mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-11 00:44:20 -05:00
0036b24266
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
403 lines
9.2 KiB
Go
403 lines
9.2 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package openstack
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/role"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestProviderID(t *testing.T) {
|
|
someErr := errors.New("failed")
|
|
|
|
type testCase struct {
|
|
cache metadataResponse
|
|
cacheTime time.Time
|
|
newClient httpClientJSONCreateFunc
|
|
wantResult string
|
|
wantCall bool
|
|
wantErr bool
|
|
}
|
|
|
|
newTestCases := func(mResp1, mResp2 metadataResponse, expect1, expect2 string) map[string]testCase {
|
|
return map[string]testCase{
|
|
"cached": {
|
|
cache: mResp1,
|
|
cacheTime: time.Now(),
|
|
wantResult: expect1,
|
|
wantCall: false,
|
|
},
|
|
"from http": {
|
|
newClient: newStubHTTPClientJSONFunc(mResp1, nil),
|
|
wantResult: expect1,
|
|
wantCall: true,
|
|
},
|
|
"cache outdated": {
|
|
cache: mResp1,
|
|
cacheTime: time.Now().AddDate(0, 0, -1),
|
|
newClient: newStubHTTPClientJSONFunc(mResp2, nil),
|
|
wantResult: expect2,
|
|
wantCall: true,
|
|
},
|
|
"cache empty": {
|
|
cacheTime: time.Now(),
|
|
newClient: newStubHTTPClientJSONFunc(mResp1, nil),
|
|
wantResult: expect1,
|
|
wantCall: true,
|
|
},
|
|
"http error": {
|
|
newClient: newStubHTTPClientJSONFunc(metadataResponse{}, someErr),
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
"http empty response": {
|
|
newClient: newStubHTTPClientJSONFunc(metadataResponse{}, nil),
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
}
|
|
|
|
testUnits := map[string]struct {
|
|
method func(c *imdsClient, ctx context.Context) (string, error)
|
|
testCases map[string]testCase
|
|
}{
|
|
"providerID": {
|
|
method: (*imdsClient).providerID,
|
|
testCases: newTestCases(
|
|
metadataResponse{UUID: "uuid1"},
|
|
metadataResponse{UUID: "uuid2"},
|
|
"uuid1", "uuid2",
|
|
),
|
|
},
|
|
"name": {
|
|
method: (*imdsClient).name,
|
|
testCases: newTestCases(
|
|
metadataResponse{Name: "name1"},
|
|
metadataResponse{Name: "name2"},
|
|
"name1", "name2",
|
|
),
|
|
},
|
|
"projectID": {
|
|
method: (*imdsClient).projectID,
|
|
testCases: newTestCases(
|
|
metadataResponse{ProjectID: "projectID1"},
|
|
metadataResponse{ProjectID: "projectID2"},
|
|
"projectID1", "projectID2",
|
|
),
|
|
},
|
|
"uid": {
|
|
method: (*imdsClient).uid,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{UID: "uid1"}},
|
|
metadataResponse{Tags: metadataTags{UID: "uid2"}},
|
|
"uid1", "uid2",
|
|
),
|
|
},
|
|
"initSecretHash": {
|
|
method: (*imdsClient).initSecretHash,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{InitSecretHash: "hash1"}},
|
|
metadataResponse{Tags: metadataTags{InitSecretHash: "hash2"}},
|
|
"hash1", "hash2",
|
|
),
|
|
},
|
|
"authURL": {
|
|
method: (*imdsClient).authURL,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{AuthURL: "authURL1"}},
|
|
metadataResponse{Tags: metadataTags{AuthURL: "authURL2"}},
|
|
"authURL1", "authURL2",
|
|
),
|
|
},
|
|
"userDomainName": {
|
|
method: (*imdsClient).userDomainName,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{UserDomainName: "userDomainName1"}},
|
|
metadataResponse{Tags: metadataTags{UserDomainName: "userDomainName2"}},
|
|
"userDomainName1", "userDomainName2",
|
|
),
|
|
},
|
|
"username": {
|
|
method: (*imdsClient).username,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{Username: "username1"}},
|
|
metadataResponse{Tags: metadataTags{Username: "username2"}},
|
|
"username1", "username2",
|
|
),
|
|
},
|
|
"password": {
|
|
method: (*imdsClient).password,
|
|
testCases: newTestCases(
|
|
metadataResponse{Tags: metadataTags{Password: "password1"}},
|
|
metadataResponse{Tags: metadataTags{Password: "password2"}},
|
|
"password1", "password2",
|
|
),
|
|
},
|
|
}
|
|
|
|
for name, tu := range testUnits {
|
|
t.Run(name, func(t *testing.T) {
|
|
for name, tc := range tu.testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
var client *stubHTTPClientJSON
|
|
if tc.newClient != nil {
|
|
client = tc.newClient(require)
|
|
}
|
|
imds := &imdsClient{
|
|
client: client,
|
|
cache: tc.cache,
|
|
cacheTime: tc.cacheTime,
|
|
}
|
|
|
|
result, err := tu.method(imds, context.Background())
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
assert.Equal(tc.wantResult, result)
|
|
if client != nil {
|
|
assert.Equal(tc.wantCall, client.called)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestRole(t *testing.T) {
|
|
someErr := errors.New("failed")
|
|
mResp1 := metadataResponse{Tags: metadataTags{Role: "control-plane"}}
|
|
