Files
grafana/pkg/tests/apis/shorturl/shorturl_test.go
T
2025-08-19 15:41:23 -03:00

540 lines
17 KiB
Go

package shorturl
import (
"context"
"fmt"
"net/http"
"testing"
"github.com/grafana/grafana/pkg/services/shorturls"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime/schema"
"github.com/grafana/grafana/pkg/api/dtos"
grafanarest "github.com/grafana/grafana/pkg/apiserver/rest"
"github.com/grafana/grafana/pkg/services/apiserver/options"
"github.com/grafana/grafana/pkg/setting"
"github.com/grafana/grafana/pkg/tests/apis"
"github.com/grafana/grafana/pkg/tests/testinfra"
"github.com/grafana/grafana/pkg/tests/testsuite"
)
func TestMain(m *testing.M) {
testsuite.Run(m)
}
var gvr = schema.GroupVersionResource{
Group: "shorturl.grafana.app",
Version: "v1alpha1",
Resource: "shorturls",
}
var RESOURCEGROUP = gvr.GroupResource().String()
func TestIntegrationShortURL(t *testing.T) {
if testing.Short() {
t.Skip("skipping integration test")
}
t.Run("default setup with k8s flag turned off (legacy APIs)", func(t *testing.T) {
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: true, // do not start extra port 6443
DisableAnonymous: true,
EnableFeatureToggles: []string{}, // legacy APIs only
})
// In this setup, K8s APIs are not available - legacy APIs only
doLegacyOnlyTests(t, helper)
// When no feature toggles are enabled, shortURL K8s APIs should not be available
disco := helper.NewDiscoveryClient()
groups, err := disco.ServerGroups()
require.NoError(t, err)
hasShortURLGroup := false
for _, group := range groups.Groups {
if group.Name == "shorturl.grafana.app" {
hasShortURLGroup = true
break
}
}
require.False(t, hasShortURLGroup, "shortURL K8s APIs should not be available when kubernetesShortURLs feature toggle is disabled")
})
t.Run("with dual write (unified storage, mode 0)", func(t *testing.T) {
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: false, // required for unified storage
DisableAnonymous: true,
APIServerStorageType: options.StorageTypeUnified,
EnableFeatureToggles: []string{"kubernetesShortURLs"},
UnifiedStorageConfig: map[string]setting.UnifiedStorageConfig{
RESOURCEGROUP: {
DualWriterMode: grafanarest.Mode0,
},
},
})
doLegacyOnlyTests(t, helper)
})
t.Run("with dual write (unified storage, mode 1)", func(t *testing.T) {
mode := grafanarest.Mode1
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: false,
DisableAnonymous: true,
APIServerStorageType: options.StorageTypeUnified,
EnableFeatureToggles: []string{"kubernetesShortURLs"},
UnifiedStorageConfig: map[string]setting.UnifiedStorageConfig{
RESOURCEGROUP: {
DualWriterMode: mode,
},
},
})
doDualWriteTests(t, helper, mode)
})
t.Run("with dual write (unified storage, mode 2)", func(t *testing.T) {
mode := grafanarest.Mode2
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: false,
DisableAnonymous: true,
APIServerStorageType: options.StorageTypeUnified,
EnableFeatureToggles: []string{"kubernetesShortURLs"},
UnifiedStorageConfig: map[string]setting.UnifiedStorageConfig{
RESOURCEGROUP: {
DualWriterMode: mode,
},
},
})
doDualWriteTests(t, helper, mode)
})
t.Run("with dual write (unified storage, mode 3)", func(t *testing.T) {
mode := grafanarest.Mode3
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: false,
DisableAnonymous: true,
APIServerStorageType: options.StorageTypeUnified,
EnableFeatureToggles: []string{"kubernetesShortURLs"},
UnifiedStorageConfig: map[string]setting.UnifiedStorageConfig{
RESOURCEGROUP: {
DualWriterMode: mode,
},
},
})
doDualWriteTests(t, helper, mode)
})
t.Run("with dual write (unified storage, mode 5)", func(t *testing.T) {
helper := apis.NewK8sTestHelper(t, testinfra.GrafanaOpts{
AppModeProduction: false,
DisableAnonymous: true,
APIServerStorageType: options.StorageTypeUnified,
EnableFeatureToggles: []string{"kubernetesShortURLs"},
UnifiedStorageConfig: map[string]setting.UnifiedStorageConfig{
RESOURCEGROUP: {
DualWriterMode: grafanarest.Mode5,
},
},
})
doUnifiedOnlyTests(t, helper)
})
}
// doLegacyOnlyTests tests functionality for Mode 0 (legacy only)
// Only legacy API should be used, no K8s API interaction
func doLegacyOnlyTests(t *testing.T, helper *apis.K8sTestHelper) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
t.Run("Legacy API CRUD", func(t *testing.T) {
// Create via legacy API
legacyPayload := `{
"path": "d/xCmMwXdVz/legacy-only-test"
}`
legacyCreate := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/api/short-urls",
Body: []byte(legacyPayload),
}, &dtos.ShortURL{})
require.NotNil(t, legacyCreate.Result)
uid := legacyCreate.Result.UID
require.NotEmpty(t, uid)
// Read via legacy API
legacyGet := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/api/short-urls/" + uid,
}, &shorturls.ShortUrl{})
require.NotNil(t, legacyGet.Result)
assert.Equal(t, uid, legacyGet.Result.Uid)
assert.Equal(t, "d/xCmMwXdVz/legacy-only-test", legacyGet.Result.Path)
})
