From 3535af51980a9ba3de78b0e9d1247ffdff8c0035 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Mon, 15 Apr 2024 13:50:07 +0200 Subject: [PATCH 01/17] migrate mockery config --- .mockery.yaml | 25 +- .../handler_action_diagnostics_test.go | 49 +- .../handler_action_policy_change_test.go | 1 + .../application/upgrade/rollback_test.go | 2 +- .../agent/application/upgrade/upgrade_test.go | 2 +- magefile.go | 55 +++ pkg/control/v2/client/client.go | 2 - .../handlers/diagnostics_provider_mock.go | 29 +- .../actions/handlers/log_level_setter_mock.go | 89 ++++ .../actions/handlers/uploader_mock.go | 21 +- .../pkg/agent/application/info/agent_mock.go | 450 ++++++++++++++++++ .../pkg/fleetapi/acker/acker_mock.go | 25 +- .../pkg/control/v2/client/client_mock.go | 44 +- 13 files changed, 725 insertions(+), 69 deletions(-) rename internal/pkg/agent/application/actions/handlers/mocks/diagnostics_provider.go => testing/mocks/internal_/pkg/agent/application/actions/handlers/diagnostics_provider_mock.go (94%) create mode 100644 testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go rename internal/pkg/agent/application/actions/handlers/mocks/uploader.go => testing/mocks/internal_/pkg/agent/application/actions/handlers/uploader_mock.go (87%) create mode 100644 testing/mocks/internal_/pkg/agent/application/info/agent_mock.go rename internal/pkg/agent/application/actions/handlers/mocks/acker.go => testing/mocks/internal_/pkg/fleetapi/acker/acker_mock.go (88%) rename pkg/control/v2/client/mocks/client.go => testing/mocks/pkg/control/v2/client/client_mock.go (96%) diff --git a/.mockery.yaml b/.mockery.yaml index 2cf0461278e..7b8363171e9 100644 --- a/.mockery.yaml +++ b/.mockery.yaml @@ -1,5 +1,22 @@ -inpackage: False -testonly: False with-expecter: True -keeptree: True -case: underscore \ No newline at end of file +inpackage: false +dir: testing/mocks/{{ replaceAll .InterfaceDirRelative "internal" "internal_" }} +mockname: "{{.InterfaceName}}" +outpkg: "{{.PackageName}}" +filename: "{{ snakecase .InterfaceName}}_mock.go" +packages: + github.com/elastic/elastic-agent/pkg/control/v2/client: + interfaces: + Client: + github.com/elastic/elastic-agent/internal/pkg/agent/application/actions/handlers: + interfaces: + Uploader: + diagnosticsProvider: + config: + mockname: "DiagnosticsProvider" + logLevelSetter: + config: + mockname: "LogLevelSetter" + github.com/elastic/elastic-agent/internal/pkg/fleetapi/acker: + interfaces: + Acker: \ No newline at end of file diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_diagnostics_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_diagnostics_test.go index 27e476338b3..6eda314ec5c 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_diagnostics_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_diagnostics_test.go @@ -20,7 +20,6 @@ import ( "github.com/elastic/elastic-agent-client/v7/pkg/proto" "github.com/elastic/elastic-agent/pkg/control/v2/cproto" - "github.com/elastic/elastic-agent/internal/pkg/agent/application/actions/handlers/mocks" "github.com/elastic/elastic-agent/internal/pkg/agent/application/paths" "github.com/elastic/elastic-agent/internal/pkg/agent/errors" "github.com/elastic/elastic-agent/internal/pkg/core/monitoring/config" @@ -29,12 +28,10 @@ import ( "github.com/elastic/elastic-agent/pkg/component" "github.com/elastic/elastic-agent/pkg/component/runtime" "github.com/elastic/elastic-agent/pkg/core/logger" + mockhandlers "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/actions/handlers" + mockackers "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/fleetapi/acker" ) -//go:generate mockery --name Uploader -//go:generate mockery --name diagnosticsProvider --exported -//go:generate mockery --dir ../../../../fleetapi/acker --name Acker - var defaultRateLimit config.Limit = config.Limit{ Interval: 1 * time.Millisecond, Burst: 10, @@ -84,8 +81,8 @@ func TestDiagnosticHandlerHappyPathWithLogs(t *testing.T) { err := os.MkdirAll(path.Join(tempAgentRoot, "data"), 0755) require.NoError(t, err) - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -93,7 +90,7 @@ func TestDiagnosticHandlerHappyPathWithLogs(t *testing.T) { mockDiagProvider.EXPECT().PerformDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentUnitDiagnostic{mockUnitDiagnostic}) mockDiagProvider.EXPECT().PerformComponentDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentDiagnostic{}, nil) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) assert.NoError(t, a.(*fleetapi.ActionDiagnostics).Err) @@ -165,8 +162,8 @@ func TestDiagnosticHandlerUploaderErrorWithLogs(t *testing.T) { err := os.MkdirAll(path.Join(tempAgentRoot, "data"), 0755) require.NoError(t, err) - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -178,7 +175,7 @@ func TestDiagnosticHandlerUploaderErrorWithLogs(t *testing.T) { uploaderError := errors.New("upload went wrong!") mockUploader.EXPECT().UploadDiagnostics(mock.Anything, mock.Anything, mock.Anything, mock.Anything, mock.Anything).Return("", uploaderError) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) // verify that we are acking the action with the correct error set @@ -206,8 +203,8 @@ func TestDiagnosticHandlerZipArchiveErrorWithLogs(t *testing.T) { // we don't set a 'data' subdirectory in order to make the zip process return an error // this is the only way/trick to do it with the current implementation, sadly :( - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -215,7 +212,7 @@ func TestDiagnosticHandlerZipArchiveErrorWithLogs(t *testing.T) { mockDiagProvider.EXPECT().PerformDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentUnitDiagnostic{}) mockDiagProvider.EXPECT().PerformComponentDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentDiagnostic{}, nil) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) assert.Error(t, a.(*fleetapi.ActionDiagnostics).Err) @@ -242,8 +239,8 @@ func TestDiagnosticHandlerAckErrorWithLogs(t *testing.T) { err := os.MkdirAll(path.Join(tempAgentRoot, "data"), 0755) require.NoError(t, err) - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -251,7 +248,7 @@ func TestDiagnosticHandlerAckErrorWithLogs(t *testing.T) { mockDiagProvider.EXPECT().PerformDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentUnitDiagnostic{}) mockDiagProvider.EXPECT().PerformComponentDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentDiagnostic{}, nil) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) ackError := errors.New("acking went wrong") mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) @@ -281,8 +278,8 @@ func TestDiagnosticHandlerCommitErrorWithLogs(t *testing.T) { err := os.MkdirAll(path.Join(tempAgentRoot, "data"), 0755) require.NoError(t, err) - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -290,7 +287,7 @@ func TestDiagnosticHandlerCommitErrorWithLogs(t *testing.T) { mockDiagProvider.EXPECT().PerformDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentUnitDiagnostic{}) mockDiagProvider.EXPECT().PerformComponentDiagnostics(mock.Anything, mock.Anything).Return([]runtime.ComponentDiagnostic{}, nil) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) assert.NoError(t, a.(*fleetapi.ActionDiagnostics).Err) @@ -321,14 +318,14 @@ func TestDiagnosticHandlerContexteExpiredErrorWithLogs(t *testing.T) { err := os.MkdirAll(path.Join(tempAgentRoot, "data"), 0755) require.NoError(t, err) - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, observedLogs := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) mockDiagProvider.EXPECT().DiagnosticHooks().Return([]diagnostics.Hook{}) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) assert.ErrorIs(t, a.(*fleetapi.ActionDiagnostics).Err, context.Canceled) @@ -365,8 +362,8 @@ func TestDiagnosticHandlerWithCPUProfile(t *testing.T) { return []byte(`hello, world!`), nil } - mockDiagProvider := mocks.NewDiagnosticsProvider(t) - mockUploader := mocks.NewUploader(t) + mockDiagProvider := mockhandlers.NewDiagnosticsProvider(t) + mockUploader := mockhandlers.NewUploader(t) testLogger, _ := logger.NewTesting("diagnostic-handler-test") handler := NewDiagnostics(testLogger, mockDiagProvider, defaultRateLimit, mockUploader) @@ -383,7 +380,7 @@ func TestDiagnosticHandlerWithCPUProfile(t *testing.T) { return false })).Return([]runtime.ComponentDiagnostic{}, nil) - mockAcker := mocks.NewAcker(t) + mockAcker := mockackers.NewAcker(t) mockAcker.EXPECT().Ack(mock.Anything, mock.Anything).RunAndReturn(func(ctx context.Context, a fleetapi.Action) error { require.IsType(t, new(fleetapi.ActionDiagnostics), a) assert.NoError(t, a.(*fleetapi.ActionDiagnostics).Err) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go index f9b9b413c79..16806faf7cf 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go @@ -28,6 +28,7 @@ import ( "github.com/elastic/elastic-agent/internal/pkg/fleetapi/client" "github.com/elastic/elastic-agent/internal/pkg/remote" "github.com/elastic/elastic-agent/pkg/core/logger" + mocks "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/actions/handlers" ) func TestPolicyChange(t *testing.T) { diff --git a/internal/pkg/agent/application/upgrade/rollback_test.go b/internal/pkg/agent/application/upgrade/rollback_test.go index 833844cdd1f..5c77caf7953 100644 --- a/internal/pkg/agent/application/upgrade/rollback_test.go +++ b/internal/pkg/agent/application/upgrade/rollback_test.go @@ -17,8 +17,8 @@ import ( "github.com/stretchr/testify/require" "github.com/elastic/elastic-agent/internal/pkg/agent/application/paths" - "github.com/elastic/elastic-agent/pkg/control/v2/client/mocks" "github.com/elastic/elastic-agent/pkg/core/logger" + mocks "github.com/elastic/elastic-agent/testing/mocks/pkg/control/v2/client" ) type hookFunc func(t *testing.T, topDir string) diff --git a/internal/pkg/agent/application/upgrade/upgrade_test.go b/internal/pkg/agent/application/upgrade/upgrade_test.go index 785521b339a..bcb96f44cac 100644 --- a/internal/pkg/agent/application/upgrade/upgrade_test.go +++ b/internal/pkg/agent/application/upgrade/upgrade_test.go @@ -30,10 +30,10 @@ import ( "github.com/elastic/elastic-agent/internal/pkg/release" v1 "github.com/elastic/elastic-agent/pkg/api/v1" "github.com/elastic/elastic-agent/pkg/control/v2/client" - "github.com/elastic/elastic-agent/pkg/control/v2/client/mocks" "github.com/elastic/elastic-agent/pkg/control/v2/cproto" "github.com/elastic/elastic-agent/pkg/core/logger" agtversion "github.com/elastic/elastic-agent/pkg/version" + mocks "github.com/elastic/elastic-agent/testing/mocks/pkg/control/v2/client" ) func Test_CopyFile(t *testing.T) { diff --git a/magefile.go b/magefile.go index bea9a8fa7f0..5a06e405e9f 100644 --- a/magefile.go +++ b/magefile.go @@ -203,6 +203,61 @@ func (Dev) Package() { Package() } +func mocksPath() (string, error) { + repositoryRoot, err := findRepositoryRoot() + if err != nil { + return "", fmt.Errorf("finding repository root: %w", err) + } + return filepath.Join(repositoryRoot, "testing", "mocks"), nil +} + +func (Dev) CleanMocks() error { + mPath, err := mocksPath() + if err != nil { + return fmt.Errorf("retrieving mocks path: %w", err) + } + err = os.RemoveAll(mPath) + if err != nil { + return fmt.Errorf("removing mocks: %w", err) + } + return nil +} + +func (Dev) RegenerateMocks() error { + mg.Deps(Dev.CleanMocks) + err := sh.Run("mockery") + if err != nil { + return fmt.Errorf("generating mocks: %w", err) + } + + // change CWD + workingDir, err := os.Getwd() + if err != nil { + return fmt.Errorf("retrieving CWD: %w", err) + } + // restore the working directory when exiting the function + defer func() { + err := os.Chdir(workingDir) + if err != nil { + panic(fmt.Errorf("failed to restore working dir %q: %w", workingDir, err)) + } + }() + + mPath, err := mocksPath() + if err != nil { + return fmt.Errorf("retrieving mocks path: %w", err) + } + + err = os.Chdir(mPath) + if err != nil { + return fmt.Errorf("changing current directory to %q: %w", mPath, err) + } + + mg.Deps(devtools.AddLicenseHeaders) + mg.Deps(devtools.GoImports) + return nil +} + // InstallGoLicenser install go-licenser to check license of the files. func (Prepare) InstallGoLicenser() error { return GoInstall(goLicenserRepo) diff --git a/pkg/control/v2/client/client.go b/pkg/control/v2/client/client.go index 67c52c19f28..7f263988583 100644 --- a/pkg/control/v2/client/client.go +++ b/pkg/control/v2/client/client.go @@ -158,8 +158,6 @@ type DiagnosticComponentResult struct { } // Client communicates to Elastic Agent through the control protocol. -// -//go:generate mockery --name Client type Client interface { // Connect connects to the running Elastic Agent. Connect(ctx context.Context, opts ...grpc.DialOption) error diff --git a/internal/pkg/agent/application/actions/handlers/mocks/diagnostics_provider.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/diagnostics_provider_mock.go similarity index 94% rename from internal/pkg/agent/application/actions/handlers/mocks/diagnostics_provider.go rename to testing/mocks/internal_/pkg/agent/application/actions/handlers/diagnostics_provider_mock.go index 19c2c1ef27f..9ade60bd480 100644 --- a/internal/pkg/agent/application/actions/handlers/mocks/diagnostics_provider.go +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/diagnostics_provider_mock.go @@ -2,13 +2,9 @@ // or more contributor license agreements. Licensed under the Elastic License; // you may not use this file except in compliance with the Elastic License. -// Code generated by mockery v2.23.1. DO NOT EDIT. +// Code generated by mockery v2.42.2. DO NOT EDIT. -// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one -// or more contributor license agreements. Licensed under the Elastic License; -// you may not use this file except in compliance with the Elastic License. - -package mocks +package handlers import ( context "context" @@ -41,6 +37,10 @@ func (_m *DiagnosticsProvider) EXPECT() *DiagnosticsProvider_Expecter { func (_m *DiagnosticsProvider) DiagnosticHooks() diagnostics.Hooks { ret := _m.Called() + if len(ret) == 0 { + panic("no return value specified for DiagnosticHooks") + } + var r0 diagnostics.Hooks if rf, ok := ret.Get(0).(func() diagnostics.Hooks); ok { r0 = rf() @@ -91,6 +91,10 @@ func (_m *DiagnosticsProvider) PerformComponentDiagnostics(ctx context.Context, _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for PerformComponentDiagnostics") + } + var r0 []runtime.ComponentDiagnostic var r1 error if rf, ok := ret.Get(0).(func(context.Context, []cproto.AdditionalDiagnosticRequest, ...component.Component) ([]runtime.ComponentDiagnostic, error)); ok { @@ -161,6 +165,10 @@ func (_m *DiagnosticsProvider) PerformDiagnostics(ctx context.Context, req ...ru _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for PerformDiagnostics") + } + var r0 []runtime.ComponentUnitDiagnostic if rf, ok := ret.Get(0).(func(context.Context, ...runtime.ComponentUnitDiagnosticRequest) []runtime.ComponentUnitDiagnostic); ok { r0 = rf(ctx, req...) @@ -209,13 +217,12 @@ func (_c *DiagnosticsProvider_PerformDiagnostics_Call) RunAndReturn(run func(con return _c } -type mockConstructorTestingTNewDiagnosticsProvider interface { +// NewDiagnosticsProvider creates a new instance of DiagnosticsProvider. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewDiagnosticsProvider(t interface { mock.TestingT Cleanup(func()) -} - -// NewDiagnosticsProvider creates a new instance of DiagnosticsProvider. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. -func NewDiagnosticsProvider(t mockConstructorTestingTNewDiagnosticsProvider) *DiagnosticsProvider { +}) *DiagnosticsProvider { mock := &DiagnosticsProvider{} mock.Mock.Test(t) diff --git a/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go new file mode 100644 index 00000000000..1a66299c6cb --- /dev/null +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go @@ -0,0 +1,89 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +// Code generated by mockery v2.42.2. DO NOT EDIT. + +package handlers + +import ( + context "context" + + logp "github.com/elastic/elastic-agent-libs/logp" + + mock "github.com/stretchr/testify/mock" +) + +// LogLevelSetter is an autogenerated mock type for the logLevelSetter type +type LogLevelSetter struct { + mock.Mock +} + +type LogLevelSetter_Expecter struct { + mock *mock.Mock +} + +func (_m *LogLevelSetter) EXPECT() *LogLevelSetter_Expecter { + return &LogLevelSetter_Expecter{mock: &_m.Mock} +} + +// SetLogLevel provides a mock function with given fields: ctx, lvl +func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl logp.Level) error { + ret := _m.Called(ctx, lvl) + + if len(ret) == 0 { + panic("no return value specified for SetLogLevel") + } + + var r0 error + if rf, ok := ret.Get(0).