// Copyright 2020 the Pinniped contributors. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cmd import ( "bytes" "context" "crypto/x509/pkix" "fmt" "io/ioutil" "path/filepath" "testing" "time" "github.com/stretchr/testify/require" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" clientauthv1beta1 "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1" "go.pinniped.dev/internal/certauthority" "go.pinniped.dev/internal/here" "go.pinniped.dev/internal/testutil" "go.pinniped.dev/pkg/conciergeclient" ) func TestLoginStaticCommand(t *testing.T) { testCA, err := certauthority.New(pkix.Name{CommonName: "Test CA"}, 1*time.Hour) require.NoError(t, err) tmpdir := testutil.TempDir(t) testCABundlePath := filepath.Join(tmpdir, "testca.pem") require.NoError(t, ioutil.WriteFile(testCABundlePath, testCA.Bundle(), 0600)) tests := []struct { name string args []string env map[string]string loginErr error conciergeErr error wantError bool wantStdout string wantStderr string wantOptionsCount int }{ { name: "help flag passed", args: []string{"--help"}, wantStdout: here.Doc(` Login using a static token Usage: static [--token TOKEN] [--token-env TOKEN_NAME] [flags] Flags: --concierge-authenticator-name string Concierge authenticator name --concierge-authenticator-type string Concierge authenticator type (e.g., 'webhook', 'jwt') --concierge-ca-bundle-data string CA bundle to use when connecting to the concierge --concierge-endpoint string API base for the Pinniped concierge endpoint --concierge-namespace string Namespace in which the concierge was installed (default "pinniped-concierge") --enable-concierge Exchange the token with the Pinniped concierge during login -h, --help help for static --token string Static token to present during login --token-env string Environment variable containing a static token `), }, { name: "missing required flags", args: []string{}, wantError: true, wantStderr: here.Doc(` Error: one of --token or --token-env must be set `), }, { name: "missing concierge flags", args: []string{ "--token", "test-token", "--enable-concierge", }, wantError: true, wantStderr: here.Doc(` Error: invalid concierge parameters: endpoint must not be empty `), }, { name: "missing env var", args: []string{ "--token-env", "TEST_TOKEN_ENV", }, wantError: true, wantStderr: here.Doc(` Error: --token-env variable "TEST_TOKEN_ENV" is not set `), }, { name: "empty env var", args: []string{ "--token-env", "TEST_TOKEN_ENV", }, env: map[string]string{ "TEST_TOKEN_ENV": "", }, wantError: true, wantStderr: here.Doc(` Error: --token-env variable "TEST_TOKEN_ENV" is empty `), }, { name: "env var token success", args: []string{ "--token-env", "TEST_TOKEN_ENV", }, env: map[string]string{ "TEST_TOKEN_ENV": "test-token", }, wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{},"status":{"token":"test-token"}}` + "\n", }, { name: "concierge failure", args: []string{ "--token", "test-token", "--enable-concierge", "--concierge-endpoint", "https://127.0.0.1/", "--concierge-authenticator-type", "webhook", "--concierge-authenticator-name", "test-authenticator", }, conciergeErr: fmt.Errorf("some concierge error"), wantError: true, wantStderr: here.Doc(` Error: could not complete concierge credential exchange: some concierge error `), }, { name: "static token success", args: []string{ "--token", "test-token", }, wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{},"status":{"token":"test-token"}}` + "\n", }, } for _, tt := range tests { tt := tt t.Run(tt.name, func(t *testing.T) { cmd := staticLoginCommand(staticLoginDeps{ lookupEnv: func(s string) (string, bool) { v, ok := tt.env[s] return v, ok }, exchangeToken: func(ctx context.Context, client *conciergeclient.Client, token string) (*clientauthv1beta1.ExecCredential, error) { require.Equal(t, token, "test-token") if tt.conciergeErr != nil { return nil, tt.conciergeErr } return &clientauthv1beta1.ExecCredential{ TypeMeta: metav1.TypeMeta{ Kind: "ExecCredential", APIVersion: "client.authentication.k8s.io/v1beta1", }, Status: &clientauthv1beta1.ExecCredentialStatus{ Token: "exchanged-token", }, }, nil }, }) require.NotNil(t, cmd) var stdout, stderr bytes.Buffer cmd.SetOut(&stdout) cmd.SetErr(&stderr) cmd.SetArgs(tt.args) err := cmd.Execute() if tt.wantError { require.Error(t, err) } else { require.NoError(t, err) } require.Equal(t, tt.wantStdout, stdout.String(), "unexpected stdout") require.Equal(t, tt.wantStderr, stderr.String(), "unexpected stderr") }) } }