bb3daf1795
This is a series of patches that refactor config.go into several smaller modules, each relating specifically to one component of the configuration structure. This particular patch split auth info and cluster related part in separate modules. Relates-To: #35 Change-Id: Ib2abebc87c80549544a8b7775969df9db55aa8be
587 lines
17 KiB
Go
587 lines
17 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package config_test
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"opendev.org/airship/airshipctl/pkg/config"
|
|
"opendev.org/airship/airshipctl/testutil"
|
|
)
|
|
|
|
const (
|
|
stringDelta = "_changed"
|
|
currentContextName = "def_ephemeral"
|
|
defaultString = "default"
|
|
)
|
|
|
|
func TestString(t *testing.T) {
|
|
fSys := testutil.SetupTestFs(t, "testdata")
|
|
|
|
tests := []struct {
|
|
name string
|
|
stringer fmt.Stringer
|
|
}{
|
|
{
|
|
name: "config",
|
|
stringer: testutil.DummyConfig(),
|
|
},
|
|
{
|
|
name: "context",
|
|
stringer: testutil.DummyContext(),
|
|
},
|
|
{
|
|
name: "cluster",
|
|
stringer: testutil.DummyCluster(),
|
|
},
|
|
{
|
|
name: "authinfo",
|
|
stringer: testutil.DummyAuthInfo(),
|
|
},
|
|
{
|
|
name: "manifest",
|
|
stringer: testutil.DummyManifest(),
|
|
},
|
|
{
|
|
name: "repository",
|
|
stringer: testutil.DummyRepository(),
|
|
},
|
|
{
|
|
name: "repo-auth",
|
|
stringer: testutil.DummyRepoAuth(),
|
|
},
|
|
{
|
|
name: "repo-checkout",
|
|
stringer: testutil.DummyRepoCheckout(),
|
|
},
|
|
{
|
|
name: "bootstrapinfo",
|
|
stringer: testutil.DummyBootstrapInfo(),
|
|
},
|
|
{
|
|
name: "managementconfiguration",
|
|
stringer: testutil.DummyManagementConfiguration(),
|
|
},
|
|
{
|
|
name: "builder",
|
|
stringer: &config.Builder{
|
|
UserDataFileName: "user-data",
|
|
NetworkConfigFileName: "netconfig",
|
|
OutputMetadataFileName: "output-metadata.yaml",
|
|
},
|
|
},
|
|
{
|
|
name: "container",
|
|
stringer: &config.Container{
|
|
Volume: "/dummy:dummy",
|
|
Image: "dummy_image:dummy_tag",
|
|
ContainerRuntime: "docker",
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
filename := fmt.Sprintf("/%s-string.yaml", tt.name)
|
|
data, err := fSys.ReadFile(filename)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, string(data), tt.stringer.String())
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestLoadConfig(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
assert.Len(t, conf.Clusters, 5)
|
|
require.Contains(t, conf.Clusters, "def")
|
|
assert.Len(t, conf.Clusters["def"].ClusterTypes, 2)
|
|
assert.Len(t, conf.Contexts, 3)
|
|
assert.Len(t, conf.AuthInfos, 3)
|
|
}
|
|
|
|
func TestPersistConfig(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
err := conf.PersistConfig()
|
|
require.NoError(t, err)
|
|
|
|
// Check that the files were created
|
|
assert.FileExists(t, conf.LoadedConfigPath())
|
|
assert.FileExists(t, conf.KubeConfigPath())
|
|
// Check that the invalid name was changed to a valid one
|
|
assert.Contains(t, conf.KubeConfig().Clusters, "invalidName_target")
|
|
|
|
// Check that the missing cluster was added to the airshipconfig
|
|
assert.Contains(t, conf.Clusters, "onlyinkubeconf")
|
|
|
|
// Check that the "stragglers" were removed from the airshipconfig
|
|
assert.NotContains(t, conf.Clusters, "straggler")
|
|
}
|
|
|
|
func TestEnsureComplete(t *testing.T) {
|
|
// This test is intentionally verbose. Since a user of EnsureComplete
|
|
// does not need to know about the order of validation, each test
|
|
// object passed into EnsureComplete should have exactly one issue, and
|
|
// be otherwise valid
|
|
tests := []struct {
|
|
name string
|
|
config config.Config
|
|
expectedErr error
|
|
}{
|
|
{
|
|
