This is an automated email from the ASF dual-hosted git repository.

starsz pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix-dashboard.git


The following commit(s) were added to refs/heads/master by this push:
     new ae116ae  feat: rewrite route with http logger plugin with ginkgo && 
fix: base.CleanAPISIXErrorLog api  (#1755)
ae116ae is described below

commit ae116ae1561a93026503cd21919b5ba48fa120ed
Author: Bisakh Mondal <[email protected]>
AuthorDate: Tue Apr 13 20:19:43 2021 +0530

    feat: rewrite route with http logger plugin with ginkgo && fix: 
base.CleanAPISIXErrorLog api  (#1755)
---
 api/test/e2e/route_with_plugin_http_logger_test.go | 201 -----------------
 api/test/e2enew/base/base.go                       |   5 +-
 .../route/route_with_plugin_http_logger_test.go    | 239 +++++++++++++++++++++
 3 files changed, 242 insertions(+), 203 deletions(-)

diff --git a/api/test/e2e/route_with_plugin_http_logger_test.go 
b/api/test/e2e/route_with_plugin_http_logger_test.go
deleted file mode 100644
index 137d962..0000000
--- a/api/test/e2e/route_with_plugin_http_logger_test.go
+++ /dev/null
@@ -1,201 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package e2e
-
-import (
-       "net/http"
-       "testing"
-       "time"
-
-       "github.com/stretchr/testify/assert"
-)
-
-func TestRoute_With_Log_Plugin(t *testing.T) {
-       // clean log
-       CleanAPISIXErrorLog(t)
-
-       tests := []HttpTestCase{
-               {
-                       Desc:         "make sure the route is not created ",
-                       Object:       APISIXExpect(t),
-                       Method:       http.MethodGet,
-                       Path:         "/hello_",
-                       ExpectStatus: http.StatusNotFound,
-                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
-               },
-               {
-                       Desc:   "create route",
-                       Object: ManagerApiExpect(t),
-                       Method: http.MethodPut,
-                       Path:   "/apisix/admin/routes/r1",
-                       Body: `{
-                               "name": "route1",
-                               "uri": "/hello_",
-                               "plugins": {
-                                       "http-logger": {
-                                               "uri": 
"http://172.16.238.20:1982/hello";,
-                                               "batch_max_size": 1,
-                                               "max_retry_count": 1,
-                                               "retry_delay": 2,
-                                               "buffer_duration": 2,
-                                               "inactive_timeout": 2,
-                                               "name": "http logger",
-                                               "timeout": 3,
-                                               "concat_method": "json"
-                                       }
-                               },
-                               "upstream": {
-                                       "type": "roundrobin",
-                                       "nodes": [{
-                                               "host": "172.16.238.20",
-                                               "port": 1981,
-                                               "weight": 1
-                                       }]
-                               }
-                       }`,
-                       Headers:      map[string]string{"Authorization": token},
-                       ExpectStatus: http.StatusOK,
-               },
-               {
-                       Desc:         "access route to trigger log",
-                       Object:       APISIXExpect(t),
-                       Method:       http.MethodGet,
-                       Path:         "/hello_",
-                       ExpectStatus: http.StatusOK,
-                       ExpectBody:   "hello world",
-                       Sleep:        sleepTime,
-               },
-       }
-
-       for _, tc := range tests {
-               testCaseCheck(tc, t)
-       }
-
-       // sleep for process log
-       time.Sleep(1500 * time.Millisecond)
-
-       // verify http logger by checking log
-       //todo: should use a fake upstream for confirming whether we got the 
log data.
