mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-01 20:43:43 +01:00
240 lines
6.2 KiB
Go
240 lines
6.2 KiB
Go
|
package metrics
|
||
|
|
||
|
import (
|
||
|
"testing"
|
||
|
|
||
|
nbdns "github.com/netbirdio/netbird/dns"
|
||
|
"github.com/netbirdio/netbird/management/server"
|
||
|
"github.com/netbirdio/netbird/route"
|
||
|
)
|
||
|
|
||
|
type mockDatasource struct{}
|
||
|
|
||
|
// GetAllConnectedPeers returns a map of connected peer IDs for use in tests with predefined information
|
||
|
func (mockDatasource) GetAllConnectedPeers() map[string]struct{} {
|
||
|
return map[string]struct{}{
|
||
|
"1": {},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// GetAllAccounts returns a list of *server.Account for use in tests with predefined information
|
||
|
func (mockDatasource) GetAllAccounts() []*server.Account {
|
||
|
return []*server.Account{
|
||
|
{
|
||
|
Id: "1",
|
||
|
Settings: &server.Settings{PeerLoginExpirationEnabled: true},
|
||
|
SetupKeys: map[string]*server.SetupKey{
|
||
|
"1": {
|
||
|
Id: "1",
|
||
|
Ephemeral: true,
|
||
|
UsedTimes: 1,
|
||
|
},
|
||
|
},
|
||
|
Groups: map[string]*server.Group{
|
||
|
"1": {},
|
||
|
"2": {},
|
||
|
},
|
||
|
NameServerGroups: map[string]*nbdns.NameServerGroup{
|
||
|
"1": {},
|
||
|
},
|
||
|
Peers: map[string]*server.Peer{
|
||
|
"1": {
|
||
|
ID: "1",
|
||
|
UserID: "test",
|
||
|
SSHEnabled: true,
|
||
|
Meta: server.PeerSystemMeta{GoOS: "linux", WtVersion: "0.0.1"},
|
||
|
},
|
||
|
},
|
||
|
Policies: []*server.Policy{
|
||
|
{
|
||
|
Rules: []*server.PolicyRule{
|
||
|
{
|
||
|
Bidirectional: true,
|
||
|
Protocol: server.PolicyRuleProtocolTCP,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
Rules: []*server.PolicyRule{
|
||
|
{
|
||
|
Bidirectional: false,
|
||
|
Protocol: server.PolicyRuleProtocolTCP,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
Routes: map[string]*route.Route{
|
||
|
"1": {
|
||
|
ID: "1",
|
||
|
PeerGroups: make([]string, 1),
|
||
|
},
|
||
|
},
|
||
|
Users: map[string]*server.User{
|
||
|
"1": {
|
||
|
IsServiceUser: true,
|
||
|
PATs: map[string]*server.PersonalAccessToken{
|
||
|
"1": {},
|
||
|
},
|
||
|
},
|
||
|
"2": {
|
||
|
IsServiceUser: false,
|
||
|
PATs: map[string]*server.PersonalAccessToken{
|
||
|
"1": {},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
Id: "2",
|
||
|
Settings: &server.Settings{PeerLoginExpirationEnabled: true},
|
||
|
SetupKeys: map[string]*server.SetupKey{
|
||
|
"1": {
|
||
|
Id: "1",
|
||
|
Ephemeral: true,
|
||
|
UsedTimes: 1,
|
||
|
},
|
||
|
},
|
||
|
Groups: map[string]*server.Group{
|
||
|
"1": {},
|
||
|
"2": {},
|
||
|
},
|
||
|
NameServerGroups: map[string]*nbdns.NameServerGroup{
|
||
|
"1": {},
|
||
|
},
|
||
|
Peers: map[string]*server.Peer{
|
||
|
"1": {
|
||
|
ID: "1",
|
||
|
UserID: "test",
|
||
|
SSHEnabled: true,
|
||
|
Meta: server.PeerSystemMeta{GoOS: "linux", WtVersion: "0.0.1"},
|
||
|
},
|
||
|
},
|
||
|
Policies: []*server.Policy{
|
||
|
{
|
||
|
Rules: []*server.PolicyRule{
|
||
|
{
|
||
|
Bidirectional: true,
|
||
|
Protocol: server.PolicyRuleProtocolTCP,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
Rules: []*server.PolicyRule{
|
||
|
{
|
||
|
Bidirectional: false,
|
||
|
Protocol: server.PolicyRuleProtocolTCP,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
Routes: map[string]*route.Route{
|
||
|
"1": {
|
||
|
ID: "1",
|
||
|
PeerGroups: make([]string, 1),
|
||
|
},
|
||
|
},
|
||
|
Users: map[string]*server.User{
|
||
|
"1": {
|
||
|
IsServiceUser: true,
|
||
|
PATs: map[string]*server.PersonalAccessToken{
|
||
|
"1": {},
|
||
|
},
|
||
|
},
|
||
|
"2": {
|
||
|
IsServiceUser: false,
|
||
|
PATs: map[string]*server.PersonalAccessToken{
