// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: BUSL-1.1 package client import ( "context" "fmt" "net/url" "regexp" "testing" "time" "github.com/go-openapi/runtime" hcptelemetry "github.com/hashicorp/hcp-sdk-go/clients/cloud-consul-telemetry-gateway/preview/2023-04-14/client/consul_telemetry_service" "github.com/hashicorp/hcp-sdk-go/clients/cloud-consul-telemetry-gateway/preview/2023-04-14/models" "github.com/stretchr/testify/require" ) type mockTGW struct { mockResponse *hcptelemetry.AgentTelemetryConfigOK mockError error } func (m *mockTGW) AgentTelemetryConfig(params *hcptelemetry.AgentTelemetryConfigParams, authInfo runtime.ClientAuthInfoWriter, opts ...hcptelemetry.ClientOption) (*hcptelemetry.AgentTelemetryConfigOK, error) { return m.mockResponse, m.mockError } func (m *mockTGW) GetLabelValues(params *hcptelemetry.GetLabelValuesParams, authInfo runtime.ClientAuthInfoWriter, opts ...hcptelemetry.ClientOption) (*hcptelemetry.GetLabelValuesOK, error) { return hcptelemetry.NewGetLabelValuesOK(), nil } func (m *mockTGW) QueryRangeBatch(params *hcptelemetry.QueryRangeBatchParams, authInfo runtime.ClientAuthInfoWriter, opts ...hcptelemetry.ClientOption) (*hcptelemetry.QueryRangeBatchOK, error) { return hcptelemetry.NewQueryRangeBatchOK(), nil } func (m *mockTGW) SetTransport(transport runtime.ClientTransport) {} func (m *mockTGW) GetServiceTopology(params *hcptelemetry.GetServiceTopologyParams, authInfo runtime.ClientAuthInfoWriter, opts ...hcptelemetry.ClientOption) (*hcptelemetry.GetServiceTopologyOK, error) { return hcptelemetry.NewGetServiceTopologyOK(), nil } type expectedTelemetryCfg struct { endpoint string labels map[string]string filters string refreshInterval time.Duration } func TestFetchTelemetryConfig(t *testing.T) { t.Parallel() for name, tc := range map[string]struct { mockResponse *hcptelemetry.AgentTelemetryConfigOK mockError error wantErr string expected *expectedTelemetryCfg }{ "errorsWithFetchFailure": { mockError: fmt.Errorf("failed to fetch from HCP"), mockResponse: nil, wantErr: "failed to fetch from HCP", }, "errorsWithInvalidPayload": { mockResponse: &hcptelemetry.AgentTelemetryConfigOK{ Payload: &models.HashicorpCloudConsulTelemetry20230414AgentTelemetryConfigResponse{}, }, mockError: nil, wantErr: "invalid response payload", }, "success:": { mockResponse: &hcptelemetry.AgentTelemetryConfigOK{ Payload: &models.HashicorpCloudConsulTelemetry20230414AgentTelemetryConfigResponse{ RefreshConfig: &models.HashicorpCloudConsulTelemetry20230414RefreshConfig{ RefreshInterval: "1s", }, TelemetryConfig: &models.HashicorpCloudConsulTelemetry20230414TelemetryConfig{ Endpoint: "https://test.com", Labels: map[string]string{"test": "123"}, Metrics: &models.HashicorpCloudConsulTelemetry20230414TelemetryMetricsConfig{ IncludeList: []string{"consul", "test"}, }, }, }, }, expected: &expectedTelemetryCfg{ endpoint: "https://test.com/v1/metrics", labels: map[string]string{"test": "123"}, filters: "consul|test", refreshInterval: 1 * time.Second, }, }, } { tc := tc t.Run(name, func(t *testing.T) { t.Parallel() c := &hcpClient{ tgw: &mockTGW{ mockError: tc.mockError, mockResponse: tc.mockResponse, }, } telemetryCfg, err := c.FetchTelemetryConfig(context.Background()) if tc.wantErr != "" { require.Error(t, err) require.Contains(t, err.Error(), tc.wantErr) require.Nil(t, telemetryCfg) return } urlEndpoint, err := url.Parse(tc.expected.endpoint) require.NoError(t, err) regexFilters, err := regexp.Compile(tc.expected.filters) require.NoError(t, err) expectedCfg := &TelemetryConfig{ MetricsConfig: &MetricsConfig{ Endpoint: urlEndpoint, Filters: regexFilters, Labels: tc.expected.labels, }, RefreshConfig: &RefreshConfig{ RefreshInterval: tc.expected.refreshInterval, }, } require.NoError(t, err) require.Equal(t, expectedCfg, telemetryCfg) }) } }