"
|
2020-09-16 13:46:04 +00:00
|
|
|
"github.com/traefik/traefik/v2/integration/try"
|
2018-01-25 11:00:05 +00:00
|
|
|
checker "github.com/vdemeester/shakers"
|
|
|
|
)
|
|
|
|
|
|
|
|
type TracingSuite struct {
|
|
|
|
BaseSuite
|
2019-06-27 22:16:04 +00:00
|
|
|
WhoAmiIP string
|
|
|
|
WhoAmiPort int
|
|
|
|
IP string
|
2018-01-25 11:00:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type TracingTemplate struct {
|
2019-10-15 14:30:06 +00:00
|
|
|
WhoAmiIP string
|
|
|
|
WhoAmiPort int
|
|
|
|
IP string
|
|
|
|
TraceContextHeaderName string
|
2018-01-25 11:00:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) SetUpSuite(c *check.C) {
|
|
|
|
s.createComposeProject(c, "tracing")
|
|
|
|
s.composeProject.Start(c, "whoami")
|
|
|
|
|
|
|
|
s.WhoAmiIP = s.composeProject.Container(c, "whoami").NetworkSettings.IPAddress
|
|
|
|
s.WhoAmiPort = 80
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) startZipkin(c *check.C) {
|
|
|
|
s.composeProject.Start(c, "zipkin")
|
2019-06-27 22:16:04 +00:00
|
|
|
s.IP = s.composeProject.Container(c, "zipkin").NetworkSettings.IPAddress
|
2018-01-25 11:00:05 +00:00
|
|
|
|
|
|
|
// Wait for Zipkin to turn ready.
|
2019-06-27 22:16:04 +00:00
|
|
|
err := try.GetRequest("http://"+s.IP+":9411/api/v2/services", 20*time.Second, try.StatusCodeIs(http.StatusOK))
|
2018-01-25 11:00:05 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestZipkinRateLimit(c *check.C) {
|
|
|
|
s.startZipkin(c)
|
2019-06-27 22:16:04 +00:00
|
|
|
defer s.composeProject.Stop(c, "zipkin")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-zipkin.toml", TracingTemplate{
|
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
2018-01-25 11:00:05 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
2019-05-16 08:58:06 +00:00
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2018-01-25 11:00:05 +00:00
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusTooManyRequests))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
// sleep for 4 seconds to be certain the configured time period has elapsed
|
|
|
|
// then test another request and verify a 200 status code
|
|
|
|
time.Sleep(4 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
// continue requests at 3 second intervals to test the other rate limit time period
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusTooManyRequests))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2019-09-03 12:34:04 +00:00
|
|
|
err = try.GetRequest("http://"+s.IP+":9411/api/v2/spans?serviceName=tracing", 20*time.Second, try.BodyContains("forward service1/router1@file", "ratelimit-1@file"))
|
2018-01-25 11:00:05 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestZipkinRetry(c *check.C) {
|
|
|
|
s.startZipkin(c)
|
2019-06-27 22:16:04 +00:00
|
|
|
defer s.composeProject.Stop(c, "zipkin")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-zipkin.toml", TracingTemplate{
|
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: 81,
|
|
|
|
IP: s.IP,
|
2018-01-25 11:00:05 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
2019-05-16 08:58:06 +00:00
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2018-01-25 11:00:05 +00:00
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/retry", 500*time.Millisecond, try.StatusCodeIs(http.StatusBadGateway))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2019-06-27 22:16:04 +00:00
|
|
|
err = try.GetRequest("http://"+s.IP+":9411/api/v2/spans?serviceName=tracing", 20*time.Second, try.BodyContains("forward service2/router2@file", "retry@file"))
|
2018-01-25 11:00:05 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestZipkinAuth(c *check.C) {
|
|
|
|
s.startZipkin(c)
|
2019-06-27 22:16:04 +00:00
|
|
|
defer s.composeProject.Stop(c, "zipkin")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-zipkin.toml", TracingTemplate{
|
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
2018-01-25 11:00:05 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
2019-05-16 08:58:06 +00:00
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2018-01-25 11:00:05 +00:00
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/auth", 500*time.Millisecond, try.StatusCodeIs(http.StatusUnauthorized))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2019-06-27 22:16:04 +00:00
|
|
|
err = try.GetRequest("http://"+s.IP+":9411/api/v2/spans?serviceName=tracing", 20*time.Second, try.BodyContains("entrypoint web", "basic-auth@file"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) startJaeger(c *check.C) {
|
|
|
|
s.composeProject.Start(c, "jaeger")
|
|
|
|
s.IP = s.composeProject.Container(c, "jaeger").NetworkSettings.IPAddress
|
|
|
|
|
|
|
|
// Wait for Jaeger to turn ready.
