blob: 3df48362469d05b96571385db0f52eb3a46a7ad0 [file] [log] [blame]
// Copyright 2019 The LUCI Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package server
import (
"context"
"encoding/json"
"fmt"
"io/ioutil"
"net"
"net/http"
"net/http/httptest"
"os"
"path/filepath"
"runtime"
"strings"
"sync"
"sync/atomic"
"testing"
"time"
"go.chromium.org/luci/gae/impl/memory"
"go.chromium.org/luci/gae/service/datastore"
"go.chromium.org/luci/common/clock/testclock"
"go.chromium.org/luci/common/errors"
"go.chromium.org/luci/common/logging"
"go.chromium.org/luci/common/logging/sdlogger"
"go.chromium.org/luci/lucictx"
clientauth "go.chromium.org/luci/auth"
clientauthtest "go.chromium.org/luci/auth/integration/authtest"
"go.chromium.org/luci/auth/integration/localauth"
"go.chromium.org/luci/server/auth"
"go.chromium.org/luci/server/auth/authdb"
"go.chromium.org/luci/server/auth/authtest"
"go.chromium.org/luci/server/auth/signing"
"go.chromium.org/luci/server/experiments"
"go.chromium.org/luci/server/module"
"go.chromium.org/luci/server/router"
. "github.com/smartystreets/goconvey/convey"
. "go.chromium.org/luci/common/testing/assertions"
)
var fakeUser = &auth.User{
Identity: "user:a@example.com",
Email: "a@example.com",
}
var fakeAuthDB = authtest.NewFakeDB(
authtest.MockMembership("user:a@example.com", "group-1"),
authtest.MockMembership("user:a@example.com", "group-2"),
)
var testExperiment = experiments.Register("test-experiment")
const (
testServerAccountEmail = "fake-email@example.com"
testCloudProjectID = "cloud-project-id"
testImageVersion = "v123"
)
func TestServer(t *testing.T) {
t.Parallel()
Convey("Works", t, func() {
ctx, tc := testclock.UseTime(context.Background(), testclock.TestRecentTimeUTC)
srv, err := newTestServer(ctx, nil)
So(err, ShouldBeNil)
defer srv.cleanup()
Reset(func() { So(srv.StopBackgroundServing(), ShouldBeNil) })
Convey("VirtualHost", func() {
srv.Routes.GET("/test", nil, func(c *router.Context) {
c.Writer.Write([]byte("default-router"))
})
srv.VirtualHost("test-host.example.com").GET("/test", nil, func(c *router.Context) {
c.Writer.Write([]byte("test-host-router"))
})
srv.ServeInBackground()
// Requests with unknown Host header go to the default router.
resp, err := srv.GetMain("/test", map[string]string{
"Host": "unknown.example.com",
})
So(err, ShouldBeNil)
So(resp, ShouldEqual, "default-router")
// Requests with NO Host header go to the default router as well.
resp, err = srv.GetMain("/test", map[string]string{})
So(err, ShouldBeNil)
So(resp, ShouldEqual, "default-router")
// Requests that match a registered virtual host go to its router.
resp, err = srv.GetMain("/test", map[string]string{
"Host": "test-host.example.com",
})
So(err, ShouldBeNil)
So(resp, ShouldEqual, "test-host-router")
})
Convey("Logging", func() {
srv.Routes.GET("/test", nil, func(c *router.Context) {
logging.Infof(c.Context, "Info log")
tc.Add(time.Second)
logging.Warningf(c.Context, "Warn log")
c.Writer.WriteHeader(201)
c.Writer.Write([]byte("Hello, world"))
})
srv.ServeInBackground()
resp, err := srv.GetMain("/test", map[string]string{
"User-Agent": "Test-user-agent",
"X-Forwarded-For": "1.1.1.1,2.2.2.2,3.3.3.3",
})
So(err, ShouldBeNil)
So(resp, ShouldEqual, "Hello, world")
// Stderr log captures details about the request.
So(srv.stderr.Last(1), ShouldResemble, []sdlogger.LogEntry{
{
Severity: sdlogger.WarningSeverity,
Timestamp: sdlogger.Timestamp{Seconds: 1454472307, Nanos: 7},
RequestInfo: &sdlogger.RequestInfo{
Method: "GET",
URL: srv.mainAddr + "/test",
Status: 201,
RequestSize: "0",
ResponseSize: "12", // len("Hello, world")
UserAgent: "Test-user-agent",
RemoteIP: "2.2.2.2",
Latency: "1.000000s",
},
},
})
// Stdout log captures individual log lines.
