
This change allows the namespace in kubeconfig to be overridden by specifying the namespace in the spec file. If namespace is explicitly provided in the command line flags and the spec file has a different namespace, this will cause an error.
252 lines
7.2 KiB
Go
252 lines
7.2 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package clientcmd
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api/latest"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/client"
|
|
clientcmdapi "github.com/GoogleCloudPlatform/kubernetes/pkg/client/clientcmd/api"
|
|
)
|
|
|
|
func createValidTestConfig() *clientcmdapi.Config {
|
|
const (
|
|
server = "https://anything.com:8080"
|
|
token = "the-token"
|
|
)
|
|
|
|
config := clientcmdapi.NewConfig()
|
|
config.Clusters["clean"] = clientcmdapi.Cluster{
|
|
Server: server,
|
|
APIVersion: latest.Version,
|
|
}
|
|
config.AuthInfos["clean"] = clientcmdapi.AuthInfo{
|
|
Token: token,
|
|
}
|
|
config.Contexts["clean"] = clientcmdapi.Context{
|
|
Cluster: "clean",
|
|
AuthInfo: "clean",
|
|
}
|
|
config.CurrentContext = "clean"
|
|
|
|
return config
|
|
}
|
|
|
|
func TestMergeContext(t *testing.T) {
|
|
const namespace = "overriden-namespace"
|
|
|
|
config := createValidTestConfig()
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{})
|
|
|
|
_, overridden, err := clientBuilder.Namespace()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
if overridden {
|
|
t.Error("Expected namespace to not be overridden")
|
|
}
|
|
|
|
clientBuilder = NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{
|
|
Context: clientcmdapi.Context{
|
|
Namespace: namespace,
|
|
},
|
|
})
|
|
|
|
actual, overridden, err := clientBuilder.Namespace()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
if !overridden {
|
|
t.Error("Expected namespace to be overridden")
|
|
}
|
|
|
|
matchStringArg(namespace, actual, t)
|
|
}
|
|
|
|
func TestCertificateData(t *testing.T) {
|
|
caData := []byte("ca-data")
|
|
certData := []byte("cert-data")
|
|
keyData := []byte("key-data")
|
|
|
|
config := clientcmdapi.NewConfig()
|
|
config.Clusters["clean"] = clientcmdapi.Cluster{
|
|
Server: "https://localhost:8443",
|
|
APIVersion: latest.Version,
|
|
CertificateAuthorityData: caData,
|
|
}
|
|
config.AuthInfos["clean"] = clientcmdapi.AuthInfo{
|
|
ClientCertificateData: certData,
|
|
ClientKeyData: keyData,
|
|
}
|
|
config.Contexts["clean"] = clientcmdapi.Context{
|
|
Cluster: "clean",
|
|
AuthInfo: "clean",
|
|
}
|
|
config.CurrentContext = "clean"
|
|
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
// Make sure cert data gets into config (will override file paths)
|
|
matchByteArg(caData, clientConfig.TLSClientConfig.CAData, t)
|
|
matchByteArg(certData, clientConfig.TLSClientConfig.CertData, t)
|
|
matchByteArg(keyData, clientConfig.TLSClientConfig.KeyData, t)
|
|
}
|
|
|
|
func TestBasicAuthData(t *testing.T) {
|
|
username := "myuser"
|
|
password := "mypass"
|
|
|
|
config := clientcmdapi.NewConfig()
|
|
config.Clusters["clean"] = clientcmdapi.Cluster{
|
|
Server: "https://localhost:8443",
|
|
APIVersion: latest.Version,
|
|
}
|
|
config.AuthInfos["clean"] = clientcmdapi.AuthInfo{
|
|
Username: username,
|
|
Password: password,
|
|
}
|
|
config.Contexts["clean"] = clientcmdapi.Context{
|
|
Cluster: "clean",
|
|
AuthInfo: "clean",
|
|
}
|
|
config.CurrentContext = "clean"
|
|
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
// Make sure basic auth data gets into config
