Merge pull request #406 from docker/normalize-aci-tests

Normalize aci package tests
This commit is contained in:
Chris Crone 2020-08-06 18:59:50 +02:00 committed by GitHub
commit ace0c51d1d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
16 changed files with 322 additions and 393 deletions

View File

@ -3,7 +3,7 @@ package aci
import ( import (
"testing" "testing"
"github.com/stretchr/testify/assert" "gotest.tools/v3/assert"
) )
func TestGetLinesWritten(t *testing.T) { func TestGetLinesWritten(t *testing.T) {

View File

@ -367,7 +367,7 @@ func (cs *aciComposeService) Down(ctx context.Context, opts cli.ProjectOptions)
} }
type aciCloudService struct { type aciCloudService struct {
loginService login.AzureLoginService loginService *login.AzureLoginService
} }
func (cs *aciCloudService) Login(ctx context.Context, params interface{}) error { func (cs *aciCloudService) Login(ctx context.Context, params interface{}) error {

View File

@ -22,55 +22,39 @@ import (
"github.com/docker/api/containers" "github.com/docker/api/containers"
"github.com/stretchr/testify/suite" "gotest.tools/v3/assert"
. "github.com/onsi/gomega"
) )
type BackendSuiteTest struct { func TestGetContainerName(t *testing.T) {
suite.Suite
}
func (suite *BackendSuiteTest) TestGetContainerName() {
group, container := getGroupAndContainerName("docker1234") group, container := getGroupAndContainerName("docker1234")
Expect(group).To(Equal("docker1234")) assert.Equal(t, group, "docker1234")
Expect(container).To(Equal("docker1234")) assert.Equal(t, container, "docker1234")
group, container = getGroupAndContainerName("compose_service1") group, container = getGroupAndContainerName("compose_service1")
Expect(group).To(Equal("compose")) assert.Equal(t, group, "compose")
Expect(container).To(Equal("service1")) assert.Equal(t, container, "service1")
group, container = getGroupAndContainerName("compose_stack_service1") group, container = getGroupAndContainerName("compose_stack_service1")
Expect(group).To(Equal("compose_stack")) assert.Equal(t, group, "compose_stack")
Expect(container).To(Equal("service1")) assert.Equal(t, container, "service1")
} }
func (suite *BackendSuiteTest) TestErrorMessageDeletingContainerFromComposeApplication() { func TestErrorMessageDeletingContainerFromComposeApplication(t *testing.T) {
service := aciContainerService{} service := aciContainerService{}
err := service.Delete(context.TODO(), "compose-app_service1", false) err := service.Delete(context.TODO(), "compose-app_service1", false)
assert.Error(t, err, "cannot delete service \"service1\" from compose application \"compose-app\", you can delete the entire compose app with docker compose down --project-name compose-app")
Expect(err).NotTo(BeNil())
Expect(err.Error()).To(Equal("cannot delete service \"service1\" from compose application \"compose-app\", you can delete the entire compose app with docker compose down --project-name compose-app"))
} }
func (suite *BackendSuiteTest) TestErrorMessageRunSingleContainerNameWithComposeSeparator() { func TestErrorMessageRunSingleContainerNameWithComposeSeparator(t *testing.T) {
service := aciContainerService{} service := aciContainerService{}
err := service.Run(context.TODO(), containers.ContainerConfig{ID: "container_name"}) err := service.Run(context.TODO(), containers.ContainerConfig{ID: "container_name"})
assert.Error(t, err, "invalid container name. ACI container name cannot include \"_\"")
Expect(err).NotTo(BeNil())
Expect(err.Error()).To(Equal("invalid container name. ACI container name cannot include \"_\""))
} }
func (suite *BackendSuiteTest) TestVerifyCommand() { func TestVerifyCommand(t *testing.T) {
err := verifyExecCommand("command") // Command without an argument err := verifyExecCommand("command") // Command without an argument
Expect(err).To(BeNil()) assert.NilError(t, err)
err = verifyExecCommand("command argument") // Command with argument err = verifyExecCommand("command argument") // Command with argument
Expect(err).NotTo(BeNil()) assert.Error(t, err, "ACI exec command does not accept arguments to the command. "+
Expect(err.Error()).To(Equal("ACI exec command does not accept arguments to the command. " + "Only the binary should be specified")
"Only the binary should be specified"))
}
func TestBackendSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(BackendSuiteTest))
} }

