mirror of
https://github.com/containers/kubernetes-mcp-server.git
synced 2025-10-23 01:22:57 +03:00
179 lines
6.4 KiB
Go
179 lines
6.4 KiB
Go
package mcp
|
|
|
|
import (
|
|
"github.com/containers/kubernetes-mcp-server/pkg/kubernetes"
|
|
"github.com/mark3labs/mcp-go/mcp"
|
|
"k8s.io/client-go/rest"
|
|
v1 "k8s.io/client-go/tools/clientcmd/api/v1"
|
|
"sigs.k8s.io/yaml"
|
|
"testing"
|
|
)
|
|
|
|
func TestConfigurationView(t *testing.T) {
|
|
testCase(t, func(c *mcpContext) {
|
|
toolResult, err := c.callTool("configuration_view", map[string]interface{}{})
|
|
t.Run("configuration_view returns configuration", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("call tool failed %v", err)
|
|
}
|
|
})
|
|
var decoded *v1.Config
|
|
err = yaml.Unmarshal([]byte(toolResult.Content[0].(mcp.TextContent).Text), &decoded)
|
|
t.Run("configuration_view has yaml content", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("invalid tool result content %v", err)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns current-context", func(t *testing.T) {
|
|
if decoded.CurrentContext != "fake-context" {
|
|
t.Errorf("fake-context not found: %v", decoded.CurrentContext)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns context info", func(t *testing.T) {
|
|
if len(decoded.Contexts) != 1 {
|
|
t.Errorf("invalid context count, expected 1, got %v", len(decoded.Contexts))
|
|
}
|
|
if decoded.Contexts[0].Name != "fake-context" {
|
|
t.Errorf("fake-context not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.Cluster != "fake" {
|
|
t.Errorf("fake-cluster not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.AuthInfo != "fake" {
|
|
t.Errorf("fake-auth not found: %v", decoded.Contexts)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns cluster info", func(t *testing.T) {
|
|
if len(decoded.Clusters) != 1 {
|
|
t.Errorf("invalid cluster count, expected 1, got %v", len(decoded.Clusters))
|
|
}
|
|
if decoded.Clusters[0].Name != "fake" {
|
|
t.Errorf("fake-cluster not found: %v", decoded.Clusters)
|
|
}
|
|
if decoded.Clusters[0].Cluster.Server != "https://127.0.0.1:6443" {
|
|
t.Errorf("fake-server not found: %v", decoded.Clusters)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns auth info", func(t *testing.T) {
|
|
if len(decoded.AuthInfos) != 1 {
|
|
t.Errorf("invalid auth info count, expected 1, got %v", len(decoded.AuthInfos))
|
|
}
|
|
if decoded.AuthInfos[0].Name != "fake" {
|
|
t.Errorf("fake-auth not found: %v", decoded.AuthInfos)
|
|
}
|
|
})
|
|
toolResult, err = c.callTool("configuration_view", map[string]interface{}{
|
|
"minified": false,
|
|
})
|
|
t.Run("configuration_view with minified=false returns configuration", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("call tool failed %v", err)
|
|
}
|
|
})
|
|
err = yaml.Unmarshal([]byte(toolResult.Content[0].(mcp.TextContent).Text), &decoded)
|
|
t.Run("configuration_view with minified=false has yaml content", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("invalid tool result content %v", err)
|
|
}
|
|
})
|
|
t.Run("configuration_view with minified=false returns additional context info", func(t *testing.T) {
|
|
if len(decoded.Contexts) != 2 {
|
|
t.Errorf("invalid context count, expected2, got %v", len(decoded.Contexts))
|
|
}
|
|
if decoded.Contexts[0].Name != "additional-context" {
|
|
t.Errorf("additional-context not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.Cluster != "additional-cluster" {
