123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package tunneler
- import (
- "context"
- "fmt"
- "net"
- "os"
- "path/filepath"
- "testing"
- "time"
- "github.com/stretchr/testify/assert"
- "k8s.io/apimachinery/pkg/util/clock"
- )
- // TestSecondsSinceSync verifies that proper results are returned
- // when checking the time between syncs
- func TestSecondsSinceSync(t *testing.T) {
- tests := []struct {
- name string
- lastSync int64
- clock *clock.FakeClock
- want int64
- }{
- {
- name: "Nano Second. No difference",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 1, 1, 1, 1, 2, time.UTC)),
- want: int64(0),
- },
- {
- name: "Second",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 1, 1, 1, 2, 1, time.UTC)),
- want: int64(1),
- },
- {
- name: "Minute",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 1, 1, 2, 1, 1, time.UTC)),
- want: int64(60),
- },
- {
- name: "Hour",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 1, 2, 1, 1, 1, time.UTC)),
- want: int64(3600),
- },
- {
- name: "Day",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 2, 1, 1, 1, 1, time.UTC)),
- want: int64(86400),
- },
- {
- name: "Month",
- lastSync: time.Date(2015, time.January, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.February, 1, 1, 1, 1, 1, time.UTC)),
- want: int64(2678400),
- },
- {
- name: "Future Month. Should be -Month",
- lastSync: time.Date(2015, time.February, 1, 1, 1, 1, 1, time.UTC).Unix(),
- clock: clock.NewFakeClock(time.Date(2015, time.January, 1, 1, 1, 1, 2, time.UTC)),
- want: int64(-2678400),
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- tunneler := &SSHTunneler{}
- assert := assert.New(t)
- tunneler.lastSync = tt.lastSync
- tunneler.clock = tt.clock
- assert.Equal(int64(tt.want), tunneler.SecondsSinceSync())
- })
- }
- }
- // generateTempFile creates a temporary file path
- func generateTempFilePath(prefix string) string {
- tmpPath, _ := filepath.Abs(fmt.Sprintf("%s/%s-%d", os.TempDir(), prefix, time.Now().Unix()))
- return tmpPath
- }
- // TestGenerateSSHKey verifies that SSH key generation does indeed
- // generate keys even with keys already exist.
- func TestGenerateSSHKey(t *testing.T) {
- assert := assert.New(t)
- privateKey := generateTempFilePath("private")
- publicKey := generateTempFilePath("public")
- // Make sure we have no test keys laying around
- os.Remove(privateKey)
- os.Remove(publicKey)
- // Pass case: Sunny day case
- err := generateSSHKey(privateKey, publicKey)
- assert.NoError(err, "generateSSHKey should not have retuend an error: %s", err)
- // Pass case: PrivateKey exists test case
- os.Remove(publicKey)
- err = generateSSHKey(privateKey, publicKey)
- assert.NoError(err, "generateSSHKey should not have retuend an error: %s", err)
- // Pass case: PublicKey exists test case
- os.Remove(privateKey)
- err = generateSSHKey(privateKey, publicKey)
- assert.NoError(err, "generateSSHKey should not have retuend an error: %s", err)
- // Make sure we have no test keys laying around
- os.Remove(privateKey)
- os.Remove(publicKey)
- // TODO: testing error cases where the file can not be removed?
- }
- type FakeTunneler struct {
- SecondsSinceSyncValue int64
- SecondsSinceSSHKeySyncValue int64
- }
- func (t *FakeTunneler) Run(AddressFunc) {}
- func (t *FakeTunneler) Stop() {}
- func (t *FakeTunneler) Dial(ctx context.Context, net, addr string) (net.Conn, error) { return nil, nil }
- func (t *FakeTunneler) SecondsSinceSync() int64 { return t.SecondsSinceSyncValue }
- func (t *FakeTunneler) SecondsSinceSSHKeySync() int64 { return t.SecondsSinceSSHKeySyncValue }
- // TestIsTunnelSyncHealthy verifies that the 600 second lag test
- // is honored.
- func TestIsTunnelSyncHealthy(t *testing.T) {
- tunneler := &FakeTunneler{}
- // Pass case: 540 second lag
- tunneler.SecondsSinceSyncValue = 540
- healthFn := TunnelSyncHealthChecker(tunneler)
- err := healthFn(nil)
- assert.NoError(t, err, "IsTunnelSyncHealthy() should not have returned an error.")
- // Fail case: 720 second lag
- tunneler.SecondsSinceSyncValue = 720
- err = healthFn(nil)
- assert.Error(t, err, "IsTunnelSyncHealthy() should have returned an error.")
- }
|