| 
1 | 1 | package mcp  | 
2 | 2 | 
 
  | 
3 | 3 | import (  | 
4 |  | -	"strings"  | 
 | 4 | +	"net/http"  | 
5 | 5 | 	"testing"  | 
6 | 6 | 
 
  | 
 | 7 | +	"github.com/BurntSushi/toml"  | 
 | 8 | +	"github.com/containers/kubernetes-mcp-server/internal/test"  | 
7 | 9 | 	"github.com/mark3labs/mcp-go/mcp"  | 
8 |  | -	corev1 "k8s.io/api/core/v1"  | 
9 |  | -	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"  | 
 | 10 | +	"github.com/stretchr/testify/suite"  | 
10 | 11 | )  | 
11 | 12 | 
 
  | 
12 |  | -func TestNodeLog(t *testing.T) {  | 
13 |  | -	testCase(t, func(c *mcpContext) {  | 
14 |  | -		c.withEnvTest()  | 
15 |  | - | 
16 |  | -		// Create test node  | 
17 |  | -		kubernetesAdmin := c.newKubernetesClient()  | 
18 |  | -		node := &corev1.Node{  | 
19 |  | -			ObjectMeta: metav1.ObjectMeta{  | 
20 |  | -				Name: "test-node-log",  | 
21 |  | -			},  | 
22 |  | -			Status: corev1.NodeStatus{  | 
23 |  | -				Addresses: []corev1.NodeAddress{  | 
24 |  | -					{Type: corev1.NodeInternalIP, Address: "192.168.1.10"},  | 
25 |  | -				},  | 
26 |  | -			},  | 
27 |  | -		}  | 
 | 13 | +type NodesSuite struct {  | 
 | 14 | +	BaseMcpSuite  | 
 | 15 | +	mockServer *test.MockServer  | 
 | 16 | +}  | 
28 | 17 | 
 
  | 
29 |  | -		_, _ = kubernetesAdmin.CoreV1().Nodes().Create(c.ctx, node, metav1.CreateOptions{})  | 
 | 18 | +func (s *NodesSuite) SetupTest() {  | 
 | 19 | +	s.BaseMcpSuite.SetupTest()  | 
 | 20 | +	s.mockServer = test.NewMockServer()  | 
 | 21 | +	s.Cfg.KubeConfig = s.mockServer.KubeconfigFile(s.T())  | 
 | 22 | +}  | 
30 | 23 | 
 
  | 
31 |  | -		// Test node_log tool  | 
32 |  | -		toolResult, err := c.callTool("node_log", map[string]interface{}{  | 
33 |  | -			"name": "test-node-log",  | 
34 |  | -		})  | 
 | 24 | +func (s *NodesSuite) TearDownTest() {  | 
 | 25 | +	s.BaseMcpSuite.TearDownTest()  | 
 | 26 | +	if s.mockServer != nil {  | 
 | 27 | +		s.mockServer.Close()  | 
 | 28 | +	}  | 
 | 29 | +}  | 
35 | 30 | 
 