-       logContent := ReadAPISIXErrorLog(t)
-       assert.Contains(t, logContent, "Batch Processor[http logger] 
successfully processed the entries")
-
-       // clean log
-       CleanAPISIXErrorLog(t)
-
-       tests = []HttpTestCase{
-               {
-                       Desc:   "create route with wrong https endpoint",
-                       Object: ManagerApiExpect(t),
-                       Method: http.MethodPut,
-                       Path:   "/apisix/admin/routes/r2",
-                       Body: `{
-                               "name": "route2",
-                               "uri": "/hello",
-                               "plugins": {
-                                       "http-logger": {
-                                               "uri": 
"https://127.0.0.1:8888/hello-world-http";,
-                                               "batch_max_size": 1,
-                                               "max_retry_count": 1,
-                                               "retry_delay": 2,
-                                               "buffer_duration": 2,
-                                               "inactive_timeout": 2,
-                                               "name": "http logger",
-                                               "timeout": 3,
-                                               "concat_method": "json"
-                                       }
-                               },
-                               "upstream": {
-                                       "type": "roundrobin",
-                                       "nodes": [{
-                                               "host": "172.16.238.20",
-                                               "port": 1982,
-                                               "weight": 1
-                                       }]
-                               }
-                       }`,
-                       Headers:      map[string]string{"Authorization": token},
-                       ExpectStatus: http.StatusOK,
-               },
-               {
-                       Desc:         "access route to trigger log",
-                       Object:       APISIXExpect(t),
-                       Method:       http.MethodGet,
-                       Path:         "/hello",
-                       ExpectStatus: http.StatusOK,
-                       ExpectBody:   "hello world",
-                       Sleep:        sleepTime,
-               },
-       }
-
-       for _, tc := range tests {
-               testCaseCheck(tc, t)
-       }
-
-       // sleep for process log
-       time.Sleep(1500 * time.Millisecond)
-
-       // verify http logger by checking log
-       //todo: should use a fake upstream for confirming whether we got the 
log data.
-       logContent = ReadAPISIXErrorLog(t)
-       assert.Contains(t, logContent, "Batch Processor[http logger] failed to 
process entries: failed to connect to host[127.0.0.1] port[8888] connection 
refused")
-
-       // clean log
-       CleanAPISIXErrorLog(t)
-
-       // todo: check disable http logger
-
-       tests = []HttpTestCase{
-               {
-                       Desc:         "delete route",
-                       Object:       ManagerApiExpect(t),
-                       Method:       http.MethodDelete,
-                       Path:         "/apisix/admin/routes/r1",
-                       Headers:      map[string]string{"Authorization": token},
-                       ExpectStatus: http.StatusOK,
-               },
-               {
-                       Desc:         "make sure the route has been deleted",
-                       Object:       APISIXExpect(t),
-                       Method:       http.MethodGet,
-                       Path:         "/hello_",
-                       ExpectStatus: http.StatusNotFound,
-                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
-                       Sleep:        sleepTime,
-               },
-               {
-                       Desc:         "delete route 2",
-                       Object:       ManagerApiExpect(t),
-                       Method:       http.MethodDelete,
-                       Path:         "/apisix/admin/routes/r2",
-                       Headers:      map[string]string{"Authorization": token},
-                       ExpectStatus: http.StatusOK,
-               },
-               {
-                       Desc:         "make sure the route 2 has been deleted",
-                       Object:       APISIXExpect(t),
-                       Method:       http.MethodGet,
-                       Path:         "/hello",
-                       ExpectStatus: http.StatusNotFound,
-                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
-                       Sleep:        sleepTime,
-               },
-       }
-
-       for _, tc := range tests {
-               testCaseCheck(tc, t)
-       }
-}
diff --git a/api/test/e2enew/base/base.go b/api/test/e2enew/base/base.go
index 6fa319c..60fbcaa 100644
--- a/api/test/e2enew/base/base.go
+++ b/api/test/e2enew/base/base.go
@@ -248,8 +248,9 @@ func CleanAPISIXErrorLog() {
        pwd := string(pwdByte)
        pwd = strings.Replace(pwd, "\n", "", 1)
        pwd = pwd[:strings.Index(pwd, "/e2e")]
-       cmd = exec.Command("sudo", "echo", " > ", 
pwd+"/docker/apisix_logs/error.log")
-       _, err = cmd.CombinedOutput()
+       cmdStr := "echo | sudo tee " + pwd + "/docker/apisix_logs/error.log"
+       cmd = exec.Command("bash", "-c", cmdStr)
+       _, err = cmd.Output()
        if err != nil {
                fmt.Println("cmd error:", err.Error())
        }
diff --git a/api/test/e2enew/route/route_with_plugin_http_logger_test.go 
b/api/test/e2enew/route/route_with_plugin_http_logger_test.go
new file mode 100644
index 0000000..faddf1b
--- /dev/null
+++ b/api/test/e2enew/route/route_with_plugin_http_logger_test.go
@@ -0,0 +1,239 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package route
+
+import (
+       "net/http"
+       "time"
+
+       "github.com/onsi/ginkgo"
+       "github.com/onsi/ginkgo/extensions/table"
+       "github.com/onsi/gomega"
