1
0
mirror of https://github.com/SAP/jenkins-library.git synced 2024-12-14 11:03:09 +02:00
sap-jenkins-library/pkg/orchestrator/azureDevOps_test.go

366 lines
11 KiB
Go
Raw Normal View History

//go:build unit
// +build unit
package orchestrator
import (
"fmt"
"net/http"
"os"
"testing"
"time"
piperhttp "github.com/SAP/jenkins-library/pkg/http"
"github.com/jarcoal/httpmock"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert"
)
func TestAzure(t *testing.T) {
t.Run("Azure - BranchBuild", func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("AZURE_HTTP_USER_AGENT", "FOO BAR BAZ")
os.Setenv("BUILD_SOURCEBRANCH", "refs/heads/feat/test-azure")
os.Setenv("SYSTEM_TEAMFOUNDATIONCOLLECTIONURI", "https://pogo.sap/")
os.Setenv("SYSTEM_TEAMPROJECT", "foo")
os.Setenv("BUILD_BUILDID", "42")
os.Setenv("BUILD_SOURCEVERSION", "abcdef42713")
os.Setenv("BUILD_REPOSITORY_URI", "github.com/foo/bar")
os.Setenv("SYSTEM_DEFINITIONNAME", "bar")
os.Setenv("SYSTEM_DEFINITIONID", "1234")
p, _ := NewOrchestratorSpecificConfigProvider()
assert.False(t, p.IsPullRequest())
assert.Equal(t, "feat/test-azure", p.GetBranch())
assert.Equal(t, "refs/heads/feat/test-azure", p.GetReference())
assert.Equal(t, "https://pogo.sap/foo/bar/_build/results?buildId=42", p.GetBuildURL())
assert.Equal(t, "abcdef42713", p.GetCommit())
assert.Equal(t, "github.com/foo/bar", p.GetRepoURL())
Changes for Pipeline Reporting (#3213) * Adds GetLog() function to orchestrator * Fixes BUILD_NUMBER env variable * Fixes correct env var for JENKINS_HOME * Adds getEnv to read env variables with default value, adds test for jenkins GetLog() implementation * Adds possibility to read errorJsons; updates splunk package for log files (WIP) * Uncommenting dev code * Adds GetLog() function to orchestrator * Fixes BUILD_NUMBER env variable * Fixes correct env var for JENKINS_HOME * Adds getEnv to read env variables with default value, adds test for jenkins GetLog() implementation * Adds possibility to read errorJsons; updates splunk package for log files (WIP) * Uncommenting dev code * Adds GetRequest function which holds the response in memory (not saved to disk) * Implements GetLog() function for ADO, adds function to read PipelineRuntime * PAT has been revoked * Changes http package, s.t. if password only is required basic auth works too * Adds env variable for azure token, error handling in case of unauthenticated/nil response * Adds logging output in case env variable can not be read and fallback variable needs to be used * Adds usage of environment variables for auth, uses jenkins api * Adds init functionality for orchestrators, updates GetLog() and GetPipelineStartTime() function * Adds initaliziation function for orchestrator authetnication * Adds settings struct for orchestrator authentication * Adds function to whole logfile to Splunk * Struct for pipeline related telemetry information * Increase messagebatch size to 10k * Changes splunk package to a pointer based implementation, updates generated files and corresponding template and tests for splunk * Changes telemetry package to pointer based implementation to have multiple telemetry objects, adjusted tests and splunk implementation * Changes content type to txt * Send telemetry independent of logfiles, increases amount of messages per file * Adds JobURL for orchestrators and UnknownOrchestrator as fallback * telemetry makes use of orchestrator specific information * Adds orchestrator independent correlationID * Adds custom fields for pipeline status * go fmt * Removes env var test - no env variables are read anymore * Use UnknownOrchestratorConfigProvider in case the orchestrator can not be initalized * Removes Custom fields from telemetry as these can not be reflected in SWA * Adds custom telemetry information (piperHash,..) to each step telemetry information * Removes falltrough in case no orchestrator has been found * Updates tests for orchestrator package * Adds orchestrator import in generated files * Updates generator files for internal library * Adds orchestrator telemetry information to steps * Updates generated files, fatalHook writes to cpe * Go generate from master, go fmt * Adds Custom Data field LastErrorCode * Removes GetLog() test * Update init_unix.go * Update docker_integration_test_executor.go * Update integration_api_cli_test.go * Reverts go1.17 fmt