2022-09-05 03:06:08 -04:00
|
|
|
/*
|
|
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2023-03-30 10:13:14 -04:00
|
|
|
package kubernetes
|
2022-08-29 10:49:44 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2023-02-09 09:54:12 -05:00
|
|
|
"io"
|
2022-08-29 10:49:44 -04:00
|
|
|
"testing"
|
|
|
|
|
2023-07-24 06:15:11 -04:00
|
|
|
kerrors "k8s.io/apimachinery/pkg/api/errors"
|
|
|
|
|
2022-11-15 09:40:49 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/measurements"
|
2023-06-09 09:41:02 -04:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
|
2023-05-23 03:17:27 -04:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
2023-02-28 04:23:09 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/compatibility"
|
2023-03-03 03:38:23 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/config"
|
2022-09-21 07:47:57 -04:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
2023-02-09 09:54:12 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/logger"
|
2023-03-03 03:38:23 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/versions"
|
2023-02-09 09:54:12 -05:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/versions/components"
|
|
|
|
updatev1alpha1 "github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/v2/api/v1alpha1"
|
2022-08-29 10:49:44 -04:00
|
|
|
"github.com/stretchr/testify/assert"
|
2023-07-24 06:15:11 -04:00
|
|
|
"github.com/stretchr/testify/mock"
|
2022-08-29 10:49:44 -04:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
2023-02-09 09:54:12 -05:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2022-08-29 10:49:44 -04:00
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
2023-02-09 09:54:12 -05:00
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
2023-07-24 06:15:11 -04:00
|
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
2022-08-29 10:49:44 -04:00
|
|
|
)
|
|
|
|
|
2023-03-03 03:38:23 -05:00
|
|
|
func TestUpgradeNodeVersion(t *testing.T) {
|
2023-02-09 09:54:12 -05:00
|
|
|
someErr := errors.New("some error")
|
|
|
|
testCases := map[string]struct {
|
2023-03-03 03:38:23 -05:00
|
|
|
stable *stubStableClient
|
|
|
|
conditions []metav1.Condition
|
|
|
|
currentImageVersion string
|
2023-04-13 09:58:37 -04:00
|
|
|
newImageReference string
|
|
|
|
badImageVersion string
|
2023-03-03 03:38:23 -05:00
|
|
|
currentClusterVersion string
|
|
|
|
conf *config.Config
|
2023-06-21 09:49:42 -04:00
|
|
|
force bool
|
2023-03-03 03:38:23 -05:00
|
|
|
getErr error
|
|
|
|
wantErr bool
|
|
|
|
wantUpdate bool
|
|
|
|
assertCorrectError func(t *testing.T, err error) bool
|
2023-07-24 06:15:11 -04:00
|
|
|
customClientFn func(nodeVersion updatev1alpha1.NodeVersion) DynamicInterface
|
2023-02-09 09:54:12 -05:00
|
|
|
}{
|
|
|
|
"success": {
|
2023-03-03 03:38:23 -05:00
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
2023-03-03 03:38:23 -05:00
|
|
|
},
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
wantUpdate: true,
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
"only k8s upgrade": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.2"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
2023-03-03 03:38:23 -05:00
|
|
|
},
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
wantUpdate: true,
|
|
|
|
wantErr: true,
|
2023-02-09 09:54:12 -05:00
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
2023-04-13 09:58:37 -04:00
|
|
|
var upgradeErr *compatibility.InvalidUpgradeError
|
2023-03-03 03:38:23 -05:00
|
|
|
return assert.ErrorAs(t, err, &upgradeErr)
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
"only image upgrade": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[0]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
