feat: add E2E tests with mock Nginx services, update Traefik routing to use service names, and integrate testing into the CI workflow.
All checks were successful
Remote Deployment Pipeline / Prepare Context (pull_request) Successful in 3s
Remote Deployment Pipeline / Deploy (Staging) (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Dev/Preview) (pull_request) Successful in 1m15s
Remote Deployment Pipeline / Cleanup Preview (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Production) (pull_request) Has been skipped
All checks were successful
Remote Deployment Pipeline / Prepare Context (pull_request) Successful in 3s
Remote Deployment Pipeline / Deploy (Staging) (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Dev/Preview) (pull_request) Successful in 1m15s
Remote Deployment Pipeline / Cleanup Preview (pull_request) Has been skipped
Remote Deployment Pipeline / Deploy (Production) (pull_request) Has been skipped
This commit is contained in:
@@ -67,6 +67,15 @@ jobs:
|
|||||||
cd ${{ needs.prepare_context.outputs.pr_path }}
|
cd ${{ needs.prepare_context.outputs.pr_path }}
|
||||||
docker compose --env-file dev.env -f docker-compose.yaml up -d --build --remove-orphans
|
docker compose --env-file dev.env -f docker-compose.yaml up -d --build --remove-orphans
|
||||||
|
|
||||||
|
# Run E2E Tests
|
||||||
|
echo "Running E2E tests..."
|
||||||
|
export CI=true
|
||||||
|
# Create venv to avoid polluting system python
|
||||||
|
python3 -m venv .venv
|
||||||
|
. .venv/bin/activate
|
||||||
|
pip install -r tests/e2e/requirements.txt
|
||||||
|
pytest tests/e2e/
|
||||||
|
|
||||||
# ------------------------------------------------------------------
|
# ------------------------------------------------------------------
|
||||||
# STAGE 3: DEPLOY STAGING
|
# STAGE 3: DEPLOY STAGING
|
||||||
# ------------------------------------------------------------------
|
# ------------------------------------------------------------------
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ http:
|
|||||||
dev-staging:
|
dev-staging:
|
||||||
loadBalancer:
|
loadBalancer:
|
||||||
servers:
|
servers:
|
||||||
- url: "http://192.168.1.85:8080"
|
- url: "http://staging:8080"
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
routers:
|
routers:
|
||||||
@@ -30,4 +30,4 @@ tcp:
|
|||||||
loadBalancer:
|
loadBalancer:
|
||||||
servers:
|
servers:
|
||||||
# Note: Ensure Traefik trusts the cert at .85 or set insecureSkipVerify
|
# Note: Ensure Traefik trusts the cert at .85 or set insecureSkipVerify
|
||||||
- address: "192.168.1.85:445"
|
- address: "staging:445"
|
||||||
@@ -23,6 +23,9 @@ services:
|
|||||||
- "--certificatesResolvers.letsencrypt.acme.caServer=${CERTBOT_CA_RESOLVER}"
|
- "--certificatesResolvers.letsencrypt.acme.caServer=${CERTBOT_CA_RESOLVER}"
|
||||||
- "${TRAEFIK_LEGACY_OPT:-}"
|
- "${TRAEFIK_LEGACY_OPT:-}"
|
||||||
- "--providers.file.watch=true"
|
- "--providers.file.watch=true"
|
||||||
|
extra_hosts:
|
||||||
|
- "staging:${STAGING_IP:-192.168.1.85}"
|
||||||
|
- "webserver:${LEGACY_IP:-192.168.1.85}"
|
||||||
ports:
|
ports:
|
||||||
- "${PORT}:80"
|
- "${PORT}:80"
|
||||||
- "${HTTPS_PORT}:443"
|
- "${HTTPS_PORT}:443"
|
||||||
|
|||||||
1
tests/e2e/.gitignore
vendored
Normal file
1
tests/e2e/.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
__pycache__
|
||||||
2
tests/e2e/requirements.txt
Normal file
2
tests/e2e/requirements.txt
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
pytest
|
||||||
|
requests
|
||||||
237
tests/e2e/test_traefik.py
Normal file
237
tests/e2e/test_traefik.py
Normal file
@@ -0,0 +1,237 @@
|
|||||||
|
import pytest
|
||||||
|
import requests
|
||||||
|
import os
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
# Configuration
|
||||||
|
DOMAIN = os.getenv("DOMAIN", "dev.kovagoadi.hu")
|
||||||
|
PORT = os.getenv("PORT", "898")
|
||||||
|
HTTPS_PORT = os.getenv("HTTPS_PORT", "446")
|
||||||
|
|
||||||
|
BASE_URL = f"http://127.0.0.1:{PORT}"
|
||||||
|
HTTPS_BASE_URL = f"https://127.0.0.1:{HTTPS_PORT}"
|
||||||
|
HOST_HEADER = f"test-whoami.{DOMAIN}"
|
||||||
|
|
||||||
|
@pytest.fixture(scope="session", autouse=True)
|
||||||
|
def mock_webserver():
|
||||||
|
"""Start ephemeral mock webserver containers and configure Traefik."""