So(srv.stdout.Last(2), ShouldResemble, []sdlogger.LogEntry{
{
Severity: sdlogger.InfoSeverity,
Message: "Info log",
Timestamp: sdlogger.Timestamp{Seconds: 1454472306, Nanos: 7},
Operation: &sdlogger.Operation{
ID: "6694d2c422acd208a0072939487f6999",
},
},
{
Severity: sdlogger.WarningSeverity,
Message: "Warn log",
Timestamp: sdlogger.Timestamp{Seconds: 1454472307, Nanos: 7},
Operation: &sdlogger.Operation{
ID: "6694d2c422acd208a0072939487f6999",
},
},
})
})
Convey("Context features", func() {
So(testContextFeatures(srv.Context), ShouldBeNil)
srv.Routes.GET("/request", nil, func(c *router.Context) {
if err := testContextFeatures(c.Context); err != nil {
http.Error(c.Writer, err.Error(), 500)
}
})
srv.ServeInBackground()
_, err := srv.GetMain("/request", nil)
So(err, ShouldBeNil)
})
Convey("Warmup and cleanup callbacks", func() {
var warmups []string
var cleanups []string
srv.RegisterWarmup(func(ctx context.Context) {
if err := testContextFeatures(ctx); err != nil {
panic(err)
}
warmups = append(warmups, "a")
})
srv.RegisterWarmup(func(ctx context.Context) {
warmups = append(warmups, "b")
})
srv.RegisterCleanup(func(ctx context.Context) {
if err := testContextFeatures(ctx); err != nil {
panic(err)
}
cleanups = append(cleanups, "a")
})
srv.RegisterCleanup(func(ctx context.Context) {
cleanups = append(cleanups, "b")
})
srv.ServeInBackground()
So(warmups, ShouldResemble, []string{"a", "b"})
So(cleanups, ShouldEqual, nil)
srv.StopBackgroundServing()
So(warmups, ShouldResemble, []string{"a", "b"})
So(cleanups, ShouldResemble, []string{"b", "a"})
})
Convey("RunInBackground", func() {
// Queue one activity before starting the serving loop to verify this code
// path works.
type nameErrPair struct {
name string
err error
}
activities := make(chan nameErrPair, 2)
srv.RunInBackground("background 1", func(ctx context.Context) {
activities <- nameErrPair{"background 1", testContextFeatures(ctx)}
})
srv.ServeInBackground()
// Run one more activity after starting the serving loop.
srv.RunInBackground("background 2", func(ctx context.Context) {
activities <- nameErrPair{"background 2", testContextFeatures(ctx)}
})
wait := func() {
select {
case pair := <-activities:
if pair.err != nil {
t.Errorf("Activity %q:\n%s", pair.name, strings.Join(errors.RenderStack(pair.err), "\n"))
}
case <-time.After(10 * time.Second):
panic("timeout")
}
}
// Verify both activities have successfully ran.
wait()
wait()
})
Convey("Client auth", func() {
srv.Routes.GET("/client-auth", nil, func(c *router.Context) {
scopes := strings.Split(c.Request.Header.Get("Ask-Scope"), " ")
ts, err := auth.GetTokenSource(c.Context, auth.AsSelf, auth.WithScopes(scopes...))
if err != nil {
http.Error(c.Writer, err.Error(), 500)
return
}
tok, err := ts.Token()
if err != nil {
http.Error(c.Writer, err.Error(), 500)
} else {
c.Writer.Write([]byte(tok.AccessToken))
}
})
call := func(scope string) string {
resp, err := srv.GetMain("/client-auth", map[string]string{"Ask-Scope": scope})
So(err, ShouldBeNil)
// If something is really-really broken, the test can theoretically
// pick up *real* LUCI_CONTEXT auth and somehow see real tokens. This
// is unlikely (if anything, scopes like "A" are not valid). But if
// this happens, make sure not to log such tokens.
if !strings.HasPrefix(resp, "fake_token_") {
t.Fatalf("Not a fake token! Refusing to log it and exiting.")
}
return resp
}
srv.ServeInBackground()
So(call("A B"), ShouldEqual, "fake_token_1")
So(call("B C"), ShouldEqual, "fake_token_2")
So(call("A B"), ShouldEqual, "fake_token_1") // reused the cached token
// 0-th token is generated during startup in initAuth() to test creds.