2023-02-09 09:54:12 -05:00
|
|
|
stable: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: true,
|
2023-03-03 03:38:23 -05:00
|
|
|
wantErr: true,
|
2023-02-09 09:54:12 -05:00
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
2023-04-13 09:58:37 -04:00
|
|
|
var upgradeErr *compatibility.InvalidUpgradeError
|
2023-03-03 03:38:23 -05:00
|
|
|
return assert.ErrorAs(t, err, &upgradeErr)
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
"not an upgrade": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.2"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[0]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{},
|
|
|
|
wantErr: true,
|
2023-02-09 09:54:12 -05:00
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
2023-04-13 09:58:37 -04:00
|
|
|
var upgradeErr *compatibility.InvalidUpgradeError
|
2023-03-03 03:38:23 -05:00
|
|
|
return assert.ErrorAs(t, err, &upgradeErr)
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
|
|
|
},
|
|
|
|
"upgrade in progress": {
|
2023-03-03 03:38:23 -05:00
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
2023-02-09 09:54:12 -05:00
|
|
|
conditions: []metav1.Condition{{
|
|
|
|
Type: updatev1alpha1.ConditionOutdated,
|
|
|
|
Status: metav1.ConditionTrue,
|
|
|
|
}},
|
2023-03-03 03:38:23 -05:00
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{},
|
|
|
|
wantErr: true,
|
2023-02-09 09:54:12 -05:00
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
|
|
|
return assert.ErrorIs(t, err, ErrInProgress)
|
|
|
|
},
|
|
|
|
},
|
2023-06-21 09:49:42 -04:00
|
|
|
"success with force and upgrade in progress": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
conditions: []metav1.Condition{{
|
|
|
|
Type: updatev1alpha1.ConditionOutdated,
|
|
|
|
Status: metav1.ConditionTrue,
|
|
|
|
}},
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{},
|
|
|
|
force: true,
|
|
|
|
wantUpdate: true,
|
|
|
|
},
|
2023-02-09 09:54:12 -05:00
|
|
|
"get error": {
|
2023-03-03 03:38:23 -05:00
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
return conf
|
|
|
|
}(),
|
2023-02-09 09:54:12 -05:00
|
|
|
getErr: someErr,
|
|
|
|
wantErr: true,
|
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
|
|
|
return assert.ErrorIs(t, err, someErr)
|
|
|
|
},
|
|
|
|
},
|
2023-04-13 09:58:37 -04:00
|
|
|
"image too new valid k8s": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.4.2"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
newImageReference: "path/to/image:v1.4.2",
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: true,
|
|
|
|
wantErr: true,
|
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
2023-06-30 10:46:05 -04:00
|
|
|
var upgradeErr *compatibility.InvalidUpgradeError
|
2023-04-13 09:58:37 -04:00
|
|
|
return assert.ErrorAs(t, err, &upgradeErr)
|
|
|
|
},
|
|
|
|
},
|
2023-06-21 09:49:42 -04:00
|
|
|
"success with force and image too new": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.4.2"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
newImageReference: "path/to/image:v1.4.2",
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: true,
|
|
|
|
force: true,
|
|
|
|
},
|
2023-04-13 09:58:37 -04:00
|
|
|
"apply returns bad object": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
badImageVersion: "v3.2.1",
|
|
|
|
stable: &stubStableClient{
|
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: true,
|
|
|
|
wantErr: true,
|
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
|
|
|
var target *applyError
|
|
|
|
return assert.ErrorAs(t, err, &target)
|
|
|
|
},
|
|
|
|
},
|
2023-06-05 03:13:02 -04:00
|
|
|
"outdated k8s version skips k8s upgrade": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.2"