View File

@ -25,132 +25,131 @@ import (
"github.com/Azure/go-autorest/autorest/to" "github.com/Azure/go-autorest/autorest/to"
"github.com/pkg/errors" "github.com/pkg/errors"
"github.com/stretchr/testify/mock" "github.com/stretchr/testify/mock"
"github.com/stretchr/testify/suite" "gotest.tools/v3/assert"
"gotest.tools/v3/assert/cmp"
"github.com/docker/api/context/store" "github.com/docker/api/context/store"
. "github.com/onsi/gomega"
) )
type ContextSuiteTest struct { type contextMocks struct {
suite.Suite userPrompt *mockUserPrompt
mockUserPrompt *mockUserPrompt resourceGroupHelper *MockResourceGroupHelper
mockResourceGroupHeper *MockResourceGroupHelper
contextCreateHelper contextCreateACIHelper contextCreateHelper contextCreateACIHelper
} }
func (suite *ContextSuiteTest) BeforeTest(suiteName, testName string) { func testContextMocks() contextMocks {
suite.mockUserPrompt = &mockUserPrompt{} mockUserPrompt := &mockUserPrompt{}
suite.mockResourceGroupHeper = &MockResourceGroupHelper{} mockResourceGroupHelper := &MockResourceGroupHelper{}
suite.contextCreateHelper = contextCreateACIHelper{ contextCreateHelper := contextCreateACIHelper{
suite.mockUserPrompt, mockUserPrompt,
suite.mockResourceGroupHeper, mockResourceGroupHelper,
} }
return contextMocks{mockUserPrompt, mockResourceGroupHelper, contextCreateHelper}
} }
func (suite *ContextSuiteTest) TestCreateSpecifiedSubscriptionAndGroup() { func TestCreateSpecifiedSubscriptionAndGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("1234", "myResourceGroup") opts := options("1234", "myResourceGroup")
suite.mockResourceGroupHeper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(group("myResourceGroup", "eastus"), nil) m := testContextMocks()
m.resourceGroupHelper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(group("myResourceGroup", "eastus"), nil)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.NilError(t, err)
Expect(err).To(BeNil()) assert.Equal(t, description, "myResourceGroup@eastus")
Expect(description).To(Equal("myResourceGroup@eastus")) assert.DeepEqual(t, data, aciContext("1234", "myResourceGroup", "eastus"))
Expect(data).To(Equal(aciContext("1234", "myResourceGroup", "eastus")))
} }
func (suite *ContextSuiteTest) TestErrorOnNonExistentResourceGroup() { func TestErrorOnNonExistentResourceGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("1234", "myResourceGroup") opts := options("1234", "myResourceGroup")
notFoundError := errors.New(`Not Found: "myResourceGroup"`) notFoundError := errors.New(`Not Found: "myResourceGroup"`)
suite.mockResourceGroupHeper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(resources.Group{}, notFoundError) m := testContextMocks()
m.resourceGroupHelper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(resources.Group{}, notFoundError)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.Assert(t, cmp.Nil(data))
Expect(data).To(BeNil()) assert.Equal(t, description, "")
Expect(description).To(Equal("")) assert.Error(t, err, "Could not find resource group \"myResourceGroup\": Not Found: \"myResourceGroup\"")
Expect(err.Error()).To(Equal("Could not find resource group \"myResourceGroup\": Not Found: \"myResourceGroup\""))
} }
func (suite *ContextSuiteTest) TestCreateNewResourceGroup() { func TestCreateNewResourceGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("1234", "") opts := options("1234", "")
suite.mockResourceGroupHeper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(group("myResourceGroup", "eastus"), nil) m := testContextMocks()
m.resourceGroupHelper.On("GetGroup", ctx, "1234", "myResourceGroup").Return(group("myResourceGroup", "eastus"), nil)
selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"} selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"}
suite.mockUserPrompt.On("Select", "Select a resource group", selectOptions).Return(0, nil) m.userPrompt.On("Select", "Select a resource group", selectOptions).Return(0, nil)
suite.mockResourceGroupHeper.On("CreateOrUpdate", ctx, "1234", mock.AnythingOfType("string"), mock.AnythingOfType("resources.Group")).Return(group("newResourceGroup", "eastus"), nil) m.resourceGroupHelper.On("CreateOrUpdate", ctx, "1234", mock.AnythingOfType("string"), mock.AnythingOfType("resources.Group")).Return(group("newResourceGroup", "eastus"), nil)
suite.mockResourceGroupHeper.On("ListGroups", ctx, "1234").Return([]resources.Group{ m.resourceGroupHelper.On("ListGroups", ctx, "1234").Return([]resources.Group{
group("group1", "eastus"), group("group1", "eastus"),
group("group2", "westeurope"), group("group2", "westeurope"),
}, nil) }, nil)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.NilError(t, err)
Expect(err).To(BeNil()) assert.Equal(t, description, "newResourceGroup@eastus")
Expect(description).To(Equal("newResourceGroup@eastus")) assert.DeepEqual(t, data, aciContext("1234", "newResourceGroup", "eastus"))
Expect(data).To(Equal(aciContext("1234", "newResourceGroup", "eastus")))
} }
func (suite *ContextSuiteTest) TestSelectExistingResourceGroup() { func TestSelectExistingResourceGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("1234", "") opts := options("1234", "")
selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"} selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"}
suite.mockUserPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil) m := testContextMocks()
suite.mockResourceGroupHeper.On("ListGroups", ctx, "1234").Return([]resources.Group{ m.userPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil)
m.resourceGroupHelper.On("ListGroups", ctx, "1234").Return([]resources.Group{
group("group1", "eastus"), group("group1", "eastus"),
group("group2", "westeurope"), group("group2", "westeurope"),
}, nil) }, nil)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.NilError(t, err)
Expect(err).To(BeNil()) assert.Equal(t, description, "group2@westeurope")
Expect(description).To(Equal("group2@westeurope")) assert.DeepEqual(t, data, aciContext("1234", "group2", "westeurope"))
Expect(data).To(Equal(aciContext("1234", "group2", "westeurope")))
} }
func (suite *ContextSuiteTest) TestSelectSingleSubscriptionIdAndExistingResourceGroup() { func TestSelectSingleSubscriptionIdAndExistingResourceGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("", "") opts := options("", "")
suite.mockResourceGroupHeper.On("GetSubscriptionIDs", ctx).Return([]subscription.Model{subModel("123456", "Subscription1")}, nil) m := testContextMocks()
m.resourceGroupHelper.On("GetSubscriptionIDs", ctx).Return([]subscription.Model{subModel("123456", "Subscription1")}, nil)
selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"} selectOptions := []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"}
suite.mockUserPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil) m.userPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil)
suite.mockResourceGroupHeper.On("ListGroups", ctx, "123456").Return([]resources.Group{ m.resourceGroupHelper.On("ListGroups", ctx, "123456").Return([]resources.Group{
group("group1", "eastus"), group("group1", "eastus"),
group("group2", "westeurope"), group("group2", "westeurope"),
}, nil) }, nil)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.NilError(t, err)
Expect(err).To(BeNil()) assert.Equal(t, description, "group2@westeurope")
Expect(description).To(Equal("group2@westeurope")) assert.DeepEqual(t, data, aciContext("123456", "group2", "westeurope"))
Expect(data).To(Equal(aciContext("123456", "group2", "westeurope")))
} }
func (suite *ContextSuiteTest) TestSelectSubscriptionIdAndExistingResourceGroup() { func TestSelectSubscriptionIdAndExistingResourceGroup(t *testing.T) {
ctx := context.TODO() ctx := context.TODO()
opts := options("", "") opts := options("", "")
sub1 := subModel("1234", "Subscription1") sub1 := subModel("1234", "Subscription1")
sub2 := subModel("5678", "Subscription2") sub2 := subModel("5678", "Subscription2")
suite.mockResourceGroupHeper.On("GetSubscriptionIDs", ctx).Return([]subscription.Model{sub1, sub2}, nil) m := testContextMocks()
m.resourceGroupHelper.On("GetSubscriptionIDs", ctx).Return([]subscription.Model{sub1, sub2}, nil)
selectOptions := []string{"Subscription1 (1234)", "Subscription2 (5678)"} selectOptions := []string{"Subscription1 (1234)", "Subscription2 (5678)"}
suite.mockUserPrompt.On("Select", "Select a subscription ID", selectOptions).Return(1, nil) m.userPrompt.On("Select", "Select a subscription ID", selectOptions).Return(1, nil)
selectOptions = []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"} selectOptions = []string{"create a new resource group", "group1 (eastus)", "group2 (westeurope)"}
suite.mockUserPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil) m.userPrompt.On("Select", "Select a resource group", selectOptions).Return(2, nil)
suite.mockResourceGroupHeper.On("ListGroups", ctx, "5678").Return([]resources.Group{ m.resourceGroupHelper.On("ListGroups", ctx, "5678").Return([]resources.Group{
group("group1", "eastus"), group("group1", "eastus"),
group("group2", "westeurope"), group("group2", "westeurope"),
}, nil) }, nil)
data, description, err := suite.contextCreateHelper.createContextData(ctx, opts) data, description, err := m.contextCreateHelper.createContextData(ctx, opts)
assert.NilError(t, err)
Expect(err).To(BeNil()) assert.Equal(t, description, "group2@westeurope")
Expect(description).To(Equal("group2@westeurope")) assert.DeepEqual(t, data, aciContext("5678", "group2", "westeurope"))
Expect(data).To(Equal(aciContext("5678", "group2", "westeurope")))
} }
func subModel(subID string, display string) subscription.Model { func subModel(subID string, display string) subscription.Model {
@ -183,11 +182,6 @@ func options(subscriptionID string, resourceGroupName string) ContextParams {
} }
} }
func TestContextSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(ContextSuiteTest))
}
type mockUserPrompt struct { type mockUserPrompt struct {
mock.Mock mock.Mock
} }