|
|
|
|
err := try.GetRequest("http://"+s.IP+":16686/api/services", 20*time.Second, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestJaegerRateLimit(c *check.C) {
|
|
|
|
s.startJaeger(c)
|
|
|
|
defer s.composeProject.Stop(c, "jaeger")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-jaeger.toml", TracingTemplate{
|
2019-10-15 14:30:06 +00:00
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
|
|
|
TraceContextHeaderName: "uber-trace-id",
|
2019-06-27 22:16:04 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusTooManyRequests))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
// sleep for 4 seconds to be certain the configured time period has elapsed
|
|
|
|
// then test another request and verify a 200 status code
|
|
|
|
time.Sleep(4 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
// continue requests at 3 second intervals to test the other rate limit time period
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusOK))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/ratelimit", 500*time.Millisecond, try.StatusCodeIs(http.StatusTooManyRequests))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
2019-09-03 12:34:04 +00:00
|
|
|
err = try.GetRequest("http://"+s.IP+":16686/api/traces?service=tracing", 20*time.Second, try.BodyContains("forward service1/router1@file", "ratelimit-1@file"))
|
2019-06-27 22:16:04 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestJaegerRetry(c *check.C) {
|
|
|
|
s.startJaeger(c)
|
|
|
|
defer s.composeProject.Stop(c, "jaeger")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-jaeger.toml", TracingTemplate{
|
2019-10-15 14:30:06 +00:00
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: 81,
|
|
|
|
IP: s.IP,
|
|
|
|
TraceContextHeaderName: "uber-trace-id",
|
2019-06-27 22:16:04 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/retry", 500*time.Millisecond, try.StatusCodeIs(http.StatusBadGateway))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://"+s.IP+":16686/api/traces?service=tracing", 20*time.Second, try.BodyContains("forward service2/router2@file", "retry@file"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestJaegerAuth(c *check.C) {
|
|
|
|
s.startJaeger(c)
|
|
|
|
defer s.composeProject.Stop(c, "jaeger")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-jaeger.toml", TracingTemplate{
|
2019-10-15 14:30:06 +00:00
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
|
|
|
TraceContextHeaderName: "uber-trace-id",
|
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/auth", 500*time.Millisecond, try.StatusCodeIs(http.StatusUnauthorized))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://"+s.IP+":16686/api/traces?service=tracing", 20*time.Second, try.BodyContains("EntryPoint web", "basic-auth@file"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TracingSuite) TestJaegerCustomHeader(c *check.C) {
|
|
|
|
s.startJaeger(c)
|
|
|
|
defer s.composeProject.Stop(c, "jaeger")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-jaeger.toml", TracingTemplate{
|
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
|
|
|
TraceContextHeaderName: "powpow",
|
2019-06-27 22:16:04 +00:00
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/auth", 500*time.Millisecond, try.StatusCodeIs(http.StatusUnauthorized))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://"+s.IP+":16686/api/traces?service=tracing", 20*time.Second, try.BodyContains("EntryPoint web", "basic-auth@file"))
|
2018-01-25 11:00:05 +00:00
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|
2019-07-15 12:52:04 +00:00
|
|
|
|
|
|
|
func (s *TracingSuite) TestJaegerAuthCollector(c *check.C) {
|
|
|
|
s.startJaeger(c)
|
|
|
|
defer s.composeProject.Stop(c, "jaeger")
|
|
|
|
file := s.adaptFile(c, "fixtures/tracing/simple-jaeger-collector.toml", TracingTemplate{
|
|
|
|
WhoAmiIP: s.WhoAmiIP,
|
|
|
|
WhoAmiPort: s.WhoAmiPort,
|
|
|
|
IP: s.IP,
|
|
|
|
})
|
|
|
|
defer os.Remove(file)
|
|
|
|
|
|
|
|
cmd, display := s.traefikCmd(withConfigFile(file))
|
|
|
|
defer display(c)
|
|
|
|
err := cmd.Start()
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
defer cmd.Process.Kill()
|
|
|
|
|
|
|
|
// wait for traefik
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8080/api/rawdata", time.Second, try.BodyContains("basic-auth"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://127.0.0.1:8000/auth", 500*time.Millisecond, try.StatusCodeIs(http.StatusUnauthorized))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
|
|
|
|
err = try.GetRequest("http://"+s.IP+":16686/api/traces?service=tracing", 20*time.Second, try.BodyContains("EntryPoint web", "basic-auth@file"))
|
|
|
|
c.Assert(err, checker.IsNil)
|
|
|
|
}
|