mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
169 lines
5.0 KiB
Go
169 lines
5.0 KiB
Go
package kubeadm
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/edgelesssys/constellation/internal/constants"
|
|
"github.com/edgelesssys/constellation/internal/file"
|
|
"github.com/edgelesssys/constellation/internal/logger"
|
|
"github.com/spf13/afero"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/goleak"
|
|
v1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
"k8s.io/client-go/kubernetes/fake"
|
|
corev1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
|
fakecorev1 "k8s.io/client-go/kubernetes/typed/core/v1/fake"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m)
|
|
}
|
|
|
|
func TestGetJoinToken(t *testing.T) {
|
|
validConf := `apiVersion: v1
|
|
kind: Config
|
|
clusters:
|
|
- cluster:
|
|
certificate-authority-data: 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
|
|
server: https://127.0.0.1:16443
|
|
name: kubernetes
|
|
contexts:
|
|
- context:
|
|
cluster: kubernetes
|
|
user: kubernetes-admin
|
|
name: kubernetes-admin@kubernetes
|
|
current-context: kubernetes-admin@kubernetes`
|
|
|
|
missingCA := `apiVersion: v1
|
|
kind: Config
|
|
clusters:
|
|
- cluster:
|
|
server: https://127.0.0.1:16443
|
|
name: kubernetes
|
|
contexts:
|
|
- context:
|
|
cluster: kubernetes
|
|
user: kubernetes-admin
|
|
name: kubernetes-admin@kubernetes
|
|
current-context: kubernetes-admin@kubernetes`
|
|
|
|
testCases := map[string]struct {
|
|
adminConf string
|
|
wantErr bool
|
|
}{
|
|
"success": {
|
|
adminConf: validConf,
|
|
},
|
|
"no certificate-authority-data": {
|
|
adminConf: missingCA,
|
|
wantErr: true,
|
|
},
|
|
"no cluster config": {
|
|
adminConf: `apiVersion: v1
|
|
kind: Config`,
|
|
wantErr: true,
|
|
},
|
|
"invalid config": {
|
|
adminConf: "not a config",
|
|
wantErr: true,
|
|
},
|
|
"config does not exist": {
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
client := &Kubeadm{
|
|
log: logger.NewTest(t),
|
|
file: file.NewHandler(afero.NewMemMapFs()),
|
|
client: fake.NewSimpleClientset(),
|
|
}
|
|
if tc.adminConf != "" {
|
|
require.NoError(client.file.Write(constants.CoreOSAdminConfFilename, []byte(tc.adminConf), file.OptNone))
|
|
}
|
|
|
|
res, err := client.GetJoinToken(time.Minute)
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
assert.NotNil(res)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetControlPlaneCertificateKey(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
wantErr bool
|
|
client clientset.Interface
|
|
}{
|
|
"success": {
|
|
client: fake.NewSimpleClientset(),
|
|
wantErr: false,
|
|
},
|
|
"failure": {
|
|
client: &failingClient{
|
|
fake.NewSimpleClientset(),
|
|
},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
client := &Kubeadm{
|
|
log: logger.NewTest(t),
|
|
client: tc.client,
|
|
}
|
|
|
|
_, err := client.GetControlPlaneCertificateKey()
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type failingClient struct {
|
|
*fake.Clientset
|
|
}
|
|
|
|
func (f *failingClient) CoreV1() corev1.CoreV1Interface {
|
|
return &failingCoreV1{
|
|
&fakecorev1.FakeCoreV1{Fake: &f.Clientset.Fake},
|
|
}
|
|
}
|
|
|
|
type failingCoreV1 struct {
|
|
*fakecorev1.FakeCoreV1
|
|
}
|
|
|
|
func (f *failingCoreV1) Secrets(namespace string) corev1.SecretInterface {
|
|
return &failingSecretInterface{
|
|
&fakecorev1.FakeSecrets{Fake: f.FakeCoreV1},
|
|
}
|
|
}
|
|
|
|
type failingSecretInterface struct {
|
|
*fakecorev1.FakeSecrets
|
|
}
|
|
|
|
// copycerts.UploadCerts will fail if a secret already exists.
|
|
func (f *failingSecretInterface) Get(ctx context.Context, name string, opts metav1.GetOptions) (*v1.Secret, error) {
|
|
return &v1.Secret{}, nil
|
|
}
|