View File

@ -21,46 +21,35 @@ import (
"github.com/Azure/go-autorest/autorest/to" "github.com/Azure/go-autorest/autorest/to"
"github.com/compose-spec/compose-go/types" "github.com/compose-spec/compose-go/types"
"gotest.tools/v3/assert"
"github.com/docker/api/containers" "github.com/docker/api/containers"
. "github.com/onsi/gomega"
"github.com/stretchr/testify/suite"
) )
type ContainerConvertTestSuite struct { func TestConvertContainerEnvironment(t *testing.T) {
suite.Suite
}
func (suite *ContainerConvertTestSuite) TestConvertContainerEnvironment() {
container := containers.ContainerConfig{ container := containers.ContainerConfig{
ID: "container1", ID: "container1",
Environment: []string{"key1=value1", "key2", "key3=value3"}, Environment: []string{"key1=value1", "key2", "key3=value3"},
} }
project, err := ContainerToComposeProject(container) project, err := ContainerToComposeProject(container)
Expect(err).To(BeNil()) assert.NilError(t, err)
service1 := project.Services[0] service1 := project.Services[0]
Expect(service1.Name).To(Equal(container.ID)) assert.Equal(t, service1.Name, container.ID)
Expect(service1.Environment).To(Equal(types.MappingWithEquals{ assert.DeepEqual(t, service1.Environment, types.MappingWithEquals{
"key1": to.StringPtr("value1"), "key1": to.StringPtr("value1"),
"key2": nil, "key2": nil,
"key3": to.StringPtr("value3"), "key3": to.StringPtr("value3"),
})) })
} }
func (suite *ContainerConvertTestSuite) TestConvertRestartPolicy() { func TestConvertRestartPolicy(t *testing.T) {
container := containers.ContainerConfig{ container := containers.ContainerConfig{
ID: "container1", ID: "container1",
RestartPolicyCondition: "none", RestartPolicyCondition: "none",
} }
project, err := ContainerToComposeProject(container) project, err := ContainerToComposeProject(container)
Expect(err).To(BeNil()) assert.NilError(t, err)
service1 := project.Services[0] service1 := project.Services[0]
Expect(service1.Name).To(Equal(container.ID)) assert.Equal(t, service1.Name, container.ID)
Expect(service1.Deploy.RestartPolicy.Condition).To(Equal("none")) assert.Equal(t, service1.Deploy.RestartPolicy.Condition, "none")
}
func TestContainerConvertTestSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(ContainerConvertTestSuite))
} }