mResp2 := metadataResponse{Tags: metadataTags{Role: "worker"}}
|
|
expect1 := role.ControlPlane
|
|
expect2 := role.Worker
|
|
|
|
testCases := map[string]struct {
|
|
cache metadataResponse
|
|
cacheTime time.Time
|
|
newClient httpClientJSONCreateFunc
|
|
wantResult role.Role
|
|
wantCall bool
|
|
wantErr bool
|
|
}{
|
|
"cached": {
|
|
cache: mResp1,
|
|
cacheTime: time.Now(),
|
|
wantResult: expect1,
|
|
wantCall: false,
|
|
},
|
|
"from http": {
|
|
newClient: newStubHTTPClientJSONFunc(mResp1, nil),
|
|
wantResult: expect1,
|
|
wantCall: true,
|
|
},
|
|
"cache outdated": {
|
|
cache: mResp1,
|
|
cacheTime: time.Now().AddDate(0, 0, -1),
|
|
newClient: newStubHTTPClientJSONFunc(mResp2, nil),
|
|
wantResult: expect2,
|
|
wantCall: true,
|
|
},
|
|
"cache empty": {
|
|
cacheTime: time.Now(),
|
|
newClient: newStubHTTPClientJSONFunc(mResp1, nil),
|
|
wantResult: expect1,
|
|
wantCall: true,
|
|
},
|
|
"http error": {
|
|
newClient: newStubHTTPClientJSONFunc(metadataResponse{}, someErr),
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
"http empty response": {
|
|
newClient: newStubHTTPClientJSONFunc(metadataResponse{}, nil),
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
var client *stubHTTPClientJSON
|
|
if tc.newClient != nil {
|
|
client = tc.newClient(require)
|
|
}
|
|
imds := &imdsClient{
|
|
client: client,
|
|
cache: tc.cache,
|
|
cacheTime: tc.cacheTime,
|
|
}
|
|
|
|
result, err := imds.role(context.Background())
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
assert.Equal(tc.wantResult, result)
|
|
if client != nil {
|
|
assert.Equal(tc.wantCall, client.called)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestVPCIP(t *testing.T) {
|
|
someErr := errors.New("failed")
|
|
|
|
testCases := map[string]struct {
|
|
cache string
|
|
cacheTime time.Time
|
|
client *stubHTTPClient
|
|
wantResult string
|
|
wantCall bool
|
|
wantErr bool
|
|
}{
|
|
"cached": {
|
|
cache: "192.0.2.1",
|
|
cacheTime: time.Now(),
|
|
wantResult: "192.0.2.1",
|
|
wantCall: false,
|
|
},
|
|
"from http": {
|
|
client: &stubHTTPClient{response: "192.0.2.1"},
|
|
wantResult: "192.0.2.1",
|
|
wantCall: true,
|
|
},
|
|
"cache outdated": {
|
|
cache: "192.0.2.1",
|
|
cacheTime: time.Now().AddDate(0, 0, -1),
|
|
client: &stubHTTPClient{response: "192.0.2.2"},
|
|
wantResult: "192.0.2.2",
|
|
wantCall: true,
|
|
},
|
|
"cache empty": {
|
|
cacheTime: time.Now(),
|
|
client: &stubHTTPClient{response: "192.0.2.1"},
|
|
wantResult: "192.0.2.1",
|
|
wantCall: true,
|
|
},
|
|
"http error": {
|
|
client: &stubHTTPClient{err: someErr},
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
"http empty response": {
|
|
client: &stubHTTPClient{},
|
|
wantCall: true,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
imds := &imdsClient{
|
|
client: tc.client,
|
|
vpcIPCache: tc.cache,
|
|
vpcIPCacheTime: tc.cacheTime,
|
|
}
|
|
|
|
result, err := imds.vpcIP(context.Background())
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
assert.Equal(tc.wantResult, result)
|
|
if tc.client != nil {
|
|
assert.Equal(tc.wantCall, tc.client.called)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTimeForUpdate(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
cacheTime time.Time
|
|
want bool
|
|
}{
|
|
"cache outdated": {
|
|
cacheTime: time.Now().AddDate(-1, 0, -1),
|
|
want: true,
|
|
},
|
|
"cache not outdated": {
|
|
cacheTime: time.Now(),
|
|
want: false,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
imds := &imdsClient{cacheTime: tc.cacheTime}
|
|
|
|
assert.Equal(tc.want, imds.timeForUpdate(tc.cacheTime))
|
|
})
|
|
}
|
|
}
|
|
|
|
type httpClientJSONCreateFunc func(r *require.Assertions) *stubHTTPClientJSON
|
|
|
|
type stubHTTPClientJSON struct {
|
|
require *require.Assertions
|
|
response metadataResponse
|
|
err error
|
|
called bool
|
|
}
|
|
|
|
func newStubHTTPClientJSONFunc(response metadataResponse, err error) httpClientJSONCreateFunc {
|
|
return func(r *require.Assertions) *stubHTTPClientJSON {
|
|
return &stubHTTPClientJSON{
|
|
response: response,
|
|
err: err,
|
|
require: r,
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *stubHTTPClientJSON) Do(_ *http.Request) (*http.Response, error) {
|
|
c.called = true
|
|
body, err := json.Marshal(c.response)
|
|
c.require.NoError(err)
|
|
return &http.Response{Body: io.NopCloser(bytes.NewReader(body))}, c.err
|
|
}
|
|
|
|
type stubHTTPClient struct {
|
|
response string
|
|
err error
|
|
called bool
|
|
}
|
|
|
|
func (c *stubHTTPClient) Do(_ *http.Request) (*http.Response, error) {
|
|
c.called = true
|
|
return &http.Response{Body: io.NopCloser(strings.NewReader(c.response))}, c.err
|
|
}
|