|
||||||
|
import time
|
||||||
|
|
||||||
|
# Skip mocks in CI environment
|
||||||
|
if os.getenv("CI"):
|
||||||
|
print("CI environment detected. Skipping mock webserver setup.")
|
||||||
|
yield
|
||||||
|
return
|
||||||
|
|
||||||
|
# In CI (Docker-in-Docker), we need to use the HOST path for volumes, not the container path.
|
||||||
|
# The workflow mounts the project root to /app, but the Docker daemon is on the host.
|
||||||
|
# We pass PROJECT_ROOT env var to the test container to tell it where the files are on the HOST.
|
||||||
|
cwd = os.getenv("PROJECT_ROOT", os.getcwd())
|
||||||
|
certs_dir = os.path.join(cwd, "tests/mock_nginx/certs")
|
||||||
|
image = "nginx:alpine"
|
||||||
|
|
||||||
|
# Define mocks
|
||||||
|
mocks = [
|
||||||
|
{
|
||||||
|
"name": "mock-legacy-ephemeral",
|
||||||
|
"alias": "webserver",
|
||||||
|
"conf": os.path.join(cwd, "tests/mock_nginx/legacy.conf"),
|
||||||
|
"ports": ["80", "443"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "mock-staging-ephemeral",
|
||||||
|
"alias": "mock",
|
||||||
|
"conf": os.path.join(cwd, "tests/mock_nginx/staging.conf"),
|
||||||
|
"ports": ["8080", "445"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
# Cleanup and Start Mocks
|
||||||
|
mock_ips = {}
|
||||||
|
for mock in mocks:
|
||||||
|
subprocess.run(["docker", "rm", "-f", mock["name"]], capture_output=True)
|
||||||
|
cmd = [
|
||||||
|
"docker", "run", "-d", "--rm",
|
||||||
|
"--name", mock["name"],
|
||||||
|
"--network", "proxy",
|
||||||
|
"--network-alias", mock["alias"],
|
||||||
|
"-v", f"{mock['conf']}:/etc/nginx/nginx.conf:ro",
|
||||||
|
"-v", f"{certs_dir}:/etc/nginx/certs:ro",
|
||||||
|
image
|
||||||
|
]
|
||||||
|
|
||||||
|
print(f"Starting {mock['name']}...")
|
||||||
|
result = subprocess.run(cmd, capture_output=True, text=True)
|
||||||
|
if result.returncode != 0:
|
||||||
|
print(f"STDOUT: {result.stdout}")
|
||||||
|
print(f"STDERR: {result.stderr}")
|
||||||
|
pytest.fail(f"Failed to start {mock['name']}: {result.stderr}")
|
||||||
|
|
||||||
|
# Inspect container to get IP
|
||||||
|
inspect_cmd = ["docker", "inspect", "-f", "{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}", mock["name"]]
|
||||||
|
inspect_res = subprocess.run(inspect_cmd, capture_output=True, text=True)
|
||||||
|
if inspect_res.returncode != 0:
|
||||||
|
pytest.fail(f"Failed to inspect {mock['name']}: {inspect_res.stderr}")
|
||||||
|
mock_ips[mock["alias"]] = inspect_res.stdout.strip()
|
||||||
|
print(f"{mock['name']} IP: {mock_ips[mock['alias']]}")
|
||||||
|
|
||||||
|
# Restart Traefik with IP env vars for extra_hosts
|
||||||
|
print(f"Restarting Traefik with STAGING_IP={mock_ips['mock']} and LEGACY_IP={mock_ips['webserver']}...")