View File

@ -23,38 +23,29 @@ import (
"github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance" "github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance"
"github.com/Azure/go-autorest/autorest/to" "github.com/Azure/go-autorest/autorest/to"
"github.com/compose-spec/compose-go/types" "github.com/compose-spec/compose-go/types"
"gotest.tools/v3/assert"
is "gotest.tools/v3/assert/cmp"
"github.com/docker/api/containers" "github.com/docker/api/containers"
"github.com/docker/api/context/store" "github.com/docker/api/context/store"
. "github.com/onsi/gomega"
"github.com/stretchr/testify/require"
"github.com/stretchr/testify/suite"
) )
type ConvertTestSuite struct { var convertCtx = store.AciContext{
suite.Suite
ctx store.AciContext
}
func (suite *ConvertTestSuite) BeforeTest(suiteName, testName string) {
suite.ctx = store.AciContext{
SubscriptionID: "subID", SubscriptionID: "subID",
ResourceGroup: "rg", ResourceGroup: "rg",
Location: "eu", Location: "eu",
} }
}
func (suite *ConvertTestSuite) TestProjectName() { func TestProjectName(t *testing.T) {
project := types.Project{ project := types.Project{
Name: "TEST", Name: "TEST",
} }
containerGroup, err := ToContainerGroup(suite.ctx, project) containerGroup, err := ToContainerGroup(convertCtx, project)
require.NoError(suite.T(), err) assert.NilError(t, err)
require.Equal(suite.T(), *containerGroup.Name, "test") assert.Equal(t, *containerGroup.Name, "test")
} }
func (suite *ConvertTestSuite) TestContainerGroupToContainer() { func TestContainerGroupToContainer(t *testing.T) {
myContainerGroup := containerinstance.ContainerGroup{ myContainerGroup := containerinstance.ContainerGroup{
ContainerGroupProperties: &containerinstance.ContainerGroupProperties{ ContainerGroupProperties: &containerinstance.ContainerGroupProperties{
IPAddress: &containerinstance.IPAddress{ IPAddress: &containerinstance.IPAddress{
@ -108,11 +99,11 @@ func (suite *ConvertTestSuite) TestContainerGroupToContainer() {
} }
container, err := ContainerGroupToContainer("myContainerID", myContainerGroup, myContainer) container, err := ContainerGroupToContainer("myContainerID", myContainerGroup, myContainer)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(container).To(Equal(expectedContainer)) assert.DeepEqual(t, container, expectedContainer)
} }
func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerWithDnsSideCarSide() { func TestComposeContainerGroupToContainerWithDnsSideCarSide(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -126,22 +117,22 @@ func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerWithDnsSideCa
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(len(*group.Containers)).To(Equal(3)) assert.Assert(t, is.Len(*group.Containers, 3))
Expect(*(*group.Containers)[0].Name).To(Equal("service1")) assert.Equal(t, *(*group.Containers)[0].Name, "service1")
Expect(*(*group.Containers)[1].Name).To(Equal("service2")) assert.Equal(t, *(*group.Containers)[1].Name, "service2")
Expect(*(*group.Containers)[2].Name).To(Equal(ComposeDNSSidecarName)) assert.Equal(t, *(*group.Containers)[2].Name, ComposeDNSSidecarName)
Expect(*(*group.Containers)[2].Command).To(Equal([]string{"sh", "-c", "echo 127.0.0.1 service1 >> /etc/hosts;echo 127.0.0.1 service2 >> /etc/hosts;sleep infinity"})) assert.DeepEqual(t, *(*group.Containers)[2].Command, []string{"sh", "-c", "echo 127.0.0.1 service1 >> /etc/hosts;echo 127.0.0.1 service2 >> /etc/hosts;sleep infinity"})
Expect(*(*group.Containers)[0].Image).To(Equal("image1")) assert.Equal(t, *(*group.Containers)[0].Image, "image1")
Expect(*(*group.Containers)[1].Image).To(Equal("image2")) assert.Equal(t, *(*group.Containers)[1].Image, "image2")
Expect(*(*group.Containers)[2].Image).To(Equal(dnsSidecarImage)) assert.Equal(t, *(*group.Containers)[2].Image, dnsSidecarImage)
} }
func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerNoDnsSideCarSide() { func TestComposeSingleContainerGroupToContainerNoDnsSideCarSide(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -151,15 +142,15 @@ func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerNoDnsSi
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(len(*group.Containers)).To(Equal(1)) assert.Assert(t, is.Len(*group.Containers, 1))
Expect(*(*group.Containers)[0].Name).To(Equal("service1")) assert.Equal(t, *(*group.Containers)[0].Name, "service1")
Expect(*(*group.Containers)[0].Image).To(Equal("image1")) assert.Equal(t, *(*group.Containers)[0].Image, "image1")
} }
func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerSpecificRestartPolicy() { func TestComposeSingleContainerGroupToContainerSpecificRestartPolicy(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -174,15 +165,15 @@ func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerSpecifi
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(len(*group.Containers)).To(Equal(1)) assert.Assert(t, is.Len(*group.Containers, 1))
Expect(*(*group.Containers)[0].Name).To(Equal("service1")) assert.Equal(t, *(*group.Containers)[0].Name, "service1")
Expect(group.RestartPolicy).To(Equal(containerinstance.OnFailure)) assert.Equal(t, group.RestartPolicy, containerinstance.OnFailure)
} }
func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerDefaultRestartPolicy() { func TestComposeSingleContainerGroupToContainerDefaultRestartPolicy(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -192,15 +183,15 @@ func (suite *ConvertTestSuite) TestComposeSingleContainerGroupToContainerDefault
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(len(*group.Containers)).To(Equal(1)) assert.Assert(t, is.Len(*group.Containers, 1))
Expect(*(*group.Containers)[0].Name).To(Equal("service1")) assert.Equal(t, *(*group.Containers)[0].Name, "service1")
Expect(group.RestartPolicy).To(Equal(containerinstance.Always)) assert.Equal(t, group.RestartPolicy, containerinstance.Always)
} }
func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerMultiplePorts() { func TestComposeContainerGroupToContainerMultiplePorts(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -226,29 +217,27 @@ func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerMultiplePorts
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(len(*group.Containers)).To(Equal(3)) assert.Assert(t, is.Len(*group.Containers, 3))
container1 := (*group.Containers)[0] container1 := (*group.Containers)[0]
container2 := (*group.Containers)[1] assert.Equal(t, *container1.Name, "service1")
Expect(*container1.Name).To(Equal("service1")) assert.Equal(t, *container1.Image, "image1")
Expect(*container1.Image).To(Equal("image1")) assert.Equal(t, *(*container1.Ports)[0].Port, int32(80))
portsC1 := *container1.Ports
Expect(*portsC1[0].Port).To(Equal(int32(80)))
Expect(*container2.Name).To(Equal("service2")) container2 := (*group.Containers)[1]
Expect(*container2.Image).To(Equal("image2")) assert.Equal(t, *container2.Name, "service2")
portsC2 := *container2.Ports assert.Equal(t, *container2.Image, "image2")
Expect(*portsC2[0].Port).To(Equal(int32(8080))) assert.Equal(t, *(*container2.Ports)[0].Port, int32(8080))
groupPorts := *group.IPAddress.Ports groupPorts := *group.IPAddress.Ports
Expect(len(groupPorts)).To(Equal(2)) assert.Assert(t, is.Len(groupPorts, 2))
Expect(*groupPorts[0].Port).To(Equal(int32(80))) assert.Equal(t, *groupPorts[0].Port, int32(80))
Expect(*groupPorts[1].Port).To(Equal(int32(8080))) assert.Equal(t, *groupPorts[1].Port, int32(8080))
} }
func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerResourceLimits() { func TestComposeContainerGroupToContainerResourceLimits(t *testing.T) {
_0_1Gb := 0.1 * 1024 * 1024 * 1024 _0_1Gb := 0.1 * 1024 * 1024 * 1024
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
@ -267,16 +256,15 @@ func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerResourceLimit
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
container1 := (*group.Containers)[0] limits := *((*group.Containers)[0]).Resources.Limits
limits := *container1.Resources.Limits assert.Equal(t, *limits.CPU, float64(0.1))
Expect(*limits.CPU).To(Equal(float64(0.1))) assert.Equal(t, *limits.MemoryInGB, float64(0.1))
Expect(*limits.MemoryInGB).To(Equal(float64(0.1)))
} }
func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerResourceLimitsDefaults() { func TestComposeContainerGroupToContainerResourceLimitsDefaults(t *testing.T) {
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -294,18 +282,17 @@ func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerResourceLimit
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
container1 := (*group.Containers)[0] limits := *((*group.Containers)[0]).Resources.Limits
limits := *container1.Resources.Limits assert.Equal(t, *limits.CPU, float64(1))
Expect(*limits.CPU).To(Equal(float64(1))) assert.Equal(t, *limits.MemoryInGB, float64(1))
Expect(*limits.MemoryInGB).To(Equal(float64(1)))
} }
func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerenvVar() { func TestComposeContainerGroupToContainerenvVar(t *testing.T) {
err := os.Setenv("key2", "value2") err := os.Setenv("key2", "value2")
Expect(err).To(BeNil()) assert.NilError(t, err)
project := types.Project{ project := types.Project{
Services: []types.ServiceConfig{ Services: []types.ServiceConfig{
{ {
@ -319,31 +306,25 @@ func (suite *ConvertTestSuite) TestComposeContainerGroupToContainerenvVar() {
}, },
} }
group, err := ToContainerGroup(suite.ctx, project) group, err := ToContainerGroup(convertCtx, project)
Expect(err).To(BeNil()) assert.NilError(t, err)
container1 := (*group.Containers)[0] envVars := *((*group.Containers)[0]).EnvironmentVariables
envVars := *container1.EnvironmentVariables assert.Assert(t, is.Len(envVars, 2))
Expect(len(envVars)).To(Equal(2)) assert.Assert(t, is.Contains(envVars, containerinstance.EnvironmentVariable{Name: to.StringPtr("key1"), Value: to.StringPtr("value1")}))
Expect(envVars).To(ContainElement(containerinstance.EnvironmentVariable{Name: to.StringPtr("key1"), Value: to.StringPtr("value1")})) assert.Assert(t, is.Contains(envVars, containerinstance.EnvironmentVariable{Name: to.StringPtr("key2"), Value: to.StringPtr("value2")}))
Expect(envVars).To(ContainElement(containerinstance.EnvironmentVariable{Name: to.StringPtr("key2"), Value: to.StringPtr("value2")}))
} }
func (suite *ConvertTestSuite) TestConvertToAciRestartPolicyCondition() { func TestConvertToAciRestartPolicyCondition(t *testing.T) {
Expect(toAciRestartPolicy("none")).To(Equal(containerinstance.Never)) assert.Equal(t, toAciRestartPolicy("none"), containerinstance.Never)
Expect(toAciRestartPolicy("always")).To(Equal(containerinstance.Always)) assert.Equal(t, toAciRestartPolicy("always"), containerinstance.Always)
Expect(toAciRestartPolicy("on-failure")).To(Equal(containerinstance.OnFailure)) assert.Equal(t, toAciRestartPolicy("on-failure"), containerinstance.OnFailure)
Expect(toAciRestartPolicy("on-failure:5")).To(Equal(containerinstance.Always)) assert.Equal(t, toAciRestartPolicy("on-failure:5"), containerinstance.Always)
} }
func (suite *ConvertTestSuite) TestConvertToDockerRestartPolicyCondition() { func TestConvertToDockerRestartPolicyCondition(t *testing.T) {
Expect(toContainerRestartPolicy(containerinstance.Never)).To(Equal("none")) assert.Equal(t, toContainerRestartPolicy(containerinstance.Never), "none")
Expect(toContainerRestartPolicy(containerinstance.Always)).To(Equal("any")) assert.Equal(t, toContainerRestartPolicy(containerinstance.Always), "any")
Expect(toContainerRestartPolicy(containerinstance.OnFailure)).To(Equal("on-failure")) assert.Equal(t, toContainerRestartPolicy(containerinstance.OnFailure), "on-failure")
Expect(toContainerRestartPolicy("")).To(Equal("any")) assert.Equal(t, toContainerRestartPolicy(""), "any")
}
func TestConvertTestSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(ConvertTestSuite))
} }

View File

@ -21,7 +21,7 @@ import (
"github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance" "github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance"
"github.com/Azure/go-autorest/autorest/to" "github.com/Azure/go-autorest/autorest/to"
"github.com/stretchr/testify/assert" "gotest.tools/v3/assert"
"github.com/docker/api/containers" "github.com/docker/api/containers"
) )
@ -119,7 +119,7 @@ func TestPortConvert(t *testing.T) {
for _, testCase := range testCases { for _, testCase := range testCases {
t.Run(testCase.name, func(t *testing.T) { t.Run(testCase.name, func(t *testing.T) {
ports := ToPorts(testCase.ip, testCase.ports) ports := ToPorts(testCase.ip, testCase.ports)
assert.Equal(t, testCase.expected, ports) assert.DeepEqual(t, testCase.expected, ports)
}) })
} }
} }