  | 
36 |  | -		t.Run("node_log returns successfully or with expected error", func(t *testing.T) {  | 
37 |  | -			if err != nil {  | 
38 |  | -				t.Fatalf("call tool failed: %v", err)  | 
39 |  | -			}  | 
40 |  | -			// Node logs might not be available in test environment  | 
41 |  | -			// We just check that the tool call completes  | 
42 |  | -			if toolResult.IsError {  | 
43 |  | -				content := toolResult.Content[0].(mcp.TextContent).Text  | 
44 |  | -				// Expected error messages in test environment  | 
45 |  | -				if !strings.Contains(content, "failed to get node logs") &&  | 
46 |  | -					!strings.Contains(content, "not logged any message yet") {  | 
47 |  | -					t.Logf("tool returned error (expected in test environment): %v", content)  | 
 | 31 | +func (s *NodesSuite) TestNodesLog() {  | 
 | 32 | +	s.mockServer.Handle(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {  | 
 | 33 | +		// Get Node response  | 
 | 34 | +		if req.URL.Path == "/api/v1/nodes/existing-node" {  | 
 | 35 | +			w.Header().Set("Content-Type", "application/json")  | 
 | 36 | +			w.WriteHeader(http.StatusOK)  | 
 | 37 | +			_, _ = w.Write([]byte(`{  | 
 | 38 | +				"apiVersion": "v1",  | 
 | 39 | +				"kind": "Node",  | 
 | 40 | +				"metadata": {  | 
 | 41 | +					"name": "existing-node"  | 
48 | 42 | 				}  | 
 | 43 | +			}`))  | 
 | 44 | +			return  | 
 | 45 | +		}  | 
 | 46 | +		// Get Empty Log response  | 
 | 47 | +		if req.URL.Path == "/api/v1/nodes/existing-node/proxy/logs/empty.log" {  | 
 | 48 | +			w.Header().Set("Content-Type", "text/plain")  | 
 | 49 | +			w.WriteHeader(http.StatusOK)  | 
 | 50 | +			_, _ = w.Write([]byte(``))  | 
 | 51 | +			return  | 
 | 52 | +		}  | 
 | 53 | +		// Get Kubelet Log response  | 
 | 54 | +		if req.URL.Path == "/api/v1/nodes/existing-node/proxy/logs/kubelet.log" {  | 
 | 55 | +			w.Header().Set("Content-Type", "text/plain")  | 
 | 56 | +			w.WriteHeader(http.StatusOK)  | 
 | 57 | +			logContent := "Line 1\nLine 2\nLine 3\nLine 4\nLine 5\n"  | 
 | 58 | +			if req.URL.Query().Get("tailLines") != "" {  | 
 | 59 | +				logContent = "Line 4\nLine 5\n"  | 
49 | 60 | 			}  | 
 | 61 | +			_, _ = w.Write([]byte(logContent))  | 
 | 62 | +			return  | 
 | 63 | +		}  | 
 | 64 | +		w.WriteHeader(http.StatusNotFound)  | 
 | 65 | +	}))  | 
 | 66 | +	s.InitMcpClient()  | 
 | 67 | +	s.Run("nodes_log(name=nil)", func() {  | 
 | 68 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{})  | 
 | 69 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 70 | +		s.Run("has error", func() {  | 
 | 71 | +			s.Truef(toolResult.IsError, "call tool should fail")  | 
 | 72 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 73 | +		})  | 
 | 74 | +		s.Run("describes missing name", func() {  | 
 | 75 | +			expectedMessage := "failed to get node log, missing argument name"  | 
 | 76 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 77 | +				"expected descriptive error '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
50 | 78 | 		})  | 
51 | 79 | 	})  | 
 | 80 | +	s.Run("nodes_log(name=inexistent-node)", func() {  | 
 | 81 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 82 | +			"name": "inexistent-node",  | 
 | 83 | +		})  | 
 | 84 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 85 | +		s.Run("has error", func() {  | 
 | 86 | +			s.Truef(toolResult.IsError, "call tool should fail")  | 
 | 87 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 88 | +		})  | 
 | 89 | +		s.Run("describes missing node", func() {  | 
 | 90 | +			expectedMessage := "failed to get node log for inexistent-node: failed to get node inexistent-node: the server could not find the requested resource (get nodes inexistent-node)"  | 
 | 91 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 92 | +				"expected descriptive error '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
 | 93 | +		})  | 
 | 94 | +	})  | 
 | 95 | +	s.Run("nodes_log(name=existing-node, log_path=missing.log)", func() {  | 
 | 96 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 97 | +			"name":     "existing-node",  | 
 | 98 | +			"log_path": "missing.log",  | 
 | 99 | +		})  | 
 | 100 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 101 | +		s.Run("has error", func() {  | 
 | 102 | +			s.Truef(toolResult.IsError, "call tool should fail")  | 
 | 103 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 104 | +		})  | 
 | 105 | +		s.Run("describes missing log file", func() {  | 
 | 106 | +			expectedMessage := "failed to get node log for existing-node: failed to get node logs: the server could not find the requested resource"  | 
 | 107 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 108 | +				"expected descriptive error '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
 | 109 | +		})  | 
 | 110 | +	})  | 
 | 111 | +	s.Run("nodes_log(name=existing-node, log_path=empty.log)", func() {  | 
 | 112 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 113 | +			"name":     "existing-node",  | 
 | 114 | +			"log_path": "empty.log",  | 
 | 115 | +		})  | 
 | 116 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 117 | +		s.Run("no error", func() {  | 
 | 118 | +			s.Falsef(toolResult.IsError, "call tool should succeed")  | 
 | 119 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 120 | +		})  | 
 | 121 | +		s.Run("describes empty log", func() {  | 
 | 122 | +			expectedMessage := "The node existing-node has not logged any message yet or the log file is empty"  | 
 | 123 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 124 | +				"expected descriptive message '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
 | 125 | +		})  | 
 | 126 | +	})  | 
 | 127 | +	s.Run("nodes_log(name=existing-node, log_path=kubelet.log)", func() {  | 
 | 128 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 129 | +			"name":     "existing-node",  | 
 | 130 | +			"log_path": "kubelet.log",  | 
 | 131 | +		})  | 
 | 132 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 133 | +		s.Run("no error", func() {  | 
 | 134 | +			s.Falsef(toolResult.IsError, "call tool should succeed")  | 
 | 135 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 136 | +		})  | 
 | 137 | +		s.Run("returns full log", func() {  | 
 | 138 | +			expectedMessage := "Line 1\nLine 2\nLine 3\nLine 4\nLine 5\n"  | 
 | 139 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 140 | +				"expected log content '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
 | 141 | +		})  | 
 | 142 | +	})  | 
 | 143 | +	for _, tailCase := range []interface{}{2, int64(2), float64(2)} {  | 
 | 144 | +		s.Run("nodes_log(name=existing-node, log_path=kubelet.log, tail=2)", func() {  | 
 | 145 | +			toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 146 | +				"name":     "existing-node",  | 
 | 147 | +				"log_path": "kubelet.log",  | 
 | 148 | +				"tail":     tailCase,  | 
 | 149 | +			})  | 
 | 150 | +			s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 151 | +			s.Run("no error", func() {  | 
 | 152 | +				s.Falsef(toolResult.IsError, "call tool should succeed")  | 
 | 153 | +				s.Nilf(err, "call tool should not return error object")  | 
 | 154 | +			})  | 
 | 155 | +			s.Run("returns tail log", func() {  | 
 | 156 | +				expectedMessage := "Line 4\nLine 5\n"  | 
 | 157 | +				s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 158 | +					"expected log content '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
 | 159 | +			})  | 
 | 160 | +		})  | 
 | 161 | +	}  | 
52 | 162 | }  | 
53 | 163 | 
 
