2015-01-21 19:07:45 +00:00
|
|
|
// Copyright 2013 The Prometheus Authors
|
2013-02-25 01:52:52 +00:00
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package retrieval
|
|
|
|
|
|
|
|
import (
|
2015-07-22 15:48:22 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2014-06-16 15:04:08 +00:00
|
|
|
"errors"
|
2015-08-22 07:47:57 +00:00
|
|
|
"fmt"
|
2015-07-22 15:48:22 +00:00
|
|
|
"io/ioutil"
|
2013-04-26 15:26:52 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2015-04-20 10:24:25 +00:00
|
|
|
"net/url"
|
2015-03-18 17:53:43 +00:00
|
|
|
"reflect"
|
2015-04-20 10:24:25 +00:00
|
|
|
"strings"
|
2013-02-25 01:52:52 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
2013-06-25 12:02:27 +00:00
|
|
|
|
2015-08-20 15:18:46 +00:00
|
|
|
"github.com/prometheus/common/model"
|
2016-02-22 17:49:26 +00:00
|
|
|
"golang.org/x/net/context"
|
2013-06-25 12:02:27 +00:00
|
|
|
|
2015-06-12 21:16:13 +00:00
|
|
|
"github.com/prometheus/prometheus/config"
|
2013-02-25 01:52:52 +00:00
|
|
|
)
|
|
|
|
|
2016-02-15 09:31:38 +00:00
|
|
|
func TestTargetLabels(t *testing.T) {
|
2015-08-20 15:18:46 +00:00
|
|
|
target := newTestTarget("example.com:80", 0, model.LabelSet{"job": "some_job", "foo": "bar"})
|
|
|
|
want := model.LabelSet{
|
|
|
|
model.JobLabel: "some_job",
|
|
|
|
model.InstanceLabel: "example.com:80",
|
|
|
|
"foo": "bar",
|
2015-04-20 10:24:25 +00:00
|
|
|
}
|
2016-02-15 09:31:38 +00:00
|
|
|
got := target.Labels()
|
2015-03-18 17:53:43 +00:00
|
|
|
if !reflect.DeepEqual(want, got) {
|
|
|
|
t.Errorf("want base labels %v, got %v", want, got)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-15 14:22:57 +00:00
|
|
|
func TestTargetOffset(t *testing.T) {
|
|
|
|
interval := 10 * time.Second
|
|
|
|
|
|
|
|
offsets := make([]time.Duration, 10000)
|
|
|
|
|
|
|
|
// Calculate offsets for 10000 different targets.
|
|
|
|
for i := range offsets {
|
|
|
|
target := newTestTarget("example.com:80", 0, model.LabelSet{
|
|
|
|
"label": model.LabelValue(fmt.Sprintf("%d", i)),
|
|
|
|
})
|
|
|
|
offsets[i] = target.offset(interval)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put the offsets into buckets and validate that they are all
|
|
|
|
// within bounds.
|
|
|
|
bucketSize := 1 * time.Second
|
|
|
|
buckets := make([]int, interval/bucketSize)
|
|
|
|
|
|
|
|
for _, offset := range offsets {
|
|
|
|
if offset < 0 || offset >= interval {
|
|
|
|
t.Fatalf("Offset %v out of bounds", offset)
|
|
|
|
}
|
|
|
|
|
|
|
|
bucket := offset / bucketSize
|
|
|
|
buckets[bucket]++
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Log(buckets)
|
|
|
|
|
|
|
|
// Calculate whether the the number of targets per bucket
|
|
|
|
// does not differ more than a given tolerance.
