mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-29 09:26:17 -05:00
005e865a13
* [wip] use state file in CLI Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> tidy Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * use state file in CLI Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> take clusterConfig from IDFile for compat Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> various fixes Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> wip Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add GCP-specific values in Helm loader test Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove unnecessary pointer Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * write ClusterValues in one step Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * move stub to test file Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove mention of id-file Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * move output to `migrateTerraform` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * unconditional assignments converting from idFile Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * move require block in go modules file Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * fall back to id file on upgrade Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * tidy Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * fix linter check Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add notice to remove Terraform state check on manual migration Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add `name` field Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> fix name tests Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * return early if no Terraform diff Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * tidy Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * return infrastructure state even if no diff exists Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add TODO to remove comment Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * use state-file in miniconstellation Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * cli: remove id-file (#2402) * remove id-file from `constellation create` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add file renaming to handler * rename id-file after upgrade * use idFile on `constellation init` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove id-file from `constellation verify` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * linter fixes Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove id-file from `constellation mini` * remove id-file from `constellation recover` * linter fixes * remove id-file from `constellation terminate` * fix initSecret type * fix recover argument precedence * fix terminate test * generate * add TODO to remove id-file removal * Update cli/internal/cmd/init.go Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * fix verify arg parse logic Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * add version test Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove id-file from docs * add file not found log * use state-file in miniconstellation Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove id-file from `constellation iam destroy` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * remove id-file from `cdbg deploy` Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> --------- Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com> * use state-file in CI Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> * update orchestration docs --------- Signed-off-by: Moritz Sanft <58110325+msanft@users.noreply.github.com> Co-authored-by: Adrian Stobbe <stobbe.adrian@gmail.com>
284 lines
9.2 KiB
Go
284 lines
9.2 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"testing"
|
|
|
|
"github.com/edgelesssys/constellation/v2/cli/internal/state"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
"github.com/edgelesssys/constellation/v2/internal/config"
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
"github.com/edgelesssys/constellation/v2/internal/file"
|
|
"github.com/edgelesssys/constellation/v2/internal/logger"
|
|
consemver "github.com/edgelesssys/constellation/v2/internal/semver"
|
|
"github.com/spf13/afero"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestCreate(t *testing.T) {
|
|
fsWithDefaultConfig := func(require *require.Assertions, provider cloudprovider.Provider) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
file := file.NewHandler(fs)
|
|
require.NoError(file.WriteYAML(constants.ConfigFilename, defaultConfigWithExpectedMeasurements(t, config.Default(), provider)))
|
|
return fs
|
|
}
|
|
infraState := state.Infrastructure{ClusterEndpoint: "192.0.2.1"}
|
|
someErr := errors.New("failed")
|
|
|
|
testCases := map[string]struct {
|
|
setupFs func(*require.Assertions, cloudprovider.Provider) afero.Fs
|
|
creator *stubCloudCreator
|
|
provider cloudprovider.Provider
|
|
yesFlag bool
|
|
controllerCountFlag *int
|
|
workerCountFlag *int
|
|
stdin string
|
|
wantErr bool
|
|
wantAbort bool
|
|
}{
|
|
"create": {
|
|
setupFs: fsWithDefaultConfig,
|
|
creator: &stubCloudCreator{state: infraState},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
},
|
|
"interactive": {
|
|
setupFs: fsWithDefaultConfig,
|
|
creator: &stubCloudCreator{state: infraState},
|
|
provider: cloudprovider.Azure,
|
|
stdin: "yes\n",
|
|
},
|
|
"interactive abort": {
|
|
setupFs: fsWithDefaultConfig,
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
stdin: "no\n",
|
|
wantAbort: true,
|
|
},
|
|
"interactive error": {
|
|
setupFs: fsWithDefaultConfig,
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
stdin: "foo\nfoo\nfoo\n",
|
|
wantErr: true,
|
|
},
|
|
"old adminConf in directory": {
|
|
setupFs: func(require *require.Assertions, csp cloudprovider.Provider) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.Write(constants.AdminConfFilename, []byte{1}, file.OptNone))
|
|
