mirror of
https://github.com/open-telemetry/opentelemetry-go.git
synced 2024-12-16 10:19:23 +02:00
0fe5eee21f
* silence tlsCert.RootCAs.Subjects is deprecated lint err Signed-off-by: Sourik Ghosh <sourikghosh31@gmail.com> * silence rest of the occurrence Signed-off-by: Sourik Ghosh <sourikghosh31@gmail.com> Co-authored-by: Aaron Clawson <3766680+MadVikingGod@users.noreply.github.com> Co-authored-by: Tyler Yahn <MrAlias@users.noreply.github.com>
422 lines
14 KiB
Go
422 lines
14 KiB
Go
// Copyright The OpenTelemetry Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package otlpconfig_test
|
|
|
|
import (
|
|
"errors"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"go.opentelemetry.io/otel/exporters/otlp/internal/envconfig"
|
|
"go.opentelemetry.io/otel/exporters/otlp/otlptrace/internal/otlpconfig"
|
|
)
|
|
|
|
const (
|
|
WeakCertificate = `
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBhzCCASygAwIBAgIRANHpHgAWeTnLZpTSxCKs0ggwCgYIKoZIzj0EAwIwEjEQ
|
|
MA4GA1UEChMHb3RlbC1nbzAeFw0yMTA0MDExMzU5MDNaFw0yMTA0MDExNDU5MDNa
|
|
MBIxEDAOBgNVBAoTB290ZWwtZ28wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAS9
|
|
nWSkmPCxShxnp43F+PrOtbGV7sNfkbQ/kxzi9Ego0ZJdiXxkmv/C05QFddCW7Y0Z
|
|
sJCLHGogQsYnWJBXUZOVo2MwYTAOBgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYI
|
|
KwYBBQUHAwEwDAYDVR0TAQH/BAIwADAsBgNVHREEJTAjgglsb2NhbGhvc3SHEAAA
|
|
AAAAAAAAAAAAAAAAAAGHBH8AAAEwCgYIKoZIzj0EAwIDSQAwRgIhANwZVVKvfvQ/
|
|
1HXsTvgH+xTQswOwSSKYJ1cVHQhqK7ZbAiEAus8NxpTRnp5DiTMuyVmhVNPB+bVH
|
|
Lhnm4N/QDk5rek0=
|
|
-----END CERTIFICATE-----
|
|
`
|
|
WeakPrivateKey = `
|
|
-----BEGIN PRIVATE KEY-----
|
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgN8HEXiXhvByrJ1zK
|
|
SFT6Y2l2KqDWwWzKf+t4CyWrNKehRANCAAS9nWSkmPCxShxnp43F+PrOtbGV7sNf
|
|
kbQ/kxzi9Ego0ZJdiXxkmv/C05QFddCW7Y0ZsJCLHGogQsYnWJBXUZOV
|
|
-----END PRIVATE KEY-----
|
|
`
|
|
)
|
|
|
|
type env map[string]string
|
|
|
|
func (e *env) getEnv(env string) string {
|
|
return (*e)[env]
|
|
}
|
|
|
|
type fileReader map[string][]byte
|
|
|
|
func (f *fileReader) readFile(filename string) ([]byte, error) {
|
|
if b, ok := (*f)[filename]; ok {
|
|
return b, nil
|
|
}
|
|
return nil, errors.New("File not found")
|
|
}
|
|
|
|
func TestConfigs(t *testing.T) {
|
|
tlsCert, err := otlpconfig.CreateTLSConfig([]byte(WeakCertificate))
|
|
assert.NoError(t, err)
|
|
|
|
tests := []struct {
|
|
name string
|
|
opts []otlpconfig.GenericOption
|
|
env env
|
|
fileReader fileReader
|
|
asserts func(t *testing.T, c *otlpconfig.Config, grpcOption bool)
|
|
}{
|
|
{
|
|
name: "Test default configs",
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
assert.Equal(t, "localhost:4317", c.Traces.Endpoint)
|
|
} else {
|
|
assert.Equal(t, "localhost:4318", c.Traces.Endpoint)
|
|
}
|
|
assert.Equal(t, otlpconfig.NoCompression, c.Traces.Compression)
|
|
assert.Equal(t, map[string]string(nil), c.Traces.Headers)
|
|
assert.Equal(t, 10*time.Second, c.Traces.Timeout)
|
|
},
|
|
},
|
|
|
|
// Endpoint Tests
|
|
{
|
|
name: "Test With Endpoint",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithEndpoint("someendpoint"),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "someendpoint", c.Traces.Endpoint)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Endpoint",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "https://env.endpoint/prefix",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.False(t, c.Traces.Insecure)
|
|
if grpcOption {
|
|
assert.Equal(t, "env.endpoint/prefix", c.Traces.Endpoint)
|
|
} else {
|
|
assert.Equal(t, "env.endpoint", c.Traces.Endpoint)
|
|
assert.Equal(t, "/prefix/v1/traces", c.Traces.URLPath)
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Endpoint",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "https://overrode.by.signal.specific/env/var",
|
|
"OTEL_EXPORTER_OTLP_TRACES_ENDPOINT": "http://env.traces.endpoint",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.True(t, c.Traces.Insecure)
|
|
assert.Equal(t, "env.traces.endpoint", c.Traces.Endpoint)
|
|
if !grpcOption {
|
|
assert.Equal(t, "/", c.Traces.URLPath)
