package smtp import ( //"errors" "testing" "github.com/jenkinsci/kubernetes-operator/api/v1alpha2" "github.com/jenkinsci/kubernetes-operator/pkg/notifications/event" "github.com/jenkinsci/kubernetes-operator/pkg/notifications/reason" "github.com/stretchr/testify/assert" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "sigs.k8s.io/controller-runtime/pkg/client/fake" ) const ( // testSMTPUsername = "username" // testSMTPPassword = "password" // testSMTPPort = 1025 // testFrom = "test@localhost" // testTo = "test.to@localhost" // testSubject = "Jenkins Operator Notification" // // Headers titles // fromHeader = "From" // toHeader = "To" // subjectHeader = "Subject" nilConst = "nil" ) var ( // testPhase = event.PhaseUser // testCrName = "test-cr" // testNamespace = "default" // testReason = reason.NewPodRestart( // // reason.KubernetesSource, // []string{"test-reason-1"}, // []string{"test-verbose-1"}..., // // ) // testLevel = v1alpha2.NotificationLevelWarning ) // type testServer struct { // event event.Event // } // NewSession implements smtp.Backend. // func (t *testServer) NewSession(c *smtp.Conn) (smtp.Session, error) { // return testSession{}, nil // } // // TODO: @brokenpip3 fix me // func (bkd *testServer) Login(_ *smtp.Conn, username, password string) (smtp.Session, error) { // if username != testSMTPUsername || password != testSMTPPassword { // return nil, errors.New("invalid username or password") // } // return &testSession{event: bkd.event}, nil // } // //// AnonymousLogin requires clients to authenticate using SMTP AUTH before sending emails //func (bkd *testServer) AnonymousLogin(_ *smtp.ConnectionState) (smtp.Session, error) { // return nil, smtp.ErrAuthRequired //} // A Session is returned after successful login. // type testSession struct { // event event.Event // } // // func (s testSession) Mail(from string, mop *smtp.MailOptions) error { // // if from != testFrom { // // return fmt.Errorf("`From` header is not equal: '%s', expected '%s'", from, testFrom) // // } // // return nil // // } // // func (s testSession) Rcpt(to string, mop *smtp.RcptOptions) error { // // if to != testTo { // // return fmt.Errorf("`To` header is not equal: '%s', expected '%s'", to, testTo) // // } // // return nil // // } // // // func (s testSession) Data(r io.Reader) error { // // // contentRegex := regexp.MustCompile(`\t+\n\t+(.*):\n\t+(.*)\n\t+`) // // // headersRegex := regexp.MustCompile(`(.*):\s(.*)`) // // // b, err := io.ReadAll(quotedprintable.NewReader(r)) // // // if err != nil { // // // return err // // // } // // // content := contentRegex.FindAllStringSubmatch(string(b), -1) // // // headers := headersRegex.FindAllStringSubmatch(string(b), -1) // // // if len(content) > 0 { // // // if s.event.Jenkins.Name == content[0][1] { // // // return fmt.Errorf("jenkins CR not identical: %s, expected: %s", content[0][1], s.event.Jenkins.Name) // // // } else if string(s.event.Phase) == content[1][1] { // // // return fmt.Errorf("phase not identical: %s, expected: %s", content[1][1], s.event.Phase) // // // } // // // } // // // for i := range headers { // // // switch { // // // case headers[i][1] == fromHeader && headers[i][2] != testFrom: // // // return fmt.Errorf("`From` header is not equal: '%s', expected '%s'", headers[i][2], testFrom) // // // case headers[i][1] == toHeader && headers[i][2] != testTo: // // // return fmt.Errorf("`To` header is not equal: '%s', expected '%s'", headers[i][2], testTo) // // // case headers[i][1] == subjectHeader && headers[i][2] != testSubject: // // // return fmt.Errorf("`Subject` header is not equal: '%s', expected '%s'", headers[i][2], testSubject) // // // } // // // } // // // return nil // // // } // func (s testSession) Reset() {} // func (s testSession) Logout() error { // return nil // } // TODO: @brokenpip3 & @ansh-devs // TODO: SMTP testing failing due to index out of range error in `Data` method. // func TestSMTP_Send(t *testing.T) { // e := event.Event{ // Jenkins: v1alpha2.Jenkins{ // ObjectMeta: metav1.ObjectMeta{ // Name: testCrName, // Namespace: testNamespace, // }, // }, // Phase: testPhase, // Level: testLevel, // Reason: testReason, // } // fakeClient := fake.NewClientBuilder().Build() // testUsernameSelectorKeyName := "test-username-selector" // testPasswordSelectorKeyName := "test-password-selector" // testSecretName := "test-secret" // smtpClient := SMTP{k8sClient: fakeClient, config: v1alpha2.Notification{ // SMTP: &v1alpha2.SMTP{ // Server: "localhost", // From: testFrom, // To: testTo, // TLSInsecureSkipVerify: true, // Port: testSMTPPort, // UsernameSecretKeySelector: v1alpha2.SecretKeySelector{ // LocalObjectReference: corev1.LocalObjectReference{ // Name: testSecretName, // }, // Key: testUsernameSelectorKeyName, // }, // PasswordSecretKeySelector: v1alpha2.SecretKeySelector{ // LocalObjectReference: corev1.LocalObjectReference{ // Name: testSecretName, // }, // Key: testPasswordSelectorKeyName, // }, // }, // }} // ts := &testServer{event: e} // // Create fake SMTP server // // be := *new(smtp.Backend) // s := smtp.NewServer(ts) // s.Addr = fmt.Sprintf(":%d", testSMTPPort) // s.Domain = "localhost" // s.ReadTimeout = 10 * time.Second // s.WriteTimeout = 10 * time.Second // s.MaxMessageBytes = 1024 * 1024 // s.MaxRecipients = 50 // s.LMTP = false // s.AllowInsecureAuth = true // // Create secrets // secret := &corev1.Secret{ // ObjectMeta: metav1.ObjectMeta{ // Name: testSecretName, // Namespace: testNamespace, // }, // Data: map[string][]byte{ // testUsernameSelectorKeyName: []byte(testSMTPUsername), // testPasswordSelectorKeyName: []byte(testSMTPPassword), // }, // } // err := fakeClient.Create(context.TODO(), secret) // assert.NoError(t, err) // l, err := net.Listen("tcp", fmt.Sprintf("127.0.0.1:%d", testSMTPPort)) // assert.NoError(t, err) // go func() { // // s.ListenAndServe() // err := s.Serve(l) // assert.NoError(t, err) // }() // err = smtpClient.Send(e) // fmt.Println(err.Error()) // assert.NoError(t, err) // } func TestGenerateMessage(t *testing.T) { t.Run("happy", func(t *testing.T) { crName := "test-jenkins" phase := event.PhaseBase level := v1alpha2.NotificationLevelInfo res := reason.NewUndefined(reason.KubernetesSource, []string{"test"}, []string{"test-verbose"}...) from := "from@jenkins.local" to := "to@jenkins.local" e := event.Event{ Jenkins: v1alpha2.Jenkins{ ObjectMeta: metav1.ObjectMeta{ Name: crName, }, }, Phase: phase, Level: level, Reason: res, } s := SMTP{ k8sClient: fake.NewClientBuilder().Build(), config: v1alpha2.Notification{ LoggingLevel: level, SMTP: &v1alpha2.SMTP{ From: from, To: to, }, }, } message := s.generateMessage(e) assert.NotNil(t, message) }) t.Run("with nils", func(t *testing.T) { crName := nilConst phase := event.PhaseBase level := v1alpha2.NotificationLevelInfo res := reason.NewUndefined(reason.KubernetesSource, []string{nilConst}, []string{nilConst}...) from := nilConst to := nilConst e := event.Event{ Jenkins: v1alpha2.Jenkins{ ObjectMeta: metav1.ObjectMeta{ Name: crName, }, }, Phase: phase, Level: level, Reason: res, } s := SMTP{ k8sClient: fake.NewClientBuilder().Build(), config: v1alpha2.Notification{ LoggingLevel: level, SMTP: &v1alpha2.SMTP{ From: from, To: to, }, }, } message := s.generateMessage(e) assert.NotNil(t, message) }) t.Run("with empty strings", func(t *testing.T) { crName := "" phase := event.PhaseBase level := v1alpha2.NotificationLevelInfo res := reason.NewUndefined(reason.KubernetesSource, []string{""}, []string{""}...) from := "" to := "" e := event.Event{ Jenkins: v1alpha2.Jenkins{ ObjectMeta: metav1.ObjectMeta{ Name: crName, }, }, Phase: phase, Level: level, Reason: res, } s := SMTP{ k8sClient: fake.NewClientBuilder().Build(), config: v1alpha2.Notification{ LoggingLevel: level, SMTP: &v1alpha2.SMTP{ From: from, To: to, }, }, } message := s.generateMessage(e) assert.NotNil(t, message) }) }