c6c2c525a6
Also fix some tests that were broken by bumping golang and dependencies in the previous commits. Note that in addition to changes made to satisfy the linter which do not impact the behavior of the code, this commit also adds ReadHeaderTimeout to all usages of http.Server to satisfy the linter (and because it seemed like a good suggestion).
232 lines
6.7 KiB
Go
232 lines
6.7 KiB
Go
// Copyright 2021-2022 the Pinniped contributors. All Rights Reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package kubeclient
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
|
|
|
loginv1alpha1 "go.pinniped.dev/generated/latest/apis/concierge/login/v1alpha1"
|
|
configv1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/config/v1alpha1"
|
|
)
|
|
|
|
func Test_updatePathNewGVK(t *testing.T) {
|
|
type args struct {
|
|
reqURL *url.URL
|
|
result *mutationResult
|
|
apiPathPrefix string
|
|
reqInfo *genericapirequest.RequestInfo
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *url.URL
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "no gvk change",
|
|
args: args{
|
|
reqURL: mustParse(t, "https://walrus.tld/api/v1/pods"),
|
|
result: &mutationResult{},
|
|
},
|
|
want: mustParse(t, "https://walrus.tld/api/v1/pods"),
|
|
},
|
|
{
|
|
name: "no original gvk group",
|
|
args: args{
|
|
result: &mutationResult{
|
|
origGVK: schema.GroupVersionKind{
|
|
Group: "",
|
|
},
|
|
gvkChanged: true,
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "cluster-scoped list path",
|
|
args: args{
|
|
reqURL: mustParse(t, "https://walrus.tld/apis/"+loginv1alpha1.SchemeGroupVersion.String()+"/tokencredentialrequests"),
|
|
result: &mutationResult{
|
|
origGVK: loginv1alpha1.SchemeGroupVersion.WithKind("TokenCredentialRequest"),
|
|
newGVK: schema.GroupVersionKind{
|
|
Group: "login.concierge.tuna.io",
|
|
Version: loginv1alpha1.SchemeGroupVersion.Version,
|
|
Kind: "TokenCredentialRequest",
|
|
},
|
|
gvkChanged: true,
|
|
},
|
|
apiPathPrefix: "/apis",
|
|
reqInfo: &genericapirequest.RequestInfo{},
|
|
},
|
|
want: mustParse(t, "https://walrus.tld/apis/login.concierge.tuna.io/v1alpha1/tokencredentialrequests"),
|
|
},
|
|
{
|
|
name: "cluster-scoped get path",
|
|
args: args{
|
|
reqURL: mustParse(t, "https://walrus.tld/apis/"+loginv1alpha1.SchemeGroupVersion.String()+"/tokencredentialrequests/some-name"),
|
|
result: &mutationResult{
|
|
origGVK: loginv1alpha1.SchemeGroupVersion.WithKind("TokenCredentialRequest"),
|
|
newGVK: schema.GroupVersionKind{
|
|
Group: "login.concierge.tuna.io",
|
|
Version: loginv1alpha1.SchemeGroupVersion.Version,
|
|
Kind: "TokenCredentialRequest",
|
|
},
|
|
gvkChanged: true,
|
|
},
|
|
apiPathPrefix: "/apis",
|
|
reqInfo: &genericapirequest.RequestInfo{},
|
|
},
|
|
want: mustParse(t, "https://walrus.tld/apis/login.concierge.tuna.io/v1alpha1/tokencredentialrequests/some-name"),
|
|
},
|
|
{
|
|
name: "namespace-scoped list path",
|
|
args: args{
|
|
reqURL: mustParse(t, "https://walrus.tld/apis/"+configv1alpha1.SchemeGroupVersion.String()+"/namespaces/default/federationdomains"),
|
|
result: &mutationResult{
|
|
origGVK: configv1alpha1.SchemeGroupVersion.WithKind("FederationDomain"),
|
|
newGVK: schema.GroupVersionKind{
|
|
Group: "config.supervisor.tuna.io",
|
|
Version: configv1alpha1.SchemeGroupVersion.Version,
|
|
Kind: "FederationDomain",
|
|
},
|
|
gvkChanged: true,
|
|
},
|
|
apiPathPrefix: "/apis",
|
|
reqInfo: &genericapirequest.RequestInfo{},
|
|
},
|
|