+
+       "github.com/apisix/manager-api/test/e2enew/base"
+)
+
+var _ = ginkgo.Describe("route with plugin http logger", func() {
+       ginkgo.It("cleanup previous error logs", func() {
+               base.CleanAPISIXErrorLog()
+       })
+
+       table.DescribeTable("test route with http logger plugin",
+               func(tc base.HttpTestCase) {
+                       base.RunTestCase(tc)
+               },
+               table.Entry("make sure the route is not created ", 
base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello_",
+                       ExpectStatus: http.StatusNotFound,
+                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
+               }),
+               table.Entry("create route", base.HttpTestCase{
+                       Object: base.ManagerApiExpect(),
+                       Method: http.MethodPut,
+                       Path:   "/apisix/admin/routes/r1",
+                       Body: `{
+                               "name": "route1",
+                               "uri": "/hello_",
+                               "plugins": {
+                                       "http-logger": {
+                                               "uri": 
"http://172.16.238.20:1982/hello";,
+                                               "batch_max_size": 1,
+                                               "max_retry_count": 1,
+                                               "retry_delay": 2,
+                                               "buffer_duration": 2,
+                                               "inactive_timeout": 2,
+                                               "name": "http logger",
+                                               "timeout": 3,
+                                               "concat_method": "json"
+                                       }
+                               },
+                               "upstream": {
+                                       "type": "roundrobin",
+                                       "nodes": {
+                                                       "` + base.UpstreamIp + 
`:1981": 1
+                                               }
+                               }
+                       }`,
+                       Headers:      map[string]string{"Authorization": 
base.GetToken()},
+                       ExpectBody:   []string{`"code":0`, `"id":"r1"`, 
`"uri":"/hello_"`, `"name":"route1"`, `"name":"http logger"`},
+                       ExpectStatus: http.StatusOK,
+               }),
+               table.Entry("access route to trigger log", base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello_",
+                       ExpectStatus: http.StatusOK,
+                       ExpectBody:   "hello world",
+                       Sleep:        base.SleepTime,
+               }),
+       )
+
+       ginkgo.It("verify http logger by checking log", func() {
+               // sleep for process log
+               time.Sleep(1500 * time.Millisecond)
+
+               // verify http logger by checking log
+               //todo: should use a fake upstream for confirming whether we 
got the log data.
+               logContent := base.ReadAPISIXErrorLog()
+               gomega.Expect(logContent).Should(gomega.ContainSubstring("Batch 
Processor[http logger] successfully processed the entries"))
+
+               // clean log
+               base.CleanAPISIXErrorLog()
+       })
+
+       table.DescribeTable("test route for unreachable logger uri",
+               func(tc base.HttpTestCase) {
+                       base.RunTestCase(tc)
+               },
+               table.Entry("create route with wrong https endpoint", 
base.HttpTestCase{
+                       Object: base.ManagerApiExpect(),
+                       Method: http.MethodPut,
+                       Path:   "/apisix/admin/routes/r2",
+                       Body: `{
+                               "name": "route2",
+                               "uri": "/hello",
+                               "plugins": {
+                                       "http-logger": {
+                                               "uri": 
"https://127.0.0.1:8888/hello-world-http";,
+                                               "batch_max_size": 1,
+                                               "max_retry_count": 1,
+                                               "retry_delay": 2,
+                                               "buffer_duration": 2,
+                                               "inactive_timeout": 2,
+                                               "name": "http logger",
+                                               "timeout": 3,
+                                               "concat_method": "json"
+                                       }
+                               },
+                               "upstream": {
+                                       "type": "roundrobin",
+                                       "nodes": {
+                                                       "` + base.UpstreamIp + 
`:1982": 1
+                                               }
+                               }
+                       }`,
+                       Headers:      map[string]string{"Authorization": 
base.GetToken()},
+                       ExpectBody:   []string{`"code":0`, `"id":"r2"`, 
`"uri":"/hello"`, `"name":"route2"`, `"name":"http logger"`},
+                       ExpectStatus: http.StatusOK,
+               }),
+               table.Entry("access route to trigger log", base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello",
+                       ExpectStatus: http.StatusOK,
+                       ExpectBody:   "hello world",
+                       Sleep:        base.SleepTime,
+               }),
+       )
+
+       ginkgo.It("verify http logger by checking log for second route", func() 
{
+               // sleep for process log
+               time.Sleep(1500 * time.Millisecond)
+
+               // verify http logger by checking log
+               //todo: should use a fake upstream for confirming whether we 
got the log data.
