565 lines
12 KiB
Go
565 lines
12 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package util
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"testing"
|
|
|
|
"k8s.io/client-go/tools/clientcmd/api"
|
|
)
|
|
|
|
var fakeKubeCfg = []byte(`
|
|
apiVersion: v1
|
|
clusters:
|
|
- cluster:
|
|
certificate-authority: /home/la-croix/apiserver.crt
|
|
server: 192.168.1.1:8080
|
|
name: la-croix
|
|
contexts:
|
|
- context:
|
|
cluster: la-croix
|
|
user: la-croix
|
|
name: la-croix
|
|
current-context: la-croix
|
|
kind: Config
|
|
preferences: {}
|
|
users:
|
|
- name: la-croix
|
|
user:
|
|
client-certificate: /home/la-croix/apiserver.crt
|
|
client-key: /home/la-croix/apiserver.key
|
|
`)
|
|
|
|
var fakeKubeCfg2 = []byte(`
|
|
apiVersion: v1
|
|
clusters:
|
|
- cluster:
|
|
certificate-authority: /home/la-croix/apiserver.crt
|
|
server: https://192.168.10.100:8443
|
|
name: minikube
|
|
contexts:
|
|
- context:
|
|
cluster: la-croix
|
|
user: la-croix
|
|
name: la-croix
|
|
current-context: la-croix
|
|
kind: Config
|
|
preferences: {}
|
|
users:
|
|
- name: la-croix
|
|
user:
|
|
client-certificate: /home/la-croix/apiserver.crt
|
|
client-key: /home/la-croix/apiserver.key
|
|
`)
|
|
|
|
var fakeKubeCfg3 = []byte(`
|
|
apiVersion: v1
|
|
clusters:
|
|
- cluster:
|
|
certificate-authority: /home/la-croix/apiserver.crt
|
|
server: https://192.168.1.1:8443
|
|
name: minikube
|
|
contexts:
|
|
- context:
|
|
cluster: la-croix
|
|
user: la-croix
|
|
name: la-croix
|
|
current-context: la-croix
|
|
kind: Config
|
|
preferences: {}
|
|
users:
|
|
- name: la-croix
|
|
user:
|
|
client-certificate: /home/la-croix/apiserver.crt
|
|
client-key: /home/la-croix/apiserver.key
|
|
`)
|
|
|
|
func TestSetupKubeConfig(t *testing.T) {
|
|
setupCfg := &KubeConfigSetup{
|
|
ClusterName: "test",
|
|
ClusterServerAddress: "192.168.1.1:8080",
|
|
ClientCertificate: "/home/apiserver.crt",
|
|
ClientKey: "/home/apiserver.key",
|
|
CertificateAuthority: "/home/apiserver.crt",
|
|
KeepContext: false,
|
|
}
|
|
|
|
var tests = []struct {
|
|
description string
|
|
cfg *KubeConfigSetup
|
|
existingCfg []byte
|
|
expected api.Config
|
|
err bool
|
|
}{
|
|
{
|
|
description: "new kube config",
|
|
cfg: setupCfg,
|
|
},
|
|
{
|
|
description: "add to kube config",
|
|
cfg: setupCfg,
|
|
existingCfg: fakeKubeCfg,
|
|
},
|
|
{
|
|
description: "use config env var",
|
|
cfg: setupCfg,
|
|
},
|
|
{
|
|
description: "keep context",
|
|
cfg: &KubeConfigSetup{
|
|
ClusterName: "test",
|
|
ClusterServerAddress: "192.168.1.1:8080",
|
|
ClientCertificate: "/home/apiserver.crt",
|
|
ClientKey: "/home/apiserver.key",
|
|
CertificateAuthority: "/home/apiserver.crt",
|
|
KeepContext: true,
|
|
},
|
|
existingCfg: fakeKubeCfg,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
t.Parallel()
|
|
tmpDir, err := ioutil.TempDir("", "")
|
|
if err != nil {
|
|
t.Fatalf("Error making temp directory %v", err)
