/* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package token import ( "bytes" "io/ioutil" "os" "testing" "time" apierrors "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/runtime" clientsetfake "k8s.io/client-go/kubernetes/fake" core "k8s.io/client-go/testing" kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm" "k8s.io/kubernetes/pkg/api" ) const testConfig = `apiVersion: v1 clusters: - cluster: server: https://10.128.0.6:6443 name: kubernetes contexts: - context: cluster: kubernetes user: kubernetes-admin name: kubernetes-admin@kubernetes current-context: kubernetes-admin@kubernetes kind: Config preferences: {} users: - name: kubernetes-admin` func TestEncodeTokenSecretData(t *testing.T) { var tests = []struct { token *kubeadmapi.TokenDiscovery t time.Duration }{ {token: &kubeadmapi.TokenDiscovery{ID: "foo", Secret: "bar"}}, // should use default {token: &kubeadmapi.TokenDiscovery{ID: "foo", Secret: "bar"}, t: time.Second}, // should use default } for _, rt := range tests { actual := encodeTokenSecretData(rt.token.ID, rt.token.Secret, rt.t, []string{}, "") if !bytes.Equal(actual["token-id"], []byte(rt.token.ID)) { t.Errorf( "failed EncodeTokenSecretData:\n\texpected: %s\n\t actual: %s", rt.token.ID, actual["token-id"], ) } if !bytes.Equal(actual["token-secret"], []byte(rt.token.Secret)) { t.Errorf( "failed EncodeTokenSecretData:\n\texpected: %s\n\t actual: %s", rt.token.Secret, actual["token-secret"], ) } if rt.t > 0 { if actual["expiration"] == nil { t.Errorf( "failed EncodeTokenSecretData, duration was not added to time", ) } } } } func TestCreateBootstrapConfigMapIfNotExists(t *testing.T) { tests := []struct { name string createErr error expectErr bool }{ { "successful case should have no error", nil, false, }, { "duplicate creation should have no error", apierrors.NewAlreadyExists(api.Resource("configmaps"), "test"), false, }, { "unexpected error should be returned", apierrors.NewUnauthorized("go away!"), true, }, } file, err := ioutil.TempFile("", "") if err != nil { t.Fatalf("could not create tempfile: %v", err) } defer os.Remove(file.Name()) file.Write([]byte(testConfig)) for _, tc := range tests { client := clientsetfake.NewSimpleClientset() if tc.createErr != nil { client.PrependReactor("create", "configmaps", func(action core.Action) (bool, runtime.Object, error) { return true, nil, tc.createErr }) } err = CreateBootstrapConfigMapIfNotExists(client, file.Name()) if tc.expectErr && err == nil { t.Errorf("CreateBootstrapConfigMapIfNotExists(%s) wanted error, got nil", tc.name) } else if !tc.expectErr && err != nil { t.Errorf("CreateBootstrapConfigMapIfNotExists(%s) returned unexpected error: %v", tc.name, err) } } }