|
||||||
|
env = os.environ.copy()
|
||||||
|
env["STAGING_IP"] = mock_ips["mock"]
|
||||||
|
env["LEGACY_IP"] = mock_ips["webserver"]
|
||||||
|
|
||||||
|
# In CI (Docker-in-Docker), we need to tell docker-compose that the project root
|
||||||
|
# is the HOST path (PROJECT_ROOT), not the container path (/app).
|
||||||
|
# This ensures volume mounts use the correct host paths.
|
||||||
|
if "PROJECT_ROOT" in os.environ:
|
||||||
|
env["COMPOSE_PROJECT_DIR"] = os.environ["PROJECT_ROOT"]
|
||||||
|
|
||||||
|
# We need to recreate the container to pick up extra_hosts changes
|
||||||
|
try:
|
||||||
|
subprocess.run(["docker-compose", "--env-file", "dev.env", "up", "-d", "--force-recreate", "--no-deps", "traefik12"], env=env, check=True, capture_output=True, text=True)
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
print(f"Docker Compose STDOUT: {e.stdout}")
|
||||||
|
print(f"Docker Compose STDERR: {e.stderr}")
|
||||||
|
raise e
|
||||||
|
|
||||||
|
# Wait for everything to settle
|
||||||
|
time.sleep(5)
|
||||||
|
|
||||||
|
yield
|
||||||
|
|
||||||
|
print("Stopping mocks and restoring Traefik...")
|
||||||
|
for mock in mocks:
|
||||||
|
subprocess.run(["docker", "stop", mock["name"]], capture_output=True)
|
||||||
|
|
||||||
|
# Restore Traefik to default (optional)
|
||||||
|
subprocess.run(["docker-compose", "--env-file", "dev.env", "up", "-d", "--force-recreate", "--no-deps", "traefik12"], check=True)
|
||||||
|
|
||||||
|
def test_whoami_http_reachable():
|
||||||
|
"""Verify that the whoami service is reachable via HTTP."""
|
||||||
|
try:
|
||||||
|
response = requests.get(BASE_URL, headers={"Host": HOST_HEADER}, timeout=5)
|
||||||
|
assert response.status_code == 200
|
||||||
|
assert "Hostname:" in response.text
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
pytest.fail(f"Failed to connect to {BASE_URL}: {e}")
|
||||||
|
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
def test_whoami_https_reachable():
|
||||||
|
"""Verify that the whoami service is reachable via HTTPS using curl (to handle SNI/DNS)."""
|
||||||
|
# We use curl because requests doesn't support --resolve easily to force SNI with custom IP
|
||||||
|
cmd = [
|
||||||
|
"curl", "-s", "-k", "--fail",
|
||||||
|
"--resolve", f"{HOST_HEADER}:{HTTPS_PORT}:127.0.0.1",
|
||||||
|
f"https://{HOST_HEADER}:{HTTPS_PORT}"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
result = subprocess.run(cmd, capture_output=True, text=True, timeout=10, check=True)
|
||||||
|
assert "Hostname:" in result.stdout
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
pytest.fail(f"Curl failed with exit code {e.returncode}: {e.stderr}")
|
||||||
|
except subprocess.TimeoutExpired:
|
||||||
|
pytest.fail("Curl timed out")
|
||||||
|
|
||||||
|
def test_https_redirect():
|
||||||
|
"""Verify that HTTP requests are NOT redirected to HTTPS (based on config, or check if they SHOULD be)."""
|
||||||
|
# Based on docker-compose, there is no global redirect middleware configured on the entrypoint.
|
||||||
|
# So HTTP should remain HTTP.
|
||||||
|
try:
|
||||||
|
response = requests.get(BASE_URL, headers={"Host": HOST_HEADER}, allow_redirects=False, timeout=5)
|
||||||
|
assert response.status_code == 200
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
pytest.fail(f"Failed to connect to {BASE_URL}: {e}")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_unknown_host_404():
|
||||||
|
"""Verify that requests to an unknown host (hitting legacy-nginx catch-all) are routed to the mock."""