So(srv.tokens.TokenScopes("fake_token_0"), ShouldResemble, auth.CloudOAuthScopes)
// Tokens generated via calls above.
So(srv.tokens.TokenScopes("fake_token_1"), ShouldResemble, []string{"A", "B"})
So(srv.tokens.TokenScopes("fake_token_2"), ShouldResemble, []string{"B", "C"})
})
Convey("Auth state", func(c C) {
authn := auth.Authenticator{
Methods: []auth.Method{
authtest.FakeAuth{User: fakeUser},
},
}
mw := router.NewMiddlewareChain(authn.GetMiddleware())
srv.Routes.GET("/auth-state", mw, func(rc *router.Context) {
state := auth.GetState(rc.Context)
c.So(state.DB(), ShouldEqual, fakeAuthDB)
c.So(state.PeerIdentity(), ShouldEqual, fakeUser.Identity)
c.So(state.PeerIP().String(), ShouldEqual, "2.2.2.2")
c.So(auth.CurrentUser(rc.Context), ShouldEqual, fakeUser)
c.So(auth.CurrentIdentity(rc.Context), ShouldEqual, fakeUser.Identity)
yes, err := auth.IsMember(rc.Context, "group-1")
c.So(err, ShouldBeNil)
c.So(yes, ShouldBeTrue)
})
srv.ServeInBackground()
_, err := srv.GetMain("/auth-state", map[string]string{
"X-Forwarded-For": "1.1.1.1,2.2.2.2,3.3.3.3",
})
So(err, ShouldBeNil)
})
Convey("Egress", func(c C) {
request := make(chan *http.Request, 1)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
request <- r.Clone(context.Background())
}))
defer ts.Close()
srv.Routes.GET("/test-egress", nil, func(rc *router.Context) {
req, _ := http.NewRequest("GET", ts.URL, nil)
req.Header.Add("User-Agent", "zzz")
t, err := auth.GetRPCTransport(rc.Context, auth.NoAuth)
c.So(err, ShouldBeNil)
client := http.Client{Transport: t}
resp, err := client.Do(req)
c.So(err, ShouldBeNil)
ioutil.ReadAll(resp.Body)
resp.Body.Close()
})
srv.ServeInBackground()
_, err := srv.GetMain("/test-egress", nil)
So(err, ShouldBeNil)
var req *http.Request
select {
case req = <-request:
default:
}
So(req, ShouldNotBeNil)
So(req.UserAgent(), ShouldEqual,
fmt.Sprintf("LUCI-Server (service: service-name; job: namespace/job; ver: %s); zzz", testImageVersion))
})
Convey("/auth/api/v1/server/* handlers", func(c C) {
srv.ServeInBackground()
resp, err := srv.GetMain("/auth/api/v1/server/info", nil)
So(err, ShouldBeNil)
info := signing.ServiceInfo{}
So(json.Unmarshal([]byte(resp), &info), ShouldBeNil)
So(info, ShouldResemble, signing.ServiceInfo{
AppID: testCloudProjectID,
AppRuntime: "go",
AppRuntimeVersion: runtime.Version(),
AppVersion: testImageVersion,
ServiceAccountName: testServerAccountEmail,
})
// TODO(vadimsh): Add a test for /.../certificates once implemented.
// TODO(vadimsh): Add a test for /.../client_id once implemented.
})
})
}
// testContextFeatures check that the context has all subsystems enabled.
func testContextFeatures(ctx context.Context) (err error) {
defer func() {
if p := recover(); p != nil {
err = errors.Reason("Panic: %s", p).Err()
}
}()
// Experiments work.
if !testExperiment.Enabled(ctx) {
return errors.New("the experiment is unexpectedly off")
}
// Client auth works (a test for advanced features is in TestServer).
ts, err := auth.GetTokenSource(ctx, auth.AsSelf, auth.WithScopes("A", "B"))
if err != nil {
return errors.Annotate(err, "token source").Err()
}
switch tok, err := ts.Token(); {
case err != nil:
return errors.Annotate(err, "token").Err()
case tok.AccessToken != "fake_token_1":
// Refuse to log tokens that appear like a real ones (in case the test is
// totally failing and picking up real credentials).
