mirror of
https://github.com/kubernetes/client-go.git
synced 2025-06-25 14:41:53 +00:00
honor overridden tokenfile, add InClusterConfig override tests
Kubernetes-commit: 7306fb7a89739a2fb48bfeb74595a5daa25060bd
This commit is contained in:
parent
19c6c11b98
commit
9ae57bd75e
@ -490,9 +490,9 @@ func (config *inClusterClientConfig) ClientConfig() (*restclient.Config, error)
|
|||||||
if server := config.overrides.ClusterInfo.Server; len(server) > 0 {
|
if server := config.overrides.ClusterInfo.Server; len(server) > 0 {
|
||||||
icc.Host = server
|
icc.Host = server
|
||||||
}
|
}
|
||||||
if token := config.overrides.AuthInfo.Token; len(token) > 0 {
|
if len(config.overrides.AuthInfo.Token) > 0 || len(config.overrides.AuthInfo.TokenFile) > 0 {
|
||||||
icc.BearerToken = token
|
icc.BearerToken = config.overrides.AuthInfo.Token
|
||||||
icc.BearerTokenFile = ""
|
icc.BearerTokenFile = config.overrides.AuthInfo.TokenFile
|
||||||
}
|
}
|
||||||
if certificateAuthorityFile := config.overrides.ClusterInfo.CertificateAuthority; len(certificateAuthorityFile) > 0 {
|
if certificateAuthorityFile := config.overrides.ClusterInfo.CertificateAuthority; len(certificateAuthorityFile) > 0 {
|
||||||
icc.TLSClientConfig.CAFile = certificateAuthorityFile
|
icc.TLSClientConfig.CAFile = certificateAuthorityFile
|
||||||
|
@ -548,6 +548,30 @@ func TestInClusterClientConfigPrecedence(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
overrides: &ConfigOverrides{
|
||||||
|
ClusterInfo: clientcmdapi.Cluster{
|
||||||
|
Server: "https://host-from-overrides.com",
|
||||||
|
CertificateAuthority: "/path/to/ca-from-overrides.crt",
|
||||||
|
},
|
||||||
|
AuthInfo: clientcmdapi.AuthInfo{
|
||||||
|
Token: "token-from-override",
|
||||||
|
TokenFile: "tokenfile-from-override",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
overrides: &ConfigOverrides{
|
||||||
|
ClusterInfo: clientcmdapi.Cluster{
|
||||||
|
Server: "https://host-from-overrides.com",
|
||||||
|
CertificateAuthority: "/path/to/ca-from-overrides.crt",
|
||||||
|
},
|
||||||
|
AuthInfo: clientcmdapi.AuthInfo{
|
||||||
|
Token: "",
|
||||||
|
TokenFile: "tokenfile-from-override",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
{
|
{
|
||||||
overrides: &ConfigOverrides{},
|
overrides: &ConfigOverrides{},
|
||||||
},
|
},
|
||||||
@ -556,13 +580,15 @@ func TestInClusterClientConfigPrecedence(t *testing.T) {
|
|||||||
for _, tc := range tt {
|
for _, tc := range tt {
|
||||||
expectedServer := "https://host-from-cluster.com"
|
expectedServer := "https://host-from-cluster.com"
|
||||||
expectedToken := "token-from-cluster"
|
expectedToken := "token-from-cluster"
|
||||||
|
expectedTokenFile := "tokenfile-from-cluster"
|
||||||
expectedCAFile := "/path/to/ca-from-cluster.crt"
|
expectedCAFile := "/path/to/ca-from-cluster.crt"
|
||||||
|
|
||||||
icc := &inClusterClientConfig{
|
icc := &inClusterClientConfig{
|
||||||
inClusterConfigProvider: func() (*restclient.Config, error) {
|
inClusterConfigProvider: func() (*restclient.Config, error) {
|
||||||
return &restclient.Config{
|
return &restclient.Config{
|
||||||
Host: expectedServer,
|
Host: expectedServer,
|
||||||
BearerToken: expectedToken,
|
BearerToken: expectedToken,
|
||||||
|
BearerTokenFile: expectedTokenFile,
|
||||||
TLSClientConfig: restclient.TLSClientConfig{
|
TLSClientConfig: restclient.TLSClientConfig{
|
||||||
CAFile: expectedCAFile,
|
CAFile: expectedCAFile,
|
||||||
},
|
},
|
||||||
@ -579,8 +605,9 @@ func TestInClusterClientConfigPrecedence(t *testing.T) {
|
|||||||
if overridenServer := tc.overrides.ClusterInfo.Server; len(overridenServer) > 0 {
|
if overridenServer := tc.overrides.ClusterInfo.Server; len(overridenServer) > 0 {
|
||||||
expectedServer = overridenServer
|
expectedServer = overridenServer
|
||||||
}
|
}
|
||||||
if overridenToken := tc.overrides.AuthInfo.Token; len(overridenToken) > 0 {
|
if len(tc.overrides.AuthInfo.Token) > 0 || len(tc.overrides.AuthInfo.TokenFile) > 0 {
|
||||||
expectedToken = overridenToken
|
expectedToken = tc.overrides.AuthInfo.Token
|
||||||
|
expectedTokenFile = tc.overrides.AuthInfo.TokenFile
|
||||||
}
|
}
|
||||||
if overridenCAFile := tc.overrides.ClusterInfo.CertificateAuthority; len(overridenCAFile) > 0 {
|
if overridenCAFile := tc.overrides.ClusterInfo.CertificateAuthority; len(overridenCAFile) > 0 {
|
||||||
expectedCAFile = overridenCAFile
|
expectedCAFile = overridenCAFile
|
||||||
@ -592,6 +619,9 @@ func TestInClusterClientConfigPrecedence(t *testing.T) {
|
|||||||
if clientConfig.BearerToken != expectedToken {
|
if clientConfig.BearerToken != expectedToken {
|
||||||
t.Errorf("Expected token %v, got %v", expectedToken, clientConfig.BearerToken)
|
t.Errorf("Expected token %v, got %v", expectedToken, clientConfig.BearerToken)
|
||||||
}
|
}
|
||||||
|
if clientConfig.BearerTokenFile != expectedTokenFile {
|
||||||
|
t.Errorf("Expected tokenfile %v, got %v", expectedTokenFile, clientConfig.BearerTokenFile)
|
||||||
|
}
|
||||||
if clientConfig.TLSClientConfig.CAFile != expectedCAFile {
|
if clientConfig.TLSClientConfig.CAFile != expectedCAFile {
|
||||||
t.Errorf("Expected Certificate Authority %v, got %v", expectedCAFile, clientConfig.TLSClientConfig.CAFile)
|
t.Errorf("Expected Certificate Authority %v, got %v", expectedCAFile, clientConfig.TLSClientConfig.CAFile)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user