name: "no clusters defined",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "At least one cluster needs to be defined"},
|
|
},
|
|
{
|
|
name: "no users defined",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "At least one Authentication Information (User) needs to be defined"},
|
|
},
|
|
{
|
|
name: "no contexts defined",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "At least one Context needs to be defined"},
|
|
},
|
|
{
|
|
name: "no manifests defined",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "At least one Manifest needs to be defined"},
|
|
},
|
|
{
|
|
name: "current context not defined",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "Current Context is not defined"},
|
|
},
|
|
{
|
|
name: "no context for current context",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"DIFFERENT_CONTEXT": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "Current Context (testContext) does not identify a defined Context"},
|
|
},
|
|
{
|
|
name: "no manifest for current context",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"DIFFERENT_MANIFEST": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: config.ErrMissingConfig{What: "Current Context (testContext) does not identify a defined Manifest"},
|
|
},
|
|
{
|
|
name: "complete config",
|
|
config: config.Config{
|
|
Clusters: map[string]*config.ClusterPurpose{"testCluster": {}},
|
|
AuthInfos: map[string]*config.AuthInfo{"testAuthInfo": {}},
|
|
Contexts: map[string]*config.Context{"testContext": {Manifest: "testManifest"}},
|
|
Manifests: map[string]*config.Manifest{"testManifest": {}},
|
|
CurrentContext: "testContext",
|
|
},
|
|
expectedErr: nil,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(subTest *testing.T) {
|
|
actualErr := tt.config.EnsureComplete()
|
|
assert.Equal(subTest, tt.expectedErr, actualErr)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCurrentContextBootstrapInfo(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
clusterName := "def"
|
|
clusterType := "ephemeral"
|
|
|
|
bootstrapInfo, err := conf.CurrentContextBootstrapInfo()
|
|
require.Error(t, err)
|
|
assert.Nil(t, bootstrapInfo)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Clusters[clusterName].ClusterTypes[clusterType].Bootstrap = defaultString
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
conf.Contexts[currentContextName].KubeContext().Cluster = clusterName
|
|
|
|
bootstrapInfo, err = conf.CurrentContextBootstrapInfo()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, conf.BootstrapInfo[defaultString], bootstrapInfo)
|
|
}
|
|
|
|
func TestPurge(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
// Store it
|
|
err := conf.PersistConfig()
|
|
assert.NoErrorf(t, err, "Unable to persist configuration expected at %v", conf.LoadedConfigPath())
|
|
|
|
// Verify that the file is there
|
|
_, err = os.Stat(conf.LoadedConfigPath())
|
|
assert.Falsef(t, os.IsNotExist(err), "Test config was not persisted at %v, cannot validate Purge",
|
|
conf.LoadedConfigPath())
|
|
|
|
// Delete it
|
|
err = conf.Purge()
|
|
assert.NoErrorf(t, err, "Unable to Purge file at %v", conf.LoadedConfigPath())
|
|
|
|
// Verify its gone
|
|
_, err = os.Stat(conf.LoadedConfigPath())
|
|
assert.Falsef(t, os.IsExist(err), "Purge failed to remove file at %v", conf.LoadedConfigPath())
|
|
}
|
|
|
|
func TestSetLoadedConfigPath(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
testPath := "/tmp/loadedconfig"
|
|
|
|
assert.NotEqual(t, testPath, conf.LoadedConfigPath())
|
|
conf.SetLoadedConfigPath(testPath)
|
|
assert.Equal(t, testPath, conf.LoadedConfigPath())
|
|
}
|
|
|
|
func TestSetKubeConfigPath(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
testPath := "/tmp/kubeconfig"
|
|
|
|
