mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
2d8fcd9bf4
Co-authored-by: Malte Poll <mp@edgeless.systems> Co-authored-by: katexochen <katexochen@users.noreply.github.com> Co-authored-by: Daniel Weiße <dw@edgeless.systems> Co-authored-by: Thomas Tendyck <tt@edgeless.systems> Co-authored-by: Benedict Schlueter <bs@edgeless.systems> Co-authored-by: leongross <leon.gross@rub.de> Co-authored-by: Moritz Eckert <m1gh7ym0@gmail.com>
402 lines
12 KiB
Go
402 lines
12 KiB
Go
package azure
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"testing"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
|
|
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/compute/armcompute"
|
|
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/network/armnetwork"
|
|
"github.com/edgelesssys/constellation/coordinator/core"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestGetVM(t *testing.T) {
|
|
expectedInstance := core.Instance{
|
|
Name: "instance-name",
|
|
ProviderID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
IPs: []string{"192.0.2.0"},
|
|
SSHKeys: map[string][]string{"user": {"key-data"}},
|
|
}
|
|
testCases := map[string]struct {
|
|
providerID string
|
|
networkInterfacesAPI networkInterfacesAPI
|
|
virtualMachinesAPI virtualMachinesAPI
|
|
expectErr bool
|
|
expectedInstance core.Instance
|
|
}{
|
|
"getVM for individual instance works": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
virtualMachinesAPI: newVirtualMachinesStub(),
|
|
expectedInstance: expectedInstance,
|
|
},
|
|
"getVM for scale set instance must fail": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachineScaleSets/scale-set-name/virtualMachines/instance-id",
|
|
expectErr: true,
|
|
},
|
|
"Get fails": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
virtualMachinesAPI: newFailingGetVirtualMachinesStub(),
|
|
expectErr: true,
|
|
},
|
|
"retrieving interfaces fails": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
virtualMachinesAPI: newVirtualMachinesStub(),
|
|
networkInterfacesAPI: newFailingNetworkInterfacesStub(),
|
|
expectErr: true,
|
|
},
|
|
"conversion fails": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
virtualMachinesAPI: newGetInvalidVirtualMachinesStub(),
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
metadata := Metadata{
|
|
networkInterfacesAPI: tc.networkInterfacesAPI,
|
|
virtualMachinesAPI: tc.virtualMachinesAPI,
|
|
}
|
|
instance, err := metadata.getVM(context.Background(), tc.providerID)
|
|
|
|
if tc.expectErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
assert.Equal(tc.expectedInstance, instance)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestListVMs(t *testing.T) {
|
|
expectedInstances := []core.Instance{
|
|
{
|
|
Name: "instance-name",
|
|
ProviderID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
IPs: []string{"192.0.2.0"},
|
|
SSHKeys: map[string][]string{"user": {"key-data"}},
|
|
},
|
|
}
|
|
testCases := map[string]struct {
|
|
imdsAPI imdsAPI
|
|
networkInterfacesAPI networkInterfacesAPI
|
|
virtualMachinesAPI virtualMachinesAPI
|
|
expectErr bool
|
|
expectedInstances []core.Instance
|
|
}{
|
|
"listVMs works": {
|
|
imdsAPI: newIMDSStub(),
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
virtualMachinesAPI: newVirtualMachinesStub(),
|
|
expectedInstances: expectedInstances,
|
|
},
|
|
"listVMs can return 0 VMs": {
|
|
imdsAPI: newIMDSStub(),
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
virtualMachinesAPI: &stubVirtualMachinesAPI{},
|
|
expectedInstances: []core.Instance{},
|
|
},
|
|
"can skip nil in VM list": {
|
|
imdsAPI: newIMDSStub(),
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
virtualMachinesAPI: newListContainingNilVirtualMachinesStub(),
|
|
