package codersdk_test import ( "strings" "testing" "time" "github.com/stretchr/testify/require" "github.com/coder/coder/v2/cli/clibase" "github.com/coder/coder/v2/codersdk" ) type exclusion struct { flag bool env bool yaml bool } func TestDeploymentValues_HighlyConfigurable(t *testing.T) { t.Parallel() // This test ensures that every deployment option has // a corresponding Flag, Env, and YAML name, unless explicitly excluded. excludes := map[string]exclusion{ // These are used to configure YAML support itself, so // they make no sense within the YAML file. "Config Path": { yaml: true, }, "Write Config": { yaml: true, env: true, }, // Dangerous values? Not sure we should help users // persistent their configuration. "DANGEROUS: Allow Path App Sharing": { yaml: true, }, "DANGEROUS: Allow Site Owners to Access Path Apps": { yaml: true, }, // Secrets "Trace Honeycomb API Key": { yaml: true, }, "OAuth2 GitHub Client Secret": { yaml: true, }, "OIDC Client Secret": { yaml: true, }, "Postgres Connection URL": { yaml: true, }, "SCIM API Key": { yaml: true, }, // These complex objects should be configured through YAML. "Support Links": { flag: true, env: true, }, "Git Auth Providers": { // Technically Git Auth Providers can be provided through the env, // but bypassing clibase. See cli.ReadGitAuthProvidersFromEnv. flag: true, env: true, }, } set := (&codersdk.DeploymentValues{}).Options() for _, opt := range set { // These are generally for development, so their configurability is // not relevant. if opt.Hidden { delete(excludes, opt.Name) continue } if codersdk.IsSecretDeploymentOption(opt) && opt.YAML != "" { // Secrets should not be written to YAML and instead should continue // to be read from the environment. // // Unfortunately, secrets are still accepted through flags for // legacy purposes. Eventually, we should prevent that. t.Errorf("Option %q is a secret but has a YAML name", opt.Name) } excluded := excludes[opt.Name] switch { case opt.YAML == "" && !excluded.yaml: t.Errorf("Option %q should have a YAML name", opt.Name) case opt.YAML != "" && excluded.yaml: t.Errorf("Option %q is excluded but has a YAML name", opt.Name) case opt.Flag == "" && !excluded.flag: t.Errorf("Option %q should have a flag name", opt.Name) case opt.Flag != "" && excluded.flag: t.Errorf("Option %q is excluded but has a flag name", opt.Name) case opt.Env == "" && !excluded.env: t.Errorf("Option %q should have an env name", opt.Name) case opt.Env != "" && excluded.env: t.Errorf("Option %q is excluded but has an env name", opt.Name) } // Also check all env vars are prefixed with CODER_ const prefix = "CODER_" if opt.Env != "" && !strings.HasPrefix(opt.Env, prefix) { t.Errorf("Option %q has an env name (%q) that is not prefixed with %s", opt.Name, opt.Env, prefix) } delete(excludes, opt.Name) } for opt := range excludes { t.Errorf("Excluded option %q is not in the deployment config. Remove it?", opt) } } func TestSSHConfig_ParseOptions(t *testing.T) { t.Parallel() testCases := []struct { Name string ConfigOptions clibase.StringArray ExpectError bool Expect map[string]string }{ { Name: "Empty", ConfigOptions: []string{}, Expect: map[string]string{}, }, { Name: "Whitespace", ConfigOptions: []string{ "test value", }, Expect: map[string]string{ "test": "value", }, }, { Name: "SimpleValueEqual", ConfigOptions: []string{ "test=value", }, Expect: map[string]string{ "test": "value", }, }, { Name: "SimpleValues", ConfigOptions: []string{ "test=value", "foo=bar", }, Expect: map[string]string{ "test": "value", "foo": "bar", }, }, { Name: "ValueWithQuote", ConfigOptions: []string{ "bar=buzz=bazz", }, Expect: map[string]string{ "bar": "buzz=bazz", }, }, { Name: "NoEquals", ConfigOptions: []string{ "foobar", }, ExpectError: true, }, } for _, tt := range testCases { tt := tt t.Run(tt.Name, func(t *testing.T) { t.Parallel() c := codersdk.SSHConfig{ SSHConfigOptions: tt.ConfigOptions, } got, err := c.ParseOptions() if tt.ExpectError { require.Error(t, err, tt.ConfigOptions.String()) } else { require.NoError(t, err, tt.ConfigOptions.String()) require.Equalf(t, tt.Expect, got, tt.ConfigOptions.String()) } }) } } func TestTimezoneOffsets(t *testing.T) { t.Parallel() testCases := []struct { Name string Loc *time.Location ExpectedOffset int }{ { Name: "UTX", Loc: time.UTC, ExpectedOffset: 0, }, { Name: "Eastern", Loc: must(time.LoadLocation("America/New_York")), ExpectedOffset: -4, }, { Name: "Central", Loc: must(time.LoadLocation("America/Chicago")), ExpectedOffset: -5, }, { Name: "Ireland", Loc: must(time.LoadLocation("Europe/Dublin")), ExpectedOffset: 1, }, { Name: "HalfHourTz", // This timezone is +6:30, but the function rounds to the nearest hour. // This is intentional because our DAUs endpoint only covers 1-hour offsets. // If the user is in a non-hour timezone, they get the closest hour bucket. Loc: must(time.LoadLocation("Asia/Yangon")), ExpectedOffset: 6, }, } for _, c := range testCases { c := c t.Run(c.Name, func(t *testing.T) { t.Parallel() offset := codersdk.TimezoneOffsetHour(c.Loc) require.Equal(t, c.ExpectedOffset, offset) }) } } func must[T any](value T, err error) T { if err != nil { panic(err) } return value }