assert.NotEqual(t, testPath, conf.KubeConfigPath())
|
|
conf.SetKubeConfigPath(testPath)
|
|
assert.Equal(t, testPath, conf.KubeConfigPath())
|
|
}
|
|
|
|
func TestModifyCluster(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
co := testutil.DummyClusterOptions()
|
|
cluster, err := conf.AddCluster(co)
|
|
require.NoError(t, err)
|
|
|
|
co.Server += stringDelta
|
|
co.InsecureSkipTLSVerify = true
|
|
co.EmbedCAData = true
|
|
mcluster, err := conf.ModifyCluster(cluster, co)
|
|
require.NoError(t, err)
|
|
assert.EqualValues(t, conf.Clusters[co.Name].ClusterTypes[co.ClusterType].KubeCluster().Server, co.Server)
|
|
assert.EqualValues(t, conf.Clusters[co.Name].ClusterTypes[co.ClusterType], mcluster)
|
|
|
|
// Error case
|
|
co.CertificateAuthority = "unknown"
|
|
_, err = conf.ModifyCluster(cluster, co)
|
|
assert.Error(t, err)
|
|
}
|
|
|
|
func TestGetClusters(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
clusters := conf.GetClusters()
|
|
assert.Len(t, clusters, 5)
|
|
}
|
|
|
|
func TestGetContexts(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
contexts := conf.GetContexts()
|
|
assert.Len(t, contexts, 3)
|
|
}
|
|
|
|
func TestGetContext(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
context, err := conf.GetContext("def_ephemeral")
|
|
require.NoError(t, err)
|
|
|
|
// Test Positives
|
|
assert.EqualValues(t, context.NameInKubeconf, "def_ephemeral")
|
|
assert.EqualValues(t, context.KubeContext().Cluster, "def_ephemeral")
|
|
|
|
// Test Wrong Cluster
|
|
_, err = conf.GetContext("unknown")
|
|
assert.Error(t, err)
|
|
}
|
|
|
|
func TestAddContext(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
co := testutil.DummyContextOptions()
|
|
context := conf.AddContext(co)
|
|
assert.EqualValues(t, conf.Contexts[co.Name], context)
|
|
}
|
|
|
|
func TestModifyContext(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
co := testutil.DummyContextOptions()
|
|
context := conf.AddContext(co)
|
|
|
|
co.Namespace += stringDelta
|
|
co.Cluster += stringDelta
|
|
co.AuthInfo += stringDelta
|
|
co.Manifest += stringDelta
|
|
conf.ModifyContext(context, co)
|
|
assert.EqualValues(t, conf.Contexts[co.Name].KubeContext().Namespace, co.Namespace)
|
|
assert.EqualValues(t, conf.Contexts[co.Name].KubeContext().Cluster, co.Cluster)
|
|
assert.EqualValues(t, conf.Contexts[co.Name].KubeContext().AuthInfo, co.AuthInfo)
|
|
assert.EqualValues(t, conf.Contexts[co.Name].Manifest, co.Manifest)
|
|
assert.EqualValues(t, conf.Contexts[co.Name], context)
|
|
}
|
|
|
|
func TestGetCurrentContext(t *testing.T) {
|
|
t.Run("getCurrentContext", func(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
context, err := conf.GetCurrentContext()
|
|
require.Error(t, err)
|
|
assert.Nil(t, context)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
|
|
context, err = conf.GetCurrentContext()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, conf.Contexts[currentContextName], context)
|
|
})
|
|
|
|
t.Run("getCurrentContextIncomplete", func(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
context, err := conf.GetCurrentContext()
|
|
require.Error(t, err)
|
|
assert.Nil(t, context)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
|
|
context, err = conf.GetCurrentContext()
|
|
assert.Error(t, err)
|
|
assert.Nil(t, context)
|
|
})
|
|
}
|
|
|
|
func TestCurrentContextCluster(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
clusterName := "def"
|
|
clusterType := "ephemeral"
|
|
|
|
cluster, err := conf.CurrentContextCluster()
|
|
require.Error(t, err)
|
|
assert.Nil(t, cluster)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
conf.Contexts[currentContextName].KubeContext().Cluster = clusterName
|
|
|
|