View File

@ -26,7 +26,7 @@ import (
cliconfigtypes "github.com/docker/cli/cli/config/types" cliconfigtypes "github.com/docker/cli/cli/config/types"
"github.com/stretchr/testify/mock" "github.com/stretchr/testify/mock"
"gotest.tools/v3/assert" "gotest.tools/v3/assert"
"gotest.tools/v3/assert/cmp" is "gotest.tools/v3/assert/cmp"
) )
const getAllCredentials = "getAllRegistryCredentials" const getAllCredentials = "getAllRegistryCredentials"
@ -144,7 +144,6 @@ func TestNoMoreRegistriesThanImages(t *testing.T) {
Password: to.StringPtr("pwd"), Password: to.StringPtr("pwd"),
}, },
}) })
} }
func TestHubAndSeveralACRRegistries(t *testing.T) { func TestHubAndSeveralACRRegistries(t *testing.T) {
@ -161,19 +160,17 @@ func TestHubAndSeveralACRRegistries(t *testing.T) {
creds, err := getRegistryCredentials(composeServices("mycontainerregistry1.azurecr.io/privateimg", "someuser/privateImg2", "mycontainerregistry2.azurecr.io/privateimg"), loader) creds, err := getRegistryCredentials(composeServices("mycontainerregistry1.azurecr.io/privateimg", "someuser/privateImg2", "mycontainerregistry2.azurecr.io/privateimg"), loader)
assert.NilError(t, err) assert.NilError(t, err)
assert.Assert(t, cmp.Contains(creds, containerinstance.ImageRegistryCredential{ assert.Assert(t, is.Contains(creds, containerinstance.ImageRegistryCredential{
Server: to.StringPtr("mycontainerregistry1.azurecr.io"), Server: to.StringPtr("mycontainerregistry1.azurecr.io"),
Username: to.StringPtr(tokenUsername), Username: to.StringPtr(tokenUsername),
Password: to.StringPtr("123456"), Password: to.StringPtr("123456"),
})) }))
assert.Assert(t, is.Contains(creds, containerinstance.ImageRegistryCredential{
assert.Assert(t, cmp.Contains(creds, containerinstance.ImageRegistryCredential{
Server: to.StringPtr("mycontainerregistry2.azurecr.io"), Server: to.StringPtr("mycontainerregistry2.azurecr.io"),
Username: to.StringPtr(tokenUsername), Username: to.StringPtr(tokenUsername),
Password: to.StringPtr("456789"), Password: to.StringPtr("456789"),
})) }))
assert.Assert(t, is.Contains(creds, containerinstance.ImageRegistryCredential{
assert.Assert(t, cmp.Contains(creds, containerinstance.ImageRegistryCredential{
Server: to.StringPtr(dockerHub), Server: to.StringPtr(dockerHub),
Username: to.StringPtr("toto"), Username: to.StringPtr("toto"),
Password: to.StringPtr("pwd"), Password: to.StringPtr("pwd"),

View File

@ -20,7 +20,7 @@ import (
"testing" "testing"
"github.com/compose-spec/compose-go/types" "github.com/compose-spec/compose-go/types"
"gotest.tools/assert" "gotest.tools/v3/assert"
"github.com/docker/api/errdefs" "github.com/docker/api/errdefs"
) )
@ -96,28 +96,28 @@ func TestGetRunVolumes(t *testing.T) {
func TestGetRunVolumesMissingFileShare(t *testing.T) { func TestGetRunVolumesMissingFileShare(t *testing.T) {
_, _, err := GetRunVolumes([]string{"myuser:mykey@"}) _, _, err := GetRunVolumes([]string{"myuser:mykey@"})
assert.Equal(t, true, errdefs.IsErrParsingFailed(err)) assert.Assert(t, errdefs.IsErrParsingFailed(err))
assert.ErrorContains(t, err, "does not include a storage file share") assert.ErrorContains(t, err, "does not include a storage file share")
} }
func TestGetRunVolumesMissingUser(t *testing.T) { func TestGetRunVolumesMissingUser(t *testing.T) {
_, _, err := GetRunVolumes([]string{":mykey@myshare"}) _, _, err := GetRunVolumes([]string{":mykey@myshare"})
assert.Equal(t, true, errdefs.IsErrParsingFailed(err)) assert.Assert(t, errdefs.IsErrParsingFailed(err))
assert.ErrorContains(t, err, "does not include a storage username") assert.ErrorContains(t, err, "does not include a storage username")
} }
func TestGetRunVolumesMissingKey(t *testing.T) { func TestGetRunVolumesMissingKey(t *testing.T) {
_, _, err := GetRunVolumes([]string{"userwithnokey:@myshare"}) _, _, err := GetRunVolumes([]string{"userwithnokey:@myshare"})
assert.Equal(t, true, errdefs.IsErrParsingFailed(err)) assert.Assert(t, errdefs.IsErrParsingFailed(err))
assert.ErrorContains(t, err, "does not include a storage key") assert.ErrorContains(t, err, "does not include a storage key")
_, _, err = GetRunVolumes([]string{"userwithnokeytoo@myshare"}) _, _, err = GetRunVolumes([]string{"userwithnokeytoo@myshare"})
assert.Equal(t, true, errdefs.IsErrParsingFailed(err)) assert.Assert(t, errdefs.IsErrParsingFailed(err))
assert.ErrorContains(t, err, "does not include a storage key") assert.ErrorContains(t, err, "does not include a storage key")
} }
func TestGetRunVolumesNoShare(t *testing.T) { func TestGetRunVolumesNoShare(t *testing.T) {
_, _, err := GetRunVolumes([]string{"noshare"}) _, _, err := GetRunVolumes([]string{"noshare"})
assert.Equal(t, true, errdefs.IsErrParsingFailed(err)) assert.Assert(t, errdefs.IsErrParsingFailed(err))
assert.ErrorContains(t, err, "no share specified") assert.ErrorContains(t, err, "no share specified")
} }