(func(context.Context, logp.Level) error); ok { + r0 = rf(ctx, lvl) + } else { + r0 = ret.Error(0) + } + + return r0 +} + +// LogLevelSetter_SetLogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'SetLogLevel' +type LogLevelSetter_SetLogLevel_Call struct { + *mock.Call +} + +// SetLogLevel is a helper method to define mock.On call +// - ctx context.Context +// - lvl logp.Level +func (_e *LogLevelSetter_Expecter) SetLogLevel(ctx interface{}, lvl interface{}) *LogLevelSetter_SetLogLevel_Call { + return &LogLevelSetter_SetLogLevel_Call{Call: _e.mock.On("SetLogLevel", ctx, lvl)} +} + +func (_c *LogLevelSetter_SetLogLevel_Call) Run(run func(ctx context.Context, lvl logp.Level)) *LogLevelSetter_SetLogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run(args[0].(context.Context), args[1].(logp.Level)) + }) + return _c +} + +func (_c *LogLevelSetter_SetLogLevel_Call) Return(_a0 error) *LogLevelSetter_SetLogLevel_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *LogLevelSetter_SetLogLevel_Call) RunAndReturn(run func(context.Context, logp.Level) error) *LogLevelSetter_SetLogLevel_Call { + _c.Call.Return(run) + return _c +} + +// NewLogLevelSetter creates a new instance of LogLevelSetter. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewLogLevelSetter(t interface { + mock.TestingT + Cleanup(func()) +}) *LogLevelSetter { + mock := &LogLevelSetter{} + mock.Mock.Test(t) + + t.Cleanup(func() { mock.AssertExpectations(t) }) + + return mock +} diff --git a/internal/pkg/agent/application/actions/handlers/mocks/uploader.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/uploader_mock.go similarity index 87% rename from internal/pkg/agent/application/actions/handlers/mocks/uploader.go rename to testing/mocks/internal_/pkg/agent/application/actions/handlers/uploader_mock.go index e7aa6215826..f8e00212661 100644 --- a/internal/pkg/agent/application/actions/handlers/mocks/uploader.go +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/uploader_mock.go @@ -2,13 +2,9 @@ // or more contributor license agreements. Licensed under the Elastic License; // you may not use this file except in compliance with the Elastic License. -// Code generated by mockery v2.23.1. DO NOT EDIT. +// Code generated by mockery v2.42.2. DO NOT EDIT. -// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one -// or more contributor license agreements. Licensed under the Elastic License; -// you may not use this file except in compliance with the Elastic License. - -package mocks +package handlers import ( context "context" @@ -35,6 +31,10 @@ func (_m *Uploader) EXPECT() *Uploader_Expecter { func (_m *Uploader) UploadDiagnostics(_a0 context.Context, _a1 string, _a2 string, _a3 int64, _a4 io.Reader) (string, error) { ret := _m.Called(_a0, _a1, _a2, _a3, _a4) + if len(ret) == 0 { + panic("no return value specified for UploadDiagnostics") + } + var r0 string var r1 error if rf, ok := ret.Get(0).(func(context.Context, string, string, int64, io.Reader) (string, error)); ok { @@ -87,13 +87,12 @@ func (_c *Uploader_UploadDiagnostics_Call) RunAndReturn(run func(context.Context return _c } -type mockConstructorTestingTNewUploader interface { +// NewUploader creates a new instance of Uploader. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewUploader(t interface { mock.TestingT Cleanup(func()) -} - -// NewUploader creates a new instance of Uploader. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. -func NewUploader(t mockConstructorTestingTNewUploader) *Uploader { +}) *Uploader { mock := &Uploader{} mock.Mock.Test(t) diff --git a/testing/mocks/internal_/pkg/agent/application/info/agent_mock.go b/testing/mocks/internal_/pkg/agent/application/info/agent_mock.go new file mode 100644 index 00000000000..43c58414e68 --- /dev/null +++ b/testing/mocks/internal_/pkg/agent/application/info/agent_mock.go @@ -0,0 +1,450 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +// Code generated by mockery v2.42.2. DO NOT EDIT. + +package info + +import ( + context "context" + + mock "github.com/stretchr/testify/mock" +) + +// Agent is an autogenerated mock type for the Agent type +type Agent struct { + mock.Mock +} + +type Agent_Expecter struct { + mock *mock.Mock +} + +func (_m *Agent) EXPECT() *Agent_Expecter { + return &Agent_Expecter{mock: &_m.Mock} +} + +// AgentID provides a mock function with given fields: +func (_m *Agent) AgentID() string { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for AgentID") + } + + var r0 string + if rf, ok := ret.Get(0).(func() string); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(string) + } + + return r0 +} + +// Agent_AgentID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'AgentID' +type Agent_AgentID_Call struct { + *mock.Call +} + +// AgentID is a helper method to define mock.On call +func (_e *Agent_Expecter) AgentID() *Agent_AgentID_Call { + return &Agent_AgentID_Call{Call: _e.mock.On("AgentID")} +} + +func (_c *Agent_AgentID_Call) Run(run func()) *Agent_AgentID_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_AgentID_Call) Return(_a0 string) *Agent_AgentID_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_AgentID_Call) RunAndReturn(run func() string) *Agent_AgentID_Call { + _c.Call.Return(run) + return _c +} + +// Headers provides a mock function with given fields: +func (_m *Agent) Headers() map[string]string { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for Headers") + } + + var r0 map[string]string + if rf, ok := ret.Get(0).(func() map[string]string); ok { + r0 = rf() + } else { + if ret.Get(0) != nil { + r0 = ret.Get(0).(map[string]string) + } + } + + return r0 +} + +// Agent_Headers_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Headers' +type Agent_Headers_Call struct { + *mock.Call +} + +// Headers is a helper method to define mock.On call +func (_e *Agent_Expecter) Headers() *Agent_Headers_Call { + return &Agent_Headers_Call{Call: _e.mock.On("Headers")} +} + +func (_c *Agent_Headers_Call) Run(run func()) *Agent_Headers_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_Headers_Call) Return(_a0 map[string]string) *Agent_Headers_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_Headers_Call) RunAndReturn(run func() map[string]string) *Agent_Headers_Call { + _c.Call.Return(run) + return _c +} + +// LogLevel provides a mock function with given fields: +func (_m *Agent) LogLevel() string { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for LogLevel") + } + + var r0 string + if rf, ok := ret.Get(0).(func() string); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(string) + } + + return r0 +} + +// Agent_LogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'LogLevel' +type Agent_LogLevel_Call struct { + *mock.Call +} + +// LogLevel is a helper method to define mock.On call +func (_e *Agent_Expecter) LogLevel() *Agent_LogLevel_Call { + return &Agent_LogLevel_Call{Call: _e.mock.On("LogLevel")} +} + +func (_c *Agent_LogLevel_Call) Run(run func()) *Agent_LogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_LogLevel_Call) Return(_a0 string) *Agent_LogLevel_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_LogLevel_Call) RunAndReturn(run func() string) *Agent_LogLevel_Call { + _c.Call.Return(run) + return _c +} + +// RawLogLevel provides a mock function with given fields: +func (_m *Agent) RawLogLevel() string { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for RawLogLevel") + } + + var r0 string + if rf, ok := ret.Get(0).(func() string); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(string) + } + + return r0 +} + +// Agent_RawLogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'RawLogLevel' +type Agent_RawLogLevel_Call struct { + *mock.Call +} + +// RawLogLevel is a helper method to define mock.On call +func (_e *Agent_Expecter) RawLogLevel() *Agent_RawLogLevel_Call { + return &Agent_RawLogLevel_Call{Call: _e.mock.On("RawLogLevel")} +} + +func (_c *Agent_RawLogLevel_Call) Run(run func()) *Agent_RawLogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_RawLogLevel_Call) Return(_a0 string) *Agent_RawLogLevel_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_RawLogLevel_Call) RunAndReturn(run func() string) *Agent_RawLogLevel_Call { + _c.Call.Return(run) + return _c +} + +// ReloadID provides a mock function with given fields: ctx +func (_m *Agent) ReloadID(ctx context.Context) error { + ret := _m.Called(ctx) + + if len(ret) == 0 { + panic("no return value specified for ReloadID") + } + + var r0 error + if rf, ok := ret.Get(0).(func(context.Context) error); ok { + r0 = rf(ctx) + } else { + r0 = ret.Error(0) + } + + return r0 +} + +// Agent_ReloadID_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'ReloadID' +type Agent_ReloadID_Call struct { + *mock.Call +} + +// ReloadID is a helper method to define mock.On call +// - ctx context.Context +func (_e *Agent_Expecter) ReloadID(ctx interface{}) *Agent_ReloadID_Call { + return &Agent_ReloadID_Call{Call: _e.mock.On("ReloadID", ctx)} +} + +func (_c *Agent_ReloadID_Call) Run(run func(ctx context.Context)) *Agent_ReloadID_Call { + _c.Call.Run(func(args mock.Arguments) { + run(args[0].(context.Context)) + }) + return _c +} + +func (_c *Agent_ReloadID_Call) Return(_a0 error) *Agent_ReloadID_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_ReloadID_Call) RunAndReturn(run func(context.Context) error) *Agent_ReloadID_Call { + _c.Call.Return(run) + return _c +} + +// SetLogLevel provides a mock function with given fields: ctx, level +func (_m *Agent) SetLogLevel(ctx context.Context, level string) error { + ret := _m.Called(ctx, level) + + if len(ret) == 0 { + panic("no return value specified for SetLogLevel") + } + + var r0 error + if rf, ok := ret.Get(0).(func(context.Context, string) error); ok { + r0 = rf(ctx, level) + } else { + r0 = ret.Error(0) + } + + return r0 +} + +// Agent_SetLogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'SetLogLevel' +type Agent_SetLogLevel_Call struct { + *mock.Call +} + +// SetLogLevel is a helper method to define mock.On call +// - ctx context.Context +// - level string +func (_e *Agent_Expecter) SetLogLevel(ctx interface{}, level interface{}) *Agent_SetLogLevel_Call { + return &Agent_SetLogLevel_Call{Call: _e.mock.On("SetLogLevel", ctx, level)} +} + +func (_c *Agent_SetLogLevel_Call) Run(run func(ctx context.Context, level string)) *Agent_SetLogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run(args[0].(context.Context), args[1].(string)) + }) + return _c +} + +func (_c *Agent_SetLogLevel_Call) Return(_a0 error) *Agent_SetLogLevel_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_SetLogLevel_Call) RunAndReturn(run func(context.Context, string) error) *Agent_SetLogLevel_Call { + _c.Call.Return(run) + return _c +} + +// Snapshot provides a mock function with given fields: +func (_m *Agent) Snapshot() bool { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for Snapshot") + } + + var r0 bool + if rf, ok := ret.Get(0).(func() bool); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(bool) + } + + return r0 +} + +// Agent_Snapshot_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Snapshot' +type Agent_Snapshot_Call struct { + *mock.Call +} + +// Snapshot is a helper method to define mock.On call +func (_e *Agent_Expecter) Snapshot() *Agent_Snapshot_Call { + return &Agent_Snapshot_Call{Call: _e.mock.On("Snapshot")} +} + +func (_c *Agent_Snapshot_Call) Run(run func()) *Agent_Snapshot_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_Snapshot_Call) Return(_a0 bool) *Agent_Snapshot_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_Snapshot_Call) RunAndReturn(run func() bool) *Agent_Snapshot_Call { + _c.Call.Return(run) + return _c +} + +// Unprivileged provides a mock function with given fields: +func (_m *Agent) Unprivileged() bool { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for Unprivileged") + } + + var r0 bool + if rf, ok := ret.Get(0).(func() bool); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(bool) + } + + return r0 +} + +// Agent_Unprivileged_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Unprivileged' +type Agent_Unprivileged_Call struct { + *mock.Call +} + +// Unprivileged is a helper method to define mock.On call +func (_e *Agent_Expecter) Unprivileged() *Agent_Unprivileged_Call { + return &Agent_Unprivileged_Call{Call: _e.mock.On("Unprivileged")} +} + +func (_c *Agent_Unprivileged_Call) Run(run func()) *Agent_Unprivileged_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_Unprivileged_Call) Return(_a0 bool) *Agent_Unprivileged_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_Unprivileged_Call) RunAndReturn(run func() bool) *Agent_Unprivileged_Call { + _c.Call.Return(run) + return _c +} + +// Version provides a mock function with given fields: +func (_m *Agent) Version() string { + ret := _m.Called() + + if len(ret) == 0 { + panic("no return value specified for Version") + } + + var r0 string + if rf, ok := ret.Get(0).(func() string); ok { + r0 = rf() + } else { + r0 = ret.Get(0).(string) + } + + return r0 +} + +// Agent_Version_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'Version' +type Agent_Version_Call struct { + *mock.Call +} + +// Version is a helper method to define mock.On call +func (_e *Agent_Expecter) Version() *Agent_Version_Call { + return &Agent_Version_Call{Call: _e.mock.On("Version")} +} + +func (_c *Agent_Version_Call) Run(run func()) *Agent_Version_Call { + _c.Call.Run(func(args mock.Arguments) { + run() + }) + return _c +} + +func (_c *Agent_Version_Call) Return(_a0 string) *Agent_Version_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *Agent_Version_Call) RunAndReturn(run func() string) *Agent_Version_Call { + _c.Call.Return(run) + return _c +} + +// NewAgent creates a new instance of Agent. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewAgent(t interface { + mock.TestingT + Cleanup(func()) +}) *Agent { + mock := &Agent{} + mock.Mock.Test(t) + + t.Cleanup(func() { mock.AssertExpectations(t) }) + + return mock +} diff --git a/internal/pkg/agent/application/actions/handlers/mocks/acker.go b/testing/mocks/internal_/pkg/fleetapi/acker/acker_mock.go similarity index 88% rename from internal/pkg/agent/application/actions/handlers/mocks/acker.go rename to testing/mocks/internal_/pkg/fleetapi/acker/acker_mock.go index 4ba93c357c9..984eb6321aa 100644 --- a/internal/pkg/agent/application/actions/handlers/mocks/acker.go +++ b/testing/mocks/internal_/pkg/fleetapi/acker/acker_mock.go @@ -2,13 +2,9 @@ // or more contributor license agreements. Licensed under the Elastic License; // you may not use this file except in compliance with the Elastic License. -// Code generated by mockery v2.23.1. DO NOT EDIT. +// Code generated by mockery v2.42.2. DO NOT EDIT. -// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one -// or more contributor license agreements. Licensed under the Elastic License; -// you may not use this file except in compliance with the Elastic License. - -package mocks +package acker import ( context "context" @@ -35,6 +31,10 @@ func (_m *Acker) EXPECT() *Acker_Expecter { func (_m *Acker) Ack(ctx context.Context, action fleetapi.Action) error { ret := _m.Called(ctx, action) + if len(ret) == 0 { + panic("no return value specified for Ack") + } + var r0 error if rf, ok := ret.Get(0).