2014-10-28 00:16:19 +01:00
|
|
|
package configuration
|
|
|
|
|
|
|
|
import (
|
2014-12-02 02:32:31 +01:00
|
|
|
"bytes"
|
2014-10-28 00:16:19 +01:00
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
. "gopkg.in/check.v1"
|
2014-12-02 02:32:31 +01:00
|
|
|
"gopkg.in/yaml.v2"
|
2014-10-28 00:16:19 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Hook up gocheck into the "go test" runner
|
|
|
|
func Test(t *testing.T) { TestingT(t) }
|
|
|
|
|
2014-11-18 00:44:07 +01:00
|
|
|
// configStruct is a canonical example configuration, which should map to configYamlV0_1
|
2014-10-28 00:16:19 +01:00
|
|
|
var configStruct = Configuration{
|
2014-11-04 18:41:32 +01:00
|
|
|
Version: "0.1",
|
|
|
|
Loglevel: "info",
|
|
|
|
Storage: Storage{
|
|
|
|
"s3": Parameters{
|
|
|
|
"region": "us-east-1",
|
|
|
|
"bucket": "my-bucket",
|
|
|
|
"rootpath": "/registry",
|
|
|
|
"encrypt": "true",
|
|
|
|
"secure": "false",
|
|
|
|
"accesskey": "SAMPLEACCESSKEY",
|
|
|
|
"secretkey": "SUPERSECRET",
|
|
|
|
"host": "",
|
|
|
|
"port": "",
|
2014-10-28 00:16:19 +01:00
|
|
|
},
|
|
|
|
},
|
2014-12-13 03:05:37 +01:00
|
|
|
Reporting: Reporting{
|
|
|
|
Bugsnag: BugsnagReporting{
|
|
|
|
APIKey: "BugsnagApiKey",
|
|
|
|
},
|
|
|
|
},
|
2014-10-28 00:16:19 +01:00
|
|
|
}
|
|
|
|
|
2014-11-18 00:44:07 +01:00
|
|
|
// configYamlV0_1 is a Version 0.1 yaml document representing configStruct
|
|
|
|
var configYamlV0_1 = `
|
2014-10-28 00:16:19 +01:00
|
|
|
version: 0.1
|
2014-11-04 18:41:32 +01:00
|
|
|
loglevel: info
|
|
|
|
storage:
|
|
|
|
s3:
|
|
|
|
region: us-east-1
|
|
|
|
bucket: my-bucket
|
|
|
|
rootpath: /registry
|
|
|
|
encrypt: true
|
|
|
|
secure: false
|
|
|
|
accesskey: SAMPLEACCESSKEY
|
|
|
|
secretkey: SUPERSECRET
|
|
|
|
host: ~
|
|
|
|
port: ~
|
2014-12-13 03:05:37 +01:00
|
|
|
reporting:
|
|
|
|
bugsnag:
|
|
|
|
apikey: BugsnagApiKey
|
2014-11-04 18:41:32 +01:00
|
|
|
`
|
2014-10-28 00:16:19 +01:00
|
|
|
|
2014-11-18 00:44:07 +01:00
|
|
|
// inmemoryConfigYamlV0_1 is a Version 0.1 yaml document specifying an inmemory storage driver with
|
2014-11-04 18:41:32 +01:00
|
|
|
// no parameters
|
2014-11-18 00:44:07 +01:00
|
|
|
var inmemoryConfigYamlV0_1 = `
|
2014-11-04 18:41:32 +01:00
|
|
|
version: 0.1
|
|
|
|
loglevel: info
|
|
|
|
storage: inmemory
|
2014-10-28 00:16:19 +01:00
|
|
|
`
|
|
|
|
|
|
|
|
type ConfigSuite struct {
|
|
|
|
expectedConfig *Configuration
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = Suite(new(ConfigSuite))
|
|
|
|
|
|
|
|
func (suite *ConfigSuite) SetUpTest(c *C) {
|
|
|
|
os.Clearenv()
|
|
|
|
suite.expectedConfig = copyConfig(configStruct)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestMarshalRoundtrip validates that configStruct can be marshaled and unmarshaled without
|
|
|
|
// changing any parameters
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestMarshalRoundtrip(c *C) {
|
|
|
|
configBytes, err := yaml.Marshal(suite.expectedConfig)
|
|
|
|
c.Assert(err, IsNil)
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader(configBytes))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-11-18 00:44:07 +01:00
|
|
|
// TestParseSimple validates that configYamlV0_1 can be parsed into a struct matching configStruct
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseSimple(c *C) {