View File

@ -75,16 +75,16 @@ type AzureLoginService struct {
const tokenStoreFilename = "dockerAccessToken.json" const tokenStoreFilename = "dockerAccessToken.json"
// NewAzureLoginService creates a NewAzureLoginService // NewAzureLoginService creates a NewAzureLoginService
func NewAzureLoginService() (AzureLoginService, error) { func NewAzureLoginService() (*AzureLoginService, error) {
return newAzureLoginServiceFromPath(GetTokenStorePath(), azureAPIHelper{}) return newAzureLoginServiceFromPath(GetTokenStorePath(), azureAPIHelper{})
} }
func newAzureLoginServiceFromPath(tokenStorePath string, helper apiHelper) (AzureLoginService, error) { func newAzureLoginServiceFromPath(tokenStorePath string, helper apiHelper) (*AzureLoginService, error) {
store, err := newTokenStore(tokenStorePath) store, err := newTokenStore(tokenStorePath)
if err != nil { if err != nil {
return AzureLoginService{}, err return nil, err
} }
return AzureLoginService{ return &AzureLoginService{
tokenStore: store, tokenStore: store,
apiHelper: helper, apiHelper: helper,
}, nil }, nil
@ -92,7 +92,7 @@ func newAzureLoginServiceFromPath(tokenStorePath string, helper apiHelper) (Azur
// TestLoginFromServicePrincipal login with clientId / clientSecret from a previously created service principal. // TestLoginFromServicePrincipal login with clientId / clientSecret from a previously created service principal.
// The resulting token does not include a refresh token, used for tests only // The resulting token does not include a refresh token, used for tests only
func (login AzureLoginService) TestLoginFromServicePrincipal(clientID string, clientSecret string, tenantID string) error { func (login *AzureLoginService) TestLoginFromServicePrincipal(clientID string, clientSecret string, tenantID string) error {
// Tried with auth2.NewUsernamePasswordConfig() but could not make this work with username / password, setting this for CI with clientID / clientSecret // Tried with auth2.NewUsernamePasswordConfig() but could not make this work with username / password, setting this for CI with clientID / clientSecret
creds := auth2.NewClientCredentialsConfig(clientID, clientSecret, tenantID) creds := auth2.NewClientCredentialsConfig(clientID, clientSecret, tenantID)
@ -117,7 +117,7 @@ func (login AzureLoginService) TestLoginFromServicePrincipal(clientID string, cl
} }
// Logout remove azure token data // Logout remove azure token data
func (login AzureLoginService) Logout(ctx context.Context) error { func (login *AzureLoginService) Logout(ctx context.Context) error {
err := login.tokenStore.removeData() err := login.tokenStore.removeData()
if os.IsNotExist(err) { if os.IsNotExist(err) {
return errors.New("No Azure login data to be removed") return errors.New("No Azure login data to be removed")
@ -126,7 +126,7 @@ func (login AzureLoginService) Logout(ctx context.Context) error {
} }
// Login performs an Azure login through a web browser // Login performs an Azure login through a web browser
func (login AzureLoginService) Login(ctx context.Context, requestedTenantID string) error { func (login *AzureLoginService) Login(ctx context.Context, requestedTenantID string) error {
queryCh := make(chan localResponse, 1) queryCh := make(chan localResponse, 1)
s, err := NewLocalServer(queryCh) s, err := NewLocalServer(queryCh)
if err != nil { if err != nil {
@ -267,7 +267,7 @@ func newAuthorizerFromLoginStorePath(storeTokenPath string) (autorest.Authorizer
} }
// GetValidToken returns an access token. Refresh token if needed // GetValidToken returns an access token. Refresh token if needed
func (login AzureLoginService) GetValidToken() (oauth2.Token, error) { func (login *AzureLoginService) GetValidToken() (oauth2.Token, error) {
loginInfo, err := login.tokenStore.readToken() loginInfo, err := login.tokenStore.readToken()
if err != nil { if err != nil {
return oauth2.Token{}, err return oauth2.Token{}, err
@ -288,7 +288,7 @@ func (login AzureLoginService) GetValidToken() (oauth2.Token, error) {
return token, nil return token, nil
} }
func (login AzureLoginService) refreshToken(currentRefreshToken string, tenantID string) (oauth2.Token, error) { func (login *AzureLoginService) refreshToken(currentRefreshToken string, tenantID string) (oauth2.Token, error) {
data := url.Values{ data := url.Values{
"grant_type": []string{"refresh_token"}, "grant_type": []string{"refresh_token"},
"client_id": []string{clientID}, "client_id": []string{clientID},