|
|
t.Errorf("additional-cluster not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.AuthInfo != "additional-auth" {
|
|
t.Errorf("additional-auth not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[1].Name != "fake-context" {
|
|
t.Errorf("fake-context not found: %v", decoded.Contexts)
|
|
}
|
|
})
|
|
t.Run("configuration_view with minified=false returns cluster info", func(t *testing.T) {
|
|
if len(decoded.Clusters) != 2 {
|
|
t.Errorf("invalid cluster count, expected 2, got %v", len(decoded.Clusters))
|
|
}
|
|
if decoded.Clusters[0].Name != "additional-cluster" {
|
|
t.Errorf("additional-cluster not found: %v", decoded.Clusters)
|
|
}
|
|
})
|
|
t.Run("configuration_view with minified=false returns auth info", func(t *testing.T) {
|
|
if len(decoded.AuthInfos) != 2 {
|
|
t.Errorf("invalid auth info count, expected 2, got %v", len(decoded.AuthInfos))
|
|
}
|
|
if decoded.AuthInfos[0].Name != "additional-auth" {
|
|
t.Errorf("additional-auth not found: %v", decoded.AuthInfos)
|
|
}
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestConfigurationViewInCluster(t *testing.T) {
|
|
kubernetes.InClusterConfig = func() (*rest.Config, error) {
|
|
return &rest.Config{
|
|
Host: "https://kubernetes.default.svc",
|
|
BearerToken: "fake-token",
|
|
}, nil
|
|
}
|
|
defer func() {
|
|
kubernetes.InClusterConfig = rest.InClusterConfig
|
|
}()
|
|
testCase(t, func(c *mcpContext) {
|
|
toolResult, err := c.callTool("configuration_view", map[string]interface{}{})
|
|
t.Run("configuration_view returns configuration", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("call tool failed %v", err)
|
|
}
|
|
})
|
|
var decoded *v1.Config
|
|
err = yaml.Unmarshal([]byte(toolResult.Content[0].(mcp.TextContent).Text), &decoded)
|
|
t.Run("configuration_view has yaml content", func(t *testing.T) {
|
|
if err != nil {
|
|
t.Fatalf("invalid tool result content %v", err)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns current-context", func(t *testing.T) {
|
|
if decoded.CurrentContext != "context" {
|
|
t.Fatalf("context not found: %v", decoded.CurrentContext)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns context info", func(t *testing.T) {
|
|
if len(decoded.Contexts) != 1 {
|
|
t.Fatalf("invalid context count, expected 1, got %v", len(decoded.Contexts))
|
|
}
|
|
if decoded.Contexts[0].Name != "context" {
|
|
t.Fatalf("context not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.Cluster != "cluster" {
|
|
t.Fatalf("cluster not found: %v", decoded.Contexts)
|
|
}
|
|
if decoded.Contexts[0].Context.AuthInfo != "user" {
|
|
t.Fatalf("user not found: %v", decoded.Contexts)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns cluster info", func(t *testing.T) {
|
|
if len(decoded.Clusters) != 1 {
|
|
t.Fatalf("invalid cluster count, expected 1, got %v", len(decoded.Clusters))
|
|
}
|
|
if decoded.Clusters[0].Name != "cluster" {
|
|
t.Fatalf("cluster not found: %v", decoded.Clusters)
|
|
}
|
|
if decoded.Clusters[0].Cluster.Server != "https://kubernetes.default.svc" {
|
|
t.Fatalf("server not found: %v", decoded.Clusters)
|
|
}
|
|
})
|
|
t.Run("configuration_view returns auth info", func(t *testing.T) {
|
|
if len(decoded.AuthInfos) != 1 {
|
|
t.Fatalf("invalid auth info count, expected 1, got %v", len(decoded.AuthInfos))
|
|
}
|
|
if decoded.AuthInfos[0].Name != "user" {
|
|
t.Fatalf("user not found: %v", decoded.AuthInfos)
|
|
}
|
|
})
|
|
})
|
|
}
|