2022-03-22 11:03:15 -04:00
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
2022-08-02 06:24:55 -04:00
|
|
|
"reflect"
|
2022-03-22 11:03:15 -04:00
|
|
|
"testing"
|
|
|
|
|
2022-06-07 05:08:44 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/cloud/cloudprovider"
|
2022-08-31 11:35:33 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/config/instancetypes"
|
2022-05-13 05:56:43 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/constants"
|
2022-05-16 11:32:00 -04:00
|
|
|
"github.com/edgelesssys/constellation/internal/file"
|
2022-03-22 11:03:15 -04:00
|
|
|
"github.com/spf13/afero"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
2022-06-30 09:24:36 -04:00
|
|
|
"go.uber.org/goleak"
|
2022-03-22 11:03:15 -04:00
|
|
|
)
|
|
|
|
|
2022-08-29 08:18:05 -04:00
|
|
|
const defaultMsgCount = 12 // expect this number of error messages by default because user-specific values are not set
|
2022-08-25 08:06:29 -04:00
|
|
|
|
2022-06-30 09:24:36 -04:00
|
|
|
func TestMain(m *testing.M) {
|
|
|
|
goleak.VerifyTestMain(m)
|
|
|
|
}
|
|
|
|
|
2022-03-22 11:03:15 -04:00
|
|
|
func TestDefaultConfig(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
def := Default()
|
|
|
|
assert.NotNil(def)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFromFile(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
2022-05-16 12:54:25 -04:00
|
|
|
config *Config
|
|
|
|
configName string
|
|
|
|
wantResult *Config
|
|
|
|
wantErr bool
|
2022-03-22 11:03:15 -04:00
|
|
|
}{
|
2022-05-16 12:54:25 -04:00
|
|
|
"default config from default file": {
|
|
|
|
config: Default(),
|
|
|
|
configName: constants.ConfigFilename,
|
|
|
|
wantResult: Default(),
|
|
|
|
},
|
|
|
|
"default config from different path": {
|
|
|
|
config: Default(),
|
|
|
|
configName: "other-config.yaml",
|
|
|
|
wantResult: Default(),
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
2022-05-16 12:54:25 -04:00
|
|
|
"default config when path empty": {
|
|
|
|
config: nil,
|
|
|
|
configName: "",
|
2022-08-08 05:04:17 -04:00
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
2022-05-16 12:54:25 -04:00
|
|
|
"err when path not exist": {
|
|
|
|
config: nil,
|
|
|
|
configName: "wrong-name.yaml",
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"custom config from default file": {
|
|
|
|
config: &Config{
|
2022-05-24 05:57:48 -04:00
|
|
|
Version: Version1,
|
|
|
|
AutoscalingNodeGroupMin: 42,
|
|
|
|
AutoscalingNodeGroupMax: 1337,
|
2022-05-16 12:54:25 -04:00
|
|
|
},
|
|
|
|
configName: constants.ConfigFilename,
|
|
|
|
wantResult: &Config{
|
2022-05-24 05:57:48 -04:00
|
|
|
Version: Version1,
|
|
|
|
AutoscalingNodeGroupMin: 42,
|
|
|
|
AutoscalingNodeGroupMax: 1337,
|
2022-05-16 12:54:25 -04:00
|
|
|
},
|
|
|
|
},
|
|
|
|
"modify default config": {
|
|
|
|
config: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.Provider.GCP.Region = "eu-north1"
|
|
|
|
conf.Provider.GCP.Zone = "eu-north1-a"
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
configName: constants.ConfigFilename,
|
|
|
|
wantResult: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.Provider.GCP.Region = "eu-north1"
|
|
|
|
conf.Provider.GCP.Zone = "eu-north1-a"
|
|
|
|
return conf
|
|
|
|
}(),
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
require := require.New(t)
|
|
|
|
|
|
|
|
fileHandler := file.NewHandler(afero.NewMemMapFs())
|
2022-05-16 12:54:25 -04:00
|
|
|
if tc.config != nil {
|
|
|
|
require.NoError(fileHandler.WriteYAML(tc.configName, tc.config, file.OptNone))
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
|
|
|
result, err := FromFile(fileHandler, tc.configName)
|
|
|
|
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
} else {
|
|
|
|
require.NoError(err)
|
2022-05-16 12:54:25 -04:00
|
|
|
assert.Equal(tc.wantResult, result)
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-05-18 05:39:14 -04:00
|
|
|
|
2022-05-18 12:10:57 -04:00
|
|
|
func TestFromFileStrictErrors(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
yamlConfig string
