* Implement code changes to enhance functionality and improve performance * chore: update version to 18.0 in version.json * fix: correct initialization of opblackList in PluralHelper * chore: update SDK version to 18.0 in README.md * Fixdocfx (#82) * fix: update file references and clean up validation comments in models * chore: add symlink to CONTRIBUTING.md for easier access * fix: update documentation to include full type names for WebSocket and Predicate * fix: include CONTRIBUTING.md in docfx.json build content * refactor: update IKubernetes interface and template for consistency * feat: add Microsoft.CodeAnalysis.CSharp package and improve source normalization in generator context * chore: update package versions in Directory.Packages.props for compatibility and improvements * chore: update Microsoft.VisualStudio.SlnGen and Nerdbank.GitVersioning package versions for compatibility * Implement code changes to enhance functionality and improve performance * chore: update version to 18.0 in version.json * fix: correct initialization of opblackList in PluralHelper * chore: update SDK version to 18.0 in README.md * refactor: update IKubernetes interface and template for consistency * feat: add Microsoft.CodeAnalysis.CSharp package and improve source normalization in generator context * chore: update package versions in Directory.Packages.props for compatibility and improvements * chore: update Microsoft.VisualStudio.SlnGen and Nerdbank.GitVersioning package versions for compatibility * chore: downgrade xunit.runner.visualstudio and Xunit.StaFact package versions for compatibility * chore: update package versions in Directory.Packages.props for compatibility and improvements * style: format code for consistency and readability * feat: update certificate loading logic for .NET 9 compatibility * fix: update certificate loading method for .NET 9 compatibility
103 lines
3.9 KiB
C#
103 lines
3.9 KiB
C#
using System;
|
|
using System.Linq;
|
|
using System.Security.Cryptography.X509Certificates;
|
|
using Xunit;
|
|
|
|
namespace k8s.Tests
|
|
{
|
|
public class CertUtilsTests
|
|
{
|
|
/// <summary>
|
|
/// This file contains a sample kubeconfig file. The paths to the certificate files are relative
|
|
/// to the current working directly.
|
|
/// </summary>
|
|
private const string KubeConfigFileName = "assets/kubeconfig.yml";
|
|
|
|
/// <summary>
|
|
/// This file contains a sample kubeconfig file. The paths to the certificate files are relative
|
|
/// to the directory in which the kubeconfig file is located.
|
|
/// </summary>
|
|
private const string KubeConfigWithRelativePathsFileName = "assets/kubeconfig.relative.yml";
|
|
|
|
/// <summary>
|
|
/// Checks that a certificate can be loaded from files.
|
|
/// </summary>
|
|
[Fact]
|
|
public void LoadFromFiles()
|
|
{
|
|
var cfg = KubernetesClientConfiguration.BuildConfigFromConfigFile(KubeConfigFileName, "federal-context",
|
|
useRelativePaths: false);
|
|
|
|
// Just validate that this doesn't throw and private key is non-null
|
|
using var cert = CertUtils.GeneratePfx(cfg);
|
|
Assert.NotNull(cert.GetRSAPrivateKey());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks that a certificate can be loaded from files, in a scenario where the files are using relative paths.
|
|
/// </summary>
|
|
[Fact]
|
|
public void LoadFromFilesRelativePath()
|
|
{
|
|
var cfg = KubernetesClientConfiguration.BuildConfigFromConfigFile(
|
|
KubeConfigWithRelativePathsFileName,
|
|
"federal-context");
|
|
|
|
// Just validate that this doesn't throw and private key is non-null
|
|
using var cert = CertUtils.GeneratePfx(cfg);
|
|
Assert.NotNull(cert.GetRSAPrivateKey());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks that a certificate can be loaded from inline.
|
|
/// </summary>
|
|
[Fact]
|
|
public void LoadFromInlineData()
|
|
{
|
|
var cfg = KubernetesClientConfiguration.BuildConfigFromConfigFile(KubeConfigFileName, "victorian-context",
|
|
useRelativePaths: false);
|
|
|
|
// Just validate that this doesn't throw and private key is non-null
|
|
using var cert = CertUtils.GeneratePfx(cfg);
|
|
Assert.NotNull(cert.GetRSAPrivateKey());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks that a certificate can be loaded from inline, in a scenario where the files are using relative paths..
|
|
/// </summary>
|
|
[Fact]
|
|
public void LoadFromInlineDataRelativePath()
|
|
{
|
|
var cfg = KubernetesClientConfiguration.BuildConfigFromConfigFile(
|
|
KubeConfigWithRelativePathsFileName,
|
|
"victorian-context");
|
|
|
|
// Just validate that this doesn't throw and private key is non-null
|
|
using var cert = CertUtils.GeneratePfx(cfg);
|
|
Assert.NotNull(cert.GetRSAPrivateKey());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Checks that the bundle certificate was loaded correctly
|
|
/// </summary>
|
|
[Fact]
|
|
public void LoadPemWithMultiCert()
|
|
{
|
|
var certCollection = CertUtils.LoadPemFileCert("assets/ca-bundle.crt");
|
|
|
|
#if NET9_0_OR_GREATER
|
|
using var intermediateCert = X509CertificateLoader.LoadCertificateFromFile("assets/ca-bundle-intermediate.crt");
|
|
using var rootCert = X509CertificateLoader.LoadCertificateFromFile("assets/ca-bundle-root.crt");
|
|
#else
|
|
using var intermediateCert = new X509Certificate2("assets/ca-bundle-intermediate.crt");
|
|
using var rootCert = new X509Certificate2("assets/ca-bundle-root.crt");
|
|
#endif
|
|
|
|
Assert.Equal(2, certCollection.Count);
|
|
|
|
Assert.True(certCollection[0].RawData.SequenceEqual(intermediateCert.RawData));
|
|
Assert.True(certCollection[1].RawData.SequenceEqual(rootCert.RawData));
|
|
}
|
|
}
|
|
}
|