t.Run("Legacy API redirect functionality", func(t *testing.T) {
// Create via legacy API
legacyPayload := `{
"path": "d/test/legacy-redirect"
}`
legacyCreate := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/api/short-urls",
Body: []byte(legacyPayload),
}, &dtos.ShortURL{})
require.NotNil(t, legacyCreate.Result)
uid := legacyCreate.Result.UID
// Test redirect functionality
redirectResponse := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/goto/" + uid + "?orgId=default",
}, (*interface{})(nil))
assert.Equal(t, 302, redirectResponse.Response.StatusCode)
})
}
// doDualWriteTests tests functionality for Modes 1-3 (dual write modes)
// Both APIs available with cross-API visibility
func doDualWriteTests(t *testing.T, helper *apis.K8sTestHelper, mode grafanarest.DualWriterMode) {
// Check if shortURL K8s APIs are available
hasShortURLAPI := checkShortURLAPIAvailable(t, helper)
if !hasShortURLAPI {
t.Log("ShortURL Kubernetes APIs not available - skipping K8s API tests")
return
}
t.Run("Legacy API -> K8s API visibility", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
// Create via legacy API
legacyPayload := `{
"path": "d/xCmMwXdVz/dual-write-test"
}`
legacyCreate := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/api/short-urls",
Body: []byte(legacyPayload),
}, &dtos.ShortURL{})
require.NotNil(t, legacyCreate.Result)
uid := legacyCreate.Result.UID
require.NotEmpty(t, uid)
// Should be visible via K8s API
found, err := client.Resource.Get(context.Background(), uid, metav1.GetOptions{})
require.NoError(t, err)
assert.Equal(t, uid, found.GetName())
// Verify cross-API consistency
getFromBothAPIs(t, helper, client, uid)
// Clean up
err = client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
require.NoError(t, err)
})
t.Run("K8s API -> Legacy API visibility", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
// Create via K8s API
obj := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(`{ "metadata": { "generateName": "test-" }, "spec": { "path": "d/xCmMwXdVz/k8s-dual-write" } }`),
}, &unstructured.Unstructured{})
require.NotNil(t, obj.Result)
uid := obj.Result.GetName()
assert.NotEmpty(t, uid)
// Should be visible via legacy API
legacyShortURL := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/api/short-urls/" + uid,
}, &shorturls.ShortUrl{}).Result
require.NotNil(t, legacyShortURL)
assert.Equal(t, uid, legacyShortURL.Uid)
// Verify cross-API consistency
getFromBothAPIs(t, helper, client, uid)
// Clean up
err := client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
require.NoError(t, err)
})
t.Run("Redirect functionality", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
// Create via K8s API
obj := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(`{ "metadata": { "generateName": "redirect-" }, "spec": { "path": "d/test/redirect" } }`),
}, &unstructured.Unstructured{})
require.NotNil(t, obj.Result)
uid := obj.Result.GetName()
// Test redirect functionality and lastSeenAt update
redirectResponse := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/goto/" + uid + "?orgId=default",
}, (*interface{})(nil))
assert.Equal(t, 302, redirectResponse.Response.StatusCode)
// Verify lastSeenAt was updated (should be > 0 now)
found, err := client.Resource.Get(context.Background(), uid, metav1.GetOptions{})
require.NoError(t, err)
status, exists := found.Object["status"].(map[string]interface{})
assert.True(t, exists)
lastSeenAt, exists := status["lastSeenAt"].(int64)
assert.True(t, exists)
assert.Greater(t, lastSeenAt, int64(0))
// Clean up
err = client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
require.NoError(t, err)
})
}
// doUnifiedOnlyTests tests functionality for Modes 4-5 (unified only)
// Only K8s API, no legacy API interaction
func doUnifiedOnlyTests(t *testing.T, helper *apis.K8sTestHelper) {
// Check if shortURL K8s APIs are available
hasShortURLAPI := checkShortURLAPIAvailable(t, helper)
if !hasShortURLAPI {
t.Log("ShortURL Kubernetes APIs not available - skipping K8s API tests")
return
}
t.Run("K8s API CRUD (unified storage only)", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
// Create via K8s API
obj := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(`{ "metadata": { "generateName": "unified-" }, "spec": { "path": "d/xCmMwXdVz/unified-only" } }`),
}, &unstructured.Unstructured{})
require.NotNil(t, obj.Result)
uid := obj.Result.GetName()
assert.NotEmpty(t, uid)
// Read via K8s API
found, err := client.Resource.Get(context.Background(), uid, metav1.GetOptions{})
require.NoError(t, err)
assert.Equal(t, uid, found.GetName())
// Should NOT be visible via legacy API in unified-only mode
legacyResponse := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/api/short-urls/" + uid,
}, (*shorturls.ShortUrl)(nil))
// In unified-only mode, legacy API should not see the resource
assert.Nil(t, legacyResponse.Result)
// Clean up
