constellation/cli/internal/cloudcmd/create_test.go

201 lines
6.0 KiB
Go
Raw Normal View History

/*
Copyright (c) Edgeless Systems GmbH
SPDX-License-Identifier: AGPL-3.0-only
*/
2022-04-13 11:01:38 +00:00
package cloudcmd
import (
"bytes"
"context"
"errors"
"runtime"
2022-04-13 11:01:38 +00:00
"testing"
2022-09-21 11:47:57 +00:00
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudtypes"
"github.com/edgelesssys/constellation/v2/internal/config"
"github.com/edgelesssys/constellation/v2/internal/state"
2022-04-13 11:01:38 +00:00
"github.com/stretchr/testify/assert"
)
func TestCreator(t *testing.T) {
failOnNonAMD64 := (runtime.GOARCH != "amd64") || (runtime.GOOS != "linux")
2022-04-13 11:01:38 +00:00
wantGCPState := state.ConstellationState{
2022-09-27 07:22:29 +00:00
CloudProvider: cloudprovider.GCP.String(),
LoadBalancerIP: "192.0.2.1",
2022-04-13 11:01:38 +00:00
}
wantQEMUState := state.ConstellationState{
CloudProvider: cloudprovider.QEMU.String(),
LoadBalancerIP: "192.0.2.1",
}
2022-04-13 11:01:38 +00:00
wantAzureState := state.ConstellationState{
CloudProvider: cloudprovider.Azure.String(),
2022-07-29 06:10:51 +00:00
AzureControlPlaneInstances: cloudtypes.Instances{
2022-04-13 11:01:38 +00:00
"id-0": {PrivateIP: "192.0.2.1", PublicIP: "192.0.2.1"},
"id-1": {PrivateIP: "192.0.2.1", PublicIP: "192.0.2.1"},
},
2022-07-29 06:10:51 +00:00
AzureWorkerInstances: cloudtypes.Instances{
2022-04-13 11:01:38 +00:00
"id-0": {PrivateIP: "192.0.2.1", PublicIP: "192.0.2.1"},
"id-1": {PrivateIP: "192.0.2.1", PublicIP: "192.0.2.1"},
"id-2": {PrivateIP: "192.0.2.1", PublicIP: "192.0.2.1"},
},
2022-07-29 06:10:51 +00:00
AzureSubnet: "subnet",
AzureNetworkSecurityGroup: "network-security-group",
AzureWorkerScaleSet: "workers-scale-set",
AzureControlPlaneScaleSet: "controlplanes-scale-set",
2022-04-13 11:01:38 +00:00
}
someErr := errors.New("failed")
testCases := map[string]struct {
2022-09-27 07:22:29 +00:00
tfClient terraformClient
newTfClientErr error
2022-04-13 11:01:38 +00:00
azureclient azureclient
newAzureClientErr error
libvirt *stubLibvirtRunner
2022-04-13 13:09:33 +00:00
provider cloudprovider.Provider
2022-04-13 11:01:38 +00:00
config *config.Config
wantState state.ConstellationState
wantErr bool
wantRollback bool // Use only together with stubClients.