expectedInstances: expectedInstances,
|
|
},
|
|
"retrieving network interfaces fails": {
|
|
imdsAPI: newIMDSStub(),
|
|
networkInterfacesAPI: newFailingNetworkInterfacesStub(),
|
|
virtualMachinesAPI: newVirtualMachinesStub(),
|
|
expectErr: true,
|
|
},
|
|
"converting instance fails": {
|
|
imdsAPI: newIMDSStub(),
|
|
networkInterfacesAPI: newNetworkInterfacesStub(),
|
|
virtualMachinesAPI: newListContainingInvalidVirtualMachinesStub(),
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
metadata := Metadata{
|
|
imdsAPI: tc.imdsAPI,
|
|
networkInterfacesAPI: tc.networkInterfacesAPI,
|
|
virtualMachinesAPI: tc.virtualMachinesAPI,
|
|
}
|
|
instances, err := metadata.listVMs(context.Background(), "resource-group")
|
|
|
|
if tc.expectErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
assert.ElementsMatch(tc.expectedInstances, instances)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSetTag(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
imdsAPI imdsAPI
|
|
tagsAPI tagsAPI
|
|
expectErr bool
|
|
}{
|
|
"setTag works": {
|
|
imdsAPI: newIMDSStub(),
|
|
tagsAPI: newTagsStub(),
|
|
},
|
|
"retrieving resource ID fails": {
|
|
imdsAPI: newFailingIMDSStub(),
|
|
tagsAPI: newTagsStub(),
|
|
expectErr: true,
|
|
},
|
|
"updating tags fails": {
|
|
imdsAPI: newIMDSStub(),
|
|
tagsAPI: newFailingTagsStub(),
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
metadata := Metadata{
|
|
imdsAPI: tc.imdsAPI,
|
|
tagsAPI: tc.tagsAPI,
|
|
}
|
|
err := metadata.setTag(context.Background(), "key", "value")
|
|
|
|
if tc.expectErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSplitVMProviderID(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
providerID string
|
|
expectErr bool
|
|
expectedSubscriptionID string
|
|
expectedResourceGroup string
|
|
expectedInstanceName string
|
|
}{
|
|
"providerID for individual instance works": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
expectedSubscriptionID: "subscription-id",
|
|
expectedResourceGroup: "resource-group",
|
|
expectedInstanceName: "instance-name",
|
|
},
|
|
"providerID for scale set instance must fail": {
|
|
providerID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachineScaleSets/scale-set-name/virtualMachines/instance-id",
|
|
expectErr: true,
|
|
},
|
|
"providerID is malformed": {
|
|
providerID: "malformed-provider-id",
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
subscriptionID, resourceGroup, instanceName, err := splitVMProviderID(tc.providerID)
|
|
|
|
if tc.expectErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
assert.Equal(tc.expectedSubscriptionID, subscriptionID)
|
|
assert.Equal(tc.expectedResourceGroup, resourceGroup)
|
|
assert.Equal(tc.expectedInstanceName, instanceName)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertVMToCoreInstance(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
inVM armcompute.VirtualMachine
|
|
inInterfaceIPConfigs []*armnetwork.InterfaceIPConfiguration
|
|
expectErr bool
|
|
expectedInstance core.Instance
|
|
}{
|
|
"conversion works": {
|
|
inVM: armcompute.VirtualMachine{
|
|
Name: to.StringPtr("instance-name"),
|
|
ID: to.StringPtr("/subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name"),
|
|
Tags: map[string]*string{"tag-key": to.StringPtr("tag-value")},
|
|
Properties: &armcompute.VirtualMachineProperties{
|
|
OSProfile: &armcompute.OSProfile{
|
|
LinuxConfiguration: &armcompute.LinuxConfiguration{
|
|
SSH: &armcompute.SSHConfiguration{
|
|
PublicKeys: []*armcompute.SSHPublicKey{
|
|
{
|
|
Path: to.StringPtr("/home/user/.ssh/authorized_keys"),
|
|
KeyData: to.StringPtr("key-data"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
inInterfaceIPConfigs: []*armnetwork.InterfaceIPConfiguration{
|
|
{
|
|