|
|
|
|
conf.KubernetesVersion = "v1.25.8"
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: false,
|
|
|
|
wantErr: true,
|
|
|
|
assertCorrectError: func(t *testing.T, err error) bool {
|
|
|
|
var upgradeErr *compatibility.InvalidUpgradeError
|
|
|
|
return assert.ErrorAs(t, err, &upgradeErr)
|
|
|
|
},
|
|
|
|
},
|
2023-07-24 06:15:11 -04:00
|
|
|
"succeed after update retry when the updated node object is outdated": {
|
|
|
|
conf: func() *config.Config {
|
|
|
|
conf := config.Default()
|
|
|
|
conf.Image = "v1.2.3"
|
|
|
|
conf.KubernetesVersion = versions.SupportedK8sVersions()[1]
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
currentImageVersion: "v1.2.2",
|
|
|
|
currentClusterVersion: versions.SupportedK8sVersions()[0],
|
|
|
|
stable: &stubStableClient{
|
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}`),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantUpdate: false, // because customClient is used
|
|
|
|
customClientFn: func(nodeVersion updatev1alpha1.NodeVersion) DynamicInterface {
|
|
|
|
fakeClient := &fakeDynamicClient{}
|
|
|
|
fakeClient.On("GetCurrent", mock.Anything, mock.Anything).Return(unstructedObjectWithGeneration(nodeVersion, 1), nil)
|
|
|
|
fakeClient.On("Update", mock.Anything, mock.Anything).Return(nil, kerrors.NewConflict(schema.GroupResource{Resource: nodeVersion.Name}, nodeVersion.Name, nil)).Once()
|
|
|
|
fakeClient.On("Update", mock.Anything, mock.Anything).Return(unstructedObjectWithGeneration(nodeVersion, 2), nil).Once()
|
|
|
|
return fakeClient
|
|
|
|
},
|
|
|
|
},
|
2023-02-09 09:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
require := require.New(t)
|
|
|
|
|
|
|
|
nodeVersion := updatev1alpha1.NodeVersion{
|
|
|
|
Spec: updatev1alpha1.NodeVersionSpec{
|
2023-03-03 03:38:23 -05:00
|
|
|
ImageVersion: tc.currentImageVersion,
|
|
|
|
KubernetesClusterVersion: tc.currentClusterVersion,
|
2023-02-09 09:54:12 -05:00
|
|
|
},
|
|
|
|
Status: updatev1alpha1.NodeVersionStatus{
|
|
|
|
Conditions: tc.conditions,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2023-04-13 09:58:37 -04:00
|
|
|
var badUpdatedObject *unstructured.Unstructured
|
|
|
|
if tc.badImageVersion != "" {
|
|
|
|
nodeVersion.Spec.ImageVersion = tc.badImageVersion
|
|
|
|
unstrBadNodeVersion, err := runtime.DefaultUnstructuredConverter.ToUnstructured(&nodeVersion)
|
|
|
|
require.NoError(err)
|
|
|
|
badUpdatedObject = &unstructured.Unstructured{Object: unstrBadNodeVersion}
|
|
|
|
}
|
|
|
|
|
2023-07-24 06:15:11 -04:00
|
|
|
unstrNodeVersion, err := runtime.DefaultUnstructuredConverter.ToUnstructured(&nodeVersion)
|
|
|
|
require.NoError(err)
|
2023-04-13 09:58:37 -04:00
|
|
|
dynamicClient := &stubDynamicClient{object: &unstructured.Unstructured{Object: unstrNodeVersion}, badUpdatedObject: badUpdatedObject, getErr: tc.getErr}
|
2023-02-09 09:54:12 -05:00
|
|
|
upgrader := Upgrader{
|
|
|
|
stableInterface: tc.stable,
|
|
|
|
dynamicInterface: dynamicClient,
|
2023-04-13 09:58:37 -04:00
|
|
|
imageFetcher: &stubImageFetcher{reference: tc.newImageReference},
|
2023-02-09 09:54:12 -05:00
|
|
|
log: logger.NewTest(t),
|
|
|
|
outWriter: io.Discard,
|
|
|
|
}
|
2023-07-24 06:15:11 -04:00
|
|
|
if tc.customClientFn != nil {
|
|
|
|
upgrader.dynamicInterface = tc.customClientFn(nodeVersion)
|
|
|
|
}
|
2023-02-09 09:54:12 -05:00
|
|
|
|
2023-06-21 09:49:42 -04:00
|
|
|
err = upgrader.UpgradeNodeVersion(context.Background(), tc.conf, tc.force)
|
2023-02-09 09:54:12 -05:00
|
|
|
// Check upgrades first because if we checked err first, UpgradeImage may error due to other reasons and still trigger an upgrade.