(func(context.Context, fleetapi.Action) error); ok { r0 = rf(ctx, action) @@ -78,6 +78,10 @@ func (_c *Acker_Ack_Call) RunAndReturn(run func(context.Context, fleetapi.Action func (_m *Acker) Commit(ctx context.Context) error { ret := _m.Called(ctx) + if len(ret) == 0 { + panic("no return value specified for Commit") + } + var r0 error if rf, ok := ret.Get(0).(func(context.Context) error); ok { r0 = rf(ctx) @@ -116,13 +120,12 @@ func (_c *Acker_Commit_Call) RunAndReturn(run func(context.Context) error) *Acke return _c } -type mockConstructorTestingTNewAcker interface { +// NewAcker creates a new instance of Acker. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewAcker(t interface { mock.TestingT Cleanup(func()) -} - -// NewAcker creates a new instance of Acker. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. -func NewAcker(t mockConstructorTestingTNewAcker) *Acker { +}) *Acker { mock := &Acker{} mock.Mock.Test(t) diff --git a/pkg/control/v2/client/mocks/client.go b/testing/mocks/pkg/control/v2/client/client_mock.go similarity index 96% rename from pkg/control/v2/client/mocks/client.go rename to testing/mocks/pkg/control/v2/client/client_mock.go index 1b6668798a3..e688490e67a 100644 --- a/pkg/control/v2/client/mocks/client.go +++ b/testing/mocks/pkg/control/v2/client/client_mock.go @@ -2,9 +2,9 @@ // or more contributor license agreements. Licensed under the Elastic License; // you may not use this file except in compliance with the Elastic License. -// Code generated by mockery v2.36.0. DO NOT EDIT. +// Code generated by mockery v2.42.2. DO NOT EDIT. -package mocks +package client import ( context "context" @@ -35,6 +35,10 @@ func (_m *Client) EXPECT() *Client_Expecter { func (_m *Client) Configure(ctx context.Context, config string) error { ret := _m.Called(ctx, config) + if len(ret) == 0 { + panic("no return value specified for Configure") + } + var r0 error if rf, ok := ret.Get(0).(func(context.Context, string) error); ok { r0 = rf(ctx, config) @@ -85,6 +89,10 @@ func (_m *Client) Connect(ctx context.Context, opts ...grpc.DialOption) error { _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for Connect") + } + var r0 error if rf, ok := ret.Get(0).(func(context.Context, ...grpc.DialOption) error); ok { r0 = rf(ctx, opts...) @@ -135,6 +143,10 @@ func (_c *Client_Connect_Call) RunAndReturn(run func(context.Context, ...grpc.Di func (_m *Client) DiagnosticAgent(ctx context.Context, additionalDiags []cproto.AdditionalDiagnosticRequest) ([]client.DiagnosticFileResult, error) { ret := _m.Called(ctx, additionalDiags) + if len(ret) == 0 { + panic("no return value specified for DiagnosticAgent") + } + var r0 []client.DiagnosticFileResult var r1 error if rf, ok := ret.Get(0).(func(context.Context, []cproto.AdditionalDiagnosticRequest) ([]client.DiagnosticFileResult, error)); ok { @@ -197,6 +209,10 @@ func (_m *Client) DiagnosticComponents(ctx context.Context, additionalDiags []cp _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for DiagnosticComponents") + } + var r0 []client.DiagnosticComponentResult var r1 error if rf, ok := ret.Get(0).(func(context.Context, []cproto.AdditionalDiagnosticRequest, ...client.DiagnosticComponentRequest) ([]client.DiagnosticComponentResult, error)); ok { @@ -267,6 +283,10 @@ func (_m *Client) DiagnosticUnits(ctx context.Context, units ...client.Diagnosti _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for DiagnosticUnits") + } + var r0 []client.DiagnosticUnitResult var r1 error if rf, ok := ret.Get(0).(func(context.Context, ...client.DiagnosticUnitRequest) ([]client.DiagnosticUnitResult, error)); ok { @@ -361,6 +381,10 @@ func (_c *Client_Disconnect_Call) RunAndReturn(run func()) *Client_Disconnect_Ca func (_m *Client) Restart(ctx context.Context) error { ret := _m.Called(ctx) + if len(ret) == 0 { + panic("no return value specified for Restart") + } + var r0 error if rf, ok := ret.Get(0).(func(context.Context) error); ok { r0 = rf(ctx) @@ -403,6 +427,10 @@ func (_c *Client_Restart_Call) RunAndReturn(run func(context.Context) error) *Cl func (_m *Client) State(ctx context.Context) (*client.AgentState, error) { ret := _m.Called(ctx) + if len(ret) == 0 { + panic("no return value specified for State") + } + var r0 *client.AgentState var r1 error if rf, ok := ret.Get(0).(func(context.Context) (*client.AgentState, error)); ok { @@ -457,6 +485,10 @@ func (_c *Client_State_Call) RunAndReturn(run func(context.Context) (*client.Age func (_m *Client) StateWatch(ctx context.Context) (client.ClientStateWatch, error) { ret := _m.Called(ctx) + if len(ret) == 0 { + panic("no return value specified for StateWatch") + } + var r0 client.ClientStateWatch var r1 error if rf, ok := ret.Get(0).(func(context.Context) (client.ClientStateWatch, error)); ok { @@ -518,6 +550,10 @@ func (_m *Client) Upgrade(ctx context.Context, version string, sourceURI string, _ca = append(_ca, _va...) ret := _m.Called(_ca...) + if len(ret) == 0 { + panic("no return value specified for Upgrade") + } + var r0 string var r1 error if rf, ok := ret.Get(0).(func(context.Context, string, string, bool, bool, ...string) (string, error)); ok { @@ -582,6 +618,10 @@ func (_c *Client_Upgrade_Call) RunAndReturn(run func(context.Context, string, st func (_m *Client) Version(ctx context.Context) (client.Version, error) { ret := _m.Called(ctx) + if len(ret) == 0 { + panic("no return value specified for Version") + } + var r0 client.Version var r1 error if rf, ok := ret.Get(0).(func(context.Context) (client.Version, error)); ok { From 407aabdfc2c7d274c48d6a9e12075e5bebcdb5d0 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Fri, 12 Apr 2024 09:02:48 +0200 Subject: [PATCH 02/17] WIP loglevel setting --- .../handlers/handler_action_policy_change.go | 136 ++++++++++++-- .../handler_action_policy_change_test.go | 175 +++++++++++++++++- 2 files changed, 287 insertions(+), 24 deletions(-) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index 83cf3eb6809..fe414123fd2 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -7,14 +7,17 @@ package handlers import ( "bytes" "context" + goerrors "errors" "fmt" "io" "net/http" "sort" + "strings" "time" "gopkg.in/yaml.v2" + "github.com/elastic/elastic-agent-libs/logp" "github.com/elastic/elastic-agent-libs/transport/httpcommon" "github.com/elastic/elastic-agent/internal/pkg/agent/application/actions" "github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator" @@ -28,21 +31,26 @@ import ( "github.com/elastic/elastic-agent/internal/pkg/fleetapi/client" "github.com/elastic/elastic-agent/internal/pkg/remote" "github.com/elastic/elastic-agent/pkg/core/logger" + "github.com/elastic/elastic-agent/pkg/utils" ) const ( apiStatusTimeout = 15 * time.Second ) +type logLevelSetter interface { + SetLogLevel(ctx context.Context, lvl logp.Level) error +} + // PolicyChangeHandler is a handler for POLICY_CHANGE action. type PolicyChangeHandler struct { - log *logger.Logger - agentInfo info.Agent - config *configuration.Configuration - store storage.Store - ch chan coordinator.ConfigChange - setters []actions.ClientSetter - + log *logger.Logger + agentInfo info.Agent + config *configuration.Configuration + store storage.Store + ch chan coordinator.ConfigChange + setters []actions.ClientSetter + logLevelSetter logLevelSetter // Disabled for 8.8.0 release in order to limit the surface // https://github.com/elastic/security-team/issues/6501 // // Last known valid signature validation key @@ -56,15 +64,17 @@ func NewPolicyChangeHandler( config *configuration.Configuration, store storage.Store, ch chan coordinator.ConfigChange, + logLevelSetter logLevelSetter, setters ...actions.ClientSetter, ) *PolicyChangeHandler { return &PolicyChangeHandler{ - log: log, - agentInfo: agentInfo, - config: config, - store: store, - ch: ch, - setters: setters, + log: log, + agentInfo: agentInfo, + config: config, + store: store, + ch: ch, + setters: setters, + logLevelSetter: logLevelSetter, } } @@ -212,11 +222,26 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. return errors.New(err, "could not parse the configuration from the policy", errors.TypeConfig) } + var validationErr error + // validate Fleet connectivity with the new configuration var validatedConfig *remote.Config validatedConfig, err = h.validateFleetServerHosts(ctx, cfg) if err != nil { - return fmt.Errorf("error validating Fleet client config: %w", err) + validationErr = goerrors.Join(validationErr, fmt.Errorf("validating Fleet client config: %w", err)) + } + + // validate agent settings + + // agent logging + + loggingConfig, err := validateLoggingConfig(c) + if err != nil { + validationErr = goerrors.Join(validationErr, fmt.Errorf("validating logging config: %w", err)) + } + + if validationErr != nil { + return validationErr } if validatedConfig != nil { @@ -236,18 +261,82 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. // persist configuration err = saveConfig(h.agentInfo, h.config, h.store) if err != nil { - return fmt.Errorf("saving FleetClientConfig: %w", err) + return fmt.Errorf("saving config: %w", err) } - // apply the new configuration to the current clients + // apply the new Fleet client configuration to the current clients err = h.applyFleetClientConfig(validatedConfig) if err != nil { return fmt.Errorf("applying FleetClientConfig: %w", err) } + // apply logging configuration + h.applyLoggingConfig(ctx, loggingConfig) + return nil } +func validateLoggingConfig(cfg *config.Config) (*logger.Config, error) { + + loggingConfig, err := lookupLoggingConfig(cfg) + if err != nil { + return nil, fmt.Errorf("lookin up logging config: %w", err) + } + + if loggingConfig == nil { + // no logging config, nothing to do + return nil, nil + } + + logLevel := loggingConfig.Level + if logLevel < logp.DebugLevel || logLevel > logp.CriticalLevel { + return nil, fmt.Errorf("unrecognized log level %d", logLevel) + } + + return loggingConfig, nil + +} + +func lookupLoggingConfig(cfg *config.Config) (*logger.Config, error) { + mapCfg, err := cfg.ToMapStr() + if err != nil { + return nil, fmt.Errorf("transforming config in a map: %w", err) + } + + const agentLoggingConfigKey = "agent.logging" + const configKeyTokenSeparator = "." + + var loggingConfigBlob any + loggingConfigBlob, err = utils.GetNestedMap(mapCfg, strings.Split(agentLoggingConfigKey, configKeyTokenSeparator)...) + if errors.Is(err, utils.ErrKeyNotFound) { + // No logging config found, nothing to do + return nil, nil + } + if err != nil { + // we had an error looking up the logging nested map + return nil, fmt.Errorf("looking up %q in config received from Fleet: %w", agentLoggingConfigKey, err) + } + + loggingConfigMap, ok := loggingConfigBlob.(map[string]any) + if !ok { + return nil, fmt.Errorf("entry with key %q is not a map", agentLoggingConfigKey) + } + + // we found the logging config map, unpack and return + loggingConfig, err := config.NewConfigFrom(loggingConfigMap) + if err != nil { + return nil, fmt.Errorf("creating config from map: %w", err) + } + + var loggingConfigStruct *logger.Config + err = loggingConfig.Unpack(loggingConfigStruct, config.DefaultOptions...) + if err != nil { + return nil, fmt.Errorf("unpacking from config: %w", err) + } + + return loggingConfigStruct, nil +} + func (h *PolicyChangeHandler) applyFleetClientConfig(validatedConfig *remote.Config) error { if validatedConfig == nil || len(h.setters) == 0 { // nothing to do for fleet hosts @@ -267,6 +356,21 @@ func (h *PolicyChangeHandler) applyFleetClientConfig(validatedConfig *remote.Con return nil } +func (h *PolicyChangeHandler) applyLoggingConfig(ctx context.Context, loggingConfig *logger.Config) error { + + if loggingConfig == nil { + // no logging config to set, nothing to do + return nil + } + + if h.agentInfo.LogLevel() != logger.DefaultLogLevel.String() { + // there is a specific log level set at agent level, nothing to do + return nil + } + + return h.logLevelSetter.SetLogLevel(ctx, loggingConfig.Level) +} + func saveConfig(agentInfo info.Agent, validatedConfig *configuration.Configuration, store storage.Store) error { if validatedConfig == nil { // nothing to do for fleet hosts diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go index 16806faf7cf..d8713c1c3fc 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go @@ -6,6 +6,7 @@ package handlers import ( "context" + "fmt" "net/http" "net/http/httptest" "net/url" @@ -14,8 +15,10 @@ import ( "testing" "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/mock" "github.com/stretchr/testify/require" + "github.com/elastic/elastic-agent-libs/logp" "github.com/elastic/elastic-agent-libs/transport/httpcommon" "github.com/elastic/elastic-agent/internal/pkg/agent/application/actions" "github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator" @@ -28,7 +31,7 @@ import ( "github.com/elastic/elastic-agent/internal/pkg/fleetapi/client" "github.com/elastic/elastic-agent/internal/pkg/remote" "github.com/elastic/elastic-agent/pkg/core/logger" - mocks "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/actions/handlers" + mockhandlers "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/actions/handlers" ) func TestPolicyChange(t *testing.T) { @@ -49,7 +52,7 @@ func TestPolicyChange(t *testing.T) { } cfg := configuration.DefaultConfiguration() - handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch) + handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, mockhandlers.NewLogLevelSetter(t)) err := handler.Handle(context.Background(), action, ack) require.NoError(t, err) @@ -78,7 +81,7 @@ func TestPolicyAcked(t *testing.T) { } cfg := configuration.DefaultConfiguration() - handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch) + handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, mockhandlers.NewLogLevelSetter(t)) err := handler.Handle(context.Background(), action, tacker) require.NoError(t, err) @@ -250,11 +253,12 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T Settings: configuration.DefaultSettingsConfig()} h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + logLevelSetter: mockhandlers.NewLogLevelSetter(t), } cfg := config.MustNewConfigFrom( @@ -452,3 +456,158 @@ type testSetter struct { func (s *testSetter) SetClient(c client.Sender) { s.SetClientFn(c) } + +func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { + + agentInfoLogInfo, err := info.NewAgentInfoWithLog(context.Background(), "info", false) + require.NoError(t, err, "error instantiating sample agent info") + + type fields struct { + agentInfo info.Agent + config *configuration.Configuration + } + type args struct { + c *config.Config + } + tests := []struct { + name string + fields fields + args args + setupExpectations func(setter *mockhandlers.LogLevelSetter) + wantErr assert.ErrorAssertionFunc + }{ + { + name: "No loglevel set in agent info - set debug log level from policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "debug", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, logp.DebugLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + }, + { + name: "No loglevel set in agent info - set info log level from policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "info", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, logp.InfoLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + }, + { + name: "No loglevel set in agent info - set warning log level from policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "warning", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, logp.WarnLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + }, + { + name: "No loglevel set in agent info - set error log level from policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "error", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, logp.ErrorLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + }, + { + name: "No loglevel set in agent info - set critical log level from policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "critical", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + }, + { + name: "loglevel set in agent info - don't set log level from policy even if critical", + fields: fields{ + agentInfo: agentInfoLogInfo, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "critical", + }), + }, + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + // we should not set a log level if we have the override from agent info + //setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Times(0) + }, + wantErr: assert.NoError, + }, + { + name: "Error: Wrong log level error in policy", + fields: fields{ + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + }, + args: args{ + c: config.MustNewConfigFrom(map[string]interface{}{ + "agent.logging.level": "asdasd", + }), + }, + // don't set any expectations on the LogLevelSetter mock because we don't expect any calls + setupExpectations: nil, + wantErr: assert.Error, + }, + } + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + + log, _ := logger.NewTesting(tt.name) + mockLogLevelSetter := mockhandlers.NewLogLevelSetter(t) + + if tt.setupExpectations != nil { + tt.setupExpectations(mockLogLevelSetter) + } + + h := &PolicyChangeHandler{ + log: log, + agentInfo: tt.fields.agentInfo, + config: tt.fields.config, + store: &storage.NullStore{}, + logLevelSetter: mockLogLevelSetter, + } + + tt.wantErr(t, h.handlePolicyChange(context.Background(), tt.args.c), fmt.Sprintf("handlePolicyChange(%v, %v)", context.Background(), tt.args.c)) + }) + } +} From 3975b1e176380427056c92cccde41bf6ad524d34 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 18 Apr 2024 07:58:38 +0200 Subject: [PATCH 03/17] HACK - use partial config from fleet --- .../handlers/handler_action_policy_change.go | 51 ++----------------- .../handler_action_policy_change_test.go | 7 +-- .../pkg/agent/application/managed_mode.go | 1 + .../pkg/agent/configuration/configuration.go | 12 +++++ 4 files changed, 22 insertions(+), 49 deletions(-) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index fe414123fd2..e631b8e63da 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -12,7 +12,6 @@ import ( "io" "net/http" "sort" - "strings" "time" "gopkg.in/yaml.v2" @@ -31,7 +30,6 @@ import ( "github.com/elastic/elastic-agent/internal/pkg/fleetapi/client" "github.com/elastic/elastic-agent/internal/pkg/remote" "github.com/elastic/elastic-agent/pkg/core/logger" - "github.com/elastic/elastic-agent/pkg/utils" ) const ( @@ -278,16 +276,17 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. func validateLoggingConfig(cfg *config.Config) (*logger.Config, error) { - loggingConfig, err := lookupLoggingConfig(cfg) + parsedConfig, err := configuration.NewPartialFromConfigNoDefaults(cfg) if err != nil { - return nil, fmt.Errorf("lookin up logging config: %w", err) + return nil, fmt.Errorf("parsing fleet config: %w", err) } - if loggingConfig == nil { + if parsedConfig == nil || parsedConfig.Settings == nil || parsedConfig.Settings.LoggingConfig == nil { // no logging config, nothing to do return nil, nil } + loggingConfig := parsedConfig.Settings.LoggingConfig logLevel := loggingConfig.Level if logLevel < logp.DebugLevel || logLevel > logp.CriticalLevel { return nil, fmt.Errorf("unrecognized log level %d", logLevel) @@ -297,46 +296,6 @@ func validateLoggingConfig(cfg *config.Config) (*logger.Config, error) { } -func lookupLoggingConfig(cfg *config.Config) (*logger.Config, error) { - mapCfg, err := cfg.ToMapStr() - if err != nil { - return nil, fmt.Errorf("transforming config in a map: %w", err) - } - - const agentLoggingConfigKey = "agent.logging" - const configKeyTokenSeparator = "." - - var loggingConfigBlob any - loggingConfigBlob, err = utils.GetNestedMap(mapCfg, strings.Split(agentLoggingConfigKey, configKeyTokenSeparator)...) - if errors.Is(err, utils.ErrKeyNotFound) { - // No logging config found, nothing to do - return nil, nil - } - if err != nil { - // we had an error looking up the logging nested map - return nil, fmt.Errorf("looking up %q in config received from Fleet: %w", agentLoggingConfigKey, err) - } - - loggingConfigMap, ok := loggingConfigBlob.(map[string]any) - if !ok { - return nil, fmt.Errorf("entry with key %q is not a map", agentLoggingConfigKey) - } - - // we found the logging config map, unpack and return - loggingConfig, err := config.NewConfigFrom(loggingConfigMap) - if err != nil { - return nil, fmt.Errorf("creating config from map: %w", err) - } - - var loggingConfigStruct *logger.Config - err = loggingConfig.Unpack(loggingConfigStruct, config.DefaultOptions...) - if err != nil { - return nil, fmt.Errorf("unpacking from config: %w", err) - } - - return loggingConfigStruct, nil -} - func (h *PolicyChangeHandler) applyFleetClientConfig(validatedConfig *remote.Config) error { if validatedConfig == nil || len(h.setters) == 0 { // nothing to do for fleet hosts @@ -367,7 +326,7 @@ func (h *PolicyChangeHandler) applyLoggingConfig(ctx context.Context, loggingCon // there is a specific log level set at agent level, nothing to do return nil } - + h.log.Errorf("Applying log level %v from policy", loggingConfig.Level) return h.logLevelSetter.SetLogLevel(ctx, loggingConfig.Level) } diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go index d8713c1c3fc..c162de7f32a 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go @@ -484,7 +484,9 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { }, args: args{ c: config.MustNewConfigFrom(map[string]interface{}{ - "agent.logging.level": "debug", + "agent.logging": map[string]interface{}{ + "level": "debug", + }, }), }, setupExpectations: func(setter *mockhandlers.LogLevelSetter) { @@ -568,8 +570,7 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { }), }, setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - // we should not set a log level if we have the override from agent info - //setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Times(0) + setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Times(0) }, wantErr: assert.NoError, }, diff --git a/internal/pkg/agent/application/managed_mode.go b/internal/pkg/agent/application/managed_mode.go index 7f8d22a16ca..697642a0c5d 100644 --- a/internal/pkg/agent/application/managed_mode.go +++ b/internal/pkg/agent/application/managed_mode.go @@ -340,6 +340,7 @@ func (m *managedConfigManager) initDispatcher(canceller context.CancelFunc) *han m.cfg, m.store, m.ch, + m.coord, ) m.dispatcher.MustRegister( diff --git a/internal/pkg/agent/configuration/configuration.go b/internal/pkg/agent/configuration/configuration.go index cfa7782be44..44536d2007b 100644 --- a/internal/pkg/agent/configuration/configuration.go +++ b/internal/pkg/agent/configuration/configuration.go @@ -7,6 +7,7 @@ package configuration import ( "github.com/elastic/elastic-agent/internal/pkg/agent/errors" "github.com/elastic/elastic-agent/internal/pkg/config" + "github.com/elastic/go-ucfg" ) // Configuration is a overall agent configuration @@ -33,6 +34,17 @@ func NewFromConfig(cfg *config.Config) (*Configuration, error) { return c, nil } +// NewPartialFromConfigNoDefaults creates a configuration based on common Config. +func NewPartialFromConfigNoDefaults(cfg *config.Config) (*Configuration, error) { + c := new(Configuration) + // Validator tag set to "validate_disable" is a hack to avoid validation errors on a partial config + if err := cfg.Unpack(c, ucfg.ValidatorTag("validate_disable")); err != nil { + return nil, errors.New(err, errors.TypeConfig) + } + + return c, nil +} + // AgentInfo is a set of agent information. type AgentInfo struct { ID string `json:"id" yaml:"id" config:"id"` From 0a9da9adf3acb906af32f1d9c94a0245cb1ef2fd Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 18 Apr 2024 12:39:58 +0200 Subject: [PATCH 04/17] debug --- .../actions/handlers/handler_action_policy_change.go | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index e631b8e63da..baf5a92d866 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -215,6 +215,15 @@ func updateFleetConfig(log *logger.Logger, src remote.Config, dst *remote.Config } func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config.Config) (err error) { + + // FIXME set it to debug level once implementation is done + cfgMap, err := c.ToMapStr() + if err != nil { + h.log.Errorf("Received policy change: %v", cfgMap) + } else { + h.log.Errorf("error converting policy change to map: %v", err) + } + cfg, err := configuration.NewFromConfig(c) if err != nil { return errors.New(err, "could not parse the configuration from the policy", errors.TypeConfig) From 2218a160f4dbf499005293d6fc4bd0896b637b03 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 18 Apr 2024 17:58:43 +0200 Subject: [PATCH 05/17] change log level setter interface --- .mockery.yaml | 4 +- .../handlers/handler_action_policy_change.go | 53 ++--- .../handler_action_policy_change_test.go | 214 ++++++++---------- .../handlers/policy_log_level_setter_mock.go | 88 +++++++ 4 files changed, 213 insertions(+), 146 deletions(-) create mode 100644 testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go diff --git a/.mockery.yaml b/.mockery.yaml index 7b8363171e9..077ae6144ec 100644 --- a/.mockery.yaml +++ b/.mockery.yaml @@ -14,9 +14,9 @@ packages: diagnosticsProvider: config: mockname: "DiagnosticsProvider" - logLevelSetter: + policyLogLevelSetter: config: - mockname: "LogLevelSetter" + mockname: "PolicyLogLevelSetter" github.com/elastic/elastic-agent/internal/pkg/fleetapi/acker: interfaces: Acker: \ No newline at end of file diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index baf5a92d866..ab5197d657b 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -36,19 +36,19 @@ const ( apiStatusTimeout = 15 * time.Second ) -type logLevelSetter interface { - SetLogLevel(ctx context.Context, lvl logp.Level) error +type policyLogLevelSetter interface { + SetPolicyLogLevel(ctx context.Context, lvl *logp.Level) error } // PolicyChangeHandler is a handler for POLICY_CHANGE action. type PolicyChangeHandler struct { - log *logger.Logger - agentInfo info.Agent - config *configuration.Configuration - store storage.Store - ch chan coordinator.ConfigChange - setters []actions.ClientSetter - logLevelSetter logLevelSetter + log *logger.Logger + agentInfo info.Agent + config *configuration.Configuration + store storage.Store + ch chan coordinator.ConfigChange + setters []actions.ClientSetter + policyLogLevelSetter policyLogLevelSetter // Disabled for 8.8.0 release in order to limit the surface // https://github.com/elastic/security-team/issues/6501 // // Last known valid signature validation key @@ -62,17 +62,17 @@ func NewPolicyChangeHandler( config *configuration.Configuration, store storage.Store, ch chan coordinator.ConfigChange, - logLevelSetter logLevelSetter, + policyLogLevelSetter policyLogLevelSetter, setters ...actions.ClientSetter, ) *PolicyChangeHandler { return &PolicyChangeHandler{ - log: log, - agentInfo: agentInfo, - config: config, - store: store, - ch: ch, - setters: setters, - logLevelSetter: logLevelSetter, + log: log, + agentInfo: agentInfo, + config: config, + store: store, + ch: ch, + setters: setters, + policyLogLevelSetter: policyLogLevelSetter, } } @@ -219,9 +219,9 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. // FIXME set it to debug level once implementation is done cfgMap, err := c.ToMapStr() if err != nil { - h.log.Errorf("Received policy change: %v", cfgMap) - } else { h.log.Errorf("error converting policy change to map: %v", err) + } else { + h.log.Errorf("Received policy change: %v", cfgMap) } cfg, err := configuration.NewFromConfig(c) @@ -326,17 +326,14 @@ func (h *PolicyChangeHandler) applyFleetClientConfig(validatedConfig *remote.Con func (h *PolicyChangeHandler) applyLoggingConfig(ctx context.Context, loggingConfig *logger.Config) error { - if loggingConfig == nil { - // no logging config to set, nothing to do - return nil + var policyLogLevel *logger.Level + if loggingConfig != nil { + // we have logging config to set + policyLogLevel = &loggingConfig.Level } - if h.agentInfo.LogLevel() != logger.DefaultLogLevel.String() { - // there is a specific log level set at agent level, nothing to do - return nil - } - h.log.Errorf("Applying log level %v from policy", loggingConfig.Level) - return h.logLevelSetter.SetLogLevel(ctx, loggingConfig.Level) + h.log.Errorf("Applying log level %v from policy", policyLogLevel) + return h.policyLogLevelSetter.SetPolicyLogLevel(ctx, policyLogLevel) } func saveConfig(agentInfo info.Agent, validatedConfig *configuration.Configuration, store storage.Store) error { diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go index c162de7f32a..bf8c6f70c5e 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go @@ -52,7 +52,8 @@ func TestPolicyChange(t *testing.T) { } cfg := configuration.DefaultConfiguration() - handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, mockhandlers.NewLogLevelSetter(t)) + + handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, noLogLevelSet(t)) err := handler.Handle(context.Background(), action, ack) require.NoError(t, err) @@ -81,7 +82,7 @@ func TestPolicyAcked(t *testing.T) { } cfg := configuration.DefaultConfiguration() - handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, mockhandlers.NewLogLevelSetter(t)) + handler := NewPolicyChangeHandler(log, agentInfo, cfg, nullStore, ch, noLogLevelSet(t)) err := handler.Handle(context.Background(), action, tacker) require.NoError(t, err) @@ -202,14 +203,16 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T }, }}}, }, - Settings: configuration.DefaultSettingsConfig()} + Settings: configuration.DefaultSettingsConfig(), + } h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + policyLogLevelSetter: mockhandlers.NewPolicyLogLevelSetter(t), } cfg := config.MustNewConfigFrom( @@ -253,12 +256,12 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T Settings: configuration.DefaultSettingsConfig()} h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, - logLevelSetter: mockhandlers.NewLogLevelSetter(t), + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + policyLogLevelSetter: noLogLevelSet(t), } cfg := config.MustNewConfigFrom( @@ -294,11 +297,12 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T Settings: configuration.DefaultSettingsConfig()} h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + policyLogLevelSetter: noLogLevelSet(t), } wantHosts := []string{fleetServer.URL, fleetServer.URL} @@ -340,11 +344,12 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T Settings: configuration.DefaultSettingsConfig()} h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + policyLogLevelSetter: noLogLevelSet(t), } cfg := config.MustNewConfigFrom( @@ -393,11 +398,12 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T Settings: configuration.DefaultSettingsConfig()} h := PolicyChangeHandler{ - agentInfo: &info.AgentInfo{}, - config: originalCfg, - store: &storage.NullStore{}, - setters: []actions.ClientSetter{&setter}, - log: log, + agentInfo: &info.AgentInfo{}, + config: originalCfg, + store: &storage.NullStore{}, + setters: []actions.ClientSetter{&setter}, + log: log, + policyLogLevelSetter: noLogLevelSet(t), } cfg := config.MustNewConfigFrom( @@ -459,133 +465,100 @@ func (s *testSetter) SetClient(c client.Sender) { func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { - agentInfoLogInfo, err := info.NewAgentInfoWithLog(context.Background(), "info", false) - require.NoError(t, err, "error instantiating sample agent info") - - type fields struct { - agentInfo info.Agent - config *configuration.Configuration + matchLogLevel := func(expectedLevel logger.Level) func(*logger.Level) bool { + return func(level *logger.Level) bool { + if level == nil { + return false + } + return expectedLevel == *level + } } + type args struct { - c *config.Config + c map[string]any } tests := []struct { name string - fields fields args args - setupExpectations func(setter *mockhandlers.LogLevelSetter) + setupExpectations func(setter *mockhandlers.PolicyLogLevelSetter) wantErr assert.ErrorAssertionFunc }{ { - name: "No loglevel set in agent info - set debug log level from policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, + name: "set debug log level from policy", args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ - "agent.logging": map[string]interface{}{ - "level": "debug", - }, - }), + c: map[string]interface{}{ + "agent.logging.level": "debug", + }, }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.DebugLevel).Return(nil).Once() + setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setter.EXPECT().SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.DebugLevel))).Return(nil).Once() }, wantErr: assert.NoError, }, { - name: "No loglevel set in agent info - set info log level from policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, + name: "set info log level from policy", args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ + c: map[string]interface{}{ "agent.logging.level": "info", - }), + }, }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.InfoLevel).Return(nil).Once() + setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setter.EXPECT(). + SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.InfoLevel))). + Return(nil).Once() }, wantErr: assert.NoError, }, { - name: "No loglevel set in agent info - set warning log level from policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, + name: "set warning log level from policy", args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ + c: map[string]interface{}{ "agent.logging.level": "warning", - }), + }, }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.WarnLevel).Return(nil).Once() + setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setter.EXPECT(). + SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.WarnLevel))). + Return(nil).Once() }, wantErr: assert.NoError, }, { - name: "No loglevel set in agent info - set error log level from policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, + name: "set error log level from policy", args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ + c: map[string]interface{}{ "agent.logging.level": "error", - }), - }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.ErrorLevel).Return(nil).Once() - }, - wantErr: assert.NoError, - }, - { - name: "No loglevel set in agent info - set critical log level from policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, - args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ - "agent.logging.level": "critical", - }), + }, }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Once() + setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setter.EXPECT(). + SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.ErrorLevel))). + Return(nil).Once() }, wantErr: assert.NoError, }, { - name: "loglevel set in agent info - don't set log level from policy even if critical", - fields: fields{ - agentInfo: agentInfoLogInfo, - config: configuration.DefaultConfiguration(), - }, + name: "set critical log level from policy", args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ + c: map[string]interface{}{ "agent.logging.level": "critical", - }), + }, }, - setupExpectations: func(setter *mockhandlers.LogLevelSetter) { - setter.EXPECT().SetLogLevel(mock.Anything, logp.CriticalLevel).Return(nil).Times(0) + setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setter.EXPECT(). + SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.CriticalLevel))). + Return(nil).Once() }, wantErr: assert.NoError, }, { name: "Error: Wrong log level error in policy", - fields: fields{ - agentInfo: &info.AgentInfo{}, - config: configuration.DefaultConfiguration(), - }, args: args{ - c: config.MustNewConfigFrom(map[string]interface{}{ + c: map[string]interface{}{ "agent.logging.level": "asdasd", - }), + }, }, - // don't set any expectations on the LogLevelSetter mock because we don't expect any calls + // don't set any expectations on the PolicyLogLevelSetter mock because we don't expect any calls setupExpectations: nil, wantErr: assert.Error, }, @@ -594,21 +567,30 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { t.Run(tt.name, func(t *testing.T) { log, _ := logger.NewTesting(tt.name) - mockLogLevelSetter := mockhandlers.NewLogLevelSetter(t) + mockLogLevelSetter := mockhandlers.NewPolicyLogLevelSetter(t) if tt.setupExpectations != nil { tt.setupExpectations(mockLogLevelSetter) } h := &PolicyChangeHandler{ - log: log, - agentInfo: tt.fields.agentInfo, - config: tt.fields.config, - store: &storage.NullStore{}, - logLevelSetter: mockLogLevelSetter, + log: log, + agentInfo: &info.AgentInfo{}, + config: configuration.DefaultConfiguration(), + store: &storage.NullStore{}, + policyLogLevelSetter: mockLogLevelSetter, } - tt.wantErr(t, h.handlePolicyChange(context.Background(), tt.args.c), fmt.Sprintf("handlePolicyChange(%v, %v)", context.Background(), tt.args.c)) + tt.wantErr(t, h.handlePolicyChange(context.Background(), config.MustNewConfigFrom(tt.args.c)), fmt.Sprintf("handlePolicyChange(ctx, %v)", tt.args.c)) }) } } + +func noLogLevelSet(t *testing.T) *mockhandlers.PolicyLogLevelSetter { + // nilLogLevel is a variable used to match nil policy log level being set + var nilLogLevel *logger.Level = nil + + logLevelSetter := mockhandlers.NewPolicyLogLevelSetter(t) + logLevelSetter.EXPECT().SetPolicyLogLevel(mock.Anything, nilLogLevel).Return(nil).Once() + return logLevelSetter +} diff --git a/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go new file mode 100644 index 00000000000..30fb9f352cf --- /dev/null +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go @@ -0,0 +1,88 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +// Code generated by mockery v2.42.2. DO NOT EDIT. + +package handlers + +import ( + context "context" + + logp "github.com/elastic/elastic-agent-libs/logp" + mock "github.com/stretchr/testify/mock" +) + +// PolicyLogLevelSetter is an autogenerated mock type for the policyLogLevelSetter type +type PolicyLogLevelSetter struct { + mock.Mock +} + +type PolicyLogLevelSetter_Expecter struct { + mock *mock.Mock +} + +func (_m *PolicyLogLevelSetter) EXPECT() *PolicyLogLevelSetter_Expecter { + return &PolicyLogLevelSetter_Expecter{mock: &_m.Mock} +} + +// SetPolicyLogLevel provides a mock function with given fields: ctx, lvl +func (_m *PolicyLogLevelSetter) SetPolicyLogLevel(ctx context.Context, lvl *logp.Level) error { + ret := _m.Called(ctx, lvl) + + if len(ret) == 0 { + panic("no return value specified for SetPolicyLogLevel") + } + + var r0 error + if rf, ok := ret.Get(0).(func(context.Context, *logp.Level) error); ok { + r0 = rf(ctx, lvl) + } else { + r0 = ret.Error(0) + } + + return r0 +} + +// PolicyLogLevelSetter_SetPolicyLogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'SetPolicyLogLevel' +type PolicyLogLevelSetter_SetPolicyLogLevel_Call struct { + *mock.Call +} + +// SetPolicyLogLevel is a helper method to define mock.On call +// - ctx context.Context +// - lvl *logp.Level +func (_e *PolicyLogLevelSetter_Expecter) SetPolicyLogLevel(ctx interface{}, lvl interface{}) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { + return &PolicyLogLevelSetter_SetPolicyLogLevel_Call{Call: _e.mock.On("SetPolicyLogLevel", ctx, lvl)} +} + +func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) Run(run func(ctx context.Context, lvl *logp.Level)) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run(args[0].(context.Context), args[1].(*logp.Level)) + }) + return _c +} + +func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) Return(_a0 error) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { + _c.Call.Return(_a0) + return _c +} + +func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) RunAndReturn(run func(context.Context, *logp.Level) error) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { + _c.Call.Return(run) + return _c +} + +// NewPolicyLogLevelSetter creates a new instance of PolicyLogLevelSetter. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. +// The first argument is typically a *testing.T value. +func NewPolicyLogLevelSetter(t interface { + mock.TestingT + Cleanup(func()) +}) *PolicyLogLevelSetter { + mock := &PolicyLogLevelSetter{} + mock.Mock.Test(t) + + t.Cleanup(func() { mock.AssertExpectations(t) }) + + return mock +} From 931505553ce979135717210b703fb2a2f4bece28 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Tue, 23 Apr 2024 10:40:43 +0200 Subject: [PATCH 06/17] define logLevelSetter interface --- .mockery.yaml | 4 +- .../handlers/handler_action_policy_change.go | 19 ++-- .../handler_action_policy_change_test.go | 34 +++---- .../actions/handlers/loglevelsetter.go | 16 ++++ .../actions/handlers/log_level_setter_mock.go | 25 ++++++ .../handlers/policy_log_level_setter_mock.go | 88 ------------------- 6 files changed, 69 insertions(+), 117 deletions(-) create mode 100644 internal/pkg/agent/application/actions/handlers/loglevelsetter.go delete mode 100644 testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go diff --git a/.mockery.yaml b/.mockery.yaml index 077ae6144ec..7b8363171e9 100644 --- a/.mockery.yaml +++ b/.mockery.yaml @@ -14,9 +14,9 @@ packages: diagnosticsProvider: config: mockname: "DiagnosticsProvider" - policyLogLevelSetter: + logLevelSetter: config: - mockname: "PolicyLogLevelSetter" + mockname: "LogLevelSetter" github.com/elastic/elastic-agent/internal/pkg/fleetapi/acker: interfaces: Acker: \ No newline at end of file diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index ab5197d657b..9afe6ecd118 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -36,10 +36,6 @@ const ( apiStatusTimeout = 15 * time.Second ) -type policyLogLevelSetter interface { - SetPolicyLogLevel(ctx context.Context, lvl *logp.Level) error -} - // PolicyChangeHandler is a handler for POLICY_CHANGE action. type PolicyChangeHandler struct { log *logger.Logger @@ -48,7 +44,7 @@ type PolicyChangeHandler struct { store storage.Store ch chan coordinator.ConfigChange setters []actions.ClientSetter - policyLogLevelSetter policyLogLevelSetter + policyLogLevelSetter logLevelSetter // Disabled for 8.8.0 release in order to limit the surface // https://github.com/elastic/security-team/issues/6501 // // Last known valid signature validation key @@ -62,7 +58,7 @@ func NewPolicyChangeHandler( config *configuration.Configuration, store storage.Store, ch chan coordinator.ConfigChange, - policyLogLevelSetter policyLogLevelSetter, + policyLogLevelSetter logLevelSetter, setters ...actions.ClientSetter, ) *PolicyChangeHandler { return &PolicyChangeHandler{ @@ -251,6 +247,12 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. return validationErr } + // apply logging configuration + err = h.applyLoggingConfig(ctx, loggingConfig) + if err != nil { + return fmt.Errorf("applying logging config: %w", err) + } + if validatedConfig != nil { // there's a change in the fleet client settings backupFleetClientCfg := h.config.Fleet.Client @@ -277,9 +279,6 @@ func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config. return fmt.Errorf("applying FleetClientConfig: %w", err) } - // apply logging configuration - h.applyLoggingConfig(ctx, loggingConfig) - return nil } @@ -333,7 +332,7 @@ func (h *PolicyChangeHandler) applyLoggingConfig(ctx context.Context, loggingCon } h.log.Errorf("Applying log level %v from policy", policyLogLevel) - return h.policyLogLevelSetter.SetPolicyLogLevel(ctx, policyLogLevel) + return h.policyLogLevelSetter.SetLogLevel(ctx, policyLogLevel) } func saveConfig(agentInfo info.Agent, validatedConfig *configuration.Configuration, store storage.Store) error { diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go index bf8c6f70c5e..36996023273 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change_test.go @@ -212,7 +212,7 @@ func TestPolicyChangeHandler_handlePolicyChange_FleetClientSettings(t *testing.T store: &storage.NullStore{}, setters: []actions.ClientSetter{&setter}, log: log, - policyLogLevelSetter: mockhandlers.NewPolicyLogLevelSetter(t), + policyLogLevelSetter: mockhandlers.NewLogLevelSetter(t), } cfg := config.MustNewConfigFrom( @@ -480,7 +480,7 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { tests := []struct { name string args args - setupExpectations func(setter *mockhandlers.PolicyLogLevelSetter) + setupExpectations func(setter *mockhandlers.LogLevelSetter) wantErr assert.ErrorAssertionFunc }{ { @@ -490,8 +490,8 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "debug", }, }, - setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { - setter.EXPECT().SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.DebugLevel))).Return(nil).Once() + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { + setter.EXPECT().SetLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.DebugLevel))).Return(nil).Once() }, wantErr: assert.NoError, }, @@ -502,9 +502,9 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "info", }, }, - setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { setter.EXPECT(). - SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.InfoLevel))). + SetLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.InfoLevel))). Return(nil).Once() }, wantErr: assert.NoError, @@ -516,9 +516,9 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "warning", }, }, - setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { setter.EXPECT(). - SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.WarnLevel))). + SetLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.WarnLevel))). Return(nil).Once() }, wantErr: assert.NoError, @@ -530,9 +530,9 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "error", }, }, - setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { setter.EXPECT(). - SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.ErrorLevel))). + SetLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.ErrorLevel))). Return(nil).Once() }, wantErr: assert.NoError, @@ -544,9 +544,9 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "critical", }, }, - setupExpectations: func(setter *mockhandlers.PolicyLogLevelSetter) { + setupExpectations: func(setter *mockhandlers.LogLevelSetter) { setter.EXPECT(). - SetPolicyLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.CriticalLevel))). + SetLogLevel(mock.Anything, mock.MatchedBy(matchLogLevel(logp.CriticalLevel))). Return(nil).Once() }, wantErr: assert.NoError, @@ -558,7 +558,7 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { "agent.logging.level": "asdasd", }, }, - // don't set any expectations on the PolicyLogLevelSetter mock because we don't expect any calls + // don't set any expectations on the LogLevelSetter mock because we don't expect any calls setupExpectations: nil, wantErr: assert.Error, }, @@ -567,7 +567,7 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { t.Run(tt.name, func(t *testing.T) { log, _ := logger.NewTesting(tt.name) - mockLogLevelSetter := mockhandlers.NewPolicyLogLevelSetter(t) + mockLogLevelSetter := mockhandlers.NewLogLevelSetter(t) if tt.setupExpectations != nil { tt.setupExpectations(mockLogLevelSetter) @@ -586,11 +586,11 @@ func TestPolicyChangeHandler_handlePolicyChange_LogLevelSet(t *testing.T) { } } -func noLogLevelSet(t *testing.T) *mockhandlers.PolicyLogLevelSetter { +func noLogLevelSet(t *testing.T) *mockhandlers.LogLevelSetter { // nilLogLevel is a variable used to match nil policy log level being set var nilLogLevel *logger.Level = nil - logLevelSetter := mockhandlers.NewPolicyLogLevelSetter(t) - logLevelSetter.EXPECT().SetPolicyLogLevel(mock.Anything, nilLogLevel).Return(nil).Once() + logLevelSetter := mockhandlers.NewLogLevelSetter(t) + logLevelSetter.EXPECT().SetLogLevel(mock.Anything, nilLogLevel).Return(nil).Once() return logLevelSetter } diff --git a/internal/pkg/agent/application/actions/handlers/loglevelsetter.go b/internal/pkg/agent/application/actions/handlers/loglevelsetter.go new file mode 100644 index 00000000000..15e6141ae4b --- /dev/null +++ b/internal/pkg/agent/application/actions/handlers/loglevelsetter.go @@ -0,0 +1,16 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +package handlers + +import ( + "context" + + "github.com/elastic/elastic-agent-libs/logp" +) + +// logLevelSetter interface represents an actor able to set the global log level in agent +type logLevelSetter interface { + SetLogLevel(ctx context.Context, lvl *logp.Level) error +} diff --git a/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go index 1a66299c6cb..63457929249 100644 --- a/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go @@ -10,7 +10,10 @@ import ( context "context" logp "github.com/elastic/elastic-agent-libs/logp" +<<<<<<< HEAD +======= +>>>>>>> 4c70881493 (define logLevelSetter interface) mock "github.com/stretchr/testify/mock" ) @@ -28,7 +31,11 @@ func (_m *LogLevelSetter) EXPECT() *LogLevelSetter_Expecter { } // SetLogLevel provides a mock function with given fields: ctx, lvl +<<<<<<< HEAD func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl logp.Level) error { +======= +func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl *logp.Level) error { +>>>>>>> 4c70881493 (define logLevelSetter interface) ret := _m.Called(ctx, lvl) if len(ret) == 0 { @@ -36,7 +43,11 @@ func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl logp.Level) error } var r0 error +<<<<<<< HEAD if rf, ok := ret.Get(0).