if strings.HasPrefix(tok.AccessToken, "fake_token_") {
return errors.Reason("unexpected token %q", tok.AccessToken).Err()
}
return errors.Reason("unexpected token that looks like a real one").Err()
}
// AuthDB is available (a test for advanced features is in TestServer).
switch state := auth.GetState(ctx); {
case state == nil:
return errors.Reason("auth.State unexpectedly nil").Err()
case state.DB() != fakeAuthDB:
return errors.Reason("unexpected auth.DB %v", state.DB()).Err()
}
// Datastore is available.
type testEntity struct {
ID int64 `gae:"$id"`
Body string
}
if err := datastore.Put(ctx, &testEntity{ID: 123, Body: "Hi"}); err != nil {
return errors.Annotate(err, "datastore").Err()
}
return nil
}
func TestOptions(t *testing.T) {
t.Parallel()
Convey("With temp dir", t, func() {
tmpDir, err := ioutil.TempDir("", "luci-server-test")
So(err, ShouldBeNil)
Reset(func() { os.RemoveAll(tmpDir) })
Convey("AuthDBPath works", func(c C) {
body := `groups {
name: "group"
members: "user:a@example.com"
}`
opts := Options{AuthDBPath: filepath.Join(tmpDir, "authdb.textpb")}
So(ioutil.WriteFile(opts.AuthDBPath, []byte(body), 0600), ShouldBeNil)
testRequestHandler(&opts, func(rc *router.Context) {
db := auth.GetState(rc.Context).DB()
yes, err := db.IsMember(rc.Context, "user:a@example.com", []string{"group"})
c.So(err, ShouldBeNil)
c.So(yes, ShouldBeTrue)
})
})
})
}
var (
// These vars are used in TestResolveDependencies().
//
// If go test runs with -count > 1, module.RegisterName() panics with
// "already registered", because the registry is a global variable.
// Hence, these are declared out of TestResolveDepenencies().
a = module.RegisterName("a")
b = module.RegisterName("b")
c = module.RegisterName("c")
d = module.RegisterName("d")
)
func TestResolveDependencies(t *testing.T) {
mod := func(n module.Name, deps ...module.Dependency) module.Module {
return &testModule{name: n, deps: deps}
}
resolve := func(mods ...module.Module) ([]string, error) {
resolved, err := resolveDependencies(mods)
if err != nil {
return nil, err
}
names := make([]string, len(resolved))
for i, m := range resolved {
names[i] = m.Name().String()
}
return names, nil
}
Convey("Works at all", t, func() {
names, err := resolve(
mod(a, module.RequiredDependency(c), module.RequiredDependency(b)),
mod(b, module.RequiredDependency(c)),
mod(c),
)
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"c", "b", "a"})
})
Convey("Preserves original order if no deps", t, func() {
names, err := resolve(mod(a), mod(b), mod(c))
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"a", "b", "c"})
})
Convey("Two disjoint trees", t, func() {
names, err := resolve(
mod(a, module.RequiredDependency(b)), mod(b),
mod(c, module.RequiredDependency(d)), mod(d),
)
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"b", "a", "d", "c"})
})
Convey("Dup dependency is fine", t, func() {
names, err := resolve(
mod(a, module.RequiredDependency(c), module.RequiredDependency(c)),
mod(b, module.RequiredDependency(c), module.RequiredDependency(c)),
mod(c),
)
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"c", "a", "b"})
})
Convey("Cycle", t, func() {
names, err := resolve(
mod(a, module.RequiredDependency(b)),
mod(b, module.RequiredDependency(c)),
mod(c, module.RequiredDependency(a)),
)
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"c", "b", "a"})
})
Convey("Skips optional missing deps", t, func() {
names, err := resolve(
mod(a, module.OptionalDependency(c), module.RequiredDependency(b)),
mod(b, module.OptionalDependency(c)),
)
So(err, ShouldBeNil)
So(names, ShouldResemble, []string{"b", "a"})
})
Convey("Detects dups", t, func() {
_, err := resolve(mod(a), mod(b), mod(a))
So(err, ShouldErrLike, "duplicate module")
})
Convey("Checks required deps", t, func() {
_, err := resolve(
mod(a, module.RequiredDependency(b), module.RequiredDependency(c)),
mod(b, module.RequiredDependency(c)),
)
So(err, ShouldErrLike, `module "a" requires module "c"`)
})
}
func BenchmarkServer(b *testing.B) {
srv, err := newTestServer(context.Background(), nil)
if err != nil {
b.Fatal(err)
}
defer srv.cleanup()
// The route we are going to hit from the benchmark.
