/* Copyright 2016 The Kubernetes Authors All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package util import ( "io/ioutil" "net" "os" "path/filepath" "strconv" "testing" "k8s.io/client-go/tools/clientcmd/api" ) var fakeKubeCfg = []byte(` apiVersion: v1 clusters: - cluster: certificate-authority: /home/la-croix/apiserver.crt server: 192.168.1.1:8080 name: la-croix contexts: - context: cluster: la-croix user: la-croix name: la-croix current-context: la-croix kind: Config preferences: {} users: - name: la-croix user: client-certificate: /home/la-croix/apiserver.crt client-key: /home/la-croix/apiserver.key `) var fakeKubeCfg2 = []byte(` apiVersion: v1 clusters: - cluster: certificate-authority: /home/la-croix/apiserver.crt server: https://192.168.10.100:8443 name: minikube contexts: - context: cluster: la-croix user: la-croix name: la-croix current-context: la-croix kind: Config preferences: {} users: - name: la-croix user: client-certificate: /home/la-croix/apiserver.crt client-key: /home/la-croix/apiserver.key `) var fakeKubeCfg3 = []byte(` apiVersion: v1 clusters: - cluster: certificate-authority: /home/la-croix/apiserver.crt server: https://192.168.1.1:8443 name: minikube contexts: - context: cluster: la-croix user: la-croix name: la-croix current-context: la-croix kind: Config preferences: {} users: - name: la-croix user: client-certificate: /home/la-croix/apiserver.crt client-key: /home/la-croix/apiserver.key `) func TestSetupKubeConfig(t *testing.T) { setupCfg := &KubeConfigSetup{ ClusterName: "test", ClusterServerAddress: "192.168.1.1:8080", ClientCertificate: "/home/apiserver.crt", ClientKey: "/home/apiserver.key", CertificateAuthority: "/home/apiserver.crt", KeepContext: false, } var tests = []struct { description string cfg *KubeConfigSetup existingCfg []byte expected api.Config err bool }{ { description: "new kube config", cfg: setupCfg, }, { description: "add to kube config", cfg: setupCfg, existingCfg: fakeKubeCfg, }, { description: "use config env var", cfg: setupCfg, }, { description: "keep context", cfg: &KubeConfigSetup{ ClusterName: "test", ClusterServerAddress: "192.168.1.1:8080", ClientCertificate: "/home/apiserver.crt", ClientKey: "/home/apiserver.key", CertificateAuthority: "/home/apiserver.crt", KeepContext: true, }, existingCfg: fakeKubeCfg, }, } for _, test := range tests { t.Run(test.description, func(t *testing.T) { t.Parallel() tmpDir, err := ioutil.TempDir("", "") if err != nil { t.Fatalf("Error making temp directory %v", err) } test.cfg.SetKubeConfigFile(filepath.Join(tmpDir, "kubeconfig")) if len(test.existingCfg) != 0 { if err := ioutil.WriteFile(test.cfg.GetKubeConfigFile(), test.existingCfg, 0600); err != nil { t.Fatalf("WriteFile: %v", err) } } err = SetupKubeConfig(test.cfg) if err != nil && !test.err { t.Errorf("Got unexpected error: %v", err) } if err == nil && test.err { t.Errorf("Expected error but got none") } config, err := ReadConfigOrNew(test.cfg.GetKubeConfigFile()) if err != nil { t.Errorf("Error reading kubeconfig file: %v", err) } if test.cfg.KeepContext && config.CurrentContext == test.cfg.ClusterName { t.Errorf("Context was changed even though KeepContext was true") } if !test.cfg.KeepContext && config.CurrentContext != test.cfg.ClusterName { t.Errorf("Context was not switched") } os.RemoveAll(tmpDir) }) } } func TestGetKubeConfigStatus(t *testing.T) { var tests = []struct { description string ip net.IP existing []byte err bool status bool }{ { description: "empty ip", ip: nil, existing: fakeKubeCfg, err: true, }, { description: "no minikube cluster", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg, err: true, }, { description: "exactly