(func(context.Context, logp.Level) error); ok { +======= + if rf, ok := ret.Get(0).(func(context.Context, *logp.Level) error); ok { +>>>>>>> 4c70881493 (define logLevelSetter interface) r0 = rf(ctx, lvl) } else { r0 = ret.Error(0) @@ -52,14 +63,24 @@ type LogLevelSetter_SetLogLevel_Call struct { // SetLogLevel is a helper method to define mock.On call // - ctx context.Context +<<<<<<< HEAD // - lvl logp.Level +======= +// - lvl *logp.Level +>>>>>>> 4c70881493 (define logLevelSetter interface) func (_e *LogLevelSetter_Expecter) SetLogLevel(ctx interface{}, lvl interface{}) *LogLevelSetter_SetLogLevel_Call { return &LogLevelSetter_SetLogLevel_Call{Call: _e.mock.On("SetLogLevel", ctx, lvl)} } +<<<<<<< HEAD func (_c *LogLevelSetter_SetLogLevel_Call) Run(run func(ctx context.Context, lvl logp.Level)) *LogLevelSetter_SetLogLevel_Call { _c.Call.Run(func(args mock.Arguments) { run(args[0].(context.Context), args[1].(logp.Level)) +======= +func (_c *LogLevelSetter_SetLogLevel_Call) Run(run func(ctx context.Context, lvl *logp.Level)) *LogLevelSetter_SetLogLevel_Call { + _c.Call.Run(func(args mock.Arguments) { + run(args[0].(context.Context), args[1].(*logp.Level)) +>>>>>>> 4c70881493 (define logLevelSetter interface) }) return _c } @@ -69,7 +90,11 @@ func (_c *LogLevelSetter_SetLogLevel_Call) Return(_a0 error) *LogLevelSetter_Set return _c } +<<<<<<< HEAD func (_c *LogLevelSetter_SetLogLevel_Call) RunAndReturn(run func(context.Context, logp.Level) error) *LogLevelSetter_SetLogLevel_Call { +======= +func (_c *LogLevelSetter_SetLogLevel_Call) RunAndReturn(run func(context.Context, *logp.Level) error) *LogLevelSetter_SetLogLevel_Call { +>>>>>>> 4c70881493 (define logLevelSetter interface) _c.Call.Return(run) return _c } diff --git a/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go deleted file mode 100644 index 30fb9f352cf..00000000000 --- a/testing/mocks/internal_/pkg/agent/application/actions/handlers/policy_log_level_setter_mock.go +++ /dev/null @@ -1,88 +0,0 @@ -// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one -// or more contributor license agreements. Licensed under the Elastic License; -// you may not use this file except in compliance with the Elastic License. - -// Code generated by mockery v2.42.2. DO NOT EDIT. - -package handlers - -import ( - context "context" - - logp "github.com/elastic/elastic-agent-libs/logp" - mock "github.com/stretchr/testify/mock" -) - -// PolicyLogLevelSetter is an autogenerated mock type for the policyLogLevelSetter type -type PolicyLogLevelSetter struct { - mock.Mock -} - -type PolicyLogLevelSetter_Expecter struct { - mock *mock.Mock -} - -func (_m *PolicyLogLevelSetter) EXPECT() *PolicyLogLevelSetter_Expecter { - return &PolicyLogLevelSetter_Expecter{mock: &_m.Mock} -} - -// SetPolicyLogLevel provides a mock function with given fields: ctx, lvl -func (_m *PolicyLogLevelSetter) SetPolicyLogLevel(ctx context.Context, lvl *logp.Level) error { - ret := _m.Called(ctx, lvl) - - if len(ret) == 0 { - panic("no return value specified for SetPolicyLogLevel") - } - - var r0 error - if rf, ok := ret.Get(0).(func(context.Context, *logp.Level) error); ok { - r0 = rf(ctx, lvl) - } else { - r0 = ret.Error(0) - } - - return r0 -} - -// PolicyLogLevelSetter_SetPolicyLogLevel_Call is a *mock.Call that shadows Run/Return methods with type explicit version for method 'SetPolicyLogLevel' -type PolicyLogLevelSetter_SetPolicyLogLevel_Call struct { - *mock.Call -} - -// SetPolicyLogLevel is a helper method to define mock.On call -// - ctx context.Context -// - lvl *logp.Level -func (_e *PolicyLogLevelSetter_Expecter) SetPolicyLogLevel(ctx interface{}, lvl interface{}) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { - return &PolicyLogLevelSetter_SetPolicyLogLevel_Call{Call: _e.mock.On("SetPolicyLogLevel", ctx, lvl)} -} - -func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) Run(run func(ctx context.Context, lvl *logp.Level)) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { - _c.Call.Run(func(args mock.Arguments) { - run(args[0].(context.Context), args[1].(*logp.Level)) - }) - return _c -} - -func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) Return(_a0 error) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { - _c.Call.Return(_a0) - return _c -} - -func (_c *PolicyLogLevelSetter_SetPolicyLogLevel_Call) RunAndReturn(run func(context.Context, *logp.Level) error) *PolicyLogLevelSetter_SetPolicyLogLevel_Call { - _c.Call.Return(run) - return _c -} - -// NewPolicyLogLevelSetter creates a new instance of PolicyLogLevelSetter. It also registers a testing interface on the mock and a cleanup function to assert the mocks expectations. -// The first argument is typically a *testing.T value. -func NewPolicyLogLevelSetter(t interface { - mock.TestingT - Cleanup(func()) -}) *PolicyLogLevelSetter { - mock := &PolicyLogLevelSetter{} - mock.Mock.Test(t) - - t.Cleanup(func() { mock.AssertExpectations(t) }) - - return mock -} From 017c4eff7a1b8798169f1c3030f09cecfe954c7d Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Tue, 23 Apr 2024 10:47:14 +0200 Subject: [PATCH 07/17] make coordinator implement logLevelSetter interface --- .../handlers/handler_action_application.go | 2 +- .../actions/handlers/handler_action_settings.go | 17 ++++++++--------- .../application/coordinator/coordinator.go | 9 ++++++--- 3 files changed, 15 insertions(+), 13 deletions(-) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_application.go b/internal/pkg/agent/application/actions/handlers/handler_action_application.go index bbce596b2df..d68ea21ff86 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_application.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_application.go @@ -55,7 +55,7 @@ func (h *AppAction) Handle(ctx context.Context, a fleetapi.Action, acker acker.A // https://github.com/elastic/security-team/issues/6501 // // h.log.Debugf("handlerAppAction: validate action '%+v', for agentID %s", a, h.agentID) - // validated, err := protection.ValidateAction(*action, h.coord.Protection().SignatureValidationKey, h.agentID) + // validated, err := protection.ValidateAction(*action, h.logLevelSetter.Protection().SignatureValidationKey, h.agentID) // if err != nil { // action.StartedAt = time.Now().UTC().Format(time.RFC3339Nano) // action.CompletedAt = action.StartedAt diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go index 68be5715dab..fd3502831c0 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go @@ -10,7 +10,6 @@ import ( "github.com/elastic/elastic-agent-libs/logp" - "github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator" "github.com/elastic/elastic-agent/internal/pkg/agent/application/info" "github.com/elastic/elastic-agent/internal/pkg/fleetapi" "github.com/elastic/elastic-agent/internal/pkg/fleetapi/acker" @@ -19,21 +18,21 @@ import ( // Settings handles settings change coming from fleet and updates log level. type Settings struct { - log *logger.Logger - agentInfo info.Agent - coord *coordinator.Coordinator + log *logger.Logger + agentInfo info.Agent + logLevelSetter logLevelSetter } // NewSettings creates a new Settings handler. func NewSettings( log *logger.Logger, agentInfo info.Agent, - coord *coordinator.Coordinator, + logLevelSetter logLevelSetter, ) *Settings { return &Settings{ - log: log, - agentInfo: agentInfo, - coord: coord, + log: log, + agentInfo: agentInfo, + logLevelSetter: logLevelSetter, } } @@ -66,7 +65,7 @@ func (h *Settings) Handle(ctx context.Context, a fleetapi.Action, acker acker.Ac } h.log.Infof("Settings action done, setting agent log level to %s", lvl.String()) - return h.coord.SetLogLevel(ctx, lvl) + return h.logLevelSetter.SetLogLevel(ctx, &lvl) } func isSupportedLogLevel(level string) bool { diff --git a/internal/pkg/agent/application/coordinator/coordinator.go b/internal/pkg/agent/application/coordinator/coordinator.go index 05935a0f5b1..b7013dc825c 100644 --- a/internal/pkg/agent/application/coordinator/coordinator.go +++ b/internal/pkg/agent/application/coordinator/coordinator.go @@ -570,13 +570,16 @@ func (c *Coordinator) PerformComponentDiagnostics(ctx context.Context, additiona // SetLogLevel changes the entire log level for the running Elastic Agent. // Called from external goroutines. -func (c *Coordinator) SetLogLevel(ctx context.Context, lvl logp.Level) error { +func (c *Coordinator) SetLogLevel(ctx context.Context, lvl *logp.Level) error { + if lvl == nil { + return fmt.Errorf("logp.Level passed to Coordinator.SetLogLevel() must be not nil") + } select { case <-ctx.Done(): return ctx.Err() - case c.logLevelCh <- lvl: + case c.logLevelCh <- *lvl: // set global once the level change has been taken by the channel - logger.SetLevel(lvl) + logger.SetLevel(*lvl) return nil } } From 0f596bbbba141ead7534d409001389214abd0678 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Tue, 23 Apr 2024 18:08:57 +0200 Subject: [PATCH 08/17] Add externalLogLevel to SettingsHandler - tests WIP --- .mockery.yaml | 5 +- .../handlers/handler_action_settings.go | 68 ++++-- .../handlers/handler_action_settings_test.go | 195 ++++++++++++++++++ .../pkg/agent/application/info/agent_info.go | 13 +- pkg/component/runtime/runtime_comm_test.go | 1 + 5 files changed, 264 insertions(+), 18 deletions(-) create mode 100644 internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go diff --git a/.mockery.yaml b/.mockery.yaml index 7b8363171e9..42937061c85 100644 --- a/.mockery.yaml +++ b/.mockery.yaml @@ -19,4 +19,7 @@ packages: mockname: "LogLevelSetter" github.com/elastic/elastic-agent/internal/pkg/fleetapi/acker: interfaces: - Acker: \ No newline at end of file + Acker: + github.com/elastic/elastic-agent/internal/pkg/agent/application/info: + interfaces: + Agent: \ No newline at end of file diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go index fd3502831c0..37c925033a5 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go @@ -16,11 +16,14 @@ import ( "github.com/elastic/elastic-agent/pkg/core/logger" ) +const clearLogLevelValue = "" + // Settings handles settings change coming from fleet and updates log level. type Settings struct { - log *logger.Logger - agentInfo info.Agent - logLevelSetter logLevelSetter + log *logger.Logger + agentInfo info.Agent + fallbackLogLevel *logp.Level + logLevelSetter logLevelSetter } // NewSettings creates a new Settings handler. @@ -44,28 +47,63 @@ func (h *Settings) Handle(ctx context.Context, a fleetapi.Action, acker acker.Ac return fmt.Errorf("invalid type, expected ActionSettings and received %T", a) } - if !isSupportedLogLevel(action.LogLevel) { - return fmt.Errorf("invalid log level, expected debug|info|warning|error and received '%s'", action.LogLevel) - } + logLevel := action.LogLevel + return h.handleLogLevel(ctx, logLevel, acker, action) +} - lvl := logp.InfoLevel - err := lvl.Unpack(action.LogLevel) - if err != nil { - return fmt.Errorf("failed to unpack log level: %w", err) - } +func (h *Settings) handleLogLevel(ctx context.Context, logLevel string, acker acker.Acker, action *fleetapi.ActionSettings) error { + var lvl *logp.Level + if logLevel != clearLogLevelValue { + if !isSupportedLogLevel(logLevel) { + return fmt.Errorf("invalid log level, expected debug|info|warning|error and received '%s'", logLevel) + } - if err := h.agentInfo.SetLogLevel(ctx, action.LogLevel); err != nil { + // parse loglvl from the string + parsedLvl := logp.InfoLevel + err := parsedLvl.Unpack(logLevel) + if err != nil { + return fmt.Errorf("failed to unpack log level: %w", err) + } + lvl = &parsedLvl + } + if err := h.agentInfo.SetLogLevel(ctx, logLevel); err != nil { return fmt.Errorf("failed to update log level: %w", err) } - if err := acker.Ack(ctx, a); err != nil { + if err := acker.Ack(ctx, action); err != nil { h.log.Errorf("failed to acknowledge SETTINGS action with id '%s'", action.ActionID) } else if err := acker.Commit(ctx); err != nil { h.log.Errorf("failed to commit acker after acknowledging action with id '%s'", action.ActionID) } + h.log.Infof("Settings action done, setting agent log level to %s", logLevel) + + if lvl != nil { + return h.logLevelSetter.SetLogLevel(ctx, lvl) + } - h.log.Infof("Settings action done, setting agent log level to %s", lvl.String()) - return h.logLevelSetter.SetLogLevel(ctx, &lvl) + if h.fallbackLogLevel != nil { + // use fallback log level + return h.logLevelSetter.SetLogLevel(ctx, h.fallbackLogLevel) + } + + // use default log level + defaultLogLevel := logger.DefaultLogLevel + return h.logLevelSetter.SetLogLevel(ctx, &defaultLogLevel) +} + +// SetLogLevel is used to set the fallback log level +// It propagates this log level in case there's no log level set for this specific agent +func (h *Settings) SetLogLevel(ctx context.Context, lvl *logp.Level) error { + if lvl != nil && !isSupportedLogLevel(lvl.String()) { + return fmt.Errorf("invalid log level, expected debug|info|warning|error and received '%s'", lvl.String()) + } + + h.fallbackLogLevel = lvl + if h.agentInfo.RawLogLevel() == "" { + // set the runtime log level only if we don't have one set for the specific agent + return h.logLevelSetter.SetLogLevel(ctx, lvl) + } + return nil } func isSupportedLogLevel(level string) bool { diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go new file mode 100644 index 00000000000..4360983433f --- /dev/null +++ b/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go @@ -0,0 +1,195 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +package handlers + +import ( + "context" + "fmt" + "testing" + + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/mock" + + "github.com/elastic/elastic-agent-libs/logp" + "github.com/elastic/elastic-agent/internal/pkg/fleetapi" + "github.com/elastic/elastic-agent/pkg/core/logger" + mockhandlers "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/actions/handlers" + mockinfo "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/agent/application/info" + mockfleetacker "github.com/elastic/elastic-agent/testing/mocks/internal_/pkg/fleetapi/acker" +) + +func TestSettings_SetLogLevel(t *testing.T) { + + // test log level we use in testcases + testWarnLevel := logp.WarnLevel + + type fields struct { + fallbackLogLevel *logp.Level + } + type args struct { + lvl *logp.Level + } + tests := []struct { + name string + fields fields + args args + setupMocks func(*testing.T, *mockhandlers.LogLevelSetter, *mockinfo.Agent) + wantErr assert.ErrorAssertionFunc + wantFallbackLogLevel *logp.Level + }{ + { + name: "fallbackLogLevel set without an override at agent level", + fields: fields{}, + args: args{ + lvl: &testWarnLevel, + }, + setupMocks: func(t *testing.T, setter *mockhandlers.LogLevelSetter, agent *mockinfo.Agent) { + agent.EXPECT().RawLogLevel().Return("").Once() + setter.EXPECT().SetLogLevel(mock.Anything, &testWarnLevel).Return(nil).Once() + }, + wantErr: assert.NoError, + wantFallbackLogLevel: &testWarnLevel, + }, + { + name: "fallbackLogLevel set while there's an override at agent level", + fields: fields{}, + args: args{ + lvl: &testWarnLevel, + }, + setupMocks: func(t *testing.T, setter *mockhandlers.LogLevelSetter, agent *mockinfo.Agent) { + agent.EXPECT().RawLogLevel().Return("info").Once() + }, + wantErr: assert.NoError, + wantFallbackLogLevel: &testWarnLevel, + }, + } + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + mockAgentInfo := mockinfo.NewAgent(t) + mockLogLevelSetter := mockhandlers.NewLogLevelSetter(t) + + if tt.setupMocks != nil { + tt.setupMocks(t, mockLogLevelSetter, mockAgentInfo) + } + + ctx := context.Background() + + h := &Settings{ + agentInfo: mockAgentInfo, + fallbackLogLevel: tt.fields.fallbackLogLevel, + logLevelSetter: mockLogLevelSetter, + } + tt.wantErr(t, h.SetLogLevel(ctx, tt.args.lvl), fmt.Sprintf("SetLogLevel(%v, %v)", ctx, tt.args.lvl)) + assert.Equal(t, tt.wantFallbackLogLevel, h.fallbackLogLevel) + }) + } +} + +func TestSettings_handleLogLevel(t *testing.T) { + + testWarnLogLevel := logp.WarnLevel + testDebugLogLevel := logp.DebugLevel + testDefaultLogLevel := logger.DefaultLogLevel + type fields struct { + fallbackLogLevel *logp.Level + } + type args struct { + logLevel string + action *fleetapi.ActionSettings + } + tests := []struct { + name string + fields fields + args args + setupMocks func(*testing.T, *mockinfo.Agent, *mockhandlers.LogLevelSetter, *mockfleetacker.Acker) + wantErr assert.ErrorAssertionFunc + }{ + { + name: "Set debug log level, disregard fallback level warning", + fields: fields{ + fallbackLogLevel: &testWarnLogLevel, + }, + args: args{ + logLevel: "debug", + action: &fleetapi.ActionSettings{ + ActionID: "someactionid", + ActionType: fleetapi.ActionTypeSettings, + LogLevel: "debug", + }, + }, + setupMocks: func(t *testing.T, agent *mockinfo.Agent, setter *mockhandlers.LogLevelSetter, acker *mockfleetacker.Acker) { + agent.EXPECT().SetLogLevel(mock.Anything, "debug").Return(nil) + setter.EXPECT().SetLogLevel(mock.Anything, &testDebugLogLevel).Return(nil) + acker.EXPECT().Ack(mock.Anything, mock.Anything).Return(nil) + acker.EXPECT().Commit(mock.Anything).Return(nil) + }, + wantErr: assert.NoError, + }, + { + name: "Clear log level, switch to fallback level warning", + fields: fields{ + fallbackLogLevel: &testWarnLogLevel, + }, + args: args{ + logLevel: clearLogLevelValue, + action: &fleetapi.ActionSettings{ + ActionID: "someactionid", + ActionType: fleetapi.ActionTypeSettings, + LogLevel: clearLogLevelValue, + }, + }, + setupMocks: func(t *testing.T, agent *mockinfo.Agent, setter *mockhandlers.LogLevelSetter, acker *mockfleetacker.Acker) { + agent.EXPECT().SetLogLevel(mock.Anything, "").Return(nil) + setter.EXPECT().SetLogLevel(mock.Anything, &testWarnLogLevel).Return(nil) + acker.EXPECT().Ack(mock.Anything, mock.Anything).Return(nil) + acker.EXPECT().Commit(mock.Anything).Return(nil) + }, + wantErr: assert.NoError, + }, + { + name: "Clear log level, no fallback level, go with default log level", + fields: fields{ + fallbackLogLevel: nil, + }, + args: args{ + logLevel: clearLogLevelValue, + action: &fleetapi.ActionSettings{ + ActionID: "someactionid", + ActionType: fleetapi.ActionTypeSettings, + LogLevel: clearLogLevelValue, + }, + }, + setupMocks: func(t *testing.T, agent *mockinfo.Agent, setter *mockhandlers.LogLevelSetter, acker *mockfleetacker.Acker) { + agent.EXPECT().SetLogLevel(mock.Anything, "").Return(nil) + setter.EXPECT().SetLogLevel(mock.Anything, &testDefaultLogLevel).Return(nil) + acker.EXPECT().Ack(mock.Anything, mock.Anything).Return(nil) + acker.EXPECT().Commit(mock.Anything).Return(nil) + }, + wantErr: assert.NoError, + }, + } + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + log, _ := logger.NewTesting(tt.name) + mockAgentInfo := mockinfo.NewAgent(t) + mockLogLevelSetter := mockhandlers.NewLogLevelSetter(t) + mockAcker := mockfleetacker.NewAcker(t) + + if tt.setupMocks != nil { + tt.setupMocks(t, mockAgentInfo, mockLogLevelSetter, mockAcker) + } + + ctx := context.Background() + + h := &Settings{ + log: log, + agentInfo: mockAgentInfo, + fallbackLogLevel: tt.fields.fallbackLogLevel, + logLevelSetter: mockLogLevelSetter, + } + tt.wantErr(t, h.handleLogLevel(ctx, tt.args.logLevel, mockAcker, tt.args.action), fmt.Sprintf("handleLogLevel(%v, %v, %v, %v)", ctx, tt.args.logLevel, mockAcker, tt.args.action)) + }) + } +} diff --git a/internal/pkg/agent/application/info/agent_info.go b/internal/pkg/agent/application/info/agent_info.go index 9012e14990d..be410b0c7e5 100644 --- a/internal/pkg/agent/application/info/agent_info.go +++ b/internal/pkg/agent/application/info/agent_info.go @@ -20,9 +20,12 @@ type Agent interface { // Headers returns custom headers used to communicate with elasticsearch. Headers() map[string]string - // LogLevel retrieves a log level. + // LogLevel retrieves a log level, returning a default if none is set LogLevel() string + // RawLogLevel returns the set log level, no defaults + RawLogLevel() string + // ReloadID reloads agent info ID from configuration file. ReloadID(ctx context.Context) error @@ -85,9 +88,15 @@ func NewAgentInfo(ctx context.Context, createAgentID bool) (*AgentInfo, error) { // LogLevel retrieves a log level. func (i *AgentInfo) LogLevel() string { - if i.logLevel == "" { + rawLogLevel := i.RawLogLevel() + if rawLogLevel == "" { return logger.DefaultLogLevel.String() } + return rawLogLevel +} + +// RawLogLevel retrieves a log level. +func (i *AgentInfo) RawLogLevel() string { return i.logLevel } diff --git a/pkg/component/runtime/runtime_comm_test.go b/pkg/component/runtime/runtime_comm_test.go index 6d60a823125..a7567ef96ca 100644 --- a/pkg/component/runtime/runtime_comm_test.go +++ b/pkg/component/runtime/runtime_comm_test.go @@ -40,6 +40,7 @@ func (a agentInfoMock) Unprivileged() bool { func (a agentInfoMock) Headers() map[string]string { panic("implement me") } func (a agentInfoMock) LogLevel() string { panic("implement me") } +func (a agentInfoMock) RawLogLevel() string { panic("implement me") } func (a agentInfoMock) ReloadID(ctx context.Context) error { panic("implement me") } func (a agentInfoMock) SetLogLevel(ctx context.Context, level string) error { panic("implement me") } From 17d75acb64762e4883d6634956b59e3a07855627 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Wed, 8 May 2024 18:40:28 +0200 Subject: [PATCH 09/17] correctly wire policy_change and settings handler for log level handling --- internal/pkg/agent/application/managed_mode.go | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/internal/pkg/agent/application/managed_mode.go b/internal/pkg/agent/application/managed_mode.go index 697642a0c5d..fafd242ec8b 100644 --- a/internal/pkg/agent/application/managed_mode.go +++ b/internal/pkg/agent/application/managed_mode.go @@ -334,13 +334,19 @@ func fleetServerRunning(state runtime.ComponentState) bool { } func (m *managedConfigManager) initDispatcher(canceller context.CancelFunc) *handlers.PolicyChangeHandler { + settingsHandler := handlers.NewSettings( + m.log, + m.agentInfo, + m.coord, + ) + policyChanger := handlers.NewPolicyChangeHandler( m.log, m.agentInfo, m.cfg, m.store, m.ch, - m.coord, + settingsHandler, ) m.dispatcher.MustRegister( @@ -371,11 +377,7 @@ func (m *managedConfigManager) initDispatcher(canceller context.CancelFunc) *han m.dispatcher.MustRegister( &fleetapi.ActionSettings{}, - handlers.NewSettings( - m.log, - m.agentInfo, - m.coord, - ), + settingsHandler, ) m.dispatcher.MustRegister( From 58dcdd11d3a1b664494441460f4fe9fa806f15fc Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Wed, 8 May 2024 18:41:04 +0200 Subject: [PATCH 10/17] remove default log level from AgentInfo in case of fleet managed agent --- internal/pkg/agent/cmd/run.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/internal/pkg/agent/cmd/run.go b/internal/pkg/agent/cmd/run.go index 7bd421afe3c..8b0306fbed9 100644 --- a/internal/pkg/agent/cmd/run.go +++ b/internal/pkg/agent/cmd/run.go @@ -492,7 +492,7 @@ func defaultLogLevel(cfg *configuration.Configuration, currentLevel string) stri return configuredLevel } - return defaultLogLevel + return "" } func tryDelayEnroll(ctx context.Context, logger *logger.Logger, cfg *configuration.Configuration, override cfgOverrider) (*configuration.Configuration, error) { From 44de4feb38e2d007bf9fcb0fde3941f82fb6543e Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Wed, 8 May 2024 18:54:57 +0200 Subject: [PATCH 11/17] fix debug logs --- .../handlers/handler_action_policy_change.go | 11 +---------- .../actions/handlers/handler_action_settings.go | 5 ++++- .../handlers/handler_action_settings_test.go | 17 +++++++++++++++++ 3 files changed, 22 insertions(+), 11 deletions(-) diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go index 9afe6ecd118..3fde2c58477 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_policy_change.go @@ -211,15 +211,6 @@ func updateFleetConfig(log *logger.Logger, src remote.Config, dst *remote.Config } func (h *PolicyChangeHandler) handlePolicyChange(ctx context.Context, c *config.Config) (err error) { - - // FIXME set it to debug level once implementation is done - cfgMap, err := c.ToMapStr() - if err != nil { - h.log.Errorf("error converting policy change to map: %v", err) - } else { - h.log.Errorf("Received policy change: %v", cfgMap) - } - cfg, err := configuration.NewFromConfig(c) if err != nil { return errors.New(err, "could not parse the configuration from the policy", errors.TypeConfig) @@ -331,7 +322,7 @@ func (h *PolicyChangeHandler) applyLoggingConfig(ctx context.Context, loggingCon policyLogLevel = &loggingConfig.Level } - h.log.Errorf("Applying log level %v from policy", policyLogLevel) + h.log.Infof("Setting fallback log level %v from policy", policyLogLevel) return h.policyLogLevelSetter.SetLogLevel(ctx, policyLogLevel) } diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go index 37c925033a5..57dfe6f17f9 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_settings.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_settings.go @@ -99,7 +99,10 @@ func (h *Settings) SetLogLevel(ctx context.Context, lvl *logp.Level) error { } h.fallbackLogLevel = lvl - if h.agentInfo.RawLogLevel() == "" { + rawLogLevel := h.agentInfo.RawLogLevel() + h.log.Debugf("received fallback loglevel %s, raw loglevel %s", lvl, rawLogLevel) + if rawLogLevel == "" && lvl != nil { + h.log.Debugf("setting log level %s", lvl) // set the runtime log level only if we don't have one set for the specific agent return h.logLevelSetter.SetLogLevel(ctx, lvl) } diff --git a/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go b/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go index 4360983433f..0d8fee3b61b 100644 --- a/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go +++ b/internal/pkg/agent/application/actions/handlers/handler_action_settings_test.go @@ -52,6 +52,20 @@ func TestSettings_SetLogLevel(t *testing.T) { wantErr: assert.NoError, wantFallbackLogLevel: &testWarnLevel, }, + { + name: "Nil fallbackLogLevel without an override at agent level is not propagated", + fields: fields{}, + args: args{ + lvl: nil, + }, + setupMocks: func(t *testing.T, setter *mockhandlers.LogLevelSetter, agent *mockinfo.Agent) { + agent.EXPECT().RawLogLevel().Return("").Once() + // we should never call the SetLogLevel with nil, for simplicity remove the expectation altogether + // setter.EXPECT().SetLogLevel(mock.Anything, nil).Return(nil).Times(0) + }, + wantErr: assert.NoError, + wantFallbackLogLevel: nil, + }, { name: "fallbackLogLevel set while there's an override at agent level", fields: fields{}, @@ -74,9 +88,12 @@ func TestSettings_SetLogLevel(t *testing.T) { tt.setupMocks(t, mockLogLevelSetter, mockAgentInfo) } + log, _ := logger.NewTesting(tt.name) + ctx := context.Background() h := &Settings{ + log: log, agentInfo: mockAgentInfo, fallbackLogLevel: tt.fields.fallbackLogLevel, logLevelSetter: mockLogLevelSetter, From 701272abc2e88823f1cfe15ff8c1063f31d9d681 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 9 May 2024 11:23:06 +0200 Subject: [PATCH 12/17] regenerate mocks after rebase --- .../actions/handlers/log_level_setter_mock.go | 25 ------------------- 1 file changed, 25 deletions(-) diff --git a/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go index 63457929249..910dea5e027 100644 --- a/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go +++ b/testing/mocks/internal_/pkg/agent/application/actions/handlers/log_level_setter_mock.go @@ -10,10 +10,7 @@ import ( context "context" logp "github.com/elastic/elastic-agent-libs/logp" -<<<<<<< HEAD -======= ->>>>>>> 4c70881493 (define logLevelSetter interface) mock "github.com/stretchr/testify/mock" ) @@ -31,11 +28,7 @@ func (_m *LogLevelSetter) EXPECT() *LogLevelSetter_Expecter { } // SetLogLevel provides a mock function with given fields: ctx, lvl -<<<<<<< HEAD -func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl logp.Level) error { -======= func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl *logp.Level) error { ->>>>>>> 4c70881493 (define logLevelSetter interface) ret := _m.Called(ctx, lvl) if len(ret) == 0 { @@ -43,11 +36,7 @@ func (_m *LogLevelSetter) SetLogLevel(ctx context.Context, lvl *logp.Level) erro } var r0 error -<<<<<<< HEAD - if rf, ok := ret.Get(0).(func(context.Context, logp.Level) error); ok { -======= if rf, ok := ret.Get(0).(func(context.Context, *logp.Level) error); ok { ->>>>>>> 4c70881493 (define logLevelSetter interface) r0 = rf(ctx, lvl) } else { r0 = ret.Error(0) @@ -63,24 +52,14 @@ type LogLevelSetter_SetLogLevel_Call struct { // SetLogLevel is a helper method to define mock.On call // - ctx context.Context -<<<<<<< HEAD -// - lvl logp.Level -======= // - lvl *logp.Level ->>>>>>> 4c70881493 (define logLevelSetter interface) func (_e *LogLevelSetter_Expecter) SetLogLevel(ctx interface{}, lvl interface{}) *LogLevelSetter_SetLogLevel_Call { return &LogLevelSetter_SetLogLevel_Call{Call: _e.mock.On("SetLogLevel", ctx, lvl)} } -<<<<<<< HEAD -func (_c *LogLevelSetter_SetLogLevel_Call) Run(run func(ctx context.Context, lvl logp.Level)) *LogLevelSetter_SetLogLevel_Call { - _c.Call.Run(func(args mock.Arguments) { - run(args[0].(context.Context), args[1].(logp.Level)) -======= func (_c *LogLevelSetter_SetLogLevel_Call) Run(run func(ctx context.Context, lvl *logp.Level)) *LogLevelSetter_SetLogLevel_Call { _c.Call.Run(func(args mock.Arguments) { run(args[0].(context.Context), args[1].