blob: 7b4961df31245ae95a11cdb403a0e2a9081ba960 [file] [log] [blame]
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package tokenreview
import (
"fmt"
"reflect"
"testing"
)
import (
authenticationv1 "k8s.io/api/authentication/v1"
)
// TestGetTokenReviewResult verifies that getTokenReviewResult returns expected {<namespace>, <serviceaccountname>}.
func TestGetTokenReviewResult(t *testing.T) {
testCases := []struct {
name string
tokenReview authenticationv1.TokenReview
expectedError error
expectedResult []string
}{
{
name: "the service account authentication error",
tokenReview: authenticationv1.TokenReview{
Status: authenticationv1.TokenReviewStatus{
Error: "authentication error",
},
},
expectedError: fmt.Errorf("the service account authentication returns an error: authentication error"),
expectedResult: nil,
},
{
name: "not authenticated",
tokenReview: authenticationv1.TokenReview{
Status: authenticationv1.TokenReviewStatus{
Authenticated: false,
},
},
expectedError: fmt.Errorf("the token is not authenticated"),
expectedResult: nil,
},
{
name: "token is not a service account",
tokenReview: authenticationv1.TokenReview{
Status: authenticationv1.TokenReviewStatus{
Authenticated: true,
User: authenticationv1.UserInfo{
Groups: []string{
"system:serviceaccounts:default",
},
},
},
},
expectedError: fmt.Errorf("the token is not a service account"),
expectedResult: nil,
},
{
name: "invalid username",
tokenReview: authenticationv1.TokenReview{
Status: authenticationv1.TokenReviewStatus{
Authenticated: true,
User: authenticationv1.UserInfo{
Username: "system:serviceaccount:example-pod-sa",
Groups: []string{
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated",
},
},
},
},
expectedError: fmt.Errorf("invalid username field in the token review result"),
expectedResult: nil,
},
{
name: "success",
tokenReview: authenticationv1.TokenReview{
Status: authenticationv1.TokenReviewStatus{
Authenticated: true,
User: authenticationv1.UserInfo{
Username: "system:serviceaccount:default:example-pod-sa",
UID: "ff578a9e-65d3-11e8-aad2-42010a8a001d",
Groups: []string{
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated",
},
},
},
},
expectedError: nil,
expectedResult: []string{"default", "example-pod-sa"},
},
}
for _, tc := range testCases {
result, err := getTokenReviewResult(&tc.tokenReview)
if !reflect.DeepEqual(result, tc.expectedResult) {
t.Errorf("TestGetTokenReviewResult failed: case: %q, actual result is %v, expected is %v", tc.name, result, tc.expectedResult)
}
if !errEqual(err, tc.expectedError) {
t.Errorf("TestGetTokenReviewResult failed: case: %q, actual error is %v, expected is %v", tc.name, err, tc.expectedError)
}
}
}
func errEqual(err error, target error) bool {
if target == nil {
return err == target
} else if err == nil {
return false
} else {
return err.Error() == target.Error()
}
}