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test Mixed Environment and With Endpoint",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithEndpoint("traces_endpoint"),
|
|
},
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "env_endpoint",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "traces_endpoint", c.Traces.Endpoint)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Endpoint with HTTP scheme",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "http://env_endpoint",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "env_endpoint", c.Traces.Endpoint)
|
|
assert.Equal(t, true, c.Traces.Insecure)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Endpoint with HTTP scheme and leading & trailingspaces",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": " http://env_endpoint ",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "env_endpoint", c.Traces.Endpoint)
|
|
assert.Equal(t, true, c.Traces.Insecure)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Endpoint with HTTPS scheme",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "https://env_endpoint",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "env_endpoint", c.Traces.Endpoint)
|
|
assert.Equal(t, false, c.Traces.Insecure)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Endpoint with uppercase scheme",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_ENDPOINT": "HTTPS://overrode_by_signal_specific",
|
|
"OTEL_EXPORTER_OTLP_TRACES_ENDPOINT": "HtTp://env_traces_endpoint",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, "env_traces_endpoint", c.Traces.Endpoint)
|
|
assert.Equal(t, true, c.Traces.Insecure)
|
|
},
|
|
},
|
|
|
|
// Certificate tests
|
|
{
|
|
name: "Test Default Certificate",
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
assert.NotNil(t, c.Traces.GRPCCredentials)
|
|
} else {
|
|
assert.Nil(t, c.Traces.TLSCfg)
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test With Certificate",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithTLSClientConfig(tlsCert),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
//TODO: make sure gRPC's credentials actually works
|
|
assert.NotNil(t, c.Traces.GRPCCredentials)
|
|
} else {
|
|
// nolint:staticcheck // ignoring tlsCert.RootCAs.Subjects is deprecated ERR because cert does not come from SystemCertPool.
|
|
assert.Equal(t, tlsCert.RootCAs.Subjects(), c.Traces.TLSCfg.RootCAs.Subjects())
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Certificate",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_CERTIFICATE": "cert_path",
|
|
},
|
|
fileReader: fileReader{
|
|
"cert_path": []byte(WeakCertificate),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
assert.NotNil(t, c.Traces.GRPCCredentials)
|
|
} else {
|
|
// nolint:staticcheck // ignoring tlsCert.RootCAs.Subjects is deprecated ERR because cert does not come from SystemCertPool.
|
|
assert.Equal(t, tlsCert.RootCAs.Subjects(), c.Traces.TLSCfg.RootCAs.Subjects())
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Certificate",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_CERTIFICATE": "overrode_by_signal_specific",
|
|
"OTEL_EXPORTER_OTLP_TRACES_CERTIFICATE": "cert_path",
|
|
},
|
|
fileReader: fileReader{
|
|
"cert_path": []byte(WeakCertificate),
|
|
"invalid_cert": []byte("invalid certificate file."),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
assert.NotNil(t, c.Traces.GRPCCredentials)
|
|
} else {
|
|
// nolint:staticcheck // ignoring tlsCert.RootCAs.Subjects is deprecated ERR because cert does not come from SystemCertPool.
|
|
assert.Equal(t, tlsCert.RootCAs.Subjects(), c.Traces.TLSCfg.RootCAs.Subjects())
|
|
}
|
|
},
|
|
},
|
|
{
|
|
name: "Test Mixed Environment and With Certificate",
|
|
opts: []otlpconfig.GenericOption{},
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_CERTIFICATE": "cert_path",
|
|
},
|
|
fileReader: fileReader{
|
|
"cert_path": []byte(WeakCertificate),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
if grpcOption {
|
|
assert.NotNil(t, c.Traces.GRPCCredentials)
|
|
} else {
|
|
// nolint:staticcheck // ignoring tlsCert.RootCAs.Subjects is deprecated ERR because cert does not come from SystemCertPool.