(*logp.Level)) ->>>>>>> 4c70881493 (define logLevelSetter interface) }) return _c } @@ -90,11 +69,7 @@ func (_c *LogLevelSetter_SetLogLevel_Call) Return(_a0 error) *LogLevelSetter_Set return _c } -<<<<<<< HEAD -func (_c *LogLevelSetter_SetLogLevel_Call) RunAndReturn(run func(context.Context, logp.Level) error) *LogLevelSetter_SetLogLevel_Call { -======= func (_c *LogLevelSetter_SetLogLevel_Call) RunAndReturn(run func(context.Context, *logp.Level) error) *LogLevelSetter_SetLogLevel_Call { ->>>>>>> 4c70881493 (define logLevelSetter interface) _c.Call.Return(run) return _c } From 003b747956429f0d6800cfd81314c89410673a22 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 9 May 2024 14:38:34 +0200 Subject: [PATCH 13/17] changelog --- ...57644-Set-log-level-from-fleet-policy.yaml | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml diff --git a/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml b/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml new file mode 100644 index 00000000000..bb9479354e4 --- /dev/null +++ b/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml @@ -0,0 +1,40 @@ +# Kind can be one of: +# - breaking-change: a change to previously-documented behavior +# - deprecation: functionality that is being removed in a later release +# - bug-fix: fixes a problem in a previous version +# - enhancement: extends functionality but does not break or fix existing behavior +# - feature: new functionality +# - known-issue: problems that we are aware of in a given version +# - security: impacts on the security of a product or a user’s deployment. +# - upgrade: important information for someone upgrading from a prior version +# - other: does not fit into any of the other categories +kind: enhancement + +# Change summary; a 80ish characters long description of the change. +summary: Set log level from fleet policy + +# Long description; in case the summary is not enough to describe the change +# this field accommodate a description without length limits. +# NOTE: This field will be rendered only for breaking-change and known-issue kinds at the moment. +description: Enables setting agent logging level in policy. + Setting a valid log level (same values allowed for setting log level on the specific agent) + in fleet policy under `agent.logging.level` key will cause the agent to change + its logging level, unless an override is set for the specific elastic-agent using + a `settings` action. + The order of priority of log level for a fleet managed agent is: + 1. log level set specifically to the agent via settings action, if any + 2. log level specified in fleet policy, if any + 3. default hard-coded log level for elastic-agent + +# Affected component; a word indicating the component this changeset affects. +component: elastic-agent + +# PR URL; optional; the PR number that added the changeset. +# If not present is automatically filled by the tooling finding the PR where this changelog fragment has been added. +# NOTE: the tooling supports backports, so it's able to fill the original PR number instead of the backport PR number. +# Please provide it if you are adding a fragment for a different PR. +pr: https://github.com/elastic/elastic-agent/pull/3090 + +# Issue URL; optional; the GitHub issue related to this changeset (either closes or is part of). +# If not present is automatically filled by the tooling with the issue linked to the PR number. +issue: https://github.com/elastic/elastic-agent/issues/2851 From 76f96187e082573b8c274f624329e1175ca3986e Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Thu, 9 May 2024 15:09:29 +0200 Subject: [PATCH 14/17] fixup! changelog --- ...5257644-Set-log-level-from-fleet-policy.yaml | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml b/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml index bb9479354e4..3d2376971b4 100644 --- a/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml +++ b/changelog/fragments/1715257644-Set-log-level-from-fleet-policy.yaml @@ -16,16 +16,21 @@ summary: Set log level from fleet policy # Long description; in case the summary is not enough to describe the change # this field accommodate a description without length limits. # NOTE: This field will be rendered only for breaking-change and known-issue kinds at the moment. -description: Enables setting agent logging level in policy. - Setting a valid log level (same values allowed for setting log level on the specific agent) - in fleet policy under `agent.logging.level` key will cause the agent to change - its logging level, unless an override is set for the specific elastic-agent using - a `settings` action. +description: > + Enables setting agent logging level in policy. Setting a valid + log level (same values allowed for setting log level on the specific agent) + in fleet policy under `agent.logging.level` key will cause the agent to + change its logging level, unless an override is set for the specific + elastic-agent using a `settings` action. + The order of priority of log level for a fleet managed agent is: + 1. log level set specifically to the agent via settings action, if any + 2. log level specified in fleet policy, if any + 3. default hard-coded log level for elastic-agent - + # Affected component; a word indicating the component this changeset affects. component: elastic-agent From 930607d1ab32309d67c8df9f0683b79f06c155c9 Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Fri, 10 May 2024 16:05:33 +0200 Subject: [PATCH 15/17] Set initial log level from config --- internal/pkg/agent/cmd/run.go | 3 +++ 1 file changed, 3 insertions(+) diff --git a/internal/pkg/agent/cmd/run.go b/internal/pkg/agent/cmd/run.go index 8b0306fbed9..a1864dff7dc 100644 --- a/internal/pkg/agent/cmd/run.go +++ b/internal/pkg/agent/cmd/run.go @@ -235,6 +235,9 @@ func runElasticAgent(ctx context.Context, cancel context.CancelFunc, override cf logLvl = lvl logger.SetLevel(lvl) } + } else { + // Set the initial log level (either default or from config file) + logger.SetLevel(logLvl) } // initiate agent watcher From b9394d4b4e681321b82af33e1ebf59be7401ef5f Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Mon, 13 May 2024 14:53:54 +0200 Subject: [PATCH 16/17] Add integration test --- testing/integration/log_level_test.go | 277 ++++++++++++++++++++++++++ 1 file changed, 277 insertions(+) create mode 100644 testing/integration/log_level_test.go diff --git a/testing/integration/log_level_test.go b/testing/integration/log_level_test.go new file mode 100644 index 00000000000..abd87463f98 --- /dev/null +++ b/testing/integration/log_level_test.go @@ -0,0 +1,277 @@ +// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one +// or more contributor license agreements. Licensed under the Elastic License; +// you may not use this file except in compliance with the Elastic License. + +//go:build integration + +package integration + +import ( + "bytes" + "context" + "fmt" + "net/http" + "testing" + "text/template" + "time" + + "github.com/google/uuid" + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" + "gopkg.in/yaml.v2" + + "github.com/elastic/elastic-agent-libs/kibana" + "github.com/elastic/elastic-agent-libs/logp" + "github.com/elastic/elastic-agent/pkg/control/v2/client" + "github.com/elastic/elastic-agent/pkg/core/logger" + atesting "github.com/elastic/elastic-agent/pkg/testing" + "github.com/elastic/elastic-agent/pkg/testing/define" + "github.com/elastic/elastic-agent/pkg/testing/tools/fleettools" + "github.com/elastic/elastic-agent/pkg/testing/tools/testcontext" + "github.com/elastic/elastic-agent/pkg/utils" +) + +func TestSetLogLevelFleetManaged(t *testing.T) { + info := define.Require(t, define.Requirements{ + Group: Default, + Stack: &define.Stack{}, + }) + + deadline := time.Now().Add(10 * time.Minute) + ctx, cancel := testcontext.WithDeadline(t, context.Background(), deadline) + defer cancel() + + f, err := define.NewFixtureFromLocalBuild(t, define.Version()) + require.NoError(t, err, "failed creating agent fixture") + + testSetLogLevel := createTestSetLogLevelFunction(ctx, t, f, info) + + f.Run(ctx, atesting.State{ + AgentState: atesting.NewClientState(client.Healthy), + After: testSetLogLevel, + }) + +} + +func createTestSetLogLevelFunction(ctx context.Context, t *testing.T, f *atesting.Fixture, info *define.Info) func(ctx context.Context) error { + policyResp, enrollmentTokenResp := createPolicyAndEnrollmentToken(ctx, t, info.KibanaClient, createBasicPolicy()) + + t.Logf("Created policy %+v", policyResp.AgentPolicy) + + t.Log("Getting default Fleet Server URL...") + fleetServerURL, err := fleettools.DefaultURL(ctx, info.KibanaClient) + require.NoError(t, err, "failed getting Fleet Server URL") + + t.Cleanup(func() { + timeoutCtx, cancel := context.WithTimeout(context.Background(), 2*time.Minute) + defer cancel() + err := info.KibanaClient.DeletePolicy(timeoutCtx, policyResp.ID) + assert.NoError(t, err, "error deleting policy %s", policyResp.ID) + }) + + // the actual test function is the one below + return func(ctx context.Context) error { + + out, err := f.Exec(ctx, []string{"enroll", "--url", fleetServerURL, "--enrollment-token", enrollmentTokenResp.APIKey}) + require.NoErrorf(t, err, "error enrolling agent. Enroll command output:\n%s\n", string(out)) + + state, err := f.Client().State(ctx) + require.NoError(t, err, "error getting state for agent") + + t.Cleanup(unenrollAgentFunction(ctx, t, info.KibanaClient, state.Info.ID)) + + actualLogLevel, err := getLogLevelForAgent(ctx, t, f) + require.NoError(t, err, "error retrieving agent log level") + assert.Equal(t, logger.DefaultLogLevel, actualLogLevel, "unexpected default log level at agent startup") + + policyLogLevel := logp.ErrorLevel + + // make sure we are changing something + require.NotEqualf(t, logger.DefaultLogLevel, policyLogLevel, "Policy log level %s should be different than agent default log level", policyLogLevel) + + // set policy log level and verify that eventually the agent sets it + err = updatePolicyLogLevel(ctx, info.KibanaClient, policyResp.AgentPolicy, policyLogLevel.String()) + require.NoError(t, err, "error updating policy log level") + + assert.Eventuallyf(t, func() bool { + agentLogLevel, err := getLogLevelForAgent(ctx, t, f) + if err != nil { + t.Logf("error getting log level from agent: %v", err) + return false + } + t.Logf("Agent log level: %q policy log level: %q", agentLogLevel, policyLogLevel) + return agentLogLevel == policyLogLevel.String() + }, 2*time.Minute, time.Second, "agent never received expected log level %q", policyLogLevel) + + // set agent log level and verify that it takes precedence over the policy one + agentID, err := getAgentID(ctx, t, f) + require.NoError(t, err, "error getting the agent ID") + agentLogLevel := logp.DebugLevel.String() + err = updateAgentLogLevel(ctx, info.KibanaClient, agentID, agentLogLevel) + require.NoError(t, err, "error updating agent log level") + + assert.Eventuallyf(t, func() bool { + actualAgentLogLevel, err := getLogLevelForAgent(ctx, t, f) + if err != nil { + t.Logf("error getting log level from agent: %v", err) + return false + } + t.Logf("Agent log level: %q, expected level: %q", actualAgentLogLevel, agentLogLevel) + return actualAgentLogLevel == agentLogLevel + }, 2*time.Minute, time.Second, "agent never received expected log level %q", agentLogLevel) + + // TODO: We should clear the agent level log setting and check that agent reapplies the policy log level but it's not supported by fleet yet + return nil + } +} + +func updateAgentLogLevel(ctx context.Context, kibanaClient *kibana.Client, agentID string, logLevel string) error { + updateLogLevelTemplateString := `{ + "action": { + "type": "SETTINGS", + "data": { + "log_level": "{{ .logLevel }}" + } + } + }` + updateLogLevelTemplate, err := template.New("updatePolicyLogLevel").Parse(updateLogLevelTemplateString) + if err != nil { + return fmt.Errorf("error parsing update log level request template: %w", err) + } + + buf := new(bytes.Buffer) + err = updateLogLevelTemplate.Execute(buf, map[string]string{"logLevel": logLevel}) + + _, err = kibanaClient.SendWithContext(ctx, http.MethodPost, "/api/fleet/agents/"+agentID+"/actions", nil, nil, buf) + if err != nil { + return fmt.Errorf("error executing fleet request: %w", err) + } + + return nil +} + +func updatePolicyLogLevel(ctx context.Context, kibanaClient *kibana.Client, policy kibana.AgentPolicy, newPolicyLogLevel string) error { + // The request we would need is the one below, but at the time of writing there is no way to set overrides with fleet api 8.8.0, need to update + // info.KibanaClient.UpdatePolicy(ctx, policyResp.ID, kibana.AgentPolicyUpdateRequest{}) + // Let's do a generic HTTP request + + updateLogLevelTemplateString := `{ + "name": "{{ .policyName }}", + "namespace": "{{ .namespace }}", + "overrides": { + "agent":{ + "logging": { + "level": "{{ .logLevel }}" + } + } + } + }` + updateLogLevelTemplate, err := template.New("updatePolicyLogLevel").Parse(updateLogLevelTemplateString) + if err != nil { + return fmt.Errorf("error parsing update log level request template: %w", err) + } + + buf := new(bytes.Buffer) + err = updateLogLevelTemplate.Execute(buf, map[string]string{"policyName": policy.Name, "namespace": policy.Namespace, "logLevel": newPolicyLogLevel}) + if err != nil { + return fmt.Errorf("error rendering policy update template: %w", err) + } + + _, err = kibanaClient.SendWithContext(ctx, http.MethodPut, "/api/fleet/agent_policies/"+policy.ID, nil, nil, buf) + + //updateLogLevelReq, err := http.NewRequestWithContext(ctx, http.MethodPut, kibanaClient.URL+"/api/fleet/agent_policies/"+policy.ID, buf) + //if err != nil { + // return fmt.Errorf("error creating policy log level update request: %w", err) + //} + //_, err = kibanaClient.HTTP.Do(updateLogLevelReq) + //if err != nil { + // return fmt.Errorf("error executing policy log level update: %w", err) + //} + if err != nil { + return fmt.Errorf("error executing fleet request: %w", err) + } + + return nil +} + +func getAgentID(ctx context.Context, t *testing.T, f *atesting.Fixture) (string, error) { + inspectOutput, err := agentInspect(ctx, t, f) + if err != nil { + return "", fmt.Errorf("inspecting agent config: %w", err) + } + t.Logf("inspect output:\n%s\n", inspectOutput) + rawAgentId, err := utils.GetNestedMap(inspectOutput, "agent", "id") + if err != nil { + return "", fmt.Errorf("error looking up agent id in inspect output: %w", err) + } + if agentID, ok := rawAgentId.(string); ok { + return agentID, nil + } + + return "", fmt.Errorf("agent id is not a string: %T", rawAgentId) +} + +func getLogLevelForAgent(ctx context.Context, t *testing.T, f *atesting.Fixture) (string, error) { + inspectOutput, err := agentInspect(ctx, t, f) + if err != nil { + return "", fmt.Errorf("error retrieving log level: %w", err) + } + + actualLogLevel, err := utils.GetNestedMap[string](inspectOutput, "agent", "logging", "level") + if err != nil { + return "", fmt.Errorf("error retrieving log level from inspect output: %w", err) + } + + if logLevelString, ok := actualLogLevel.(string); ok { + return logLevelString, nil + } + + return "", fmt.Errorf("loglevel from inspect output is not a string: %T", actualLogLevel) +} + +func agentInspect(ctx context.Context, t *testing.T, f *atesting.Fixture) (map[string]any, error) { + inspectOutBytes, err := f.Exec(ctx, []string{"inspect"}) + t.Logf("inspect output:\n%s\n", string(inspectOutBytes)) + if err != nil { + return nil, fmt.Errorf("unable to run elastic-agent inspect: %w", err) + } + inspectOutput := map[string]any{} + err = yaml.Unmarshal(inspectOutBytes, &inspectOutput) + if err != nil { + return nil, fmt.Errorf("error unmarshalling inspect output: %w", err) + } + return inspectOutput, nil +} + +func unenrollAgentFunction(ctx context.Context, t *testing.T, client *kibana.Client, id string) func() { + return func() { + _, err := client.UnEnrollAgent(ctx, kibana.UnEnrollAgentRequest{ + ID: id, + Revoke: false, + }) + assert.NoError(t, err, "error unenrolling agent") + } +} + +func createPolicyAndEnrollmentToken(ctx context.Context, t *testing.T, kibClient *kibana.Client, policy kibana.AgentPolicy) (kibana.PolicyResponse, kibana.CreateEnrollmentAPIKeyResponse) { + t.Log("Creating Agent policy...") + policyResp, err := kibClient.CreatePolicy(ctx, policy) + require.NoError(t, err, "failed creating policy") + + t.Log("Creating Agent enrollment API key...") + createEnrollmentApiKeyReq := kibana.CreateEnrollmentAPIKeyRequest{ + PolicyID: policyResp.ID, + } + enrollmentToken, err := kibClient.CreateEnrollmentAPIKey(ctx, createEnrollmentApiKeyReq) + require.NoError(t, err, "failed creating enrollment API key") + return policyResp, enrollmentToken +} +func createBasicPolicy() kibana.AgentPolicy { + policyUUID := uuid.New().String() + return kibana.AgentPolicy{ + Name: "testloglevel-policy-" + policyUUID, + Namespace: "default", + Description: "Test Log Level Policy " + policyUUID, + MonitoringEnabled: []kibana.MonitoringEnabledOption{}, + } +} From db92d839bb237ba06bb10c633ade1b0047aecbdc Mon Sep 17 00:00:00 2001 From: Paolo Chila Date: Mon, 13 May 2024 16:35:59 +0200 Subject: [PATCH 17/17] make fakeAgentInfo implement info.Agent interface --- .../pkg/agent/application/coordinator/diagnostics_test.go | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/internal/pkg/agent/application/coordinator/diagnostics_test.go b/internal/pkg/agent/application/coordinator/diagnostics_test.go index cd2b6e9dcae..478a5811586 100644 --- a/internal/pkg/agent/application/coordinator/diagnostics_test.go +++ b/internal/pkg/agent/application/coordinator/diagnostics_test.go @@ -645,6 +645,10 @@ func (a fakeAgentInfo) LogLevel() string { return a.logLevel } +func (a fakeAgentInfo) RawLogLevel() string { + return a.logLevel +} + func (a fakeAgentInfo) Snapshot() bool { return a.snapshot }