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-11-04 18:41:32 +01:00
|
|
|
// TestParseInmemory validates that configuration yaml with storage provided as a string can be
|
|
|
|
// parsed into a Configuration struct with no storage parameters
|
|
|
|
func (suite *ConfigSuite) TestParseInmemory(c *C) {
|
|
|
|
suite.expectedConfig.Storage = Storage{"inmemory": Parameters{}}
|
2014-12-13 03:05:37 +01:00
|
|
|
suite.expectedConfig.Reporting = Reporting{}
|
2014-11-04 18:41:32 +01:00
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(inmemoryConfigYamlV0_1)))
|
2014-11-04 18:41:32 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithSameEnvStorage validates that providing environment variables that match the given
|
|
|
|
// storage type and parameters will not alter the parsed Configuration struct
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithSameEnvStorage(c *C) {
|
|
|
|
os.Setenv("REGISTRY_STORAGE", "s3")
|
|
|
|
os.Setenv("REGISTRY_STORAGE_S3_REGION", "us-east-1")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithDifferentEnvStorageParams validates that providing environment variables that change
|
|
|
|
// and add to the given storage parameters will change and add parameters to the parsed
|
|
|
|
// Configuration struct
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithDifferentEnvStorageParams(c *C) {
|
2014-11-04 18:41:32 +01:00
|
|
|
suite.expectedConfig.Storage.setParameter("region", "us-west-1")
|
|
|
|
suite.expectedConfig.Storage.setParameter("secure", "true")
|
|
|
|
suite.expectedConfig.Storage.setParameter("newparam", "some Value")
|
2014-10-28 00:16:19 +01:00
|
|
|
|
|
|
|
os.Setenv("REGISTRY_STORAGE_S3_REGION", "us-west-1")
|
|
|
|
os.Setenv("REGISTRY_STORAGE_S3_SECURE", "true")
|
|
|
|
os.Setenv("REGISTRY_STORAGE_S3_NEWPARAM", "some Value")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithDifferentEnvStorageType validates that providing an environment variable that
|
|
|
|
// changes the storage type will be reflected in the parsed Configuration struct
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithDifferentEnvStorageType(c *C) {
|
2014-11-04 18:41:32 +01:00
|
|
|
suite.expectedConfig.Storage = Storage{"inmemory": Parameters{}}
|
2014-10-28 00:16:19 +01:00
|
|
|
|
|
|
|
os.Setenv("REGISTRY_STORAGE", "inmemory")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithDifferentEnvStorageTypeAndParams validates that providing an environment variable
|
|
|
|
// that changes the storage type will be reflected in the parsed Configuration struct and that
|
|
|
|
// environment storage parameters will also be included
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithDifferentEnvStorageTypeAndParams(c *C) {
|
2014-11-04 18:41:32 +01:00
|
|
|
suite.expectedConfig.Storage = Storage{"filesystem": Parameters{}}
|
|
|
|
suite.expectedConfig.Storage.setParameter("rootdirectory", "/tmp/testroot")
|
2014-10-28 00:16:19 +01:00
|
|
|
|
|
|
|
os.Setenv("REGISTRY_STORAGE", "filesystem")
|
|
|
|
os.Setenv("REGISTRY_STORAGE_FILESYSTEM_ROOTDIRECTORY", "/tmp/testroot")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithSameEnvLoglevel validates that providing an environment variable defining the log
|
|
|
|