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
"valid config": {
|
|
|
|
yamlConfig: `
|
2022-05-24 05:57:48 -04:00
|
|
|
autoscalingNodeGroupMin: 5
|
|
|
|
autoscalingNodeGroupMax: 10
|
2022-05-18 12:10:57 -04:00
|
|
|
stateDisksizeGB: 25
|
|
|
|
`,
|
|
|
|
},
|
|
|
|
"typo": {
|
|
|
|
yamlConfig: `
|
2022-05-24 05:57:48 -04:00
|
|
|
autoscalingNodeGroupMini: 5
|
|
|
|
autoscalingNodeGroupMax: 10
|
2022-05-18 12:10:57 -04:00
|
|
|
stateDisksizeGB: 25
|
|
|
|
`,
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"unsupported version": {
|
|
|
|
yamlConfig: `
|
|
|
|
version: v5
|
2022-05-24 05:57:48 -04:00
|
|
|
autoscalingNodeGroupMin: 1
|
|
|
|
autoscalingNodeGroupMax: 10
|
2022-05-18 12:10:57 -04:00
|
|
|
stateDisksizeGB: 30
|
|
|
|
`,
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
fileHandler := file.NewHandler(afero.NewMemMapFs())
|
|
|
|
err := fileHandler.Write(constants.ConfigFilename, []byte(tc.yamlConfig), file.OptNone)
|
|
|
|
assert.NoError(err)
|
|
|
|
|
|
|
|
_, err = FromFile(fileHandler, constants.ConfigFilename)
|
|
|
|
assert.Error(err)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-23 09:01:39 -04:00
|
|
|
func TestValidate(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
cnf *Config
|
|
|
|
wantMsgCount int
|
|
|
|
}{
|
|
|
|
"default config is valid": {
|
|
|
|
cnf: Default(),
|
2022-08-25 08:06:29 -04:00
|
|
|
wantMsgCount: defaultMsgCount,
|
2022-05-23 09:01:39 -04:00
|
|
|
},
|
|
|
|
"config with 1 error": {
|
|
|
|
cnf: func() *Config {
|
|
|
|
cnf := Default()
|
|
|
|
cnf.Version = "v0"
|
|
|
|
return cnf
|
|
|
|
}(),
|
2022-08-25 08:06:29 -04:00
|
|
|
wantMsgCount: defaultMsgCount + 1,
|
2022-05-23 09:01:39 -04:00
|
|
|
},
|
|
|
|
"config with 2 errors": {
|
|
|
|
cnf: func() *Config {
|
|
|
|
cnf := Default()
|
|
|
|
cnf.Version = "v0"
|
|
|
|
cnf.StateDiskSizeGB = -1
|
|
|
|
return cnf
|
|
|
|
}(),
|
2022-08-25 08:06:29 -04:00
|
|
|
wantMsgCount: defaultMsgCount + 2,
|
2022-05-23 09:01:39 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
require := require.New(t)
|
|
|
|
|
|
|
|
msgs, err := tc.cnf.Validate()
|
|
|
|
require.NoError(err)
|
|
|
|
assert.Len(msgs, tc.wantMsgCount)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestHasProvider(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
assert.False((&Config{}).HasProvider(cloudprovider.Unknown))
|
|
|
|
assert.False((&Config{}).HasProvider(cloudprovider.Azure))
|
|
|
|
assert.False((&Config{}).HasProvider(cloudprovider.GCP))
|
|
|
|
assert.False((&Config{}).HasProvider(cloudprovider.QEMU))
|
|
|
|
assert.False(Default().HasProvider(cloudprovider.Unknown))
|
|
|
|
assert.True(Default().HasProvider(cloudprovider.Azure))
|
|
|
|
assert.True(Default().HasProvider(cloudprovider.GCP))
|
|
|
|
cnfWithAzure := Config{Provider: ProviderConfig{Azure: &AzureConfig{}}}
|
|
|
|
assert.False(cnfWithAzure.HasProvider(cloudprovider.Unknown))
|
|
|
|
assert.True(cnfWithAzure.HasProvider(cloudprovider.Azure))
|
|
|
|
assert.False(cnfWithAzure.HasProvider(cloudprovider.GCP))
|
|
|
|
}
|
|
|
|
|
2022-08-01 03:37:05 -04:00
|
|
|
func TestImage(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
cfg *Config
|
|
|
|
wantImage string
|
|
|
|
}{
|
|
|
|
"default azure": {
|
|
|
|
cfg: func() *Config { c := Default(); c.RemoveProviderExcept(cloudprovider.Azure); return c }(),
|
|
|
|
wantImage: Default().Provider.Azure.Image,
|
|
|
|
},
|
|
|
|
"default gcp": {
|
|
|
|
cfg: func() *Config { c := Default(); c.RemoveProviderExcept(cloudprovider.GCP); return c }(),
|
|
|
|
wantImage: Default().Provider.GCP.Image,
|
|
|
|
},
|
|
|
|
"default qemu": {
|
|
|
|
cfg: func() *Config { c := Default(); c.RemoveProviderExcept(cloudprovider.QEMU); return c }(),
|
|
|
|
wantImage: "",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
image := tc.cfg.Image()
|
|
|
|
assert.Equal(tc.wantImage, image)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-18 05:39:14 -04:00
|
|
|
func TestConfigRemoveProviderExcept(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