formatting * Reverts go1.17 fmt formatting * Reverts go1.17 fmt formatting * Renames customTelemetryData to stepTelemetryData * Adjustments to orchestrator-package, cleanup, adds JobName * Adjusts commonPipelineEnvironment path * Adds pipelineTelemetry struct to telemetry package, removes pipeline telemetry structs from splunk package * Go fmt * Changes path for errorDetails, adds debug information * Removes custom fields from step, adds orchestrator, commithash to baseMetadata * Adjusts tests for telemetry package * Adds tests for orchestrator * Updates generated files, initalization of splunk client only if its available in the config * Fixes typo in helper go * Update pkg/http/downloader.go * Update pkg/http/downloader.go * Update pkg/log/fatalHook.go * Update fatalHook.go * Update pkg/splunk/splunk.go * Update pkg/telemetry/data.go * Adds GetBuildStatus() and GetAPIInformation() to orchestrators * error formatting * Bugfix: dont send telemetry data if disabled, adjusts test * go fmt * Use correct error handling * Update pkg/telemetry/telemetry.go * Fixes telemetry disabled in the tests * Fixes http tests * Log fatal errors to logFile * Adds CustomReportingConfig to hooks * Cleanup comments in splunk package * Adds possibility to send telemetry to custom endpoint * Adds debug output for the payload * Debug output for the payload as a string * Adds test cases for changes in telemetry package * go fmt * Adds generated files for new step * Reverts changes for http tests, causing problems with go1.15, changes need to be applied for newer go version >=1.17 * Adjusts test for sonarExecuteScan * Adjusts test for sonarExecuteScan * Adds explanation for customreportingConfig * Makes disableing of customSend more obvious * Adds custom step reporting to each step, updates generated files, adjusts helper testdata * fixes unit test wrong usage of logging * Send pipeline data altough there has been no error, adjust test cases * Reverts changes for customReporting * Updates generated files, removes customReporting * Removes writing errorDetails to CPE * Reverts usage of customreporting * go fmt * reverts changes in http_test * reverts changes in http_test * Skips integration cnb test Co-authored-by: Oliver Nocon <33484802+OliverNocon@users.noreply.github.com>
2021-11-18 18:50:03 +02:00
assert.Equal(t, "Azure", p.OrchestratorType())
assert.Equal(t, "https://pogo.sap/foo/bar/_build?definitionId=1234", p.GetJobURL())
})
t.Run("PR", func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("SYSTEM_PULLREQUEST_SOURCEBRANCH", "feat/test-azure")
os.Setenv("SYSTEM_PULLREQUEST_TARGETBRANCH", "main")
os.Setenv("SYSTEM_PULLREQUEST_PULLREQUESTID", "42")
os.Setenv("BUILD_REASON", "PullRequest")
p := AzureDevOpsConfigProvider{}
c := p.GetPullRequestConfig()
assert.True(t, p.IsPullRequest())
assert.Equal(t, "feat/test-azure", c.Branch)
assert.Equal(t, "main", c.Base)
assert.Equal(t, "42", c.Key)
})
t.Run("PR - Branch Policy", func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("SYSTEM_PULLREQUEST_SOURCEBRANCH", "feat/test-azure")
os.Setenv("SYSTEM_PULLREQUEST_TARGETBRANCH", "main")
os.Setenv("SYSTEM_PULLREQUEST_PULLREQUESTID", "123456789")
os.Setenv("SYSTEM_PULLREQUEST_PULLREQUESTNUMBER", "42")
os.Setenv("BUILD_REASON", "PullRequest")
p := AzureDevOpsConfigProvider{}
c := p.GetPullRequestConfig()
assert.True(t, p.IsPullRequest())
assert.Equal(t, "feat/test-azure", c.Branch)
assert.Equal(t, "main", c.Base)
assert.Equal(t, "42", c.Key)
})
t.Run("Azure DevOps - false", func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("AZURE_HTTP_USER_AGENT", "false")
o := DetectOrchestrator()
assert.Equal(t, Orchestrator(Unknown), o)
})
t.Run("env variables", func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("SYSTEM_COLLECTIONURI", "https://dev.azure.com/fabrikamfiber/")
os.Setenv("SYSTEM_TEAMPROJECTID", "123a4567-ab1c-12a1-1234-123456ab7890")
os.Setenv("BUILD_BUILDID", "42")
os.Setenv("AGENT_VERSION", "2.193.0")
os.Setenv("BUILD_BUILDNUMBER", "20220318.16")
os.Setenv("BUILD_REPOSITORY_NAME", "repo-org/repo-name")
p := AzureDevOpsConfigProvider{}
assert.Equal(t, "https://dev.azure.com/fabrikamfiber/", p.getSystemCollectionURI())
assert.Equal(t, "123a4567-ab1c-12a1-1234-123456ab7890", p.getTeamProjectID())
assert.Equal(t, "42", p.getAzureBuildID()) // Don't confuse getAzureBuildID and GetBuildID!