  | 
54 |  | -func TestNodeLogMissingArguments(t *testing.T) {  | 
55 |  | -	testCase(t, func(c *mcpContext) {  | 
56 |  | -		c.withEnvTest()  | 
57 |  | - | 
58 |  | -		t.Run("node_log requires name", func(t *testing.T) {  | 
59 |  | -			toolResult, err := c.callTool("node_log", map[string]interface{}{})  | 
60 |  | - | 
61 |  | -			if err == nil && !toolResult.IsError {  | 
62 |  | -				t.Fatal("expected error when name is missing")  | 
63 |  | -			}  | 
 | 164 | +func (s *NodesSuite) TestNodesLogDenied() {  | 
 | 165 | +	s.Require().NoError(toml.Unmarshal([]byte(`  | 
 | 166 | +		denied_resources = [ { version = "v1", kind = "Node" } ]  | 
 | 167 | +	`), s.Cfg), "Expected to parse denied resources config")  | 
 | 168 | +	s.InitMcpClient()  | 
 | 169 | +	s.Run("nodes_log (denied)", func() {  | 
 | 170 | +		toolResult, err := s.CallTool("nodes_log", map[string]interface{}{  | 
 | 171 | +			"name": "does-not-matter",  | 
 | 172 | +		})  | 
 | 173 | +		s.Require().NotNil(toolResult, "toolResult should not be nil")  | 
 | 174 | +		s.Run("has error", func() {  | 
 | 175 | +			s.Truef(toolResult.IsError, "call tool should fail")  | 
 | 176 | +			s.Nilf(err, "call tool should not return error object")  | 
 | 177 | +		})  | 
 | 178 | +		s.Run("describes denial", func() {  | 
 | 179 | +			expectedMessage := "failed to get node log for does-not-matter: resource not allowed: /v1, Kind=Node"  | 
 | 180 | +			s.Equalf(expectedMessage, toolResult.Content[0].(mcp.TextContent).Text,  | 
 | 181 | +				"expected descriptive error '%s', got %v", expectedMessage, toolResult.Content[0].(mcp.TextContent).Text)  | 
64 | 182 | 		})  | 
65 | 183 | 	})  | 
66 | 184 | }  | 
 | 185 | + | 
 | 186 | +func TestNodes(t *testing.T) {  | 
 | 187 | +	suite.Run(t, new(NodesSuite))  | 
 | 188 | +}  | 
0 commit comments