|
|
assert.Equal(t, tlsCert.RootCAs.Subjects(), c.Traces.TLSCfg.RootCAs.Subjects())
|
|
}
|
|
},
|
|
},
|
|
|
|
// Headers tests
|
|
{
|
|
name: "Test With Headers",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithHeaders(map[string]string{"h1": "v1"}),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, map[string]string{"h1": "v1"}, c.Traces.Headers)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Headers",
|
|
env: map[string]string{"OTEL_EXPORTER_OTLP_HEADERS": "h1=v1,h2=v2"},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, map[string]string{"h1": "v1", "h2": "v2"}, c.Traces.Headers)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Headers",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_HEADERS": "overrode_by_signal_specific",
|
|
"OTEL_EXPORTER_OTLP_TRACES_HEADERS": "h1=v1,h2=v2",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, map[string]string{"h1": "v1", "h2": "v2"}, c.Traces.Headers)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Mixed Environment and With Headers",
|
|
env: map[string]string{"OTEL_EXPORTER_OTLP_HEADERS": "h1=v1,h2=v2"},
|
|
opts: []otlpconfig.GenericOption{},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, map[string]string{"h1": "v1", "h2": "v2"}, c.Traces.Headers)
|
|
},
|
|
},
|
|
|
|
// Compression Tests
|
|
{
|
|
name: "Test With Compression",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithCompression(otlpconfig.GzipCompression),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, otlpconfig.GzipCompression, c.Traces.Compression)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Compression",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_COMPRESSION": "gzip",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, otlpconfig.GzipCompression, c.Traces.Compression)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Compression",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_TRACES_COMPRESSION": "gzip",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, otlpconfig.GzipCompression, c.Traces.Compression)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Mixed Environment and With Compression",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithCompression(otlpconfig.NoCompression),
|
|
},
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_TRACES_COMPRESSION": "gzip",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, otlpconfig.NoCompression, c.Traces.Compression)
|
|
},
|
|
},
|
|
|
|
// Timeout Tests
|
|
{
|
|
name: "Test With Timeout",
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithTimeout(time.Duration(5 * time.Second)),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, 5*time.Second, c.Traces.Timeout)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Timeout",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_TIMEOUT": "15000",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, c.Traces.Timeout, 15*time.Second)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Environment Signal Specific Timeout",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_TIMEOUT": "15000",
|
|
"OTEL_EXPORTER_OTLP_TRACES_TIMEOUT": "27000",
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, c.Traces.Timeout, 27*time.Second)
|
|
},
|
|
},
|
|
{
|
|
name: "Test Mixed Environment and With Timeout",
|
|
env: map[string]string{
|
|
"OTEL_EXPORTER_OTLP_TIMEOUT": "15000",
|
|
"OTEL_EXPORTER_OTLP_TRACES_TIMEOUT": "27000",
|
|
},
|
|
opts: []otlpconfig.GenericOption{
|
|
otlpconfig.WithTimeout(5 * time.Second),
|
|
},
|
|
asserts: func(t *testing.T, c *otlpconfig.Config, grpcOption bool) {
|
|
assert.Equal(t, c.Traces.Timeout, 5*time.Second)
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
origEOR := otlpconfig.DefaultEnvOptionsReader
|
|
otlpconfig.DefaultEnvOptionsReader = envconfig.EnvOptionsReader{
|
|
GetEnv: tt.env.getEnv,
|
|
ReadFile: tt.fileReader.readFile,
|
|
Namespace: "OTEL_EXPORTER_OTLP",
|
|
}
|
|
t.Cleanup(func() { otlpconfig.DefaultEnvOptionsReader = origEOR })
|
|
|
|
// Tests Generic options as HTTP Options
|
|
cfg := otlpconfig.NewHTTPConfig(asHTTPOptions(tt.opts)...)
|
|
tt.asserts(t, &cfg, false)
|
|
|
|
// Tests Generic options as gRPC Options
|
|
cfg = otlpconfig.NewGRPCConfig(asGRPCOptions(tt.opts)...)
|
|
tt.asserts(t, &cfg, true)
|
|
})
|
|
}
|
|
}
|
|
|
|
func asHTTPOptions(opts []otlpconfig.GenericOption) []otlpconfig.HTTPOption {
|
|
converted := make([]otlpconfig.HTTPOption, len(opts))
|
|
for i, o := range opts {
|
|
converted[i] = otlpconfig.NewHTTPOption(o.ApplyHTTPOption)
|
|
}
|
|
return converted
|
|
}
|
|
|
|
func asGRPCOptions(opts []otlpconfig.GenericOption) []otlpconfig.GRPCOption {
|
|
converted := make([]otlpconfig.GRPCOption, len(opts))
|
|
for i, o := range opts {
|
|
converted[i] = otlpconfig.NewGRPCOption(o.ApplyGRPCOption)
|
|
}
|
|
return converted
|
|
}
|