+               logContent := base.ReadAPISIXErrorLog()
+               gomega.Expect(logContent).Should(gomega.ContainSubstring("Batch 
Processor[http logger] failed to process entries: failed to connect to 
host[127.0.0.1] port[8888] connection refused"))
+
+               // clean log
+               base.CleanAPISIXErrorLog()
+       })
+
+       // todo: check disable http logger - Done
+       table.DescribeTable("rechecking logger after disabling plugin",
+               func(tc base.HttpTestCase) {
+                       base.RunTestCase(tc)
+               },
+               table.Entry("disable route http logger plugin", 
base.HttpTestCase{
+                       Object: base.ManagerApiExpect(),
+                       Method: http.MethodPut,
+                       Path:   "/apisix/admin/routes/r2",
+                       Body: `{
+                               "name": "route2",
+                               "uri": "/hello",
+                               "plugins": {},
+                               "upstream": {
+                                       "type": "roundrobin",
+                                       "nodes": {
+                                                       "` + base.UpstreamIp + 
`:1982": 1
+                                               }
+                               }
+                       }`,
+                       Headers:      map[string]string{"Authorization": 
base.GetToken()},
+                       ExpectBody:   []string{`"code":0`, `"id":"r2"`, 
`"uri":"/hello"`, `"name":"route2"`},
+                       ExpectStatus: http.StatusOK,
+               }),
+               table.Entry("access route to trigger log (though should not be 
triggered)", base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello",
+                       ExpectStatus: http.StatusOK,
+                       ExpectBody:   "hello world",
+                       Sleep:        base.SleepTime,
+               }),
+       )
+
+       ginkgo.It("verify http logger has been successfully disabled", func() {
+               // sleep for process log
+               time.Sleep(1500 * time.Millisecond)
+
+               // verify http logger by checking log
+               logContent := base.ReadAPISIXErrorLog()
+               
gomega.Expect(logContent).ShouldNot(gomega.ContainSubstring("Batch 
Processor[http logger] successfully processed the entries"))
+
+               // clean log
+               base.CleanAPISIXErrorLog()
+       })
+
+       table.DescribeTable("cleanup test data",
+               func(tc base.HttpTestCase) {
+                       base.RunTestCase(tc)
+               },
+               table.Entry("delete route", base.HttpTestCase{
+                       Object:       base.ManagerApiExpect(),
+                       Method:       http.MethodDelete,
+                       Path:         "/apisix/admin/routes/r1",
+                       Headers:      map[string]string{"Authorization": 
base.GetToken()},
+                       ExpectStatus: http.StatusOK,
+               }),
+               table.Entry("make sure the route has been deleted", 
base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello_",
+                       ExpectStatus: http.StatusNotFound,
+                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
+                       Sleep:        base.SleepTime,
+               }),
+               table.Entry("delete route 2", base.HttpTestCase{
+                       Object:       base.ManagerApiExpect(),
+                       Method:       http.MethodDelete,
+                       Path:         "/apisix/admin/routes/r2",
+                       Headers:      map[string]string{"Authorization": 
base.GetToken()},
+                       ExpectStatus: http.StatusOK,
+               }),
+               table.Entry("make sure the route 2 has been deleted", 
base.HttpTestCase{
+                       Object:       base.APISIXExpect(),
+                       Method:       http.MethodGet,
+                       Path:         "/hello",
+                       ExpectStatus: http.StatusNotFound,
+                       ExpectBody:   `{"error_msg":"404 Route Not Found"}`,
+                       Sleep:        base.SleepTime,
+               }),
+       )
+})

Reply via email to