|
|
|
|
if tc.wantUpdate {
|
|
|
|
assert.NotNil(dynamicClient.updatedObject)
|
|
|
|
} else {
|
|
|
|
assert.Nil(dynamicClient.updatedObject)
|
|
|
|
}
|
|
|
|
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
tc.assertCorrectError(t, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
assert.NoError(err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-29 10:49:44 -04:00
|
|
|
func TestUpdateMeasurements(t *testing.T) {
|
|
|
|
someErr := errors.New("error")
|
|
|
|
testCases := map[string]struct {
|
2023-05-03 05:11:53 -04:00
|
|
|
updater *stubStableClient
|
|
|
|
newConfig config.AttestationCfg
|
|
|
|
wantUpdate bool
|
|
|
|
wantErr bool
|
2022-08-29 10:49:44 -04:00
|
|
|
}{
|
|
|
|
"success": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"measurements":{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}}`),
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xBB, measurements.Enforce, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
wantUpdate: true,
|
|
|
|
},
|
|
|
|
"measurements are the same": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"measurements":{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}}`),
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xAA, measurements.Enforce, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
},
|
2023-03-14 13:34:58 -04:00
|
|
|
"setting warnOnly to true is allowed": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"measurements":{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}}`),
|
2022-11-24 04:57:58 -05:00
|
|
|
},
|
|
|
|
},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xAA, measurements.WarnOnly, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
2022-11-24 04:57:58 -05:00
|
|
|
},
|
2023-03-14 13:34:58 -04:00
|
|
|
wantUpdate: true,
|
2022-11-24 04:57:58 -05:00
|
|
|
},
|
|
|
|
"setting warnOnly to false is allowed": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"measurements":{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":true}}}`),
|
2022-11-24 04:57:58 -05:00
|
|
|
},
|
|
|
|
},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xAA, measurements.Enforce, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
2022-11-24 04:57:58 -05:00
|
|
|
},
|
|
|
|
wantUpdate: true,
|
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
"getCurrent error": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{getErr: someErr},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xBB, measurements.Enforce, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"update error": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updater: &stubStableClient{
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps: map[string]*corev1.ConfigMap{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.JoinConfigMap: newJoinConfigMap(`{"measurements":{"0":{"expected":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA","warnOnly":false}}}`),
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
updateErr: someErr,
|
|
|
|
},
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfig: &config.GCPSEVES{
|
|
|
|
Measurements: measurements.M{
|
2023-03-10 05:33:06 -05:00
|
|
|
0: measurements.WithAllBytes(0xBB, measurements.Enforce, measurements.PCRMeasurementLength),