err = client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
require.NoError(t, err)
})
t.Run("K8s API validation - invalid paths", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
testCases := []struct {
name string
path string
expectedError string
}{
{
name: "absolute path should be rejected",
path: "/dashboard/absolute-path",
expectedError: "path should be relative",
},
{
name: "path with directory traversal should be rejected",
path: "d/../../../etc/passwd",
expectedError: "invalid short URL path",
},
{
name: "path with multiple directory traversals should be rejected",
path: "d/some/../path/../../../secret",
expectedError: "invalid short URL path",
},
}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
// Attempt to create ShortURL with invalid path
invalidBody := fmt.Sprintf(`{ "metadata": { "generateName": "invalid-" }, "spec": { "path": "%s" } }`, tc.path)
response := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(invalidBody),
}, (*unstructured.Unstructured)(nil))
// Should get a validation error, it should be 400 Bad Request but the validation hook returns 403 Forbidden
assert.Equal(t, http.StatusForbidden, response.Response.StatusCode,
"Expected 403 for invalid path: %s", tc.path)
// Check that the error message contains expected validation error
assert.Contains(t, string(response.Body), tc.expectedError,
"Response should contain validation error message")
// Should not have created a resource
assert.Nil(t, response.Result, "No resource should be created for invalid path")
})
}
})
t.Run("K8s API validation - valid edge cases", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
validPaths := []string{
"d/dashboard/valid-path",
"dashboard/some-id",
"explore?from=123&to=456",
"d/abc123/dashboard-with-params?var-test=value",
}
for _, validPath := range validPaths {
t.Run(fmt.Sprintf("valid path: %s", validPath), func(t *testing.T) {
validBody := fmt.Sprintf(`{ "metadata": { "generateName": "valid-" }, "spec": { "path": "%s" } }`, validPath)
response := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(validBody),
}, &unstructured.Unstructured{})
// Should succeed
assert.Equal(t, http.StatusCreated, response.Response.StatusCode,
"Expected 201 Created for valid path: %s", validPath)
assert.NotNil(t, response.Result, "Resource should be created for valid path")
if response.Result != nil {
uid := response.Result.GetName()
// Clean up
err := client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
assert.NoError(t, err, "Cleanup should succeed")
}
})
}
})
t.Run("Redirect functionality (unified only)", func(t *testing.T) {
client := helper.GetResourceClient(apis.ResourceClientArgs{
User: helper.Org1.Editor,
GVR: gvr,
})
// Create via K8s API
obj := apis.DoRequest[unstructured.Unstructured](helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodPost,
Path: "/apis/shorturl.grafana.app/v1alpha1/namespaces/default/shorturls",
Body: []byte(`{ "metadata": { "generateName": "redirect-unified-" }, "spec": { "path": "d/test/unified-redirect" } }`),
}, &unstructured.Unstructured{})
require.NotNil(t, obj.Result)
uid := obj.Result.GetName()
// Test redirect functionality
redirectResponse := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/goto/" + uid + "?orgId=default",
}, (*interface{})(nil))
assert.Equal(t, 302, redirectResponse.Response.StatusCode)
// Clean up
err := client.Resource.Delete(context.Background(), uid, metav1.DeleteOptions{})
require.NoError(t, err)
})
}
// Helper function to check if shortURL K8s APIs are available
func checkShortURLAPIAvailable(t *testing.T, helper *apis.K8sTestHelper) bool {
disco := helper.NewDiscoveryClient()
groups, err := disco.ServerGroups()
if err != nil {
t.Logf("Failed to get server groups: %v", err)
return false
}
for _, group := range groups.Groups {
if group.Name == "shorturl.grafana.app" {
return true
}
}
return false
}
// This does a get with both k8s and legacy API, and verifies the results are the same
func getFromBothAPIs(t *testing.T,
helper *apis.K8sTestHelper,
client *apis.K8sResourceClient,
uid string,
) {
t.Helper()
k8sResource, err := client.Resource.Get(context.Background(), uid, metav1.GetOptions{})
require.NoError(t, err)
assert.Equal(t, uid, k8sResource.GetName())
// Legacy API: Try to get the shortURL (might not be implemented)
legacyShortURL := apis.DoRequest(helper, apis.RequestParams{
User: client.Args.User,
Method: http.MethodGet,
Path: "/api/short-urls/" + uid,
}, &shorturls.ShortUrl{}).Result
if legacyShortURL != nil {
// If legacy API returns data, verify consistency
spec, ok := k8sResource.Object["spec"].(map[string]interface{})
require.True(t, ok)
status, ok := k8sResource.Object["status"].(map[string]interface{})
require.True(t, ok)
assert.Equal(t, legacyShortURL.Uid, k8sResource.GetName())
assert.Equal(t, legacyShortURL.Path, spec["path"].(string))
assert.Equal(t, legacyShortURL.LastSeenAt, status["lastSeenAt"].(int64))
}
}