// level to the same as the one provided in the yaml will not change the parsed Configuration struct
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithSameEnvLoglevel(c *C) {
|
|
|
|
os.Setenv("REGISTRY_LOGLEVEL", "info")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseWithDifferentEnvLoglevel validates that providing an environment variable defining the
|
|
|
|
// log level will override the value provided in the yaml document
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithDifferentEnvLoglevel(c *C) {
|
2014-11-04 18:41:32 +01:00
|
|
|
suite.expectedConfig.Loglevel = "error"
|
2014-10-28 00:16:19 +01:00
|
|
|
|
|
|
|
os.Setenv("REGISTRY_LOGLEVEL", "error")
|
|
|
|
|
2014-12-02 02:32:31 +01:00
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-12-13 03:05:37 +01:00
|
|
|
func (suite *ConfigSuite) TestParseWithDifferentEnvReporting(c *C) {
|
|
|
|
suite.expectedConfig.Reporting.Bugsnag.APIKey = "anotherBugsnagApiKey"
|
|
|
|
suite.expectedConfig.Reporting.Bugsnag.Endpoint = "localhost:8080"
|
|
|
|
suite.expectedConfig.Reporting.NewRelic.LicenseKey = "NewRelicLicenseKey"
|
|
|
|
suite.expectedConfig.Reporting.NewRelic.Name = "some NewRelic NAME"
|
|
|
|
|
|
|
|
os.Setenv("REGISTRY_REPORTING_BUGSNAG_APIKEY", "anotherBugsnagApiKey")
|
|
|
|
os.Setenv("REGISTRY_REPORTING_BUGSNAG_ENDPOINT", "localhost:8080")
|
|
|
|
os.Setenv("REGISTRY_REPORTING_NEWRELIC_LICENSEKEY", "NewRelicLicenseKey")
|
|
|
|
os.Setenv("REGISTRY_REPORTING_NEWRELIC_NAME", "some NewRelic NAME")
|
|
|
|
|
|
|
|
config, err := Parse(bytes.NewReader([]byte(configYamlV0_1)))
|
|
|
|
c.Assert(err, IsNil)
|
|
|
|
c.Assert(config, DeepEquals, suite.expectedConfig)
|
|
|
|
}
|
|
|
|
|
2014-10-30 01:42:23 +01:00
|
|
|
// TestParseInvalidVersion validates that the parser will fail to parse a newer configuration
|
|
|
|
// version than the CurrentVersion
|
2014-10-28 00:16:19 +01:00
|
|
|
func (suite *ConfigSuite) TestParseInvalidVersion(c *C) {
|
2014-11-04 18:41:32 +01:00
|
|
|
suite.expectedConfig.Version = MajorMinorVersion(CurrentVersion.Major(), CurrentVersion.Minor()+1)
|
2014-10-28 00:16:19 +01:00
|
|
|
configBytes, err := yaml.Marshal(suite.expectedConfig)
|
|
|
|
c.Assert(err, IsNil)
|
2014-12-02 02:32:31 +01:00
|
|
|
_, err = Parse(bytes.NewReader(configBytes))
|
2014-10-28 00:16:19 +01:00
|
|
|
c.Assert(err, NotNil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func copyConfig(config Configuration) *Configuration {
|
|
|
|
configCopy := new(Configuration)
|
|
|
|
|
2014-11-04 18:41:32 +01:00
|
|
|
configCopy.Version = MajorMinorVersion(config.Version.Major(), config.Version.Minor())
|
|
|
|
configCopy.Loglevel = config.Loglevel
|
|
|
|
configCopy.Storage = Storage{config.Storage.Type(): Parameters{}}
|
|
|
|
for k, v := range config.Storage.Parameters() {
|
|
|
|
configCopy.Storage.setParameter(k, v)
|
2014-10-28 00:16:19 +01:00
|
|
|
}
|
2014-12-13 03:05:37 +01:00
|
|
|
configCopy.Reporting = Reporting{
|
|
|
|
Bugsnag: BugsnagReporting{config.Reporting.Bugsnag.APIKey, config.Reporting.Bugsnag.ReleaseStage, config.Reporting.Bugsnag.Endpoint},
|
|
|
|
NewRelic: NewRelicReporting{config.Reporting.NewRelic.LicenseKey, config.Reporting.NewRelic.Name},
|
|
|
|
}
|
2014-10-28 00:16:19 +01:00
|
|
|
|
|
|
|
return configCopy
|
|
|
|
}
|