|
2023-05-03 05:11:53 -04:00
|
|
|
},
|
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
upgrader := &Upgrader{
|
2022-11-24 10:39:33 -05:00
|
|
|
stableInterface: tc.updater,
|
2023-02-09 09:54:12 -05:00
|
|
|
outWriter: io.Discard,
|
|
|
|
log: logger.NewTest(t),
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
|
2023-05-03 05:11:53 -04:00
|
|
|
err := upgrader.UpdateAttestationConfig(context.Background(), tc.newConfig)
|
2022-08-29 10:49:44 -04:00
|
|
|
if tc.wantErr {
|
2022-11-24 04:57:58 -05:00
|
|
|
assert.Error(err)
|
2022-08-29 10:49:44 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.NoError(err)
|
|
|
|
if tc.wantUpdate {
|
2023-05-03 05:11:53 -04:00
|
|
|
newConfigJSON, err := json.Marshal(tc.newConfig)
|
2022-08-29 10:49:44 -04:00
|
|
|
require.NoError(t, err)
|
2023-05-03 05:11:53 -04:00
|
|
|
assert.JSONEq(string(newConfigJSON), tc.updater.updatedConfigMaps[constants.JoinConfigMap].Data[constants.AttestationConfigFilename])
|
2022-08-29 10:49:44 -04:00
|
|
|
} else {
|
2023-03-22 06:53:47 -04:00
|
|
|
assert.Nil(tc.updater.updatedConfigMaps)
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestUpdateImage(t *testing.T) {
|
|
|
|
someErr := errors.New("error")
|
|
|
|
testCases := map[string]struct {
|
2022-11-29 05:39:07 -05:00
|
|
|
newImageReference string
|
|
|
|
newImageVersion string
|
2023-03-03 03:38:23 -05:00
|
|
|
oldImageReference string
|
2023-02-09 09:54:12 -05:00
|
|
|
oldImageVersion string
|
|
|
|
updateErr error
|
2022-11-29 05:39:07 -05:00
|
|
|
wantUpdate bool
|
|
|
|
wantErr bool
|
2022-08-29 10:49:44 -04:00
|
|
|
}{
|
|
|
|
"success": {
|
2023-03-03 03:38:23 -05:00
|
|
|
oldImageReference: "old-image-ref",
|
|
|
|
oldImageVersion: "v0.0.0",
|
|
|
|
newImageReference: "new-image-ref",
|
|
|
|
newImageVersion: "v0.1.0",
|
|
|
|
wantUpdate: true,
|
|
|
|
},
|
|
|
|
"same version fails": {
|
|
|
|
oldImageVersion: "v0.0.0",
|
|
|
|
newImageVersion: "v0.0.0",
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"update error": {
|
|
|
|
updateErr: someErr,
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
upgrader := &Upgrader{
|
|
|
|
log: logger.NewTest(t),
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeVersion := updatev1alpha1.NodeVersion{
|
2023-02-09 09:54:12 -05:00
|
|
|
Spec: updatev1alpha1.NodeVersionSpec{
|
2023-03-03 03:38:23 -05:00
|
|
|
ImageReference: tc.oldImageReference,
|
|
|
|
ImageVersion: tc.oldImageVersion,
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
}
|
|
|
|
|
2023-06-21 09:49:42 -04:00
|
|
|
err := upgrader.updateImage(&nodeVersion, tc.newImageReference, tc.newImageVersion, false)
|
2023-03-03 03:38:23 -05:00
|
|
|
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.NoError(err)
|
|
|
|
if tc.wantUpdate {
|
|
|
|
assert.Equal(tc.newImageReference, nodeVersion.Spec.ImageReference)
|
|
|
|
assert.Equal(tc.newImageVersion, nodeVersion.Spec.ImageVersion)
|
|
|
|
} else {
|
|
|
|
assert.Equal(tc.oldImageReference, nodeVersion.Spec.ImageReference)
|
|
|
|
assert.Equal(tc.oldImageVersion, nodeVersion.Spec.ImageVersion)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestUpdateK8s(t *testing.T) {
|
|
|