|
||||||
|
try:
|
||||||
|
# We use a domain that doesn't match the specific *.dev.kovagoadi.hu rules
|
||||||
|
# so it falls through to the catch-all 'nginx-legacy-router'
|
||||||
|
response = requests.get(BASE_URL, headers={"Host": "unknown.com"}, timeout=5)
|
||||||
|
assert response.status_code == 200
|
||||||
|
assert "X-Mock-Service" in response.headers
|
||||||
|
assert response.headers["X-Mock-Service"] == "legacy"
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
pytest.fail(f"Failed to connect to {BASE_URL}: {e}")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_unknown_host_https_passthrough():
|
||||||
|
"""Verify that HTTPS requests to an unknown host are passed through to the mock Nginx."""
|
||||||
|
# We use curl to handle SNI and self-signed certs
|
||||||
|
# unknown.com should hit the catch-all SNI router
|
||||||
|
cmd = [
|
||||||
|
"curl", "-s", "-k", "-i", "--fail",
|
||||||
|
"--resolve", f"unknown.com:{HTTPS_PORT}:127.0.0.1",
|
||||||
|
f"https://unknown.com:{HTTPS_PORT}"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
result = subprocess.run(cmd, capture_output=True, text=True, timeout=10, check=True)
|
||||||
|
assert "Mock Nginx Legacy HTTPS" in result.stdout
|
||||||
|
assert "X-Mock-Service: legacy" in result.stdout or "x-mock-service: legacy" in result.stdout.lower()
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
pytest.fail(f"Curl failed with exit code {e.returncode}: {e.stderr}")
|
||||||
|
except subprocess.TimeoutExpired:
|
||||||
|
pytest.fail("Curl timed out")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_staging_http_routing():
|
||||||
|
"""Verify HTTP requests to *.staging.kovagoadi.hu are routed to the mock."""
|
||||||
|
host = "foo.staging.kovagoadi.hu"
|
||||||
|
try:
|
||||||
|
response = requests.get(BASE_URL, headers={"Host": host}, timeout=5)
|
||||||
|
assert response.status_code == 200
|
||||||
|
assert "X-Mock-Service" in response.headers
|
||||||
|
assert response.headers["X-Mock-Service"] == "staging"
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
pytest.fail(f"Failed to connect to {BASE_URL} with host {host}: {e}")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_dev_http_routing():
|
||||||
|
"""Verify HTTP requests to *.dev.kovagoadi.hu are routed to the mock."""
|
||||||
|
host = "bar.dev.kovagoadi.hu"
|
||||||
|
try:
|
||||||
|
response = requests.get(BASE_URL, headers={"Host": host}, timeout=5)
|
||||||
|
assert response.status_code == 200
|
||||||
|
assert "X-Mock-Service" in response.headers
|
||||||
|
assert response.headers["X-Mock-Service"] == "staging"
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
pytest.fail(f"Failed to connect to {BASE_URL} with host {host}: {e}")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_staging_https_routing():
|
||||||
|
"""Verify HTTPS requests to *.staging.kovagoadi.hu are routed to the mock."""
|
||||||
|
host = "foo.staging.kovagoadi.hu"
|
||||||
|
cmd = [
|
||||||
|
"curl", "-s", "-k", "-i", "--fail",
|
||||||
|
"--resolve", f"{host}:{HTTPS_PORT}:127.0.0.1",
|
||||||
|
f"https://{host}:{HTTPS_PORT}"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
result = subprocess.run(cmd, capture_output=True, text=True, timeout=10, check=True)
|
||||||
|
assert "Mock Nginx Staging HTTPS" in result.stdout
|
||||||
|
assert "X-Mock-Service: staging" in result.stdout or "x-mock-service: staging" in result.stdout.lower()
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
pytest.fail(f"Curl failed with exit code {e.returncode}: {e.stderr}")
|
||||||
|
except subprocess.TimeoutExpired:
|
||||||
|
pytest.fail("Curl timed out")
|
||||||
|
|
||||||
|
@pytest.mark.skipif(os.getenv("CI") is not None, reason="Skipping mock-dependent test in CI")
|
||||||
|
def test_dev_https_routing():
|
||||||
|
"""Verify HTTPS requests to *.dev.kovagoadi.hu are routed to the mock."""