srv.Routes.GET("/test", nil, func(c *router.Context) {
logging.Infof(c.Context, "Hello, world")
for i := 0; i < 10; i++ {
// E.g. calling bunch of Cloud APIs.
ts, _ := auth.GetTokenSource(c.Context, auth.AsSelf, auth.WithScopes("A", "B", "C"))
ts.Token()
}
c.Writer.Write([]byte("Hello, world"))
})
// Don't actually store logs and tokens from all many-many iterations of
// the loop below.
srv.stdout.discard = true
srv.stderr.discard = true
srv.tokens.KeepRecord = false
// Launch the server and wait for it to start serving to make sure all guts
// are initialized.
srv.ServeInBackground()
defer srv.StopBackgroundServing()
// Actual benchmark loop. Note that we bypass network layer here completely
// (by not using http.DefaultClient).
b.ResetTimer()
for n := 0; n < b.N; n++ {
req, err := http.NewRequest("GET", "/test", nil)
if err != nil {
b.Fatal(err)
}
req.Header.Set("X-Forwarded-For", "1.1.1.1,2.2.2.2,3.3.3.3")
rr := httptest.NewRecorder()
srv.Routes.ServeHTTP(rr, req)
if rr.Code != http.StatusOK {
b.Fatalf("unexpected status %d", rr.Code)
}
}
}
////////////////////////////////////////////////////////////////////////////////
type testServer struct {
*Server
stdout logsRecorder
stderr logsRecorder
tokens clientauthtest.FakeTokenGenerator
mainAddr string
adminAddr string
cleanup func()
serveErr errorEvent
serving int32
}
func newTestServer(ctx context.Context, o *Options) (srv *testServer, err error) {
srv = &testServer{
serveErr: errorEvent{signal: make(chan struct{})},
tokens: clientauthtest.FakeTokenGenerator{
Email: testServerAccountEmail,
KeepRecord: true,
},
}
// Run the server in the fake LUCI_CONTEXT auth context, so almost all auth
// code paths are exercised, but we still use fake tokens.
authSrv := localauth.Server{
TokenGenerators: map[string]localauth.TokenGenerator{
"authtest": &srv.tokens,
},
DefaultAccountID: "authtest",
}
la, err := authSrv.Start(ctx)
if err != nil {
return nil, err
}
ctx = lucictx.SetLocalAuth(ctx, la)
srv.cleanup = func() { authSrv.Stop(ctx) }
var opts Options
if o != nil {
opts = *o
}
opts.Prod = true
opts.HTTPAddr = "main_addr"
opts.AdminAddr = "admin_addr"
opts.ClientAuth = clientauth.Options{Method: clientauth.LUCIContextMethod}
opts.CloudProject = testCloudProjectID
opts.TsMonServiceName = "service-name"
opts.TsMonJobName = "namespace/job"
opts.ContainerImageID = "registry/image:" + testImageVersion
opts.EnableExperiments = []string{testExperiment.String()}
opts.testSeed = 1
opts.testStdout = &srv.stdout
opts.testStderr = &srv.stderr
if opts.AuthDBPath == "" {
opts.AuthDBProvider = func(context.Context) (authdb.DB, error) {
return fakeAuthDB, nil
}
}
opts.testDisableTracing = true
// Bind to auto-assigned ports.
opts.testListeners = map[string]net.Listener{
"main_addr": setupListener(),
"admin_addr": setupListener(),
}
if srv.Server, err = New(ctx, opts, nil); err != nil {
srv.cleanup()
return nil, err
}
// TODO(vadimsh): This really should be memory.UseDS (which doesn't exist),
// since only Datastore is implemented outside of GAE. It doesn't matter
// for this particular test though. Note that memory.Use overrides our mocked
// logger, but we need it. Bring it back.
srv.Context = logging.SetFactory(memory.Use(srv.Context), logging.GetFactory(srv.Context))
mainPort := srv.Options.testListeners["main_addr"].Addr().(*net.TCPAddr).Port
srv.mainAddr = fmt.Sprintf("http://127.0.0.1:%d", mainPort)
adminPort := srv.Options.testListeners["admin_addr"].Addr().(*net.TCPAddr).Port
srv.adminAddr = fmt.Sprintf("http://127.0.0.1:%d", adminPort)
return srv, nil
}
func (s *testServer) ServeInBackground() {
go func() { s.serveErr.Set(s.ListenAndServe()) }()
// Wait until both HTTP endpoints are serving before returning.