matching ip", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg2, status: true, }, { description: "different ips", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg3, }, } for _, test := range tests { t.Run(test.description, func(t *testing.T) { t.Parallel() configFilename := tempFile(t, test.existing) statusActual, err := GetKubeConfigStatus(test.ip, configFilename, "minikube") if err != nil && !test.err { t.Errorf("Got unexpected error: %v", err) } if err == nil && test.err { t.Errorf("Expected error but got none: %v", err) } if test.status != statusActual { t.Errorf("Expected status %t, but got %t", test.status, statusActual) } }) } } func TestUpdateKubeconfigIP(t *testing.T) { var tests = []struct { description string ip net.IP existing []byte err bool status bool expCfg []byte }{ { description: "empty ip", ip: nil, existing: fakeKubeCfg2, err: true, expCfg: fakeKubeCfg2, }, { description: "no minikube cluster", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg, err: true, expCfg: fakeKubeCfg, }, { description: "same IP", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg2, expCfg: fakeKubeCfg2, }, { description: "different IP", ip: net.ParseIP("192.168.10.100"), existing: fakeKubeCfg3, status: true, expCfg: fakeKubeCfg2, }, } for _, test := range tests { t.Run(test.description, func(t *testing.T) { t.Parallel() configFilename := tempFile(t, test.existing) statusActual, err := UpdateKubeconfigIP(test.ip, configFilename, "minikube") if err != nil && !test.err { t.Errorf("Got unexpected error: %v", err) } if err == nil && test.err { t.Errorf("Expected error but got none: %v", err) } if test.status != statusActual { t.Errorf("Expected status %t, but got %t", test.status, statusActual) } }) } } func TestEmptyConfig(t *testing.T) { tmp := tempFile(t, []byte{}) defer os.Remove(tmp) cfg, err := ReadConfigOrNew(tmp) if err != nil { t.Fatalf("could not read config: %v", err) } if len(cfg.AuthInfos) != 0 { t.Fail() } if len(cfg.Clusters) != 0 { t.Fail() } if len(cfg.Contexts) != 0 { t.Fail() } } func TestNewConfig(t *testing.T) { dir, err := ioutil.TempDir("", ".kube") if err != nil { t.Fatal(err) } defer os.RemoveAll(dir) // setup minikube config expected := api.NewConfig() minikubeConfig(expected) // write actual filename := filepath.Join(dir, "config") err = WriteConfig(expected, filename) if err != nil { t.Fatal(err) } actual, err := ReadConfigOrNew(filename) if err != nil { t.Fatal(err) } if !configEquals(actual, expected) { t.Fatal("configs did not match") } } func TestGetIPFromKubeConfig(t *testing.T) { var tests = []struct { description string cfg []byte ip net.IP err bool }{ { description: "normal IP", cfg: fakeKubeCfg2, ip: net.ParseIP("192.168.10.100"), }, { description: "no minikube cluster", cfg: fakeKubeCfg, err: true, }, } for _, test := range tests { t.Run(test.description, func(t *testing.T) { configFilename := tempFile(t, test.cfg) ip, err := getIPFromKubeConfig(configFilename, "minikube") if err != nil && !test.err { t.Errorf("Got unexpected error: %v", err) } if err == nil && test.err { t.Errorf("Expected error but got none: %v", err) } if !ip.Equal(test.ip) { t.Errorf("IP returned: %s does not match ip given: %s", ip, test.ip) } }) } } func TestDeleteKubeConfigContext(t *testing.T) { configFilename := tempFile(t, fakeKubeCfg) if err := DeleteKubeConfigContext(configFilename, "la-croix"); err != nil { t.Fatal(err) } cfg, err := ReadConfigOrNew(configFilename) if err != nil { t.Fatal(err) } if len(cfg.AuthInfos) != 0 { t.Fail() } if len(cfg.Clusters) != 0 { t.Fail() } if len(cfg.Contexts) != 0 { t.Fail() } } // tempFile creates a temporary with the provided bytes as its