|
||||||
|
host = "bar.dev.kovagoadi.hu"
|
||||||
|
cmd = [
|
||||||
|
"curl", "-s", "-k", "-i", "--fail",
|
||||||
|
"--resolve", f"{host}:{HTTPS_PORT}:127.0.0.1",
|
||||||
|
f"https://{host}:{HTTPS_PORT}"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
result = subprocess.run(cmd, capture_output=True, text=True, timeout=10, check=True)
|
||||||
|
assert "Mock Nginx Staging HTTPS" in result.stdout
|
||||||
|
assert "X-Mock-Service: staging" in result.stdout or "x-mock-service: staging" in result.stdout.lower()
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
pytest.fail(f"Curl failed with exit code {e.returncode}: {e.stderr}")
|
||||||
|
except subprocess.TimeoutExpired:
|
||||||
|
pytest.fail("Curl timed out")
|
||||||
19
tests/mock_nginx/certs/server.crt
Normal file
19
tests/mock_nginx/certs/server.crt
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDCzCCAfOgAwIBAgIUU5vuywVWaoDfFyee7NCy0BqXU3kwDQYJKoZIhvcNAQEL
|
||||||
|
BQAwFTETMBEGA1UEAwwKbW9jay1uZ2lueDAeFw0yNTEyMjUxNjAwMTNaFw0yNjEy
|
||||||
|
MjUxNjAwMTNaMBUxEzARBgNVBAMMCm1vY2stbmdpbngwggEiMA0GCSqGSIb3DQEB
|
||||||
|
AQUAA4IBDwAwggEKAoIBAQCaoLrs78+HbDFB/HsXTy5nqtP7V33Js0GDWxk6QkOq
|
||||||
|
qbCtd5e2fzjkFFWkFIuouLEL1+4xW5txToaCtIYhQUgwST/Wu4wLlzrueRmprTh2
|
||||||
|
oTLbpSVXn6kO7dvDinsfelcjnLNgjRkkKPRYVvnCsrr2O9gFhClWf+WKMuNP99/O
|
||||||
|
4Y7Na4l6fyQAMjDSgdFjVvB+D9YMbkfNmo5hs009lF0Y6u35hIaY1NyfI+csvwWZ
|
||||||
|
j75I/1TGKQGwrmtG2U31xM8Y8mj7mye0IeXoIg8rl/efYVKRcEBahu0140t6A69g
|
||||||
|
N7kCSsGhl78VJEUVz5OuOSdV9UDwzawiHh/M+1KE3/3VAgMBAAGjUzBRMB0GA1Ud
|
||||||
|
DgQWBBQOgMuir6oD712l2GKpUoPo0RUcyDAfBgNVHSMEGDAWgBQOgMuir6oD712l
|
||||||
|
2GKpUoPo0RUcyDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAv
|
||||||
|
52u9mAOTKStdNZA4R68icJRXmOuxkTh9/rMdOYFF+GM2bMiX1DsvY9/VAFuy7EdZ
|
||||||
|
yfvu72JyaBDMljryz6doupXm9Do9um2sTU0YKkarV2EECYqt5uC56KWs9XZ9mnYW
|
||||||
|
wnTrLTbGZhRbGz4pq+Pq7Z1VUexV/Tnoxs5RlOaDxrlaS9htLfIR3dv2bhQiMGN9
|
||||||
|
1LESNZ16c3s4026pxeojCKFVf2GS+IBdbzljdUzBMVzwGl10UZQHfMDJptuW6JKo
|
||||||
|
rO5XVp5cLpLzSgUSGtGIoT2dR2Nk5kxGw4VbRCKKD7CDdS+JFypSwdg3v2oNfAmV
|
||||||
|
op1lOPZtztQRw/6zo4Ex
|
||||||
|
-----END CERTIFICATE-----
|
||||||
28
tests/mock_nginx/certs/server.key
Normal file
28
tests/mock_nginx/certs/server.key
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCaoLrs78+HbDFB
|
||||||
|
/HsXTy5nqtP7V33Js0GDWxk6QkOqqbCtd5e2fzjkFFWkFIuouLEL1+4xW5txToaC
|
||||||
|
tIYhQUgwST/Wu4wLlzrueRmprTh2oTLbpSVXn6kO7dvDinsfelcjnLNgjRkkKPRY
|
||||||
|
VvnCsrr2O9gFhClWf+WKMuNP99/O4Y7Na4l6fyQAMjDSgdFjVvB+D9YMbkfNmo5h
|
||||||
|
s009lF0Y6u35hIaY1NyfI+csvwWZj75I/1TGKQGwrmtG2U31xM8Y8mj7mye0IeXo
