mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-12 01:14:28 -05:00
d1ace13713
* Remove `--config` and `--master-secret` falgs * Add `--workspace` flag * In CLI, only work on files with paths created from `cli/internal/cmd` * Properly print values for GCP on IAM create when not directly updating the config --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems>
173 lines
4.6 KiB
Go
173 lines
4.6 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"testing"
|
|
|
|
"github.com/edgelesssys/constellation/v2/cli/internal/clusterid"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
"github.com/edgelesssys/constellation/v2/internal/file"
|
|
"github.com/spf13/afero"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestTerminateCmdArgumentValidation(t *testing.T) {
|
|
testCases := map[string]struct {
|
|
args []string
|
|
wantErr bool
|
|
}{
|
|
"no args": {[]string{}, false},
|
|
"some args": {[]string{"hello", "test"}, true},
|
|
"some other args": {[]string{"12", "2"}, true},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
cmd := NewTerminateCmd()
|
|
err := cmd.ValidateArgs(tc.args)
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTerminate(t *testing.T) {
|
|
setupFs := func(require *require.Assertions, idFile clusterid.File) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.Write(constants.AdminConfFilename, []byte{1, 2}, file.OptNone))
|
|
require.NoError(fileHandler.WriteJSON(constants.ClusterIDsFilename, idFile, file.OptNone))
|
|
return fs
|
|
}
|
|
someErr := errors.New("failed")
|
|
|
|
testCases := map[string]struct {
|
|
idFile clusterid.File
|
|
yesFlag bool
|
|
stdin string
|
|
setupFs func(*require.Assertions, clusterid.File) afero.Fs
|
|
terminator spyCloudTerminator
|
|
wantErr bool
|
|
wantAbort bool
|
|
}{
|
|
"success": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: setupFs,
|
|
terminator: &stubCloudTerminator{},
|
|
yesFlag: true,
|
|
},
|
|
"interactive": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: setupFs,
|
|
terminator: &stubCloudTerminator{},
|
|
stdin: "yes\n",
|
|
},
|
|
"interactive abort": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: setupFs,
|
|
terminator: &stubCloudTerminator{},
|
|
stdin: "no\n",
|
|
wantAbort: true,
|
|
},
|
|
"files to remove do not exist": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: func(require *require.Assertions, idFile clusterid.File) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.WriteJSON(constants.ClusterIDsFilename, idFile, file.OptNone))
|
|
return fs
|
|
},
|
|
terminator: &stubCloudTerminator{},
|
|
yesFlag: true,
|
|
},
|
|
"terminate error": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: setupFs,
|
|
terminator: &stubCloudTerminator{terminateErr: someErr},
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
"missing id file does not error": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: func(require *require.Assertions, idFile clusterid.File) afero.Fs {
|
|
fs := afero.NewMemMapFs()
|
|
fileHandler := file.NewHandler(fs)
|
|
require.NoError(fileHandler.Write(constants.AdminConfFilename, []byte{1, 2}, file.OptNone))
|
|
return fs
|
|
},
|
|
terminator: &stubCloudTerminator{},
|
|
yesFlag: true,
|
|
},
|
|
"remove file fails": {
|
|
idFile: clusterid.File{CloudProvider: cloudprovider.GCP},
|
|
setupFs: func(require *require.Assertions, idFile clusterid.File) afero.Fs {
|
|
fs := setupFs(require, idFile)
|
|
return afero.NewReadOnlyFs(fs)
|
|
},
|
|
terminator: &stubCloudTerminator{},
|
|
yesFlag: true,
|
|
wantErr: true,
|
|
},
|
|
}
|
|
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
cmd := NewTerminateCmd()
|
|
cmd.SetOut(&bytes.Buffer{})
|
|
cmd.SetErr(&bytes.Buffer{})
|
|
cmd.SetIn(bytes.NewBufferString(tc.stdin))
|
|
|
|
// register persistent flags manually
|
|
cmd.Flags().String("tf-log", "NONE", "")
|
|
cmd.Flags().String("workspace", "", "")
|
|
|
|
require.NotNil(tc.setupFs)
|
|
fileHandler := file.NewHandler(tc.setupFs(require, tc.idFile))
|
|
|
|
if tc.yesFlag {
|
|
require.NoError(cmd.Flags().Set("yes", "true"))
|
|
}
|
|
|
|
err := terminate(cmd, tc.terminator, fileHandler, &nopSpinner{})
|
|
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
} else {
|
|
assert.NoError(err)
|
|
if tc.wantAbort {
|
|
assert.False(tc.terminator.Called())
|
|
} else {
|
|
assert.True(tc.terminator.Called())
|
|
_, err = fileHandler.Stat(constants.AdminConfFilename)
|
|
assert.Error(err)
|
|
_, err = fileHandler.Stat(constants.ClusterIDsFilename)
|
|
assert.Error(err)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
type spyCloudTerminator interface {
|
|
cloudTerminator
|
|
Called() bool
|
|
}
|