This is an automated email from the ASF dual-hosted git repository.

shreemaanabhishek pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix.git


The following commit(s) were added to refs/heads/master by this push:
     new fc5a9b0d7 ci: new test case for https health check (#10575)
fc5a9b0d7 is described below

commit fc5a9b0d7395aee2fe45d9a28427ac1f2179a3ab
Author: Sn0rt <[email protected]>
AuthorDate: Tue Dec 5 12:50:43 2023 +0800

    ci: new test case for https health check (#10575)
---
 t/node/healthcheck-https.t | 341 +++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 341 insertions(+)

diff --git a/t/node/healthcheck-https.t b/t/node/healthcheck-https.t
new file mode 100644
index 000000000..b1f7b7ba0
--- /dev/null
+++ b/t/node/healthcheck-https.t
@@ -0,0 +1,341 @@
+#
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#     http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+use t::APISIX 'no_plan';
+
+no_root_location();
+repeat_each(1);
+log_level('info');
+no_root_location();
+no_shuffle();
+
+add_block_preprocessor(sub {
+    my ($block) = @_;
+
+    if (!$block->http_config) {
+        my $http_config = <<'_EOC_';
+server {
+    listen 8765 ssl;
+    ssl_certificate ../../certs/mtls_server.crt;
+    ssl_certificate_key ../../certs/mtls_server.key;
+    ssl_client_certificate ../../certs/mtls_ca.crt;
+
+    location /ping {
+        return 200 '8765';
+    }
+
+    location /healthz {
+        return 200 'ok';
+    }
+}
+
+server {
+    listen 8766 ssl;
+    ssl_certificate ../../certs/mtls_server.crt;
+    ssl_certificate_key ../../certs/mtls_server.key;
+    ssl_client_certificate ../../certs/mtls_ca.crt;
+
+    location /ping {
+        return 200 '8766';
+    }
+
+    location /healthz {
+        return 500;
+    }
+}
+
+
+server {
+    listen 8767 ssl;
+    ssl_certificate ../../certs/mtls_server.crt;
+    ssl_certificate_key ../../certs/mtls_server.key;
+    ssl_client_certificate ../../certs/mtls_ca.crt;
+
+    location /ping {
+        return 200 '8766';
+    }
+
+    location /healthz {
+        return 200 'ok';
+    }
+}
+
+server {
+    listen 8768 ssl;
+    ssl_certificate ../../certs/mtls_server.crt;
+    ssl_certificate_key ../../certs/mtls_server.key;
+    ssl_client_certificate ../../certs/mtls_ca.crt;
+
+    location /ping {
+        return 200 '8766';
+    }
+
+    location /healthz {
+        return 500;
+    }
+}
+
+_EOC_
+        $block->set_value("http_config", $http_config);
+    }
+
+    if (!$block->request) {
+        $block->set_value("request", "GET /t");
+    }
+
+});
+
+run_tests;
+
+__DATA__
+
+=== TEST 1: https health check (two health nodes)
+--- config
+    location /t {
+        lua_ssl_trusted_certificate ../../certs/mtls_ca.crt;
+        content_by_lua_block {
+            local t = require("lib.test_admin")
+            local core = require("apisix.core")
+            local cert = t.read_file("t/certs/mtls_client.crt")
+            local key =  t.read_file("t/certs/mtls_client.key")
+            local data = {
+                uri = "/ping",
+                upstream = {
+                    scheme = "https",
+                    nodes = {
+                        ["127.0.0.1:8765"] = 1,
+                        ["127.0.0.1:8767"] = 1
+                    },
+                    tls = {
+                        client_cert = cert,
+                        client_key = key
+                    },
+                    retries = 2,
+                    checks = {
+                        active = {
+                            type = "https",
+                            http_path = "/healthz",
+                            https_verify_certificate = false,
+                            healthy = {
+                                interval = 1,
+                                successes = 1
+                            },
+                            unhealthy = {
+                                interval = 1,
+                                http_failures = 1
+                            },
+                        }
+                    }
+                }
+            }
+            local code, body = t.test('/apisix/admin/routes/1',
+                ngx.HTTP_PUT, core.json.encode(data))
+            if code >= 300 then
+                ngx.status = code
+                ngx.say(body)
+                return
+            end
+
+            local http = require("resty.http")
+            local httpc = http.new()
+            local uri = "http://127.0.0.1:"; .. ngx.var.server_port .. "/ping"
+            local _, _ = httpc:request_uri(uri, {method = "GET", keepalive = 
false})
+            ngx.sleep(0.5)
+
+            local healthcheck_uri = "http://127.0.0.1:"; .. ngx.var.server_port 
.. "/v1/healthcheck/routes/1"
+            local httpc = http.new()
+            local res, _ = httpc:request_uri(healthcheck_uri, {method = "GET", 
keepalive = false})
+            local json_data = core.json.decode(res.body)
+            assert(json_data.type == "https")
+            assert(#json_data.nodes == 2)
+
+            local function check_node_health(port, status)
+                for _, node in ipairs(json_data.nodes) do
+                    if node.port == port and node.status == status then
+                        return true
+                    end
+                end
+                return false
+            end
+
+            assert(check_node_health(8765, "healthy"), "Port 8765 is not 
healthy")
+            assert(check_node_health(8767, "healthy"), "Port 8767 is not 
healthy")
+        }
+    }
+--- request
+GET /t
+--- error_code: 200
+
+
+
+=== TEST 2: https health check (one healthy node, one unhealthy node)
+--- config
+    location /t {
+        lua_ssl_trusted_certificate ../../certs/mtls_ca.crt;
+        content_by_lua_block {
+            local t = require("lib.test_admin")
+            local core = require("apisix.core")