|
||||||
|
Ig8rl/efYVKRcEBahu0140t6A69gN7kCSsGhl78VJEUVz5OuOSdV9UDwzawiHh/M
|
||||||
|
+1KE3/3VAgMBAAECggEANx57c5Fqj1IMXwLC2ATEPHUDGpHOB5PMEyhqnj9XwqK5
|
||||||
|
laRPYuEH5Rmwi4w9Wnf3uIqQ4GxQxTuiLD5wn7MXKgs6Y++31LvkaHSnprnWKkd9
|
||||||
|
Cxnb7Ve/GlDEqXgYOpjQLiQiNxUk9KRasZDTeElg5vxfHVxGpgxyROit6egokiR8
|
||||||
|
JNglP+zrHicuvzl4f2DGQmjF5C4HQgyFIVrBv+vNKlqKmg2HatKIqBE60u7uw6CI
|
||||||
|
/Q8ecqU9oVZscOF9T6hUJX0xijGSsE5UTR87U2zo0+fQRJ5qZ5pLjIuF5YiCi0eT
|
||||||
|
qZex+h1TuTHNFoc1gcAyj5eDZQwwzZiR/Lae/pDyYwKBgQDVPy/elkUkoDm/OlbE
|
||||||
|
g+wZpBAGGw2ACCK5SpgwRVmHEZUvBbNZgLfE0BydaK88eDTDbLpvfVNvMoNrZQTh
|
||||||
|
bAqt9XsFBzmfMusiDYbK3ebhooObEcc6I1GmU5fqHuDv3h0CaEli2JjPmB44mXr8
|
||||||
|
EGtl98nijNgAmbaA3p7IlWGeGwKBgQC5oPJOjSw6ZRywZwB220tIm0vMcp60sTmq
|
||||||
|
H+ESaNMkpB38T9OBTdprBjAUzDCZC4jKFwU03ZQtGIN9S6BhogqyP8BRI/+lGJRQ
|
||||||
|
ZLT1eVSHuC8bX1kVfb5tlahRQ2VUSj5cZxyOiZ8JXa1r1bf8/FZ/0tzLB4a7Ge5Z
|
||||||
|
2lyQXa3SzwKBgCGCDkmRn0fEDY7o4d17RUw6JXJwKczmel5XRFbBbvH0Z1a+NJJp
|
||||||
|
0XaRpQ1u96ou0Uur+Bewv72HWHM1qnCpg3wWSMBfhERpwdzV90pFWBQ4bymcv4t5
|
||||||
|
JUlXdVWKiJnocvJ/5JgtpMVqB8WpCFQ3WEjriMOakg52GOFjGdw27OHlAoGBAKmk
|
||||||
|
eezpvXK8dySLbXQx4zI+ol38nie6E13zdmixnczNo42zkjKIaMUISaaoGP20+dTe
|
||||||
|
huaSXVl9HqXCGJdBVI8kDejZgkdqGBkEgBAaSvMhkwNr9ujaGs7hR4rEkfUfSLB/
|
||||||
|
lyx4fvw7PULgdR3hqld06E0v2qRhBV/eXFufET0nAoGAaXKncm7o2LnMIcJV3qrk
|
||||||
|
c0darLx+VWg0ILnE3/6kGSgGGnMm93tEwSX8h7Nq7QRNkVLUalVAcjm7jR9XGNsY
|
||||||
|
W8oXqsyqmntNSA2f9w4MqYO2/i/xtN830qW2nw/RLLV5avD6EkY2KrlFbrrZQr2y
|
||||||
|
q8oFyEAxJc8Kmo5ocnrPq1s=
|
||||||
|
-----END PRIVATE KEY-----
|
||||||
26
tests/mock_nginx/legacy.conf
Normal file
26
tests/mock_nginx/legacy.conf
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
events {}
|
||||||
|
|
||||||
|
http {
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "legacy";
|
||||||
|
return 200 "Mock Nginx Legacy HTTP\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
ssl_certificate /etc/nginx/certs/server.crt;
|
||||||
|
ssl_certificate_key /etc/nginx/certs/server.key;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "legacy";
|
||||||
|
return 200 "Mock Nginx Legacy HTTPS\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
26
tests/mock_nginx/nginx.conf
Normal file
26
tests/mock_nginx/nginx.conf
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
events {}
|
||||||
|
|
||||||
|
http {
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "true";
|
||||||
|
return 200 "Mock Nginx HTTP\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
ssl_certificate /etc/nginx/certs/server.crt;