require.NoError(fileHandler.WriteYAML(constants.ConfigFilename, defaultConfigWithExpectedMeasurements(t, config.Default(), csp)))
|
|
return fs
|
|
},
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
"old masterSecret in directory": {
|
|
setupFs: func(require *require.Assertions, csp cloudprovider.Provider) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.Write(constants.MasterSecretFilename, []byte{1}, file.OptNone))
|
|
require.NoError(fileHandler.WriteYAML(constants.ConfigFilename, defaultConfigWithExpectedMeasurements(t, config.Default(), csp)))
|
|
return fs
|
|
},
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
"config does not exist": {
|
|
setupFs: func(a *require.Assertions, p cloudprovider.Provider) afero.Fs { return afero.NewMemMapFs() },
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
"create error": {
|
|
setupFs: fsWithDefaultConfig,
|
|
creator: &stubCloudCreator{createErr: someErr},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
"write id file error": {
|
|
setupFs: func(require *require.Assertions, csp cloudprovider.Provider) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.WriteYAML(constants.ConfigFilename, defaultConfigWithExpectedMeasurements(t, config.Default(), csp)))
|
|
return afero.NewReadOnlyFs(fs)
|
|
},
|
|
creator: &stubCloudCreator{},
|
|
provider: cloudprovider.GCP,
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
cmd := NewCreateCmd()
|
|
cmd.SetOut(&bytes.Buffer{})
|
|
cmd.SetErr(&bytes.Buffer{})
|
|
cmd.SetIn(bytes.NewBufferString(tc.stdin))
|
|
cmd.Flags().String("workspace", "", "") // register persistent flag manually
|
|
cmd.Flags().Bool("force", true, "") // register persistent flag manually
|
|
cmd.Flags().String("tf-log", "NONE", "") // register persistent flag manually
|
|
|
|
if tc.yesFlag {
|
|
require.NoError(cmd.Flags().Set("yes", "true"))
|
|
}
|
|
|
|
fileHandler := file.NewHandler(tc.setupFs(require, tc.provider))
|
|
c := &createCmd{log: logger.NewTest(t)}
|
|
err := c.create(cmd, tc.creator, fileHandler, &nopSpinner{}, stubAttestationFetcher{})
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
if tc.wantAbort {
|
|
assert.False(tc.creator.createCalled)
|
|
} else {
|
|
assert.True(tc.creator.createCalled)
|
|
|
|
var gotState state.State
|
|
expectedState := state.Infrastructure{
|
|
ClusterEndpoint: "192.0.2.1",
|
|
APIServerCertSANs: []string{},
|
|
InitSecret: []byte{},
|
|
}
|
|
require.NoError(fileHandler.ReadYAML(constants.StateFilename, &gotState))
|
|
assert.Equal("v1", gotState.Version)
|
|
assert.Equal(expectedState, gotState.Infrastructure)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCheckDirClean(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
fileHandler file.Handler
|
|
existingFiles []string
|
|
wantErr bool
|
|
}{
|
|
"no file exists": {
|
|
fileHandler: file.NewHandler(afero.NewMemMapFs()),
|
|
},
|
|
"adminconf exists": {
|
|
fileHandler: file.NewHandler(afero.NewMemMapFs()),
|
|
existingFiles: []string{constants.AdminConfFilename},
|
|
wantErr: true,
|
|
},
|
|
"master secret exists": {
|
|
fileHandler: file.NewHandler(afero.NewMemMapFs()),
|
|
existingFiles: []string{constants.MasterSecretFilename},
|
|
wantErr: true,
|
|
},
|
|
"multiple exist": {
|
|
fileHandler: file.NewHandler(afero.NewMemMapFs()),
|
|
existingFiles: []string{constants.AdminConfFilename, constants.MasterSecretFilename},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
for _, f := range tc.existingFiles {
|
|
require.NoError(tc.fileHandler.Write(f, []byte{1, 2, 3}, file.OptNone))
|
|
}
|
|
c := &createCmd{log: logger.NewTest(t)}
|
|
err := c.checkDirClean(tc.fileHandler)
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidateCLIandConstellationVersionCompatibility(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
imageVersion string
|
|
microServiceVersion consemver.Semver
|
|
cliVersion consemver.Semver
|
|
wantErr bool
|
|
}{
|
|
"empty": {
|
|
imageVersion: "",
|
|
microServiceVersion: consemver.Semver{},
|
|
cliVersion: consemver.Semver{},
|
|
wantErr: true,
|
|
},
|
|
"invalid when image < CLI": {
|
|
imageVersion: "v2.7.1",
|
|
microServiceVersion: consemver.NewFromInt(2, 8, 0, ""),
|
|
cliVersion: consemver.NewFromInt(2, 8, 0, ""),
|
|
wantErr: true,
|
|
},
|
|
"invalid when microservice < CLI": {
|
|
imageVersion: "v2.8.0",
|
|
microServiceVersion: consemver.NewFromInt(2, 7, 1, ""),
|
|
cliVersion: consemver.NewFromInt(2, 8, 0, ""),
|
|
wantErr: true,
|
|
},
|
|
"valid release version": {
|
|
imageVersion: "v2.9.0",
|
|
microServiceVersion: consemver.NewFromInt(2, 9, 0, ""),
|
|
cliVersion: consemver.NewFromInt(2, 9, 0, ""),
|
|
},
|
|
"valid pre-version": {
|
|
imageVersion: "ref/main/stream/nightly/v2.9.0-pre.0.20230626150512-0a36ce61719f",
|
|
microServiceVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
cliVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
},
|
|
"image version suffix need not be equal to CLI version": {
|
|
imageVersion: "ref/main/stream/nightly/v2.9.0-pre.0.19990626150512-9z36ce61799z",
|
|
microServiceVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
cliVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
},
|
|
"image version can have different patch version": {
|
|
imageVersion: "ref/main/stream/nightly/v2.9.1-pre.0.19990626150512-9z36ce61799z",
|
|
microServiceVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
cliVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
},
|
|
"microService version suffix must be equal to CLI version": {
|
|
imageVersion: "ref/main/stream/nightly/v2.9.0-pre.0.20230626150512-0a36ce61719f",
|
|
microServiceVersion: consemver.NewFromInt(2, 9, 0, "pre.0.19990626150512-9z36ce61799z"),
|
|
cliVersion: consemver.NewFromInt(2, 9, 0, "pre.0.20230626150512-0a36ce61719f"),
|
|
wantErr: true,
|
|
},
|
|
}
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
err := validateCLIandConstellationVersionAreEqual(tc.cliVersion, tc.imageVersion, tc.microServiceVersion)
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
}
|
|
})
|
|
}
|
|
}
|