talos/pkg/kubeconfig/generate_test.go
Andrey Smirnov 96aa9638f7
chore: rename talos-systems/talos to siderolabs/talos
There's a cyclic dependency on siderolink library which imports talos
machinery back. We will fix that after we get talos pushed under a new
name.

Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
2022-11-03 16:50:32 +04:00

100 lines
2.5 KiB
Go

// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
package kubeconfig_test
import (
"bytes"
"fmt"
"net/url"
"testing"
"time"
"github.com/siderolabs/crypto/x509"
"github.com/stretchr/testify/suite"
"k8s.io/client-go/tools/clientcmd"
"github.com/siderolabs/talos/pkg/kubeconfig"
"github.com/siderolabs/talos/pkg/machinery/config/types/v1alpha1"
)
type GenerateSuite struct {
suite.Suite
}
func (suite *GenerateSuite) TestGenerateAdmin() {
for _, rsa := range []bool{true, false} {
rsa := rsa
suite.Run(fmt.Sprintf("RSA=%v", rsa), func() {
ca, err := x509.NewSelfSignedCertificateAuthority(x509.RSA(rsa))
suite.Require().NoError(err)
u, err := url.Parse("http://localhost:3333/api")
suite.Require().NoError(err)
cfg := &v1alpha1.ClusterConfig{
ClusterName: "talos1",
ClusterCA: &x509.PEMEncodedCertificateAndKey{
Crt: ca.CrtPEM,
Key: ca.KeyPEM,
},
ControlPlane: &v1alpha1.ControlPlaneConfig{
Endpoint: &v1alpha1.Endpoint{
URL: u,
},
},
AdminKubeconfigConfig: &v1alpha1.AdminKubeconfigConfig{
AdminKubeconfigCertLifetime: time.Hour,
},
}
var buf bytes.Buffer
suite.Require().NoError(kubeconfig.GenerateAdmin(cfg, &buf))
// verify config via k8s client
config, err := clientcmd.Load(buf.Bytes())
suite.Require().NoError(err)
suite.Assert().NoError(clientcmd.ConfirmUsable(*config, fmt.Sprintf("admin@%s", cfg.ClusterName)))
})
}
}
func (suite *GenerateSuite) TestGenerate() {
ca, err := x509.NewSelfSignedCertificateAuthority(x509.RSA(false))
suite.Require().NoError(err)
k8sCA := x509.NewCertificateAndKeyFromCertificateAuthority(ca)
input := kubeconfig.GenerateInput{
ClusterName: "foo",
CA: k8sCA,
CertificateLifetime: time.Hour,
CommonName: "system:kube-controller-manager",
Organization: "system:kube-controller-manager",
Endpoint: "https://localhost:6443/",
Username: "kube-controller-manager",
ContextName: "kube-controller-manager",
}
var buf bytes.Buffer
suite.Require().NoError(kubeconfig.Generate(&input, &buf))
// verify config via k8s client
config, err := clientcmd.Load(buf.Bytes())
suite.Require().NoError(err)
suite.Assert().NoError(clientcmd.ConfirmUsable(*config, "kube-controller-manager@foo"))
}
func TestGenerateSuite(t *testing.T) {
suite.Run(t, new(GenerateSuite))
}