mirror of
https://github.com/kairos-io/kairos-agent.git
synced 2025-06-03 01:44:53 +00:00

* 🐛 Fix validator on long strings Validator was mistakenly identifying a long yaml as a file and trying to open it, which failed with an error of filename too long. This was not catched in order to identify that the source is not a file but a yaml, so it was directly returning the error. This patch adds that error to the list in order ot identify the source to validate as yaml. Also adds a couple of tests for this functionality. Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com> * 🐛 Merge initramfs generation between distros Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com> --------- Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
108 lines
2.7 KiB
Go
108 lines
2.7 KiB
Go
package agent_test
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
. "github.com/kairos-io/kairos/internal/agent"
|
|
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
var _ = Describe("Validate", func() {
|
|
Context("JSONSchema", func() {
|
|
It("returns a schema with a url to the given version", func() {
|
|
out, err := JSONSchema("0.0.0")
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(strings.Contains(out, `$schema": "https://kairos.io/0.0.0/cloud-config.json"`)).To(BeTrue())
|
|
})
|
|
})
|
|
|
|
Context("Validate", func() {
|
|
var yaml string
|
|
|
|
Context("With a really long config string", func() {
|
|
BeforeEach(func() {
|
|
yaml = `#cloud-config
|
|
users:
|
|
- name: kairos
|
|
passwd: kairos
|
|
vpn:
|
|
network_token: "dssdnfjkldashfkjhasdkhfkasjdhfkjhasdjkfhaksjdhfkjashjdkfhioreqwhfuihqweruifhuewrbfhuewrfuyequfhuiehuifheqrihfuiqrehfuirqheiufhreqiuhfuiqheiufhqeuihfuiqrehfiuhqreuifrhiuqehfiuhqeirhfiuewhrfhqwehfriuewhfuihewiuhfruewhrifhwiuehrfiuhweiurfhwueihrfuiwehufhweuihrfuiwerhfuihewruifhewuihfiouwehrfiouhwei"
|
|
`
|
|
})
|
|
It("validates", func() {
|
|
Expect(Validate(yaml)).ToNot(HaveOccurred())
|
|
})
|
|
})
|
|
|
|
Context("with a valid config", func() {
|
|
BeforeEach(func() {
|
|
yaml = `#cloud-config
|
|
users:
|
|
- name: kairos
|
|
passwd: kairos`
|
|
})
|
|
|
|
It("is successful reading it from file", func() {
|
|
f, err := ioutil.TempDir("", "tests")
|
|
Expect(err).ToNot(HaveOccurred())
|
|
defer os.RemoveAll(f)
|
|
|
|
path := filepath.Join(f, "config.yaml")
|
|
err = os.WriteFile(path, []byte(yaml), 0655)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
err = Validate(path)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
})
|
|
It("is successful reading it from a string", func() {
|
|
Expect(Validate(yaml)).ToNot(HaveOccurred())
|
|
})
|
|
})
|
|
|
|
Context("without a header", func() {
|
|
BeforeEach(func() {
|
|
yaml = `users:
|
|
- name: kairos
|
|
passwd: kairos`
|
|
})
|
|
|
|
It("is fails", func() {
|
|
f, err := ioutil.TempDir("", "tests")
|
|
Expect(err).ToNot(HaveOccurred())
|
|
defer os.RemoveAll(f)
|
|
|
|
path := filepath.Join(f, "config.yaml")
|
|
err = os.WriteFile(path, []byte(yaml), 0655)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
err = Validate(path)
|
|
Expect(err).To(MatchError("missing #cloud-config header"))
|
|
})
|
|
})
|
|
|
|
Context("with an invalid rule", func() {
|
|
BeforeEach(func() {
|
|
yaml = `#cloud-config
|
|
users:
|
|
- name: 007
|
|
passwd: kairos`
|
|
})
|
|
|
|
It("is fails", func() {
|
|
f, err := ioutil.TempDir("", "tests")
|
|
Expect(err).ToNot(HaveOccurred())
|
|
defer os.RemoveAll(f)
|
|
|
|
path := filepath.Join(f, "config.yaml")
|
|
err = os.WriteFile(path, []byte(yaml), 0655)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
err = Validate(path)
|
|
Expect(err.Error()).To(MatchRegexp("expected string, but got number"))
|
|
})
|
|
})
|
|
})
|
|
})
|