|
someErr := errors.New("error")
|
|
|
|
testCases := map[string]struct {
|
|
|
|
newClusterVersion string
|
|
|
|
oldClusterVersion string
|
|
|
|
updateErr error
|
|
|
|
wantUpdate bool
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
"success": {
|
|
|
|
oldClusterVersion: "v0.0.0",
|
|
|
|
newClusterVersion: "v0.1.0",
|
2022-11-29 05:39:07 -05:00
|
|
|
wantUpdate: true,
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
2023-03-03 03:38:23 -05:00
|
|
|
"same version fails": {
|
|
|
|
oldClusterVersion: "v0.0.0",
|
|
|
|
newClusterVersion: "v0.0.0",
|
|
|
|
wantErr: true,
|
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
"update error": {
|
2023-02-09 09:54:12 -05:00
|
|
|
updateErr: someErr,
|
|
|
|
wantErr: true,
|
2022-08-29 10:49:44 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
upgrader := &Upgrader{
|
2023-03-03 03:38:23 -05:00
|
|
|
log: logger.NewTest(t),
|
|
|
|
}
|
|
|
|
|
|
|
|
nodeVersion := updatev1alpha1.NodeVersion{
|
|
|
|
Spec: updatev1alpha1.NodeVersionSpec{
|
|
|
|
KubernetesClusterVersion: tc.oldClusterVersion,
|
|
|
|
},
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
|
2023-06-21 09:49:42 -04:00
|
|
|
_, err := upgrader.updateK8s(&nodeVersion, tc.newClusterVersion, components.Components{}, false)
|
2022-08-29 10:49:44 -04:00
|
|
|
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.NoError(err)
|
|
|
|
if tc.wantUpdate {
|
2023-03-03 03:38:23 -05:00
|
|
|
assert.Equal(tc.newClusterVersion, nodeVersion.Spec.KubernetesClusterVersion)
|
2022-08-29 10:49:44 -04:00
|
|
|
} else {
|
2023-03-03 03:38:23 -05:00
|
|
|
assert.Equal(tc.oldClusterVersion, nodeVersion.Spec.KubernetesClusterVersion)
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-22 06:53:47 -04:00
|
|
|
func newJoinConfigMap(data string) *corev1.ConfigMap {
|
|
|
|
return &corev1.ConfigMap{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: constants.JoinConfigMap,
|
|
|
|
},
|
|
|
|
Data: map[string]string{
|
2023-05-03 05:11:53 -04:00
|
|
|
constants.AttestationConfigFilename: data,
|
2023-03-22 06:53:47 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-24 06:15:11 -04:00
|
|
|
type fakeDynamicClient struct {
|
|
|
|
mock.Mock
|
|
|
|
}
|
|
|
|
|
|
|
|
func (u *fakeDynamicClient) GetCurrent(ctx context.Context, str string) (*unstructured.Unstructured, error) {
|
|
|
|
args := u.Called(ctx, str)
|
|
|
|
return args.Get(0).(*unstructured.Unstructured), args.Error(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (u *fakeDynamicClient) Update(ctx context.Context, updatedObject *unstructured.Unstructured) (*unstructured.Unstructured, error) {
|
|
|
|
args := u.Called(ctx, updatedObject)
|
|
|
|
if args.Get(0) == nil {
|
|
|
|
return nil, args.Error(1)
|
|
|
|
}
|
|
|
|
return updatedObject, args.Error(1)
|
|
|
|
}
|
|
|
|
|
2023-02-09 09:54:12 -05:00
|
|
|
type stubDynamicClient struct {
|
2023-04-13 09:58:37 -04:00
|
|
|
object *unstructured.Unstructured
|
|
|
|
updatedObject *unstructured.Unstructured
|
|
|
|
badUpdatedObject *unstructured.Unstructured
|
|
|
|
getErr error
|
|
|
|
updateErr error
|
2023-02-09 09:54:12 -05:00
|
|
|
}
|
|
|
|
|
2023-03-24 06:51:18 -04:00
|
|
|