+            local cert = t.read_file("t/certs/mtls_client.crt")
+            local key =  t.read_file("t/certs/mtls_client.key")
+            local data = {
+                uri = "/ping",
+                upstream = {
+                    scheme = "https",
+                    nodes = {
+                        ["127.0.0.1:8765"] = 1,
+                        ["127.0.0.1:8766"] = 1
+                    },
+                    tls = {
+                        client_cert = cert,
+                        client_key = key
+                    },
+                    retries = 2,
+                    checks = {
+                        active = {
+                            type = "https",
+                            http_path = "/healthz",
+                            https_verify_certificate = false,
+                            healthy = {
+                                interval = 1,
+                                successes = 1
+                            },
+                            unhealthy = {
+                                interval = 1,
+                                http_failures = 1
+                            },
+                        }
+                    }
+                }
+            }
+            local code, body = t.test('/apisix/admin/routes/1',
+                ngx.HTTP_PUT, core.json.encode(data))
+            if code >= 300 then
+                ngx.status = code
+                ngx.say(body)
+                return
+            end
+
+            local http = require("resty.http")
+            local httpc = http.new()
+            local uri = "http://127.0.0.1:"; .. ngx.var.server_port .. "/ping"
+            local _, _ = httpc:request_uri(uri, {method = "GET", keepalive = 
false})
+            ngx.sleep(1.5)
+
+            local healthcheck_uri = "http://127.0.0.1:"; .. ngx.var.server_port 
.. "/v1/healthcheck/routes/1"
+            local httpc = http.new()
+            local res, _ = httpc:request_uri(healthcheck_uri, {method = "GET", 
keepalive = false})
+            local json_data = core.json.decode(res.body)
+            assert(json_data.type == "https")
+            assert(#json_data.nodes == 2)
+
+            local function check_node_health(port, status)
+                for _, node in ipairs(json_data.nodes) do
+                    if node.port == port and node.status == status then
+                        return true
+                    end
+                end
+                return false
+            end
+
+            assert(check_node_health(8765, "healthy"), "Port 8765 is not 
healthy")
+            assert(check_node_health(8766, "unhealthy"), "Port 8766 is not 
unhealthy")
+        }
+    }
+--- request
+GET /t
+--- grep_error_log eval
+qr/\([^)]+\) unhealthy .* for '.*'/
+--- grep_error_log_out
+(upstream#/apisix/routes/1) unhealthy HTTP increment (1/1) for 
'127.0.0.1(127.0.0.1:8766)'
+
+
+
+=== TEST 3: https health check (two unhealthy nodes)
+--- config
+    location /t {
+        lua_ssl_trusted_certificate ../../certs/mtls_ca.crt;
+        content_by_lua_block {
+            local t = require("lib.test_admin")
+            local core = require("apisix.core")
+            local cert = t.read_file("t/certs/mtls_client.crt")
+            local key =  t.read_file("t/certs/mtls_client.key")
+            local data = {
+                uri = "/ping",
+                upstream = {
+                    scheme = "https",
+                    nodes = {
+                        ["127.0.0.1:8766"] = 1,
+                        ["127.0.0.1:8768"] = 1
+                    },
+                    tls = {
+                        client_cert = cert,
+                        client_key = key
+                    },
+                    retries = 2,
+                    checks = {
+                        active = {
+                            type = "https",
+                            http_path = "/healthz",
+                            https_verify_certificate = false,
+                            healthy = {
+                                interval = 1,
+                                successes = 1
+                            },
+                            unhealthy = {
+                                interval = 1,
+                                http_failures = 1
+                            },
+                        }
+                    }
+                }
+            }
+            local code, body = t.test('/apisix/admin/routes/1',
+                ngx.HTTP_PUT, core.json.encode(data))
+            if code >= 300 then
+                ngx.status = code
+                ngx.say(body)
+                return
+            end
+
+            local http = require("resty.http")
+            local httpc = http.new()
+            local uri = "http://127.0.0.1:"; .. ngx.var.server_port .. "/ping"
+            local _, _ = httpc:request_uri(uri, {method = "GET", keepalive = 
false})
+            ngx.sleep(1.5)
+
+            local healthcheck_uri = "http://127.0.0.1:"; .. ngx.var.server_port 
.. "/v1/healthcheck/routes/1"
+            local httpc = http.new()
+            local res, _ = httpc:request_uri(healthcheck_uri, {method = "GET", 
keepalive = false})
+            local json_data = core.json.decode(res.body)
+            assert(json_data.type == "https")
+            assert(#json_data.nodes == 2)
+
+            local function check_node_health(port, status)
+                for _, node in ipairs(json_data.nodes) do
+                    if node.port == port and node.status == status then
+                        return true
+                    end
+                end
+                return false
+            end
+
+            assert(check_node_health(8766, "unhealthy"), "Port 8766 is not 
unhealthy")
+            assert(check_node_health(8768, "unhealthy"), "Port 8768 is not 
unhealthy")
+        }
+    }
+--- request
+GET /t
+--- error_code: 200

Reply via email to