View File

@ -28,48 +28,35 @@ import (
"time" "time"
"github.com/stretchr/testify/mock" "github.com/stretchr/testify/mock"
"github.com/stretchr/testify/suite" "gotest.tools/v3/assert"
"golang.org/x/oauth2" "golang.org/x/oauth2"
. "github.com/onsi/gomega"
) )
type LoginSuite struct { func testLoginService(t *testing.T, m *MockAzureHelper) (*AzureLoginService, error) {
suite.Suite
dir string
mockHelper *MockAzureHelper
azureLogin AzureLoginService
}
func (suite *LoginSuite) BeforeTest(suiteName, testName string) {
dir, err := ioutil.TempDir("", "test_store") dir, err := ioutil.TempDir("", "test_store")
Expect(err).To(BeNil()) if err != nil {
return nil, err
suite.dir = dir }
suite.mockHelper = &MockAzureHelper{} t.Cleanup(func() {
suite.azureLogin, err = newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), suite.mockHelper) _ = os.RemoveAll(dir)
Expect(err).To(BeNil()) })
return newAzureLoginServiceFromPath(filepath.Join(dir, tokenStoreFilename), m)
} }
func (suite *LoginSuite) AfterTest(suiteName, testName string) { func TestRefreshInValidToken(t *testing.T) {
err := os.RemoveAll(suite.dir)
Expect(err).To(BeNil())
}
func (suite *LoginSuite) TestRefreshInValidToken() {
data := refreshTokenData("refreshToken") data := refreshTokenData("refreshToken")
suite.mockHelper.On("queryToken", data, "123456").Return(azureToken{ m := &MockAzureHelper{}
m.On("queryToken", data, "123456").Return(azureToken{
RefreshToken: "newRefreshToken", RefreshToken: "newRefreshToken",
AccessToken: "newAccessToken", AccessToken: "newAccessToken",
ExpiresIn: 3600, ExpiresIn: 3600,
Foci: "1", Foci: "1",
}, nil) }, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
suite.azureLogin = azureLogin err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
err = suite.azureLogin.tokenStore.writeLoginInfo(TokenInfo{
TenantID: "123456", TenantID: "123456",
Token: oauth2.Token{ Token: oauth2.Token{
AccessToken: "accessToken", AccessToken: "accessToken",
@ -78,27 +65,34 @@ func (suite *LoginSuite) TestRefreshInValidToken() {
TokenType: "Bearer", TokenType: "Bearer",
}, },
}) })
Expect(err).To(BeNil()) assert.NilError(t, err)
token, _ := suite.azureLogin.GetValidToken() token, _ := azureLogin.GetValidToken()
Expect(token.AccessToken).To(Equal("newAccessToken")) assert.Equal(t, token.AccessToken, "newAccessToken")
Expect(token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second))) assert.Assert(t, time.Now().Add(3500*time.Second).Before(token.Expiry))
storedToken, _ := suite.azureLogin.tokenStore.readToken() storedToken, _ := azureLogin.tokenStore.readToken()
Expect(storedToken.Token.AccessToken).To(Equal("newAccessToken")) assert.Equal(t, storedToken.Token.AccessToken, "newAccessToken")
Expect(storedToken.Token.RefreshToken).To(Equal("newRefreshToken")) assert.Equal(t, storedToken.Token.RefreshToken, "newRefreshToken")
Expect(storedToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second))) assert.Assert(t, time.Now().Add(3500*time.Second).Before(storedToken.Token.Expiry))
} }
func (suite *LoginSuite) TestClearErrorMessageIfNotAlreadyLoggedIn() { func TestClearErrorMessageIfNotAlreadyLoggedIn(t *testing.T) {
_, err := newAuthorizerFromLoginStorePath(filepath.Join(suite.dir, tokenStoreFilename)) dir, err := ioutil.TempDir("", "test_store")
Expect(err.Error()).To(ContainSubstring("not logged in to azure, you need to run \"docker login azure\" first")) assert.NilError(t, err)
t.Cleanup(func() {
_ = os.RemoveAll(dir)
})
_, err = newAuthorizerFromLoginStorePath(filepath.Join(dir, tokenStoreFilename))
assert.ErrorContains(t, err, "not logged in to azure, you need to run \"docker login azure\" first")
} }
func (suite *LoginSuite) TestDoesNotRefreshValidToken() { func TestDoesNotRefreshValidToken(t *testing.T) {
expiryDate := time.Now().Add(1 * time.Hour) expiryDate := time.Now().Add(1 * time.Hour)
err := suite.azureLogin.tokenStore.writeLoginInfo(TokenInfo{ azureLogin, err := testLoginService(t, nil)
assert.NilError(t, err)
err = azureLogin.tokenStore.writeLoginInfo(TokenInfo{
TenantID: "123456", TenantID: "123456",
Token: oauth2.Token{ Token: oauth2.Token{
AccessToken: "accessToken", AccessToken: "accessToken",
@ -107,37 +101,37 @@ func (suite *LoginSuite) TestDoesNotRefreshValidToken() {
TokenType: "Bearer", TokenType: "Bearer",
}, },
}) })
Expect(err).To(BeNil()) assert.NilError(t, err)
token, _ := suite.azureLogin.GetValidToken() token, _ := azureLogin.GetValidToken()
assert.Equal(t, token.AccessToken, "accessToken")
Expect(suite.mockHelper.Calls).To(BeEmpty())
Expect(token.AccessToken).To(Equal("accessToken"))
} }
func (suite *LoginSuite) TestInvalidLogin() { func TestInvalidLogin(t *testing.T) {
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL := args.Get(0).(string) redirectURL := args.Get(0).(string)
err := queryKeyValue(redirectURL, "error", "access denied: login failed") err := queryKeyValue(redirectURL, "error", "access denied: login failed")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "") err = azureLogin.Login(context.TODO(), "")
Expect(err.Error()).To(BeEquivalentTo("no login code: login failed")) assert.Error(t, err, "no login code: login failed")
} }
func (suite *LoginSuite) TestValidLogin() { func TestValidLogin(t *testing.T) {
var redirectURL string var redirectURL string
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL = args.Get(0).(string) redirectURL = args.Get(0).(string)
err := queryKeyValue(redirectURL, "code", "123456879") err := queryKeyValue(redirectURL, "code", "123456879")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool { m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
//Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
return reflect.DeepEqual(data, url.Values{ return reflect.DeepEqual(data, url.Values{
"grant_type": []string{"authorization_code"}, "grant_type": []string{"authorization_code"},
@ -155,38 +149,39 @@ func (suite *LoginSuite) TestValidLogin() {
authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}` authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil) m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
data := refreshTokenData("firstRefreshToken") data := refreshTokenData("firstRefreshToken")
suite.mockHelper.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{ m.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
RefreshToken: "newRefreshToken", RefreshToken: "newRefreshToken",
AccessToken: "newAccessToken", AccessToken: "newAccessToken",
ExpiresIn: 3600, ExpiresIn: 3600,
Foci: "1", Foci: "1",
}, nil) }, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "") err = azureLogin.Login(context.TODO(), "")
Expect(err).To(BeNil()) assert.NilError(t, err)
loginToken, err := suite.azureLogin.tokenStore.readToken() loginToken, err := azureLogin.tokenStore.readToken()
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(loginToken.Token.AccessToken).To(Equal("newAccessToken")) assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
Expect(loginToken.Token.RefreshToken).To(Equal("newRefreshToken")) assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
Expect(loginToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second))) assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
Expect(loginToken.TenantID).To(Equal("12345a7c-c56d-43e8-9549-dd230ce8a038")) assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
Expect(loginToken.Token.Type()).To(Equal("Bearer")) assert.Equal(t, loginToken.Token.Type(), "Bearer")
} }
func (suite *LoginSuite) TestValidLoginRequestedTenant() { func TestValidLoginRequestedTenant(t *testing.T) {
var redirectURL string var redirectURL string
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL = args.Get(0).(string) redirectURL = args.Get(0).(string)
err := queryKeyValue(redirectURL, "code", "123456879") err := queryKeyValue(redirectURL, "code", "123456879")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool { m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
//Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
return reflect.DeepEqual(data, url.Values{ return reflect.DeepEqual(data, url.Values{
"grant_type": []string{"authorization_code"}, "grant_type": []string{"authorization_code"},
@ -205,38 +200,39 @@ func (suite *LoginSuite) TestValidLoginRequestedTenant() {
authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"}, authBody := `{"value":[{"id":"/tenants/00000000-c56d-43e8-9549-dd230ce8a038","tenantId":"00000000-c56d-43e8-9549-dd230ce8a038"},
{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}` {"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil) m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
data := refreshTokenData("firstRefreshToken") data := refreshTokenData("firstRefreshToken")
suite.mockHelper.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{ m.On("queryToken", data, "12345a7c-c56d-43e8-9549-dd230ce8a038").Return(azureToken{
RefreshToken: "newRefreshToken", RefreshToken: "newRefreshToken",
AccessToken: "newAccessToken", AccessToken: "newAccessToken",
ExpiresIn: 3600, ExpiresIn: 3600,
Foci: "1", Foci: "1",
}, nil) }, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "12345a7c-c56d-43e8-9549-dd230ce8a038") err = azureLogin.Login(context.TODO(), "12345a7c-c56d-43e8-9549-dd230ce8a038")
Expect(err).To(BeNil()) assert.NilError(t, err)
loginToken, err := suite.azureLogin.tokenStore.readToken() loginToken, err := azureLogin.tokenStore.readToken()
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(loginToken.Token.AccessToken).To(Equal("newAccessToken")) assert.Equal(t, loginToken.Token.AccessToken, "newAccessToken")
Expect(loginToken.Token.RefreshToken).To(Equal("newRefreshToken")) assert.Equal(t, loginToken.Token.RefreshToken, "newRefreshToken")
Expect(loginToken.Token.Expiry).To(BeTemporally(">", time.Now().Add(3500*time.Second))) assert.Assert(t, time.Now().Add(3500*time.Second).Before(loginToken.Token.Expiry))
Expect(loginToken.TenantID).To(Equal("12345a7c-c56d-43e8-9549-dd230ce8a038")) assert.Equal(t, loginToken.TenantID, "12345a7c-c56d-43e8-9549-dd230ce8a038")
Expect(loginToken.Token.Type()).To(Equal("Bearer")) assert.Equal(t, loginToken.Token.Type(), "Bearer")
} }
func (suite *LoginSuite) TestLoginNoTenant() { func TestLoginNoTenant(t *testing.T) {
var redirectURL string var redirectURL string
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL = args.Get(0).(string) redirectURL = args.Get(0).(string)
err := queryKeyValue(redirectURL, "code", "123456879") err := queryKeyValue(redirectURL, "code", "123456879")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool { m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
//Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
return reflect.DeepEqual(data, url.Values{ return reflect.DeepEqual(data, url.Values{
"grant_type": []string{"authorization_code"}, "grant_type": []string{"authorization_code"},
@ -253,24 +249,25 @@ func (suite *LoginSuite) TestLoginNoTenant() {
}, nil) }, nil)
authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}` authBody := `{"value":[{"id":"/tenants/12345a7c-c56d-43e8-9549-dd230ce8a038","tenantId":"12345a7c-c56d-43e8-9549-dd230ce8a038"}]}`
suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil) m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "00000000-c56d-43e8-9549-dd230ce8a038") err = azureLogin.Login(context.TODO(), "00000000-c56d-43e8-9549-dd230ce8a038")
Expect(err.Error()).To(BeEquivalentTo("could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed")) assert.Error(t, err, "could not find requested azure tenant 00000000-c56d-43e8-9549-dd230ce8a038: login failed")
} }
func (suite *LoginSuite) TestLoginRequestedTenantNotFound() { func TestLoginRequestedTenantNotFound(t *testing.T) {
var redirectURL string var redirectURL string
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL = args.Get(0).(string) redirectURL = args.Get(0).(string)
err := queryKeyValue(redirectURL, "code", "123456879") err := queryKeyValue(redirectURL, "code", "123456879")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool { m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
//Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
return reflect.DeepEqual(data, url.Values{ return reflect.DeepEqual(data, url.Values{
"grant_type": []string{"authorization_code"}, "grant_type": []string{"authorization_code"},
@ -287,24 +284,25 @@ func (suite *LoginSuite) TestLoginRequestedTenantNotFound() {
}, nil) }, nil)
authBody := `{"value":[]}` authBody := `{"value":[]}`
suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil) m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 200, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "") err = azureLogin.Login(context.TODO(), "")
Expect(err.Error()).To(BeEquivalentTo("could not find azure tenant: login failed")) assert.Error(t, err, "could not find azure tenant: login failed")
} }
func (suite *LoginSuite) TestLoginAuthorizationFailed() { func TestLoginAuthorizationFailed(t *testing.T) {
var redirectURL string var redirectURL string
suite.mockHelper.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) { m := &MockAzureHelper{}
m.On("openAzureLoginPage", mock.AnythingOfType("string")).Run(func(args mock.Arguments) {
redirectURL = args.Get(0).(string) redirectURL = args.Get(0).(string)
err := queryKeyValue(redirectURL, "code", "123456879") err := queryKeyValue(redirectURL, "code", "123456879")
Expect(err).To(BeNil()) assert.NilError(t, err)
}) })
suite.mockHelper.On("queryToken", mock.MatchedBy(func(data url.Values) bool { m.On("queryToken", mock.MatchedBy(func(data url.Values) bool {
//Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage //Need a matcher here because the value of redirectUrl is not known until executing openAzureLoginPage
return reflect.DeepEqual(data, url.Values{ return reflect.DeepEqual(data, url.Values{
"grant_type": []string{"authorization_code"}, "grant_type": []string{"authorization_code"},
@ -322,13 +320,13 @@ func (suite *LoginSuite) TestLoginAuthorizationFailed() {
authBody := `[access denied]` authBody := `[access denied]`
suite.mockHelper.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 400, nil) m.On("queryAuthorizationAPI", authorizationURL, "Bearer firstAccessToken").Return([]byte(authBody), 400, nil)
azureLogin, err := newAzureLoginServiceFromPath(filepath.Join(suite.dir, tokenStoreFilename), suite.mockHelper) azureLogin, err := testLoginService(t, m)
Expect(err).To(BeNil()) assert.NilError(t, err)
err = azureLogin.Login(context.TODO(), "") err = azureLogin.Login(context.TODO(), "")
Expect(err.Error()).To(BeEquivalentTo("unable to login status code 400: [access denied]: login failed")) assert.Error(t, err, "unable to login status code 400: [access denied]: login failed")
} }
func refreshTokenData(refreshToken string) url.Values { func refreshTokenData(refreshToken string) url.Values {
@ -342,7 +340,9 @@ func refreshTokenData(refreshToken string) url.Values {
func queryKeyValue(redirectURL string, key string, value string) error { func queryKeyValue(redirectURL string, key string, value string) error {
req, err := http.NewRequest("GET", redirectURL, nil) req, err := http.NewRequest("GET", redirectURL, nil)
Expect(err).To(BeNil()) if err != nil {
return err
}
q := req.URL.Query() q := req.URL.Query()
q.Add(key, value) q.Add(key, value)
req.URL.RawQuery = q.Encode() req.URL.RawQuery = q.Encode()
@ -351,11 +351,6 @@ func queryKeyValue(redirectURL string, key string, value string) error {
return err return err
} }
func TestLoginSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(LoginSuite))
}
type MockAzureHelper struct { type MockAzureHelper struct {
mock.Mock mock.Mock
} }