|
|
}
|
|
test.cfg.SetKubeConfigFile(filepath.Join(tmpDir, "kubeconfig"))
|
|
if len(test.existingCfg) != 0 {
|
|
if err := ioutil.WriteFile(test.cfg.GetKubeConfigFile(), test.existingCfg, 0600); err != nil {
|
|
t.Fatalf("WriteFile: %v", err)
|
|
}
|
|
}
|
|
err = SetupKubeConfig(test.cfg)
|
|
if err != nil && !test.err {
|
|
t.Errorf("Got unexpected error: %v", err)
|
|
}
|
|
if err == nil && test.err {
|
|
t.Errorf("Expected error but got none")
|
|
}
|
|
config, err := ReadConfigOrNew(test.cfg.GetKubeConfigFile())
|
|
if err != nil {
|
|
t.Errorf("Error reading kubeconfig file: %v", err)
|
|
}
|
|
if test.cfg.KeepContext && config.CurrentContext == test.cfg.ClusterName {
|
|
t.Errorf("Context was changed even though KeepContext was true")
|
|
}
|
|
if !test.cfg.KeepContext && config.CurrentContext != test.cfg.ClusterName {
|
|
t.Errorf("Context was not switched")
|
|
}
|
|
|
|
os.RemoveAll(tmpDir)
|
|
})
|
|
|
|
}
|
|
}
|
|
|
|
func TestGetKubeConfigStatus(t *testing.T) {
|
|
|
|
var tests = []struct {
|
|
description string
|
|
ip net.IP
|
|
existing []byte
|
|
err bool
|
|
status bool
|
|
}{
|
|
{
|
|
description: "empty ip",
|
|
ip: nil,
|
|
existing: fakeKubeCfg,
|
|
err: true,
|
|
},
|
|
{
|
|
description: "no minikube cluster",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg,
|
|
err: true,
|
|
},
|
|
{
|
|
description: "exactly matching ip",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg2,
|
|
status: true,
|
|
},
|
|
{
|
|
description: "different ips",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg3,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
t.Parallel()
|
|
configFilename := tempFile(t, test.existing)
|
|
statusActual, err := GetKubeConfigStatus(test.ip, configFilename, "minikube")
|
|
if err != nil && !test.err {
|
|
t.Errorf("Got unexpected error: %v", err)
|
|
}
|
|
if err == nil && test.err {
|
|
t.Errorf("Expected error but got none: %v", err)
|
|
}
|
|
if test.status != statusActual {
|
|
t.Errorf("Expected status %t, but got %t", test.status, statusActual)
|
|
}
|
|
})
|
|
|
|
}
|
|
}
|
|
|
|
func TestUpdateKubeconfigIP(t *testing.T) {
|
|
|
|
var tests = []struct {
|
|
description string
|
|
ip net.IP
|
|
existing []byte
|
|
err bool
|
|
status bool
|
|
expCfg []byte
|
|
}{
|
|
{
|
|
description: "empty ip",
|
|
ip: nil,
|
|
existing: fakeKubeCfg2,
|
|
err: true,
|
|
expCfg: fakeKubeCfg2,
|
|
},
|
|
{
|
|
description: "no minikube cluster",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg,
|
|
err: true,
|
|
expCfg: fakeKubeCfg,
|
|
},
|
|
{
|
|
description: "same IP",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg2,
|
|
expCfg: fakeKubeCfg2,
|
|
},
|
|
{
|
|
description: "different IP",
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
existing: fakeKubeCfg3,
|
|
status: true,
|
|
expCfg: fakeKubeCfg2,
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
t.Parallel()
|
|