removeExcept cloudprovider.Provider
|
|
|
|
wantAzure *AzureConfig
|
|
|
|
wantGCP *GCPConfig
|
|
|
|
wantQEMU *QEMUConfig
|
|
|
|
}{
|
|
|
|
"except azure": {
|
|
|
|
removeExcept: cloudprovider.Azure,
|
|
|
|
wantAzure: Default().Provider.Azure,
|
|
|
|
},
|
|
|
|
"except gcp": {
|
|
|
|
removeExcept: cloudprovider.GCP,
|
|
|
|
wantGCP: Default().Provider.GCP,
|
|
|
|
},
|
|
|
|
"except qemu": {
|
|
|
|
removeExcept: cloudprovider.QEMU,
|
|
|
|
wantQEMU: Default().Provider.QEMU,
|
|
|
|
},
|
|
|
|
"unknown provider": {
|
|
|
|
removeExcept: cloudprovider.Unknown,
|
|
|
|
wantAzure: Default().Provider.Azure,
|
|
|
|
wantGCP: Default().Provider.GCP,
|
|
|
|
wantQEMU: Default().Provider.QEMU,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(tc.removeExcept)
|
|
|
|
|
|
|
|
assert.Equal(tc.wantAzure, conf.Provider.Azure)
|
|
|
|
assert.Equal(tc.wantGCP, conf.Provider.GCP)
|
|
|
|
assert.Equal(tc.wantQEMU, conf.Provider.QEMU)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-05-18 12:10:57 -04:00
|
|
|
|
|
|
|
func TestConfigGeneratedDocsFresh(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
2022-08-02 06:24:55 -04:00
|
|
|
updateMsg := "remember to re-generate config docs! 🔨"
|
|
|
|
|
|
|
|
assert.Len(ConfigDoc.Fields, reflect.ValueOf(Config{}).NumField(), updateMsg)
|
2022-08-29 10:49:44 -04:00
|
|
|
assert.Len(UpgradeConfigDoc.Fields, reflect.ValueOf(UpgradeConfig{}).NumField(), updateMsg)
|
2022-08-02 06:24:55 -04:00
|
|
|
assert.Len(UserKeyDoc.Fields, reflect.ValueOf(UserKey{}).NumField(), updateMsg)
|
|
|
|
assert.Len(FirewallRuleDoc.Fields, reflect.ValueOf(FirewallRule{}).NumField(), updateMsg)
|
|
|
|
assert.Len(ProviderConfigDoc.Fields, reflect.ValueOf(ProviderConfig{}).NumField(), updateMsg)
|
|
|
|
assert.Len(AzureConfigDoc.Fields, reflect.ValueOf(AzureConfig{}).NumField(), updateMsg)
|
|
|
|
assert.Len(GCPConfigDoc.Fields, reflect.ValueOf(GCPConfig{}).NumField(), updateMsg)
|
|
|
|
assert.Len(QEMUConfigDoc.Fields, reflect.ValueOf(QEMUConfig{}).NumField(), updateMsg)
|
2022-05-18 12:10:57 -04:00
|
|
|
}
|
2022-08-01 03:37:05 -04:00
|
|
|
|
|
|
|
func TestConfig_UpdateMeasurements(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
newMeasurements := Measurements{
|
|
|
|
1: []byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
|
|
|
2: []byte{1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1},
|
|
|
|
3: []byte{2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2},
|
|
|
|
}
|
|
|
|
|
|
|
|
{ // Azure
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.Azure)
|
|
|
|
for k := range conf.Provider.Azure.Measurements {
|
|
|
|
delete(conf.Provider.Azure.Measurements, k)
|
|
|
|
}
|
|
|
|
conf.UpdateMeasurements(newMeasurements)
|
|
|
|
assert.Equal(newMeasurements, conf.Provider.Azure.Measurements)
|
|
|
|
}
|
|
|
|
{ // GCP
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.GCP)
|
|
|
|
for k := range conf.Provider.GCP.Measurements {
|
|
|
|
delete(conf.Provider.GCP.Measurements, k)
|
|
|
|
}
|
|
|
|
conf.UpdateMeasurements(newMeasurements)
|
|
|
|
assert.Equal(newMeasurements, conf.Provider.GCP.Measurements)
|
|
|
|
}
|
|
|
|
{ // QEMU
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.QEMU)
|
|
|
|
for k := range conf.Provider.QEMU.Measurements {
|
|
|
|
delete(conf.Provider.QEMU.Measurements, k)
|
|
|
|
}
|
|
|
|
conf.UpdateMeasurements(newMeasurements)
|
|
|
|
assert.Equal(newMeasurements, conf.Provider.QEMU.Measurements)
|
|
|
|
}
|
|
|
|
}
|
2022-08-16 09:53:54 -04:00
|
|
|
|
|
|
|
func TestConfig_IsImageDebug(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
conf *Config
|
|
|
|
want bool
|
|
|
|
}{
|
|
|
|
"gcp release": {
|
|
|
|
conf: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.GCP)
|
|
|
|
conf.Provider.GCP.Image = "projects/constellation-images/global/images/constellation-v1-3-0"
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
want: false,
|
|
|
|
},
|
|
|
|
"gcp debug": {
|
|
|
|
conf: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.GCP)
|
|
|
|