|
||
|
"1": {},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TestGenerateProperties tests and validate the properties generation by using the mockDatasource for the Worker.generateProperties
|
||
|
func TestGenerateProperties(t *testing.T) {
|
||
|
ds := mockDatasource{}
|
||
|
worker := Worker{
|
||
|
dataSource: ds,
|
||
|
connManager: ds,
|
||
|
}
|
||
|
|
||
|
properties := worker.generateProperties()
|
||
|
|
||
|
if properties["accounts"] != 2 {
|
||
|
t.Errorf("expected 2 accounts, got %d", properties["accounts"])
|
||
|
}
|
||
|
if properties["peers"] != 2 {
|
||
|
t.Errorf("expected 2 peers, got %d", properties["peers"])
|
||
|
}
|
||
|
if properties["routes"] != 2 {
|
||
|
t.Errorf("expected 2 routes, got %d", properties["routes"])
|
||
|
}
|
||
|
if properties["rules"] != 4 {
|
||
|
t.Errorf("expected 4 rules, got %d", properties["rules"])
|
||
|
}
|
||
|
if properties["users"] != 2 {
|
||
|
t.Errorf("expected 1 users, got %d", properties["users"])
|
||
|
}
|
||
|
if properties["setup_keys_usage"] != 2 {
|
||
|
t.Errorf("expected 1 setup_keys_usage, got %d", properties["setup_keys_usage"])
|
||
|
}
|
||
|
if properties["pats"] != 4 {
|
||
|
t.Errorf("expected 4 personal_access_tokens, got %d", properties["pats"])
|
||
|
}
|
||
|
if properties["peers_ssh_enabled"] != 2 {
|
||
|
t.Errorf("expected 2 peers_ssh_enabled, got %d", properties["peers_ssh_enabled"])
|
||
|
}
|
||
|
if properties["routes_with_routing_groups"] != 2 {
|
||
|
t.Errorf("expected 2 routes_with_routing_groups, got %d", properties["routes_with_routing_groups"])
|
||
|
}
|
||
|
if properties["rules_protocol_tcp"] != 4 {
|
||
|
t.Errorf("expected 4 rules_protocol_tcp, got %d", properties["rules_protocol_tcp"])
|
||
|
}
|
||
|
if properties["rules_direction_oneway"] != 2 {
|
||
|
t.Errorf("expected 2 rules_direction_oneway, got %d", properties["rules_direction_oneway"])
|
||
|
}
|
||
|
|
||
|
if properties["active_peers_last_day"] != 2 {
|
||
|
t.Errorf("expected 2 active_peers_last_day, got %d", properties["active_peers_last_day"])
|
||
|
}
|
||
|
if properties["min_active_peer_version"] != "0.0.1" {
|
||
|
t.Errorf("expected 0.0.1 min_active_peer_version, got %s", properties["min_active_peer_version"])
|
||
|
}
|
||
|
if properties["max_active_peer_version"] != "0.0.1" {
|
||
|
t.Errorf("expected 0.0.1 max_active_peer_version, got %s", properties["max_active_peer_version"])
|
||
|
}
|
||
|
|
||
|
if properties["peers_login_expiration_enabled"] != 2 {
|
||
|
t.Errorf("expected 2 peers_login_expiration_enabled, got %d", properties["peers_login_expiration_enabled"])
|
||
|
}
|
||
|
|
||
|
if properties["service_users"] != 2 {
|
||
|
t.Errorf("expected 2 service_users, got %d", properties["service_users"])
|
||
|
}
|
||
|
|
||
|
if properties["peer_os_linux"] != 2 {
|
||
|
t.Errorf("expected 2 peer_os_linux, got %d", properties["peer_os_linux"])
|
||
|
}
|
||
|
|
||
|
if properties["ephemeral_peers_setup_keys"] != 2 {
|
||
|
t.Errorf("expected 2 ephemeral_peers_setup_keys, got %d", properties["ephemeral_peers_setup_keys_usage"])
|
||
|
}
|
||
|
|
||
|
if properties["ephemeral_peers_setup_keys_usage"] != 2 {
|
||
|
t.Errorf("expected 2 ephemeral_peers_setup_keys_usage, got %d", properties["ephemeral_peers_setup_keys_usage"])
|
||
|
}
|
||
|
|
||
|
if properties["nameservers"] != 2 {
|
||
|
t.Errorf("expected 2 nameservers, got %d", properties["nameservers"])
|
||
|
}
|
||
|
|
||
|
if properties["groups"] != 4 {
|
||
|
t.Errorf("expected 4 groups, got %d", properties["groups"])
|
||
|
}
|
||
|
|
||
|
if properties["user_peers"] != 2 {
|
||
|
t.Errorf("expected 2 user_peers, got %d", properties["user_peers"])
|
||
|
}
|
||
|
}
|