func (u *stubDynamicClient) GetCurrent(_ context.Context, _ string) (*unstructured.Unstructured, error) {
|
2023-02-09 09:54:12 -05:00
|
|
|
return u.object, u.getErr
|
|
|
|
}
|
|
|
|
|
2023-03-24 06:51:18 -04:00
|
|
|
func (u *stubDynamicClient) Update(_ context.Context, updatedObject *unstructured.Unstructured) (*unstructured.Unstructured, error) {
|
2023-02-09 09:54:12 -05:00
|
|
|
u.updatedObject = updatedObject
|
2023-04-13 09:58:37 -04:00
|
|
|
if u.badUpdatedObject != nil {
|
|
|
|
return u.badUpdatedObject, u.updateErr
|
|
|
|
}
|
2023-02-09 09:54:12 -05:00
|
|
|
return u.updatedObject, u.updateErr
|
|
|
|
}
|
|
|
|
|
|
|
|
type stubStableClient struct {
|
2023-03-22 06:53:47 -04:00
|
|
|
configMaps map[string]*corev1.ConfigMap
|
|
|
|
updatedConfigMaps map[string]*corev1.ConfigMap
|
|
|
|
k8sVersion string
|
|
|
|
getErr error
|
|
|
|
updateErr error
|
|
|
|
createErr error
|
|
|
|
k8sErr error
|
2023-02-09 09:54:12 -05:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:02:01 -04:00
|
|
|
func (s *stubStableClient) GetCurrentConfigMap(_ context.Context, name string) (*corev1.ConfigMap, error) {
|
2023-03-22 06:53:47 -04:00
|
|
|
return s.configMaps[name], s.getErr
|
2023-02-09 09:54:12 -05:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:02:01 -04:00
|
|
|
func (s *stubStableClient) UpdateConfigMap(_ context.Context, configMap *corev1.ConfigMap) (*corev1.ConfigMap, error) {
|
2023-03-22 06:53:47 -04:00
|
|
|
if s.updatedConfigMaps == nil {
|
|
|
|
s.updatedConfigMaps = map[string]*corev1.ConfigMap{}
|
|
|
|
}
|
|
|
|
s.updatedConfigMaps[configMap.ObjectMeta.Name] = configMap
|
|
|
|
return s.updatedConfigMaps[configMap.ObjectMeta.Name], s.updateErr
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:02:01 -04:00
|
|
|
func (s *stubStableClient) CreateConfigMap(_ context.Context, configMap *corev1.ConfigMap) (*corev1.ConfigMap, error) {
|
2023-03-22 06:53:47 -04:00
|
|
|
if s.configMaps == nil {
|
|
|
|
s.configMaps = map[string]*corev1.ConfigMap{}
|
|
|
|
}
|
|
|
|
s.configMaps[configMap.ObjectMeta.Name] = configMap
|
|
|
|
return s.configMaps[configMap.ObjectMeta.Name], s.createErr
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:02:01 -04:00
|
|
|
func (s *stubStableClient) KubernetesVersion() (string, error) {
|
2023-02-09 09:54:12 -05:00
|
|
|
return s.k8sVersion, s.k8sErr
|
2022-08-29 10:49:44 -04:00
|
|
|
}
|
2023-03-30 10:13:14 -04:00
|
|
|
|
|
|
|
type stubImageFetcher struct {
|
|
|
|
reference string
|
|
|
|
fetchReferenceErr error
|
|
|
|
}
|
|
|
|
|
2023-05-23 03:17:27 -04:00
|
|
|
func (f *stubImageFetcher) FetchReference(_ context.Context,
|
|
|
|
_ cloudprovider.Provider, _ variant.Variant,
|
|
|
|
_, _ string,
|
|
|
|
) (string, error) {
|
2023-03-30 10:13:14 -04:00
|
|
|
return f.reference, f.fetchReferenceErr
|
|
|
|
}
|
2023-07-24 06:15:11 -04:00
|
|
|
|
|
|
|
func unstructedObjectWithGeneration(nodeVersion updatev1alpha1.NodeVersion, generation int64) *unstructured.Unstructured {
|
|
|
|
unstrNodeVersion, _ := runtime.DefaultUnstructuredConverter.ToUnstructured(&nodeVersion)
|
|
|
|
object := &unstructured.Unstructured{Object: unstrNodeVersion}
|
|
|
|
object.SetGeneration(generation)
|
|
|
|
return object
|
|
|
|
}
|