mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
3a5753045e
rules_go added a SIGTERM handler that has a goroutine that survives the scope of the goleak check. Currently, the best known workaround is to ignore this goroutine. https://github.com/uber-go/goleak/issues/119 https://github.com/bazelbuild/rules_go/pull/3749 https://github.com/bazelbuild/rules_go/pull/3827#issuecomment-1894002120
112 lines
2.1 KiB
Go
112 lines
2.1 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package role
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/goleak"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m, goleak.IgnoreAnyFunction("github.com/bazelbuild/rules_go/go/tools/bzltestutil.RegisterTimeoutHandler.func1"))
|
|
}
|
|
|
|
func TestMarshal(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
role Role
|
|
wantJSON string
|
|
wantErr bool
|
|
}{
|
|
"controlePlane role": {
|
|
role: ControlPlane,
|
|
wantJSON: `"ControlPlane"`,
|
|
},
|
|
"node role": {
|
|
role: Worker,
|
|
wantJSON: `"Worker"`,
|
|
},
|
|
"unknown role": {
|
|
role: Unknown,
|
|
wantJSON: `"Unknown"`,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
jsonRole, err := tc.role.MarshalJSON()
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
|
|
require.NoError(err)
|
|
assert.Equal(tc.wantJSON, string(jsonRole))
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestUnmarshal(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
json string
|
|
wantRole Role
|
|
wantErr bool
|
|
}{
|
|
"ControlPlane can be unmarshaled": {
|
|
json: `"ControlPlane"`,
|
|
wantRole: ControlPlane,
|
|
},
|
|
"dashed ControlPlane can be unmarshaled": {
|
|
json: `"Control-Plane"`,
|
|
wantRole: ControlPlane,
|
|
},
|
|
"lowercase controlPlane can be unmarshaled": {
|
|
json: `"controlPlane"`,
|
|
wantRole: ControlPlane,
|
|
},
|
|
"Worker can be unmarshaled": {
|
|
json: `"Worker"`,
|
|
wantRole: Worker,
|
|
},
|
|
"lowercase worker can be unmarshaled": {
|
|
json: `"worker"`,
|
|
wantRole: Worker,
|
|
},
|
|
"other strings unmarshal to the unknown role": {
|
|
json: `"anything"`,
|
|
wantRole: Unknown,
|
|
},
|
|
"invalid json fails": {
|
|
json: `"unterminated string literal`,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
var role Role
|
|
err := role.UnmarshalJSON([]byte(tc.json))
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
|
|
require.NoError(err)
|
|
assert.Equal(tc.wantRole, role)
|
|
})
|
|
}
|
|
}
|