blob: d65d2ceecd4b2160f290e9dc261a63c1e29a7bac [file] [log] [blame]
//go:build integ
// +build integ
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package outboundtrafficpolicy
import (
"net/http"
"testing"
)
import (
"github.com/apache/dubbo-go-pixiu/pkg/test/framework/components/prometheus"
)
func TestOutboundTrafficPolicy_RegistryOnly(t *testing.T) {
cases := []*TestCase{
{
Name: "HTTP Traffic",
PortName: "http",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_requests_total",
Aggregation: "sum",
Labels: map[string]string{
"reporter": "source",
"destination_service_name": "BlackHoleCluster",
"response_code": "502",
},
},
StatusCode: http.StatusBadGateway,
},
},
{
Name: "HTTPS Traffic",
PortName: "https",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_tcp_connections_closed_total",
Aggregation: "sum",
Labels: map[string]string{
"destination_service_name": "BlackHoleCluster",
},
},
},
},
{
Name: "HTTPS Traffic Conflict",
PortName: "https-conflict",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_tcp_connections_closed_total",
Aggregation: "sum",
Labels: map[string]string{
"destination_service_name": "BlackHoleCluster",
},
},
},
},
{
Name: "HTTP Traffic Egress",
PortName: "http",
Host: "some-external-site.com",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_requests_total",
Aggregation: "sum",
Labels: map[string]string{
"destination_service_name": "istio-egressgateway",
"response_code": "200",
},
},
StatusCode: http.StatusOK,
RequestHeaders: map[string]string{
// We inject this header in the VirtualService
"Handled-By-Egress-Gateway": "true",
},
},
},
// TODO add HTTPS through gateway
{
Name: "TCP",
PortName: "tcp",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_tcp_connections_closed_total",
Aggregation: "sum",
Labels: map[string]string{
"reporter": "source",
"destination_service_name": "BlackHoleCluster",
"source_workload": "client-v1",
},
},
},
},
{
Name: "TCP Conflict",
PortName: "tcp-conflict",
Expected: Expected{
Query: prometheus.Query{
Metric: "istio_tcp_connections_closed_total",
Aggregation: "sum",
Labels: map[string]string{
"reporter": "source",
"destination_service_name": "BlackHoleCluster",
"source_workload": "client-v1",
},
},
},
},
}
// destination_service="BlackHoleCluster" does not get filled in when using sidecar scoping
RunExternalRequest(t, cases, prom, RegistryOnly)
}