123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package versioned
- import (
- "reflect"
- "testing"
- rbacv1beta1 "k8s.io/api/rbac/v1beta1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- )
- func TestClusterRoleBindingGenerate(t *testing.T) {
- tests := []struct {
- name string
- params map[string]interface{}
- expected *rbacv1beta1.ClusterRoleBinding
- expectErr bool
- }{
- {
- name: "valid case 1",
- params: map[string]interface{}{
- "name": "foo",
- "clusterrole": "admin",
- "user": []string{"user"},
- "group": []string{"group"},
- "serviceaccount": []string{"ns1:name1"},
- },
- expected: &rbacv1beta1.ClusterRoleBinding{
- ObjectMeta: metav1.ObjectMeta{
- Name: "foo",
- },
- RoleRef: rbacv1beta1.RoleRef{
- APIGroup: rbacv1beta1.GroupName,
- Kind: "ClusterRole",
- Name: "admin",
- },
- Subjects: []rbacv1beta1.Subject{
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.UserKind,
- Name: "user",
- },
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.GroupKind,
- Name: "group",
- },
- {
- Kind: rbacv1beta1.ServiceAccountKind,
- APIGroup: "",
- Namespace: "ns1",
- Name: "name1",
- },
- },
- },
- expectErr: false,
- },
- {
- name: "valid case 2",
- params: map[string]interface{}{
- "name": "foo",
- "clusterrole": "admin",
- "user": []string{"user1", "user2"},
- "group": []string{"group1", "group2"},
- "serviceaccount": []string{"ns1:name1", "ns2:name2"},
- },
- expected: &rbacv1beta1.ClusterRoleBinding{
- ObjectMeta: metav1.ObjectMeta{
- Name: "foo",
- },
- RoleRef: rbacv1beta1.RoleRef{
- APIGroup: rbacv1beta1.GroupName,
- Kind: "ClusterRole",
- Name: "admin",
- },
- Subjects: []rbacv1beta1.Subject{
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.UserKind,
- Name: "user1",
- },
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.UserKind,
- Name: "user2",
- },
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.GroupKind,
- Name: "group1",
- },
- {
- APIGroup: rbacv1beta1.GroupName,
- Kind: rbacv1beta1.GroupKind,
- Name: "group2",
- },
- {
- Kind: rbacv1beta1.ServiceAccountKind,
- APIGroup: "",
- Namespace: "ns1",
- Name: "name1",
- },
- {
- Kind: rbacv1beta1.ServiceAccountKind,
- APIGroup: "",
- Namespace: "ns2",
- Name: "name2",
- },
- },
- },
- expectErr: false,
- },
- {
- name: "valid case 3",
- params: map[string]interface{}{
- "name": "foo",
- "clusterrole": "admin",
- },
- expected: &rbacv1beta1.ClusterRoleBinding{
- ObjectMeta: metav1.ObjectMeta{
- Name: "foo",
- },
- RoleRef: rbacv1beta1.RoleRef{
- APIGroup: rbacv1beta1.GroupName,
- Kind: "ClusterRole",
- Name: "admin",
- },
- },
- expectErr: false,
- },
- {
- name: "invalid serviceaccount, expected format: <namespace:name>",
- params: map[string]interface{}{
- "name": "role",
- "clusterrole": "admin",
- "user": []string{"user"},
- "group": []string{"group"},
- "serviceaccount": []string{"ns1-name1"},
- },
- expectErr: true,
- },
- {
- name: "name must be specified",
- params: map[string]interface{}{
- "name": "",
- "clusterrole": "admin",
- "user": []string{"user"},
- "group": []string{"group"},
- "serviceaccount": []string{"ns1:name1"},
- },
- expectErr: true,
- },
- {
- name: "clusterrole must be specified",
- params: map[string]interface{}{
- "name": "foo",
- "clusterrole": "",
- "user": []string{"user"},
- "group": []string{"group"},
- "serviceaccount": []string{"ns1:name1"},
- },
- expectErr: true,
- },
- {
- name: "expected user []string",
- params: map[string]interface{}{
- "name": "role",
- "clusterrole": "admin",
- "user": "user",
- "group": []string{"group"},
- "serviceaccount": []string{"ns1:name1"},
- },
- expectErr: true,
- },
- {
- name: "expected group []string",
- params: map[string]interface{}{
- "name": "role",
- "clusterrole": "admin",
- "user": []string{"user"},
- "group": "group",
- "serviceaccount": []string{"ns1:name1"},
- },
- expectErr: true,
- },
- {
- name: "expected serviceaccount []string",
- params: map[string]interface{}{
- "name": "role",
- "clusterrole": "admin",
- "user": []string{"user"},
- "group": []string{"group"},
- "serviceaccount": "ns1",
- },
- expectErr: true,
- },
- }
- generator := ClusterRoleBindingGeneratorV1{}
- for i, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- obj, err := generator.Generate(tt.params)
- if !tt.expectErr && err != nil {
- t.Errorf("[%d] unexpected error: %v", i, err)
- }
- if tt.expectErr && err != nil {
- return
- }
- if tt.expectErr && err == nil {
- t.Errorf("[%s] expect error, got nil", tt.name)
- }
- if !reflect.DeepEqual(obj.(*rbacv1beta1.ClusterRoleBinding), tt.expected) {
- t.Errorf("\n[%s] want:\n%#v\ngot:\n%#v", tt.name, tt.expected, obj.(*rbacv1beta1.ClusterRoleBinding))
- }
- })
- }
- }
|