|
|
|
|
avg := len(offsets) / len(buckets)
|
|
|
|
tolerance := 0.15
|
|
|
|
|
|
|
|
for _, bucket := range buckets {
|
|
|
|
diff := bucket - avg
|
|
|
|
if diff < 0 {
|
|
|
|
diff = -diff
|
|
|
|
}
|
|
|
|
|
|
|
|
if float64(diff)/float64(avg) > tolerance {
|
|
|
|
t.Fatalf("Bucket out of tolerance bounds")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-16 15:04:08 +00:00
|
|
|
func TestTargetScrape404(t *testing.T) {
|
2015-02-09 16:32:47 +00:00
|
|
|
server := httptest.NewServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.WriteHeader(http.StatusNotFound)
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
2014-06-16 15:04:08 +00:00
|
|
|
defer server.Close()
|
|
|
|
|
2015-09-22 16:58:42 +00:00
|
|
|
testTarget := newTestTarget(server.URL, time.Second, model.LabelSet{})
|
2014-06-16 15:04:08 +00:00
|
|
|
|
|
|
|
want := errors.New("server returned HTTP status 404 Not Found")
|
2016-02-25 12:58:46 +00:00
|
|
|
_, got := testTarget.scrape(context.Background(), time.Now())
|
2014-06-16 15:04:08 +00:00
|
|
|
if got == nil || want.Error() != got.Error() {
|
|
|
|
t.Fatalf("want err %q, got %q", want, got)
|
|
|
|
}
|
|
|
|
}
|
2014-07-29 18:31:11 +00:00
|
|
|
|
2015-07-05 19:25:45 +00:00
|
|
|
func TestURLParams(t *testing.T) {
|
|
|
|
server := httptest.NewServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Content-Type", `text/plain; version=0.0.4`)
|
|
|
|
w.Write([]byte{})
|
|
|
|
r.ParseForm()
|
|
|
|
if r.Form["foo"][0] != "bar" {
|
|
|
|
t.Fatalf("URL parameter 'foo' had unexpected first value '%v'", r.Form["foo"][0])
|
|
|
|
}
|
|
|
|
if r.Form["foo"][1] != "baz" {
|
|
|
|
t.Fatalf("URL parameter 'foo' had unexpected second value '%v'", r.Form["foo"][1])
|
|
|
|
}
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
defer server.Close()
|
|
|
|
serverURL, err := url.Parse(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2016-02-08 20:26:00 +00:00
|
|
|
target, err := NewTarget(
|
2015-07-05 19:25:45 +00:00
|
|
|
&config.ScrapeConfig{
|
|
|
|
JobName: "test_job1",
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeInterval: model.Duration(1 * time.Minute),
|
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-07-05 19:25:45 +00:00
|
|
|
Scheme: serverURL.Scheme,
|
|
|
|
Params: url.Values{
|
|
|
|
"foo": []string{"bar", "baz"},
|
|
|
|
},
|
|
|
|
},
|
2015-08-20 15:18:46 +00:00
|
|
|
model.LabelSet{
|
|
|
|
model.SchemeLabel: model.LabelValue(serverURL.Scheme),
|
|
|
|
model.AddressLabel: model.LabelValue(serverURL.Host),
|
|
|
|
"__param_foo": "bar",
|
2015-07-05 19:25:45 +00:00
|
|
|
},
|
2016-02-12 14:43:27 +00:00
|
|
|
nil,
|
|
|
|
)
|
2016-02-08 20:26:00 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-02-25 12:58:46 +00:00
|
|
|
if _, err = target.scrape(context.Background(), time.Now()); err != nil {
|
2015-07-05 19:25:45 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-12 14:43:27 +00:00
|
|
|
func newTestTarget(targetURL string, deadline time.Duration, labels model.LabelSet) *Target {
|
|
|
|
labels = labels.Clone()
|
|
|
|
labels[model.SchemeLabel] = "http"
|
|
|
|
labels[model.AddressLabel] = model.LabelValue(strings.TrimLeft(targetURL, "http://"))
|
|
|
|
labels[model.MetricsPathLabel] = "/metrics"
|
|
|
|
|
2016-02-22 09:54:01 +00:00
|
|
|
return &Target{
|
2016-02-12 14:43:27 +00:00
|
|
|
scrapeConfig: &config.ScrapeConfig{
|
|
|
|
ScrapeInterval: model.Duration(time.Millisecond),
|
|
|
|
ScrapeTimeout: model.Duration(deadline),
|
2015-04-20 10:24:25 +00:00
|
|
|
},
|
2016-02-22 17:49:26 +00:00
|
|
|
labels: labels,
|
|
|
|
status: &TargetStatus{},
|
2015-04-20 10:24:25 +00:00
|
|
|
}
|
|
|
|
}
|
2015-07-22 15:48:22 +00:00
|
|
|
|
|
|
|
func TestNewHTTPBearerToken(t *testing.T) {
|
|
|
|
server := httptest.NewServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
expected := "Bearer 1234"
|
|
|
|
received := r.Header.Get("Authorization")
|
|
|
|
if expected != received {
|
|
|
|
t.Fatalf("Authorization header was not set correctly: expected '%v', got '%v'", expected, received)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
defer server.Close()
|
|
|
|
|
|
|
|
cfg := &config.ScrapeConfig{
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-07-22 15:48:22 +00:00
|
|
|
BearerToken: "1234",
|
|
|
|
}
|
|
|
|
c, err := newHTTPClient(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = c.Get(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNewHTTPBearerTokenFile(t *testing.T) {
|
|
|
|
server := httptest.NewServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
expected := "Bearer 12345"
|
|
|
|
received := r.Header.Get("Authorization")
|
|
|
|
if expected != received {
|
|
|
|