conf.Provider.GCP.Image = "projects/constellation-images/global/images/constellation-20220812102023"
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
want: true,
|
|
|
|
},
|
|
|
|
"azure release": {
|
|
|
|
conf: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.Azure)
|
2022-09-01 06:58:31 -04:00
|
|
|
conf.Provider.Azure.Image = "/CommunityGalleries/ConstellationCVM-b3782fa0-0df7-4f2f-963e-fc7fc42663df/Images/constellation/Versions/0.0.1"
|
2022-08-16 09:53:54 -04:00
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
want: false,
|
|
|
|
},
|
|
|
|
"azure debug": {
|
|
|
|
conf: func() *Config {
|
|
|
|
conf := Default()
|
|
|
|
conf.RemoveProviderExcept(cloudprovider.Azure)
|
|
|
|
conf.Provider.Azure.Image = "/subscriptions/0d202bbb-4fa7-4af8-8125-58c269a05435/resourceGroups/constellation-images/providers/Microsoft.Compute/galleries/Constellation_Debug/images/v1.4.0/versions/2022.0805.151600"
|
|
|
|
return conf
|
|
|
|
}(),
|
|
|
|
want: true,
|
|
|
|
},
|
|
|
|
"empty config": {
|
|
|
|
conf: &Config{},
|
|
|
|
want: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
assert.Equal(tc.want, tc.conf.IsImageDebug())
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2022-08-31 11:35:33 -04:00
|
|
|
|
|
|
|
func TestValidInstanceTypeForProvider(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
provider cloudprovider.Provider
|
|
|
|
instanceTypes []string
|
|
|
|
nonCVMsAllowed bool
|
|
|
|
expectedResult bool
|
|
|
|
}{
|
|
|
|
"empty all": {
|
|
|
|
provider: cloudprovider.Unknown,
|
|
|
|
instanceTypes: []string{},
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"empty azure only CVMs": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: []string{},
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"empty azure with non-CVMs": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: []string{},
|
|
|
|
nonCVMsAllowed: true,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"empty gcp": {
|
|
|
|
provider: cloudprovider.GCP,
|
|
|
|
instanceTypes: []string{},
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"azure only CVMs": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.AzureCVMInstanceTypes,
|
|
|
|
expectedResult: true,
|
|
|
|
},
|
|
|
|
"azure CVMs but CVMs disabled": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.AzureCVMInstanceTypes,
|
|
|
|
nonCVMsAllowed: true,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"azure trusted launch VMs with CVMs enabled": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.AzureTrustedLaunchInstanceTypes,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"azure trusted launch VMs with CVMs disbled": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.AzureTrustedLaunchInstanceTypes,
|
|
|
|
nonCVMsAllowed: true,
|
|
|
|
expectedResult: true,
|
|
|
|
},
|
|
|
|
"gcp": {
|
|
|
|
provider: cloudprovider.GCP,
|
|
|
|
instanceTypes: instancetypes.GCPInstanceTypes,
|
|
|
|
expectedResult: true,
|
|
|
|
},
|
|
|
|
"put gcp when azure is set": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.GCPInstanceTypes,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"put gcp when azure is set with CVMs disabled": {
|
|
|
|
provider: cloudprovider.Azure,
|
|
|
|
instanceTypes: instancetypes.GCPInstanceTypes,
|
|
|
|
nonCVMsAllowed: true,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"put azure when gcp is set": {
|
|
|
|
provider: cloudprovider.GCP,
|
|
|
|
instanceTypes: instancetypes.AzureCVMInstanceTypes,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
"put azure when gcp is set with CVMs disabled": {
|
|
|
|
provider: cloudprovider.GCP,
|
|
|
|
instanceTypes: instancetypes.AzureTrustedLaunchInstanceTypes,
|
|
|
|
nonCVMsAllowed: true,
|
|
|
|
expectedResult: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
for _, instanceType := range tc.instanceTypes {
|
|
|
|
assert.Equal(tc.expectedResult, validInstanceTypeForProvider(instanceType, tc.nonCVMsAllowed, tc.provider), instanceType)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|