mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			142 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			142 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package tokenfile
 | 
						|
 | 
						|
import (
 | 
						|
	"io/ioutil"
 | 
						|
	"os"
 | 
						|
	"reflect"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/auth/user"
 | 
						|
)
 | 
						|
 | 
						|
func TestTokenFile(t *testing.T) {
 | 
						|
	auth, err := newWithContents(t, `
 | 
						|
token1,user1,uid1
 | 
						|
token2,user2,uid2
 | 
						|
token3,user3,uid3,"group1,group2"
 | 
						|
token4,user4,uid4,"group2"
 | 
						|
token5,user5,uid5,group5
 | 
						|
token6,user6,uid6,group5,otherdata
 | 
						|
token7,user7,uid7,"group1,group2",otherdata
 | 
						|
`)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable to read tokenfile: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		Token string
 | 
						|
		User  *user.DefaultInfo
 | 
						|
		Ok    bool
 | 
						|
		Err   bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			Token: "token1",
 | 
						|
			User:  &user.DefaultInfo{Name: "user1", UID: "uid1"},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token2",
 | 
						|
			User:  &user.DefaultInfo{Name: "user2", UID: "uid2"},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token3",
 | 
						|
			User:  &user.DefaultInfo{Name: "user3", UID: "uid3", Groups: []string{"group1", "group2"}},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token4",
 | 
						|
			User:  &user.DefaultInfo{Name: "user4", UID: "uid4", Groups: []string{"group2"}},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token5",
 | 
						|
			User:  &user.DefaultInfo{Name: "user5", UID: "uid5", Groups: []string{"group5"}},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token6",
 | 
						|
			User:  &user.DefaultInfo{Name: "user6", UID: "uid6", Groups: []string{"group5"}},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token7",
 | 
						|
			User:  &user.DefaultInfo{Name: "user7", UID: "uid7", Groups: []string{"group1", "group2"}},
 | 
						|
			Ok:    true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Token: "token8",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		user, ok, err := auth.AuthenticateToken(testCase.Token)
 | 
						|
		if testCase.User == nil {
 | 
						|
			if user != nil {
 | 
						|
				t.Errorf("%d: unexpected non-nil user %#v", i, user)
 | 
						|
			}
 | 
						|
		} else if !reflect.DeepEqual(testCase.User, user) {
 | 
						|
			t.Errorf("%d: expected user %#v, got %#v", i, testCase.User, user)
 | 
						|
		}
 | 
						|
 | 
						|
		if testCase.Ok != ok {
 | 
						|
			t.Errorf("%d: expected auth %v, got %v", i, testCase.Ok, ok)
 | 
						|
		}
 | 
						|
		switch {
 | 
						|
		case err == nil && testCase.Err:
 | 
						|
			t.Errorf("%d: unexpected nil error", i)
 | 
						|
		case err != nil && !testCase.Err:
 | 
						|
			t.Errorf("%d: unexpected error: %v", i, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestBadTokenFile(t *testing.T) {
 | 
						|
	_, err := newWithContents(t, `
 | 
						|
token1,user1,uid1
 | 
						|
token2,user2,uid2
 | 
						|
token3,user3
 | 
						|
token4
 | 
						|
`)
 | 
						|
	if err == nil {
 | 
						|
		t.Fatalf("unexpected non error")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestInsufficientColumnsTokenFile(t *testing.T) {
 | 
						|
	_, err := newWithContents(t, "token4\n")
 | 
						|
	if err == nil {
 | 
						|
		t.Fatalf("unexpected non error")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func newWithContents(t *testing.T, contents string) (auth *TokenAuthenticator, err error) {
 | 
						|
	f, err := ioutil.TempFile("", "tokenfile_test")
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unexpected error creating tokenfile: %v", err)
 | 
						|
	}
 | 
						|
	f.Close()
 | 
						|
	defer os.Remove(f.Name())
 | 
						|
 | 
						|
	if err := ioutil.WriteFile(f.Name(), []byte(contents), 0700); err != nil {
 | 
						|
		t.Fatalf("unexpected error writing tokenfile: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return NewCSV(f.Name())
 | 
						|
}
 |