minikube/pkg/util/kubeconfig_test.go

565 lines
12 KiB
Go

/*
Copyright 2016 The Kubernetes Authors All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package util
import (
"io/ioutil"
"net"
"os"
"path/filepath"
"strconv"
"testing"
"k8s.io/client-go/tools/clientcmd/api"
)
var fakeKubeCfg = []byte(`
apiVersion: v1
clusters:
- cluster:
certificate-authority: /home/la-croix/apiserver.crt
server: 192.168.1.1:8080
name: la-croix
contexts:
- context:
cluster: la-croix
user: la-croix
name: la-croix
current-context: la-croix
kind: Config
preferences: {}
users:
- name: la-croix
user:
client-certificate: /home/la-croix/apiserver.crt
client-key: /home/la-croix/apiserver.key
`)
var fakeKubeCfg2 = []byte(`
apiVersion: v1
clusters:
- cluster:
certificate-authority: /home/la-croix/apiserver.crt
server: https://192.168.10.100:8443
name: minikube
contexts:
- context:
cluster: la-croix
user: la-croix
name: la-croix
current-context: la-croix
kind: Config
preferences: {}
users:
- name: la-croix
user:
client-certificate: /home/la-croix/apiserver.crt
client-key: /home/la-croix/apiserver.key
`)
var fakeKubeCfg3 = []byte(`
apiVersion: v1
clusters:
- cluster:
certificate-authority: /home/la-croix/apiserver.crt
server: https://192.168.1.1:8443
name: minikube
contexts:
- context:
cluster: la-croix
user: la-croix
name: la-croix
current-context: la-croix
kind: Config
preferences: {}
users:
- name: la-croix
user:
client-certificate: /home/la-croix/apiserver.crt
client-key: /home/la-croix/apiserver.key
`)
func TestSetupKubeConfig(t *testing.T) {
setupCfg := &KubeConfigSetup{
ClusterName: "test",
ClusterServerAddress: "192.168.1.1:8080",
ClientCertificate: "/home/apiserver.crt",
ClientKey: "/home/apiserver.key",
CertificateAuthority: "/home/apiserver.crt",
KeepContext: false,
}
var tests = []struct {
description string
cfg *KubeConfigSetup
existingCfg []byte
expected api.Config
err bool
}{
{
description: "new kube config",
cfg: setupCfg,
},
{
description: "add to kube config",
cfg: setupCfg,
existingCfg: fakeKubeCfg,
},
{
description: "use config env var",
cfg: setupCfg,
},
{
description: "keep context",
cfg: &KubeConfigSetup{
ClusterName: "test",
ClusterServerAddress: "192.168.1.1:8080",
ClientCertificate: "/home/apiserver.crt",
ClientKey: "/home/apiserver.key",
CertificateAuthority: "/home/apiserver.crt",
KeepContext: true,
},
existingCfg: fakeKubeCfg,
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
t.Parallel()
tmpDir, err := ioutil.TempDir("", "")
if err != nil {
t.Fatalf("Error making temp directory %v", err)
}
test.cfg.SetKubeConfigFile(filepath.Join(tmpDir, "kubeconfig"))
if len(test.existingCfg) != 0 {
if err := ioutil.WriteFile(test.cfg.GetKubeConfigFile(), test.existingCfg, 0600); err != nil {
t.Fatalf("WriteFile: %v", err)
}
}
err = SetupKubeConfig(test.cfg)
if err != nil && !test.err {
t.Errorf("Got unexpected error: %v", err)
}
if err == nil && test.err {
t.Errorf("Expected error but got none")
}
config, err := ReadConfigOrNew(test.cfg.GetKubeConfigFile())
if err != nil {
t.Errorf("Error reading kubeconfig file: %v", err)
}
if test.cfg.KeepContext && config.CurrentContext == test.cfg.ClusterName {
t.Errorf("Context was changed even though KeepContext was true")
}
if !test.cfg.KeepContext && config.CurrentContext != test.cfg.ClusterName {
t.Errorf("Context was not switched")
}
os.RemoveAll(tmpDir)
})
}
}
func TestGetKubeConfigStatus(t *testing.T) {
var tests = []struct {
description string
ip net.IP
existing []byte
err bool
status bool
}{
{
description: "empty ip",
ip: nil,
existing: fakeKubeCfg,
err: true,
},
{
description: "no minikube cluster",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg,