configFilename := tempFile(t, test.existing)
|
|
statusActual, err := UpdateKubeconfigIP(test.ip, configFilename, "minikube")
|
|
if err != nil && !test.err {
|
|
t.Errorf("Got unexpected error: %v", err)
|
|
}
|
|
if err == nil && test.err {
|
|
t.Errorf("Expected error but got none: %v", err)
|
|
}
|
|
if test.status != statusActual {
|
|
t.Errorf("Expected status %t, but got %t", test.status, statusActual)
|
|
}
|
|
})
|
|
|
|
}
|
|
}
|
|
|
|
func TestEmptyConfig(t *testing.T) {
|
|
tmp := tempFile(t, []byte{})
|
|
defer os.Remove(tmp)
|
|
|
|
cfg, err := ReadConfigOrNew(tmp)
|
|
if err != nil {
|
|
t.Fatalf("could not read config: %v", err)
|
|
}
|
|
|
|
if len(cfg.AuthInfos) != 0 {
|
|
t.Fail()
|
|
}
|
|
|
|
if len(cfg.Clusters) != 0 {
|
|
t.Fail()
|
|
}
|
|
|
|
if len(cfg.Contexts) != 0 {
|
|
t.Fail()
|
|
}
|
|
}
|
|
|
|
func TestNewConfig(t *testing.T) {
|
|
dir, err := ioutil.TempDir("", ".kube")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer os.RemoveAll(dir)
|
|
|
|
// setup minikube config
|
|
expected := api.NewConfig()
|
|
minikubeConfig(expected)
|
|
|
|
// write actual
|
|
filename := filepath.Join(dir, "config")
|
|
err = WriteConfig(expected, filename)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
actual, err := ReadConfigOrNew(filename)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if !configEquals(actual, expected) {
|
|
t.Fatal("configs did not match")
|
|
}
|
|
}
|
|
|
|
func TestGetIPFromKubeConfig(t *testing.T) {
|
|
|
|
var tests = []struct {
|
|
description string
|
|
cfg []byte
|
|
ip net.IP
|
|
err bool
|
|
}{
|
|
{
|
|
description: "normal IP",
|
|
cfg: fakeKubeCfg2,
|
|
ip: net.ParseIP("192.168.10.100"),
|
|
},
|
|
{
|
|
description: "no minikube cluster",
|
|
cfg: fakeKubeCfg,
|
|
err: true,
|
|
},
|
|
}
|
|
for _, test := range tests {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
configFilename := tempFile(t, test.cfg)
|
|
ip, err := getIPFromKubeConfig(configFilename, "minikube")
|
|
if err != nil && !test.err {
|
|
t.Errorf("Got unexpected error: %v", err)
|
|
}
|
|
if err == nil && test.err {
|
|
t.Errorf("Expected error but got none: %v", err)
|
|
}
|
|
if !ip.Equal(test.ip) {
|
|
t.Errorf("IP returned: %s does not match ip given: %s", ip, test.ip)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDeleteKubeConfigContext(t *testing.T) {
|
|
configFilename := tempFile(t, fakeKubeCfg)
|
|
if err := DeleteKubeConfigContext(configFilename, "la-croix"); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
cfg, err := ReadConfigOrNew(configFilename)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if len(cfg.AuthInfos) != 0 {
|
|
t.Fail()
|
|
}
|
|
|
|
if len(cfg.Clusters) != 0 {
|
|
t.Fail()
|
|
}
|
|
|
|
if len(cfg.Contexts) != 0 {
|
|
t.Fail()
|
|
}
|
|
}
|
|
|
|
// tempFile creates a temporary with the provided bytes as its contents.
|
|
// The caller is responsible for deleting file after use.
|
|
func tempFile(t *testing.T, data []byte) string {
|
|
tmp, err := ioutil.TempFile("", "kubeconfig")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if len(data) > 0 {
|
|
if _, err := tmp.Write(data); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
if err := tmp.Close(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
return tmp.Name()
|
|
}
|
|
|
|
// minikubeConfig returns a k8s cluster config
|
|
func minikubeConfig(config *api.Config) {
|
|
// cluster
|
|
clusterName := "minikube"
|
|
cluster := api.NewCluster()
|
|
cluster.Server = "https://192.168.99.100:" + strconv.Itoa(APIServerPort)
|
|
cluster.CertificateAuthority = "/home/tux/.minikube/apiserver.crt"
|
|
config.Clusters[clusterName] = cluster
|
|
|
|
// user
|
|
userName := "minikube"
|
|
user := api.NewAuthInfo()
|
|
user.ClientCertificate = "/home/tux/.minikube/apiserver.crt"
|
|
user.ClientKey = "/home/tux/.minikube/apiserver.key"
|
|
config.AuthInfos[userName] = user
|
|
|
|
// context
|
|
contextName := "minikube"
|
|
context := api.NewContext()
|
|
context.Cluster = clusterName
|
|
context.AuthInfo = userName
|
|
config.Contexts[contextName] = context
|
|
|
|
config.CurrentContext = contextName
|
|
}
|
|
|
|
// configEquals checks if configs are identical
|
|
func configEquals(a, b *api.Config) bool {
|
|
if a.Kind != b.Kind {
|
|
return false
|
|
}
|
|
|
|
if a.APIVersion != b.APIVersion {
|
|
return false
|
|
}
|
|
|
|
if a.Preferences.Colors != b.Preferences.Colors {
|
|
return false
|
|
}
|
|
if len(a.Extensions) != len(b.Extensions) {
|
|
return false
|
|
}
|
|
|
|
// clusters
|
|
if !clustersEquals(a, b) {
|
|
return false
|
|
}
|
|
|
|
// users
|
|
if !authInfosEquals(a, b) {
|
|
return false
|
|
}
|
|
|
|
// contexts
|
|
if !contextsEquals(a, b) {
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func clustersEquals(a, b *api.Config) bool {
|
|
if len(a.Clusters) != len(b.Clusters) {
|
|
return false
|
|
}
|
|
for k, aCluster := range a.Clusters {
|
|
bCluster, exists := b.Clusters[k]
|
|
if !exists {
|
|
return false
|
|
}
|
|
|
|
if !clusterEquals(aCluster, bCluster) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func clusterEquals(aCluster, bCluster *api.Cluster) bool {
|
|
if aCluster.LocationOfOrigin != bCluster.LocationOfOrigin ||
|
|
aCluster.Server != bCluster.Server ||
|
|
aCluster.InsecureSkipTLSVerify != bCluster.InsecureSkipTLSVerify ||
|
|
aCluster.CertificateAuthority != bCluster.CertificateAuthority ||
|
|
len(aCluster.CertificateAuthorityData) != len(bCluster.CertificateAuthorityData) ||
|
|
len(aCluster.Extensions) != len(bCluster.Extensions) {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func authInfosEquals(a, b *api.Config) bool {
|
|
if len(a.AuthInfos) != len(b.AuthInfos) {
|
|
return false
|
|
}
|
|
for k, aAuth := range a.AuthInfos {
|
|
bAuth, exists := b.AuthInfos[k]
|
|
if !exists {
|
|
return false
|
|
}
|
|
if !authInfoEquals(aAuth, bAuth) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func authInfoEquals(aAuth, bAuth *api.AuthInfo) bool {
|
|
if aAuth.LocationOfOrigin != bAuth.LocationOfOrigin ||
|
|
aAuth.ClientCertificate != bAuth.ClientCertificate ||
|
|
len(aAuth.ClientCertificateData) != len(bAuth.ClientCertificateData) ||
|
|
aAuth.ClientKey != bAuth.ClientKey ||
|
|
len(aAuth.ClientKeyData) != len(bAuth.ClientKeyData) ||
|
|
aAuth.Token != bAuth.Token ||
|
|
aAuth.Username != bAuth.Username ||
|
|
aAuth.Password != bAuth.Password ||
|
|
len(aAuth.Extensions) != len(bAuth.Extensions) {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func contextsEquals(a, b *api.Config) bool {
|
|
if len(a.Contexts) != len(b.Contexts) {
|
|
return false
|
|
}
|
|
for k, aContext := range a.Contexts {
|
|
bContext, exists := b.Contexts[k]
|
|
if !exists {
|
|
return false
|
|
}
|
|
if !contextEquals(aContext, bContext) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func contextEquals(aContext, bContext *api.Context) bool {
|
|
if aContext.LocationOfOrigin != bContext.LocationOfOrigin ||
|
|
aContext.Cluster != bContext.Cluster ||
|
|
aContext.AuthInfo != bContext.AuthInfo ||
|
|
aContext.Namespace != bContext.Namespace ||
|
|
len(aContext.Extensions) != len(bContext.Extensions) {
|
|
return false
|
|
}
|
|
return true
|
|
}
|