mirror of https://github.com/kubernetes/kops.git
402 lines
9.0 KiB
Go
402 lines
9.0 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package aws
|
|
|
|
import (
|
|
"reflect"
|
|
"sort"
|
|
"testing"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
|
"github.com/aws/aws-sdk-go/service/elb"
|
|
"github.com/aws/aws-sdk-go/service/iam"
|
|
"k8s.io/kops/cloudmock/aws/mockec2"
|
|
"k8s.io/kops/cloudmock/aws/mockiam"
|
|
"k8s.io/kops/pkg/resources"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
|
)
|
|
|
|
func TestAddUntaggedRouteTables(t *testing.T) {
|
|
cloud := awsup.BuildMockAWSCloud("us-east-1", "abc")
|
|
resourceTrackers := make(map[string]*resources.Resource)
|
|
|
|
clusterName := "me.example.com"
|
|
|
|
c := &mockec2.MockEC2{}
|
|
cloud.MockEC2 = c
|
|
|
|
// Matches by vpc id
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-1234"),
|
|
RouteTableId: aws.String("rtb-1234"),
|
|
})
|
|
|
|
// Skips main route tables
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-1234"),
|
|
RouteTableId: aws.String("rtb-1234main"),
|
|
Associations: []*ec2.RouteTableAssociation{
|
|
{
|
|
Main: aws.Bool(true),
|
|
},
|
|
},
|
|
})
|
|
|
|
// Skips route table tagged with other cluster
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-1234"),
|
|
RouteTableId: aws.String("rtb-1234notmain"),
|
|
Tags: []*ec2.Tag{
|
|
{
|
|
Key: aws.String(awsup.TagClusterName),
|
|
Value: aws.String("other.example.com"),
|
|
},
|
|
},
|
|
})
|
|
|
|
// Ignores non-matching vpcs
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-5555"),
|
|
RouteTableId: aws.String("rtb-5555"),
|
|
})
|
|
|
|
resourceTrackers["vpc:vpc-1234"] = &resources.Resource{}
|
|
|
|
err := addUntaggedRouteTables(cloud, clusterName, resourceTrackers)
|
|
if err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
|
|
var keys []string
|
|
for k := range resourceTrackers {
|
|
keys = append(keys, k)
|
|
}
|
|
sort.Strings(keys)
|
|
expected := []string{"route-table:rtb-1234", "vpc:vpc-1234"}
|
|
if !reflect.DeepEqual(expected, keys) {
|
|
t.Fatalf("expected=%q, actual=%q", expected, keys)
|
|
}
|
|
}
|
|
|
|
func TestListIAMInstanceProfiles(t *testing.T) {
|
|
cloud := awsup.BuildMockAWSCloud("us-east-1", "abc")
|
|
// resources := make(map[string]*Resource)
|
|
clusterName := "me.example.com"
|
|
ownershipTagKey := "kubernetes.io/cluster/" + clusterName
|
|
|
|
c := &mockiam.MockIAM{
|
|
InstanceProfiles: make(map[string]*iam.InstanceProfile),
|
|
}
|
|
cloud.MockIAM = c
|
|
|
|
tags := []*iam.Tag{
|
|
{
|
|
Key: &ownershipTagKey,
|
|
Value: fi.PtrTo("owned"),
|
|
},
|
|
}
|
|
|
|
{
|
|
name := "prefixed." + clusterName
|
|
|
|
c.InstanceProfiles[name] = &iam.InstanceProfile{
|
|
InstanceProfileName: &name,
|
|
Tags: tags,
|
|
}
|
|
}
|
|
{
|
|
|
|
name := clusterName + ".not-prefixed"
|
|
|
|
c.InstanceProfiles[name] = &iam.InstanceProfile{
|
|
InstanceProfileName: &name,
|
|
Tags: tags,
|
|
}
|
|
}
|
|
{
|
|
name := "prefixed2." + clusterName
|
|
owner := "kubernetes.io/cluster/foo." + clusterName
|
|
c.InstanceProfiles[name] = &iam.InstanceProfile{
|
|
InstanceProfileName: &name,