t.Fatalf("Authorization header was not set correctly: expected '%v', got '%v'", expected, received)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
defer server.Close()
|
|
|
|
|
|
|
|
cfg := &config.ScrapeConfig{
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-07-22 15:48:22 +00:00
|
|
|
BearerTokenFile: "testdata/bearertoken.txt",
|
|
|
|
}
|
|
|
|
c, err := newHTTPClient(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = c.Get(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-18 21:23:58 +00:00
|
|
|
func TestNewHTTPBasicAuth(t *testing.T) {
|
|
|
|
server := httptest.NewServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
username, password, ok := r.BasicAuth()
|
|
|
|
if !(ok && username == "user" && password == "password123") {
|
|
|
|
t.Fatalf("Basic authorization header was not set correctly: expected '%v:%v', got '%v:%v'", "user", "password123", username, password)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
defer server.Close()
|
|
|
|
|
|
|
|
cfg := &config.ScrapeConfig{
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-07-18 21:23:58 +00:00
|
|
|
BasicAuth: &config.BasicAuth{
|
|
|
|
Username: "user",
|
|
|
|
Password: "password123",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
c, err := newHTTPClient(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = c.Get(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-22 15:48:22 +00:00
|
|
|
func TestNewHTTPCACert(t *testing.T) {
|
|
|
|
server := httptest.NewUnstartedServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Content-Type", `text/plain; version=0.0.4`)
|
|
|
|
w.Write([]byte{})
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
server.TLS = newTLSConfig(t)
|
|
|
|
server.StartTLS()
|
|
|
|
defer server.Close()
|
|
|
|
|
|
|
|
cfg := &config.ScrapeConfig{
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-09-06 23:07:44 +00:00
|
|
|
TLSConfig: config.TLSConfig{
|
|
|
|
CAFile: "testdata/ca.cer",
|
|
|
|
},
|
2015-07-22 15:48:22 +00:00
|
|
|
}
|
|
|
|
c, err := newHTTPClient(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = c.Get(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNewHTTPClientCert(t *testing.T) {
|
|
|
|
server := httptest.NewUnstartedServer(
|
|
|
|
http.HandlerFunc(
|
|
|
|
func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Set("Content-Type", `text/plain; version=0.0.4`)
|
|
|
|
w.Write([]byte{})
|
|
|
|
},
|
|
|
|
),
|
|
|
|
)
|
|
|
|
tlsConfig := newTLSConfig(t)
|
|
|
|
tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert
|
|
|
|
tlsConfig.ClientCAs = tlsConfig.RootCAs
|
|
|
|
tlsConfig.BuildNameToCertificate()
|
|
|
|
server.TLS = tlsConfig
|
|
|
|
server.StartTLS()
|
|
|
|
defer server.Close()
|
|
|
|
|
|
|
|
cfg := &config.ScrapeConfig{
|
2016-01-29 14:23:11 +00:00
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
2015-09-06 23:07:44 +00:00
|
|
|
TLSConfig: config.TLSConfig{
|
|
|
|
CAFile: "testdata/ca.cer",
|
|
|
|
CertFile: "testdata/client.cer",
|
|
|
|
KeyFile: "testdata/client.key",
|
2015-07-22 15:48:22 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
c, err := newHTTPClient(cfg)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = c.Get(server.URL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func newTLSConfig(t *testing.T) *tls.Config {
|
|
|
|
tlsConfig := &tls.Config{}
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
|
|
caCert, err := ioutil.ReadFile("testdata/ca.cer")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Couldn't set up TLS server: %v", err)
|
|
|
|
}
|
|
|
|
caCertPool.AppendCertsFromPEM(caCert)
|
|
|
|
tlsConfig.RootCAs = caCertPool
|
|
|
|
tlsConfig.ServerName = "127.0.0.1"
|
|
|
|
cert, err := tls.LoadX509KeyPair("testdata/server.cer", "testdata/server.key")
|
|
|
|
if err != nil {
|
2015-08-26 00:04:01 +00:00
|
|
|
t.Errorf("Unable to use specified server cert (%s) & key (%v): %s", "testdata/server.cer", "testdata/server.key", err)
|
2015-07-22 15:48:22 +00:00
|
|
|
}
|
|
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
|
|
tlsConfig.BuildNameToCertificate()
|
|
|
|
return tlsConfig
|
|
|
|
}
|
2016-02-08 20:26:00 +00:00
|
|
|
|
|
|
|
func TestNewTargetWithBadTLSConfig(t *testing.T) {
|
|
|
|
cfg := &config.ScrapeConfig{
|
|
|
|
ScrapeTimeout: model.Duration(1 * time.Second),
|
|
|
|
TLSConfig: config.TLSConfig{
|
|
|
|
CAFile: "testdata/nonexistent_ca.cer",
|
|
|
|
CertFile: "testdata/nonexistent_client.cer",
|
|
|
|
KeyFile: "testdata/nonexistent_client.key",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
_, err := NewTarget(cfg, nil, nil)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Expected error, got nil.")
|
|
|
|
}
|
|
|
|
}
|