cluster, err = conf.CurrentContextCluster()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, conf.Clusters[clusterName].ClusterTypes[clusterType], cluster)
|
|
}
|
|
|
|
func TestCurrentContextAuthInfo(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
authInfo, err := conf.CurrentContextAuthInfo()
|
|
require.Error(t, err)
|
|
assert.Nil(t, authInfo)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
|
|
authInfo, err = conf.CurrentContextAuthInfo()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, conf.AuthInfos["k-admin"], authInfo)
|
|
}
|
|
|
|
func TestCurrentContextManifest(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
clusterName := "def"
|
|
|
|
manifest, err := conf.CurrentContextManifest()
|
|
require.Error(t, err)
|
|
assert.Nil(t, manifest)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
conf.Contexts[currentContextName].KubeContext().Cluster = clusterName
|
|
|
|
manifest, err = conf.CurrentContextManifest()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, conf.Manifests[defaultString], manifest)
|
|
}
|
|
|
|
func TestCurrentContextEntryPoint(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
clusterName := "def"
|
|
clusterType := "ephemeral"
|
|
|
|
entryPoint, err := conf.CurrentContextEntryPoint(clusterType, defaultString)
|
|
require.Error(t, err)
|
|
assert.Equal(t, "", entryPoint)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
conf.Contexts[currentContextName].KubeContext().Cluster = clusterName
|
|
|
|
entryPoint, err = conf.CurrentContextEntryPoint(clusterType, defaultString)
|
|
require.NoError(t, err)
|
|
assert.Nil(t, nil, entryPoint)
|
|
}
|
|
|
|
func TestCurrentContextClusterType(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
expectedClusterType := "ephemeral"
|
|
|
|
clusterTypeEmpty, err := conf.CurrentContextClusterType()
|
|
require.Error(t, err)
|
|
assert.Equal(t, "", clusterTypeEmpty)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
|
|
actualClusterType, err := conf.CurrentContextClusterType()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expectedClusterType, actualClusterType)
|
|
}
|
|
|
|
func TestCurrentContextClusterName(t *testing.T) {
|
|
conf, cleanup := testutil.InitConfig(t)
|
|
defer cleanup(t)
|
|
|
|
expectedClusterName := "def"
|
|
|
|
clusterNameEmpty, err := conf.CurrentContextClusterName()
|
|
require.Error(t, err)
|
|
assert.Equal(t, "", clusterNameEmpty)
|
|
|
|
conf.CurrentContext = currentContextName
|
|
conf.Contexts[currentContextName].Manifest = defaultString
|
|
|
|
actualClusterName, err := conf.CurrentContextClusterName()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expectedClusterName, actualClusterName)
|
|
}
|
|
|
|
func TestNewClusterComplexNameFromKubeClusterName(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
inputName string
|
|
expectedName string
|
|
expectedType string
|
|
}{
|
|
{
|
|
name: "single-word",
|
|
inputName: "myCluster",
|
|
expectedName: "myCluster",
|
|
expectedType: config.AirshipDefaultClusterType,
|
|
},
|
|
{
|
|
name: "multi-word",
|
|
inputName: "myCluster_two",
|
|
expectedName: "myCluster_two",
|
|
expectedType: config.AirshipDefaultClusterType,
|
|
},
|
|
{
|
|
name: "cluster-appended",
|
|
inputName: "myCluster_ephemeral",
|
|
expectedName: "myCluster",
|
|
expectedType: config.Ephemeral,
|
|
},
|
|
{
|
|
name: "multi-word-cluster-appended",
|
|
inputName: "myCluster_two_ephemeral",
|
|
expectedName: "myCluster_two",
|
|
expectedType: config.Ephemeral,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
complexName := config.NewClusterComplexNameFromKubeClusterName(tt.inputName)
|
|
assert.Equal(t, tt.expectedName, complexName.Name)
|
|
assert.Equal(t, tt.expectedType, complexName.Type)
|
|
})
|
|
}
|
|
}
|