View File

@ -17,54 +17,43 @@
package login package login
import ( import (
"errors"
"io/ioutil" "io/ioutil"
"os" "os"
"path/filepath" "path/filepath"
"testing" "testing"
. "github.com/onsi/gomega" "gotest.tools/v3/assert"
"github.com/stretchr/testify/suite"
) )
type tokenStoreTestSuite struct { func TestCreateStoreFromExistingFolder(t *testing.T) {
suite.Suite
}
func (suite *tokenStoreTestSuite) TestCreateStoreFromExistingFolder() {
existingDir, err := ioutil.TempDir("", "test_store") existingDir, err := ioutil.TempDir("", "test_store")
Expect(err).To(BeNil()) assert.NilError(t, err)
storePath := filepath.Join(existingDir, tokenStoreFilename) storePath := filepath.Join(existingDir, tokenStoreFilename)
store, err := newTokenStore(storePath) store, err := newTokenStore(storePath)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect((store.filePath)).To(Equal(storePath)) assert.Equal(t, store.filePath, storePath)
} }
func (suite *tokenStoreTestSuite) TestCreateStoreFromNonExistingFolder() { func TestCreateStoreFromNonExistingFolder(t *testing.T) {
existingDir, err := ioutil.TempDir("", "test_store") existingDir, err := ioutil.TempDir("", "test_store")
Expect(err).To(BeNil()) assert.NilError(t, err)
storePath := filepath.Join(existingDir, "new", tokenStoreFilename) storePath := filepath.Join(existingDir, "new", tokenStoreFilename)
store, err := newTokenStore(storePath) store, err := newTokenStore(storePath)
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect((store.filePath)).To(Equal(storePath)) assert.Equal(t, store.filePath, storePath)
newDir, err := os.Stat(filepath.Join(existingDir, "new")) newDir, err := os.Stat(filepath.Join(existingDir, "new"))
Expect(err).To(BeNil()) assert.NilError(t, err)
Expect(newDir.Mode().IsDir()).To(BeTrue()) assert.Assert(t, newDir.Mode().IsDir())
} }
func (suite *tokenStoreTestSuite) TestErrorIfParentFolderIsAFile() { func TestErrorIfParentFolderIsAFile(t *testing.T) {
existingDir, err := ioutil.TempFile("", "test_store") existingDir, err := ioutil.TempFile("", "test_store")
Expect(err).To(BeNil()) assert.NilError(t, err)
storePath := filepath.Join(existingDir.Name(), tokenStoreFilename) storePath := filepath.Join(existingDir.Name(), tokenStoreFilename)
_, err = newTokenStore(storePath) _, err = newTokenStore(storePath)
Expect(err).To(MatchError(errors.New("cannot use path " + storePath + " ; " + existingDir.Name() + " already exists and is not a directory"))) assert.Error(t, err, "cannot use path "+storePath+" ; "+existingDir.Name()+" already exists and is not a directory")
}
func TestTokenStoreSuite(t *testing.T) {
RegisterTestingT(t)
suite.Run(t, new(tokenStoreTestSuite))
} }