operator/pkg/tasks/deinit: unit test kubeconfig
In this commit, we unit test kubeconfig deinit task in the operator package on cleaning up the secret if it has the given labels. Signed-off-by: Mohamed Awnallah <mohamedmohey2352@gmail.com>
This commit is contained in:
parent
c16e52a3ec
commit
cbeb308cdf
|
@ -0,0 +1,125 @@
|
||||||
|
/*
|
||||||
|
Copyright 2024 The Karmada Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package tasks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
corev1 "k8s.io/api/core/v1"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
fakeclientset "k8s.io/client-go/kubernetes/fake"
|
||||||
|
|
||||||
|
"github.com/karmada-io/karmada/operator/pkg/constants"
|
||||||
|
"github.com/karmada-io/karmada/operator/pkg/util"
|
||||||
|
"github.com/karmada-io/karmada/operator/pkg/util/apiclient"
|
||||||
|
"github.com/karmada-io/karmada/operator/pkg/workflow"
|
||||||
|
"github.com/karmada-io/karmada/test/helper"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNewCleanupKubeconfigTask(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
wantTask *workflow.Task
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "NewCleanupKubeconfigTask",
|
||||||
|
wantTask: &workflow.Task{
|
||||||
|
Name: "cleanup-kubeconfig",
|
||||||
|
Run: runCleanupKubeconfig,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
cleanupKubeconfigTask := NewCleanupKubeconfigTask()
|
||||||
|
if err := util.DeepEqualTasks(cleanupKubeconfigTask, *test.wantTask); err != nil {
|
||||||
|
t.Errorf("unexpected error, got: %v", err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRunCleanupKubeconfig(t *testing.T) {
|
||||||
|
name, namespace := "karmada-demo", "test"
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
runData workflow.RunData
|
||||||
|
secret *corev1.Secret
|
||||||
|
prep func(workflow.RunData, *corev1.Secret) error
|
||||||
|
verify func(rd workflow.RunData, s *corev1.Secret) error
|
||||||
|
wantErr bool
|
||||||
|
errMsg string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "RunCleanupKubeconfig_InvalidTypeAssertion_TypeAssertionIsInvalid",
|
||||||
|
runData: &MyTestData{Data: "test"},
|
||||||
|
prep: func(workflow.RunData, *corev1.Secret) error { return nil },
|
||||||
|
verify: func(workflow.RunData, *corev1.Secret) error { return nil },
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "cleanup-kubeconfig task invoked with an invalid data struct",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "RunCleanupKubeconfig_DeleteSecretWithKarmadaOperatorLabel_SecretDeleted",
|
||||||
|
runData: &TestDeInitData{
|
||||||
|
name: name,
|
||||||
|
namespace: namespace,
|
||||||
|
remoteClient: fakeclientset.NewSimpleClientset(),
|
||||||
|
},
|
||||||
|
secret: helper.NewSecret(namespace, util.AdminKubeconfigSecretName(name), map[string][]byte{}),
|
||||||
|
prep: func(rd workflow.RunData, s *corev1.Secret) error {
|
||||||
|
data := rd.(*TestDeInitData)
|
||||||
|
s.Labels = constants.KarmadaOperatorLabel
|
||||||
|
if err := apiclient.CreateOrUpdateSecret(data.RemoteClient(), s); err != nil {
|
||||||
|
return fmt.Errorf("failed to create secret, got err: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
verify: func(rd workflow.RunData, s *corev1.Secret) error {
|
||||||
|
data := rd.(*TestDeInitData)
|
||||||
|
_, err := data.RemoteClient().CoreV1().Secrets(s.GetNamespace()).Get(context.TODO(), s.GetName(), metav1.GetOptions{})
|
||||||
|
if err == nil {
|
||||||
|
return fmt.Errorf("expected secret to be deleted, but got err: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
if err := test.prep(test.runData, test.secret); err != nil {
|
||||||
|
t.Errorf("failed to prep the test env before cleaning the kubeconfig, got error: %v", err)
|
||||||
|
}
|
||||||
|
err := runCleanupKubeconfig(test.runData)
|
||||||
|
if err == nil && test.wantErr {
|
||||||
|
t.Error("expected an error, but got none")
|
||||||
|
}
|
||||||
|
if err != nil && !test.wantErr {
|
||||||
|
t.Errorf("unexpected error, got: %v", err)
|
||||||
|
}
|
||||||
|
if err != nil && test.wantErr && !strings.Contains(err.Error(), test.errMsg) {
|
||||||
|
t.Errorf("expected error message %s to be in %s", test.errMsg, err.Error())
|
||||||
|
}
|
||||||
|
if err := test.verify(test.runData, test.secret); err != nil {
|
||||||
|
t.Errorf("failed to verify the deletion of secret, got error: %v", err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue