mirror of
https://github.com/ribbybibby/ssl_exporter.git
synced 2024-11-24 08:22:17 +02:00
223 lines
5.2 KiB
Go
223 lines
5.2 KiB
Go
package main
|
|
|
|
import (
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/go-kit/log"
|
|
"github.com/ribbybibby/ssl_exporter/v2/config"
|
|
"github.com/ribbybibby/ssl_exporter/v2/test"
|
|
)
|
|
|
|
// TestProbeHandler tests that the probe handler sets the ssl_probe_success and
|
|
// ssl_prober metrics correctly
|
|
func TestProbeHandler(t *testing.T) {
|
|
server, _, _, caFile, teardown, err := test.SetupHTTPSServer()
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
defer teardown()
|
|
|
|
server.StartTLS()
|
|
defer server.Close()
|
|
|
|
conf := &config.Config{
|
|
Modules: map[string]config.Module{
|
|
"https": config.Module{
|
|
Prober: "https",
|
|
TLSConfig: config.TLSConfig{
|
|
CAFile: caFile,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
rr, err := probe(server.URL, "https", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// Check probe success
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_probe_success 1"); !ok {
|
|
t.Errorf("expected `ssl_probe_success 1`")
|
|
}
|
|
|
|
// Check prober metric
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_prober{prober=\"https\"} 1"); !ok {
|
|
t.Errorf("expected `ssl_prober{prober=\"https\"} 1`")
|
|
}
|
|
}
|
|
|
|
// TestProbeHandlerFail tests that the probe handler sets the ssl_probe_success and
|
|
// ssl_prober metrics correctly when the probe fails
|
|
func TestProbeHandlerFail(t *testing.T) {
|
|
rr, err := probe("localhost:6666", "", config.DefaultConfig)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// Check probe success
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_probe_success 0"); !ok {
|
|
t.Errorf("expected `ssl_probe_success 0`")
|
|
}
|
|
|
|
// Check prober metric
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_prober{prober=\"tcp\"} 1"); !ok {
|
|
t.Errorf("expected `ssl_prober{prober=\"tcp\"} 1`")
|
|
}
|
|
}
|
|
|
|
// TestProbeHandlerDefaultModule tests the default module is used correctly
|
|
func TestProbeHandlerDefaultModule(t *testing.T) {
|
|
server, _, _, caFile, teardown, err := test.SetupHTTPSServer()
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
defer teardown()
|
|
|
|
server.StartTLS()
|
|
defer server.Close()
|
|
|
|
conf := &config.Config{
|
|
DefaultModule: "https",
|
|
Modules: map[string]config.Module{
|
|
"tcp": config.Module{
|
|
Prober: "tcp",
|
|
TLSConfig: config.TLSConfig{
|
|
CAFile: caFile,
|
|
},
|
|
},
|
|
"https": config.Module{
|
|
Prober: "https",
|
|
TLSConfig: config.TLSConfig{
|
|
CAFile: caFile,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
rr, err := probe(server.URL, "", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// Should have used the https prober
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_prober{prober=\"https\"} 1"); !ok {
|
|
t.Errorf("expected `ssl_prober{prober=\"https\"} 1`")
|
|
}
|
|
|
|
conf.DefaultModule = ""
|
|
|
|
rr, err = probe(server.URL, "", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// It should fail when there's no default module
|
|
if rr.Code != http.StatusBadRequest {
|
|
t.Errorf("expected code: %d, got: %d", http.StatusBadRequest, rr.Code)
|
|
}
|
|
|
|
}
|
|
|
|
// TestProbeHandlerTarget tests the target module parameter is used correctly
|
|
func TestProbeHandlerDefaultTarget(t *testing.T) {
|
|
server, _, _, caFile, teardown, err := test.SetupHTTPSServer()
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
defer teardown()
|
|
|
|
server.StartTLS()
|
|
defer server.Close()
|
|
|
|
conf := &config.Config{
|
|
Modules: map[string]config.Module{
|
|
"https": config.Module{
|
|
Prober: "https",
|
|
Target: server.URL,
|
|
TLSConfig: config.TLSConfig{
|
|
CAFile: caFile,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Should use the target in the module configuration
|
|
rr, err := probe("", "https", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// Check probe success
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_probe_success 1"); !ok {
|
|
t.Errorf("expected `ssl_probe_success 1`")
|
|
}
|
|
|
|
// Check prober metric
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_prober{prober=\"https\"} 1"); !ok {
|
|
t.Errorf("expected `ssl_prober{prober=\"https\"} 1`")
|
|
}
|
|
|
|
// Should ignore a different target in the target parameter
|
|
rr, err = probe("localhost:6666", "https", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// Check probe success
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_probe_success 1"); !ok {
|
|
t.Errorf("expected `ssl_probe_success 1`")
|
|
}
|
|
|
|
// Check prober metric
|
|
if ok := strings.Contains(rr.Body.String(), "ssl_prober{prober=\"https\"} 1"); !ok {
|
|
t.Errorf("expected `ssl_prober{prober=\"https\"} 1`")
|
|
}
|
|
|
|
conf.Modules["tcp"] = config.Module{
|
|
Prober: "tcp",
|
|
TLSConfig: config.TLSConfig{
|
|
CAFile: caFile,
|
|
},
|
|
}
|
|
|
|
rr, err = probe("", "tcp", conf)
|
|
if err != nil {
|
|
t.Fatalf(err.Error())
|
|
}
|
|
|
|
// It should fail when there's no target in the module configuration or
|
|
// the query parameters
|
|
if rr.Code != http.StatusBadRequest {
|
|
t.Errorf("expected code: %d, got: %d", http.StatusBadRequest, rr.Code)
|
|
}
|
|
}
|
|
|
|
func probe(target, module string, conf *config.Config) (*httptest.ResponseRecorder, error) {
|
|
uri := "/probe?target=" + target
|
|
if module != "" {
|
|
uri = uri + "&module=" + module
|
|
}
|
|
req, err := http.NewRequest("GET", uri, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
rr := httptest.NewRecorder()
|
|
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
probeHandler(newTestLogger(), w, r, conf)
|
|
})
|
|
|
|
handler.ServeHTTP(rr, req)
|
|
|
|
return rr, nil
|
|
}
|
|
|
|
func newTestLogger() log.Logger {
|
|
return log.NewLogfmtLogger(log.NewSyncWriter(os.Stdout))
|
|
}
|