|
|
Tags: []*iam.Tag{
|
|
{
|
|
Key: &owner,
|
|
Value: fi.PtrTo("owned"),
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
{
|
|
name := "prefixed3." + clusterName
|
|
c.InstanceProfiles[name] = &iam.InstanceProfile{
|
|
InstanceProfileName: &name,
|
|
}
|
|
}
|
|
|
|
// This is a special entity that will appear in list, but not in get
|
|
{
|
|
name := "__no_entity__." + clusterName
|
|
c.InstanceProfiles[name] = &iam.InstanceProfile{
|
|
InstanceProfileName: &name,
|
|
}
|
|
}
|
|
|
|
resourceTrackers, err := ListIAMInstanceProfiles(cloud, "", clusterName)
|
|
if err != nil {
|
|
t.Fatalf("error listing IAM roles: %v", err)
|
|
}
|
|
|
|
if len(resourceTrackers) != 2 {
|
|
t.Errorf("Unexpected number of resources to delete. Expected 2, got %d", len(resourceTrackers))
|
|
}
|
|
}
|
|
|
|
func TestListIAMRoles(t *testing.T) {
|
|
cloud := awsup.BuildMockAWSCloud("us-east-1", "abc")
|
|
// resources := make(map[string]*Resource)
|
|
clusterName := "me.example.com"
|
|
ownershipTagKey := "kubernetes.io/cluster/" + clusterName
|
|
|
|
c := &mockiam.MockIAM{
|
|
Roles: make(map[string]*iam.Role),
|
|
}
|
|
cloud.MockIAM = c
|
|
|
|
tags := []*iam.Tag{
|
|
{
|
|
Key: &ownershipTagKey,
|
|
Value: fi.PtrTo("owned"),
|
|
},
|
|
}
|
|
|
|
{
|
|
name := "prefixed." + clusterName
|
|
|
|
c.Roles[name] = &iam.Role{
|
|
RoleName: &name,
|
|
Tags: tags,
|
|
}
|
|
}
|
|
{
|
|
|
|
name := clusterName + ".not-prefixed"
|
|
|
|
c.Roles[name] = &iam.Role{
|
|
RoleName: &name,
|
|
Tags: tags,
|
|
}
|
|
}
|
|
{
|
|
name := "prefixed2." + clusterName
|
|
owner := "kubernetes.io/cluster/foo." + clusterName
|
|
c.Roles[name] = &iam.Role{
|
|
RoleName: &name,
|
|
Tags: []*iam.Tag{
|
|
{
|
|
Key: &owner,
|
|
Value: fi.PtrTo("owned"),
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
{
|
|
name := "prefixed3." + clusterName
|
|
c.Roles[name] = &iam.Role{
|
|
RoleName: &name,
|
|
}
|
|
}
|
|
|
|
resourceTrackers, err := ListIAMRoles(cloud, "", clusterName)
|
|
if err != nil {
|
|
t.Fatalf("error listing IAM roles: %v", err)
|
|
}
|
|
|
|
if len(resourceTrackers) != 2 {
|
|
t.Errorf("Unexpected number of resources to delete. Expected 2, got %d", len(resourceTrackers))
|
|
}
|
|
}
|
|
|
|
func TestListRouteTables(t *testing.T) {
|
|
cloud := awsup.BuildMockAWSCloud("us-east-1", "abc")
|
|
// resources := make(map[string]*Resource)
|
|
clusterName := "me.example.com"
|
|
ownershipTagKey := "kubernetes.io/cluster/" + clusterName
|
|
|
|
c := &mockec2.MockEC2{}
|
|
cloud.MockEC2 = c
|
|
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-1234"),
|
|
RouteTableId: aws.String("rtb-shared"),
|
|
Tags: []*ec2.Tag{
|
|
{
|
|
Key: aws.String("KubernetesCluster"),
|
|
Value: aws.String(clusterName),
|
|
},
|
|
{
|
|
Key: aws.String(ownershipTagKey),
|
|
Value: aws.String("shared"),
|
|
},
|
|
},
|
|
})
|
|
c.AddRouteTable(&ec2.RouteTable{
|
|
VpcId: aws.String("vpc-1234"),
|
|
RouteTableId: aws.String("rtb-owned"),
|
|
Tags: []*ec2.Tag{
|
|
{
|
|
Key: aws.String("KubernetesCluster"),
|
|
Value: aws.String(clusterName),
|
|
},
|
|
{
|
|
Key: aws.String(ownershipTagKey),
