karmada/pkg/util/serviceaccount_test.go

348 lines
8.5 KiB
Go

package util
import (
"fmt"
"reflect"
"testing"
corev1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/kubernetes/fake"
kubetesting "k8s.io/client-go/testing"
)
func TestCreateServiceAccount(t *testing.T) {
type args struct {
client kubernetes.Interface
sa *corev1.ServiceAccount
}
tests := []struct {
name string
args args
want *corev1.ServiceAccount
wantErr bool
}{
{
name: "service account already exist",
args: args{
client: fake.NewSimpleClientset(makeServiceAccount("test")),
sa: makeServiceAccount("test"),
},
want: makeServiceAccount("test"),
wantErr: false,
},
{
name: "service account create error",
args: args{
client: alwaysErrorKubeClient,
sa: makeServiceAccount("test"),
},
want: nil,
wantErr: true,
},
{
name: "service account create success",
args: args{
client: fake.NewSimpleClientset(),
sa: makeServiceAccount("test"),
},
want: makeServiceAccount("test"),
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := CreateServiceAccount(tt.args.client, tt.args.sa)
if (err != nil) != tt.wantErr {
t.Errorf("CreateServiceAccount() error = %v, wantErr %v", err, tt.wantErr)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("CreateServiceAccount() got = %v, want %v", got, tt.want)
}
})
}
}
func TestDeleteServiceAccount(t *testing.T) {
type args struct {
client kubernetes.Interface
namespace string
name string
}
tests := []struct {
name string
args args
wantErr bool
}{
{
name: "service account not found",
args: args{
client: fake.NewSimpleClientset(),
namespace: metav1.NamespaceDefault,
name: "test",
},
wantErr: false,
},
{
name: "service account delete failed",
args: args{
client: alwaysErrorKubeClient,
namespace: metav1.NamespaceDefault,
name: "test",
},
wantErr: true,
},
{
name: "service account delete success",
args: args{
client: fake.NewSimpleClientset(makeServiceAccount("test")),
namespace: metav1.NamespaceDefault,
name: "test",
},
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if err := DeleteServiceAccount(tt.args.client, tt.args.namespace, tt.args.name); (err != nil) != tt.wantErr {
t.Errorf("DeleteServiceAccount() error = %v, wantErr %v", err, tt.wantErr)
}
})
}
}
func TestEnsureServiceAccountExist(t *testing.T) {
type args struct {
client kubernetes.Interface
serviceAccountObj *corev1.ServiceAccount
dryRun bool
}
tests := []struct {
name string
args args
want *corev1.ServiceAccount
wantErr bool
}{
{
name: "dry run",
args: args{
client: fake.NewSimpleClientset(),
serviceAccountObj: makeServiceAccount("test"),
dryRun: true,
},
want: makeServiceAccount("test"),
wantErr: false,
},
{
name: "service account already exist",
args: args{
client: fake.NewSimpleClientset(makeServiceAccount("test")),
serviceAccountObj: makeServiceAccount("test"),
dryRun: false,
},
want: makeServiceAccount("test"),
wantErr: false,
},
{
name: "service account not exists",
args: args{
client: fake.NewSimpleClientset(),
serviceAccountObj: makeServiceAccount("test"),
dryRun: false,
},
want: makeServiceAccount("test"),
wantErr: false,
},
{
name: "get service account error",
args: args{
client: func() kubernetes.Interface {
c := fake.NewSimpleClientset()
c.PrependReactor("get", "*", errorAction)
return c
}(),
serviceAccountObj: makeServiceAccount("test"),
dryRun: false,
},
want: nil,
wantErr: true,
},
{
name: "create service account error",
args: args{
client: func() kubernetes.Interface {
c := fake.NewSimpleClientset()
c.PrependReactor("create", "*", errorAction)
return c
}(),
serviceAccountObj: makeServiceAccount("test"),
dryRun: false,
},
want: nil,
wantErr: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := EnsureServiceAccountExist(tt.args.client, tt.args.serviceAccountObj, tt.args.dryRun)