assert.Equal(t, "20220318.16", p.GetBuildID()) // buildNumber is used in the UI
assert.Equal(t, "2.193.0", p.OrchestratorVersion())
assert.Equal(t, "repo-org/repo-name", p.GetJobName())
})
}
func TestAzureDevOpsConfigProvider_GetPipelineStartTime(t *testing.T) {
tests := []struct {
name string
apiInformation map[string]interface{}
want time.Time
}{
{
name: "Retrieve correct time",
apiInformation: map[string]interface{}{"startTime": "2022-03-18T12:30:42.0Z"},
want: time.Date(2022, time.March, 18, 12, 30, 42, 0, time.UTC),
},
{
name: "Empty apiInformation",
apiInformation: map[string]interface{}{},
want: time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC),
},
{
name: "apiInformation does not contain key",
apiInformation: map[string]interface{}{"someKey": "someValue"},
want: time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC),
},
{
name: "apiInformation contains malformed date",
apiInformation: map[string]interface{}{"startTime": "2022-03/18 12:30:42.0Z"},
want: time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
a := &AzureDevOpsConfigProvider{}
a.apiInformation = tt.apiInformation
pipelineStartTime := a.GetPipelineStartTime()
assert.Equalf(t, tt.want, pipelineStartTime, "GetPipelineStartTime()")
})
}
}
func TestAzureDevOpsConfigProvider_GetBuildStatus(t *testing.T) {
tests := []struct {
name string
want string
envVar string
}{
{
name: "Success",
envVar: "Succeeded",
want: "SUCCESS",
},
{
name: "aborted",
envVar: "Canceled",
want: "ABORTED",
},
{
name: "failure",
envVar: "failed",
want: "FAILURE",
},
{
name: "other",
envVar: "some other status",
want: "FAILURE",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("AGENT_JOBSTATUS", tt.envVar)
a := &AzureDevOpsConfigProvider{}
assert.Equalf(t, tt.want, a.GetBuildStatus(), "GetBuildStatus()")
})
}
}
func TestAzureDevOpsConfigProvider_getAPIInformation(t *testing.T) {
tests := []struct {
name string
wantHTTPErr bool
wantHTTPStatusCodeError bool
wantHTTPJSONParseError bool
apiInformation map[string]interface{}
wantAPIInformation map[string]interface{}
}{
{
name: "success case",
apiInformation: map[string]interface{}{},
wantAPIInformation: map[string]interface{}{"Success": "Case"},
},
{
name: "apiInformation already set",
apiInformation: map[string]interface{}{"API info": "set"},
wantAPIInformation: map[string]interface{}{"API info": "set"},
},
{
name: "failed to get response",
apiInformation: map[string]interface{}{},
wantHTTPErr: true,
wantAPIInformation: map[string]interface{}{},
},
{
name: "response code != 200 http.StatusNoContent",
wantHTTPStatusCodeError: true,
apiInformation: map[string]interface{}{},
wantAPIInformation: map[string]interface{}{},
},
{
name: "parseResponseBodyJson fails",
wantHTTPJSONParseError: true,
apiInformation: map[string]interface{}{},
wantAPIInformation: map[string]interface{}{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
a := &AzureDevOpsConfigProvider{
apiInformation: tt.apiInformation,
}
a.client.SetOptions(piperhttp.ClientOptions{
MaxRequestDuration: 5 * time.Second,
Token: "TOKEN",
TransportSkipVerification: true,
UseDefaultTransport: true, // need to use default transport for http mock
MaxRetries: -1,
})
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("SYSTEM_COLLECTIONURI", "https://dev.azure.com/fabrikamfiber/")
os.Setenv("SYSTEM_TEAMPROJECTID", "123a4567-ab1c-12a1-1234-123456ab7890")
os.Setenv("BUILD_BUILDID", "1234")
fakeUrl := "https://dev.azure.com/fabrikamfiber/123a4567-ab1c-12a1-1234-123456ab7890/_apis/build/builds/1234/"
httpmock.Activate()
defer httpmock.DeactivateAndReset()
httpmock.RegisterResponder("GET", fakeUrl,
func(req *http.Request) (*http.Response, error) {
if tt.wantHTTPErr {
return nil, errors.New("this error shows up")
}
if tt.wantHTTPStatusCodeError {
return &http.Response{
Status: "204",
StatusCode: http.StatusNoContent,
Request: req,
}, nil
}
if tt.wantHTTPJSONParseError {
// Intentionally malformed JSON response
return httpmock.NewJsonResponse(200, "timestamp:broken")
}
return httpmock.NewStringResponse(200, "{\"Success\":\"Case\"}"), nil
},
)
a.fetchAPIInformation()
assert.Equal(t, tt.wantAPIInformation, a.apiInformation)
})
}
}
func TestAzureDevOpsConfigProvider_GetLog(t *testing.T) {
tests := []struct {
name string
want []byte
wantErr assert.ErrorAssertionFunc
wantHTTPErr bool
wantHTTPStatusCodeError bool
wantLogCountError bool
}{
{
name: "Successfully got log file",
want: []byte("Success"),
wantErr: assert.NoError,
},
{
name: "Log count variable not available",
want: []byte(""),
wantErr: assert.NoError,
wantLogCountError: true,
},
{
name: "HTTP error",
want: []byte(""),
wantErr: assert.Error,
wantHTTPErr: true,
},
{
name: "Status code error",
want: []byte(""),
wantErr: assert.NoError,
wantHTTPStatusCodeError: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
a := &AzureDevOpsConfigProvider{}
a.client.SetOptions(piperhttp.ClientOptions{
MaxRequestDuration: 5 * time.Second,
Token: "TOKEN",
TransportSkipVerification: true,
UseDefaultTransport: true, // need to use default transport for http mock
MaxRetries: -1,
})
defer resetEnv(os.Environ())
os.Clearenv()
os.Setenv("SYSTEM_COLLECTIONURI", "https://dev.azure.com/fabrikamfiber/")
os.Setenv("SYSTEM_TEAMPROJECTID", "123a4567-ab1c-12a1-1234-123456ab7890")
os.Setenv("BUILD_BUILDID", "1234")
fakeUrl := "https://dev.azure.com/fabrikamfiber/123a4567-ab1c-12a1-1234-123456ab7890/_apis/build/builds/1234/logs"
httpmock.Activate()
defer httpmock.DeactivateAndReset()
httpmock.RegisterResponder("GET", fakeUrl+"/1",
func(req *http.Request) (*http.Response, error) {
return httpmock.NewStringResponse(200, "Success"), nil
})
httpmock.RegisterResponder("GET", fakeUrl,
func(req *http.Request) (*http.Response, error) {
if tt.wantHTTPErr {
return nil, errors.New("this error shows up")
}
if tt.wantHTTPStatusCodeError {
return &http.Response{
Status: "204",
StatusCode: http.StatusNoContent,
Request: req,
}, nil
}
if tt.wantLogCountError {
return httpmock.NewJsonResponse(200, map[string]interface{}{
"some": "value",
})
}
return httpmock.NewJsonResponse(200, map[string]interface{}{
"count": 1,
})
},
)
got, err := a.GetLog()
if !tt.wantErr(t, err, fmt.Sprintf("GetLog()")) {
return
}
assert.Equalf(t, tt.want, got, "GetLog()")
})
}
}