contents. // The caller is responsible for deleting file after use. func tempFile(t *testing.T, data []byte) string { tmp, err := ioutil.TempFile("", "kubeconfig") if err != nil { t.Fatal(err) } if len(data) > 0 { if _, err := tmp.Write(data); err != nil { t.Fatal(err) } } if err := tmp.Close(); err != nil { t.Fatal(err) } return tmp.Name() } // minikubeConfig returns a k8s cluster config func minikubeConfig(config *api.Config) { // cluster clusterName := "minikube" cluster := api.NewCluster() cluster.Server = "https://192.168.99.100:" + strconv.Itoa(APIServerPort) cluster.CertificateAuthority = "/home/tux/.minikube/apiserver.crt" config.Clusters[clusterName] = cluster // user userName := "minikube" user := api.NewAuthInfo() user.ClientCertificate = "/home/tux/.minikube/apiserver.crt" user.ClientKey = "/home/tux/.minikube/apiserver.key" config.AuthInfos[userName] = user // context contextName := "minikube" context := api.NewContext() context.Cluster = clusterName context.AuthInfo = userName config.Contexts[contextName] = context config.CurrentContext = contextName } // configEquals checks if configs are identical func configEquals(a, b *api.Config) bool { if a.Kind != b.Kind { return false } if a.APIVersion != b.APIVersion { return false } if a.Preferences.Colors != b.Preferences.Colors { return false } if len(a.Extensions) != len(b.Extensions) { return false } // clusters if !clustersEquals(a, b) { return false } // users if !authInfosEquals(a, b) { return false } // contexts if !contextsEquals(a, b) { return false } return true } func clustersEquals(a, b *api.Config) bool { if len(a.Clusters) != len(b.Clusters) { return false } for k, aCluster := range a.Clusters { bCluster, exists := b.Clusters[k] if !exists { return false } if !clusterEquals(aCluster, bCluster) { return false } } return true } func clusterEquals(aCluster, bCluster *api.Cluster) bool { if aCluster.LocationOfOrigin != bCluster.LocationOfOrigin || aCluster.Server != bCluster.Server || aCluster.InsecureSkipTLSVerify != bCluster.InsecureSkipTLSVerify || aCluster.CertificateAuthority != bCluster.CertificateAuthority || len(aCluster.CertificateAuthorityData) != len(bCluster.CertificateAuthorityData) || len(aCluster.Extensions) != len(bCluster.Extensions) { return false } return true } func authInfosEquals(a, b *api.Config) bool { if len(a.AuthInfos) != len(b.AuthInfos) { return false } for k, aAuth := range a.AuthInfos { bAuth, exists := b.AuthInfos[k] if !exists { return false } if !authInfoEquals(aAuth, bAuth) { return false } } return true } func authInfoEquals(aAuth, bAuth *api.AuthInfo) bool { if aAuth.LocationOfOrigin != bAuth.LocationOfOrigin || aAuth.ClientCertificate != bAuth.ClientCertificate || len(aAuth.ClientCertificateData) != len(bAuth.ClientCertificateData) || aAuth.ClientKey != bAuth.ClientKey || len(aAuth.ClientKeyData) != len(bAuth.ClientKeyData) || aAuth.Token != bAuth.Token || aAuth.Username != bAuth.Username || aAuth.Password != bAuth.Password || len(aAuth.Extensions) != len(bAuth.Extensions) { return false } return true } func contextsEquals(a, b *api.Config) bool { if len(a.Contexts) != len(b.Contexts) { return false } for k, aContext := range a.Contexts { bContext, exists := b.Contexts[k] if !exists { return false } if !contextEquals(aContext, bContext) { return false } } return true } func contextEquals(aContext, bContext *api.Context) bool { if aContext.LocationOfOrigin != bContext.LocationOfOrigin || aContext.Cluster != bContext.Cluster || aContext.AuthInfo != bContext.AuthInfo || aContext.Namespace != bContext.Namespace || len(aContext.Extensions) != len(bContext.Extensions) { return false } return true }