}{
"gcp": {
2022-09-27 07:22:29 +00:00
tfClient: &stubTerraformClient{state: wantGCPState},
2022-04-13 11:01:38 +00:00
provider: cloudprovider.GCP,
config: config.Default(),
wantState: wantGCPState,
},
"gcp newTerraformClient error": {
2022-09-27 07:22:29 +00:00
newTfClientErr: someErr,
provider: cloudprovider.GCP,
config: config.Default(),
wantErr: true,
2022-04-13 11:01:38 +00:00
},
2022-09-27 07:22:29 +00:00
"gcp create cluster error": {
tfClient: &stubTerraformClient{createClusterErr: someErr},
2022-06-09 20:26:36 +00:00
provider: cloudprovider.GCP,
config: config.Default(),
wantErr: true,
wantRollback: true,
},
"qemu": {
tfClient: &stubTerraformClient{state: wantQEMUState},
libvirt: &stubLibvirtRunner{},
provider: cloudprovider.QEMU,
config: config.Default(),
wantState: wantQEMUState,
wantErr: failOnNonAMD64,
},
"qemu newTerraformClient error": {
newTfClientErr: someErr,
libvirt: &stubLibvirtRunner{},
provider: cloudprovider.QEMU,
config: config.Default(),
wantErr: true,
},
"qemu create cluster error": {
tfClient: &stubTerraformClient{createClusterErr: someErr},
libvirt: &stubLibvirtRunner{},
provider: cloudprovider.QEMU,
config: config.Default(),
wantErr: true,
wantRollback: !failOnNonAMD64, // if we run on non-AMD64/linux, we don't get to a point where rollback is needed
},
"qemu start libvirt error": {
tfClient: &stubTerraformClient{state: wantQEMUState},
libvirt: &stubLibvirtRunner{startErr: someErr},
provider: cloudprovider.QEMU,
config: config.Default(),
wantErr: true,
wantRollback: !failOnNonAMD64,
},
2022-04-13 11:01:38 +00:00
"azure": {
azureclient: &fakeAzureClient{},
provider: cloudprovider.Azure,
config: config.Default(),
wantState: wantAzureState,
},
"azure newAzureClient error": {
newAzureClientErr: someErr,
provider: cloudprovider.Azure,
config: config.Default(),
wantErr: true,
},
"azure CreateVirtualNetwork error": {
azureclient: &stubAzureClient{createVirtualNetworkErr: someErr},
provider: cloudprovider.Azure,
config: config.Default(),
wantErr: true,
wantRollback: true,
},
"azure CreateSecurityGroup error": {
azureclient: &stubAzureClient{createSecurityGroupErr: someErr},
provider: cloudprovider.Azure,
config: config.Default(),
wantErr: true,
wantRollback: true,
},
"azure CreateInstances error": {
azureclient: &stubAzureClient{createInstancesErr: someErr},
provider: cloudprovider.Azure,
config: config.Default(),
wantErr: true,
wantRollback: true,
},
"unknown provider": {
provider: cloudprovider.Unknown,
config: config.Default(),
wantErr: true,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
assert := assert.New(t)
creator := &Creator{
out: &bytes.Buffer{},
2022-09-27 07:22:29 +00:00
newTerraformClient: func(ctx context.Context, provider cloudprovider.Provider) (terraformClient, error) {
return tc.tfClient, tc.newTfClientErr
2022-04-13 11:01:38 +00:00
},
newAzureClient: func(subscriptionID, tenantID, name, location, resourceGroup string) (azureclient, error) {
2022-04-13 11:01:38 +00:00
return tc.azureclient, tc.newAzureClientErr
},
newLibvirtRunner: func() libvirtRunner {
return tc.libvirt
},
2022-04-13 11:01:38 +00:00
}
state, err := creator.Create(context.Background(), tc.provider, tc.config, "name", "type", 2, 3)
if tc.wantErr {
assert.Error(err)
if tc.wantRollback {
switch tc.provider {
2022-09-27 07:22:29 +00:00
case cloudprovider.QEMU:
cl := tc.tfClient.(*stubTerraformClient)
assert.True(cl.destroyClusterCalled)
assert.True(cl.cleanUpWorkspaceCalled)
assert.True(tc.libvirt.stopCalled)
2022-04-13 11:01:38 +00:00
case cloudprovider.GCP:
2022-09-27 07:22:29 +00:00
cl := tc.tfClient.(*stubTerraformClient)
assert.True(cl.destroyClusterCalled)
assert.True(cl.cleanUpWorkspaceCalled)
2022-04-13 11:01:38 +00:00
case cloudprovider.Azure:
cl := tc.azureclient.(*stubAzureClient)
assert.True(cl.terminateResourceGroupResourcesCalled)
2022-04-13 11:01:38 +00:00
}
}
} else {
assert.NoError(err)
assert.Equal(tc.wantState, state)
}
})
}
}