|
|
Value: aws.String("owned"),
|
|
},
|
|
},
|
|
})
|
|
|
|
resourceTrackers, err := ListRouteTables(cloud, "", clusterName)
|
|
if err != nil {
|
|
t.Fatalf("error listing route tables: %v", err)
|
|
}
|
|
for _, rt := range resourceTrackers {
|
|
if rt.ID == "rtb-shared" && !rt.Shared {
|
|
t.Fatalf("expected Shared: true, got: %v", rt.Shared)
|
|
}
|
|
if rt.ID == "rtb-owned" && rt.Shared {
|
|
t.Fatalf("expected Shared: false, got: %v", rt.Shared)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSharedVolume(t *testing.T) {
|
|
cloud := awsup.BuildMockAWSCloud("us-east-1", "abc")
|
|
clusterName := "me.example.com"
|
|
ownershipTagKey := "kubernetes.io/cluster/" + clusterName
|
|
|
|
c := &mockec2.MockEC2{}
|
|
cloud.MockEC2 = c
|
|
|
|
sharedVolume, err := c.CreateVolume(&ec2.CreateVolumeInput{
|
|
TagSpecifications: []*ec2.TagSpecification{
|
|
{
|
|
ResourceType: aws.String(ec2.ResourceTypeVolume),
|
|
Tags: []*ec2.Tag{
|
|
{
|
|
Key: aws.String(ownershipTagKey),
|
|
Value: aws.String("shared"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("error creating volume: %v", err)
|
|
}
|
|
|
|
ownedVolume, err := c.CreateVolume(&ec2.CreateVolumeInput{
|
|
TagSpecifications: []*ec2.TagSpecification{
|
|
{
|
|
Tags: []*ec2.Tag{
|
|
{
|
|
Key: aws.String(ownershipTagKey),
|
|
Value: aws.String("owned"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("error creating volume: %v", err)
|
|
}
|
|
|
|
resourceTrackers, err := ListVolumes(cloud, "", clusterName)
|
|
if err != nil {
|
|
t.Fatalf("error listing volumes: %v", err)
|
|
}
|
|
t.Log(len(resourceTrackers))
|
|
for _, rt := range resourceTrackers {
|
|
if rt.ID == *sharedVolume.VolumeId && !rt.Shared {
|
|
t.Fatalf("expected Shared: true, got: %v", rt.Shared)
|
|
}
|
|
if rt.ID == *ownedVolume.VolumeId && rt.Shared {
|
|
t.Fatalf("expected Shared: false, got: %v", rt.Shared)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestMatchesElbTags(t *testing.T) {
|
|
tc := []struct {
|
|
tags map[string]string
|
|
actual []*elb.Tag
|
|
expected bool
|
|
}{
|
|
{
|
|
tags: map[string]string{"tagkey1": "tagvalue1"},
|
|
actual: []*elb.Tag{
|
|
{
|
|
Key: fi.PtrTo("tagkey1"),
|
|
Value: fi.PtrTo("tagvalue1"),
|
|
},
|
|
{
|
|
Key: fi.PtrTo("tagkey2"),
|
|
Value: fi.PtrTo("tagvalue2"),
|
|
},
|
|
},
|
|
expected: true,
|
|
},
|
|
{
|
|
tags: map[string]string{"tagkey2": "tagvalue2"},
|
|
actual: []*elb.Tag{
|
|
{
|
|
Key: fi.PtrTo("tagkey1"),
|
|
Value: fi.PtrTo("tagvalue1"),
|
|
},
|
|
{
|
|
Key: fi.PtrTo("tagkey2"),
|
|
Value: fi.PtrTo("tagvalue2"),
|
|
},
|
|
},
|
|
expected: true,
|
|
},
|
|
{
|
|
tags: map[string]string{"tagkey3": "tagvalue3"},
|
|
actual: []*elb.Tag{
|
|
{
|
|
Key: fi.PtrTo("tagkey1"),
|
|
Value: fi.PtrTo("tagvalue1"),
|
|
},
|
|
{
|
|
Key: fi.PtrTo("tagkey2"),
|
|
Value: fi.PtrTo("tagvalue2"),
|
|
},
|
|
},
|
|
expected: false,
|
|
},
|
|
}
|
|
|
|
for i, test := range tc {
|
|
got := matchesElbTags(test.tags, test.actual)
|
|
if got != test.expected {
|
|
t.Fatalf("unexpected result from testcase %d, expected %v, got %v", i, test.expected, got)
|
|
}
|
|
}
|
|
}
|