Properties: &armnetwork.InterfaceIPConfigurationPropertiesFormat{
|
|
PrivateIPAddress: to.StringPtr("192.0.2.0"),
|
|
},
|
|
},
|
|
},
|
|
expectedInstance: core.Instance{
|
|
Name: "instance-name",
|
|
ProviderID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
IPs: []string{"192.0.2.0"},
|
|
SSHKeys: map[string][]string{"user": {"key-data"}},
|
|
},
|
|
},
|
|
"conversion without SSH keys works": {
|
|
inVM: armcompute.VirtualMachine{
|
|
Name: to.StringPtr("instance-name"),
|
|
ID: to.StringPtr("/subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name"),
|
|
Tags: map[string]*string{"tag-key": to.StringPtr("tag-value")},
|
|
},
|
|
inInterfaceIPConfigs: []*armnetwork.InterfaceIPConfiguration{
|
|
{
|
|
Properties: &armnetwork.InterfaceIPConfigurationPropertiesFormat{
|
|
PrivateIPAddress: to.StringPtr("192.0.2.0"),
|
|
},
|
|
},
|
|
},
|
|
expectedInstance: core.Instance{
|
|
Name: "instance-name",
|
|
ProviderID: "azure:///subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name",
|
|
IPs: []string{"192.0.2.0"},
|
|
SSHKeys: map[string][]string{},
|
|
},
|
|
},
|
|
"invalid instance": {
|
|
inVM: armcompute.VirtualMachine{},
|
|
expectErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
instance, err := convertVMToCoreInstance(tc.inVM, tc.inInterfaceIPConfigs)
|
|
|
|
if tc.expectErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
require.NoError(err)
|
|
assert.Equal(tc.expectedInstance, instance)
|
|
})
|
|
}
|
|
}
|
|
|
|
func newFailingNetworkInterfacesStub() *stubNetworkInterfacesAPI {
|
|
return &stubNetworkInterfacesAPI{
|
|
getErr: errors.New("get err"),
|
|
}
|
|
}
|
|
|
|
func newGetInvalidVirtualMachinesStub() *stubVirtualMachinesAPI {
|
|
return &stubVirtualMachinesAPI{
|
|
getVM: armcompute.VirtualMachine{},
|
|
}
|
|
}
|
|
|
|
func newListContainingNilVirtualMachinesStub() *stubVirtualMachinesAPI {
|
|
return &stubVirtualMachinesAPI{
|
|
listPages: [][]*armcompute.VirtualMachine{
|
|
{
|
|
nil,
|
|
{
|
|
Name: to.StringPtr("instance-name"),
|
|
ID: to.StringPtr("/subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Compute/virtualMachines/instance-name"),
|
|
Tags: map[string]*string{
|
|
"tag-key": to.StringPtr("tag-value"),
|
|
},
|
|
Properties: &armcompute.VirtualMachineProperties{
|
|
NetworkProfile: &armcompute.NetworkProfile{
|
|
NetworkInterfaces: []*armcompute.NetworkInterfaceReference{
|
|
{
|
|
ID: to.StringPtr("/subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Network/networkInterfaces/interface-name"),
|
|
},
|
|
},
|
|
},
|
|
OSProfile: &armcompute.OSProfile{
|
|
LinuxConfiguration: &armcompute.LinuxConfiguration{
|
|
SSH: &armcompute.SSHConfiguration{
|
|
PublicKeys: []*armcompute.SSHPublicKey{
|
|
{
|
|
KeyData: to.StringPtr("key-data"),
|
|
Path: to.StringPtr("/home/user/.ssh/authorized_keys"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func newListContainingInvalidVirtualMachinesStub() *stubVirtualMachinesAPI {
|
|
return &stubVirtualMachinesAPI{
|
|
listPages: [][]*armcompute.VirtualMachine{
|
|
{
|
|
{
|
|
Name: nil,
|
|
ID: nil,
|
|
Properties: &armcompute.VirtualMachineProperties{
|
|
NetworkProfile: &armcompute.NetworkProfile{
|
|
NetworkInterfaces: []*armcompute.NetworkInterfaceReference{
|
|
{
|
|
ID: to.StringPtr("/subscriptions/subscription-id/resourceGroups/resource-group/providers/Microsoft.Network/networkInterfaces/interface-name"),
|
|
},
|
|
},
|
|
},
|
|
OSProfile: &armcompute.OSProfile{
|
|
LinuxConfiguration: &armcompute.LinuxConfiguration{
|
|
SSH: &armcompute.SSHConfiguration{
|
|
PublicKeys: []*armcompute.SSHPublicKey{
|
|
{
|
|
KeyData: to.StringPtr("key-data"),
|
|
Path: to.StringPtr("/home/user/.ssh/authorized_keys"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|