|
|
matchStringArg(username, clientConfig.Username, t)
|
|
matchStringArg(password, clientConfig.Password, t)
|
|
}
|
|
|
|
func TestCreateClean(t *testing.T) {
|
|
config := createValidTestConfig()
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
matchStringArg(config.Clusters["clean"].Server, clientConfig.Host, t)
|
|
matchStringArg("", clientConfig.Prefix, t)
|
|
matchStringArg(config.Clusters["clean"].APIVersion, clientConfig.Version, t)
|
|
matchBoolArg(config.Clusters["clean"].InsecureSkipTLSVerify, clientConfig.Insecure, t)
|
|
matchStringArg(config.AuthInfos["clean"].Token, clientConfig.BearerToken, t)
|
|
}
|
|
|
|
func TestCreateCleanWithPrefix(t *testing.T) {
|
|
tt := []struct {
|
|
server string
|
|
host string
|
|
prefix string
|
|
}{
|
|
{"https://anything.com:8080/foo/bar", "https://anything.com:8080", "/foo/bar"},
|
|
{"http://anything.com:8080/foo/bar", "http://anything.com:8080", "/foo/bar"},
|
|
{"http://anything.com:8080/foo/bar/", "http://anything.com:8080", "/foo/bar/"},
|
|
{"http://anything.com:8080/", "http://anything.com:8080/", ""},
|
|
{"http://anything.com:8080//", "http://anything.com:8080", "//"},
|
|
{"anything.com:8080/foo/bar", "anything.com:8080/foo/bar", ""},
|
|
{"anything.com:8080", "anything.com:8080", ""},
|
|
{"anything.com", "anything.com", ""},
|
|
{"anything", "anything", ""},
|
|
{"", "http://localhost:8080", ""},
|
|
}
|
|
|
|
for _, tc := range tt {
|
|
config := createValidTestConfig()
|
|
|
|
cleanConfig := config.Clusters["clean"]
|
|
cleanConfig.Server = tc.server
|
|
config.Clusters["clean"] = cleanConfig
|
|
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "clean", &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
matchStringArg(tc.host, clientConfig.Host, t)
|
|
matchStringArg(tc.prefix, clientConfig.Prefix, t)
|
|
}
|
|
}
|
|
|
|
func TestCreateCleanDefault(t *testing.T) {
|
|
config := createValidTestConfig()
|
|
clientBuilder := NewDefaultClientConfig(*config, &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
matchStringArg(config.Clusters["clean"].Server, clientConfig.Host, t)
|
|
matchStringArg(config.Clusters["clean"].APIVersion, clientConfig.Version, t)
|
|
matchBoolArg(config.Clusters["clean"].InsecureSkipTLSVerify, clientConfig.Insecure, t)
|
|
matchStringArg(config.AuthInfos["clean"].Token, clientConfig.BearerToken, t)
|
|
}
|
|
|
|
func TestCreateMissingContext(t *testing.T) {
|
|
const expectedErrorContains = "Context was not found for specified context"
|
|
config := createValidTestConfig()
|
|
clientBuilder := NewNonInteractiveClientConfig(*config, "not-present", &ConfigOverrides{})
|
|
|
|
clientConfig, err := clientBuilder.ClientConfig()
|
|
if err != nil {
|
|
t.Errorf("Unexpected error: %v", err)
|
|
}
|
|
|
|
expectedConfig := &client.Config{Host: clientConfig.Host}
|
|
|
|
if !reflect.DeepEqual(expectedConfig, clientConfig) {
|
|
t.Errorf("Expected %#v, got %#v", expectedConfig, clientConfig)
|
|
}
|
|
|
|
}
|
|
|
|
func matchBoolArg(expected, got bool, t *testing.T) {
|
|
if expected != got {
|
|
t.Errorf("Expected %v, got %v", expected, got)
|
|
}
|
|
}
|
|
|
|
func matchStringArg(expected, got string, t *testing.T) {
|
|
if expected != got {
|
|
t.Errorf("Expected %q, got %q", expected, got)
|
|
}
|
|
}
|
|
|
|
func matchByteArg(expected, got []byte, t *testing.T) {
|
|
if !reflect.DeepEqual(expected, got) {
|
|
t.Errorf("Expected %v, got %v", expected, got)
|
|
}
|
|
}
|