want: mustParse(t, "https://walrus.tld/apis/config.supervisor.tuna.io/v1alpha1/namespaces/default/federationdomains"),
|
|
},
|
|
{
|
|
name: "namespace-scoped get path",
|
|
args: args{
|
|
reqURL: mustParse(t, "https://walrus.tld/apis/"+configv1alpha1.SchemeGroupVersion.String()+"/namespaces/default/federationdomains/some-name"),
|
|
result: &mutationResult{
|
|
origGVK: configv1alpha1.SchemeGroupVersion.WithKind("FederationDomain"),
|
|
newGVK: schema.GroupVersionKind{
|
|
Group: "config.supervisor.tuna.io",
|
|
Version: configv1alpha1.SchemeGroupVersion.Version,
|
|
Kind: "FederationDomain",
|
|
},
|
|
gvkChanged: true,
|
|
},
|
|
apiPathPrefix: "/apis",
|
|
reqInfo: &genericapirequest.RequestInfo{},
|
|
},
|
|
want: mustParse(t, "https://walrus.tld/apis/config.supervisor.tuna.io/v1alpha1/namespaces/default/federationdomains/some-name"),
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := updatePathNewGVK(tt.args.reqURL, tt.args.result, tt.args.apiPathPrefix, tt.args.reqInfo)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("updatePathNewGVK() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("updatePathNewGVK() got = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_reqWithoutPrefix(t *testing.T) {
|
|
body := io.NopCloser(bytes.NewBuffer([]byte("some body")))
|
|
newReq := func(rawurl string) *http.Request {
|
|
req, err := http.NewRequestWithContext(context.Background(), http.MethodGet, rawurl, body)
|
|
require.NoError(t, err)
|
|
return req
|
|
}
|
|
|
|
type args struct {
|
|
req *http.Request
|
|
hostURL string
|
|
apiPathPrefix string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *http.Request
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{
|
|
req: newReq("https://walrus.tld/apis/some/path"),
|
|
hostURL: "https://walrus.tld",
|
|
apiPathPrefix: "/apis",
|
|
},
|
|
want: newReq("https://walrus.tld/some/path"),
|
|
},
|
|
{
|
|
name: "host url already has slash suffix",
|
|
args: args{
|
|
req: newReq("https://walrus.tld/apis/some/path"),
|
|
hostURL: "https://walrus.tld/",
|
|
apiPathPrefix: "/apis",
|
|
},
|
|
want: newReq("https://walrus.tld/some/path"),
|
|
},
|
|
{
|
|
name: "api prefix already has slash prefix",
|
|
args: args{
|
|
req: newReq("https://walrus.tld/apis/some/path"),
|
|
hostURL: "https://walrus.tld",
|
|
apiPathPrefix: "apis",
|
|
},
|
|
want: newReq("https://walrus.tld/some/path"),
|
|
},
|
|
{
|
|
name: "api prefix already has slash suffix",
|
|
args: args{
|
|
req: newReq("https://walrus.tld/apis/some/path"),
|
|
hostURL: "https://walrus.tld",
|
|
apiPathPrefix: "/apis/",
|
|
},
|
|
want: newReq("https://walrus.tld/some/path"),
|
|
},
|
|
{
|
|
name: "no api path prefix",
|
|
args: args{
|
|
req: newReq("https://walrus.tld"),
|
|
},
|
|
want: newReq("https://walrus.tld"),
|
|
},
|
|
{
|
|
name: "hostURL and req URL mismatch",
|
|
args: args{
|
|
req: newReq("https://walrus.tld.some-other-url/some/path"),
|
|
hostURL: "https://walrus.tld",
|
|
apiPathPrefix: "/apis",
|
|
},
|
|
want: newReq("https://walrus.tld.some-other-url/some/path"),
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
tt := tt
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
req := *tt.args.req
|
|
if got := reqWithoutPrefix(&req, tt.args.hostURL, tt.args.apiPathPrefix); !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("reqWithoutPrefix() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func mustParse(t *testing.T, rawurl string) *url.URL {
|
|
t.Helper()
|
|
url, err := url.Parse(rawurl)
|
|
require.NoError(t, err)
|
|
return url
|
|
}
|