|
||||||
|
ssl_certificate_key /etc/nginx/certs/server.key;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "true";
|
||||||
|
return 200 "Mock Nginx HTTPS\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
26
tests/mock_nginx/staging.conf
Normal file
26
tests/mock_nginx/staging.conf
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
events {}
|
||||||
|
|
||||||
|
http {
|
||||||
|
server {
|
||||||
|
listen 8080;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "staging";
|
||||||
|
return 200 "Mock Nginx Staging HTTP\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 445 ssl;
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
ssl_certificate /etc/nginx/certs/server.crt;
|
||||||
|
ssl_certificate_key /etc/nginx/certs/server.key;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header X-Mock-Service "staging";
|
||||||
|
return 200 "Mock Nginx Staging HTTPS\n";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
37
tests/regression.sh
Executable file
37
tests/regression.sh
Executable file
@@ -0,0 +1,37 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
DOMAIN=${DOMAIN:-dev.kovagoadi.hu}
|
||||||
|
# Configuration
|
||||||
|
DOMAIN=${DOMAIN:-dev.kovagoadi.hu}
|
||||||
|
PORT=${PORT:-898}
|
||||||
|
# We target localhost directly to test the local instance, bypassing public DNS
|
||||||
|
TARGET_URL="http://127.0.0.1:${PORT}"
|
||||||
|
HOST_HEADER="test-whoami.${DOMAIN}"
|
||||||
|
|
||||||
|
echo "Running regression tests against ${TARGET_URL} with Host: ${HOST_HEADER}..."
|
||||||
|
|
||||||
|
# Test 1: Check if whoami service is reachable and returns 200 OK
|
||||||
|
echo "Test 1: Checking connectivity to whoami service..."
|
||||||
|
HTTP_CODE=$(curl -s -o /dev/null -w "%{http_code}" -H "Host: ${HOST_HEADER}" "${TARGET_URL}")
|
||||||
|
|
||||||
|
if [ "$HTTP_CODE" -eq 200 ]; then
|
||||||
|
echo " [PASS] Service returned 200 OK"
|
||||||
|
else
|
||||||
|
echo " [FAIL] Service returned $HTTP_CODE (Expected 200)"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Test 2: Check for specific content (whoami usually returns "Hostname: ...")
|
||||||
|
echo "Test 2: Checking content..."
|
||||||
|
CONTENT=$(curl -s -H "Host: ${HOST_HEADER}" "${TARGET_URL}")
|
||||||
|
if echo "$CONTENT" | grep -q "Hostname:"; then
|
||||||
|
echo " [PASS] Content contains 'Hostname:'"
|
||||||
|
else
|
||||||
|
echo " [FAIL] Content does not look like whoami output"
|
||||||
|
echo " Output: $CONTENT"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "All regression tests passed!"
|
||||||
Reference in New Issue
Block a user