if (err != nil) != tt.wantErr {
t.Errorf("EnsureServiceAccountExist() error = %v, wantErr %v", err, tt.wantErr)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("EnsureServiceAccountExist() got = %v, want %v", got, tt.want)
}
})
}
}
func TestIsServiceAccountExist(t *testing.T) {
type args struct {
client kubernetes.Interface
namespace string
name string
}
tests := []struct {
name string
args args
want bool
wantErr bool
}{
{
name: "service account not found",
args: args{
client: fake.NewSimpleClientset(),
namespace: metav1.NamespaceDefault,
name: "test",
},
want: false,
wantErr: false,
},
{
name: "kube client return error",
args: args{
client: alwaysErrorKubeClient,
namespace: metav1.NamespaceDefault,
name: "test",
},
want: false,
wantErr: true,
},
{
name: "service account already exist",
args: args{
client: fake.NewSimpleClientset(makeServiceAccount("test")),
namespace: metav1.NamespaceDefault,
name: "test",
},
want: true,
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := IsServiceAccountExist(tt.args.client, tt.args.namespace, tt.args.name)
if (err != nil) != tt.wantErr {
t.Errorf("IsServiceAccountExist() error = %v, wantErr %v", err, tt.wantErr)
return
}
if got != tt.want {
t.Errorf("IsServiceAccountExist() got = %v, want %v", got, tt.want)
}
})
}
}
func TestWaitForServiceAccountSecretCreation(t *testing.T) {
sa := makeServiceAccount("test")
saVisitCount, secretVisitCount := 0, 0
// ROUND1: get serviceAccount returns not found
// ROUND2: get secret not found
// create secret
// token is empty
// ROUND3: token exist
injectSecretToken := func(client *fake.Clientset, secret *corev1.Secret) error {
secret = secret.DeepCopy()
secret.Data = map[string][]byte{
"token": []byte("test token"),
}
return client.Tracker().Update(schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, secret, metav1.NamespaceDefault)
}
client := fake.NewSimpleClientset(makeServiceAccount("test"))
client.PrependReactor("get", "serviceaccounts", func(action kubetesting.Action) (bool, runtime.Object, error) {
saVisitCount++
if saVisitCount == 1 {
return true, nil, apierrors.NewNotFound(action.GetResource().GroupResource(), "test")
}
return false, nil, nil
})
client.PrependReactor("get", "secrets", func(action kubetesting.Action) (bool, runtime.Object, error) {
secretVisitCount++
if secretVisitCount == 2 {
s, err := client.Tracker().Get(action.GetResource(), action.GetNamespace(), "test")
if err != nil {
return true, nil, fmt.Errorf("secret shall be found: %v", err)
}
// We inject token here, so that next round will see the token
if err := injectSecretToken(client, s.(*corev1.Secret)); err != nil {
return true, nil, err
}
return true, s, nil
}
return false, nil, nil
})
got, err := WaitForServiceAccountSecretCreation(client, sa)
if err != nil {
t.Error(err)
return
}
want := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Namespace: sa.Namespace,
Name: sa.Name,
Annotations: map[string]string{
corev1.ServiceAccountNameKey: sa.Name,
},
},
Type: corev1.SecretTypeServiceAccountToken,
Data: map[string][]byte{
"token": []byte("test token"),
},
}
if !reflect.DeepEqual(got, want) {
t.Errorf("WaitForServiceAccountSecretCreation() got = %v, want %v", got, want)
}
}
var (
alwaysErrorKubeClient kubernetes.Interface
errorAction = func(kubetesting.Action) (handled bool, ret runtime.Object, err error) {
return true, nil, fmt.Errorf("always error")
}
)
func init() {
c := fake.NewSimpleClientset()
c.PrependReactor("*", "*", errorAction)
alwaysErrorKubeClient = c
}
func makeServiceAccount(name string) *corev1.ServiceAccount {
return &corev1.ServiceAccount{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: metav1.NamespaceDefault,
},
}
}