err: true,
},
{
description: "exactly matching ip",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg2,
status: true,
},
{
description: "different ips",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg3,
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
t.Parallel()
configFilename := tempFile(t, test.existing)
statusActual, err := GetKubeConfigStatus(test.ip, configFilename, "minikube")
if err != nil && !test.err {
t.Errorf("Got unexpected error: %v", err)
}
if err == nil && test.err {
t.Errorf("Expected error but got none: %v", err)
}
if test.status != statusActual {
t.Errorf("Expected status %t, but got %t", test.status, statusActual)
}
})
}
}
func TestUpdateKubeconfigIP(t *testing.T) {
var tests = []struct {
description string
ip net.IP
existing []byte
err bool
status bool
expCfg []byte
}{
{
description: "empty ip",
ip: nil,
existing: fakeKubeCfg2,
err: true,
expCfg: fakeKubeCfg2,
},
{
description: "no minikube cluster",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg,
err: true,
expCfg: fakeKubeCfg,
},
{
description: "same IP",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg2,
expCfg: fakeKubeCfg2,
},
{
description: "different IP",
ip: net.ParseIP("192.168.10.100"),
existing: fakeKubeCfg3,
status: true,
expCfg: fakeKubeCfg2,
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
t.Parallel()
configFilename := tempFile(t, test.existing)
statusActual, err := UpdateKubeconfigIP(test.ip, configFilename, "minikube")
if err != nil && !test.err {
t.Errorf("Got unexpected error: %v", err)
}
if err == nil && test.err {
t.Errorf("Expected error but got none: %v", err)
}
if test.status != statusActual {
t.Errorf("Expected status %t, but got %t", test.status, statusActual)
}
})
}
}
func TestEmptyConfig(t *testing.T) {
tmp := tempFile(t, []byte{})
defer os.Remove(tmp)
cfg, err := ReadConfigOrNew(tmp)
if err != nil {
t.Fatalf("could not read config: %v", err)
}
if len(cfg.AuthInfos) != 0 {
t.Fail()
}
if len(cfg.Clusters) != 0 {
t.Fail()
}
if len(cfg.Contexts) != 0 {
t.Fail()
}
}
func TestNewConfig(t *testing.T) {
dir, err := ioutil.TempDir("", ".kube")
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(dir)
// setup minikube config
expected := api.NewConfig()
minikubeConfig(expected)
// write actual
filename := filepath.Join(dir, "config")
err = WriteConfig(expected, filename)
if err != nil {
t.Fatal(err)
}
actual, err := ReadConfigOrNew(filename)
if err != nil {
t.Fatal(err)
}
if !configEquals(actual, expected) {
t.Fatal("configs did not match")
}
}
func TestGetIPFromKubeConfig(t *testing.T) {
var tests = []struct {
description string
cfg []byte
ip net.IP
err bool
}{
{
description: "normal IP",
cfg: fakeKubeCfg2,
ip: net.ParseIP("192.168.10.100"),
},
{
description: "no minikube cluster",
cfg: fakeKubeCfg,
err: true,
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
configFilename := tempFile(t, test.cfg)
ip, err := getIPFromKubeConfig(configFilename, "minikube")
if err != nil && !test.err {
t.Errorf("Got unexpected error: %v", err)
}
if err == nil && test.err {
t.Errorf("Expected error but got none: %v", err)
}
if !ip.Equal(test.ip) {
t.Errorf("IP returned: %s does not match ip given: %s", ip, test.ip)
}
})
}
}
func TestDeleteKubeConfigContext(t *testing.T) {
configFilename := tempFile(t, fakeKubeCfg)
if err := DeleteKubeConfigContext(configFilename, "la-croix"); err != nil {
t.Fatal(err)
}
cfg, err := ReadConfigOrNew(configFilename)
if err != nil {
t.Fatal(err)
}
if len(cfg.AuthInfos) != 0 {
t.Fail()
}
if len(cfg.Clusters) != 0 {
t.Fail()
}
if len(cfg.Contexts) != 0 {
t.Fail()
}
}
// tempFile creates a temporary with the provided bytes as its contents.
// The caller is responsible for deleting file after use.
func tempFile(t *testing.T, data []byte) string {
tmp, err := ioutil.TempFile("", "kubeconfig")
if err != nil {
t.Fatal(err)
}
if len(data) > 0 {
if _, err := tmp.Write(data); err != nil {
t.Fatal(err)
}
}
if err := tmp.Close(); err != nil {
t.Fatal(err)
}
return tmp.Name()
}
// minikubeConfig returns a k8s cluster config
func minikubeConfig(config *api.Config) {
// cluster
clusterName := "minikube"
cluster := api.NewCluster()
cluster.Server = "https://192.168.99.100:" + strconv.Itoa(APIServerPort)
cluster.CertificateAuthority = "/home/tux/.minikube/apiserver.crt"
config.Clusters[clusterName] = cluster
// user
userName := "minikube"
user := api.NewAuthInfo()
user.ClientCertificate = "/home/tux/.minikube/apiserver.crt"
user.ClientKey = "/home/tux/.minikube/apiserver.key"
config.AuthInfos[userName] = user
// context
contextName := "minikube"
context := api.NewContext()
context.Cluster = clusterName
context.AuthInfo = userName
config.Contexts[contextName] = context
config.CurrentContext = contextName
}
// configEquals checks if configs are identical
func configEquals(a, b *api.Config) bool {
if a.Kind != b.Kind {
return false
}
if a.APIVersion != b.APIVersion {
return false
}
if a.Preferences.Colors != b.Preferences.Colors {
return false
}
if len(a.Extensions) != len(b.Extensions) {
return false
}
// clusters
if !clustersEquals(a, b) {
return false
}
// users
if !authInfosEquals(a, b) {
return false
}
// contexts
if !contextsEquals(a, b) {
return false
}
return true
}
func clustersEquals(a, b *api.Config) bool {
if len(a.Clusters) != len(b.Clusters) {
return false
}
for k, aCluster := range a.Clusters {
bCluster, exists := b.Clusters[k]
if !exists {
return false
}
if !clusterEquals(aCluster, bCluster) {
return false
}
}
return true
}
func clusterEquals(aCluster, bCluster *api.Cluster) bool {
if aCluster.LocationOfOrigin != bCluster.LocationOfOrigin ||
aCluster.Server != bCluster.Server ||
aCluster.InsecureSkipTLSVerify != bCluster.InsecureSkipTLSVerify ||
aCluster.CertificateAuthority != bCluster.CertificateAuthority ||
len(aCluster.CertificateAuthorityData) != len(bCluster.CertificateAuthorityData) ||
len(aCluster.Extensions) != len(bCluster.Extensions) {
return false
}
return true
}
func authInfosEquals(a, b *api.Config) bool {
if len(a.AuthInfos) != len(b.AuthInfos) {
return false
}
for k, aAuth := range a.AuthInfos {
bAuth, exists := b.AuthInfos[k]
if !exists {
return false
}
if !authInfoEquals(aAuth, bAuth) {
return false
}
}
return true
}
func authInfoEquals(aAuth, bAuth *api.AuthInfo) bool {
if aAuth.LocationOfOrigin != bAuth.LocationOfOrigin ||
aAuth.ClientCertificate != bAuth.ClientCertificate ||
len(aAuth.ClientCertificateData) != len(bAuth.ClientCertificateData) ||
aAuth.ClientKey != bAuth.ClientKey ||
len(aAuth.ClientKeyData) != len(bAuth.ClientKeyData) ||
aAuth.Token != bAuth.Token ||
aAuth.Username != bAuth.Username ||
aAuth.Password != bAuth.Password ||
len(aAuth.Extensions) != len(bAuth.Extensions) {
return false
}
return true
}
func contextsEquals(a, b *api.Config) bool {
if len(a.Contexts) != len(b.Contexts) {
return false
}
for k, aContext := range a.Contexts {
bContext, exists := b.Contexts[k]
if !exists {
return false
}
if !contextEquals(aContext, bContext) {
return false
}
}
return true
}
func contextEquals(aContext, bContext *api.Context) bool {
if aContext.LocationOfOrigin != bContext.LocationOfOrigin ||
aContext.Cluster != bContext.Cluster ||
aContext.AuthInfo != bContext.AuthInfo ||
aContext.Namespace != bContext.Namespace ||
len(aContext.Extensions) != len(bContext.Extensions) {
return false
}
return true
}