if _, err := s.GetMain(healthEndpoint, nil); err != nil {
panic(err)
}
if _, err := s.GetAdmin(healthEndpoint, nil); err != nil {
panic(err)
}
atomic.StoreInt32(&s.serving, 1)
}
func (s *testServer) StopBackgroundServing() error {
if atomic.LoadInt32(&s.serving) == 1 {
s.Shutdown()
return s.serveErr.Get()
}
return nil
}
// GetMain makes a blocking request to the main serving port, aborting it if
// the server dies.
func (s *testServer) GetMain(uri string, headers map[string]string) (string, error) {
return s.get(s.mainAddr+uri, headers)
}
// GetAdmin makes a blocking request to the admin port, aborting it if
// the server dies.
func (s *testServer) GetAdmin(uri string, headers map[string]string) (string, error) {
return s.get(s.adminAddr+uri, headers)
}
// get makes a blocking request, aborting it if the server dies.
func (s *testServer) get(uri string, headers map[string]string) (resp string, err error) {
done := make(chan struct{})
go func() {
defer close(done)
var req *http.Request
if req, err = http.NewRequest("GET", uri, nil); err != nil {
return
}
for k, v := range headers {
req.Header.Set(k, v)
}
req.Host = headers["Host"] // req.Host (even when empty) overrides req.Header["Host"]
var res *http.Response
if res, err = http.DefaultClient.Do(req); err != nil {
return
}
defer res.Body.Close()
var blob []byte
if blob, err = ioutil.ReadAll(res.Body); err != nil {
return
}
if res.StatusCode >= 400 {
err = fmt.Errorf("unexpected status %d", res.StatusCode)
}
resp = string(blob)
}()
select {
case <-s.serveErr.signal:
err = s.serveErr.Get()
case <-done:
}
return
}
////////////////////////////////////////////////////////////////////////////////
type testModule struct {
name module.Name
deps []module.Dependency
}
func (m *testModule) Name() module.Name { return m.name }
func (m *testModule) Dependencies() []module.Dependency { return m.deps }
func (m *testModule) Initialize(ctx context.Context, host module.Host, opts module.HostOptions) (context.Context, error) {
return ctx, nil
}
////////////////////////////////////////////////////////////////////////////////
// testRequestHandler launches a new server, calls the given callback as a
// request handler, kills the server.
//
// Useful for testing how server options influence request handler environment.
func testRequestHandler(o *Options, handler func(rc *router.Context)) {
ctx, _ := testclock.UseTime(context.Background(), testclock.TestRecentTimeUTC)
srv, err := newTestServer(ctx, o)
So(err, ShouldBeNil)
defer srv.cleanup()
srv.ServeInBackground()
defer srv.StopBackgroundServing()
srv.Routes.GET("/test", nil, handler)
_, err = srv.GetMain("/test", nil)
So(err, ShouldBeNil)
}
////////////////////////////////////////////////////////////////////////////////
func setupListener() net.Listener {
l, err := net.Listen("tcp", "127.0.0.1:0")
if err != nil {
panic(err)
}
return l
}
////////////////////////////////////////////////////////////////////////////////
type errorEvent struct {
err atomic.Value
signal chan struct{} // closed after 'err' is populated
}
func (e *errorEvent) Set(err error) {
if err != nil {
e.err.Store(err)
}
close(e.signal)
}
func (e *errorEvent) Get() error {
<-e.signal
err, _ := e.err.Load().(error)
return err
}
////////////////////////////////////////////////////////////////////////////////
type logsRecorder struct {
discard bool
m sync.Mutex
logs []sdlogger.LogEntry
}
func (r *logsRecorder) Write(e *sdlogger.LogEntry) {
if r.discard {
return
}
// opencensus.io/trace generates random trace and span IDs. Scrub them.
e.TraceID = ""
e.SpanID = ""
r.m.Lock()
r.logs = append(r.logs, *e)
r.m.Unlock()
}
func (r *logsRecorder) Last(n int) []sdlogger.LogEntry {
entries := make([]sdlogger.LogEntry, n)
r.m.Lock()
copy(entries, r.logs[len(r.logs)-n:])
r.m.Unlock()
return entries
}